click below
click below
Normal Size Small Size show me how
Information Manageme
study stack
| Question | Answer |
|---|---|
| Audit | Process by which an organizatin accounts and rrecord are verifie |
| Business continuity | An organization ability to function during and after a disater |
| Compliance | Fulfilling the requirement of the law |
| Consistency | Stability regularity |
| Data | Facts and figures |
| Data processing | Converting facts and figures into useful information |
| Decision making | Choosing among altternative |
| Hack | Unauthorized acces to a computer system |
| Information manaement | The process of accessing processing maintaining eevaluating and disseminating knowledge facts or data for the purpose of assiting business deciion making |
| Inforation overload | Communication that is too much and/ or comes too fast to process at one time |
| Managent informmation system (MIS) | An integrated technology that assists with an organization information management needs |
| Outsourciing | Acquiring assistance from outside organizations/consultants to obtain good or services to accomplish business objective or perform primary business activities |
| Popietary information | Private information that belongs to an organization and cannot be releeased to the public |
| Sarbanes - Oxley Act | A U.S regulation mandating that public businesses cimply with specific accounting requirements |
| Spam | Junk email that the recipient did not request also knowns as unsolicited commercial email. |
| Trade secret | Undisclosed information within a particular business or industry |
| Viruses | Computer programs that download to your computer or network without your permission programs programs designed to disrupt computer operations |
| Wireless network | A computer network connected without the use of wires or cables. |