Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT Show
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (48)These have been applied to structured tasks, such as record keeping, simple clerical operations, and inventory control Transaction-processing systems Understanding the role of information in generating and using business intelligence Information Literacy Provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace Business intelligence An organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes Management Information systems Skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, Computer literacy A collection of all relevant data organized in a series of integrated files A database Raw facts and is a component of an information system Data This component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis Process Facts that have been analyzed by the process component and, therefore, are more useful for decision making Information Which of the following is NOT one of the five forces model (Porter)? D. Offshoring This is software that secretly gathers information about users while they browse the Web. Spyware Using "people skills"—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information. This is an attack that takes advantage of the human element of security systems. Social Engineering This is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university. Phishing This is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information. Spoofing This is capturing and recording network traffic. Sniffing A combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked. Firewall A ___ attack floods a network or server with service requests to prevent legitimate users' access to the system. Denial-of-service (DoS) This outlines procedures for keeping an organization operational in the event of a natural disaster or network attack. Business continuity planning This security measure uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others. Biometric This transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others. Data encryption An unsolicited e-mail sent for advertising purposes. Spam
A set of rules specifying the legal and ethical use of a system and the consequences of noncompliance. Acceptable use policy Registering, selling, or using a domain name to profit from someone else's trademark is called: Cybersquatting Small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive. Cookies This protects product names and identifying marks Trademark This protects tangible material, such as books, drawings, online materials, including Web pages, HTML code, and computer graphics. Copyright This protects new processes Patent A legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses. Intellectual property Public information, posted by an organization or public agency, can be censored for public policy
reasons. True One of the following is not among the important concepts regarding the Web and network privacy: B. Data integrity This uses highly centralized information systems. Subsidiaries have little autonomy and rely on headquarters for all process and control decisions as well as system design and implementation. A global structure (also known as franchiser) This is an organization with assets and operations in at least one country other than its home country. It delivers products and services across national borders and is usually centrally managed from its headquarters. A multinational corporation (MNC) This is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries. A global information system An organization with this structure operates much like a multinational corporation, but subsidiaries depend on headquarters more for process and production decisions. international structure Globalization has become an important factor in purchasing and the supply chain. True or False? True Transborder data flow (TDF) restricts the type of data that can be captured and transmitted in foreign countries. True or False? True All of the following organizations do business across national borders except: Domestic Organizations Which of the following is NOT one of the three obstacles to using global information systems? Lack of funding The central processing unit (CPU) is the heart of a computer. It is divided into two components. a. the arithmetic logic unit (ALU) and the control unit Computers
can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. True The performs comparison or relational operations as well as arithmetic operations. Arithmetic logic unit (ALU) The _____ tells the computer what to do, such as instructing the computer which device to read or send output to. Control Unit This is volatile memory, in which data can be read from and written to; it is also called readwrite memory. Random Access Memory (RAM) This type of memory is nonvolatile. Read-only memory (ROM)
This is a set of programs for controlling and managing computer hardware and software. Operating System (OS) This is used to perform a variety of tasks on a personal computer, including word processing, spreadsheets, database, presentation, graphics, etc. Application Software This resides on the processor. It stores recently accessed memory so the processor is not waiting for the memory transfer. Cache Ram This stores data and information and is usually volatile; its contents are lost when electrical power is turned off. It plays a major role in a computer's performance. Main Memory Sets with similar termsMIS 3300 UH Exam 164 terms nick_patino1 MIS Test 176 terms nicolerusso1022 IS Exam 158 terms emily_gilmer CIS 236 CH 1 & 2185 terms beectee5 Sets found in the same folderBusiness Information Systems Exam #124 terms ned_macdonald Business Information Systems Exam 176 terms ashley_milanowski Chapter 1 Bus Info Systems11 terms warren_buehler Chapter 1 BIS11 terms MariahG35 Other sets by this creatorTest 1 Act. 22 terms j_evenhouse QUIZES CH. 5-832 terms j_evenhouse Accounting Test 1 Quizes17 terms j_evenhouse BIS CHAPTER 14, BIS Chapter 13, BIS Ch.12, BIS Cha…110 terms j_evenhouse Verified questions
SOCIOLOGY Provide examples from your own experience to support or contradict the existence of the hidden curriculum. Verified answer
SOCIOLOGY How would sociologists explain the fact that on average, African Americans earn $62 for every$100 earned by whites? Verified answer
SOCIOLOGY How do sociologists manage to study religion if they can't see the spiritual world? Verified answer
SOCIOLOGY Match terms a-e with statements. a. population b. representative sample c. random sample d. sample e. survey. selected on the basis of chance, so that each member of a population has an equal opportunity of being selected. Verified answer Other Quizlet sets6th grade language arts semester 2 part 1210 terms schokoliese Electronic Fetal Monitoring29 terms Nursing_Student_84 BLS & CPR57 terms Lamar_Clayton test 2: work and family50 terms mdduques Related questionsQUESTION What type of malware gains control of a computer and creates a backdoor with root privileges? 8 answers QUESTION Of the general areas of business, which area deals with human resources and employee engagement? 3 answers QUESTION True or False: The IT steering committee is comprised of members from each of the IT groups that is responsible for seeing any given project to completion. 2 answers QUESTION Be able to briefly discuss how small schools leverage athletes to increase general revenues (lecture). 8 answers |