Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT
Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (48)
These have been applied to structured tasks, such as record keeping, simple clerical operations, and inventory control
Transaction-processing systems
Understanding the role of information in generating and using business intelligence
Information Literacy
Provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace
Business intelligence
An organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes
Management Information systems
Skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software,
Computer literacy
A collection of all relevant data organized in a series of integrated files
A database
Raw facts and is a component of an information system
Data
This component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis
Process
Facts that have been analyzed by the process component and, therefore, are more useful for decision making
Information
Which of the following is NOT one of the five forces model (Porter)?
Select one:
a. Substitutes
b. New Entrants
c. Suppliers
d. Offshoring
e. Buyers
D. Offshoring
This is software that secretly gathers information about users while they browse the Web.
Spyware
Using "people skills"—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information. This is an attack that takes advantage of the human element of security systems.
Social Engineering
This is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
Phishing
This is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.
Spoofing
This is capturing and recording network traffic.
Sniffing
A combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked.
Firewall
A ___ attack floods a network or server with service requests to prevent legitimate users' access to the system.
Denial-of-service (DoS)
This outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
Business continuity planning
This security measure uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.
Biometric
This transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others.
Data encryption
An unsolicited e-mail sent for advertising purposes.
Spam
A set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
Acceptable use policy
Registering, selling, or using a domain name to profit from someone else's trademark is called:
Cybersquatting
Small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.
Cookies
This protects product names and identifying marks
Trademark
This protects tangible material, such as books, drawings, online materials, including Web pages, HTML code, and computer graphics.
Copyright
This protects new processes
Patent
A legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.
Intellectual property
Public information, posted by an organization or public agency, can be censored for public policy
reasons.
Select one:
True
False
True
One of the following is not among the important concepts regarding the Web and network privacy:
Select one:
a. Accountability
b. Data integrity
c. Nonrepudiation
d. Acceptable use policies
B. Data integrity
This uses highly centralized information systems. Subsidiaries have little autonomy and rely on headquarters for all process and control decisions as well as system design and implementation.
A global structure (also known as franchiser)
This is an organization with assets and operations in at least one country other than its home country. It delivers products and services across national borders and is usually centrally managed from its headquarters.
A multinational corporation (MNC)
This is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.
A global information system
An organization with this structure operates much like a multinational corporation, but subsidiaries depend on headquarters more for process and production decisions.
international structure
Globalization has become an important factor in purchasing and the supply chain. True or False?
Select one:
True
False
True
Transborder data flow (TDF) restricts the type of data that can be captured and transmitted in foreign countries. True or False?
Select one:
True
False
True
All of the following organizations do business across national borders except:
Select one:
a. Domestic organizations
b. International organizations
c. Multinational organizations
d. Global
organizations
Domestic Organizations
Which of the following is NOT one of the three obstacles to using global information systems?
Select one:
a. Lack of funding
b. Cultural differences
c. Diverse regulatory practices
d. Lack of standardization (including differences in time zones, taxes, language, and work habits)
Lack of funding
The central processing unit (CPU) is the heart of a computer. It is divided into two components.
Select one:
a. the arithmetic logic unit (ALU) and the control unit
b. random access memory (RAM) and the control unit
c. input device and output device
d. the arithmetic logic unit (ALU) and random access memory (RAM)
a. the arithmetic logic unit (ALU) and the control unit
Computers
can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations.
Select one:
True
False
True
The performs comparison or relational operations as well as arithmetic operations.
Arithmetic logic unit (ALU)
The _____ tells the computer what to do, such as instructing the computer which device to read or send output to.
Control Unit
This is volatile memory, in which data can be read from and written to; it is also called readwrite memory.
Random Access Memory (RAM)
This type of memory is nonvolatile.
Read-only memory (ROM)
This is a set of programs for controlling and managing computer hardware and software.
Operating System (OS)
This is used to perform a variety of tasks on a personal computer, including word processing, spreadsheets, database, presentation, graphics, etc.
Application Software
This resides on the processor. It stores recently accessed memory so the processor is not waiting for the memory transfer.
Cache Ram
This stores data and information and is usually volatile; its contents are lost when electrical power is turned off. It plays a major role in a computer's performance.
Main Memory
Sets with similar termsMIS 3300 UH Exam 1
64 terms
nick_patino1
MIS Test 1
76 terms
nicolerusso1022
IS Exam 1
58 terms
emily_gilmer
CIS 236 CH 1 & 2
185 terms
beectee5
Sets found in the same folderBusiness Information Systems Exam #1
24 terms
ned_macdonald
Business Information Systems Exam 1
76 terms
ashley_milanowski
Chapter 1 Bus Info Systems
11 terms
warren_buehler
Chapter 1 BIS
11 terms
MariahG35
Other sets by this creatorTest 1 Act. 2
2 terms
j_evenhouse
QUIZES CH. 5-8
32 terms
j_evenhouse
Accounting Test 1 Quizes
17 terms
j_evenhouse
BIS CHAPTER 14, BIS Chapter 13, BIS Ch.12, BIS Cha…
110 terms
j_evenhouse
Verified questions
SOCIOLOGY
Provide examples from your own experience to support or contradict the existence of the hidden curriculum.
Verified answer
SOCIOLOGY
How would sociologists explain the fact that on average, African Americans earn $62 for every$100 earned by whites?
Verified answer
SOCIOLOGY
How do sociologists manage to study religion if they can't see the spiritual world?
Verified answer
SOCIOLOGY
Match terms a-e with statements. a. population b. representative sample c. random sample d. sample e. survey. selected on the basis of chance, so that each member of a population has an equal opportunity of being selected.
Verified answer
Other Quizlet sets6th grade language arts semester 2 part 12
10 terms
schokoliese
Electronic Fetal Monitoring
29 terms
Nursing_Student_84
BLS & CPR
57 terms
Lamar_Clayton
test 2: work and family
50 terms
mdduques
Related questionsQUESTION
What type of malware gains control of a computer and creates a backdoor with root privileges?
8 answers
QUESTION
Of the general areas of business, which area deals with human resources and employee engagement?
3 answers
QUESTION
True or False: The IT steering committee is comprised of members from each of the IT groups that is responsible for seeing any given project to completion.
2 answers
QUESTION
Be able to briefly discuss how small schools leverage athletes to increase general revenues (lecture).
8 answers