This site is 100% ad supported. Please add an exception to adblock for this site.

Information Systems (incomplete)

Terms

undefined, object
copy deck
dialogue manager
User interface that allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases.
virtual memory
Memory that allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM
WiMax
defined as Worldwide Interoperability for Microwave Access by the WiMAX Forum, formed in June 2001 to promote conformance and interoperability of the IEEE 802.16 standard, officially known as WirelessMAN.
change model
Representation of change theories that identifies the phases of change and the best way to implement them
terminal-to-host
an architecture in which the application and database reside on one host computer, and the user interacts with the application and data using a "dumb" terminal
Shannon's fundamental law of information theory
The law of telecommunications that states that the information-carrying capacity of a channel is directly proportional to its bandwith
computer system architecture
the structure, or configuration of the hardware components of a computer system
data manipuation language (DML)
The commands that are used to manipulate the data in a database
cookie
a text file that an internet company can place on the hard disk of a computer system to track user movements
planned data redundancy
A way of organizing data in which the logical database design is altered so that certain data entities are combined, summary totals are carried in the data records rather than calculated from the elemental data, and some data attributes are repeated in more than one data entity to improve database performance.
network topology
logical model that describes how networks are structured or configured
cold site
a computer environment that includes rooms, electrical service, telecommunications links, data storage devices, and the like AKA a shell
usenet
A system closely allied with the Internet that uses e-mail to provide a centralized new service; a protocol that describes how groups of messages can be stored on and sent between computers.
Point to point protocol (PPP)
A communications protocol that transmits packets over telephone lines
Arithmetic/Logic unit (ALU)
Portion of the CPU that performs mathematical calculations and makes logical comparisions
audit trail
Documentation that allows the auditor to trace any output from the computer system back to the source documents
data definition language (DDL)
A collection of instructions and communications used to define and describe data and data relationships in a specific database
information center
A support function that provides users with assistance, training, application development, documentation, equipment selection and setup, standards, technical assistance, and troubleshooting.
inference engine
Part of the expert system that seeks information and relationships from the knowledge base and provides answers, predictions, and suggestions the way a human expert would.
institutional DSS
A DSS that handles situations or decisions that occur more than once, usually several times a year or more.
systems analyst
Professional who specializes in analyzing and designing business systems
command based user interface
A user that requires that text commands be given to the computer to perform basic activities
system boundary
The limits of the system; it distinguishes the system from everything else (the environment)
data editing
The process of checking data for validity and completeness
domain
1) The allowable values for data attributes. 2) The area of knowledge addressed by the expert system.
critical path
Activities that, if delayed would delay the entire project
syntax
a set of rules associated with a programming language
input
The activity of gathering and capturing raw data.
network operating system (NOS)
Systems software that controls the computer systems and devices on a network and allows them to communicate with eachother.
personal area network (PAN)
A network that supports the interconnection of information tehcnology within a range of 33 feet or so.
virtual private network (VPN)
A secure connection between two points across the internet
Moore's Law
A hypothesis that states that transistor densities on a single chip will double every 18 months.
batch processing system
Method of computerized processing in which business transactions are accumulated over a period of time and prepared for processing as a single unit or batch
distributed processing
Processing alternative in which computers are placed at remote locations but connected to eachother via a network.
bridge
A device used to connect two or more networks that use the same communications protocol
java
An object-oriented programming language from Sun microsystems based on C++ that allows small programs (applets) to be embedded within an HTML document.
programming life cycle
A series of steps and planned activities developed to maximize the likelihood of developing good software.
intranet
An internal network based on Web technologies that allows people within an organization to exchange information and work on projects.
integrated development environments (IDEs)
Development approach that combines the tools needed for programming with a programming language into one integrated package.
sequential access storage data (SASD)
Device used to sequentially access secondary storage data
password sniffer
A small program hidden in a network or a computer system that hides identification numbers and passwords
data mining
an information analysis tool that involves the automated discovery of patterns and relationships in the data warehouse
switched line
A communications line that uses switching equipment to allow one transmission device to be connected to other communication devices
information system
A set of interrelated components that collect, manipulate, store, and disseminate data and information and provide a feedback mechanism to meet an objective.
Extensible Markup Language (XML)
Markup language for Web documents containing structured information, including words, pictures and other elements.
bus network
A type of topology that contains computers and computer devices on a single line
Asset management transaction processing system
system that controls investments in capital management and manages depreciation for maximum tax benefits
thin client
a low-cost, centrally managed computer with essential but limited capabilities
kernel
The heart of the operating system, which controls the most critical processes.
complier
A special software program that converts the programmer's source code into the machine-language instructions consisting of binary digits
what-if analysis
The process of making hypothetical changes to problem data and observing the impact on the results
benchmark test
An examination that compares computer systems operating under the same conditions
systems design
the systems development phase that defines how the information system will do what it must do to obtain the problem solution
Porter's 5 Forces Model
The 5 industry factors 1) Bargaining power of customers 2) bargaining power of suppliers 3) The threat of new entrants 4 ) Threat of substitute products 5) Intensity of competitive rivalry
private branch exchange (PBX)
An on-premise switching system owned or leased by a private enterprise that inter-connects its telephones and provides access to the public accounting system.
business continuity planning
Identification of the business processes that must be restored first in the event of a disaster and specification of what actions should be taken and who should take them to restore operations
online analytical processing (OLAP)
Software that allows users to explore data from a number of different perspectives
deterrence controls
Rules and procedures created to prevent problems
Telnet
A terminal emulation protocol that enables users to log on to other computers on the internet to gain access to public files
flexible manufacturing system (FMS)
An approach that allows manufacturing facilities to rapidly and efficiently change from making one product to making another.
model management software
Software that coordinates the use of models in a DSS
digital suscriber line (DSL)
a telecommunications technology that delivers high-bandwith information to homes and small businesses over ordinary copper telephone wires
backward chaining
the process of starting with conclusions and working backwards to the facts
if-then statements
Rules that suggest certain conclusions
Why IS is important?
Since Information = $$
Ethernet
a large, diverse family of frame-based computer networking technologies that operates at many speeds for local area networks (LANs).
Integrated services digital network (ISDN)
A set of standards for integrating voice and data communications onto a single line via digital transmission over copper wire or other media.
ad hoc DSS
A DSS concerned with situations or decisions that come up only a few times during the life of the organization
malware
Software that is harmful or destructive, such as viruses and worms.
competitive local exchange carrier (CLEC)
A company that is allowed to compete with the LECs such as a wireless, satilite or cable service provider
computer-aided software engineering (CASE)
Tools that automate many of the tasks required in a systems development effort and enforce adherence to the SDLC
cache memory
a type of high-speed memory that a processor can access more rapidly than main memory
systems investigation
the systems development phase during which problems and opportunities are identified and considered in light of the goals of the business.
Open database connectivity (ODBC)
Standards that ensure that software can be used with any ODBC compliant database.
loop structure
A programming structure with two commonly used structures for loops; do-until and do-while. In the do-until structure, the loop is done until a certain condition is met. In the do-while structure, the loop is done while a certain condition exists.
rapid application development (RAD)
A systems development approach that employs tools, techniques, and methodologies designed to speed application development
hub
A place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions.
simplex channel
a communications channel that can transmit data in only one direction
digital signature
Encryption technique used to verify the identity of a message sender for processing online financial transactions.
predicitve analysis
A form of data mining that combines historical data with assumptions about future conditions to predict outcomes of events such as future product sales or the probability that a customer will default on a loan.
informatics
A specialized system that combines traditional disciplines, such as science and medicine, with computer systems and technology.
Accounting MIS
An information system that provides aggregate information on accounts payable, a/r, payroll, asset management, and general ledger
Acceptance Testing
Conducting any tests required by the user
Enterprise Resource Planning (ERP)
integrate (or attempt to integrate) all data and processes of an organization into a unified system
Computer based Information system (CBIS)
A single set of hardware, software, databases, telecommunications, people, and procedures that are configured to collect, manipulate, store, and process data into information
systems implementation
the systems development phase involving the creation or aquiring of various system components detailed in the systems design, assembling them, and placing the new or modified system into operation.
budget transaction processing system
system that automates many of the tasks required to amass budget data, distribute it to users, and consolidate the prepared budgets.
pixel
A dot of color on a photo image or a point of light on a display screen
phishing
Bogus messages purportedly from a legitimate institution to pry personal information from customers by convicing them to go to a "spoof" website
extranet
A network based on Web technologies that links selected resources of a company's intranet with its customers, suppliers, or other business partners
source data automation
Capturing and editing data where the data is initially created and in a form that can be directly input into a computer, thus ensuring accuracy and timeliness
applet
A small program embedded in web pages
TCP/IP
Internet protocol suite is the set of communications protocols that implements the protocol stack on which the Internet and many commercial networks run. It is part of the TCP/IP protocol suite, which is named after two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were also the first two networking protocols defined.
joint application development
Process for data collection and requirements analysis, in which users, stakeholders, and IS professionals work together to analyze existing systems, propose possible solutions, and define the requirements of a new or modified system.
M-Commerce
Commerce over a mobile phone
Value Chain
The value chain categorizes the generic value-adding activities of an organization. The "primary activities" include: inbound logistics, operations (production), outbound logistics, marketing and sales, and services (maintenance). The "support activities" include: administrative infrastructure management, human resource management, R&D, and procurement. The costs and value drivers are identified for each value activity. The value chain framework quickly made its way to the forefront of management thought as a powerful analysis tool for strategic planning. Its ultimate goal is to maximize value creation while minimizing costs.
byte
eight bits that together represent a single character of data
financial MIS
An information system that provides financial information to all financial managers within an organization
digital certificate
an attachment to an email message or data embedded in a Web page that verifies the identity of a sender or a Web site
systems controls
rules and procedures to maintain data security
wide area network (WAN)
a network that ties together large geographic regions
application service provider (ASP)
A company that provides software, end-user support, and the computer hardware on which to run the software from the users' facilities
megahertz (MHz)
Millions of cycles per second.
decision support system (DSS)
An organized collection of people, procedures, software, databases, and devices used to support problem specific decision making
hypertext markup language (HTML)
The standard page description language for Web pages
beta testing
Testing a complete and stable system by end users
Electronic Data Interchange (EDI)
a set of standards for structuring information to be electronically exchanged between and within businesses, organizations, government entities and other groups. The standards describe structures that emulate documents, for example purchase orders to automate purchasing. The term EDI is also used to refer to the implementation and operation of systems and processes for creating, transmitting, and receiving EDI documents.
denial-of-service attack (DOS)
An attack in which the attacker takes command of many computers on the internet and uses them to flood the target web site with requests for data and other small tasks, preventing the target machine from serving legitimate users
Transaction Processing System (TPS)
is a type of information system. TPSs collect, store, modify, and retrieve the transactions of an organization.
expert system
A system that gives a computer the ability to make suggestions
parallel start up
Running both the old and new systems for a period of time and comparing the output of the new system closely with the output of the old system; any differences are reconciled. When users are comfortable that the new system is working correctly, the old system is eliminated
Accounts payable system
System that increases an organization's control over purchasing, improves cash flow, increases profitability, and provides more effective management of current liabilities.
data redundancy
duplication of data in separate files
firewall
A device that sits between an internal network and the Internet, limiting access into and out of a network based on access policies.
local exchange carrier (LEC)
A public telephone company in the United States that provides service to homes and businesses within its defined geographical area, called its local access transport area (LATA)
systems maintenance
stage of systems development that involves checking changing, and enhancing the system to make it more useful in achieving user and organizational goals
uniform resource locator (URL)
An assigned address on the internet for each computer
internet protocol (IP)
Communication standard that enables traffic to be routed from one network to another as needed.
backbone
one of the internet's high-speed, long-distance communications links
systems analysis
The systems development phase involving the study of existing systems and work processes to identify strengths, weaknesses, and opportunities for improvement
document production
the process of generating output records and reports
local area network (LAN)
A network that connects computer systems an devices within the same geographic area.
router
A device or software in a computer that determines the next network point to which a data packet should be forwarded toward its destination
object oriented systems development (OOSD)
Approach to systems development that combines the logic of the systems development life cycle with the power of object oriented modeling and programming
marketing MIS
Information system that supports managerial activities in product development, distribution, pricing decisions, and promotional effectiveness.
Characteristics of good information
Accurate, complete, economical, flexible, reliable, relevant, simple, timely, verifiable, accessible, secure
system parameter
a value or quantity that cannot be controlled, such as the cost of raw material.
piplining
A form of CPU operation in which there are multiple execution phases in a single machine cycle.
complex instruction set computing (CISC)
A computer chip design that places as many microcode instructions into the CPU as possible
bit
binary digit --- 0 or 1
transmission control protocol (TCP)
Widely used transport layer protocol that is used in combination with IP by most Internet applications.
asynchronous communications
Communications in which the receiver gets the message minutes, hours, or days after it is sent
slipstream upgrade
A minor upgrade -- typically a code adjustment or minor bug fix -- not worth announcing
sychronous communication
communications in which the receiver gets the message instantaneously
register
High-speed storage area in the CPU used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the CPU.
application program interface
Interface that allows applications to make use of the operating system
alpha testing
testing an incomplete or early version of the system
technical documentation
Written details used by computer operators to execute the program and by analysts and programmers in case there are problems with the program or the program needs modification
Serial Line Internet Protocol (SLIP)
A communications protocol that transmits packets over telephone lines
managed security service provider (MSSP)
An organization that monitors, manages, and maintains network security hardware and software for its client companies
knowledge base
A component of an expert system that stores all relevant information, data, rules, cases, and relationships used by the expert system
clickstream data
Data gathered based on the websites you visit and the items you click on
Network-attached storage
Storage devices that attach to a network instead of to a single computer.
MIPS
Millions of instructions per second
meta tag
A simple HTML tag , not visible on the displayed Web Page that contains keywords representing your site's content, which search engines use to build indexes pointing to your web site.
cross-platform development
Development technique that allows programmers to develop programs that can run on computer systems having different hardware and operating systems
genetic algorithm
An approach to solving large, complex problems in which a number of related operations or models change and evolve until the best one emerges.
HTML tags
Codes that let the Web browser know how to format text --- as a heading, as a list, or as body text -- and whether images, sound, and other elements should be inserted.
public key infrastructure (PKI)
A means to enable users of an unsecured public network such as the Internet to securely and privately exchange data through the use of a public and private cryptographic key pair that is obtained and shared through a trusted authority
secure sockets layer (SSL)
A communications protocol used to secure sensitive data
online transaction processing (OLTP)
Computerized processing in which each transaction is processes immediately, without the delay of accumulating transactions into a batch.
documentation
Text that describes the program functions to help the user operate the computer system
radio frequency identification (RFID)
A technology that employs a microchip with an antenna that broadcasts its unique identifier and location to receivers
hypermedia
Tools that connect the data on Web pages, allowing users to access topics in whatever order they wish.
management information system (MIS)
An organized collection of people. procedures, software, databases, and devices used to provide routine information to managers and decision makers.
executive support system
Specialized DSS that includes all hardware, software, data, procedures, and people used to assist senior-level executives used within the organization.
analog signal
A continuous, curving signal
bus line
the physical writing that connects the computer system components
disk mirroring
a process of storing data that provides an exact copy that protects users fully in the event of a data loss.
client/server
An architecture in which multiple computer platforms are dedicated to special functions such as database management, printing, communications, and program execution
object-oriented database management system (OODBMS)
A group of programs that manipuate an object-oriented database and provide a user interface and connections to other application programs.
Accounts Receivable system
System that manages the cash flow of the company by keeping track of the money owed the company on charges for goods sold and services performed.
intrusion detection system (IDS)
Software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
file transfer protocol (FTP)
A protocol that describes a file transfer process between a host and a remote computer and allows users to copy files from one computer to another
concurrency control
A method of dealing with a situation in which two or more people need to access the same record in a database at the same time
tunneling
The process by which VPNs transfer information by encapsulating traffic in IP packets over the internet.
data manipulation
the process of performing calculations and other data transformations related to business transactions
event-driven review
Review triggered by a problem or opportunity such as an error, a corporate merger, or a new market for products
ARPANET
link between DoD and military research contractors (1969)
data warehouse
a database that collects business information system from many sources in the enterprise, covering all aspects of the company's processes, products, or consumers
symmetrical multiprocessing (SMP)
Another form of parallel processing in which multiple processors run a single copy of the operating system and share the memory and other resources of one computer.
data dictionary
a detailed description of all the data used in the database
automated clearing house (ACH)
A secure, private network that connects all U.S. financial institutions to one another by way of the Federal Reserve Board or other ACH operators
structured walkthrough
A planned an preannounced review of the progress of a program module, a structure chart, or a human procedure.
Platform for Privacy preferences (P3P)
A screening technology that shields users from Web sites that don't provide the level of privacy protection they desire.
request for proposal (RFP)
A document that specifies in detail required resources such as hardware and software
random access memory (RAM)
A form of memory in which instructions or data can be temporarily stored

Deck Info

177

permalink