ISYS 363 Study Guide SFSU – Flashcards
Unlock all answers in this set
Unlock answersquestion
Artificial Intelligence
answer
Artificial intelligence is the human-like intelligence exhibited by machines or software. It is also an academic field of study.
question
Batch processing vs. real-time
answer
Real time processing is the processing of a transaction immediately after the transaction occurs. Batch processing occurs when transactions are received but are not processed immediately. Instead, the transactions are grouped together and processed all at once.
question
Best practices (in ERP software)
answer
This means the software reflects the vendor's interpretation of the most effective way to perform each business process.
question
Bit/Byte
answer
A bit is the smallest unit of information that can be stored or manipulated on a computer; it consists of either zero or one. 8 "Bits" equal a "Byte".
question
Business Intelligence (BI)
answer
a set of theories, methodologies, architectures, and technologies that transform raw data into meaningful and useful information for business purposes.
question
Circuit Switched Network (vs. packet switched)
answer
Circuit switching is a methodology of implementing a telecommunications network in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate.
question
Client/Server Architecture
answer
Client/server architecture is a computing model in which the server hosts, delivers and manages most of the resources and services to be consumed by the client.
question
Cloud Computing
answer
Cloud computing involves distributed computing over a network, where a program or application may run on many connected computers at the same time.
question
Competitive Advantage
answer
Competitive advantage occurs when an organization acquires or develops an attribute or combination of attributes that allows it to outperform its competitors.
question
Computer based information systems (CBIS)
answer
organized integration of hardware and software technologies and human elements designed to produce timely, integrated, accurate and useful information for decision making purposes.
question
Computer Networks
answer
A computer network or data network is a telecommunications network that allows computers to exchange data.
question
Computer Programs (Operating System, Applications)
answer
Operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. Application software is all the computer software that causes a computer to perform useful tasks beyond the running of the computer itself.
question
Computer Security (anti-virus, backup, worm etc.)
answer
Computer security - is information security as applied to computing devices such as computers and smart phones, as well as computer networks such as private and public networks, including the Internet as a whole.
question
Continuous Improvement vs. reengineering
answer
Reengineering is defined as the fundamental rethinking and redesigning of existing process tasks and operating structure to achieve dramatic improvements in process performance. Continuous process improvement (CPI) which advocates incremental improvement of existing processes.
question
Conversion approaches (all - cutover, parallel, phase-in etc.)
answer
The process of decommissioning the current system and installing a new system into the organization.
question
critical analysis
answer
A critical analysis is subjective writing because it expresses the writer's opinion or evaluation of a text. Analysis means to break down and study the parts.
question
Critical Success Factors
answer
Critical success factor (CSF) is the term for an element that is necessary for an organization or project to achieve its mission.
question
Culture (corporate culture, corporate change)
answer
A blend of the values, beliefs, taboos, symbols, rituals and myths all companies develop over time.
question
Customer Relationship Management (CRM)
answer
Customer relationship management (CRM) is a system for managing a company's interactions with current and future customers. It involves using technology to organize, automate and synchronize sales, marketing, customer service, and technical support.
question
Data mining
answer
An interdisciplinary subfield of computer science, is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems.
question
Data vs. information vs. knowledge
answer
Knowledge is what we know. Data is/are the facts of the World. Information allows us to expand our knowledge beyond the range of our senses. We can capture data in information.
question
Database Management System (DBMS) - MS Access, MySQL
answer
software that allows a computer to perform database functions of storing, retrieving, adding, deleting and modifying data.
question
Digital rights management (DRM)
answer
Digital Rights Management (DRM) is a class of technologies that are used by hardware manufacturers, publishers, copyright holders, and individuals with the intent to control the use of digital content and devices after sale.
question
Disintermediation
answer
the removal of intermediaries in a supply chain, or "cutting out the middleman".
question
Documentation (Software)
answer
program listings or technical manuals describing the operation and use of programs.
question
Domain expert
answer
a person with special knowledge or skills in a particular area of endeavor.
question
Domain Name Service (DNS)
answer
Translates easily memorized domain names to the numerical IP addresses needed for locating computer services and devices worldwide.
question
Drill-down capabilities
answer
Drill down is a capability that takes the user from a more general view of the data to a more specific one at the click of a mouse.
question
Effectiveness/efficiency
answer
Effective - Adequate to accomplish a purpose; producing the intended or expected result. Efficient - Performing or functioning in the best possible manner with the least waste of time and effort.
question
Electronic business / e-Commerce
answer
E-commerce covers outward-facing processes that touch customers, suppliers and external partners, including sales, marketing, order taking, delivery, customer service. E-business includes e-commerce but also covers internal processes such as production, inventory management, product development, risk management, finance, knowledge management and human resources.
question
Encryption/encryption key - Digital certificate
answer
A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure.
question
Enterprise Resource Planning (ERP) Software
answer
a business management software—usually a suite of integrated applications—that a company can use to store and manage data from every stage of business.
question
Enterprise systems
answer
large-scale application software packages that support business processes, information flows, reporting, and data analytics in complex organizations.
question
Entity relationship diagram (ERD), data flow diagram
answer
are another way of showing information flow for a process. An ERD shows what data is being used in the process or program, and how the files are related.
question
Executive support systems (ESS)
answer
a reporting tool (software) that allows you to turn your organization's data into useful summarized reports.
question
Graphical user interface (GUI)
answer
type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.
question
Green computing
answer
practice of environmentally sustainable computing or IT.
question
Hardware
answer
collection of physical elements that constitutes a computer system. Computer hardware refers to the physical parts or components of a computer such as the monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that can be touched.
question
HTML/CSS
answer
two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices. Along with graphics and scripting, HTML and CSS are the basis of building Web pages and Web Applications.
question
Hyperlink
answer
a reference to data that the reader can directly follow either by clicking or by hovering or that is followed automatically.
question
Information system (IS)
answer
collection of hardware, software, data, people and procedures that work together to produce quality information.
question
Input-processing-output (+devices)
answer
IPO+S model, is a functional model and conceptual schema of a general system. An IPO chart/table identifies a program's inputs, its outputs, and the processing steps required to transform the inputs into the outputs.
question
Internet backbone
answer
the principal data routes between large, strategically interconnected computer networks and core routers on the Internet.
question
Intranet/Extranet
answer
"intranet" is the generic term for a collection of private computer networks within an organization. "extranet" is a computer network that allows controlled access from the outside for specific business or educational purposes.
question
IP Address (what is it?, IPv4 vs. IPv6, and why!)
answer
IP address is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. IPv4 stands for Internet Protocol version 4. IPv6 is the sixth revision to the Internet Protocol. IPv4 uses 32 bits for its Internet addresses. That means it can support 2^32 IP addresses in total — around 4.29 billion. As previously stated, IPv6 utilizes 128-bit Internet addresses. Therefore, it can support 2^128 Internet addresses — 340,282,366,920,938,000,000,000,000,000,000,000,000.
question
Java and Java Applets
answer
A Java applet is a small application written in Java and delivered to users in the form of bytecode.
question
Knowledge and knowledge workers
answer
Knowledge workers are workers whose main capital is knowledge.
question
Linux
answer
computer operating system assembled under the model of free and open source software development and distribution.
question
Marketing and HR Management Information System (MIS)
answer
provides information that organizations require to manage themselves efficiently and effectively. Management information systems are distinct from other information systems because they are used to analyze and facilitate strategic and operational activities.
question
Mission critical system(s)
answer
Mission critical refers to any factor of a system (equipment, process, procedure, software, etc.) whose failure will result in the failure of business operations. That is, it is critical to the organization's "mission."
question
Natural language processing (NLP)
answer
a field of computer science, artificial intelligence, and linguistics concerned with the interactions between computers and human (natural) languages.
question
Network attached storage (NAS)
answer
file-level computer data storage connected to a computer network providing data access to a heterogeneous group of clients.
question
Networking protocol
answer
defines rules and conventions for communication between network devices.
question
Neural Networks
answer
computational models inspired by an animal's central nervous systems which is capable of machine learning as well as pattern recognition.
question
On-demand computing (Utility computing)
answer
packaging of computing resources, such as computation, storage and services, as a metered service.
question
Online transaction processing (OLTP)
answer
a class of information systems that facilitate and manage transaction-oriented applications, typically for data entry and retrieval transaction processing.
question
Open source software (Linux, Apache, MySQL, Firefox, VLC Player)
answer
computer software with its source code made available and licensed with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.
question
Operational feasibility
answer
a measure of how well a proposed system solves the problems, and takes advantage of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development.
question
Organizational change
answer
a structured approach in an organization for ensuring that changes are smoothly and successfully implemented to achieve lasting benefits.
question
Outsourcing
answer
the contracting out of a business process to a third-party.
question
Packet Switching
answer
a digital networking communications method that groups all transmitted data - regardless of content, type, or structure - into suitably sized blocks, called packets.
question
Parallel computing
answer
a form of computation in which many calculations are carried out simultaneously, operating on the principle that large problems can often be divided into smaller ones, which are then solved concurrently.
question
Password sniffer
answer
small password monitoring software that listens to your network, capture the passwords that pass through your network adapter.
question
Predictive analysis
answer
is business intelligence technology that produces a predictive score for each customer or other organizational element.
question
Primary key
answer
a set of attributes whose values uniquely define the characteristics of each row. The primary key has to consist of characteristics that cannot collectively be duplicated by any other row.
question
Problem Solving Stages (Intelligence, Design, Choice, Implementation, Monitoring)
answer
Effective problem solving usually involves working through a number of steps or stages.
question
Project management tools (schedule, milestones, deadlines, critical path, Pert and Gantt chart)
answer
Program used in The planning and organization of an organization's resources in order to move a specific task, event or duty toward completion.
question
Proprietary software (custom) vs. off-the shelf software (buy vs. build)
answer
Proprietary - computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the right to use the software only under certain conditions, and restricted from other uses, such as modification, sharing, studying, redistribution, or reverse engineering. OTS - Commercially available specialized software designed for specific applications that can be used with little or no modification.
question
Rapid application development
answer
a software development methodology that uses minimal planning in favor of rapid prototyping.
question
Request for Proposal (RFP)
answer
a solicitation made, often through a bidding process, by an agency or company interested in procurement of a commodity, service or valuable asset, to potential suppliers to submit business proposals.
question
RFID
answer
wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects.
question
Rich Internet Application (RIA)
answer
a Web application that has many of the characteristics of desktop application software, typically delivered by way of a site-specific browser, a browser plug-in, an independent sandbox, extensive use of JavaScript, or a virtual machine.
question
Scalability
answer
the ability of a system, network, or process to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth.
question
Secure sockets layer (SSL)
answer
protocol to help users protect their data during transfer by creating a uniquely encrypted channel for private communications over the public Internet
question
Social engineering
answer
the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
question
Software, licenses, and software piracy
answer
Software piracy - occurs when people copy, sell, share, or distribute software illegally. Software - known as computer programs, is the non-tangible component of computers. Licenses - legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software.
question
SQL
answer
a special-purpose programming language designed for managing data held in a relational database management system (RDBMS).
question
SSID (WiFi)
answer
the public name of a wireless network.
question
Storage area network (SAN)
answer
a dedicated network that provides access to consolidated, block level data storage.
question
Structured and unstructured decisions
answer
"Structured," means having processes in place to handle a situation. "Unstructured" means "decision processes that have not been encountered in quite the same form and for which no predetermined and explicit set of ordered responses exists in the organization".
question
Supply chain management (SCM)
answer
the management of the flow of goods. It includes the movement and storage of raw materials, work-in-process inventory, and finished goods from point of origin to point of consumption.
question
System development lifecycle (Investigation, Analysis, Design, Implementation, Maintenance and Review)
answer
also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
question
Total cost of ownership
answer
is a financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or system. It is a management accounting concept that can be used in full cost accounting or even ecological economics where it includes social costs.
question
Transaction Processing System (TPS)
answer
an information processing system for business transactions involving the collection, modification and retrieval of all transaction data.
question
Transmission Control Protocol/Internet Protocol (TCP/IP)
answer
Internet protocol suite is the networking model and a group of communications protocols used for the Internet and similar networks. Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP
question
Uniform Resource Locator (URL)
answer
a specific character string that constitutes a reference to a resource. In most web browsers, the URL of a web page is displayed on top inside an address bar.
question
Virtual Private Network (VPN) /Tunneling
answer
VPN - a private network across a public network, such as the Internet. Tunneling - a tunneling protocol when one network protocol (the delivery protocol) encapsulates a different payload protocol.
question
Wireless security: WEP/WPA/WPA2
answer
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).
question
ZigBee
answer
high level communication protocols used to create personal area networks built from small, low-power digital radios.
question
Bug (software)
answer
is an error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
question
patch (software)
answer
is a piece of software designed to update a computer program or its supporting data, to fix or improve it.
question
release (software)
answer
When a piece of software is released it has usually gone through different steps in its development. Software that was released, can be purchased, downloaded, or, generally used by customers.
question
update (software)
answer
is the easiest and quickest solution to check and update software installed on your computer.
question
upgrade (software)
answer
is the process of replacing a product with a newer version of the same product.
question
Software as a Service (SaaS)
answer
a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted on the cloud by independent software vendors.
question
Data storage
answer
often called storage or memory, is a technology consisting of computer components and recording media used to retain digital data.
question
data center
answer
is a facility used to house computer systems and associated components, such as telecommunications and storage systems.
question
data mart
answer
is the access layer of the data warehouse environment that is used to get data out to the users.
question
data warehouse
answer
is a database used for reporting and data analysis. Integrating data from one or more disparate sources creates a central repository of data, a data warehouse.
question
Database field
answer
refers to placeholders for discrete bits of information in a database. For instance, your last name would be typed into a field for that purpose. The grouped contents of several fields form a record together.
question
data attribute
answer
a specification that defines a property of an object, element, or file. It may also refer to or set the specific value for a given instance of such.
question
data entity
answer
is one of the components defined in a logical data model. A logical data model is a representation of all of the organizations data which are being organized in terms of data management technology.
question
data record
answer
In the structure of a database, the part consisting of several uniquely named components called data fields. Several data records make up a data file, and several data files make up a database.
question
data table
answer
a display of records or information in tabular form having rows and /or columns named. It is used to store information and in most cases content in data tables are designed in alphabetical order.