Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Test 2 -MIS

MIS

QuestionAnswer
____ is a collection of related data that is stored inb a central location or in multiple locations database
____ the structure and organization of data which involves fields, records and files data hierarchy
____ is software for creating, storing, maintaining and accessing database files. database management system
___ makes using databases more eficient DBMS (Database managemebt system)
___ alll files are integrated, meaning information can be linked database
is a critical component of informtaion systems because any type of analysis that is done is based on data available in the ___ database
___ are a series of files where data use to be stored; not arranged in a hierarchy; no relationship among these files flat files
what is the problem with flat files? redundancy
what are some advantages of databases 1.info generated from same data 2.complex handled easily 3.redundancy is eliminated 4.programs and data independent 5.data management improved 6.data easily maintained 7.less storage space
records in files are organized and processed in numerical or sequantial order, typically the order in which they were entered sequential access files structure
records can be accessed in any order regardless of their physical locations in storage media. random access file structure
____ records can be accessed sequentially or randomly, depending on the number being accessed indexed sqeuential access method (ISAM)
_____ fast and effective when a small number of records need to be processed daily or weekly. random access file structure
___ involves how data is stroed on the retrieved from storage media, such as hard disks, magnetic tapes or CDs physical views
_____ involves how information appears to users and how it can be organizedand retrieved logical view
____ determines how data is created, represented, organized and maintained. data model
____ describes how data is organized and the relationship among records data structure
____ describes methods calculations that can be performed on data, such as updating a querying data operations
____ defines the boundariesof a database such as maximum and minimum values allowed for a fields constraints and access methods integrity rules
the relationships between records form a treeline structure hierachial model
___ are called nodes records
relationships betwen records are called ___ branches
the node at the top is called ___ root
____ is similar to hierachical model, but records are organized differently; every record can have multiple parent and child records network model
___ uses two-dimensional table of rows and columns of data. relational model
___ are called records rows
___ are called fields columns
___ stores definitions such as data types for fields, default values, and validation rules for data in each field data dictionary
____ uniquely identifies every record in a relational database primary key
is a field in a relational table that matches the primary key column of anoter table. foregin key
____ improves database efficency by eliminating redundant data and ensuring that only related data is storedin a table normalization
_____ the heart of a DBMS software, responsible for data storage, manipulation, and retrieval database engine
____ creates and maintains the data dictionary and define the structure of files in a database data definiation
_____ is a stanard 4th generation query language used by many DBMS packages SQL
_____ you request data from a database by constructing a statement made up of query forms query by example
___refers to the range of functions that data administators determine who has permission to perform certain functions CRUD (Create, read, updata, delete)
____ found in large organizations, design and ser up databases, establish security Database management system
_____ acts as an interface to a database, retieving data from users and allowing users to enter data in the database. data-driven web site
____ stores data on multiple servers throughout an organization DDBMS (Distributed database management system)
approach to a distributed DBMS addresses how tables are divided among multiple locations. fragmentation
approach to a distributed DBMS has each site store a copy of the data in the organization's database replication
____ approach to a distributed DBMS combines fragmentation and replication, with each site storing the data it uses most often allocation
_____ Both data and their relationships are contained in a single object. object oriented databases
____ refers to the grouping into a class of various objects along with their attributes and methods encapsulation
____ refers to new objects being created faster and more easily by entering new data attributes inheritance
_____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence data warehouse
____ the process used in a data warehouse extraction, transformation and loading (ETL)
____ used to facilitate and manage transaction-oriented application online transaction process (OLTP)
____ generates business intelligance online analytical processing (OLAP)
_____ is used to discover patterns and relationships data-mining analysis
is usually a smaller version of a data warehouse data mart
____ uses data statistical methods to gain insight into the data and provide decision makers with info they can act on business analytics (BA)
___ data so volume that conventional computing methods are not able to efficiently process and manage it big data
___ is software that is secretly gathers info about users while they browse the web spyware
___ is a form of spyware that collects info about the user (without the user's consent) to determine which advertisements to display in the user's web browser adware
sending fraudulent emails that seem to come from legitimate sources, such as a bank or university phishing
____ is directing internet users to fraudulent websites with the intention of stealing their personal information pharming
____ monitor and record keystrokes and can be software or hardware devices keystroke loggers
____ is capturing and recording network traffic sniffing
____ an attempt to gain access to a network by posing as a authorized user in order to find sensitive information spoofing
____ the unauthorized use of computer data for personal gain computer fraud
____ means that a system must prevent disclosing information to anyone who is not authorized to access it confidentiality
refers to the accuracy of information resources within an organization integrity
means that computers and networks are operating and authorized users can access the information they need availability
____ ensure availability in the event of a system failure by using a combination of hardware and software fault tolerant systems
____ consists of self-propagating program code that is triggered by a specified time or event virus
travels from computer to computer in a network, but does not erase the data worm
____ contains code intended to disrupt a computer, network or website, usually hidden inside a popular program trojan program
____ type of Trojan program used to release a virus, work or other destructive code. logic bomb
____ also called a trapdoor; a programming routine built into a system by its designer or programmer backdoor
is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks blended threat
attack floods a network or server with service requests to prevent legitimate user's access to the system denial of service (DoS)
____using "people skills" to trick others into revealing private information social engineering
uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passes on to others biometric security measures
____ verifies whether a users access is valid by logging the user off and the calling the user back at a predetermined number callback modem
a combination of hardware and software that acts as a filter or barrier between a private network and external computer or network including the internet firewall
_____ can protect against bother external and internal acccess intrusion detection system
____ primary control access to computers and networks, and they include devices for securing computers and peripherals from theft physical security measures
____ designed to protect systems from unauthorized access in order to preserve data integrity access controls
____ is a combination of numbers, characters and symbols that is entered to allow access to a system password
____ provides a secure "tunnel" through the internet from transmitting messages and data via a private network virtual private network (VPN)
____ transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others data encryption
____ is a commonly used encryption protocol that manages transmission security on the internet secure sockets layer (SSL)
____ a crytopgraphic protocol that ensures data security and integrity over public networks such as the internet transportation layer security (TLS)
___ enables users of a public network such as internet to securely and privately exchange data through the use of a pair of keys PKI (public key infrastructure)
___ uses two keys; public key known to everyone and a private key only known to the recipient asymmetric encryption
____ called secret key encryption; the same key is used to encrypt and decrypt the message symmetric encryption
___ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack. business continuity planning
_____ electronic transfer of data from one location to another data communication
_____ the amount of data that can be transferred from one point to another in a certain time period, usually one sec bandwidth
____ is the loss of power in a signal as it travels from the sending device to the receiving device attenuation
____ data transmission, multiple places of data are sent simultaneously to increase the transmission rate broadband
___ is a voice-grande transmission channel capable of transmitting a maximum of 56,000bps, so only a limited amount of information can be transferred in a specific period of time narrowband
____ are rules that govern data communication, including error detection, messages length and transmission speed protocols
___ is a device that connects a user to the internet modem
____ common carrier service is a high-speed service that uses ordinary phone lines digital subscriber line (DSL)
____ channels, connect sender and receiver devices (conducted or radiated) communication media
___ provide physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable and fiber optics conducted media
uses an antenna for transmitting data through air or water radiated media
___ system all processing is done at one central computer centralized processing
___ each user department or division has its own computer (called organizational unit) for performing processing tasks decentralized processing
maintains centralized control and decentralized operations (power distributed among several locations) distributed processing
____ is a seven-layer architecture for defining how data is transmitted from computer to computer in a network OSI model (open system interconnect)
___ is hardware component that enables computer to communicate over a network network interface card (NIC)
____ connects workstations and peripheral devices that are in close proximity LAN
____ can span several cities, states or even countries, it usually owned by several different parties WAN
____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well MAN
___ represents a network's physical layout, including the arrangement of computers and cables network topology
usually consists of a central computer and a series of nodes star topology
__ no host computer is required because each computer manages its own connectivity ring topology
_____ connect nodes along a network segment, but the ends of the cable are not connected, as they are in a ring bus topology
combines computers with different processing strengths in different organizational levels hierarchical topology
____ is hardware and software device that controls data transfer from a computer to a peripheral device controller
___ is hardware device that allows several nodes to share one communication channel mulitplexer
___ every node is connected to every other node mesh topology
is an industry standard suite of communication protocols that enables interoperability TCP/IP
___ is a collection of binary digits sent from computer to computer over a network packet
is the process of deciding which path to take on a network routing
generated automatically by software, is used to determine the best possible route for a packet routing tables
___ one node is in charge of selecting the path for all packets centralized routing
___ relies on each node to calculate its own best possible route. distributed routing
___ a network connection device containing software that connect network systems and control traffic flow between them router
___ requires the network routing manager to give it information about which addresses are on which network static router
___ can build tables that identify addresses on each network dynamic router
____ software runs on the local computer and communicates with the remote server to request information or services client/server model
a client communicates directly with the server (most common type) two-tier architecture
___ attempts to balance the workload between client and server by removing application processing from both the client and server and placing it on a middle-tier server n-tier architecture
is a network that uses wireless instead of wired technology wireless network
___ network operating on a radio frequency consisting of radio cells mobile network
____ is similar to bandwidth. (the amount of data transferred or processed in a specified time) throughput
divides each channel into six slots Time division multiple access (TDMA)
___ transmits multiple encoded messages over a wide frequency and then decodes them at the receiving end. code division multiple access (CDMA)
____ integrating voice, video, and data so that multimedia information can be used for decision making convergence
forms, reports, queries, and other programs that users interact with to manipulate a database When you work with a database in most daily situations you are accessing it through an application program database applications
Collected by the organization using its business processes Can be a source of competitive advantage private data
Collected by someone else using their processes Some is free and some must be purchased By itself not a source of competitive advantage public data
3 V’s of Data (Volume, Variety, and Velocity)
5 basic operations in reporting Sorting, Grouping, Calculating, Filtering, Formatting
An OLAP report may also be called an OLAP Cube; because of the way it displays data across multiple axes
wireless local area network that uses radio waves and the IEEE 802.11 standard for communication Wifi
Uses ground-based towers WiMax
what is the consequence of Voice over IP If the computer network goes down telephone service is also lost
is a type of malware that allows an attacker to take control over an affected computer. bot
____ is a worldwide collection of millions of computers and networks of all sizes (network of networks) internet
____ project started in 1969 by the US department of defense (beginning of internet) ARPANET -Advanced Research Projects Agency Network
___ the foundation network linked with fiber-optic cables that can support very high bandwidth internet backbone
documents include embedded references to audio, text, images, video, and other documents hypermedia
____ embedded references in hypermedia documents hypertext
information is transferred from one network to another, domain names are converted to IP addesses by ___ DNS
___ is the address of a document or site on the internet URL (uniform resource locators)
is the language used to create Web pages. HTML
used to travel from website to website "surf" the internet navigational tools
examples are Google, Ask.com, Yahoo -used to retrive data from the Web by using search terms search engine
are indexes of information based on keywords embedded in documents -engines find what they are looking for directories
are usually for exchanging opinions and ideas on a specific topic, usually of a technical or scholarly nature. discussion groups
are typically more general in nature and can cover any topic newsgroups
enables users in chat rooms to exchange text messages with people with in other location in real time internet relay chat IRC
a service for communicating with others via a private "chat room" IM
using the internet rather than the telephone network to exchange spoken conversations Internet telephony
is the protocol used for Internet telephony VoIP
a network within an organization that uses internet protocols and technologies intranet
a secure network that uses the internet and web technologies to connect intranets of business partners so communication between organizations or between consumers extranet
a journal or newsletter that is updated frequently and intended for the general public blogs blog
a type of website that allows users to add, delete, and sometimes modify content wiki
refers to a broad class of web sites and services that allows users to connect with freinds, familly, colleagues online as well as meet prople with similar interests social networking
are a fast, easy way to distribute Web content in Extensible Markup Language format RSS (really simple syndictation) feeds
an electronic audio files, such as an MP3 that is posted on a web for users to download to their mobile devices podcast
is a collaborative effort involving more than 200 US universities and corporations to develop advance internet techonologies and applications for higher education and academic research Internet2 (I2)
a local connection point-to-presence that connects a variety of high-performance networks and ts main function is the exchange of 12 traffic with a specified bandwidth gigapop
refers to a web-based development in which people, processes, data and things are interconnected via the internet using various means such as RFID internet of Everything (IoE)
refers to the physical object that are connected to the internet and , therefore to all the other physical objects internet of things (IoT)
is one that, when introduced, either radically transforms markets, creates wholly new markets or destroys existing markets for other technologies distruptive technology
____ project is first publicized which created standards for communication over the Internet (HTTP, URL, HTML) World Wide Web
Person to person messaging and document sharing email
Interactive conversations in the form of text Internet Relay Chat (IRC)
Discussion groups on electronic bulletin boards UseNet (Newsgroups)
Remote access to a computer telnet
Transferring files from computer to computer FTP
Retrieving, formatting, and displaying information including text, graphics, audio, and video using hypertext links WWW
Difference between the early web 1.0 and the Social web 2.0? 1.0: one way communication, static, accessed only though desktops/laptops, individual users, data single sources 2.0: two way communication, dynamic, user-controlled content, user communities, enhance user activity, data from multiple sources
example of a microblog? twitter
Created by: lax5
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards