click below
click below
Normal Size Small Size show me how
302 Manage these key
Manage this
Question | Answer |
---|---|
Audit | Process by which an organization's accounts and records are verified. |
Business Continuity | An organizations ability to function during and after a disaster. |
Compliance | Fulfilling the requirements of the law. |
Consistency | Stability; regularity |
Data | Facts and figures. |
Data Processing | Converting facts and figures into useful information. |
Decision-Making | Choosing among alternatives. |
Hack | Unauthorized access to a computer system. |
Information | Data presented in a useful form. |
Information Mangement | The process of accessing, processing, maintaining, evaluating, and disseminating knowledge, facts, or data for the purpose of assisting business decision-making. |
Information Overload | Communication that is too much and/or comes too fast to process at one time. |
Management Information System (MIS) | An integrated technology that assists with an organization's information management needs. |
Outsourcing | Acquiring assistance from outside organizations/consultants to obtain goods or services to accomplish business objectives or perform primary business activities. |
Proprietary Information | Private information that belongs to an organization and cannot be released to the public. |
Sarbanes-Oxley Act | A U.S. regulation mandating that public businesses comply with specific accounting requirements. |
Spam | Junk email that the recipient did not request; also known as unsolicited commercial email. |
Trade Secret | Undisclosed information within a particular business or industry. |
VIruses | Computer programs that download to your computer or network without your permission; programs designed to disrupt computer operations. |
Wireless Network | A computer network connected without the use of wires or cables. |