click below
click below
Normal Size Small Size show me how
3.02 study stack
Manage this
Question | Answer |
---|---|
Audit | Process by which an organization's accounts and records are verified |
Business continuity | An organization's ability to function during and after a disaster |
Compliance | Fulfilling the requirements of the law |
Consistency | Stability, regularity |
Data | Facts and figures |
Data processing | Converting facts and figures into useful information |
Decision making | Choosing among alternatives |
Hack | Unauthorized access to a computer system |
information | Data presented in a useful from |
information management | The process of accessing processing maintaining evaluating and disseminating knowledge facts or data for the purpose of assisting business decision making |
Information overload | Communication that is too much or comes too fast to process at one time |
Management information system MIS | An integrated technology that assists with an organization's information management needs |
Outsourcing | Acquiring assistance from outside organizations/consultants to obtain goods or services to accomplish business objective or perform primary business activity |
Property information | Private information that belongs to a organization and cannot be released to the public |
Sarbanes Oxley act | A us regulation mandating that public businesses comply with the specific accounting requirements |
Spam | Junk email that the recipient did not request also known as unsolicited commercial email |
Trade secret | Undisclosed information within a particular business or industry |
Viruses | Computer programs that download to your computer or network without you permission programs designed to disrupt computer operations |
Wireless network | A computer network connected without the use or wires or cables |