James Madison University
Meest recente samenvattingen op de James Madison University. Op zoek naar een samenvatting op de James Madison University? Wij hebben diverse samenvattingen en notities voor jouw school of universiteit.
-
357
- 0
-
27
All courses for James Madison University
Laatste content James Madison University
nonroutine cognitive skills - Answer -abstract reasoning 
-systems thinking 
-collaboration 
-ability to experiment 
 
abstract reasoning - Answer ability to make and manipulate models 
 
systems thinking - Answer ability to model the components of a system 
 
system - Answer group of components that interact to achieve some purpose 
 
information system - Answer group of components that interact to produce information 
 
5-component framework (for information syste...
Cooperation - Answer A group of people working together, all doing essentially the same type of work, to accomplish a job. 
→ Faster than working alone, but with less quality 
 
Collaboration - Answer A group of people working together to achieve a 
common goal via a process of feedback and iteration. 
→Group members bring unique expertise or perspectives 
→Superior quality versus working alone 
 
Constructive criticism - Answer includes both positive and negative advice ...
1960s - Answer - Computers were Big 
- (Mainframe Architecture) 
- Used by shared time, shared data storage space, very central (but separate) 
 
1970s - Answer - Computer became departmental (Minicomputer Architecture) 
- Used your computer for your data, no sharing data (very separate) 
 
1980s - Answer - Computers became personal (Microcomputer or desktop) 
- individuals have their own computer power and data storage space (very decentralized) 
 
1990s - Answer - Comp...
What types of security loss exist? - Answer unauthorized data disclosure, incorrect data modification, faulty service, denial of service, loss of infrastructure 
 
unauthorized data disclosure - Answer occurs when a threat obtains data that is supposed to be protected 
ex: pretexting, phishing, spoofing, sniffing, wardriving, hacking 
 
Pretexting - Answer deceiving someone over the internet by pretending to be another person or organization 
 
Phishing - Answer technique...
Business professionals need to... - Answer -Take active role to ensure systems meet their needs. 
-Understand how information systems (IS) are constructed. 
-Consider users' needs during development. 
-Learn how to use IS. 
-Don't forget security and backups. 
 
Information Technology (IT) - Answer -The products, methods, inventions, and standards used for the purpose of producing information 
- components = Hardware + Software + Data 
 
Information System (IS) - Answer c...
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. 
A) target 
B) vulnerability 
C) threat 
D) key escrow 
E) cipher - Answer C) threat 
 
Which of the following is considered a threat caused by human error? 
A) an employee inadvertently installing an old database on top of the current one 
B) an employee intentionally destroying data and system components 
...
Data - Answer collection of numbers, characters, names, etc 
Ex: Name, Address, GPA 
 
Knowledge - Answer information or data that has been organized and processed to convey understanding 
 
Information - Answer knowledge derived from data 
Ex: students name and GPA 
 
Primary Storage 
 
(Main Memory) - Answer stores information for brief periods of time on chips located on the mother board 
 
Types: Register, Cache, RAM and ROM 
 
Secondary Storage - Answer stores...
What is Data? - Answer Recorded facts or figures 
 
What is Information? - Answer Knowledge derived from data 
 
What is the goal of MIS? - Answer uses information systems to create a sustainable competitive advantage 
 
What makes something good information? - Answer requires that data be accurate and timely 
 
What is an information system? - Answer the assembly of hardware, software, data, procedures and people 
 
Five Component Framework - Answer elements ...
Database - Answer Self-describing collection of integrated records 
 
Key - Answer Column or group of columns identifying a unique row in a table 
 
Foreign Key - Answer Term used because such columns are keys but they are keys of a different table than the one in which they reside 
 
Relational Database - Answer Carry data in the form of tables and that represent relationships using foreign keys 
 
Metadata - Answer Data that describes data 
 
Field Property - Answ...
Inter-Enterprise Processes - Answer works outside the company’s network to connect the companies net work to another companies 
 
Work group processes/data isolation - Answer 
 
ERP - Answer Enterprise Resource Planning: integrates all departments and functions throughout an organization into a single pre-made IT system so that employees can make enterprise-wide decisions by viewing enterprise-wide information on all business operations. 
 
Information vs. Data - Answer ...