Information Technology > QUESTIONS & ANSWERS > WGU C724 Information Systems Management Vocab., Exam Review questions sections with answers, rated (All)

WGU C724 Information Systems Management Vocab., Exam Review questions sections with answers, rated A+

Document Content and Description Below

WGU C724 Information Systems Management Vocab., Exam Review questions sections with answers, rated A+ active RFID tags (Radio-Frequency IDentification) - ✔✔-Have their own transmitter and a... power source (typically a battery). adaptive computer device - ✔✔-Input devices designed for special applications for use by people with different types of special needs. administrator access - ✔✔-Unrestricted access to the entire system. advanced encryption standard (AES) - ✔✔-Designed to keep government information secure. adware - ✔✔-Software that generates ads that install themselves on a computer when a person downloads some other program from the Internet. affinity grouping - ✔✔-Determine which things go together. agile methodology - ✔✔-Aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements. agile MIS (Management Information System) infrastructure - ✔✔-Includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals. alpha testing - ✔✔-Assess if the entire system meets the design requirements of the users. analysis latency - ✔✔-The time from which data are made available to the time when analysis is complete. analysis phase - ✔✔-Analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system. analytical CRM (Customer Relationship Management) - ✔✔-Supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers. analytical information - ✔✔-Encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks. analytics - ✔✔-The science of fact-based decision making. anti-spam policy - ✔✔-States that email users will not send unsolicited emails. antivirus software - ✔✔-Scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware. application architecture - ✔✔-Determines how applications integrate and relate to each other application programming interface (API) - ✔✔-A set of routines, protocols, and tools for building software applications. application service provider license - ✔✔-Specialty software paid for on a license basis or per-use basis or usage-based licensing. application software - ✔✔-Used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others. arithmetic/logic unit (ALU) - ✔✔-Performs all mathematical operations and all rational operations such as sorting and comparing numbers. As-Is process model - ✔✔-Represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes. asset tracking - ✔✔-Occurs when a company places active or semi-passive RFID (Radio-Frequency IDentification) tags on expensive products or assets to gather data on the items' location with little or no manual intervention. association detection - ✔✔-Reveals the degree to which variables are related and the nature and frequency of these relationships in the information. asynchronous communication - ✔✔-Communication such as email in which the message and the response do not occur at the same time. augmented reality - ✔✔-The viewing of the physical world with computer-generated layers of information added to it. authentication - ✔✔-A method for confirming users' identities. authorization - ✔✔-The process of giving someone permission to do or have something. automatic vehicle location (AVL) - ✔✔-Uses GPS (Global Positioning System) tracking to track vehicles. autonomic computing - ✔✔-A self-managing computing model named after, and patterned on, the human body's autonomic nervous system. availability - ✔✔-Addresses when systems can be accessed by employees, customers, and partners. backup - ✔✔-An exact copy of a system's information. backward integration - ✔✔-Takes information entered into a given system and sends it automatically to all upstream systems and processes. bandwidth - ✔✔-The difference between the highest and the lowest frequencies that can be transmitted on a single medium; a measure of the medium's capacity. benchmark - ✔✔-Baseline values the system seeks to attain. benchmarking - ✔✔-The process of continuously measuring system results, comparing those results to optimal system performance, and identifying steps and procedures to improve system performance. biometrics - ✔✔-The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting. blog - ✔✔-Website in which items are posted on a regular basis and displayed in reverse chronological order. Bluetooth - ✔✔-An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz (gigahertz) frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together. bug - ✔✔-Defects in the code of an information system. bullwhip effect - ✔✔-Occurs when distorted product demand information passes from one entity to the next throughout the supply chain. business continuity planning (BCP) - ✔✔-A plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption. business ecosystem - ✔✔-A loose collection of suppliers, distributors, technology manufacturers, etc, that provide related products and services across many industries. business-facing process - ✔✔-Invisible to the external customer but essential to the effective management of the business and includes goal setting, day-to-day planning, performance feedback, rewards, and resource allocation. business impact analysis - ✔✔-A process that identifies all critical business functions and the effect that a specific disaster may have upon them. business intelligence (BI) - ✔✔-Refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts. business intelligence dashboard - ✔✔-Tracks corporate metrics such as critical success factors and key performance indicators and includes advanced capabilities such as interactive controls, allowing users to manipulate data for analysis. business process management (BPM) - ✔✔-Integrates all of an organization's processes to make the individual processes more efficient. business process management tool - ✔✔-Used to create an application that is helpful in designing business process models and also helpful in simulating, optimizing, monitoring, and maintaining various processes that occur within an organization. business requirement - ✔✔-The detailed set of business requests that the system must meet in order to be successful. business-to-business (B2B) - ✔✔-Applies to businesses buying from and selling to each other over the internet. business-to-consumer (B2C) - ✔✔-Applies to any business that sells its products or services to consumers over the Internet. business-to-government (B2g) - ✔✔-The concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web. bufferbloat - ✔✔-High latency in packet-switched networks caused by excess buffering of packets. byte - ✔✔-Group of eight bits represents one natural language character. cache memory - ✔✔-A small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU (central processing unit) does not have to retrieve this data from slower memory circuits such as RAM (random access memory). capability maturity model integration method (CMMI) - ✔✔-A process improvement approach that contains 22 process areas. capacity - ✔✔-Represents the maximum throughput a system can deliver; for example, the size or volume of a hard drive. capacity planning - ✔✔-Determines the future IT (internet technology) infrastructure requirements for new equipment and additional network space. carbon emission - ✔✔-Includes the carbon dioxide and carbon monoxide in the atmosphere, produced by business processes and systems. central processing unit (CPU) (or microprocessor) - ✔✔-The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together. certificate authority - ✔✔-A trusted third party, such as VeriSign, that validates user identities by means of digital authentication. chief information officer (CIO) - ✔✔-Responsible for (1) overseeing all uses of information technology and (2) ensuring the strategic alignment of IT (internet technology) with business goals and objectives. chief knowledge officer (CKO) - ✔✔-Responsible for collecting, maintaining, and distributing the organization's intelligence. chief privacy officer (CPO) - ✔✔-Responsible for ensuring the ethical and legal use of information within an organization. chief security officer (CSO) - ✔✔-Responsible for ensuring the defense of IT (internet technology) systems and developing strategies and IT safeguards against attacks from hackers and viruses. chief technology officer (CTO) - ✔✔-Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology. Child Online Protection Act (COPA) - ✔✔-A law that protects minors from accessing inappropriate material on the Internet. chipless RFID (Radio-Frequency IDentification) tags - ✔✔-Use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip. click-fraud - ✔✔-The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser. clickstream data - ✔✔-Exact pattern of a consumer's navigation through a site. client - ✔✔-Computer that is designed to request information from a server. client/server network - ✔✔-A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients. cloud bursting - ✔✔-When a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes. cloud computing - ✔✔-Refers to resources and applications hosted remotely as a shared service over the internet. cloud fabric - ✔✔-The software that makes the benefits of cloud computing possible, such as multitenancy. cloud fabric controller - ✔✔-An individual who monitors and provisions cloud resources similar to a server administrator at an individual company. cluster analysis - ✔✔-A technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible. clustering - ✔✔-Segmenting a heterogeneous population of records into a number of more homogeneous subgroups. coaxial cable - ✔✔-Cable that can carry a wide range of frequencies with low signal loss. cold site - ✔✔-A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster. collaboration system - ✔✔-An IT-based (internet technology) set of tools that supports the work of teams by facilitating the sharing and flow of information. communication device - ✔✔-Equipment used to send information and receive it from one location to another. community cloud - ✔✔-Serves a specific community with common business models, security requirements, and compliance considerations. competitive advantage - ✔✔-A product or service that an organization's customers place a greater value on than similar offerings from a competitor. competitive click-fraud - ✔✔-A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link complex instruction set computer (CISC) chip - ✔✔-Type of CPU (central processing unit) that can recognize as many as 100 or more instructions, enough to carry out most computations directly. computer - ✔✔-Electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data. computer-aided software engineering (CASE) - ✔✔-Software suites that automate systems analysis, design, and development. computer programmer - ✔✔-A person who writes programs for the operation of computers. computer support specialist - ✔✔-Provide technical assistance and training to system users. Investigate and resolve computer software and hardware problems of users. computer systems administrator - ✔✔-Manages company workflows, identifies and fixes network issues, and maintains equipment and software. consumer-to-business (C2B) - ✔✔-Applies to any consumer that sells a product or service to a business over the Internet. consumer-to-consumer (C2C) - ✔✔-Applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet. content filtering - ✔✔-Occurs when organizations use software that screens information to prevent the transmission of unauthorized information. content management system (CMS) - ✔✔-Provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment. control objectives for information and related technologies (COBIT) - ✔✔-A set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors. control panel - ✔✔-A Windows feature that provides a group of options that sets default values for the Windows operating system. control unit - ✔✔-Interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions. conversion - ✔✔-The process of transferring information from a legacy system to a new system. core ERP (enterprise resource planning) component - ✔✔-Traditional components included in most of these types of systems and they primarily focus on internal operations. core competency - ✔✔-A defining capability or advantage that distinguishes an enterprise from its competitors. counterfeit software - ✔✔-Software that is manufactured to look like the real thing and sold as such. course management software - ✔✔-Contains course information such as a syllabus and assignments and offers drop boxes for quizzes and homework along with a grade book. critical path - ✔✔-A path from the start to the finish that passes through all the tasks that are crucial to completing the project in the shortest amount of time. CRM (customer relationship management) analysis technologies - ✔✔-Help organizations segment their customers into categories such as best and worst customers. CRM (customer relationship management) predicting technologies - ✔✔-Help organizations make predictions regarding customer behavior such as which customers are at risk of leaving. CRM (customer relationship management) reporting technologies - ✔✔-Help organizations identify their customers across other applications. cryptography - ✔✔-The science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them. cube - ✔✔-The common term for the representation of multidimensional information. customer relationship management (CRM) - ✔✔-Involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability. cyberbullying - ✔✔-Threats, negative remarks, or defamatory comments transmitted via the Internet or posted on a website. cybermediation - ✔✔-Refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness. cyberterrorism - ✔✔-Seeks to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction cybervandalism - ✔✔-The electronic defacing of an existing website. cyberwar - ✔✔-An organized attempt by a country's military to disrupt or destroy information and communication systems for another country. data - ✔✔-Raw facts that describe the characteristics of an event. database - ✔✔-Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses). database management system (DBMS) - ✔✔-Software through which users and application programs interact with a database. data center - ✔✔-A facility used to house management information systems and associated components, such as telecommunications and storage systems. data dictionary - ✔✔-Compiles all of the metadata about the data elements in the data model. data-driven website - ✔✔-An interactive website kept constantly updated and relevant to the needs of its customers through the use of a database. data element (or data field) - ✔✔-The smallest or basic unit of information. data flow diagram (DFD) - ✔✔-Illustrates the movement of information between external entities and the processes and data stores within the system. data governance - ✔✔-Refers to the overall management of the availability, usability, integrity, and security of company data. data latency - ✔✔-The time duration to make data ready for analysis (i.e., the time for extracting, transforming, and cleansing the data) and loading the data into the database. data mart - ✔✔-Contains a subset of data warehouse information. data mining - ✔✔-The process of analyzing data to extract information not offered by the raw data alone. data-mining tool - ✔✔-Uses a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making. data model - ✔✔-A formal way to express data relationships to a database management system (DBMS). data visualization tools - ✔✔-pie charts, controls, instruments, maps, time-series graphs, etc. data warehouse - ✔✔-A logical collection of information—gathered from many different operational databases—that supports business analysis activities and decision-making tasks. decision support system (DSS) - ✔✔-Models information to support managers and business professionals during the decision-making process. decrypt - ✔✔-Decodes information. demand planning software - ✔✔-Generates demand forecasts using statistical tools and forecasting techniques. deperimeterization - ✔✔-Occurs when an organization moves employees outside its firewall, a growing movement to change the way corporations address technology security. design phase - ✔✔-Involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation. destructive agents - ✔✔-Malicious mediums designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines. development testing - ✔✔-Programmers test the system to ensure it is bug-free. digital certificate - ✔✔-A data file that identifies individuals or organizations online. digital Darwinism - ✔✔-Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction. digital dashboard - ✔✔-Integrates information from multiple components and tailors the information to individual preferences. digital ink (or electronic ink) - ✔✔-Technology that digitally represents handwriting in its natural form. digital paper (or electronic paper) - ✔✔-Any paper that is optimized for any type of digital printing. digital rights management - ✔✔-A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution. digital signature - ✔✔-A mathematical scheme for demonstrating the authenticity of digital messages or documents. disaster recovery cost curve - ✔✔-Charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time. disaster recovery plan - ✔✔-A detailed process for recovering information or an IT (internet technology) system in the event of a catastrophic disaster such as a fire or flood. discovery prototyping - ✔✔-Builds a small-scale representation or working model of the system to ensure it meets the user and business requirements. disintermediation - ✔✔-Occurs when a business sells direct to the customer online and cuts out the intermediary. disruptive technology - ✔✔-A new way of doing things that initially does not meet the needs of existing customers. drill-down - ✔✔-Enables users to get details, and details of details, of information. drive-by hacking - ✔✔-A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network. dual boot - ✔✔-Provides the user with the option of choosing the operating system when the computer is turned on. dynamic catalog - ✔✔-An area of a website that stores information about products in a database. dynamic information - ✔✔-Includes data that change based on user actions. dynamic scaling - ✔✔-Means that the MIS (management information system) infrastructure can be automatically scaled up or down based on needed requirements. ebook - ✔✔-An electronic book that can be read on a computer or special reading device. ebusiness - ✔✔-The conducting of business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners. ebusiness model - ✔✔-An approach to conducting electronic business on the Internet. ecommerce - ✔✔-The buying and selling of goods and services over the Internet. edge matching (warping, rubber sheeting) - ✔✔-Occurs when paper maps are laid edge to edge, and items that run across maps but do not match are reconfigured to match. ediscovery (or electronic discovery) - ✔✔-Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry. effectiveness MIS (management information system) metric - ✔✔-Measures the impact IT (internet technology) has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases. efficiency MIS (management information system) metric - ✔✔-Measures the performance of the IT (internet technology) system itself including throughput, speed, and availability. egovernment - ✔✔-Involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizenconsumer within all branches of government. elogistics - ✔✔-Manages the transportation and storage of goods. email privacy policy - ✔✔-Details the extent to which email messages may be read by others. emall - ✔✔-Consists of a number of eshops; it serves as a gateway through which a visitor can access other eshops. embedded operating system - ✔✔-Used for a single purpose in computer appliances and specialpurpose applications, such as an automobile, ATM, or media player. emergency notification service - ✔✔-An infrastructure built for notifying people in the event of an emergency. employee monitoring policy - ✔✔-States how, when, and where the company monitors its employees. employee relationship management (ERM) - ✔✔-Provides employees with a subset of CRM (customer relationship management) applications available through a web browser. encryption - ✔✔-Scrambles information into an alternative form that requires a key or password. enterprise application integration (EAI) middleware - ✔✔-Represents a new approach by packaging together commonly used functionality, such as providing prebuilt links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors. enterprise architect (EA) - ✔✔-Person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT (internet technology) and the business. enterprise architecture - ✔✔-Includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT (internet technology) assets. enterprise resource planning (ERP) - ✔✔-Integrates all departments and functions throughout an organization into a single IT (internet technology) system (or integrated set of IT systems) so that employees can make decisions by viewing enterprisewide information on all business operations. entity - ✔✔-In the relational database model, a person, place, thing, transaction, or event about which information is stored. entity-relationship diagram (ERD) - ✔✔-A technique for documenting the relationships between entities in a database environment. entry barrier - ✔✔-A product or service feature that customers have come to expect from organizations in a particular industry and must be offered by an entering organization to compete and survive. epolicies - ✔✔-Policies and procedures that address the ethical use of computers and Internet usage in the business environment. eprocurement - ✔✔-The B2B (business-to-business) purchase and sale of supplies and services over the Internet. eshop (estore or etailer) - ✔✔-A version of a retail store where customers can shop at any hour of the day without leaving their home or office. ethernet - ✔✔-A physical and data layer technology for LAN (local-area network) networking. ethical computer use policy - ✔✔-Contains general principles to guide user behavior. ewaste - ✔✔-Old computer equipment where the toxic substances it contains can leach into groundwater, among other problems. Exabyte (EB) - ✔✔-1 quintillion bytes. executive information system (EIS) - ✔✔-A specialized DSS (decision support system) that supports senior level executives within the organization. expert system - ✔✔-Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. extended ERP (enterprise resource planning) component - ✔✔-The extra components that meet the organizational needs not covered by the core components and primarily focus on external operations. extraction, transformation, and loading (ETL) - ✔✔-A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse. extreme programming (XP) methodology - ✔✔-Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complet [Show More]

Last updated: 2 years ago

Preview 1 out of 54 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Also available in bundle (1)

WGU C724 bundle, latest versions.

WGU C724, Full Exam Coverage Top exam Questions with accurate answers, graded A+. 26 latest versions, verified exam predictor.

By Topmark 2 years ago

$26

26  

Reviews( 0 )

$11.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

57
0

Document information


Connected school, study & course


About the document


Uploaded On

Mar 13, 2023

Number of pages

54

Written in

Seller


seller-icon
Topmark

Member since 2 years

70 Documents Sold

Reviews Received
7
4
0
0
0
Additional information

This document has been written for:

Uploaded

Mar 13, 2023

Downloads

 0

Views

 57

Document Keyword Tags


$11.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·