SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

level: Level 1

Questions and Answers List

level questions: Level 1

QuestionAnswer
Raw Facts and figuresData
knowledge gained from processing datainformation
an organized method for collecting, storing and communicating past, present and projected information on internal operations and external intelligenceinformation system
the executive responsible for managing a firms information systems and related computer technologies - traditionally reports directly to the CEOchief information officer CIO
information system that use computer and related technologies to store information electronically in an organized, accessible manner - computer hardware - computer software - telecommunications and computer networks - data resource managementcomputer based information systems
- transaction processing system - process control systemoperational support systems
- management information systems - decision support systems executive support systems - expert systemsmanagement support systems
all tangible, or physical, elements of computer system - input devices are the components that store and process data, perform calculations - they keyboard and mouse allow users to enter data commands; storage and processing compnents consist of the hard drive and other storage components like flash drives - output devices present results to users - monitors, printers, transmit or display documentshardware
supercomputerstypes of computers - mainframes
high-end network serverstype of computers - midrange systems
desktop, notebook (laptop) computers - tablets hand-held devices - smart phones and pdaspersonal computers
all the programs, routines and computer languages that control a computer and tell it how it operatessoftware
- windows operating systems - mac operatingoperating system
- adobe acrobat - micrrosoft powerpoint quickenapplication software
he Internet Local area networks (LAN) Wide area networks (WAN)Wireless local networks (WiFi) Intranets Virtual private networks (VPN )Voice over Internet protocolcomputer networks
malware - computer viruses - worms - botnet - trojan horses - spywaree-crime
- personal use - privacyuse of information systems by employees and vendors
- employment records - employee monitoring - customer dataorganizational use of information
- natural disasters - power failures - equipment malfunctions - software glitches - human error - terrorist attact the most basic precaution is routine backup of software and data, at the organizational and individual leveldisaster recover and backup
employees who work with virtual officesthe distributed workforce
- an outside supplier that provides both the computers and the application support for managing an information systemapplication service providers ASP
- the use of software time from application providers; firms pay only their usage of the software, not for purchasing or maintaining the softwareon demand computing
- the use of powerful servers that store applications software and databases that users access by using any internet - connected device, such as a PC or a smartphonecloud computing
a network of smaller computers that run special or complicated tasksgrid computing