Page 569 - Using MIS
P. 569
Glossary
10/100/1000 Ethernet A type of Ethernet that conforms to ARM A computer architecture and instruction set that is
the IEEE 802.3 protocol and allows for transmission at a rate designed for portable devices such as smartphones and
of 10, 100, or 1,000 Mbps (megabits per second). 215 tablets. 128
3D printing (additive manufacturing) The process of creat- As-is model A model that represents the current situation
ing three-dimensional objects by fusing two-dimensional and processes. 460
layers of plastic, metal, and other substances on top of one Asymmetric encryption An encryption method whereby
another. 2 different keys are used to encode and to decode the mes-
Abstract reasoning The ability to make and manipulate sage; one key encodes the message, and the other key de-
models. One of four key skills for nonroutine cognitive codes the message. Asymmetric encryption is slower and
thinking. 8 more complicated than symmetric encryption. 405
Access A popular personal and small workgroup DBMS Asynchronous communication Information exchange that
product licensed by Microsoft. Part of some versions of occurs when all members of a work team do not meet at the
Microsoft Office. 170 same time, such as those who work different shifts. 48
Activity A business function that receives inputs and pro- Attributes Characteristics of an entity. Example attributes
duces outputs. An activity can be performed by a human, by of Order are OrderNumber, OrderDate, SubTotal, Tax,
a computer system, or by both. 90 Total, and so forth. Example attributes of Salesperson are
Ad-blocking software Software that filters out advertising SalespersonName, Email, Phone, and so forth. 179
content. 309 Authentication The process whereby an information system
Advanced Persistent Threat (APT) A sophisticated, pos- verifies (validates) a user. 401
sibly long-running, computer hack that is perpetrated by Baseline WBS The initial work breakdown structure that
large, well-funded organizations like governments. APTs shows the planned tasks, dependencies, durations, and re-
are a means to engage in cyberwarfare. 394 source assignments. 482
Adware Programs installed on the user’s computer without Best practices Methods that have been shown to produce
the user’s knowledge or permission that reside in the back- successful results in prior implementations. 319
ground and, unknown to the user, observe the user’s ac- BI analysis The process of creating business intelligence. The
tions and keystrokes, modify computer activity, and report four fundamental categories of BI analysis are reporting,
the user’s activities to sponsoring organizations. Most ad- data mining, BigData, and knowledge management. 343
ware is benign in that it does not perform malicious acts or
steal data. It does, however, watch user activity and produce BI application The software component of a BI system. 340
pop-up ads. 407 BI server A Web server application that is purpose-built for
the publishing of business intelligence. 372
Agile development An adaptive project management process
based on the principles listed in Figure 12-20. Can be used BigData A term used to describe data collections that are
for the management of many types of projects; in this text, it characterized by huge volume, rapid velocity, and great
applies to the development of information systems. 485 variety. 189
Android A mobile operating system that is a version of Linux. Bigtable A nonrelational data store developed by Google. 188
Android runs on the Google Nexus 7 and the Amazon Binary digits The means by which computers represent data;
Kindle Fire as well as many other mobile devices. 128 also called bits. A binary digit is either a zero or a one. 117
Application Synonym for application software. 458 Biometric authentication The use of personal physical
Application software Programs that perform a business characteristics, such as fingerprints, facial features, and reti-
function. Some application programs are general pur- nal scans, to authenticate users. 404
pose, such as Excel or Word. Other application programs Bitcoin A form of digital currency that operates without a
are specific to a business function, such as accounts central bank. Users can send and receive bitcoins to each
payable. 131 other for a nominal fee. 281
537