Page 569 - Using MIS
P. 569

Glossary






            10/100/1000 Ethernet  A type of Ethernet that conforms to   ARM  A computer architecture and instruction set that is
              the IEEE 802.3 protocol and allows for transmission at a rate   designed for portable devices such as smartphones and
              of 10, 100, or 1,000 Mbps (megabits per second).  215  tablets. 128
            3D printing (additive manufacturing)  The process of creat-  As-is model  A  model  that represents  the  current  situation
              ing three-dimensional objects by fusing two-dimensional   and processes.  460
              layers of plastic, metal, and other substances on top of one   Asymmetric encryption  An encryption method whereby
              another. 2                                            different keys are used to encode and to decode the mes-
            Abstract reasoning  The ability to make and manipulate   sage; one key encodes the message, and the other key de-
              models.  One  of four  key skills  for nonroutine  cognitive   codes the message. Asymmetric encryption is slower and
              thinking. 8                                           more complicated than symmetric encryption.  405
            Access  A popular personal and small workgroup DBMS   Asynchronous communication  Information exchange that
              product licensed by Microsoft. Part of some versions of   occurs when all members of a work team do not meet at the
              Microsoft Office.  170                                same time, such as those who work different shifts.  48
            Activity  A business function that receives inputs and pro-  Attributes  Characteristics of an entity. Example attributes
              duces outputs. An activity can be performed by a human, by   of  Order are  OrderNumber, OrderDate, SubTotal, Tax,
              a computer system, or by both.   90                   Total, and so forth. Example attributes of  Salesperson are
            Ad-blocking software  Software that filters out advertising   SalespersonName, Email, Phone, and so forth.  179
              content. 309                                        Authentication  The process whereby an information system
            Advanced  Persistent  Threat  (APT)  A sophisticated, pos-  verifies (validates) a user.  401
              sibly long-running, computer hack that is perpetrated by   Baseline WBS  The initial work breakdown structure that
              large, well-funded organizations like governments. APTs   shows the planned tasks, dependencies, durations, and re-
              are a means to engage in cyberwarfare.  394           source assignments.  482
            Adware  Programs installed on the user’s computer without   Best practices  Methods that have been shown to produce
              the user’s knowledge or permission that reside in the back-  successful results in prior implementations.  319
              ground and, unknown to the user, observe the user’s ac-  BI analysis  The process of creating business intelligence. The
              tions and keystrokes, modify computer activity, and report   four fundamental categories of BI analysis are reporting,
              the user’s activities to sponsoring organizations. Most ad-  data mining, BigData, and knowledge management.  343
              ware is benign in that it does not perform malicious acts or
              steal data. It does, however, watch user activity and produce   BI application  The software component of a BI system.  340
              pop-up ads.  407                                    BI server  A Web server application that is purpose-built for
                                                                    the publishing of business intelligence.  372
            Agile development  An adaptive project management process
              based on the principles listed in Figure 12-20. Can be used   BigData  A term used to describe data collections that are
              for the management of many types of projects; in this text, it   characterized by huge volume, rapid velocity, and great
              applies to the development of information systems.  485  variety. 189
            Android  A mobile operating system that is a version of Linux.   Bigtable  A nonrelational data store developed by Google.  188
              Android runs on the Google Nexus 7 and the Amazon   Binary digits  The means by which computers represent data;
              Kindle Fire as well as many other mobile devices.  128  also called bits. A binary digit is either a zero or a one.  117
            Application  Synonym for application software.  458   Biometric authentication  The use of personal physical
            Application software  Programs that perform a business   characteristics, such as fingerprints, facial features, and reti-
              function. Some application programs are general pur-  nal scans, to authenticate users.  404
              pose, such as Excel or Word. Other application programs   Bitcoin  A form of digital currency that operates without a
              are specific to a business function, such as accounts   central bank. Users can send and receive bitcoins to each
              payable. 131                                          other for a nominal fee.  281
                                                                                                                 537
   564   565   566   567   568   569   570   571   572   573   574