Page 576 - Using MIS
P. 576

544       Glossary

        iOS  The operating system used on the iPhone, iPod Touch,   much  the  base  probability  changes  when  other  products
           and iPad.  128                                        are purchased. If the lift is greater than 1, the change is posi-
        IP address  A series of dotted decimals in a format like   tive; if it is less than 1, the change is negative.  362
           192.168.2.28 that identifies a unique device on a network or   Linkages  In  Porter’s  model  of  business  activities,  interac-
           internet. 218                                         tions across value chain activities.  90
        IP spoofing  A type of spoofing whereby an intruder uses an-  Linux  A version of Unix that was developed by the open
           other site’s IP address as if it were that other site.  393  source community. The open source community owns
        IPv4  The most commonly used Internet layer protocol; has a   Linux, and there is no fee to use it. Linux is a popular oper-
           four-decimal dotted notation, such as 165.193.123.253.  219  ating system for Web servers.  128
                                                              Local area network (LAN)  A network that connects computers
        IPv6  An Internet layer protocol that uses 128-bit addresses
           and is gradually replacing IPv4.  219                 that reside in a single geographic location on the premises of
                                                                 the company that operates the LAN. The number of connected
        Just-in-time data  Data delivered to the user at the time it is   computers can range from two to several  hundred.  214
           needed. 144
                                                              Lost-update problem  A problem that exists in database ap-
        Just-in-time design  Rather than design the complete, over-  plications in which two users update the same data item,
           all system at the beginning, only those portions of the   but only one of those changes is recorded in the data. Can
           design that are needed to complete the current work are   be resolved using locking.  178
           done. Common for agile development techniques such as
           scrum. 485                                         Mac OS  An operating system developed by Apple Computer,
                                                                 Inc., for the Macintosh. The current version is Mac OS X
        Key  (1) A column or group of columns that identifies a   Mavericks.  Initially,  Macintosh computers were  used pri-
           unique row in a table. Also referred to as a  Primary  Key.   marily by graphic artists and workers in the arts commu-
           (2) A number used to encrypt data. The encryption algo-  nity, but today Macs are used more widely.  127
           rithm applies the key to the original message to produce   Machine  code  Code that has been compiled from source
           the coded message. Decoding (decrypting) a message is   code and is ready to be processed by a computer. Cannot be
           similar; a key is applied to the coded message to recover the   understood by humans.  135
           original text.  166, 404
                                                              Main memory  Memory that works in conjunction with the
        Key escrow  A control procedure whereby a trusted party is   CPU. Stores data and instructions read  by the CPU and
           given a copy of a key used to encrypt database data.  409
                                                                 stores the results of the CPU’s computations.  116
        Key logger  Malicious spyware that captures keystrokes with-  Maintenance  In the context of information systems, (1) to fix
           out the user’s knowledge. Used to steal usernames, pass-  the system to do what it was supposed to do in the first place
           words, account numbers, and other sensitive data.  407
                                                                 or (2) to adapt the system to a change in requirements.  476
        Key performance indicators (KPI)  See success metrics. 314
                                                              Malware  Viruses, worms, Trojan horses, spyware, and
        Kilobyte (K)  1,024 bytes.  118                           adware.  407
        Knowledge management (KM)  The process of creating    Malware definitions  Patterns that exist in malware code.
           value from intellectual capital and sharing that knowledge   Antimalware vendors update these definitions continu-
           with employees, managers, suppliers, customers, and oth-  ously and incorporate them into their products in order to
           ers who need it.  366                                 better fight against malware.  408
        Libraries  In SharePoint and other version-control collabora-  Management information systems (MIS)  The management
           tion systems, shared directories that allow access to various   and use of information systems that help organizations
           documents by means of permissions.  59                achieve their strategies.  10
        License  A contract that stipulates how a program can be   Managerial decisions  Decisions that concern the allocation
           used. Most specify the number of computers on which   and use of resources.  42
           the program can be installed; some specify the number of   Many-to-many (N:M) relationships  Relationships  involving
           users that can connect to and use the program remotely.   two entity types in which an instance of one type can relate to
           Such agreements also stipulate limitations on the liability   many instances of the second type, and an instance of the sec-
           of the software vendor for the consequences of errors in the   ond type can relate to many instances of the first. For example,
            software.  130                                       the relationship between Student and Class is N:M. One stu-
        Lift  In market-basket terminology, the ratio of confidence   dent may enroll in many classes, and one class may have many
           to the base probability of buying an item. Lift shows how   students. Contrast with one-to-many  relationships. 181
   571   572   573   574   575   576   577   578   579   580   581