Page 576 - Using MIS
P. 576
544 Glossary
iOS The operating system used on the iPhone, iPod Touch, much the base probability changes when other products
and iPad. 128 are purchased. If the lift is greater than 1, the change is posi-
IP address A series of dotted decimals in a format like tive; if it is less than 1, the change is negative. 362
192.168.2.28 that identifies a unique device on a network or Linkages In Porter’s model of business activities, interac-
internet. 218 tions across value chain activities. 90
IP spoofing A type of spoofing whereby an intruder uses an- Linux A version of Unix that was developed by the open
other site’s IP address as if it were that other site. 393 source community. The open source community owns
IPv4 The most commonly used Internet layer protocol; has a Linux, and there is no fee to use it. Linux is a popular oper-
four-decimal dotted notation, such as 165.193.123.253. 219 ating system for Web servers. 128
Local area network (LAN) A network that connects computers
IPv6 An Internet layer protocol that uses 128-bit addresses
and is gradually replacing IPv4. 219 that reside in a single geographic location on the premises of
the company that operates the LAN. The number of connected
Just-in-time data Data delivered to the user at the time it is computers can range from two to several hundred. 214
needed. 144
Lost-update problem A problem that exists in database ap-
Just-in-time design Rather than design the complete, over- plications in which two users update the same data item,
all system at the beginning, only those portions of the but only one of those changes is recorded in the data. Can
design that are needed to complete the current work are be resolved using locking. 178
done. Common for agile development techniques such as
scrum. 485 Mac OS An operating system developed by Apple Computer,
Inc., for the Macintosh. The current version is Mac OS X
Key (1) A column or group of columns that identifies a Mavericks. Initially, Macintosh computers were used pri-
unique row in a table. Also referred to as a Primary Key. marily by graphic artists and workers in the arts commu-
(2) A number used to encrypt data. The encryption algo- nity, but today Macs are used more widely. 127
rithm applies the key to the original message to produce Machine code Code that has been compiled from source
the coded message. Decoding (decrypting) a message is code and is ready to be processed by a computer. Cannot be
similar; a key is applied to the coded message to recover the understood by humans. 135
original text. 166, 404
Main memory Memory that works in conjunction with the
Key escrow A control procedure whereby a trusted party is CPU. Stores data and instructions read by the CPU and
given a copy of a key used to encrypt database data. 409
stores the results of the CPU’s computations. 116
Key logger Malicious spyware that captures keystrokes with- Maintenance In the context of information systems, (1) to fix
out the user’s knowledge. Used to steal usernames, pass- the system to do what it was supposed to do in the first place
words, account numbers, and other sensitive data. 407
or (2) to adapt the system to a change in requirements. 476
Key performance indicators (KPI) See success metrics. 314
Malware Viruses, worms, Trojan horses, spyware, and
Kilobyte (K) 1,024 bytes. 118 adware. 407
Knowledge management (KM) The process of creating Malware definitions Patterns that exist in malware code.
value from intellectual capital and sharing that knowledge Antimalware vendors update these definitions continu-
with employees, managers, suppliers, customers, and oth- ously and incorporate them into their products in order to
ers who need it. 366 better fight against malware. 408
Libraries In SharePoint and other version-control collabora- Management information systems (MIS) The management
tion systems, shared directories that allow access to various and use of information systems that help organizations
documents by means of permissions. 59 achieve their strategies. 10
License A contract that stipulates how a program can be Managerial decisions Decisions that concern the allocation
used. Most specify the number of computers on which and use of resources. 42
the program can be installed; some specify the number of Many-to-many (N:M) relationships Relationships involving
users that can connect to and use the program remotely. two entity types in which an instance of one type can relate to
Such agreements also stipulate limitations on the liability many instances of the second type, and an instance of the sec-
of the software vendor for the consequences of errors in the ond type can relate to many instances of the first. For example,
software. 130 the relationship between Student and Class is N:M. One stu-
Lift In market-basket terminology, the ratio of confidence dent may enroll in many classes, and one class may have many
to the base probability of buying an item. Lift shows how students. Contrast with one-to-many relationships. 181