Page 580 - Using MIS
P. 580

548       Glossary

        Regression analysis  A type of supervised data mining that es-  Self-efficacy  A person’s belief that he or she can successfully
           timates the values of parameters in a linear equation. Used to   perform the tasks required in his or her job.  276
           determine the relative influence of variables on an outcome   Semantic  security  Also called  data triangulation; con-
           and also to predict future values of that  outcome.  360  cerns the unintended release of protected data through
        Relation  A formal name for a database table.  167       the release of a combination of reports or documents that
        Relational databases  Databases that store data in the form   are not protected independently.  374
           of relations (tables with certain restrictions) and that repre-  Server  A computer that provides some type of service, such
           sents record relationships using foreign keys.  167   as hosting a database, running a blog, publishing a Web site,
        Relationships  Associations  among entities or  entity  in-  or s elling goods. Server computers are faster, larger, and
           stances in an E-R model or an association among rows of a   more powerful than client computers.  117
           table in a relational database.  180               Server farm  A large collection of server computers that is
        Remote action system  An information system that pro-    organized to share work and compensate for one another’s
           vides action at a distance, such as telesurgery or telelaw   failures. 117
            enforcement.  236                                 Server tier  In the three-tier architecture, the tier that  con-
        Reporting application  A business intelligence applica-  sists of computers that run Web servers for generating Web
           tion that inputs data from one or more sources and ap-  pages and responding to requests from browsers. Web serv-
           plies reporting operations to that data to produce business   ers also process application programs.  220
            intelligence.  355                                Server virtualization  The process of running two or more
        Repository  In a business process model, a collection of some-  operating system instances on the same server. The host
           thing; for example, a database is a repository of data.  90  operating system runs virtual operating system instances as
        Requirements analysis  The second phase in the SDLC, in   applications. 129
           which developers conduct user interviews; evaluate exist-  Service-oriented architecture (SOA)  A design philosophy
           ing systems; determine new forms/reports/queries; identify   that dictates that all interactions among computing devices
           new features and functions, including security; and create   are defined as services in a formal, standardized way. SOA
           the data model.  468                                  makes the cloud possible.  222
        Resources  People  or  information  system  applications  that   Showrooming  The practice of visiting a brick-and-mortar
           are assigned to roles in business processes.  461     store to examine and evaluate products with the intention
        Rich directory  An employee directory that includes not only   of later buying those products on the Internet.  140
           the standard name, email, phone, and address but also ex-  Simple Mail Transfer Protocol (smtp)  The protocol used
           pertise, organizational relationships, and other employee   for email transmission.  225
           data. 370
                                                              Site license  A license purchased by an organization to equip
        Roles  In a business process, collections of activities.  461  all the computers on a site with certain software.  130
        Rows  Also called records, groups of columns in a database   SLATES  Acronym developed by Andrew McAfee that sum-
           table. 165                                            marizes key characteristics of Enterprise 2.0: search, links,
        Safeguard  Any action, device, procedure, technique, or other   author, tagged, extensions, signaled.  317
           measure that reduces a system’s vulnerability to a threat.  390  Small office/home office (SOHO)  A business office with
        Schedule feasibility  Whether an information system can be   usually fewer than 10 employees often located in the busi-
           developed within the time available.  469             ness professional’s home.  214
        Screen-sharing applications  Applications that offer users   Smart cards  Plastic cards similar to credit cards that have
           the ability to view the same whiteboard, application, or   microchips. The microchip, which holds much more data
           other display over a network.  49                     than a magnetic strip, is loaded with identifying data.
        Secure Sockets Layer (SSL)  A protocol that uses both asym-  Normally requires a PIN.  404
           metric and symmetric encryption. When SSL is in use, the   Smart device  A device that has processing power, memory,
           browser address will begin with https://. The most recent   network connectivity, and the ability to interconnect with
           version of SSL is called TLS.  405                    other devices and applications.  120
        Security  The state of being free from danger.  418   Sniffing  A technique for intercepting computer communi-
        Self-driving car  An autonomous, or driverless, car that uses   cations. With wired networks, sniffing requires a physical
           a variety of sensors to navigate like a traditional car but   connection to the network. With wireless networks, no such
           without human intervention.  121                      connection is required.  393
   575   576   577   578   579   580   581   582   583   584   585