Page 582 - Using MIS
P. 582

550       Glossary

        Support activities  In Porter’s value chain model, the ac-  layer. Programs are written to implement the rules of a par-
           tivities that contribute indirectly to value creation: pro-  ticular protocol.  224
           curement, technology, human resources, and the firm’s   Team surveys  Forms of asynchronous communication in
            infrastructure.  88                                  which one team member creates a list of questions and
        Swift  Apple’s new programming language for OS X and iOS   other team members respond. Microsoft SharePoint has
           applications. 136                                     built-in survey capability.  51
        Swim-lane layout  A process diagram layout similar to swim   Technical feasibility  Whether existing information technol-
           lanes in a swimming pool; each role in the process is shown   ogy will be able to meet the requirements of a new informa-
           in its own horizontal rectangle, or lane.  464        tion system.  469
        Switching costs  Business strategy of locking in customers by   Telediagnosis  A remote access system used by health-
           making it difficult or expensive to change to another prod-  care professionals to provide expertise in rural or remote
           uct or supplier.  95                                  areas. 236
        Symbian  A mobile client operating system that is popular   Telelaw enforcement  A remote access system that provides
           on phones in Europe and the Far East, but less so in North   law enforcement capability.  237
           America. 128                                       Telesurgery  A remote access system that links surgeons to
        Symmetric encryption  An encryption method whereby the   robotic equipment and patients at a distance.  236
           same key is used to encode and to decode the message.  405  Terabyte (TB)  1,024 GB.  118
        Synchronous communication  Information exchange that   Test plan  Groups of action and usage sequences for validat-
           occurs when all members of a work team meet at the    ing the capability of new using software.  475
           same time, such as face-to-face meetings or conference
           calls. 48                                          Text mining  The application of statistical techniques on text
                                                                 streams for locating particular words, patterns of particular
        System  A group of components that interact to achieve some   words, and even correlating those word counts and patterns
           purpose. 11
                                                                 with personality profiles.  241
        System conversion  The process of converting business ac-  The Internet  The public collection of networks used for
           tivity from the old system to the new.  475
                                                                 transmitting data, worldwide.  214
        Systems analyst  IS professionals who understand both busi-  The Singularity  The point at which computer systems be-
           ness and technology. They are active throughout the sys-  come sophisticated enough that they can create and adapt
           tems development process and play a key role in moving   their own software and hence adapt their behavior without
           the project from conception to conversion and, ultimately,   human assistance.  373
           maintenance.  Systems  analysts  integrate  the  work  of  the
           programmers, testers, and users.  460              Thick-client application  A software application that re-
                                                                 quires programs other than just the browser on a user’s
        Systems development life cycle (SDLC)  The classical pro-  computer; that is, that requires code on both client and
           cess used to develop information systems. The basic tasks   server computers. See also native application. 126
           of systems development are combined into the following
           phases:  system  definition, requirements  analysis,  compo-  Third-party cookie  A cookie created by a site other than the
           nent design, implementation, and system maintenance (fix   one visited.  381
           or enhance).  466                                  Threat  A person or organization that seeks to ob-
        Systems thinking  The mental activity of making one or more   tain or alter data or other IS assets illegally, without
           models of the components of a system and connecting the   the owner’s permission and often without the owner’s
           inputs and outputs among those components into a sensible   knowledge. 390
           whole, one that explains the phenomenon observed. One of   Three-tier architecture  Architecture  used  by  most
           four key skills for nonroutine cognitive thinking.  8  e-commerce server applications. The tiers refer to three
        Table  Also called files, groups of similar rows or records in a   different classes of computers. The user tier consists of us-
           database. 165                                         ers’ computers that have browsers that request and process
                                                                 Web pages. The server tier consists of computers that run
        Tablets  Computing device that allows interaction through a
           flat touch screen.  116                               Web servers and in the process generate Web pages and
                                                                 other data in response to requests from browsers. Web
        Target  The asset that is desired by a security threat.  390  servers also process application programs. The third tier is
        TCP/IP protocol architecture  A protocol architecture hav-  the database tier, which runs the DBMS that processes the
           ing five layers and one or more protocols defined at each   database. 220
   577   578   579   580   581   582   583   584   585   586   587