ISYS
Strategy
Security
Ware
DBs
Data
100

A set of interrelated components that work together to collect, process, store, and disseminate information, with a feedback mechanism for monitoring and control

What is an information system?

100

A plan that identifies technologies, vendors, competencies, people, systems, and projects in which an organization will invest

What is a strategic plan?

100

Someone who violates computer or internet security maliciously or for illegal personal gain

Who is a lone wolf attacker?

100

A large-scale system that an enterprise can build to replace several sets of organizational systems, resulting in one common database for all business units

What is an ERP?

100

A special-purpose programming language for accessing and manipulating data stored in a relational database

What is SQL?

100

A statistical relationship often mistaken for an indicator of causation

What is correlation?
200

An information system that improves the productivity of individual users in performing stand-alone tasks

What is a personal information system?

200

Something gained through cost leadership, differentiation, or focus

What is a competitive advantage?

200

A person who hacks computers or websites in an attempt to promote a political ideology

Who is a hacktivist?

200

A collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem

What is grid computing?

200

A characteristic in a record that uniquely identifies the record

What is a primary key?

200

An approach used to explore large amounts of data to search for hidden patterns that might help predict future trends

What is data mining?

300

The IS solutions built or deployed by departments other than the IT department

What is shadow IT?

300

A model that states an organization’s ISs operate within the context of people, technology infrastructure, processes, and structure

What is Leavitt’s Diamond?

300

An attack that instructs zombie computers to send simple access requests to target computers

What is a DDoS?

300

A service that allows businesses to subscribe to Web-delivered business application software by paying a monthly fee

What is SaaS?

300

The shape used to represent entities in an ERD

What is a square?

300

the accuracy, completeness, and currency of data

What is data veracity?

400

The ability of a computer to learn without a programmer needing to change the software for every scenario

What is machine learning?

400

The aspect of Leavitt’s Diamond related to ensuring an IS help desk is available during working hours

What is people?

400

A virus that replicates itself

What is a worm?

400

A type of software that has the advantage of being inexpensive to purchase because the development costs are spread over many customers

What is off-the-shelf software?

400

The part of speech represented by an arrow in an ERD, indicating relationships between entities

What is a verb?

400
The characteristic of big data that can make is hard to find the information needed to make a decision

What is volume?

500

Machines and systems that simulate human intelligence processes

What is AI?

500

A series (or chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased

What is a value chain?

500

A hacker that causes damage

What is a cracker?

500

A system that can use case-based solution processes to develop a solution by finding cases stored in a knowledge base that are similar to the problem at hand and then modify that solution to fit the current problem

What is an expert system?

500

The high-risk system for large organizations that requires a huge upfront investment of resources

What is an ERP?

500

The characteristics of big data that relates to multiple formats including documents, images, numerical data, and videos

What is variety?
M
e
n
u