Chapter 4
Chapter 5
Chapter 5 Part 2
Chapter 6
Chapter 6 Part 2
100

The degree of protection against criminal activity, danger, damage, and/or loss

What is Security?

100

An approach to managing information across an entire organization involving a formal set of unambiguous rules for creating, collecting, handling, and protecting its information.

What is Data Governance?

100

A repository of historical data that are organized by subject to support decision makers in the organization.

What is a Data Warehouse?

100

Refers to the transmission capacity of a network; it is stated in bits per second

What is Bandwidth?

100

The underlying concept defining the structure of the World Wide Web

What is Hypertext?

200

All of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction

What is Information Security?

200

A set of core data (e.g., customer, product, employee, vendor, geographic location, etc.) that span the enterprise information systems.

What is Master Data?

200

A low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in a strategic business unit (SBU) or an individual department

What is a Data Mart?

200

A communications processor that routes messages from a LAN to the Internet, across several connected LANs, or across a wide area network such as the Internet.

What is a Router?

200

Search several engines at once and then integrate the findings to answer users’ queries.

What are Metasearch Engines?

300

An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

What is Social Engineering?

300

The same data are stored in multiple locations.

What is Data Redundancy?

300

The cumulative store of subjective or experiential learning. In an organization, tacit knowledge consists of an organization’s experiences, insights, expertise, know-how, trade secrets, skill sets, understanding, and learning. It is generally imprecise and costly to transfer.

What is Tacit Knowledge?

300

High-speed central networks to which multiple smaller networks (such as LANs and smaller WANs) connect.

What are Corporate backbone networks?

300

The process in which highly prized “knowledge” workers are now able to work anywhere and anytime.

What is Telecommuting?

400

Occurs when an unauthorized individual attempts to gain illegal access to organizational information

What is espionage/trespass?

400

Applications and data are independent of one another; that is, applications and data are not linked to each other, so all applications are able to access the same data.

What is Data Independence?
400

A collection of interrelated two-dimensional tables, consisting of rows and columns.

What is a Relational Database?

400

Discrete pulses that are either on or off, representing a series of bits (0s and 1s). Th is quality allows digital signals to convey information in a binary form that can be interpreted by computers.

What are Digital Signals?

400

A process in which an organization outsources a task to an undefined, generally large group of people in the form of an open call.

What is Crowdsourcing?

500

Includes certain types of software that are not allowed to run in the company environment.

What is Blacklist?

500

A field in a database that uniquely identify each record so that it can be retrieved, updated, and sorted.

What is a Primary Key?

500

Refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity

What is Cardinality?

500

A type of client/server distributed processing where each computer acts as both a client and a server

What is Peer-to-Peer Processing?
500

The latest form of videoconferencing which enables participants to seamlessly share data, voice, pictures, graphics, and animation by electronic means

What is Telepresence?