IS 3003 Midterm: Exam 3 - Flashcards (Ch.7-9)

83 views26 pages

Document Summary

Govern design, security, use of programs throughout it infrastructure. Combination of hardware, software, and manual procedures. Ensure that only authorized data are processed by application. Include: input controls, processing controls, output controls. Based on the data from the operational crm. Using online analytical processing (olap), data mining, and other data analysis techniques. The process that shows you are an authorized user. Links up to 8 devices in 10m area using low power, radio based communication. Information about product demand gets distorted as it passes from one entity to next across the supply chain. Disliked by organization because they invest more money and increase order sizes. Message goes through all systems until it reaches its final destination. If one pc is sending a message, all other pcs must wait until the message has been sent and the line is clear. No more than 100 devices attached to one network to prevent overload.