Download presentation
Presentation is loading. Please wait.
Published byDeborah Robbins Modified over 8 years ago
1
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon
2
Slide 11-2 "Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein."
3
Slide 11-3 Chapter 11 Terms Review Application performance: management procedure that is concerned with how well an application works, both in quality and quantity of results management procedure that is concerned with how well an application works, both in quality and quantity of results Asset management: monitoring the location and use of the physical assets of a computer system monitoring the location and use of the physical assets of a computer system Backup/recovery: regularly scheduled procedure of storing a copy of data and programs for recovery purposes in case of an unexpected problem such as a disk failure
4
Slide 11-4 Chapter 11 Terms Review Biometric identifier: security system containing comparison data about various parts of the human body Configuration management: maintaining records and monitoring the ways in which components of a system are set up to work with each other Disaster recovery: a plan of action uses when a major disaster occurs (such as a hurricane, earthquake, or tornado), ensuring that critical computer systems can be available for use as quickly as possible
5
Slide 11-5 Chapter 11 Terms Review Encryption: a coding procedure often used for security purposes when data is to be transmitted End user: general reference to a person who uses computers for one or more common purposes, such as for office applications and decision-making activities Help desk: a centralized and sometimes automated system for assisting an end user
6
Slide 11-6 Chapter 11 Terms Review Human Resource Management (HRM): management of the people as a valuable resource Information Resource Management (IRM): effective decision making related to management of all components of computer systems Network performance: management procedure that is concerned with how well a network is working compared with the level of data flow
7
Slide 11-7 Chapter 11 Terms Review Uninterruptible Power Supply (UPS): protection against power failure in which files can be stored before power to the system is lost Virus: unwanted instruction that can change or delete programs or data
8
Slide 11-8
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.