Answer & Explanation:i have key terms 2 files, i need you to paraphrase all the terms,just change the way it written and change some words but the same. paraphrase 2-3 words per term.each file has 180 key terms and each term have 1-2 lines of definition so i just need you to change 2-3 words of the definition.key term files are here:1-5.docx 6-9.docx
1_5.docx
6_9.docx
Unformatted Attachment Preview
Key Terms 1-5
3G: It is the short of the third generation of cellular telecommunications technology.
4G: It is the short of the fourth generation of mobile network standards allow faster data
transfer rates.
Acceptable use policy AUP: is known as a document with practices which users much accept
in order to get the access to the organization Internet.
Active data warehouse: is a repository of any form of captured transactional data so that
they can be used for the purpose of finding trends and be used for coming decisions.
Ad hoc report: It allows user to build reports on their own and also modify already existing
reports. It requires little or almost no training.
Administrative controls: are the modifications in the way employees work, this are policies
and rules, which are established to control the work process.
Advanced Persistent Treat APT: this refers to an attacker, which were not allowed to run the
software in our environment.
Adware: package that is consist with advertisement to make more profit for the author.
Agile enterprise: fast moving firm capable of rapid response to unexpected events.
Agility: is an architectural discipline for computer networking.
Anonymous: is something that is made by unknown person or organization that does not
want to use their own name. It is not noticeable.
Application controls: helping control application authorization by monitoring and recording
all activities.
AT&T toggle: is a cloud solution, which is giving the ability to use smartphone or other smart
device for business as well as personal use.
Audit: it is an official financial verification by providing records of accounts.
Authentication: is a process of defining if someone is really who he or she says it is. Also a
process where we figure out if something is in fact what is explained to be.
Authorization: is a process of giving or taking access to a network resource.
Availability: it refers on the things or processes that are ready to be accessible and use at
the moment. It means that the device is ready at a giving moment to start a mission.
Baiting: is understood to be a use in a ways and insecure the actions.
Bandwidth: is the bit rate of available information capacity expressed in metrical multiples
of bits per seconds.
Barriers to entry: are obstacles that make it difficult to enter into the market or into the
system.
Batch processing: means processing transaction in a group or batch. There is no need for
user to have any interaction once batch processing is made. It can be done any time.
Big data: data so large and comp lest that they are difficult to process using traditional
processing applications.
Biometrics: is understood to be a metrics, which is related to traits as well as human
characteristics.
Botnet: are the groups of computers, which are connected in a way and supervised by one
sources.
Bring your own device BYOD to work: it means that the employee can use many different
devices, which can be in their own poses for the work purposes. They can store, access,
manage, and monitor all information on those devices.
Broadband: broadband Internet service is the most used form of Internet because of its high
access speed, and it is offered in four different forms.
Business analytics: is a combination of skills and technologies and processes used by
organizations to gain insight in to their business based on data.
Business continuity plan: is a plan, which is defining how the business will be operated in
the future; it is also take into consideration the risk and explaining how this risk will effect
the entire process and the operations.
Business impact analysis BIA: is a process, which is reviling the consequences of disruption
in a business process. It identifies where are the critical areas in the process and how to
measure and report them.
Business intelligence BI: is a set of techniques for the transformation of plain data into
useful information.
Business model: representation of how organization makes and intends to make a money,
profit.
Business process reengineering BPR: is the analysis and re-design of workflow within and
between enterprises.
Business process: is a set of activates with which we will accomplish the goals of
organization.
Business record: is a document that recording a business processes. It includes all meetings,
memoranda, employment contact, and other relevant information.
Carbon footprint: is a measure of the environmental impact of a particular individual or
organization measured in unites of carbon dioxide.
Circuit switching: is a type of network in which physical path is obtained for and dedicated
to a single connection between two end points in the network.
Cloud computing: Cloud computing let’s users have access to files and applications over the
Internet.
Cloud computing: Cloud computing let’s users have access to files and applications over the
Internet.
COBIT Control Objectives for information and related technology: it serves for developing,
implementing, monitoring, controlling, improving IT and management practices.
Commodity: marketable item used to satisfy the needs and wants of the end users.
Competitive advantage: when organization sustains profits because it has a superiority
gained by the organization when it can provides value as others but at a lower price as
others.
Competitive forces model: or so-called porter fiver forces model. Including supplier power,
threat of new entrants, and threat of substitutes, rivalry, and buyer power.
Confidentiality: is determination the rules and limits as well as restrictions on the certain
types of information.
Consumer mashups: are aimed to the public.
Consumerization of information technology COIT: is a mix of personal and business use of IT
devices and other smart phones, as well as tablets.
Content indexing: is also called search index. Provides the ability to content index and
search both file server data and protected data for discovery and other purpose.
Corporate governance: are the sets of rules, laws in which business are operated and
controlled.
Credentials: are offering the proofs to the facts, which are showing the credibility
y
and the ability of certain people or things. They are issued by the authorities which is widely
recognized.
Critical infrastructure: are the processes and the technologies which are essential to the
health and security as well for well-being of all citizens as well as for the functioning of
government.
Critical success factor CSF: are the critical factors required for ensuring the success of
business.
Cybersecurity controls: it is how to secure the Internet data and privacy usages. And it
controls the data in the Internet that the user might do.
Cycle time: the period required to complete one cycle of an operation.
Data analytics: is the science of examining raw data with the purpose of drawing conclusions
about the information.
Data discovery: is a business intelligence architecture aimed into providing reports and data
from multiple sources.
Data entity: is one of the components defined in a logical data model.
Data Mart: The data mart is a subset of the data warehouse and used to get data out to the
users.
Data mining: is a process of analyzing data from different perspectives and putting them
into useful information.
Data ownership: is an act of having legal right and complete control over a piece or set of
data elements.
Data warehouse: is a database that is designed for analysis, it is a system used for reporting
and analyzing.
Data: is a fact or information used to calculate or analyze. It is usually produced and stored
by a computer.
Database management system DBMS: is a collection of programs that enables users to store
and modify information from a database.
Database: collection of data organized in order that users can easily manage and update
them.
Database: is a collection of information organized in a way that can be easy accessible and
managed.
Decision support system DDS: is a computer program application which is analyzing
business data and display data in a ways which are making business decisions much more
easier.
Denial of service DOS attack: is a bombarded attack where the main purpose is the cause
the traffic that is trying to crash the system.
Digital care management solution: It is support a cloud platform and connected medical
devices. This solution will mix biometric devices and point out personalized care plans to
people on their mobile devices.
Dirty data: it can be erroneous or incomplete data, is a database record that contains errors.
Distributed database system: allows applications to access data from local and remote
databases.
Do not carry rules: is an attack on network, which is assuring to bring network to its knees
Document management system DMS: is a use of computer system to store electronic
documents.
Enterprise architectures: define the structure and operation of organizations. It determines
how an organization can be the most effectively reach objectives.
Enterprise mashups: is known to be the integration of heterogeneous digital and
applications from several sources for business proposes.
Enterprise resource planning ERP: is business management software that allows an
organization to use a system of intergraded application to manage the business and
automate many back offices.
Enterprise risk management ERM: is the process of coordination activities for an
organization in order to make sure the risk is at the lowest level.
Enterprise search- is how organization helps people to seek the information they need from
anywhere, in any format inside the organization.
Exception report: is a report that documents what is extraordinary and not normal and
demands attention.
Executive information system EIS: is an infrastructure that supplies that delivers to
organization up to the minute operational data.
Extract, transformation, loan ETL: three database functions that are combined into one tool
to pull data of one database and place it into other database.
Extranet: is a computer network, which is allowing access from outside of an organizations
intranet.
Fault tolerant system: is the system, which is responding forgiving to unexpected error,
mistake or failure.
Fault tolerant: a setup that prevent a computer from failing in the event of a problem or
error.
Firewall: is a network security systems which is providing control over the incoming and
outgoing traffic based on the rules which are already set.
Fixed line broadband: is a fixed cable or DSL Internet connection.
General controls: are controls which are implemented in all system, meaning they are
implemented in all system processes in the certain organization.
Group dynamics: the interactions that influence the attitudes and behavior of people when
they are grouped with others through either choice or accidental circumstances.
Hacktivist: this are hacker activities, they are using illegally computer of others in order to
make a statement and in order to high lighten the importance of the issue.
Human information: is the way how people interact with information. Interesting
information that help people learn more. It is the interaction between people, other users
and computers.
Inbound logistics: the activities of receiving, storing, and disseminating incoming good or
material for use.
Information management: is a collection and management of information that go from the
source to the audience. Meaning there is a control over the processing and delivering the
information.
Information technology: are all types of technology used to exchange information in several
different form.
Information: is a knowledge that people get about something. Information are facts and
details about specific topic or subject.
Insider fraud: it is something threats the network that is used by users.
Integrity: it is for the data or the files that have not been altered in unauthorized way.
Internal control environment: is an internal process which is making sure that organization
is meeting the objectives and operational effectiveness while providing honest financial
reports.
Internal control: are procedures that make sure entire organization is safeguarded.
Internal fraud: is also known as employee fraud which is done by the individuals or group of
people which are working in the organization and are abusing the access they got.
Internal threats: are the threats that come from inside the organization or specific
department, for example un untrusted employee who has privilege and access to very
important reports and information.
Internet of things: is a computing concept that describes a future where everyday object will
be connected to Internet and be able to identify to other devices.
Internet protocol IP: is the primary network protocol used on the Internet, developed in the
70s.
Internet: is a global network, which is connecting millions of computer all over the world.
Interoperability: is the ability of a system or product to work with other systems without
special effort on the part of customer.
Intrusion detection system IDS: is a security system, which is providing management system
for networks as well as for computers.
IP address: is an identifier for a computer or device on a IP network.
IT ARCHITECUTRE: architecture tries to achieve performance which helps to design the
system in a right way.
IT consumerization: is the blending of personal and business use of technology devices as
well as applications.
IT function: It is supporting and development many businesses that we using in our daily like
4G networks, and embedded sensors and e-readers.
IT governance: is a process, which is providing the most effective and efficient way of IT in
order for the organization to achieve their goal.
IT infrastructure: consists of all components like (software, hardware, network resources)
that play a role in overall IT operations.
Knowledge: are the facts, information, and other skills gained throughout the education and
experience.
Latency sensitive apps: also called real time applications,
LulzSec: is a group of hackers and responsible to shut down many high profile attacks.
Machine to machine M2M: is technology that enables networked devices to exchange
information and perform actions without the manual assistance of humans.
Malware: it is short of malicious software and it is software used to disrupt computer
operation and getting information from someone else computers.
Management information system MIS: is the software and hardware system inside the
organization that provides information that all organization needs in order to run an entire
organization.
Mashups: is a web page or just an application that integrates elements from two or even
more sources.
Master data entity: includes data about clients and customers. Is shared by multiple users
and groups across an organization and stored on different systems.
Master data management MDM: is a method of enabling enterprise to link all of critical
data to one file, that provides a common point of reference.
Master reference file: a computer file that is used to the authority in a given job and that is
relatively permanent.
Messy data: is a data which is very is unorganized so that the computer is having a problem
processing it.
Model: usually a small copy of something, a type or version of a product.
Money laundering: is an illegal process where criminals are transforming the money illegally.
msnNow: is providing customize collection of best in news, sports, entertainment combined
with Outlook.
Near field communication NFC: is a set of short-range wireless technologies, in a distance
from 4cm or less to initiate a connection.
Net neutrality: could be understood as a principle that Internet service provider have to
thread all data equally, without any discrimination.
Net semi neutrality: it is a one-tier system that all Internet data packets are done the same.
Even if there are content, destination, or source.
Online transaction processing OLTP: software programs, which are capable to deliver
transaction, oriented application on the Internet.
Online transaction processing system OLTP: software programs, which are capable to
deliver transaction, oriented application on the internet.
Operational data store: is a type of database often used as an interim area for a data
warehouse.
Outbound logistics: refers to the transport, storage and delivery of goods going out of the
business. Outbound logistics can provide insight for developing a comprehensive supply
chain and management strategy.
Packet switching: is a method to deliver data across a computer network connection.
Packet: a formatted unit of data carried by a packet mode computer network.
Patches: is designed in order to inform computer program that is has to be fixed or
upgraded.
Payment Card industry data security standard PCI DDS: data that retailers ensure that WebFacing App is secured against the attacks.
Perimeter security: a system that discovers the targets in outdoor environments with high
video analysis accuracy and low trouble alarms
Persistent threats: is a set of ongoing and constant hacking attempts.
Phishing: is an attempt of a fraud, and it usually happens through the email, in order to steal
someone information.
Planners Lab: is an innovative software product for teaching financial modeling which also
helps to examine assumptions and see the impact on result.
Pretexting: is a technique where fictional situation is implement in order to obtain personal
info from unsuspecting individuals.
Primary activities: for a retailer, wholesaler, and distributor primary activity would be buying
of merchandise and them the sale of that merchandise.
Private cloud: cloud computing platform that is implemented within corporate firewall,
under the control of IT department.
Productivity: is a measurement of the efficiency of the production.
Profit margin: is a measure that is mostly defined as ration of profits earned to total costs
over some period.
Protocol: is an agreed format that is serving for exchanging data between two devices.
Query: a request for information from a database.
Radio frequency identification RFID: is a wireless system from two components that are
tags and readers.
Real time processing: data processing that takes place instantaneously at the data entry or
receipt of a command.
Real time system: this system is providing fact access to data.
Router: is a networking device, small physical device that is joining multiple networks
together.
SAR specific absorption rate: is a measure of the rate at which energy is absorbed by the
human body when exposed to the radio frequency.
Service level agreements SLAs: is a contract between a network service provider and a
costumer that specifies terms what kinds of services will provider furnished.
Service pack: is a pack of collection of updates to a software program.
Share Point: is a place, which is secured for store information, share and also access to
information from almost any device.
Smart dust: are tiny sensors or chips that detect anything, they also tract movements and
are used in military.
Smart electric grid: describes new generation electrical power system, which is using
communications and IT.
Smart grid: is a system, which is managing electricity demand in a ways that is economic and
very reliable. New Technology to optimize delivery of power.
Smart traffic Management: it is a how to manage and improve the traffic smartly and
optimize the traffic flow within their management area.
Social engineering: is understood under the terms of science, technology, psychology and
the art or entertainment. It is any act that is using the social media channels or technology in
order to influence users in a ways it is expected.
Software as a service SaaS: is a licenses services work in subscription basic, it is pay per use.
Software as a service SaaS: is a software delivery method that provides access to software
and its functions remotely as a …
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more