5.01 Nature of Information Management
Across
- 2. Choosing among alternatives
- 4. Facts and figures
- 6. Private information that belongs to an organization and cannot be released to the public
- 8. Process by which an organization’s accounts and records are verified
- 11. Junk email that the recipient did not request; also known as unsolicited commercial email
- 13. Unauthorized access to a computer system
- 15. An organization’s ability to function during and after a disaster
- 17. A computer network connected without the use of wires or cables
- 18. Communication that is too much and/or comes too fast to process at one time
Down
- 1. An integrated technology that assists with an organization’s information management needs
- 2. Converting facts and figures into useful information
- 3. A U.S. regulation mandating that public businesses comply with specific accounting requirements
- 5. The process of accessing, processing, maintaining, evaluating, and disseminating knowledge, facts, or data for the purpose of assisting business decision-making
- 7. Computer programs that download to your computer or network without your permission; programs designed to disrupt computer operations
- 9. Data presented in a useful form
- 10. Stability; regularity
- 12. Fulfilling the requirements of the law
- 14. Acquiring assistance from outside organizations/consultants to obtain goods or services to accomplish business objectives or perform primary business activities
- 16. Undisclosed information within a particular business or industry