MIS Exam 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

C2C

Consumers selling directly to other consumers

Star network

LAN topology configured in the shape of a star with all nodes or workstations connected to a central hub through which all messages pass

Bus network

LAN topology configured in the shape of an open-ended line with all nodes or workstations able to receive the same message at the same time

Ring network

LAN topology configured in the shape or a circle with each node connecting to the next node; messages travel around the circle in one direction

virus

a software program that attached itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions

mobile e-commerce

business transacted from mobile phones

HTTP (Hypertext Transfer Protocol)

telecommunication standard used to transfer pages on the web

Unit Testing

test individual units or pieces of code for a system

HIPAA (Health Insurance Portability and Accountability Act)

the legal act that outlines medical security and privacy rules

internet

the most universal and powerful WAN

data flow diagram

the primary tool for representing a system's component processes and the flow of data between them

Internet2

the private Internet system that links government supercomputer centers and a select group of universities; it runs more than 22,000 times faster than today's public infrastructure and supports heavy-duty applications; 100Gbps testing network for testing

Hypertext Transfer Protocol (HTTP)

the set of standards used by web servers to process user requests for web pages

e-commerce

the use of the internet, the web, and mobile apps to transact business

behavioral targeting

tracking the clicksteams of history of clicking behavior of individuals on thousands of websites for the purpose of understanding their interests and intentions

computer aided software engineering

use of software to produce system design specifications and development by automating the generation of graphics, screens, reports, etc

Rapid Application Development (RAD)

use of visual programming to create software systems quickly

Voice-over IP (VoIP)

uses IP to deliver voice information in digital form using packet switching

DDoS (Distributed Denial of Service)

using numerous computers to inundate and overwhelm a network from numerous launch points is an attack called:

VoIP (Voice over Internet Protocol)

using the internet protocol to deliver voice over information in digital form using packet switching

Grantt Chart

visually represents the timing,duration, and human resource requirements of project tasks

FIP principle of Notice/Awareness

websites must disclose their information practices before collecting data

subscription

websites that offer content or services by charging a fee payment for access to some or all of its offerings on an ongoing basis

feasibility study

what is included in the systems analysis that is used to determine whether the solution is achievable from a financial , technical. and organizational standpoint?

increase in data quality

which is NOT a current key technology trend raising ethical issue

assign responsibility

which is NOT one of the five steps discussed as a process of analyzing an ethical issue

advertising

generating revenue by attracting a large audience of visitors to be exposed to advertisement

GPS location

geoadvertising sends ads to users based on their:

e-tailers

giant and tiny online retail stores

Patent Law

grants the owner an exclusive monopoly on the ideas behind an invention for 20 years

PERT Chart

graphically depicts project tasks and their interrelationships, showing specific activities that must be completed before others can start

switches

have great intelligence and can filter and forward data to a specific destination on the network

ethical "no free lunch" rules

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for his work

worm

independent software programs that propagate themselves to disrupt the operation of a computer networks or destroy data and other programs

Metropolitan Area Network (MAN)

network that spans a metropolitan area, usually a city and its major suburbs; typically use a wireless infrastructure as well as high-speed connections using fiber optic technologies

(WSNs)wireless sensor networks

networks of interconnected wireless devices that are embedded in the physical environment to provide measurements of many points over large spaces

IPv6

new version of IP addressing scheme which uses 128-bit addresses or more than a quadrillion unique addresses

free/premium

offering basic service or content for free while charging a premium for advances or special features

business continuity planning

planning that focuses on how a company can restore business operations after disaster strikes

opt-in model

prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use

copyright law

protects the authors of a book from having their work copied by others

Radio Frequency Identification (RFID)

provide powerful technology for tracking the movement of goods through the supply chain; uses tiny tags with embedded microchips to transmit data about an item to a reader that passes data on to network; do no require a line of sight

Domain Name System (DNS)

provides a service analogous to an address book lookup; dedicated to performing the translation from domain name to IP address

CASE (computer aided software engineering)

provides software tools to automate development methodologies and reduce the amount of repetitive work in systems development

transaction fee

receiving a fee for enabling or executing a transaction

B2C

retailing products and services to individual shoppers

B2B

sales of goods and services among businesses

sales

selling goods, information, or services to a customer

affiliate

sending visitors to other websites in return for a referral fee

protocol

set of rules and procedures governing transmission of information between two points in a network

transaction brokers

sites that process transactions that are normally handles in person, over the phone, or by mail

web server

software for locating and managing stored Web pages

Wide Area Network (WAN)

spans large geographical distances; typically used to connect two or more LANs

network operating system (NOS)

special software that routes and manages communications on the network and coordinates network resources

phishing

a form of spoofing that involves setting up fake websites or sending email messages that look like those of legitimate businesses to ask users for confidential personal data

Joint Application Design (JAD)

a group-based tool for quickly collecting user requirements and creating system designs

MAN (Metropolitan Area Network)

a network that spans a city, and sometimes its major suburbs as well

Virtual Private Network (VPN)

a secure connection between two points across the Internet to transmit corporate data; low-cost alternative to a private network

private industrial network (private exchange)

a secure website that links a large firm to its suppliers and other key business partners

Trojan Horse

a software program that appears legitimate but contains a second hidden function that may cause damage

cyberwarfare

A foreign country attempting to access government networks in order to disable a national power grid would be an example of:

IP address

A number that uniquely identifies each computer or device connected to the Internet.

protocol

A set of rules governing the exchange or transmission of information between two points in a network; TCP/IP

world wide web

A system with universally accepted standards for storing, retrieving, formatting, and displaying information in a networked environment.

doubling of computer power, declining data storage cots, data analysis advances, networking advances, growth in mobile devices

Key technology trends that raise ethical issues

TCP/IP

Protocol provides a universally agreed-on method for breaking up digital messages into packets, routing them to the proper address, and then reassembling them into coherent messages

true

T/F: SSL is a protocol used to establish a secure connection between two computers

true

T/F: biometric authentication is the use of physical characteristics such as retinal images to provide identification

true

T/F: ethics refers to the principles of right and wrong that can be used by individuals to make choices to guide their behavior

true

T/F: in general, for digital goods, the marginal cost of producing another unit is about zero

true

T/F: malicious software programs referred to as MALWARE include a variety of threats such as computer viruses, worms, and Trojan horses

true

T/F: the domain name system (DNS) converts domain names to IP addresses

false. identify problem

T/F: the first step in the problem solving process is to develop alternative solutions

false

T/F: the key concepts in patent law are originality, novelty, and value

Digital Millenium Copyright Act (DMCA) of 1998

adjusts copyright laws to the internet age by making it illegal to circumvent technology-based protections of copyrighted materials

responsive web design (RWD)

allows websites to change layouts based on the user's screen resolution

worm

an independent computer program that copies itself from one computer to another over a network

project management

applying tools, methods, knowledge, and capabilities to deliver specific business objectives on time and within budget

object oriented development

combining collections of data and processes to produce systems

portals

companies like google, yahoo, FB that provide powerful search engines and also offer integrated packages of content and services like email, maps, calendars, shopping, music, etc

market creators

companies that build a digital environment where buyers and sellers can meet, display, products, search for products, and establish prices

community providers

companies that create an environment where people with similar interests can transact business, share interests, communicate, receive interest related information, and even play out fantasies by adoption online personalities called avatars

content providers

companies that distribute information content such as digital video, music, photos, text, ad artwork over the web

service providers

companies that offer services online like photo sharing, data backup, and storage alone with other services

Client, Server, Network Interface Device (unique identifier - NIC), Connection Medium, Network Operating System (NOS- routed and manages communications)

components of a simple computer network

twisted pair

connection medium benefit: inexpensive, easy to install and reconfigure drawback: highly susceptible to EMI, eavesdropping, and attenuation, unsuitable for high speeds

fiber-optic

connection medium benefit: very high bandwidth, low attenuation and immune to EMI and eavesdropping drawback:expensive cable and hardware, complex installation and maintenance

coaxial

connection medium benefit:higher bandwidth than twisted pair, lower susceptibility to EMI, eavesdropping and attenuation than twisted pair drawback: more expensive than twisted pair, more difficult to install, reconfigure, and manage attenuation than twisted pair, bulky

project

deliberate set of activities to deliver specific business objective

Information Systems Plan

describes how systems fit into the overall objectives, plan, and strategy of the organization

Local Area Network (LAN)

designed to connect personal computers and other digital devices within a half-mile

local e-commerce

e-commerce based on an individual's location

social e-commerce

e-commerce based on the idea of online relationships

the internet

large, worldwide collection of networks that use a common protocol to communicate; created in the early 1970s by DARPA (defense advanced research projects agency) to link scientists and professors, connect to internet by ISP (internet service provider)

internet

largest implementation of client/server architecture

Hypertext Markup Language (HTML)

lets you specify the structure of a document, format text, add graphics, sound, and video, and save it all in a text file that any computer can read

benefit of disintermediation

lower final costs to customer is a major

malware

malicious software programs

symmetric key encryption

method of encryption where a single encryption key is sent to the receiver so both sender and receiver share the same key

packet switching

method of slicing digital messages into parcels (packets), transmitting them along different communication paths, and reassembling them at their destinations


Conjuntos de estudio relacionados

Combined Blackdeathanton 840 Words - Greg MAT Vocab List

View Set

Abeka Investigating God's World Ch 4

View Set

WGU Introduction to Communication - C464

View Set

Bio Final Practice Exams & Review Questions

View Set

Chapter 52 - Dosage Calculations

View Set