MIS Exam 3
C2C
Consumers selling directly to other consumers
Star network
LAN topology configured in the shape of a star with all nodes or workstations connected to a central hub through which all messages pass
Bus network
LAN topology configured in the shape of an open-ended line with all nodes or workstations able to receive the same message at the same time
Ring network
LAN topology configured in the shape or a circle with each node connecting to the next node; messages travel around the circle in one direction
virus
a software program that attached itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions
mobile e-commerce
business transacted from mobile phones
HTTP (Hypertext Transfer Protocol)
telecommunication standard used to transfer pages on the web
Unit Testing
test individual units or pieces of code for a system
HIPAA (Health Insurance Portability and Accountability Act)
the legal act that outlines medical security and privacy rules
internet
the most universal and powerful WAN
data flow diagram
the primary tool for representing a system's component processes and the flow of data between them
Internet2
the private Internet system that links government supercomputer centers and a select group of universities; it runs more than 22,000 times faster than today's public infrastructure and supports heavy-duty applications; 100Gbps testing network for testing
Hypertext Transfer Protocol (HTTP)
the set of standards used by web servers to process user requests for web pages
e-commerce
the use of the internet, the web, and mobile apps to transact business
behavioral targeting
tracking the clicksteams of history of clicking behavior of individuals on thousands of websites for the purpose of understanding their interests and intentions
computer aided software engineering
use of software to produce system design specifications and development by automating the generation of graphics, screens, reports, etc
Rapid Application Development (RAD)
use of visual programming to create software systems quickly
Voice-over IP (VoIP)
uses IP to deliver voice information in digital form using packet switching
DDoS (Distributed Denial of Service)
using numerous computers to inundate and overwhelm a network from numerous launch points is an attack called:
VoIP (Voice over Internet Protocol)
using the internet protocol to deliver voice over information in digital form using packet switching
Grantt Chart
visually represents the timing,duration, and human resource requirements of project tasks
FIP principle of Notice/Awareness
websites must disclose their information practices before collecting data
subscription
websites that offer content or services by charging a fee payment for access to some or all of its offerings on an ongoing basis
feasibility study
what is included in the systems analysis that is used to determine whether the solution is achievable from a financial , technical. and organizational standpoint?
increase in data quality
which is NOT a current key technology trend raising ethical issue
assign responsibility
which is NOT one of the five steps discussed as a process of analyzing an ethical issue
advertising
generating revenue by attracting a large audience of visitors to be exposed to advertisement
GPS location
geoadvertising sends ads to users based on their:
e-tailers
giant and tiny online retail stores
Patent Law
grants the owner an exclusive monopoly on the ideas behind an invention for 20 years
PERT Chart
graphically depicts project tasks and their interrelationships, showing specific activities that must be completed before others can start
switches
have great intelligence and can filter and forward data to a specific destination on the network
ethical "no free lunch" rules
if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for his work
worm
independent software programs that propagate themselves to disrupt the operation of a computer networks or destroy data and other programs
Metropolitan Area Network (MAN)
network that spans a metropolitan area, usually a city and its major suburbs; typically use a wireless infrastructure as well as high-speed connections using fiber optic technologies
(WSNs)wireless sensor networks
networks of interconnected wireless devices that are embedded in the physical environment to provide measurements of many points over large spaces
IPv6
new version of IP addressing scheme which uses 128-bit addresses or more than a quadrillion unique addresses
free/premium
offering basic service or content for free while charging a premium for advances or special features
business continuity planning
planning that focuses on how a company can restore business operations after disaster strikes
opt-in model
prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use
copyright law
protects the authors of a book from having their work copied by others
Radio Frequency Identification (RFID)
provide powerful technology for tracking the movement of goods through the supply chain; uses tiny tags with embedded microchips to transmit data about an item to a reader that passes data on to network; do no require a line of sight
Domain Name System (DNS)
provides a service analogous to an address book lookup; dedicated to performing the translation from domain name to IP address
CASE (computer aided software engineering)
provides software tools to automate development methodologies and reduce the amount of repetitive work in systems development
transaction fee
receiving a fee for enabling or executing a transaction
B2C
retailing products and services to individual shoppers
B2B
sales of goods and services among businesses
sales
selling goods, information, or services to a customer
affiliate
sending visitors to other websites in return for a referral fee
protocol
set of rules and procedures governing transmission of information between two points in a network
transaction brokers
sites that process transactions that are normally handles in person, over the phone, or by mail
web server
software for locating and managing stored Web pages
Wide Area Network (WAN)
spans large geographical distances; typically used to connect two or more LANs
network operating system (NOS)
special software that routes and manages communications on the network and coordinates network resources
phishing
a form of spoofing that involves setting up fake websites or sending email messages that look like those of legitimate businesses to ask users for confidential personal data
Joint Application Design (JAD)
a group-based tool for quickly collecting user requirements and creating system designs
MAN (Metropolitan Area Network)
a network that spans a city, and sometimes its major suburbs as well
Virtual Private Network (VPN)
a secure connection between two points across the Internet to transmit corporate data; low-cost alternative to a private network
private industrial network (private exchange)
a secure website that links a large firm to its suppliers and other key business partners
Trojan Horse
a software program that appears legitimate but contains a second hidden function that may cause damage
cyberwarfare
A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
IP address
A number that uniquely identifies each computer or device connected to the Internet.
protocol
A set of rules governing the exchange or transmission of information between two points in a network; TCP/IP
world wide web
A system with universally accepted standards for storing, retrieving, formatting, and displaying information in a networked environment.
doubling of computer power, declining data storage cots, data analysis advances, networking advances, growth in mobile devices
Key technology trends that raise ethical issues
TCP/IP
Protocol provides a universally agreed-on method for breaking up digital messages into packets, routing them to the proper address, and then reassembling them into coherent messages
true
T/F: SSL is a protocol used to establish a secure connection between two computers
true
T/F: biometric authentication is the use of physical characteristics such as retinal images to provide identification
true
T/F: ethics refers to the principles of right and wrong that can be used by individuals to make choices to guide their behavior
true
T/F: in general, for digital goods, the marginal cost of producing another unit is about zero
true
T/F: malicious software programs referred to as MALWARE include a variety of threats such as computer viruses, worms, and Trojan horses
true
T/F: the domain name system (DNS) converts domain names to IP addresses
false. identify problem
T/F: the first step in the problem solving process is to develop alternative solutions
false
T/F: the key concepts in patent law are originality, novelty, and value
Digital Millenium Copyright Act (DMCA) of 1998
adjusts copyright laws to the internet age by making it illegal to circumvent technology-based protections of copyrighted materials
responsive web design (RWD)
allows websites to change layouts based on the user's screen resolution
worm
an independent computer program that copies itself from one computer to another over a network
project management
applying tools, methods, knowledge, and capabilities to deliver specific business objectives on time and within budget
object oriented development
combining collections of data and processes to produce systems
portals
companies like google, yahoo, FB that provide powerful search engines and also offer integrated packages of content and services like email, maps, calendars, shopping, music, etc
market creators
companies that build a digital environment where buyers and sellers can meet, display, products, search for products, and establish prices
community providers
companies that create an environment where people with similar interests can transact business, share interests, communicate, receive interest related information, and even play out fantasies by adoption online personalities called avatars
content providers
companies that distribute information content such as digital video, music, photos, text, ad artwork over the web
service providers
companies that offer services online like photo sharing, data backup, and storage alone with other services
Client, Server, Network Interface Device (unique identifier - NIC), Connection Medium, Network Operating System (NOS- routed and manages communications)
components of a simple computer network
twisted pair
connection medium benefit: inexpensive, easy to install and reconfigure drawback: highly susceptible to EMI, eavesdropping, and attenuation, unsuitable for high speeds
fiber-optic
connection medium benefit: very high bandwidth, low attenuation and immune to EMI and eavesdropping drawback:expensive cable and hardware, complex installation and maintenance
coaxial
connection medium benefit:higher bandwidth than twisted pair, lower susceptibility to EMI, eavesdropping and attenuation than twisted pair drawback: more expensive than twisted pair, more difficult to install, reconfigure, and manage attenuation than twisted pair, bulky
project
deliberate set of activities to deliver specific business objective
Information Systems Plan
describes how systems fit into the overall objectives, plan, and strategy of the organization
Local Area Network (LAN)
designed to connect personal computers and other digital devices within a half-mile
local e-commerce
e-commerce based on an individual's location
social e-commerce
e-commerce based on the idea of online relationships
the internet
large, worldwide collection of networks that use a common protocol to communicate; created in the early 1970s by DARPA (defense advanced research projects agency) to link scientists and professors, connect to internet by ISP (internet service provider)
internet
largest implementation of client/server architecture
Hypertext Markup Language (HTML)
lets you specify the structure of a document, format text, add graphics, sound, and video, and save it all in a text file that any computer can read
benefit of disintermediation
lower final costs to customer is a major
malware
malicious software programs
symmetric key encryption
method of encryption where a single encryption key is sent to the receiver so both sender and receiver share the same key
packet switching
method of slicing digital messages into parcels (packets), transmitting them along different communication paths, and reassembling them at their destinations