Module 9
E-commerce sites sell this to generate income.
Advertising
Web sites such as NexTag and PriceGrabber are called ____ sites because they collect and organize data from other Web sites and transmit it to consumers.
Aggregate
Iterative SDLCs are often referred to as "____ methods" because they allow flexibility as development progresses.
Agile
During the design phase of an SDLC, if the project team selects a solution that requires custom programming, the team's systems analyst will create a set of ____ specifications.
Application
Most e-commerce actually occurs between businesses and is called the ____ model.
B2B
E-commerce model where businesses provide foods and services to individuals.
B2C
Which e-commerce classification encompasses online storefronts merchandise and services to consumers?
B2C
Craigslist is a popular _____ web site.
C2C
____ applications provide optimal information when they encompass customer support, marketing, and sales.
CRM
Occurs when you click a pop-up or banner advertisement on a web site and go to the advertiser's website.
Click-through
The maintenance phase of an SDLC includes all of the following except...
Convert data
Online shopping sites track items that you select using _____.
Cookies
C2C Web sites typically use this to connect buyers with sellers and still protect everybody's privacy.
E-mail forwarding
As the design phase of an SDLC begins, programming languages, development tools, and application software needed for the new information system are purchased, installed, and tested to ensure that they work correctly.
False
The acronym ERP stands for enterprise real-time payment.
False; Enterprise Resource Planning
____ is the fraudulent use of someone's personal information to carry out transactions.
Identity theft
A ____ system collects, stores, and processes data to provide useful, accurate, and timely information typically within the context of an organization
Information
A ____ rating of 150,000 hours means that, on average, a device could function for 150,000 hours before failing.
MTBF
Which of the following is not a step that a data breach victim should take?
Purchase a new computer or device
System ____ are the criteria for successfully solving problems identified in an information system.
Requirements
A standard protocol for securing credit card transactions over the Internet.
SET
An expert system ____ is a software tool containing an interference engine and a user interface that developers use to enter facts and rules for a knowledge base.
Shell
Data centers are designed to proactively reduce the risk of data loss that might occur as a result of a disaster.
True
Technically, a supply chain stretches from raw materials and parts all the way to customer delivery.
True
A ____ system consists of hardware and application software designed to offer a complete information system solution.
Turnkey
The current standard for object-oriented documentation is referred to as...
UML
The planning phase of an SDLC includes all of the following except....
Writing a requirements report
When you make purchases over the Internet, you are engaging in ____.
e-commerce
Most modern transaction processing systems use ________ processing—a real-time method in which each transaction is processed as it is entered.
online
One type of decision support system, called an executive information system, is designed to provide senior managers with information relevant to ___________ management activities such as setting policies, planning, and preparing budgets.
strategic