MOTHERLOAD 226

Ace your homework & exams now with Quizwiz!

unit price

the price or cost of one unit ex: box gallon yard

Enterprise resource planning

the worlds largest and most complex ES; they focus primarily on the internal operations of an organization and they integrate functional and cross-functional business processes ex:Finance and Accounting

Productivity Tools

these assist normal office work; include word processors, spreadsheets, presentation tools, file/database software, etc

Twisted Pair Cable

this type of tangible media has a low bandwidth and is used for telephones

Coaxial Cable

this type of tangible media has a moderate bandwidth and is used for music, voice, video, etc

goods receipt document

this verifies that the specified goods have been received

Peer-to-Peer (P2P) File Sharing

used to locate and download files from any online computer through Internet using applications such as Limewire

Goods Receipt Document

verifies that the specified goods have been received

my maps

web 2.0 product that provides tools which users can make mods to maps provided by google

Compliance

Adherence to both the letter and the intent of relevant laws and regulations

What is an example of B2C? [Chapter 7, page 198, moderate] a. desk b. manual c. tax return d. CD

D

Domain Name

IP address expressed in natural language

Database Administrator (DBA)

Job title focused on directing, performing, or overseeing activities associated with a database or set of databases

Explicit Knowledge

Knowledge that is readily codified, such as the knowledge in a magazine or book. Example: The definition term what is a mid-ocean ridge

customer lifetime value (CLV)

The present value of the likely future income stream generated by an individual purchaser

e-commerce

The use of the internet and the web to transact business. It digitally enabled commercial transactions between and among organizations and individuals

data integrity

accuracy of data

transaction

any business exchange

Bit

binary digit (a 0 or 1)

Composite Key

combination of fields that serve as a primary key

E-discovery

refers to identifying and retrieving relevant electronic information to support litigation efforts

Scalability

refers to the ability of a site to increase in size as demand warrants

Solid State Disk

storage media that does not have latency time

Chapter 6 moderate p. 168 1. What is a methodology where developers would create a system based on a set of requirements and then test and debug it with little attention to any reproject analysis or developmental design? A) build-and-fix model B) waterfall model C) evolutionary model D) logical data model

answer a

IEEE 802.11

a family of wireless protocols known as Wi-Fi (wireless fidelity); supports wireless communication within 100 meters of router

Primary Key

a field by which records are uniquely identified; each record in the table must have a unique key value (found in a Relational Model)

Entity -

a generalized lass of people, places, or things for which data is collected, stored, and maintained

Instant messaging

a method that allows two or more people to communicate online using the internet

Extranet

a network based on web technologies that links selected resources of a company's intranet with its customers, suppliers, or other business partners

Local area network (LAN)

a network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building

Personal area network (PAN)

a network that supports the interconnection of information technology within a range of 33 ft or so

Browser Parasite

a program that can monitor and change the settings of a user's browser

browser

a program that processes HTTP protocol; receives, displays, and processes HTML documents and transmits responses

Secure Sockets Layer (Ssl)

a protocol that secures communications between the client and the server

hot site

a remote processing center, run by a commercial disaster-recovery service, that provides equipment a company would need to continue operations after a natural disaster.

Database

a repository database that supports management decision making; holds current information (+ ____???)

Customer Relationship Management (Crm) System

a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to "know the customer"

Virtual private network (VPN)

a secure connection between two points on the internet

Transistor

a semiconductor that can represent binary code's two states

Software as a service (SaaS) -

a service that allows the folks to subscribe to software online by paying a monthly fee, or by their amount of usage, or per-use, of however in the world they dream up

Voice-to-text service

a service that captures voice mail messages, converts them to text, and sends them to an email account

Digital subscriber line (DSL)

a service that delivers high-speed internet access to homes and small businesses over the existing phone lines of the local telephone network

Accessibility Rules

a set of design objectives that ensure disabled users can effectively access your site

Brand

a set of expectations that consumers have when consuming, or thinking about consuming, a product or service from a specific company

Transmission Control Protocol / Internet Protocol(TCP/IP)

a set of important and related protocols where ______ ensures packets arrive accurately and in proper order and ______ ensures efficient delivery of packets from node to node

Business Model

a set of planned activities designed to result in a profit in a marketplace

Business Strategy

a set of plans for achieving superior long-term returns on the capital invested in a business firm

Brand Strategy

a set of plans for differentiating a product from its competitors, and communicating these differences effectively to the marketplace

Privacy Policy

a set of public statements declaring to your customers how you treat their personal information that you gather on the site

Protocol

a set of rules and standards for data transfer

Telecommunications protocol

a set of rules that governs the exchange of information over a communications medium

Ip Multicasting

a set of technologies that enables efficient delivery of data to many locations on a network

Digital signal

a signal that represents bits

Radio frequency identification (RFID)

a technology containing circuity that allows recording of information about a product

unified communications

a technology solution that provides a simple and consistent user experience across all types of communications such as instant messaging, fixed and mobile phone, email, voice mail, and web conferencing

Switch

a telecomm. Device that uses the physical device address in each incoming message on the network to determine to which output port is should forward the message to reach another device on the same network

Metropolitan area network (MAN)

a telecommunications network that connects users and their devices in a geographical area that spans a campus or city

Wide area network (WAN)

a telecommunications network that ties together large geographic regions

Broadband communications

a telecommunications system in which a very high rate of data exchange is possible

Private branch exchange (PBX)

a telephone switching exchange that serves a single organization

Cache

a temporary storage space to speed up IP address mapping by avoiding nameserver visits

Frequently Asked Questions (Faqs)

a text-based listing of common questions and answers

Certification Authority (Ca)

a trusted third party that issues digital certificates

Client-server

a type of LAN where a single computer controls the network

Sniffer

a type of eavesdropping program that monitors information traveling over a network

Value-Added Networks (VANs)

a type of network with enhanced services offered by outside vendors; provide reliability, management, and maintenance of networks for an organization

System Software

a type of software that enables applications to run on a computer and that manages components and devices

One-to-many relationship

a type of table relationship where one item in a table is linked to many items in the other table

Near field communications (NFC)

a very short-range wireless connectivity technology designed for cell phones and credit cards

tunnel

a virtual, private pathway over a public or shared network from the VPN client to the VPN server

friction-free commerce

a vision of commerce in which information is equally distributed, transaction costs are low, prices can be dynamically adjusted to reflect actual demand, intermediaries decline, and unfair competitive advantages are eliminated

analog signal

a wavy signal. a modem converts the computer's digital into analog signals that can be transmitted over dial-up Internet connections.

Hypertext

a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation files

telecommuting

a work arrangement whereby employees work away from the office using personal computers and networks to communicate via email with other workers and to pick up and deliver results

Which application allows sharing of flashcards and wiki notes, communication with classmates, and helps you find a tutor? a. Studyblue.com b. Twitter c. Survey monkey d. Photobucket

a)

Which of these is not an advantage for doing business online? a. expansion of niche marketing opportunity b. cheaper electronic transactions c. decreased competition due to niche markets d. none of the above

answer c

Cybervandalism

intentionally disrupting, defacing, or even destroying a site

Exchange

an independent digital electronic marketplace where suppliers and commercial purchasers can conduct transactions

https

an indication that a web browser is using the SSL/TLS protocol to ensure secure communication

Java

an object-oriented programming language from sun Microsystems based on C++ that allows small programs to be embedded within an HTML document

Word Processors

an office productivity application that is used to create text documents

Virtual private network (VPN)

can be an alternative to creating a LAN; utilizes the internet (a public network), to simulate a ________ that only authorized users can access

Application Suite

collection of management systems that offer an enormous amount of functionality and cover most of the standard business processes of a company

mashup

combination of output from two or more web sites into a single user experience

Routers

computing devices that connect networks and exchange data between them

Customer Relationship Management (CRM)

connect a company's ERP system to those of its customers

Graphical user interface (GUI) -

icons instead of text. Like modern day windows

channel conflict

in e-commerce a conflict that may result between a manufacturer that wants to sell products directly to consumers and the retailers in the existing sales channels

price conflict

in e-commerce a conflict that may result when manufacturers offer products at prices lower than those available through existing sales channels

Customer Co-Production

in the Web environment, takes customization one step further by allowing the customer to interactively create the product

server tier

in the three tier architecture the tier that consists of computers tha run web servers to generate web pages and other data in response to requests from browsers.

web 2.0

loose cloud of capabilities, technologies, business models, and philosophies that characterize the new and emerging business uses of the Internet.

System administrator

manages an organization's computer operating systems; must ensure that operating systems work together, support business requirements, and function properly

Enterprise Resource Planning system (ERP)

manages daily operations and facilities planning

Supplier Relationship Management (SRM)

manages overall relationships with materials suppliers

Selecting -

manipulating data to eliminate rows according to certain criteria

Many-to-many relationship

many items in a table are linked to many items of the other table

Telemarketing

marketing over the telephone; caller has large database of consumer data

Supply chain management

monitoring, controlling, and facilitating supply chains; logistics

Operating system (OS)

most important program on the computer; recognizes input, sends output to screen, keeps track of files, runs applications, and manages memory

Supercomputers

most powerful computers at any given time; often used by government

Redundancy

multiple duplicate devices and paths in a network

Hardware

physical components of computers and related electronic devices

Cable Modem

piggybacks digital Access to the Internet on top of the analog video cable providing television signals to a home

Advertising Networks

present users with banner advertisements based on a database of user behavioral data

systems analysis and design

process of creating and maintaining information systems (systems development)

Centralized processing

processing alternative in which all processing occurs at a single location or facility

Distributed processing

processing alternative in which computers are placed at remote locations but are connected to each other via a network

Database management system (DBMS)

program used to build databases, populate a database with data, manipulate data in a database

Application-specific software

programs designed to perform specific jobs

General-purpose application software

programs that serve multiple purposes; this usually comes as packaged software

dashboards

provide a sort of heads-up display of critical indicators, letting managers get a graphical glance at key performance metrics

drill down

providing great details about purchase orders; is possible bc all the data are stored in a common database and therefore can be accessed as and when they are needed

Extensible markup language (XML)

the markup language for web documents containing structured information, including words, pictures, and other elements

Machine Language

the only language that hardware understands; it consists of long strings of 0s and 1s

Database Administrator (DBA)

the person responsible for managing the database; sets user limits for access to data in the database

Data cleanup -

the process of looking for and fixing inconsistencies to ensure that data is accurate and complete

Personal productivity software -

the software that gets all that done.

Hypertext markup language (HTML)

the standard page description language for web pages

Counterintelligence -

the steps an organization takes to protect information sought by "hostile" intelligence gatherers

Biometrics

the study of measurable biological or physical characteristics

personalization

the targeting of marketing messages to specific individuals by adjusting the message to a person's name, interests, and past purchases

RAM

this is random access memory; it is a volatile form of Internal memory

ROM

this is read-only memory; it is a nonvolatile form of internal memory

Driver

this is something that links the operating system with the hardware

Attribute

this is the field or column in a Relational Model

Universal Serial Bus (USB)

this is the port that connect flash drives to a computer or other device

Record

this is the row in a Relational Model

Enterprise sphere of influence -

this is the sphere of influence that supports the firm in its interaction with the environment

Relation

this is the table of records in a Relational Model

Structured Query Language (SQL)

this is the top choice for DBMSs; it's an international standard, has easy-to-remember and intuitive commands

boxes

this part of an entity relationship diagram identifies entities

crossbars

this part of an entity relationship diagram indicates the mandatory fields

circles

this part of an entity relationship diagram indicates the optional fields

lines

this part of an entity relationship diagram indicates the relationship between entities

Cookie

A small bit of data, usually created by programs running on the server, stored on the client machine, and passed back and forth in the HTTP request and response. e.g., When shopping on Amazon, this is created to store the name of the visitor (consumer)on the client machine.

2. Knowledge work Activities include all of the following EXCEPT: [Chapter 3, pg. 57, Figure 3.1, Moderate] a) Discovery b) Transformation c) Analysis d) Integration

D) INTEGRATION

Web 2.0

A set of applications and technologies that allows users to create, edit, and distribute content; share preferences, bookmarks, and online personas; participate in virtual lives; and build online communities

Authentication Procedures

include the use of digital signatures, certificates of authority, and public key infrastructure

smart card

a plastic card similar to a credit card that has a microchip. normally requires a PIN

Client

a powerful personal computer that is part of a network

Data Mining

a set of analytical techniques that look for patterns in the data of a database or data warehouse, or seek to model the behavior of customers

Transaction Processing System (TPS)

a system that records transactions and processes transactions

customer lifetime value (CLV)

The present value of the likely future income stream generated by an individual purchaser.

Key

a field whose values identify records; used to retrieve records (found in a Relational Model)

asymmetrical digital subscriber line (adsl)

dsl lines that have different upload and download speeds

data redundancy

duplication of data

Accounting information system

receives information from transaction processing systems (TPSs); automatically routes purchases to accounts payable; automatically routes sales to accounts receivable

Transaction processing systems (TPS)

records any transaction

Direct Access

records are organized by physical address on the device; a record can be accessed randomly

Transaction Log

records user activity at a Web site

Router

routes data packets to the next node on the path to the final destination

Inventory turns

the number of times the business sells its inventory per year

Programming

the process of writing programs

System

array of components that work together to achieve goal or goals (it does so by accepting input, processing it, and producing output in an organized manner)

Market Creator

builds a digital environment where buyers and sellers can meet, display products, search for products, and establish a price for products

SAP

"Systems Applications and Products", pioneered the packaged applications approach

What advantage does a lower tier country have over a higher tier in terms of outsourcing? a. Increased population size leads to higher competition for incoming jobs b. Greater education opportunities makes individuals more attractive to potential employers c. Lower labor costs, so more jobs will be brought into the country rather than removed d. Higher numbers on "e-readiness" rankings means that the country is likely to become technologically advanced in the near future

A

What structure is most commonly used in e-commerce transactions? a. N-tier b. Fat client c. 2-tier d. Thin client

A

Unstructured Decision

A decision is characterized by uncertain data or information and for which there may be no known method for arriving at a solution. Example: You are late for work and you see stopped traffic ahead due to an accident scene. Will a longer, alternative route be quicker?

Internal Stakeholder

A person, or entity within the system boundaries that has an interest and an influence on how a business will function in order to succeed;

Amdahl's Law

A system's speed is determined by its slowest component.

HTTP

A web protocol that provides the rules used by browsers and servers as they communicate requests for data and responses between each other.

Which of the following is NOT an example of a business-to-consumer (B-2-C) transaction website? a. www.landsend.com b. www.overstock.com c. www.irs.gov/business d. www.amazon.com

ANSWER: c FROM: Chapter 7, page 197 DIFFICULTY: medium

Expert System

An IS that can capture and store the knowledge of a human expert, so that the organization can permanently store and share that knowledge. Example: Heuristic DENDRAL (later shortened to DENDRAL) was a chemical-analysis expert system. The substance to be analyzed might, for example, be a complicated compound of carbon, hydrogen, and nitrogen. Starting from spectrographic data obtained from the substance, DENDRAL would hypothesize the substance's molecular structure. DENDRAL's performance rivaled that of chemists expert at this task, and the program was used in industry and in academia.

Point-To-Point Tunneling Protocol (Pptp)

An encoding mechanism that allows one local network to connect to another using the Internet as the conduit

fiber to the home (FTTH)

Broadband service provided via light-transmitting fiber-optic cables

DSL

Broadband technology that uses the wires of a local telephone network.

broadband

Broadly refers to high-speed Internet connections and is often applied to "last-mile" technologies.

Which of the following is a social messaging utility? (bonus application, moderate) a. pandora b. gin system c. twitter d. teradata

C. Twitter

6. Which of the following is NOT one of the three parts of a feasibility study? [chapter 6, slide 5, hard] a. Technical Analysis b. Organizational Analysis c. Stakeholder Analysis d. None of the Above e. All of the Above

C

7. Entity-Relationship Diagram (ERD), is a model used in what kind of design? [chapter 6, page 171, moderate] a. Data Warehouse b. File Processing c. Relational Database d. Querying e. Communications

C

Public Key Infrastructure (Pki)

CAs and digital certificate procedures that are accepted by all parties

CDMA

Code Division Multiple Access, cannot support voice and data simultaneously

The World is Spiky

Coined by Richard Florida, the counter-perspective to Thomas Friedman's flat world, indicating that there are still large disparities between global economies (or, spikes of commerce)

Synthesis

Creating wholes from parts and allows you to discover trends or patterns that seem to explain the past and the present, and may suggest courses of action likely to favorably influence the future. Example: You typically synthesize the results of an analysis to develop potential solutions for a problem.

Fourth Generation E-commerce

Current model of e-commerce that supports automatic interaction between applications

Enterprise Wide System

Def: An information system that ingrates and standardizes processes, and centralizes the storage and management of data of a business with the goal of increasing operational efficiencies in business processes Ex: Business's deployment of a enterprise resource planning system

Business Intelligence (TPS)

Def:A process that enables business leaders to make better decisions for gaining competitive advantage through the intelligent use of data and information in decision

Purchase Requisition

Document that identifies the material needed, the quantity needed, and the date it is needed

5. Which of the following is NOT a disadvantage of file systems? [chapter 5, slide 9, moderate] a. Data Redundancy b. Data Dependence c. Data Inaccessibility d. Poor File Management e. Data Independence

E

Third Generation E-commerce

E-commerce that supports electronic transactions - for example, Paypal

risk avoidance

Eliminating the possibility of a risk's occurrence

SaaS

Enables companies to acquire certain ES functionalities without physically installing software on their servers

Salesforce Automation

Equips traveling salespeople with information technology to improve productivity

FTTH

Fiber to the Home, fastest last mile technology

Fentocells

Improve wireless reception

knowledge

Insight derived from experience and expertise

broadband

Internet communication lines that have speeds in excess 256 kbps. dsl and cable modems have access

risk transfer

Moving risk to someone who is more able to deal with it such as a contractor

Cpu-Intensive

Operations that require a great deal of processing power

Communications Hardware

Provide the physical connection between a computer and a local network Example:Network Interface Card (NIC), Modems

Web Application Server

Software programs that provide specific business functionality required of a Web site

Mosaic

Web browser with a graphical user interface (GUI) that made it possible to view documents on the Web graphically

Modem

a telecomm. Hardware device that converts communications signals so they can be transmitted over the communication media

Problem

any undesirable situation

waterfall

fiction that one phase of sdlc can be completed in its entirety and the project can progress without any backtracking to the next phase of sdlc

Extranet

formed when firms permit outsiders to access their internal TCP/IP networks

System Testing

involves testing the site as a whole, in a way the typical user will use the site

Unit Testing

involves testing the site's program modules one at a time

Security Audit

involves the routine review of access logs (identifying how outsiders are using the site as well as how insiders are accessing the site's assets)

viral marketing

method used in web 2.0 in which users spread news about products and services

Cloud Computing

model of computing in which firms and individuals obtain computing power and software over the Internet

Bundling

offers consumers two or more goods for one price

First mover

organization that is first to offer a new product or service; usually results in superior brand name, better technology, more experience, or critical mass

Network Service Provider (Nsp)

owns and controls one of the major networks comprising the Internet's backbone

intenet

private network of networks

Exceptions

problems from established guidelines

Targeted marketing

promotes to people most likely to purchase products

public key/private key

special version of asymmetric encryption that is popular on the Internet.

Customer relationship management

systems connect a company's ERP system to those of its customers

Customer Relationship Management Systems (CRM)

systems for managing relations with customers

Price Dispersion

the difference between the highest and lowest prices in a market

Computer aided design (CAD)

tools to create, modify, and store designs and drawings electronically

analysis paralysis

when too much time is spent documenting project requirements

Digital Signature (E-Signature)

"signed" cipher text that can be sent over the internet

Which of the following is an application on Facebook? [Bonus Application presentation, Easy] a) Pandora b) Meeting Wizard c) iLike d) Google Calendar

C) iLike

Which of the following is not one of the benefits for B2C e-commerce for consumers? a.Lower Prices b.Shop 24/7 c.Improved customer service d.Consistent high Download Speeds e.None of the above

Answer (e)

online analytical processing (OLAP)

Data used in OLAP reporting is usually sourced from standard relational databases, but it's calculated and summarized in advance, across multiple dimensions, with the data stored in a special database called a data cube

8. Ron Swift is the Vice-president of Terabyte Inc. (guest speaker presentation, moderate) a. True b. False

False, Teradata

Public Key Cryptography

Two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner, and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot be used to unencrypt the message

Bot

Type of malicious code that can be covertly installed on a computer when attached to the Internet. Once installed, the bot responds to external commands sent be the attacker

True/false: the most common network architecture is the client/server architecture.

TRUE; A client runs an application that accesses information from a server. The client initiates requests and the server responds.

Database

a software application that stores records and attributes

Database Management System (Dbms)

a software application used by organizations to create, maintain, and access database

protocol

a standardized means for coordinating an activity between two or more entities

attribute

a variable that provides properties for an html tag

adwords

a web 2.0 advertising product from google. vendors agree to pay a certain amount to google for use of particular search words which link to the vendor's site

Intranet

a TCP/IP network located within a single organization for purposes of communications and information processing

virtual private network (VPN)

a WAN connection alternative that uses the internet or a private internet to create the appearance of a private point to point connections.

network of leased lines

a WAN connection alternative. communication lines are leased from telecommunication companies and connected into a network.

Asynchronous communications

a form of communications where the receiver gets the message after some delay - sometimes hours or days after the message is sent

Diffserv (Differentiated Quality Of Service)

a new technology that assigns levels of priority to packets based on the type of data being transmitted

Schema

a plan that describes the structure of the database including names and sizes of fields, identification of primary keys, relationships

access point

a point in a wireless network that facilitates communication among wireless devices and serves as a point of interconnection between wireless and wired networks.

Spyware

a program used to obtain information such as a user's keystrokes, e-mail, instant messages, and so on

Arpanet

a project started by the U.S. Department of Defense in 1969 as both an experiment in reliable networking and a means to link DoD and military research contractors, including many universities doing military-funded research

Post Office Protocol 3 (Pop3)

a protocol used by the client to retrieve mail from an Internet server

Gigapop

a regional Gigabit Point of Presence, or point of access to the Internet2 network, that supports at least one gigabit (1 billion bits) per second information transfer

Data Dictionary

a repository of information about the data and its organization

What is the last stage of an IS life cycle where the system loses its value? a. Retirement b. Transition c. Inception

a) Retirement

Bluetooth

allows devices to communicate within 10 meters; transmits voice and data; considered PAN technology

Virtual Private Networks (Vpn)

allows remote users to securely access internal networks via the Internet, using the Point-to-Point Tunneling Protocol (PPTP)

Digital Accumulating Balance Payment System

allows users to make micropayments and purchases on the Web, accumulating a balance for which they are billed at the end of the month

Wi-Fi (Wireless Fidelity)

also referred to as 802.11b, 802.11a (Wi-Fi5), and 802.16 (WiMAX). Wireless standard for Ethernet networks with greater speed and range than Bluetooth

11. Which of the following is NOT a B2B business model? (Chapter 7, slide 33, moderate) a. Exchange b. Community c. One-to-one d. Company-centric

Answer: b

8. Businesses often used client-scripting for: (Chapter 8, page 235, difficult) a. Persistent data b. Web holding c. Form controls d. Data validation

Answer: d

information asymmetry

Any disparity in relevant market information among parties in a transaction

Us-Cert

Division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors

Repeater

amplifies or regenerates signals

4. True or false: Analysis is creating wholes from parts. (Chapter 3, slide #10, easy)

FALSE; synthesis

True of False: The First Generation of E-Commerce is the most advanced, including dynamic content and complex automation.

False.

Purchase Order

an agreement to purchase the stated material, for the stated price, under the stated terms

wireless spectrum

Frequencies used for communication. Most mobile cell phone services have to license spectrum. Some technologies (such as Wi-Fi) use unlicensed public spectrum.

Internet Explorer

Microsoft's Web browser

Relational Database

Most common standard for expressing databases, whereby tables are related based on common keys

Onshoring

Outsourcing that occurs in the same country as a business. e.g., PayPal for eBay users is an example of a payment gateway.

Tablet Computer

PC in the form of a thick writing tablet that recognizes handwriting

Second Generation E-commerce

Phase of e-commerce that introduced dynamic content on the Web - for example, a web page that shows updated news stories

risk deferral

Postponing exposure to risk until circumstances are more favorable or resources are available to address the risk

opt-in

Program (typically a marketing effort) that requires customer consent. This program is contrasted with opt-out programs, which enroll all customers by default.

data

Raw facts and figures

asymmetric encryption

an encryption method whereby different keys are used to encode and to decode the message.

Advanced encryption standard (AES)

an extremely strong data encryption standard sponsored by the National Institute of Standards and Technology based on a key size of 128-bits, 192 bits, or 256 bits

True/False Mass customization and personalization are two types of customization used in e-commerce

True

Web Content Management System (Wcms, Webcms)

Used to create and manage Web content

User Datagram Protocol (UDP)

Works as a TCP stand-in for web transmissions, e-mail, and application downloads

Internet

Worldwide network of computer networks built on common standards

What is an IS consultant? a. An experienced individual that is trained to analyze and advise a client in order to help the client make the best possible choices. b. A person who fixes computers c. A person who is in charge of the technology department at a Computer Store d. A person who designs software

a

onboard NIC

a built in NIC

host

a computer connected directly to a backbone

Replicated database -

a database that holds a duplicate set of frequently used data

Output Device

a device that delivers results of computer processing; examples include monitors, printers, and speakers

beta program

a prerelease version of software, used for testing

security threat

a problem with the security of an information system or the data therein caused by human error, malicious activity or natural activities

Telnet

a terminal emulation program that runs in TCP/IP

social networking

connections of people with similar interests

Query-Driven Data Mining

data mining based on specific queries

b2g

e-commerce sale between companies and govt orgs

Scalability

ease of expanding a system

web farm

facility that runs multiple web servers.

perimeter firewall

firewall that sits outside the organizational network. first device the Internet traffic encounters

Database

large collection of related records

Bridge

networking hardware that connects two networks

Branding

process of brand creation

ieee 802.11 protocol

widely used today enables access within few hundred feet

Strategic Information system (SIS)

an information system that helps seize opportunities; company-wide and crosses departments

Lifestyle Group

an integrated pattern of activities, interests, and opinions

5. Which is not involved in a feasibility study? a. technical analysis b. financial analysis c. organizational analysis d. Inception

d. Inception

Storage

maintaining vast amounts of data and information

Free-on-board (FOB)

is the point which ownership of the material in the shipment legally transfers from one company to the other; shipping point-ownership switches to the buyer as soon as shipment is sent, destination-ownership does not change until the material has been delivered

data mining

is the process of using computers to identify hidden patterns in (and to build models from) large data sets Key areas where businesses leverage data mining include: Customer segmentation Marketing and promotion targeting Market basket analysis

In a database, each table has an individual key called the ____________. a. Foreign Key b. Map Key c. DBMS Key d. Primary Key

d. primary key

Sequential Storage

data is organized one record after another; one must read through all records that are stored prior to the desired record

linking -

data manipulation that combines two or more tables using common data attributes to form a new table with only the unique data attributes

Entity-relationship (ER) diagrams -

data models that use basic graphical symbols to show the organization of and relationships between data

Presentation tools

develop impressive presentations quickly

hypertext markup language (HTML)

language that defines the structure and layout of web page

Data warehouse

large database that usually stores transactional records

service pack

large group of fixes that solve low-priority software problems

Transport Services And Representation Standards Layer

layer of Internet architecture that houses the TCP/IP protocol

Network Technology Substrate Layer

layer of Internet technology that is composed of telecommunications networks and protocols

maintenance phase

fifth/final phase of sdlc which developers record requests for changes, and fix failures by means patches, service packs, and new releases.

Cash

legal tender defined be a national authority to represent value

Bargaining power

leverage to influence buyers and suppliers; achieved by being major competitor or eliminating competitors; uses purchase volume as leverage over suppliers

Online Catalog

list of products available on a Web site

Internet Service Provider (Isp)

firm that provides the lowest level of service in the multi-tiered Internet architecture by leasing Internet access to home owners, small businesses, and some large institutions

packet

group of bits transmitted together; they are transmitted independently, and may be routed through different paths

patch

group of fixes for high-priorit failures that can be applied to existing copies of a particular product.

test plan

groups of sequences of actions that users will take when using new system

network interface card (NIC)

hardware component on each device in a network that connects the device's circuitry to the communications line

suite application

have the advantage of containing most of the business processes needed to run a company in a tightly integrated package

Debit Card

immediately debits a checking or other demand-deposit account

Joint Table

composite of tables

Processing Center (Clearinghouse)

institutions that handles verification of accounts and balances

supplier relationship management

manage the overall relationships with the materials suppliers; contain functionality to manage the quotation and contracts process

Bandwidth

measures how much data can be transferred over a communications medium within a fixed period of time; is usually expressed in bits per second (bps), kilobits per second (Kbps), megabits per second (Mbps),or gigabits per second (Gbps)

Workstation

more powerful microcomputer used for CAD, CAM, and scientific applications

hardening

process of taking extraordinary measures to reduce a system's vulnerability.

identification

process whereby an information system identifies a user by requiring the user to sign on with a username and password

Flash Memory

rewritable memory chip that holds content without power; allows fast access time; is relatively immune to shock or vibration

Ad Server

server designed to deliver targeted banner ads

Mail Server

server that provides e-mail messages

Productivity tools

software applications that improve productivity

Master production schedule

specifies how production capactity is to be used to meet customer demands

data administration

staff function that pertains to all of an organization's dat assets. set data standards, develop policy, provide for data security

process-level information

status information Status of a purchase requisition / order (PO history) How much time does it take on average? Per material? Per vendor? Which vendors are prompt? Who habitually delivers late? What do we buy most often? From with vendor(s)?

human safeguards

steps taken to protect against security threats by establishing appropriate procedure for users to folow for system use

Domain Name System (Dns)

system for expressing numeric IP addresses in natural language

Decision support System (DSS)

system that SUPPORTS decision making; extrapolates data to predict outcomes...answers "what if?"

Geographic Information System (GIS)

system that is used to tie data to physical locations

Expert system (ES)

system that supports knowledge-intensive decision making; uses artificial intelligence techniques

Middleware Services Layer

the "glue" that ties the applications to the communications networks, and includes such services as security, authentication, addresses, and storage repositories

Authenticity

the ability to identify the identity of a person or entity with whom you are dealing on the Internet

key performance indicators

the current state of a process is measured against a standard definition of what is expected

Electronic data interchange (EDI)

the direct computer-to-computer exchange between two organizations of standard business transactions, such as orders, shipment instructions, or payments

User interface -

the element of the operating system that allows you to access and command the computer system

Netscape Navigator

the first commercial Web browser

beta testing

the process of allowing future system users to try out the new system on their own.

Web 2.0

the web as a computing platform that supports software applications and the sharing of information between users

Transmission control protocol (TCP)

the widely used transport-layer protocol that most internet applications use with IP

component design phase

third phase in sdlc in which developers determine hardware and software specifications, design the database, design procedures, and create job descriptions for users and operations personnel

Intangible Media

this is a category of communications media that includes Microwave radio technologies

Crow's feet

this part of an entity relationship diagram identifies "many"

Microwave Radio Technologies

this type of intangible media has about the same bandwidth as coaxial cable (moderate)

business intelligence

) combines reporting, data exploration and ad hoc queries, with sophisticated data modeling and analysis

ES Process

1.) Execute the Process 2.) Capture and Store Process Data 3.) Monitor the Process

HTML

A language for encoding the information so that a variety of IT devices, mainly Web browsers, can display it.

Table or file

A list of data, arranged in columns (fields) and rows (records)

Supply Chain

A network of facilities and distribution options that performs the functions of procurement of materials, transformation of these materials into intermediate and finished products, and the distribution of these finished products to customers.

Wide Area Network (WAN)

A network that connects computers which cover entire regions, countries, and even overseas, often collections of smaller networks, that require connection technology to cover the greater distances.

Java

A programming language that allows programmers to create interactivity and active content on the client computer, thereby saving considerable load on the server

data cube

A special database used to store data in OLAP reporting

Feedback

A special kind of output created by a business process that is then returned from the system ("fed back") in order to control the system's future inputs, processes, and outputs.

An extranet is a collaborative network that uses Internet technology to link businesses with their customers. [chapter 7, slide 46, moderate] a.True b.False

A. True

True/False: The IS project involves two things.

ANSWER: false FROM: Chapter 6 slides: slide 5 DIFFICULTY: medium

risk acceptance

Accepting risk and having contingency plans in place

IADD Model

Acronym for Investigate, Analyze, Decide, and Do. It is a model for problem solving in a knowledge organization.

10) How many generations of E-Commerce have there been? (chapter 8) (slide 4) a. 2 b. 3 c. 4 d. 5

Answer = C

12. Mytypeface.com is used to: [bonus application presentation, mytypeface.com, easy] a. Make personalized flashcards b. Create a personalized font c. Find your favorite music artists d. Look at and organize your pictures

B

Anyone outside of a company can access the 'best practices' data of a company a. True b. False

B. False

Which of the following is not a stage of IS development? A. Inception B. Retirement C. Motivation D. Construction

C. Motivation

C2C e-commerce

Consumers selling to other consumers

What is the primary language for creating Web pages? A. HTTP B. URL C. JavaScript D. HTML

D

Which of the following are NOT one of the four primary components of a typical e-commerce site? A. The Merchant Account B. The Payment Gateway C. The Shopping and Ordering System D. The Customer Account E. The Security System

D. The Customer Account

Transaction data

Data connected to a specific instance (quantity, date shipped)

Data Mart

Def:Data set, often a scaled-down data warehouse, usually tailored to the needs of a specific group within a organization Ex: A business's data specifically geared to the support of their marketing group

Master Data

Define the key entities with whom an organization interacts, such as customers and suppliers

Column or field

Defines the data that a table can hold

Packaged Applications

Generic software that can be used by many companies

GSM

Global System for Mobile Communications, most common 3G standard simultaneously

systems analysts

IS professionals who understand both business and technology

marketplace

Physical space you visit in order to transact

I/O Intensive

Requires input/output operations rather than heavy-duty processing power

Customer Relationship Management system (CRM)

SYSTEM THAT SERVES CUSTOMERS

Efficiency

THE RELATIONSHIP BETWEEN RESOURCES EXPENDED AND BENEFITS GAINED IN ACHIEVING A GOAL

last-mile technologies

Technologies that connect end users to the Internet. The last-mile problem refers to the fact that these connections are usually the slowest part of the network.

e-business

The digital enabling of transactions and processes within a firm, involving information systems under the control of the firm

Knowledge Work

The intellectual activities that people perform upon data, information, and knowledge in order to discover business options. Example: A student who studies from a book, takes notes in class performs this activity toward his classes.

World Wide Web

The most popular service that runs on the internet; provides easy access to web pages

Encryption

The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver. The purpose of encryption is (a) to secure stored information and (b) to secure information transmission

public switched data network (PSDN)

a WAN connection alternative. network of comps and leased lines developed and maintained by vendor that leases time on the network to other orgs.

Data dictionary -

a detailed description of all the data used in the database

Data

a given or fact

Query

a message to the database requesting data from specific records and/or fields

Software

a series of instructions to a computer to execute processes

Byte

a standard group of eight bits

Session Key

a unique symmetric encryption key chosen for a single secure session

The language that guides the display of a requested page: a) HTML b) HTTP c) XML d) WWW

a) HTML

2. When discussing memory, ROM is used to control the start up process whereas RAM is temporary and lost when the computer shuts down. [chapter 2, slide 6, easy] a) true b) false

a) true

JetBlue

airline company that entered a formerly hurting market with great success

Hacker

an individual who intends to gain unauthorized access to a computer system

spyware

benign program installed on computer without user knowledge and keeps track of actions, keystrokes etc.,

invoice

bill for the material shipped which is sent to accounting for payment

Critical mass

body of clients that is large enough to attract other clients

A ______ decision is one that involves some uncertainty or doubt about the outcome of it. a) structured b) unstructured c) semistructured d) relatively structured

c) semistructured

Business Objectives

capabilities you want your site to have

Subsystem

component of larger system

Who is charged with the governance of most IT and IS in most businesses? a. CFO b. CAO c. CEO d. CIO

d) CIO

Enterprise data modeling -

data modeling done at the level of the entire enterprise

System Software

deals with essential operations between the user and computer such as managing memory resources, loading/copying/deleting files, encompasses compilers and interpreters

b2c

e-commerce sales between a supplier and consumer/retailer

personal identification numbers (PIN)

form of authentication whereby a user supplies a number that only he knows

Black Hats

hackers who act with the intention of causing harm

Chief technology officer (CTO)

has similar duties as CIO

Vertical Scaling

increasing the processing power of individual components

Internet

public internet

Hardware Platform

refers to all the underlying computing equipment that the system uses to achieve its e-commerce functionality

Channel

refers to different methods by which goods can be distributed and sold

denial of service (DOS)

security problem in which users are not able to access an IS; can be caused by human errors, natural disasters, or malicious activity

Digital Checking Payment System

seeks to extend the functionality of existing checking accounts for use as online shopping payment tools

Flash Drives

small storage devices that connect via USB

Middleware -

software that allows different systems to communicate and exchange data

data layer

stores information (your contacts)

Subculture

subset of cultures that form around major social differences

Computer-based Information system

system with one or more computers at center

product life cycle management

systems help companies administer the processes of research, design, and product management

Computer aided manufacturing (CAM)

systems that instruct machines how to manufacture parts and assemble products

Simple Mail Transfer Protocol (Smtp)

the Internet protocol used to send mail to a server

richness

the complexity and content of a message

Workgroup sphere of influence -

the sphere of influence that affects the workgroup

Distance learning

the use of telecommunications to extend the classroom

user tier

tier in three tier architecture that consists of computers that have browsers that request and process web pages

Loading Phase

transfer files to data warehouse; 3rd phase of transferring data to data warehouse

Physical Design

translate the logical design into physical components

Modem

translates communication signals from analog to digital and vice versa

biometric authentification

use of personal physical characteristics to authenticate users

adsense

web 2.0 product from google that searches an org's we site and inserts ads that match content on that site; when users click those ads google pays the org a fee

Output

what is produced by the information system; includes devices such as printers and speakers

Cracker

within the hacking community, a term typically used to denote a hacker with criminal intent

Command-based user interface -

you gotta type in there what you want the thing to do. There ain't no icons, graphics, or none of that kinda like old school DOS

P2P e-commerce

Use of peer to peer technology, which enables internet users to share files and computer resources directly without having to go through a central web server, in e-commerce

brook's law

"adding more people to a late project makes the project later"

White Hats

"good" hackers who help organizations locate and fix security flaws

data mining critical conditions

1 The organization needs clean, consistent data 2 The events in the data should reflect current and future trends

9) Match the following: 1. B2C a. Online equivalent of retail store as well as other services 2. B2B b. Use of online auctions like eBay or Yahoo! Auctions 3. B2G c. Electronic payment of taxes as well purchasing licenses 4. C2G d. Electronic exchanges between companies 5. C2C e. Online sales to government agencies as well as online Payment of taxes

1a, 2d, 3e, 4c, 5b

Which country is not apart of the 'Three 'I'?' 1) Israel 2) Ireland 3) India 4) Indonesia

4) Indonesia

Which of the following are network benefits: 1) efficient communication 2) effective resource management 3) complete, accurate, reliable, recent, and timely information 4) expanded marketing and customer service capabilities 5) all of the above

5) all of the above

data mart

: A database or databases focused on addressing the concerns of a specific problem

data warehouse

: A set of databases designed to support decision making in an organization

Neural network

: Examines data and identifies patterns in models for prediction and control. (Simulates the functioning of the brain.)

Which of the following is not one of the four primary components of a typical e-commerce site? [chapter 8, slide 24, hard] a) The account payable system b) The merchant account c) The payment gateway d) The security system

A

Database

A Collection of data stored on a computer and organized based on one of several schemes that are designed to make the data collection easy to search and manage. Ex: Sales Force uses this to keep track of millions of clients and their information, which it then rents out to companies like E-trade who use this information.

Management Information System

A SYSTEM THAT SUPPORTS PLANNING, CONTROL, AND MAKING DECISIONS

Merchant Account

A bank account that allows merchants to receive the proceeds of credit card purchases.

LAN (Local Area Network)

A computer network confined to a relatively small geographic area.

router

A computing device that connects networks and exchanges data between them.

Systems Development Life Cycle (Sdlc)

A methodology for understanding the business objectives of any system and designing an appropriate solution

URL

A unique address for each page that indicates the location of a document, either on the Internet or on local network or machine.

Pretty Good Privacy (Pgp)

A widely used e-mail public key encryption software program

12. Mr. Swift presentation focused on using IS to _________________ [Guest Presentation, Moderate] a) Increase Profitability and Growth across Business Organizations b) Promote team-building across Business Organizations c) Synchronize IT components across Business Organizations d) None of the above

A) INCREASE PROFITIBILITY AND GROWTH

6. The four essential ingredients of System Analysis and Design (SAD) includes which of the following: [Chapter 6, pg. 163, Hard] a) Methodology b) Project Management c) Elaboration d) Construction

A) METHODOLOGY

3. Which of the following networks covers a very small space that ranges from the size of a human body to a small office? [Chapter 5, pg. 121, Moderate] a) PAN b) WAN c) MAN d) Internet

A) PAN

Which application presented in class allows you to chat and participate in video messaging with other(s) online for free? [Application presentation, easy] a. Pandora b. Skype c. Evite d. Centsports

ANSWER: B

True/False: The Random Access Memory RAM contains instructions that are not meant to be changed or changed only infrequently.

ANSWER: False; ROM FROM: Chapter 2 slides: slide 6 DIFFICULTY: medium

Enterprise Information Security

An ongoing, strategic business process of risk assessment and management that helps to ensure safe business operations and the availability, confidentiality, and integrity of an enterprise's information resources.

Information System (IS)

An organized collection of people, information, business processes, and information technology designed to transform inputs into outputs, in order to achieve a goal. For Example: MIS (management information system): Through processing and reporting features, a MIS provides times information to decision makers.

8) 'the capacity a country has to participate in the global digital economy' is _____. (From chapter 9) (slide 13) a. e-commerce b. e-readiness c. IIS (International Information Systems d. None of the above

Answer = B

E-Commerce includes__________. a. all types of computer networks b. all types of transactions c. none of the above d. both a and b

Answer D

Trojan Horse

Appears to be benign, but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system

Electronic exchanges between companies are considered which type of E-Commerce transaction? A. Business to consumer (B2C) B. Business to business (B2B) C. Consumer to consumer (C2C) D. Business to government (B2G)

B

5. A ___________________ study determines whether a project is technically and economically possible? [Chapter 6, pg. 157, Easy] a) Practicality b) Feasibility c) Possibility d) Developmental

B) FEASIBILITY

In general, the Functional Organizational structure is more flexible than both the Decentralized and Matrix structures? (Ch. 4.2, pg 93) A.) True B.) False

B.) False; matrix systems combine the EFFICIENCY of a FUNCTIONAL STRUCTURE with the FLEXIBILITY of a DECENTRALIZED STRUCTURE.

Order the following from most complex to least complex: (Ch. 5 Presentation, Slide 4) A. PDA, embedded processor, supercomputer, mainframe B. Mainframe, server farm, personal computer, embedded processor C. Personal computer, server farm, mainframe, super computer D. Personal computer, PDA, server farm, supercomputer

B.) Mainframe, server farm, personal computer, embedded processor

5. Stakeholders may be which of the following: (Chapter 4, Slide 4 of Chapter 4 Powerpoint, easy) a) internal only b) external only c) both internal and external d) none of the above

Both internal and external

Which of the following is not involved in the project management triangle? A. Resources B. Time C. Efficiency D. Scope

C

Which of the following is not an affect of using E-commerce? [Chapter 7, page 202, moderate] a. Enhancing collaboration b. Multiplying market niches c. Changing marketplace drivers d. Increasing barriers to entry

D

7. _______________________ refers to cutting corners in areas such as testing, documentation, and design tasks, during rushed projects. [Chapter 6, pg. 180, Moderate] a) Silver Bullet Syndrome b) Feature Creep c) Inadequate Design d) Shortchanged Quality

D) SHORTCHANGED QUALITY

What is the primary language for creating web pages? A. URL B. HTTP C. XML D. HTML

D. HTML

What is a disadvantage for using Pandora? A. You can't stop a song you don't like from playing. B. You can't pick a specific genre to listen to. C. You have to listen to the whole song before going to the next one. D. None of the Above.

D. None of the Above

Which of the following members of the Computer Hierarchy is the strongest/fastest in terms of its relative processing power? (Ch. 5.1, pg 120) A. Personal Digital Assistant B. Server Farm C. Personal Computer D. Mainframe E. None of the above. All are equal.

D.) Mainframe

Three-way Match

Data in vendor invoice, purchase order, and goods receipt must match for payment to be sent to vendor

information

Data presented in a context so that it can answer a question or support decision making

Data Encryption Standard (Des)

Developed by the National Security Agency (NSA) and IBM. Uses a 56-bit encryption key

Chief Information Officer (CIO)

Executive who leads the organization's information and technology efforts, ensures proper and secure use of all the organization's information resources, understands both business and technology, and communicates IS goals and aligns them with business strategies.

1. The largest number of memory chips in your computer is in the form of ROM. [Chapter 2, pg. 30, Easy] a) True b) False

FALSE

True/false: CPU speed is measured by its clock speed in millions of cycles per second (megahertz).

FALSE; billions (gigahertz)

True/false: a process is a recognizable whole that consists of a collection of interrelated parts that interact with each other to transform inputs into outputs in order to achieve a goal.

FALSE; system

A business can use automating to learn new ways to increase or transform its capabilities and find better ways to manage its resources [Chapter 4, page 102, moderate]. a. True b. False

False

TRUE or FALSE: Lower prices, greater searchability, ability to touch, feel, and smell products to purchase, and fast download speeds are all benefits of B2C E-Commerce.

False

True or False: Explicit Knowledge is Knowledge that is within people that they gain through experience, insight, and discovery

False

True or False: Ron Swift's company, Teradata, helps clients by providing newer communications technology. (speaker presentation, moderate)

False

6. Mr. Ron Swift gave a presentation about TerraData, a company that specializes in the creation of databases. [guest speaker presentations, medium]

False; Datawarehousing

Key

Field used to relate tables in a database

9. What generation of e-commerce is characterized by increasing integration with external partners over the Web and allowing increased transactions between two web partners? (Chapter 8, page 227, moderate) A. First generation B. Second generation C. Third generation D. Fourth generation

Fourth generation

People-Policy-Technology Framework

Framework that specifies the interaction of people, policy, and technology in an organization in order to mitigate risk and ensure security.

Product Lifestyle Management (PLM)

Help companies administer the processes of research, design, and product management; carry a product from the drawing board to manufacturing

Domain Name Service (DNS)

Hierarchical system of nameservers that maps host-domain name combinations to IP addresses

Detective Controls

Implemented to reduce risk by discovering when preventive controls have failed and providing notification that action must be taken. Example: bank customers receive an email when their PIN numbers have been changed, just to be sure they in fact initiated the change.

Status Information

Information that can relate either to a particular transaction or to the process in general

1)Who does Philip Grossman work for? [Grossman presentation, medium] InterContinental Hotels Group Teradata Solutions Enterprise Information Technology Support The University of Georgia

InterContinental Hotels Group

Ethernet

LAN protocol using coaxial or Cat 5 or 6 twisted pair cable

Table or File

List of data, arranged in columns and rows

Drill Down

Looking back through the steps of the procurement process from the data stored in a common database

Project Time

Managing and estimating the duration of the project, developing an acceptable schedule, and managing the project to ensure timely completion

Cert Coordination Center

Monitors and tracks online criminal activity reported to it by private corporations and government agencies that seek out its help

bandwidth

Network transmission speeds, typically expressed in some form of bits per second (bps).

IPv6

New IP scheme that will increase the possible address space to 2^138 addresses

Logical Data Model

One of the two most commonly used models for designing the organization of a relational database. It translates the ERD into a diagram of the tables in a database. For example, in order to apply the ERD, the e-voting system uses a this type of model, which specifies the fields that the database will store.

Nearshoring

Outsourcing to a business partner located outside your country but in the same general geographic area as your business. e.g, A company in Atlanta outsources to a company in Chicago.

DSL

Phone company copper, no shielding, signals degrade with distance, popular in densely populated cities of Europe and Asia

First Generation E-commerce

Precursor to web-enabled e-commerce, featuring simple static content on the Web - for example, a web page with content that doesn't change

Utility Software

Provides additional tools to maintain and service your system (many of the tasks associated with the tools are now included in the OS). Example:For Security purposes: • Antivirus, Firewall, and Spyware

Systems analyst

Researches, plans, and recommends software and systems choices; responsible for developing cost analyses, design considerations, implementation timelines, and feasibility studies

IP (internet protocol)

Routing protocol that is in charge of forwarding packets on the Internet.

Functional Business Area

SERVICES WITHIN A COMPANY THAT SUPPORT MAIN BUSINESS; includes accounting, finance, marketing, and human resources

B2b Service Provider

Sells business services to other firms

Communication

Sharing analyses, ideas, and solutions with others. Example: In order to have a successful team, you must effectively communicate ideas, solutions, and analyses.

Purpose of Info systems

TO HELP PEOPLE IN ORGANIZATIONS MAKE BETTER DECISIONS.

True/false: A query is a specially structured request to a database to locate a desire set of records (Field Guide B).

TRUE

2. ________ knowledge is knowledge that is within you and is gained through experience, insight, and discovery. (Chapter 1, Slide 6 of Chapter 1 Powerpoint, easy) a) tacit b) experimental c) explicit d) implicit

Tacit

Mass Customization

The ability to create custom products or services on-demand Ex. Jaguarusa.com or Scion.com where you can custmize your own car and have it delivered to a dealer in your area

Hardware

The electronic and mechanical components that can be seen and touched. For Example: Computer Monitor, Transistor, keyboards, etc.

Discovery

The finding of data, information, and knowledge relevant to a task, problem, issue, opportunity, and etc. Example: Before writing a research paper, you must search for answers to questions and for information and facts

Internet

The global network cooperating computer networks that use the same rules for sending and receiving information. Example: When a user requests a web access to a URL

Transformation

The knowledge work activity that requires you to organize the results from discovering activities Example: The phonebook is an example of transformation. It organizes names, addresses, and phone numbers.

Systems Development Life Cycle (SDLC)

The traditional term for the time it takes to build an IS from inception through transition to use of the system. Stages: Pre-Inception, Inception, Elaboration, Construction, Transition, Production, and Retirement. For example, a systems analyst may find that there is a need for an information system to be developed and take the necessary steps to be sure a high-quality system is put in place.

In-sourcing

This refers to the strategic decision made by a business to bring various services or functions back in-house, or keep them in-house, rather than globally source them. e.g,. A company in Atlanta, Georgia outsources to a company in Montreal, Canada.

voice over Internet protocol (VoIP)

Transmission technologies that enable voice communications (phone calls) to take place over the Internet as well as private packet-switched network

12. A business model defines how a company will meet the needs of its customers while making a profit. a. True b. False

True

True or False: When data remain on the client machine for a period of time, this is a persistent cookie.

True

1. Which of the following applications, demonstrated in class, is a social networking site in which "tweets" update your friends based on "what you are doing". (bonus application presentation, easy) a) skype b) centsports c) twitter d) rotten tomatoes e) none of the above

Twitter

2)Which of the following applications was presented that lets you update what you are doing and 'follow' what others are doing? [Class Presentation, easy] Pandora Photobucket Facebook Twitter

Twitter

Content Provider

distributes information content (news, music, videos, artwork) over the web

Psychographic Research

divides a market into different groups based on social class, lifestyles, and/or personality characteristics

web page

documents encoded in HTML that are created, transmitted, and consumed during the world wide web

Which of the following is not a phase of IS development? (Chapter 6: Slide 14 Medium) a. Inception b. Construction c. Transition d. Retirement e. None of the Above

e) None of the Above

10. An organized collection of people, business processes, information, and information technology that creates business value by capturing, sharing, creating, storing and transforming data across cultural environments is________________. [Chp. 9 p. 270, moderate] a) spreadsheet b) business collection c) company-centric business model d) business value collection e) global information system

e) global information system

Security Organization

educates and trains users, keeps management aware of security threats and breakdowns, and maintains the tools chosen to implement security

Scale Economies

efficiencies that arise from increasing the size of a business

Productivity

efficiency of HUMAN resources; improves when fewer workers are required to achieve the same goal

disintermediation

elimination of one or more middle layers of the supply chain

ieee 802.16 protocol

emerging new technology also known as wimax enable broadband access for fixed nomadic and portable applications.

Horizontal Scaling

employing multiple computers to share the workload

Digital Wallet

emulates the functionality of a regular wallet by authenticating the consumer, storing and transferring value, and securing the payment process from consumer to merchant

symmetric encryption

encryption method whereby same key is used to encode and decode the message

Late mover

enters the market later than other competitors; can be viewed as advantage; implements latest available technologies; not burdened with legacy systems

clearinghouse

entity that provides goods and services at a stated price, prices and arranges for the delivery of the goods, but never takes title of the goods

Local Area Network (LAN)

established by a single organization and shared among employees; includes both client-server and peer-to-peer LAN

Authorization Management System

establishes where and when a user is permitted to access certain parts of a Web site

Rule-Based Data Mining

examines demographic and transactional data of groups and individuals at a Web site and attempts to derive general rules of behavior for visitors

Switching costs

expenses incurred when customer stops buying from one company and starts buying from another

Information

facts or conclusions that have meaning within context

Splog

fake blog created solely to raise the search engine rank of affiliated Web sites

Checking Transfer

funds transferred directly via a signed draft or check from a consumer's checking account to a merchant or other individual

Registration Forms

gather personal data on name, address, phone, ZIP code, e-mail address, and other optional self-confessed information on interests and tastes

Database model

general logical structure; answers concerns such as how records are stored in the database and how relationships between records are established

packaged applications

generic software that can be used by many companies

Personal Digital Assistant (PDA)

handheld computer; smart phones took this over

Broadband Internet Access

high-speed last mile technologies

Malicious Code (Malware)

includes a variety of threats such as viruses, worms, Trojan horses, and bots

Industry Consortia

industry-owned vertical marketplaces that serve specific industries

Opinion Leaders (Viral Influencers)

influence the behavior of others through their personality, skills, or other factors

Applications Layer

layer of Internet architecture that contains client applications

hypertext transfer protocol (HTTP)

layer-5 protocol used to process web pages

point of presence (POP)

location at which a line connects to a PSDN network

Storage

magnetic disks, magnetic tapes, optical disks, DVDs, and flash memory (allow for permanent _______)

Worm

malware that is designed to spread from computer to computer

Joining -

manipulating data to combine two roe more tables

marketspace

marketplace extended beyond traditional boundaries and removed from a temporal and geographic location

price elasticity

measure of the sensitivity in demand to changes in prices.

Packet switching

message broken into packets

Server

networked computer dedicated to common functions that the client computers on the network need

Value Web

networked trans-business system that coordinates the value chains of several firms

Unfair Competitive Advantage

occurs when one firm develops an advantage based on a factor that other firms cannot purchase

Service Provider

offers services online

cost feasibility

one of four dimensions of feasibility

World Wide Web

one of the Internet's most popular services, providing access to over 50 billion Web pages

Backbone

one of the internet's high-speed, long-distance communications links

Hypertext Markup Language (Html)

one of the next generation of GMLs that is relatively easy to use in Web page design. HTML provides Web page designers with a fixed set of markup "tags" that are used to format a Web page

File Transfer Protocol (Ftp)

one of the original Internet services. Part of the TCP/IP protocol that permits users to transfer files from the server to their client computer, and vice versa

Microcomputers

personal computers, notebook computers, and handhelds; what students use

crowdsourcing

process by which orgs use web 2.0 technologies such as user-generated content to involve their users in the design and marketing of their products

system conversion

process of concerting business activity from old system to the new

Transaction Broker

processes transactions

Decentralized processing

processing alternative in which processing devices are placed at various remote locations

web server

program that processes HTML protocol and transmits web pages on demand

Tcp

protocol that establishes the connections among sending and receiving Web computers and handles the assembly of packets at the point of transmission, and their reassembly at the receiving end

canned reports

provide regular summaries of information in a predetermined format. They're often developed by information systems staff and formats can be difficult to alter

Licensed Software

provides limited permission to use the software

aggregate or process level

relating to multiple instances of the process over time; the company uses this information to understand how well it is executing each step in the process as well as how the entire process is operating over time

instance-level of process

relating to one execution of the procurement process

composite applications

rely on web services to send and receive data between and among ES and execute newer and more specific processes than are found in the standard ES

cold site

remote processing center that provides office space, but no computer equipment, for use by a company that needs to continue operations after a natural disaster

Syntax -

rules associated with a programming language. So it dictates the symbols and stuff and order to convey it to the computer

technical safeguards

safeguards that involve the hardware and software components of an information system

requirements analysis phase

second phase in the sdlc in which developers conduct user interviews, evaluate existing systems, determine new forms/reports/queries, identify new features and functions, including security, and create and data model

Price Discrimination

selling products to different people and groups based on their willingness to pay

Automated Response System

sends e-mail order confirmations and acknowledgements of e-mailed inquires

Video Server

server that serves video clips

Culture

shapes basic human values, wants, perceptions, and behaviors

Social Shopping

sharing product choices with friends online

3D Geographic Software

similar to virtual reality, used to develop three-dimensional models of geographical locations; essentially is a Geographic Information System

field

single piece of information about entity; can hold images, sounds, video clips; example includes "cell" in Excel

Dial-up connection

slower type of connection through modem, usually no faster than 56 Kbps

universal standards

standards that are shared by all national around the world

email spoofing

synonym for phishing, a technique for obtaining unauthorized data that uses pretexting via email.

Network operating system (NOS)

systems software that controls the computer systems and devices on a network and allows them to communicate with each other

Public network service

systems that give personal computer users access to vast databases and other services, usually for an initial fee plus usage fees

interactivity

technology that allows for two-way communication between merchant and customer

Voice mail

technology that enables users to send, receive, and store verbal messages for and from other people around the world

best-of-breed

tend to have slightly better functionality, but come with the added cost of integrating with other applications and systems; typically isolated to one process or part of a process and have evolved from departmental applications

Privacy

the ability to control the use of information about oneself

Inheritance

the ability to create a new object by replicating the characteristics of an existing (parent) object

Implementation Plan

the action steps you will take to achieve the security plan goals

Uniform Resource Locator (Url)

the address used by a Web browser to identify the location of content on the Web

System Architecture

the arrangement of software, machinery, and tasks in an information system needed to achieve a specific functionality

Core Product

the core benefit the customer receives from the product

Transmission Control Protocol/Internet Protocol (Tcp/Ip)

the core communications protocol for the internet

Packet

the discrete units into which digital messages are sliced for transmission over the Internet

application layer

the functionality ex:the ability to exchange messages with others

Kernel -

the heart of the operating system which controls the most critical processes

Transposition Cipher

the ordering of the letters in each word is changed in some systematic way

Customer Acquisition Costs

the overall costs of converting a prospect into a consumer

Float

the period of time between a purchase and actual payment for the purchase

Operating system -

the set of programs that controls the hardware, and interfaces with the applications

Universal Computing

the sharing of files, information, graphics, sound, video, and other objects across all computer platforms in the world, regardless of operating system

Documentation -

the text that describes that helps the user operate the system. Describes the program

information density

the total amount and quality of information available to all market participants

Barriers To Entry

the total cost of entering a new marketplace

Clickstream Behavior

the transaction log that consumers establish as they move about the Web

Telecommunications

the transmittal of data and information from one point to another; allows for communication over large distances

Systems thinking

thinking of an organization in terms of subsystems; powerful management approach that creates a framework for problem solving and decision making

Central Processing Unit (CPU)

this accepts instructions and data; decodes and executes instructions; and stores results (output) in memory

Application program interface -

this allows applications to make use of the operating system

Tangible Media

this is a category of communications media that includes twisted pair cable, coaxial cable, and optical fiber

Internet Service Providers (ISPs)

this is a preferred method of conducting e-commerce and is less costly than VANs

Bar Codes

this is found on products and packages and it stores encoded information; this is not a source, but its reader is

Optical Fiber

this type of tangible media has a high bandwidth and is used for things like a Blue Ray Player

Videoconferencing

transmitted images and speech; brings together meetings that could be thousands of miles apart; produces lots of savings

Alliance

two companies combining services; makes product more attractive; reduces costs; provides one-stop shopping

Workgroup -

two or more individuals that work on a project to achieve a common goal

unshielded twisted pair (utp) cable

type cable used to connect computer, printer, switches, and other devices on a LAN. has four pairs of twisted wire

optical fiber cable

type cable usend to connect computer, printers, switches, and other devices on a LAN. core surrounded by cladding. light signal reflected in glass core

Peer-to-peer LAN

type of LAN where no central device controls communications

parallel installation

type of system conversion in which the new system runs in parallel with the old one for a while. expensive

pilot installation

type of system conversion in which the organization implements the entire system on a limited portion of the business

System Functionalities

types of information systems capabilities you will need to achieve your business objectives

Field -

typically a name, number, or combination of characters that describes an aspect o a business object or activity

Internet Protocol (IP) Address

unique identifying address for every device connected to the internet

IP number

unique numerical identification for a network device

mobile commerce (m-commerce)

use of wireless digital devices to enable transactions on the web

organizational data

used to define the organizational structure of the business and they rarely change over time

Organizational Data

used to define the organizational structure of the business, and they rarely change over time

Data mining

uses large data warehouses to find trends and shopping habits of various demographic groups

dsl (digital subscriber line) modem

uses voice telephone lines with a dsl modem; it operates so that the signals do not interfere with voice telephone service. faster that dial up

Strategic advantage

using strategy to maximize company strengths

Brand Leveraging

using the power of an existing brand to acquire new customers for a new product or service

Acceptance Testing

verifies that the business objectives of the system as originally conceived are in fact working

Site Management Tools

verify that links on pages are still valid and also identify orphan files

Application Layer

what the application allows you to do (create formula or charts, compose an essay)

Programming languages -

what you use to write a program to tell the computer what to do

Co-Location

when a firm purchases or leases a Web server (and has total control over its operation) but locates the server in a vendor's physical facility, communications lines, and the machinery

spoofing

when someone pretends to be someone else with intent of obtaining unauthorized data.

Law Of One Price

With complete price transparency in a perfect information marketplace, there will be one world price for every product

TCP (transmission control protocol)

Works at both ends of most Internet communication to ensure a perfect copy of a message is sent

Object-relational database management system (ORDBMS) -

a DBMS capable of manipulating audio, video, and graphical data

Transaction

a business event, usually entered as input

Attribute -

a characteristic of an entity

Secure Negotiated Session

a client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted

Electronic product code (EPC)

a code on an RIFD tag that provides more information than the universal product code (UPC); information may include date of manufacturing, plant location, expiration date, destination

Data mart

a collection of data focusing on a particular subject or department (+______________s???)

Transaction Fee Revenue Model

a company receives a fee for enabling or executing a transaction

Application service provider (ASP) -

a company that provides software support, and they provide the hardware to make it happen over a network

Application Service Provider (Asp)

a company that sells access to internet-based software applications to other companies

firewall

a computing device located between a firm's internal and external networks that prevents unauthorized access to or from the internal network.

Customer Profile

a description of the typical behavior of a customer or a group of customer at a Web site

Data model -

a diagram of data entities and their relationships

Business Plan

a document that describes a firm's business model

purchase requisition

a document that identifies the material needed, the quantity needed, and the date it is needed; is created when the quantity is reduced to some predetermined level

Primary key -

a field or set of fields that uniquely identifies the record

Attachment

a file inserted within an e-mail message

Cascading style sheet (CSS)

a file or portion of an HTML file that defines the visual appearance of content in a web page

packet-filtering firewall

a firewall that examines each packet and determine whether to let the packet pass.

internal firewall

a firewall that sits inside the organizational network

Linux

a free Operating System based on UNIX and that is Open Source Software

Data administrator -

a nontechnical position responsible for defining and implementing consistent principles for a variety of data issues

Benchmarking

a process in which the site is compared with those of competitors in terms of response speed, quality of layout, and design

Electronic document distribution

a process that enables the sending and receiving of documents in a digital form without being printed (although printing is possible)

Wi-Fi Protected Access (WPA)

a security protocol that offers significantly improved protection over WEP

Commoditization

a situation where there are no differences among products or services, and the only basis of choosing products is price

Database administrator (DBA) -

a skilled IS professional who directs all activities related to an organization's database

Widget

a small, pre-built chunk of code that executes automatically in your HTML Web page; capable of performing a wide variety of tasks

Consumer Behavior

a social science discipline that attempts to model and understand the behavior of humans in a marketplace

Web Services

allow companies to integrate several client-server applications and mashups by sending and receiving data among an ES

ad hoc reporting tools

allow users to dive in and create their own reports, selecting fields, ranges, and other parameters to build their own reports on the fly

Computer telephony integration

allows computer to use telephone lines as input; caller ID can be used to locate customer data

Asymmetric DSL

allows different upstream and downstream rates

Groupware

an application that enables workers to collaborate in real time over Web; this includes integration of multimedia technology and Web technology, allows for remote collaboration, eliminates travel times and facilitates expression and exchange of ideas

Database approach to data management -

an approach whereby a pool of related data is shared by multiple application programs

Traditional approach to data management -

an approach whereby separate data files are created and stored for each application program

Client/server

an architecture in which multiple computer platforms are dedicated to special functions such as database management, printing, communications, and program execution

intranet

an internal corporate network built using internet and world wide web standards and technologies; used by employees to gain access to corporate information

T1

an international telephone standard for digital communication that offers guaranteed delivery at 1.54 Mbps

General Public License (GPL)

anyone can use and make modified versions, but cannot sell modified versions for profit

Best-of-breed

applications that are typically isolated to one process or part of a process and have evolved from departmental applications

auctions

apps that match buyers and sellers by using e-commerce version of a standard, competitive-bidding auction process

three-tier client-server

architecture separates these layers into three separate components presentation layer application layer data layer

Three-Tier Client Server

architecture that consists of three components: presentation layer, application layer, and data layer

three-tier architecture

architecture used by most e-commerce server applications

expert systems

are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise. Expert systems are used in tasks ranging from medical diagnoses to product configuration

dashboards

are a heads-up display of critical Indicators that allow managers to get a graphical glance at key performance metrics

Genetic algorithms

are model building techniques where computers examine many potential solutions to a problem, iteratively modifying (mutating) various mathematical models, and comparing the mutated models to search for a best alternative.

An information technology is: a) people or organizations that have both an interest in and an influence on the creation, implementation, or operation of an IS b) the physical components, typically hardware, software, and connectivity, that make up an IS. c) a choice made from one or more alternatives to follow or avoid some course of action. d) a positive return on the investment of resources that is created through the effective and efficient integration of an organization's people, information, information technology, and business process

b) IT: the physical components, typically hardware, software, and connectivity that make up an IS. Technology enables processes to perform the steps they were designed to accomplish.

9. Hypertext organizes content into units that are connected using associations called: a) Chains b) Links c) Blocks d) Strands

b) Links

True or False: A tangible benefit is difficult to measure in monetary terms. a) true b) false

b) false

1. The first server-side programming technology was named ____________ and was programmed using ___________ (Programming Language). (Chapter 8, pg. 239, Difficult) a. Common Gateway Interface; PHP b. Common Gateway Interface; PERL c. Microsoft.net; PERL d. PHP; PHP

b. Common Gateway Interface; PERL

4) What is the smallest type of processor? [Chapter 5, Page 119, moderate] a) Mainframe b) Embedded Processors c) Personal Computer d) Personal Digital Assistant

b. Embedded Processors

11. An e-commerce system is composed of one layer, or tier, that depends on what components are used. [Chapter 8, PowerPoint slide 19, Easy] a. True b. False

b. False

ROM is associated with short-term memory storage. [chapter 2, slide 5, easy] a. True b. False

b. False

7) A global perspective is a worldwide approach to business that seeks to create persistent data in an economic world. [chapter 9, page 265, moderate] a. TRUE b. FALSE

b. False - seeks to create business value

Software for which the code is freely available to anyone is: a. Proprietary b. Open c. Reference d. Productivity

b. Open

The two types of memory are _______, which is short-term memory; and _______, which is long-term memory. a. ROM; RAM b. RAM; ROM c. RIM; REM d. REM; RIM

b. RAM; ROM

9. Which of the following is NOT an organizational response to risk? [Chapter 9, pg. 277, easy] a. Risk deferral b. Risk behavior c. Risk transfer d. Risk avoidance

b. Risk behavior

A USB flash drive is an example of [ Chapter 2, slide 7, easy]: a. Software b. Storage c. RAM d. ROM

b. Storage

An example of a good managed through B2C transactions would be: (Chapter 7, pg. 198, Moderate) a. Office furniture b. iTunes song c. Virus protection software d. Fishing license application and fee

b. iTunes song

How is a DBMS organized? Put the following in order (from smallest to largest): file bit record field character database

bit, character, field, record, file, database

Hierarchy of data -

bits, characters, fields, records, files, and databases

Touch Screen

both an input and output device; often used at kiosks; allows users to navigate and select by touching the screens

presentation layer

browser; you connect to many systems(websites) that provide a variety of capabilities (e-mail, information sharing)

software as a service (SAAS)

business model whereby companies provide services based on their software, rather than providing software as a product. software as a service is example of web 2.0

E-Commerce

buying and selling goods and services through the Internet

web services

by using these companies could now integrate several client-server applications and create an enterprise mashup

4. What knowledge work activity will help you answer questions and gain understanding through a thoughtful investigation and examination to the available data, information, and knowledge? a. Synthesis b. Transformation c. Analysis d. Discovery

c. Analysis

2) What does CARROTS stand for? [Chapter 3, Page 67, easy] a) Complete, Available, Reliable, Relevant, Objective, Timely, Structure b) Communication, Accurate, Reliable, Relevant, Organized, Timely, Source c) Complete, Accurate, Reliable, Relevant, Objective, Timely, Source d) Communication, Analysis, RAM, ROM, Objective, Timely, Synthesis

c. Complete, Accurate, Reliable, Relevant, Objective, Timely, Source

Shopping Cart Database

captures all the item selection, purchase, and payment data

customization

changing the delivered product or service based on a user's preferences or prior behavior

Motherboard

circuit board containing the CPU and primary memory

systems development life cycle (sdlc)

classical process to develop information systems

Transformation Phase

cleanse and modify the data format; 2nd phase of transferring data to data warehouse

Telecommunications

communication technologies are used to support the four data processing functions (receive input, process data, display information, store data, transfer data)

Supply chain

consists of procurement of raw materials, processing materials into goods, and delivering goods

Relational Model

consists of tables (independent of each other, but can be related to one another); is based on relational algebra; includes record, attribute, and relation

Fiber-Optic Cable

consists of up to hundreds of strands of glass or plastic that use light to transmit data

Source Data Input Devices

copy data directly from sources such as bar codes, credit cards, and checks

File/Database management tools

create and manipulate local or shared databases

Extraction Phase

create files from transactional database; 1st phase of transferring data to data warehouse

12. Which of the following applications, demonstrated in class, serves as a free, online social networking and micro-blogging service that enables users to "follow" celebrities and even President Barack Obama: a) Pandora b) iLike c) Facebook d) Twitter e) None of the above

d)

Disadvantages of file systems include all of following EXCEPT: a. Data Inaccessibility b. Poor File Management c. Data Dependence d. Data Overwrite

d) Data Overwrite

A computer network that is spread out over a large geographic area is known as a: a) CAN b) LAN c) PAN d) WAN

d) WAN

7. Selling your record collection on E-bay is a form of what type of E-commerce transaction? [Chapter 7, pg. 199, medium] a. Business to Consumer (B2C) b. Consumer to Government (C2G) c. Business to Government (B2G) d. Consumer to Consumer (C2C)

d. Consumer to Consumer (C2C)

circuit switching

dedicated channel (circuit) is established for the duration of the transmission

Value Proposition

defines how a company's product or service fulfills the needs of customers

master data

defines key entities in an organizations ex:products, customers, vendors/suppliers; data changes frequently

organizational data

defines the organizational structure of the business

Revenue Model

describes how the firm will earn revenue, produce profits, and produce a superior return on invested capital

Logical Design

describes the flow of information at your e-commerce site, the processing functions that must be preformed, the databases that will be used, the security and emergency backup procedures that will be instituted, and the controls that will be used in the system

System Design Specification

description of the main components in a system and their relationship to one another

Customer relationship management (CRM)

designed to support any and all relationships with customers; supports the three areas of marketing, sales, customer service

Software development tools

develop software with little knowledge of programming languages

Optical Mark Recognition

devices detect positions of marks or characters

Input Hardware

devices that provide one interface between the internal processes of an IS and its environment. Example: Scanning devices (barcode scanners), Pointing devices (mouse), keyboards

Optical Character Recognition (OCR)

devices try to interpret handwritten and printed text

access device

devices typically special purpose computers that connect network sites. the particular device depends on the line used and other factors.

last mile problem

difficulty in getting the capacity of fast optical-fiber transmission lines from the street in front of buildings into the homes and small biz around

Private Industrial Networks

digital network designed to coordinate the flow of communications among firms engaged in business together

disintermediation

displacement of market middlemen who traditionally are intermediaries between producers and consumers by a new direct relationship between manufacturers and content originators with their customers

Primary Key

A field that holds a unique value for each record. Example: An individuals Social Security Number is unique to every individual, and no two people would have the same SSN at one point.

Foreign Key

A field that is a primary key in one table, but included in a second table to relate, or link, the two. Example: If an access file has a table about people's birthdays that cross-references to the primary key of people's SSN of another table, the SSN which is being referenced would be considered this type of key to the table which is about birthdays.

Agile Development

A methodology where a team develops software in short development cycles or increments to allow for continuously changing requirements. For example, a team goes through the entire development process several times as new requirements are found. This provides for a less formal, constricting method than the Waterfall approach.

Evolutionary Model

A model where developers first investigate, specify, and implement an important core part of the system with minimal functionality, and then the team tests and evaluates this version of the system to plan for the next version. For example, a project team works with customers to build a prototype, in which they work with in order to understand the business requirements. The team continues to revise and enhance the prototype until the system is complete.

Waterfall Model

A model with a designed set of phases where a new phase begins only after acceptably completing the preceding phase, causing development activities to move downstream through the phases in a formal, detailed manner. A team goes through the development of a system in strict phases, in which they only agree to move on when everyone is satisfied with the work from that phase.

Knowledge Worker

A person who uses information, information systems, and information technology to create business value for organizations. Example: A professor who teachers from a book, explains concepts and terms, and grades quizzes on a computer would be considered this type of person.

External Stakeholder

A person, or entity in the environment that has an interest and an influence on how a business will function in order to succeed

Stakeholder Analysis

A portion of the feasibility study that includes the evaluation of stakeholder opinions and attitudes of a project. To do this, a company creates a list of its most influential customers in order to figure out how a system will effect them along with the degree of impact that each customer has on the project.

Intranet

A private, organization-wide computer network that is typically based on Internet protocols, providing a set of services for distributing private information and data throughout the company that only authorized employees can access from any physical location. Can range in size from a LAN to a WAN.

Activex

A programming language created by Microsoft to compete with Java

Javascript

A programming language invented be Netscape that is used to control the objects on an HTML page and handle interactions with the browser

Vbscript

A programming language invented by Microsoft to compete with JavaScript

Active Server Pages (Asp)

A proprietary software development tool that enables programmers using Microsoft's IIS package to build dynamic pages

3 trends of networking technologies

1). Broadband telephony 2). Radio Frequency Identification 3). Convergence of Digital Technologies

3 phases of transferring data from a transactional database to a data warehouse

1). Extraction Phase 2). Transformation Phase 3). Loading Phase

Column or field

: A column in a database table. Columns represent each category of data contained in a record (e.g., first name, last name, ID number, data of birth)

expert systems

: Leverages rules or examples to perform a task like a human expert would.

1. A knowledge that is readily codified is ________. a. explicit knowledge b. initial knowledge c. tacit knowledge d. knowledge work e. all of the above

A

1. Which of the following is NOT an input in the IPO model? [chapter 1, slide 13-14, moderate] a. Business Value b. Information c. Knowledge d. Data e. Decisions

A

11. What does Ron Swift's company, TeraData, specialize in? [guest speaker, Ron Swift, presentation, easy] a. Data Warehousing b. Business Process Management c. Marketing Processes d. Data Modeling e. Relational Databases

A

8. An extranet is a collaborative network that uses Internet technology to link businesses with their customers. [chapter 7, slide 46, moderate] a. True b. False

A

Discerning the feasibility of an Information System involves which of these analyses? a. Technical Feasibility b. Geographic Feasibility c. Commercial Feasibility d. Production Feasibility

A

Structured Decision

A decision that can be programmed. It is routine or repetitive and the necessary data are complete and certain Example: You are driving and see that the traffic light has turned red so you slow down.

Semi-structured Decision

A decision that is not fully structured but still can be attained with the use of information, reasoning, and partly objective thinking to some extent. Example: The traffic light turning green and an emergency vehicle with the sirens on now call for a semi-structured decision on your part.

Feasibility Analysis

A detailed investigation of a proposed development project, to determine whether is is technically and economically possible. For example, an organization may look at return on investment, net present value, internal rate of return, and payback period in order to see if a proposed system is financially acceptable.

Transaction Processing System (TPS)

An information software system that enables transactions and captures and processes transaction data to make them available to the organization Example: An ATM keeps track of individual customers and their account balances/transfers/transactions

Enterprise Resource Planning System (ERP)

An information system that integrates and standardizes processes, and centralizes the storage and management of data of a business with the goal of increasing operational efficiencies in business processes Example: When a customer contacts a company salesperson, he is able to obtain all the necessary information including the customer's contact info, product data, and products forecasted availability. They can access all the functional units of the company through common data storage

Service Oriented Architecture

An infrastructure that supports the full-scale use of Web Services Example: Basically a set of services that work together that are created in a manner that allows them to be used in many different business domains. Can also help companies make use of disparate (non-connected) programs.

Coldfusion

An integrated server-side environment for developing interactive Web applications

Internet

An interconnected network of thousands of networks and millions of computers linking businesses, educational institutions, government agencies, and individuals

Which of the following is the correct acronym for examples of server-side technologies discussed in class? a.GCI, PHP, Microsoft.com, Java script b.GCI, PHP, HTML c.HTML, URL, Java servlets d.GCI, PHP, Microsoft.net, Java servlets e. GCI, PHP

Answer (d)

5) Which of the following is an advantage of In-house development of IS. (Chapter 6, page 161, Table 6.2) (Medium) a. Firm retains complete control of the project b. Generally lower time and costs c. Distraction of in-house IS from other duties d. Firm loses some control of project

Answer = A

11) Which Quest Speaker Presentation main job is to Consolidate data for an enterprise and to make decisions better, faster and more reliable? (Guest Presentation,Slide 3) (medium) A. Mr. Philip Grossman Intercontinental Hotels Group B. Mr. Swift TeraData C. Mr. Matthew Gonzales EITS D. None Of the Above

Answer = B

4) Arrange the following in order from largest processing power to the least. (Ch. 5 pg. 120) (easy) A.) Personal Computer B.) Mainframe C.) Server Farm D.) Embedded Processor

Answer = B, C, A, D

3) Which of the following business organizations tends to have slow responses to changes in business environments? (ch. 4 ph. 93) (hard) A.) Matrix B.) Decentralized C.) Functional D.) None of the above

Answer = C

9) A small bit of data stored on the client machine that is passed back and forth to a web server is a ______. (chapter 8) (slide 14) a. byte b. file c. cookie d. message

Answer = C

1) Which of the following is NOT an IS type? (ch. 1 pg. 14) (Moderate) A) Transaction Processing System B.) Management Information System C.) Decision Support System D.) Employee Management System

Answer = D

12) Complete the following sentence: When using CentSports.com for free online betting, you are given ____ to start with and can cash out after you reach at least ____.... (CentSports.com presentation) (hard) A. $1 ; $25 B. $1 ; $20 C. 10 cents ; $25 D. 10 cents ; $20

Answer = D

7) True or False: web-crawlers is a special software that a spreadsheet uses to gather outside information from the internet (Chapter 8, page 242, paragraph 2 , Difficulty) (Easy)

Answer = False, web-crawlers are a special software used by a search engine to gather information into their database for retrieval

2) Storage is usually much slower to access than memory. (ch. 2 pg. 35) (easy) A.) True B.) False

Answer = True

8. Match each device with their appropriate category. [Chapter 2, pages 29-35, easy] Column A Column B 1. Scanning Device a) Processing Hardware 2. Printer b) Memory 3. RAM c) Input Hardware 4. Central Processing Unit (CPU) d) Output Hardware

Answer: 1-C, 2-D, 3-B, 4-A

9. Which of the following is not considered one of the common functional information system? [chapter 5, page 143, moderate] a) Statistical IS b) Human Resource IS c) Accounting IS d) Manufacturing IS

Answer: A

HTTP drops connections between client and server after processing a request. a) True b) False

Answer: A

_____________ is a knowledge work activity that requires you to organize the results from discovery activities. a. Transforming b. Analysis c. Synthesis d. None of the Above (Chapter 3, slide # 4, moderate)

Answer: A

3. How much does is cost to create your own font on mytypeface.com? [Bonus Application Presentation, hard] A)$1 B)$10 C)$15 D) it's free

Answer: B

6. What provides a language for encoding the information so a variety of IT devices can display it? [chapter 2, slide 17, easy] a) Uniform Resource Locator (URL) b) Hypertext Markup Language (HTML) c) Hypertext Transfer Protocol (HTTP) d) TCP/IP

Answer: B

What is an open system business model? a) A model in which management power is pushed down through the system b) A model in which inputs and outputs are transformed through constant environmental interaction c) A model in which databases store information on the entities involved with the business process d) None of the above

Answer: B

1. __________ are identified most strongly with a 'home country,' and __________ go beyond this model to a more 'borderless' view of global operations. [Chapter 9, page 269, medium] A) Unilateral Companies, Multinational Companies B) Transnational Corporations, Multinational Companies C) Multinational Companies, Transnational Corporations D) Unilateral Companies, Global Corporations

Answer: C

7. What does ROM stand for? [Chapter 2, page 30, moderate] A. Random Only Memory B. Read Options Memory C. Read Only Memory D. Rolling Option Memory

Answer: C

True or False: Data Redundancy is a disadvantage of file systems. (Chapter 5, slide # 9, easy)

Answer: True

10. Nearshoring is outsourcing to a business partner located outside your country but in the same general geographic area as your business. (Chapter 9, page 267, easy) a. True b. False

Answer: a

4. A database management system(DBMS) is used for: (Chapter 2, page 40, moderate) a. Designing, creating, updating, and querying data. b. Creating documents composed of text, images, and supporting graphics. c. Managing personal information such as to-do lists, schedules, and electronic mail. d. Performing general calculations and analyses, such as financial analysis, budgeting, and forecasting.

Answer: a

E-commerce is the use of information systems, technologies, and computer networks to carry out Transactions in order to create or support the creation of Business Value.[Chapter7,Slide4,Moderate] a. True b. False

Answer: a

What Company did guest speaker Ron Swift work for?[Guest Speaker Ron Swift, Bioinfo, Easy] a. Teradata Corporations b. CNN Consultants c. Xabyte Inc. d. None of the above

Answer: a

What is information on a Web page that may change depending on a number of factors? (Ch.8, pg.227, moderate) a. Dynamic content b. Static content c. Persistent data d. A cookie

Answer: a

12. Which of the following is a project that is working on replacing the basic protocols that make the Internet possible? This includes increasing the number of available IP addresses and improvements to routing and network configurations. [Chapter 8, page 252, hard] a). Next-Generation Internet b). Web 2.0 c). Internet2 d). Web services

Answer: a- Next Generation Internet

5. Match the following networks to the size of the corresponding network. (Chapter 5, slide 6, easy) Column A: Column B: a. PAN A. Large geographic area b. LAN B. Small office c. WAN C. Global d. Internet D. Building

Answer: a-B, b-D, c-A, d-C

1. According to Mr. Swift's presentation, which is NOT one of the many analytical applications? (Mr. Swift's presentation, slide 34 of 56, difficult) a. Propensity to buy b. Propensity to save c. Propensity to respond d. Propensity to default

Answer: b

2. Using the analogy CARROTS as a knowledge worker, the letters stand for Completeness, Accuracy, Reliable, Responsive, Objective, Timely, and Source. (Chapter 3, Slide 15, easy) a. True b. False

Answer: b

What was the first life cycle model to gain wide acceptance among system developers? (Ch. 6, pg. 168, easy) a. Evolutionary model b. Waterfall model c. Logical Data model d. Exchange model

Answer: b

Strategic sourcing involves forming a short-term relationship with another company and then setting prices through negotiation. [true/false, chapter 7, p. 214, easy] a. True b. False

Answer: b [false] it should be a long-term relationship

1. Google uses a small collection of the world's cutting edge servers to handle search queries : [Mr. Phillip Grossman, guest speaker, moderate] A. True B. False

Answer: b) False, they use a collection of many, inexpensive computers.

3. Which is an example of automating? [chapter 4, slide 21, page 105, moderate] a. Using subscription data to forecast demand and to better schedule inbound logistics and outbound activities. b. Using online subscription for newspaper to reduce printing and handling costs of paper-based, mailed subscription forms. c. Using transaction data to understand subscription process d. Developing a unique competency for delivering targeted content to various customer segments as identified by demographic and subscription data.

Answer: b.

12. Which of the following is not a music application? (Bonus application, easy) a. Pandora b. iLike c. Skype d. All are music applications

Answer: c

3. The spiral model of the book goes in this order from lowest to highest: (Chapter 1, Slide 3, easy) a. Business partners, organizational, individual b. Organizational, individual, business partners c. Individual, organizational, business partners d. None of the above

Answer: c

6. Prices that are set through negotiation in a long-term relationship with a company known to the buyer is known as: (Chapter 7, slide 32, difficult) a. Spot buying b. Outsourcing c. Strategic sourcing d. Consumer relation negotiation

Answer: c

What is general formula for how a business is to use computer networks and information systems to compete in a global marketplace? (Ch.7, 204, moderate) a. Mobile commerce b. Procurement c. E-commerce strategy d. Privacy policy

Answer: c

What was the promotion code given to UGA students for mytypeface.com? [bonus application presentation, moderate] a. myuga2 b. myuga5 c. uga5 d. uga2

Answer: c

2. A primary competitor of Twitter would be? [Application presentation, Twitter, difficult] a) Microsoft b) StarPound c) Facebook d) IBM

Answer: c) Facebook (In its use of live feeds)

10. A type of programming that uses continuous testing, simple coding by pairs of developers, and close exchanges with users to build systems quickly? [Chapter 6, page 171, medium] a). Crystal Family b). Scrum c). Extreme d). Targeting Resources

Answer: c- Extreme Programming

What is a form of knowledge management that tries to capture and store the knowledge of a human expert? [chapter 5, slide 25, page 133, moderate] a. Relational database management systems (RDBMS) b. Structured Query Language (SQL) c. ExpertSystem d. Middleware

Answer: c.

Leadership and Management of a business are directly accountable to its owners for proper operation and financial control of the organization is? (Ch.9, pg. 261, moderate) a. IT governance b. Global perspective c. Global sourcing d. Corporate governance

Answer: d

11. A ____________ is a set of procedures and philosophies that a company adopts to handle individually identifiable private information. [Chapter 7, page 205, easy] a). E-commerce Strategy b). Data Security c). Business Model d). Privacy Policy

Answer: d- Privacy Policy

The knowledge work activity that an employee would need to use when finding weekly sales data for a company and its competitors is... [chapter 3, slide 5, page 63, easy] a. Analysis b. Transformation c. Communication d. Discovery

Answer: d.

The OS software performs a/some main task[s]. What are/is they/it? [multiple choice, chapter 2 page 38, difficult] I. Managing the hardware and software resources of a computer II. Providing a stable and consistent interface between application and programs and the hardware. III. Provides additional tools that you can use to maintain and service your system. a. I b. I & III c. II d. I & II e. I, II, & III

Answer: d; III relates to utility software.

Common Gateway Interface (Cgi)

A set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server

Security Policy

A set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets

database

A single table or a collection of related tables

RFID

A technology that uses radio waves to automatically identify objects. Consists of a tag that can transmit a unique serial number to a tag reader. Used for tracking items.

Wifi

A term used to brand wireless local-area networking devices. Devices typically connect to an antenna-equipped base station or hotspot, which is then connected to the Internet. Wi-Fi devices use standards known as IEEE 802.11, and various version of this standard (e.g., b, g, n) may operate in different frequency bands and have access ranges.

Phishing

A type of scam in which a spam emails are sent out by a seemingly real entity (e.g., Bank of America, UGA) asking recipients to follow a link that appears legitimate (but is not) and enter private information (such as credit card numbers, bank account information, SSNs, passwords, and other sensitive information).

The guest speaker Ron Swift, from the Teradata Corporation, addressed the following during his lecture: [Guest speaker, moderate] a. data warehousing, life-cycle management, advantages in using I/S b. client technology support, management for desktops and computer labs, free UGA computer resources c. importance of DIK (data, info, knowledge), differences between hardware and software, the value chain d. I/S consulting, technologies involved with consulting, careers in I/S consulting

ANSWER: A

True/False: A stakeholder is a person who has an interest and an influence on how a business will function in order to succeed. Stakeholders are only those people who are internal relative to the business.

ANSWER: False; they can be internal or external. FROM: Chapter 4, page 87 DIFFICULTY: easy

True/False: Hypertext markup language (HTML) is the primary language for creating Web pages.

ANSWER: True FROM: Chapter 8 slides: slide 10 DIFFICULTY: easy

True/False: Philip Grossman (IS Consulting) said that travel played a large role in the life of an IS Consultant.

ANSWER: True FROM: Guest Speaker DIFFICULTY: easy

You use an ATM. The number you type to indicate the amount of money you want to receive is what type of device? a. input b. output c. All of the above d. None of the above

ANSWER: a FROM: Chapter 2 slides: slide 3 DIFFICULTY: medium

Mass customization means: a. The ability to provide good customer service b. The ability to create custom products or services on-demand c. A marketing message that a business personalizes for each potential customer's interests d. All of the above e. None of the above

ANSWER: b FROM: Chapter 7 slides: slide 17 DIFFICULTY: hard

The acronym C.A.R.R.O.T.S, used to remember the important characteristics of useful data, information, and knowledge, is short for: a. Codifiable, Available, Reliable, Relevant, Objective, Timely, Safe b. Complete, Accurate, Reliable, Receivable, Open, Timely, Source c. Complete, Accurate, Reliable, Relevant, Objective, Timely, Source d. Complete, Available, Reliable, Relevant, Open, Timely, Safe e. Codifiable, Accurate, Reliable, Receivable, Objective, Timely, Source

ANSWER: c FROM: Chapter 3 slides: slide 15 DIFFICULTY: medium

Which of the following applications is NOT a communication network? a. Facebook b. Gin System c. Mytypeface d. Twitter

ANSWER: c FROM: Student application DIFFICULTY: medium

True/False: The LAMP acronym, an increasingly popular set of technologies used in the solution stack of technologies, stands for Linux/ActiveX/MySql/Perl, PHP, or Python.

ANSWER: false FROM: Chapter 8, page 240 DIFFICULTY: hard

Which of the following is a FALSE statement regarding outsourcing? A. Internal staff provides project oversight B. Firm loses some control of project because outsourcer has some decision making authority C. Generally higher time and cost D. Requires good contracts and oversight

C. Generally higher time and cost

Ron Swift showed a "Customer Lifecycle Management" diagram and listed the key events. Fill in the blanks according to his chart. (teradata presentation, slide 23) 1. Birth 2. Graduation 3. 4. Marriage 5. Remarriage 6. 7. Divorce 8. 9. Retirement 10. A. New Job, Children, Child Leaving, Death B. Engagement, Separation, Child Leaving, Death C. New Job, Separation, Death, Child Leaving D. none of the above

C. New Job, Separation, Death, Child Leaving

What are the two important outputs of a business process? A. Inputs and Ouputs B. Data and Knowledge C. Products and Services D. HTML and HTTP

C. Products and Services

Realizing that some risks are unavoidable, and making sure there are contingency plans in place is an example of what organizational response to risk? (Chapter 9, Page 277) A. Risk deferral B. Risk transfer C. Risk acceptance D. Risk avoidance E. None of the above are correct

C.) Risk acceptance

What is the function of Teradata? a. Provide secure internet networks for client corporations b. Streamline the link between online customers and client products c. Process data on both potential and already-existing customers for client companies d. Storage of non-essential data into a data warehouse for later access

D

Which of the following is NOT a disadvantage of leasing an IS? [chapter 6, slide 11, hard] a) No competitive advantage b) No control over features c) Can get bad contract d) Requires IS staff with time and development knowledge e) Dependence on vendor

D

Which of the following is not an information characteristic of the CARROTS model? [chapter 3, slide 15, moderate] a) Accurate b) Timely c) Objective d) Synthesis e) Complete

D

Which of these is not an advantage of e-commerce transactions? a. Higher information density b. Customization c. Global outreach d. Personal Interaction

D

Which one of these is a search engine? [Chapter 7, page 211, easy] a. Google b. Yahoo c. MSN d. all of the above

D

10. A small bit of data, usually created by programs running on the server, stored on the client machine, and passed back and forth in the HTTP request and response is a(n) (Chapter 8, page 235, moderate) A. persistent data B. scripting language C. cookie D. applet

Cookie

3. True or false, to be technically feasible means that the technology to do something exists and is accessible? [Chapter 6, slide 6, moderate] A. True B. False

Correct answer: A

4. E-commerce involves what interfaces for customer transaction? [Chapter 7, slide 4, easy] A. Internet B. Telephone C. Face to face bargaining D. Both A & B

Correct answer: D

5. What are "links"? [Chapter 8, slide 8, moderate] A. The interior processes of a computers CPU B. The way people do business over the internet C. Chains used to securing servers D. The connections between units of information that have been put together by hypertext.

Correct answer: D

10. Nearshoring is business done with partners... [chapter 9, page 267, easy] a. In the same country. b. A far distance outside the country. c. Outside the country, but in the same geographic region. d. No partners are used.

C

Open Office is what type of program? a. Data Management b. Presentation c. Word Processor d. Spreadsheet

C

What is software that links applications that use dissimilar software or hardware platforms? [Chapter 5, page 136, easy] a. Application software b. web service c. middleware d. ERP

C

What is the function of the Interorganizational System? a. Streamline the interaction between the business itself and its suppliers b. Provide additional accountability to each level of the value chain c. Automates the comparison of the purchase order, receipt of goods, and invoice d. Encourage efficiency between each member of a matrix system

C

Which of the following computer types has a large relative processing power with a purpose of organizational processing? [chapter 5, slide 4, hard] a) Server Farms b) Supercomputer c) Mainframe d) Personal Computer (PC) e) Embedded Processors

C

Which of the following is NOT a component of project management? [Chapter 6, page 175, moderate] a. Time management b. Quality management c. Budget management d. Project scope management

C

Which of the following is not one of the 7 phases of IS development? [chapter 6, slide 13, moderate] a) Inception b) Elaboration c) Analysis d) Construction

C

Which of the following types of application software is used for performing general calculations, such as financial analysis, budgeting, and forecasting? [Chapter 2, page 40, easy] a. Database management system b. Document preparation software c. Electronic spreadsheet software d. Document preparation software

C

Which one of the following is not a type of Information System? [Chapter 1, page 14, easy] a. TPS (Transaction Processing System) b. DSS (Decision Support System) c. SIS (Security Information System) d. CRM (Customer Relationship Management) e. MIS (Management Information Systems) f. ERP (Enterprise Resource Management Systems)

C

XML stands for __________________. [chapter 8, slide 37, easy] a) eXternal Media Language b) eXternal Multi-Locator c) eXtensible Markup Language d) eXtremely Moderate Language

C

Which of the following is not a type of global sourcing: [Chapter 9, pg. 267, Hard] a) Onshoring b) Nearshoring c) Outsourcing d) Offshoring

C) OUTSOURCING

4. Which of the following categories of computer hierarchy represents the type of computer with the LEAST processing power at any given time? [Chapter 5, pg. 120, Table 5.1, Easy] a) Server Farms b) Supercomputer c) Personal Digital Assistant d) Server Farm

C) PDA

6) Match the types of e-commerce with their most accurate description. (Chapter 7, Page 197, Table 7.1) (Medium) a. Business-to-consumer (B2C) b. Business-to-business (B2B) c. Business-to-government (B2G) d. Consumer-to-government (C2G) e. Consumer-to-consumer (C2C) 1. Electronic exchanges between companies 2. Electronic payment of taxes as well as purchase of various types of licenses 3. Use of Online auctions like eBay or Yahoo! Auctions 4. Online sales to government agencies, as well as electronic payment of taxes 5. Online equivalent of the retail store as well as other services

Answer= (A,5) (B,1) (C,4) (D,2) (E,3)

Match the following with it's correct definition: [chapter 3, slide 14, easy] a.Decision b.Structured Decision c.Semi-structured Decision d.Unstructured Decision i.A choice that involves some uncertainty or doubt about the outcome of it. ii.A choice about actions to take (or not to take) in a given decision. iii.A choice that can be programmed; it is routine or repetitive. iv.A choice that involves a significant amount of uncertainty about the outcome associated with a choice.

Answers: a) iii., b) ii., c) iv., d) i.

9. Match the four generations of E-commerce: (Chapter 8, slide 4, moderate) Column A: Column B: a. First generation A. Integration with externat partners b. Second generation B. Dynamic content c. Third generation C. Static content d. Fourth generation D. Ability to support transactions

Answers: a-C, b-B, c-D, d-A

Matching: Applet Plug-In ActiveX technology A. A small software module that can work with the browser. B. A small program that a browser can download and execute. C. Used for sharing information among different technologies.

Applet-B Plug-In-A ActiveX technology-C

hypertext transfer protocol (http)

Application transfer protocol that allows Web browsers and Web servers to communicate with each other.

Internet Address

Internet address expressed as a 32-bit number that appears as a series of four separate numbers marked off by periods, such as 64.49.254.91

Web Services

Internet applications that obtain or process data from a requesting application and then deliver the data back in XML format as a response Example: are useful in situations where all people involved use different data formats. An analogy is international organizations using a common language

Java Server Pages (Jsp)

Like CGI and ASP, a Web page coding standard that allows developers to dynamically generate Web pages in response to user requests

Payment Gateway

Links an e-commerce site with the banking network. e.g., National Merchant Bancard is a merchant account for available for people to use when receiving payments from people who purchased items from them on ebay.

Extract, Transform, Load (ETL)

Def: A process in database usage and especially in data warehousing that involves: • Extracting data from outside sources • Transforming it to fit operational needs (which can include quality levels) • Loading it into the end target (database or data warehouse)

Data Mining

Def: A set of techniques for finding trends and patterns in large sets of data. These tools can incorporate advanced technologies such as artificial intelligence and provide aids for data visualization

Transaction

Def: An exchange of goods or services (value) between two or more parties (business, individual, or a combination of the two) the create a relationship between parties Ex: A customer using a bank ATM to withdraw money. Transaction between the customer and the bank

Informating

Def: Recognizing that executing business processes also creates new data and information and that the organization may then process this new data to improve its decision making and to change or improve the process itself. Ex:The information a business gains from automation. This data is used to improve the business process.

Automating

Def: The use technology instead of knowledge workers, to perform tedious or repetitive tasks. This may help a business complete a task with more speed, economy, consistency, and/ or possibly accuracy Ex: Instead of meeting a travel agent to plan a vacation, customers can complete the process of reservations on-line

Transforming

Def:Using IT to help a business acquire or continue a competitive advantage over their competitors by adjusting how the company does business Ex: Walmart uses the information received from their RFIDs, and they are therefore able to provide products to their customers for a lower price

Personalization

Definition: a marketing message that a business customizes for each potential customer's interests, based on his or her searching, browsing, or buying habits Example: Web sites, like Amazon.com use personalization to make recommendations after you register and share information with them

Business to Business E-Commerce Transaction

Definition: electronic exchanges between companies Example: Two companies exchanging virus protection software, mailing lists, or product information

Business to Government E-commerce transaction

Definition: online sales to government agencies, as well as electronic payments of taxes Example: Businesses sending document conversation from hardcopy to goverment in web-based form

Information Density

Definition: the quality and quantity of information about products and services of interest to the buyer Example: product or service reviews, price comparisons, and product guides on web sites, like PCMag.com or CNet.com, provide valuable information to consumers

Preventive Controls

Designed to prevent increased exposure to risk by stopping some action or process before it occurs. Example: requiring UGA students to change their MyID passwords once a semester.

RAM (Random Access Memory)

Hardware that stores data only until it is no longer needed, or until the computer is shut down. It is a type of data storage, when you load software like Microsoft office applications the CPU loads the software instructions and loads them into the main memory. The CPU stores the text that you are typing in this special memory, and goes away when you shut the computer down.

ROM (Read Only Memory)

Hardware that stores instructions and data that only special devices can alter. In a computer, this memory holds the instructions used to control the startup processes (booting up). Example, This type of memory is a type of data storage that is included in devices like calculators and digital cameras. When you boot it up the memory comes back because the memory holds the instructions used to control the startup process.

9. What are the four primary components of a typical e-commerce site are: [chapter 8, slide 24, moderate] a. The shopping and ordering system b. The merchant account c. The payment gateway d. The security system e. All of the above

E

What types of industries are using MIS to help their business grow? [Swift presentation, page 10 ppt, easy] a. Retail b. E-Commerce c. Travel d. Casino e. All of the Above

E

What are the four primary components of a typical e-commerce site are: [chapter 8, slide 24, moderate] a.The shopping and ordering system b.The merchant account c.The payment gateway d.The security system e.All of the above

E. All of the above

Reengineering

ELIMINATING AND REBUILDING OPERATIONS FROM THE GROUND UP; often involves new machinery and elimination of management layers; frequently involves information technology

status information

ES can quickly retrieve this in case of an exception; providing reports and responding to specific queries

Composite Applications

ES of customer data + ES of Google Maps = Composite App

Mashup

ES of customer data + ES of Google Maps = mashup

Bleeding edge

FAILURE OCCURRING BECAUSE OF COMPANY TRYING TO BE ON LEADING EDGE; no prior experience from which to learn; implementation costs are greater than anticipated; technology ends up losing money for company

True/false: There are two types of firmware, or software built into chips: utility software and application software.

FALSE; System software, which is comprised of operating system and utility software, and application software.

internet backbone

High-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.

Denial Of Service (Dos) Attack

Flooding a Web site with useless traffic to inundate and overwhelm the network

Enterprise Resource Planning (ERP)

Focus primarily on the internal operations of an organization, and they integrate functional and cross-functional business processes

Genetic algorithms

Follow a mathematical approach of genetics and evolution. Examine many potential solutions to a problem, iteratively modifying them and keeping the best solutions to mate further.

System Software

Includes any software required to control the hardware components and to support the execution of application software Example:Operating software: Microsoft Windows, Utility software: Firewall

Service-Oriented Architecture (SOA)

New technologies that could help link, or integrate, many different client-server systems together in new and valuable ways

Entity-Relationship Diagram (ERD)

One of the two most commonly used models for designing the organization of a relational database. This indicates the entities, as well as how they are related, for which an IS will store data. For example, an e-voting system uses this diagram to indicate the voter and candidate information, who they relate to each other, and how an information system can store them most efficiently.

Offshoring

Outsourcing that results from a partnership with a business in a far-distant country from the home office. e.g., The national insurance group, Farmers Group, insources IT processors to avoid the costs of outsourcing. e.g., A company from Atlanta outsources to its business partner in Tokyo, Japan.

BRIC Countries

Refers to four countries with quick growing economies: Brazil Russia India China

Instance-Level Information

Related to one particular instance of the process, a specific order requisition

Dynamic Page Generation

The contents of a Web page are stored as objects in a database, rather than being hard-coded in HTML. When the user requests a Web page, the contents for that page are then fetched from the database

data - information - knowledge

The continuum from 1) unprocessed facts and figures without any added interpretation or analysis to 2) data that has been interpreted so that it has meaning for the user to 3) a combination of information, experience and insight that may benefit the individual or the organization.

Timely

The data source contains data that are appropriate and current for the time frame during which the data are needed. Example: Can a forecast of yesterday's weather be considered timely information in deciding what to wear today? Since the information is not timely, it cannot be used in the present time.

Accurate

The data source contains data that is correct. Example: Your course schedule shows a class starting at 11P.M. Is it wrong? The information is inaccurate, the user could miss their class.

Objective

The data source contains data that is unbiased. Example: Could you consider information found the Web site of a political party to be impartial? Online political options tend me be bias, and unreliable.

Complete

The data source contains the entire range of data you need. Example: A new team member's phone number is 555-1212. Do you need an area code? The information is no use since it is incomplete.

IT Governance

The distribution of IT decision making rights & responsibilities among enterprise stakeholders, and the procedures and mechanisms for making and monitoring strategic decisions regarding IT.

Analysis

The knowledge work activity that will help you answer questions and gain understanding through a thoughtful investigation and examination of the available data, information, and knowledge. Example: When you are trying to figure out how to add business value to your company, you may perform stage of your company to gain a better understanding of the situation.

relational databases

The most common standard for expressing databases, whereby tables (files) are related based on common keys

Advanced Encryption Standard (Aes)

The most widely used symmetric key encryption algorithm. Offers 128-, 192-, and 256-bit keys

IS Integration Problem

The problem of combining all of the disparate technologies into a single, overall system. So pretty much trying to combine different types of software that do not go together to make them work as a system. Example: If you create a spreadsheet in Microsoft Excel and create a chart from the data, then copy/paste the chart to Open office's presentation tool, then updating the chart would be a hassle because the programs can't be integrated. Where as if you paste that same chart to MS Powerpoint correctly, when the data on the spreadsheet is changed, the chart on the presentation can be updated with the click of a button.

Systems Analysis and Design

The process of completing an IS project, which involves the four essential ingredients: people, methodology, management, and tools. Failure of any one of the four areas can cause a whole project to come crashing down. For example, even if the tools are adequate, the people are committed, and the methodology is understood, a project can fail if there is no central management to bring the requirements together.

Key Performance Indicators

The standard definition of what is expected of a process

C2C E-Commerce Transactions

The use of information systems, technologies, and computer networks by individuals and organizations to carry out transactions in orde to create or support the creation of business value Ex. Online auctions like eBay or Yahoo auctions

Mobile Commerce

The use of laptops, mobile telephones, and personal digital assistants (PDA's) to connect to the Internet and Web to conduct many of the activities normally associated with e-commerce while on the go. Ex.Using your iPhone to place a bid for an item on eBay or to make an online bill payment

8. Match the following E-commerce generations with their descriptions: [Chapter 8, Slide 4, medium] a. First A. Increasing integration with external partners on the Web including allowing transactions between web applications. b. Second B. Growth in businesses' ability to support transactions on the Web. c. Third C. Static content such as company information, online marketing, and company brochures. d. Fourth D. Dynamic content where Web page changes depending on a number of factors such as time and date, user profile, or browser location

a) C b) D c) B d) A

12. Put the following computer types in order, from largest to smallest size of relative processing power. [chapter 5, page 120, difficult] I. Supercomputer II. Personal digital assistant III. Server farms IV. Personal computer V. Embedded processor VI. Mainframe

a) I. Supercomputer, VI. Mainframe, III. Server farms, IV. Personal Computer, II. Personal digital assistant, V. Embedded processor

What is the name of out sourcing by a company to another country? a. Offshoring b. out-housing c. in-housing

a) Offshoring

What does SAD stand for? a) Systems Analysis and Design b) Systems and Design c) Systems Account Programming d) Strategy Analysis and Design

a) Systems Analysis and Design

Is the following statement true or false: The governance of Information Technology includes the distribution of Information technology decision-making rights and responsibilities among enterprise stakeholders. a) True b) False

a) True

3. Match the following with it's correct definition: [chapter 3, slide 14, easy] a. Decision b. Structured Decision c. Semi-structured Decision d. Unstructured Decision i. A choice that involves some uncertainty or doubt about the outcome of it. ii. A choice about actions to take (or not to take) in a given decision. iii. A choice that can be programmed; it is routine or repetitive. iv. A choice that involves a significant amount of uncertainty about the outcome associated with a choice.

a) ii. b) iii. c) i. d) iv.

In Matt Gonzales's presentation, he mentioned that there is discounted software available for UGA students online : a. True b. False

a) true

. If a global company wanted their computer networks in the U.S. to be connected to their computer networks in Japan, they would need to use a ___________. (Chapter 2, Slide 14 of Chapter 2 Powerpoint, moderate) a) PAN b) WAN c) LAN d) CAN

WAN

Competitive advantage

WHEN THERE IS SOMETHING THAT YOUR CUSTOMERS CAN NOTICE THAT YOU DO BETTER THAN YOUR COMPETITORS; achieved when a for-profit company increases market share and increases profits significantly

Full-duplex channel

a communications channel that permits data transmission in both directions at the same time (like two simplex-channels)

Reverse 911 services

a communications solution that delivers emergency notifications to users in a selected geographical area

Sales Revenue Model

a company derives revenue by selling goods, information, or services

Subscription Revenue Model

a company offers its users content or services and charges a subscription fee for access to some or all of its offerings

Advertising Revenue Model

a company provides a forum for advertisements and receives fees from advertisers

Affiliate Revenue Model

a company steers business to an affiliate and receives a referral fee or percentage of the revenue from any resulting sales

E-Distributor

a company that supplies products and services directly to individual businesses

Real-Time Customer Service Chat Systems

a company's customer service representatives interactively exchange text-based messages with one or more customers on a real-time basis

First-Mover Advantage

a competitive market advantage for a firm that results from being the first into a marketplace with a serviceable product or service

Virus

a computer program that has the ability to replicate or make copies of itself, and spread to other files

scalability

a concept related to the number of users or the volume of operations that a given hardware/software combination can manage

Internet2®

a consortium of more than 200 universities, government agencies, and private businesses that are collaborating to find ways to make the Internet more efficient

Smart Card

a credit-card size plastic cards with an embedded chip that stores personal information; can be used to support mobile wireless e-commerce payments

Distributed database -

a database in which the data can be spread across several smaller databases connected via telecommunications devices

Relational model -

a database model that describes data in which all data elements are placed in two-dimensional tables, called relations, which are the logical equivalent of files

Data Warehouse

a database that collects a firm's transactional and customer data in a single location for offline analysis

Data warehouse -

a database that collects business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers

Object-oriented database -

a database that stores both data and its processing instructions

multiplexer

a device that combines data from multiple data sources into a single output signal that carries multiple channels, thus reducing the number of communications links needed and therefore, lowering telecommunications costs

Digital Certificate

a digital document issued by a certification authority that contains the name of the subject or company, the subject's public key, a digital certificate serial number, an expiration date, an issuance date, the digital signature of the certification authority, and other identifying information

Chat room

a facility that enables two or more people to engage in interactive conversations over the internet

Hypermedia

a feature that enables users to access information by clicking text or graphics

Key -

a field or set of fields in a record that is used to identify the record

Foreign Key

a field that is common to two tables; it is used to link the tables; this field is a primary key in one table and a ________ in the other (in a Relational Model)

first mover

a firm that is first in a particular area and that moves quickly to gather market share

Synchronous communications

a form of communications where the receiver gets the message instantaneously, when it is sent

Predictive analysis -

a form of data mining that combines historical data with assumptions about future conditions to predict outcomes of events, such as future product sales or the probability that a customer will default on a loan

Commodity

a good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical

Entity Relationship Diagram

a graphical representation of all entity relationships

Object-oriented database management system -

a group of programs that manipulate an object- oriented database and provide a user interface and connections to other application programs

Database management system (DBMS) -

a group of programs that manipulate the database and provide an interface between the database and the user of the database and other application programs

point to point protocol (PPP)

a layer-2 protocol used for networks that involve just two computers.

Zigbee

a less-expensive, lowpower, and simpler form of radio network operating in the 2.4 GHz band and other bands that allows small appliances and sensors to talk with one another

Access control list (acl)

a list that encodes the rules stating which packets are to be allowed through a firewall and which are to be prohibited

Perfect Market

a market in which there are no competitive advantages. All firms have equal access to all factors of production

Extensible Markup Language (Xml)

a markup language specification developed by the World Wide Web Consortium (W3C) that is designed to describe data and information

content streaming

a method for transferring multimedia files over the internet so that the data stream of voice and pictures plays more or less continuously without a break, or very few of them; enables user to browse large files in real time

Radio Frequency Identification (Rfid)

a method of automatic identification that uses short range radio signals to identify objects and users

Concurrency control -

a method of dealing with a situation in which two or more people need to access the same record in a database at the same time

Packet Switching

a method of slicing digital messages into packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination

Client/Server Computing

a model of computing in which powerful personal computers are connected in a network together with one or more servers

dial-up modem

a modem that performs the conversion between analog and digital in such a way that the signal can be carried on a regular telephone line

Internet Message Access Protocol (Imap)

a more current e-mail protocol that allows users to search, organize, and filter their mail prior to downloading it from the server

wide area network (WAN)

a network that connects computers located at different geographic locations

Business strategy

a plan to help an organization outperform its competitors; often done by creating new opportunities, not beating rivals

Virtual private network (VPN)

a private network that uses a public network (usually the internet) to connect multiple remote locations

Augmented Product

a product with additional benefits to customers beyond the core benefits embodied in the actual product

Ping

a program that allows you to check the connection between your client and the server

frame relay

a protocol that can process traffic in the range of 56kbps to 40 mbps by packaging data into frames

File transfer protocol (FTP)

a protocol that describes a file transfer process between a host and a remote computer and allows users to copy files from one computer to another

asynchronous transfer mode (atm)

a protocol that divides data into uniformly sized cells, eliminates the need for protocol conversion and can process speeds 1 to 156 mbps. can support both voice and data communication

Enterprise resource planning (ERP) Software -

a set of integrated programs that manage a company's vital business operations for an entire multisided global organization. (It basically it's a set of programs that manage stuff like finance and logistics and trash like that

Front-end processor

a special-purpose computer that manages communications to and from a computer system serving hundreds or even thousands of users

Nice Applications

a specific function that is part of a best-of-breed application

Data mart -

a subset of a data warehouse

electronic funds transfer (EFT)

a system of transferring money from one bank account directly to another without any paper money changing ands

Videoconferencing

a system that combines video and phone call capabilities with data or document conferencing

Admahl's Law

a system's speed is determined by its slowest component or the "last mile"

pretexting

a technique for gathering unauthorized information in which someone pretends to be someone else.

Digital Envelope

a technique that uses symmetric encryption for large documents, but public key encryption to encrypt and send the symmetric key

Permissive Model

a type of licensing model where anyone can use and sell modified versions of the software

Wireless LANs (WLANs)

a type of network that offers advantages such as easier installation, more scalable, and more flexible

Application Software

a type of software that accomplishes a specific task; examples include excel or word

Search engine

a valuable tool that enables you to find information on the web by specifying works that are key to a topic of interest, known as keywords

Analog signal

a variable signal continuous in both time and amplitude so that any small fluctuations in the signal are meaningful

planned data redundancy -

a way of organizing data in which the logical database design is altered so that certain data entities are combined, summary totals are carried in the data records rather than calculated from elemental data, and some data attributes are repeated in more than one data entity to improve database performance

Wireless mesh

a way to route communications between network nodes by allowing for continuous connections and reconfiguration around blocked paths by "hopping" from node to node until a connection can be established

Web log (blog)

a web site that people can create and use to write about their observations, experiences, and feelings on a wide range of topics

Bluetooth

a wireless communications specification that describes how cell phones, computers, etc, can be interconnected over distances of 10-30 ft at a rate of about 2Mbps

Infrared transmission

a wireless communications technology that operates at a frequency of 300 GHz and above that requires line-of-sight transmission and operates over short distances - such as a few yards

ultra wideband (UWB)

a wireless communications technology that transmits large amounts of digital data over short distances of up to 30 ft using a wide spectrum of frequency bands and very low power

4. A transactions is a unite of work that has the four characteristics of: a) Atomicity, Isolation, Consistency, and Durability b. Atomicity, Creation, Isolation, and Depth c. Depth, Control, Internal Monitoring, and Appropriation d. Durability, Control, Stability, and Speed

a) Atomicity, Isolation, Consistency, and Durability

Open Source Software

Software for which the programming code is freely available to anyone who wishes to download it over the Internet. The only requirement is that any change a programmer makes to the code must also be made freely available to other persons. Example:The Linux Operating System

Proxy Server (Proxy)

Software server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for the organization

Productivity Software

Software used by knowledge workers to work with data, information, and knowledge Example: Microsoft Office, Database management system, Microsoft PowerPoint

instance-level information

Status of a purchase requisition / order Has a requisition been acted on? Has a PO been created and sent Have goods been received for the requisition / order? When? Where are the goods? If received, has an invoice been received? Paid? If not received, when can we expect the goods?

Knowledge Management System

Systems that provide tools for working both tacit and explicit knowledge. Example:Using artificial intelligence to recognize patterns in stock prices.

True/false: an information system is an organized collection of people, information, business processes, and information technology, designed to transform inputs into outputs, in order to achieve a goal.

TRUE

Central Processing Unit (CPU)

The brain of the computer. It has two components: ALU(Arithmetic Logic Unit) that performs calculation and CU(Control Unit) that controls the flow of operations. This hardware takes instruction from the memory and runs them.

Information Technology (IT)

The branch of knowledge that deals with the uses of hardware, software, and networks to convert, store, protect, process, transmit, and retrieve information. For Example: Computers, cell phones, PDAs, etc.

Digital Subscriber Line (DSL)

data remains digital through entire transmission; there are two types of this that include asymmetric and symmetric

transaction data

data that is the result of day-to-day transaction: who, what, when, where, from, how much

Payment Terms

define how the company is to pay the vendor

payment terms

define how the company is to pay the vendor; payment is due either the date the company receives the invoice or the date it receives the shipment, whichever is later. If the company fails to make the payment within the specified terms then the supplier might add a finance charge

master data

define the key entities with whom an organization interacts such as customers and suppliers ex:name, address, contact person and are used repeatedly in executing processes

Latency

delays in messages caused by the uneven flow of information packets through the network

Output Devices

deliver information from the computer to the user; examples are monitors and printers

Digital Subscriber Line (Dsl)

delivers high-speed Access through ordinary telephone lines found in homes or businesses

Authorization Policies

determine differing levels of access to information assets for differing levels of users

Access Controls

determine who can gain legitimate access to a network

Desktop publishing tools

develop items for publication, such as pamphlets, newsletters, cards, calendars, etc

symmetrical digital subscriber line (sdsl)

dsl lines that have the same upload and download speeds

Collaborative Software/Groupware

enables communication between team members and helps them to share data, information, and knowledge Example: Google Docs is a good example, but more simple things like email and electronic calendars are examples as well

Radio Frequency Identification (RFID)

enables rapid transactions and payments; used in a variety ways such as at gas station pumps or to track/locate items in warehouses

Substitution Cipher

every occurrence of a given letter is replaced systematically by another letter

Asymmetry

exists whenever one participant in a market has more resources than other participants

Gigabit Ethernet

faster Ethernet connection of one Gbps or greater

Grey Hats

hackers who believe they are pursuing some greater good by breaking in and revealing system flaws

Multimedia Software

handles many different types of data; often used in education, training exercises, and compiling and integrating data for business situations

Backbone

high-bandwidth fiber-optic cable that transports data across the Internet

Internet backbone

highest speed channels

Hyperlink

highlighted text or graphics in a web document that, when clicked, opens a new web page or section of the same page containing related content

Outsourcing

hiring an outside vendor to provide the services you cannot perform with in-house personnel

Internet Exchange Point (Ixp)

hub where the backbone intersects with local and regional networks and where backbone owners connect with one another

According to Peter Drucker, knowledge workers are people who: a) are at the heart of the new economy b) require a good deal of formal education c) require the ability to acquire and to apply theoretical/analytical knowledge d) require a habit of continuous learning e) all of the above

e) all of the above

The business environment, one of the most important factors influencing a business, consists of: a) customers b) suppliers c) competitors d) governments e) all of the above

e) all of the above

non-merchant companies

e-commerce companies that arrange for the purchase and sale of goods without ever owning or taking title to those goods

Two-Tier Architecture

e-commerce system architecture in which a Web server responds to requests for Web pages and a database server provides backend data storage

Multi-Tier Architecture

e-commerce system architecture in which the Web server is linked to a middle-tier layer that typically includes a series of application servers that perform specific tasks as well as to a backend layer of existing corporate systems

What are the four primary components of a typical e-commerce site are: [chapter 8, slide 24, moderate] a. The shopping and ordering system b. The merchant account c. The payment gateway d. The security system e. All of the above

e. All of the above

Which of the following is NOT a disadvantage of file systems? [chapter 5, slide 9, moderate] a. Data Redundancy b. Data Dependence c. Data Inaccessibility d. Poor File Management e. Data Independence

e. Data Independence

10) Which of the following is a result of the new technologies used in today's form of e-commerce? [Chapter 7, slide 12, easy] a) Universal standards b) Higher information density c) Customization d) Ubiquity and accessibility e) All of the above

e. all of the above

WiMax

emerging technology based on the IEEE 802.16 standard. design to deliver the "last mile" and could replace cable and dsl

Transactive Content

results from the combination of traditional content, such as articles and product descriptions, with dynamic information culled from product databases, tailored to each user's profile

One-To-One Marketing

segmenting the market based on a precise and timely understanding of an individual's needs, targeting specific marketing messages to these individuals, and then positioning the product vis-à-vis competitors to be truly unique

Supply Chain

sequence of activities involved in producing and selling products or services (for products includes marketing, purchasing raw materials,etc & for services includes marketing, monitoring customer portfolios, etc)

Computer programs -

sequences of instructions for the computer

Procurement Process

series of steps that a company takes to obtain or acquire necessary materials, aka "requisition-to-pay" process

Database Server

server designed to access specific information with a database

Gateway

serves as an entrance to another network

Psychological Profile

set of needs, drives, motivations, perceptions, and learned behaviors

protocol

set of rules governing communication between computers; the most important set of ________ for telecommunications and networks is called TCP/IP

Collaborative Filtering

site visitors classify themselves into affinity groups characterized by common interests; products are then recommended based on what other people in the group have recently purchased

Community Provider

sites that create a digital online environment where people with similar interests can transact (buy and sell goods); share interests, photos, and videos, communicate with like minded people, and receive interest-related information

electronic exchange

sites that facilitate the matching of buyers and sellers

operating system

software includes specialized "..." software needed to execute operations from the applications on the hardware and custom applications

Online analytical processing (OLAP) -

software that allows users to explore data from a number of perspectives

Driver

software that enables OS to control a device

Web Server Software

software that enables a computer to deliver Web pages written in HTML to client computers on a network that request this service by sending an HTTP request

Packaged Software

software that is ready to install from external storage media such as CDs

E-Commerce Merchant Server Software

software that provides the basic functionality needed for online sales, including an online catalog, order taking via an online credit card processing

Workgroup application software -

software that supports teamwork whether in one location or around the world. This encourages teamwork with software called groupware of collaborative software

Bot

software tool that searches the web for information such as products and prices

Proprietary Software

sold/licensed for profit; source code is private and not available; user purchases license to use software from developer (ex: Apple, Microsoft, Internet Explorer)

Router

special-purpose computer that interconnects the computer networks that make up the Internet and routes packets to their ultimate destination as they travel the Internet

router

special-purpose computer that moves network traffic from one node on a network to another

switch

special-purpose computer that receives and transmits data across a network

Web services

standards and tools that streamline and simplify communication among web sites for business and personal purposes

data safeguards

steps taken to protect databases and other organizational data by means of data administration and database administration

Chief security officer (CSO)

supervises security of information system; usually reports to chief information officer (CIO)

Just in time manufacturing

suppliers ship parts directly to assemply lines as needed; avoids warehousing costs

Help desk technician

supports end users in their daily use of IT; often provides help via telephone

Enterprise Resource Planning Systems

systems that occur inside the walls of business and mainly serve managers in monitoring and modifying business practices; also supports the planning of shipping resources such as personnel, funds, raw materials, and vehicles.

Supply Chain Management Systems (SCM)

systems that support the sequence of activities involved in producing and selling products or services and are linked to become one large IS providing information on any stage of a business process.

Personal sphere of influence -

the sphere of influence that serves the needs of an individual user. Basically improves the quality and amount of work they can do. This is the information system

ieee 802.3 protocol

the standard, also called ethernet

Marketing

the strategies and actions firms take to establish a relationship with a consumer and encourage purchases of its products or services

Photonics

the study of communicating with light waves

reach

the total number of users or customers an e-commerce business can obtain

Narrowband

the traditional telephone modem connection, now operating at 56.6 Kbps

Service-oriented architecture (SOA) -

this is kinda what middleware has developed into a people got better at all this stuff. It basically allows users to interact with systems, and systems to interact with other systems. They really go together more or less

Magnetic Strips

this is on credit cards and store encoded data; this is not a source, but its reader is

Time to market

time between generating an idea for a product and completing a prototype

Spoof

to misrepresent oneself by using fake e-mail addresses or masquerading as someone else

cable modem

type modem that provides high-speed data transmission using cable television lines. always on

Wide area network (WAN)

type of network that is a far-reaching system of networks composed of LANs or MANs; may be public or private

IP spoofing

type of spoofing whereby an intruder uses another site's IP address as if it were that other site

phased installation

type of system conversion in which the new system is installed in pieces across the organization

Voice over Internet Protocol (VoIP)

uses internet connection to conduct telephone conversations; includes flat monthly charge instead of per call charge

Object-oriented database model

uses object-oriented approach for the database structure

Distributed Denial Of Service (Ddos) Attack

using numerous computers to attack the target network from numerous launch points

malware

viruses, worms, trojan horse, spyware, and adware

Web browser

web client software such as internet explorer, firefox, and safari used to view web pages

Customer service

web provides automated service 24/7, includes FAQs, tracking systems, maintenance of customer profiles

Feature Creep

when developers add extra features that were not part of a project's initial requirements

Closed Loop Marketing

when markets are able to directly influence the design of the core product based on market research and feedback from the market

Personal area network (PAN)

wireless network designed for handheld and portable devices; used by one or two people; transmission speed is slower; max distance is about 10 meters

TCP/IP

A communications protocol developed under the US Department of Defense to internetwork dissimilar systems. Example: Being able to access the WWW and using ISP(Internet Service Providers) to see the information and data.

Structured query language (SQL):

A language used to create and manipulate databases

row or record

A row in a database table. Records represent a single instance of whatever the table keeps track of (e.g., student, faculty, course title)

Secure Hypertext Transfer Protocol (S-Http)

A secure message-oriented communications protocol designed for use in conjunction with HTTP. Cannot be used to secure non-HTTP messages

Business Process

A series of steps that an organization needs to perform in order to transform inputs into their main outputs (products and services).

6. The _____ usually leads to the organization's information and technology efforts, especially as it relates to the creation of business value. (Chapter 9, page 264, moderate) a. CEO b. CIO c. CFO d. COO

CIO

Network Interface Layer

responsible for placing packets on and receiving them from the network medium

Database administrator (DBA):

Job title focused on directing, performing, or overseeing activities associated with a database or set of databases

Two basic types of networks

LANs and WANs are...

4. Which of the following introduces uncertainty into the individual decision-making process?(Chapter 3, Slide 14 of Chapter 3 Powerpoint, moderate) a. structured decision b. unstructured decision c. semi-structured decision d. uncertain decision

Semi-Structured

taken private

The process by which a publicly held company has its outstanding shares purchased by an individual or by a small group of individuals who wish to obtain complete ownership and control.

Software

The set of instructions that direct information technology hardware. Example: Firewall, database management system, electronic spreadsheet software

peering

When separate ISPs link their networks to swap traffic on the Internet.

Data Layer

Where the application stores your work (hard drive or flash drive)

Match the following [Field Guide A, pgs 305-315, moderate]: Column A Column B a.RAM A. Input device b.USB Port B. Memory c.Printer C. Storage d.Webcam D. Output Device

aB, bC, cD, dA

Magnetic-ink Character Recognition (MICR)

detects magnetic ink on checks

Output Hardware

devices that convert IT-processed information into a form usable by knowledge workers (or other machines). Examples: Printers, speakers, controllers

Wireless NIC (WNIC)

devices that enable wireless networks by communicating with wireless access points.

b2b

e-commerce sales between companies

Material requirements planning (MRP)

inventory control; determines when inventory needs to be restocked; can predict future need based on demand forecasts

schedule feasibility

one of four dimensions of feasibility

canned reports

provide regular summaries of information in a predetermined format

niche solutions

provided by smaller ISVs who build on top or in between suites and best-of-breed applications to address very specific business processes in companies

Broadband

refers to any communication technology that permits clients to play streaming audio and video files at acceptable speeds—generally anything above 100 Kbps

Mainframe Computers

store large amounts of data and business transactions; most businesses use this type of computer

Internal Memory (Primary Memory)

stores data and instructions before and after CPU processes them; includes RAM and ROM

Off the shelf -

stuff that you can buy that does what you need it to do, even though it's not custom fitted to every aspect. So you don't have the terminology unique to your organization necessarily or stuff like that. But it's a whole lot less expensive, and easier to implement

sniffing

technique for exchanging messages encoded in XML. SOAP sits on top of any available transport protocol as HTTP, HTTPS, or FTP

Automating uses technology to perform tedious or repetitive tasks faster, cheaper, more consistently, and with greater accuracy. [chapter 4, slide 21, moderate] a) True b) False

A

The applications studyblue.com and flashcarddb.com allow one to both make and view flashcards online. [bonus application presentation, easy] a) True b) False

A

The sequence of first-generation e-commerce activities provides what type of network? [Chapter 8, page 228, moderate] a. Client/Server b. Static content c. Dynamic content d. Java

A

__________ is a marketing message that a business personalizes for each potential customer's interests based on searching, browsing, or buying habits, e.g. Amazon.com. [chapter 7, slide 16, moderate] a) Personalization b) Mass customization c) Customization d) All of the above e) None of the above

A

Company Centric Business Model

A business model for when a company is either a seller to many other companies (one-to-many) or a buyer from many other companies (many-to-one). e.g., A restaurant buys products from multiple companies to function. For example, food products, cleaning products, and the kitchen equipment are all purchased from different companies by the one restaurant.

World Wide Web

A collection of Internet software applications and standards that allows us to transfer text, images, audio, and video. (Makes it easy to publish info so it is accessible to knowledge workers and trading partners) Example:Logging onto Google, searching and finding information on the web

Application Software

A complete, self-contained program, or set of programs, for performing a specific job Example: Microsoft Word

Algorithm

A detailed sequence of actions that, when followed, will accomplish some task Example:Instructions for assembling a model airplane

key

A field or combination of fields used to uniquely identify a record, and to relate separate tables in a database. Examples include social security number, customer account number, or student ID

Customer Relationship Management (CRM)

A software system to help businesses connect with customers and their divers and changing eeds. Integrates data collection, transformation, storage, and analysis of customer transaction data including purchases, service requests, and other forms of customer contact. Example: An example of a company who uses a customer relationship management system is E-Trade; Michael Krompegal's talk

Dashboard

A user interface that organizes and presents information in a way that is easy to read. For example, a product might obtain information from the local operating system in a computer, from one or more applications that may be running, and from one or more remote sites on the Web and present it as though it all came from the same source.

Value Chain

A view of business organization as a connected series of activities each of which adds value or supports the addition of value to the firm's goods or services. With this perspective, every action that the organization takes is either a primary activity or a support activity

8. ________ are software tools that search the Internet for page and sites and store the results in a database of a search engine? [Chapter 8 pg. 242, Moderate] a) web crawlers b) gateways c) shopping carts d) payment systems

A) WEB CRAWLERS

2. T/F: IS Consultants work with 1 or 2 small companies. [Guest Speaker Presentation, Philip Grossman, easy]

Answer: False

The network interface card (NIC) is a type of communications hardware. [Ch.2, Pg.35, easy] a. true b. false

ANSWER: A (TRUE); provides the physical connection between the computer and a local network

7. A stakeholder analysis should begin as part of the feasibility study and should be continued during the course of the project. (Chapter 6, slide 9, moderate) a. True b. False

Answer: a

Which of the following provides financial information to the organization's financial managers? a. Accounting IS b. Financial IS c. Marketing IS d. Human Resource IS e. Manufacturing IS

B

4. If a company wanted it's decision making to occur lower in its organization system and closer to the customer, which organization structure would it choose? [chapter 4, slide 12, hard] a. Functional b. Decentralized c. Matrix d. Linear

C

This adds insight and ethics to the data-information-knowledge continuum A. Knowledge B. Data C. Wisdom D. Information

C

2. Which of the following is an example of input hardware? a. printer b. network interface card c. microprocessor chip d. keyboard e. both a and d

D

B2C e-commerce

Online businesses selling to individual customers

B2B e-commerce

Online businesses selling to other businesses

Sarbanes Oxley

Passed in 2002, a law that holds a company's executive officers personally responsible for providing accurate public financial information to investors. Law is relevant to IS because company's financial records are stored in information systems.

Workflow Management System/ Business Process Management

Supports activities that several departments of the organization may carry out by supporting and automating workflow Example: An example could be a online product order--steps include order placement, validation of both customer credit and availability of inventory, payment processing and order fulfillment. At each step in the workflow, information and documentation are needed and generated

Effectiveness

THE DEGREE TO WHICH A GOAL IS ACHIEVED

Reliable

The data source contains data that are dependable and consistent with data from other comparable data sources. Example: An unsolicited e-mail offers to share millions of dollars with you. Is this reliable? Receiving unreliable information could lead to misuse of your personal information.

Relevant

The data source contains data that can be applied to today's problems and objectives. Example: Is an article on IS operations dated Dec. 1, 1999 about the Y2K problem relevant to today's problems? Since the newspaper is irrelevant, it does not bring forth a great deal of information.

Record -

a collection of related data fields

File -

a collection of related records

Software suite -

a collection of single application programs packaged in a bundle (kinda like office)

Voice over internet protocol (VoIP)

a collection of technologies and communications protocols that enables your voice to be converted into packets of data that can be sent over a data network such at the internet, a WAN or LAN

world wide web

a collection of tens of millions of server computers that work together as one in an internet service using hyperlink technology to provide information to billions of users

Network

a combination of devices (or nodes) connected through a communication media; any device that can transmit and receive on a ________ can be part of a _________.

Match the hardware components with their definition. [chapter 2, slide 3, moderate] Column A a. Processing b. Memory c. Input d. Output e. Storage Column B A. provides the interface used to retrieve information from a device B. stores data, information, and instructions for the long term C. directs execution of instruction and the transformation of data D. provides the interface used for data entry into a device E. temporarily stores data and instructions before processing

aC, bE, cD, dA, eB

Encryption

ability to scramble and encode messages; uses specific _________ keys shared only between sender and receiver

Stored-Value Payment System

account created by depositing funds into an account and from which funds are paid out or withdrawn as needed

Accumulating Balance Payment System

account that accumulates expenditures and to which consumers makes periodic payments

three-way match

accounting retrieves the corresponding purchase order and goods receipt documents and compares them to the invoice to make sure they all match

Cost accounting systems

accumulate data about costs involved in producing specific products

Competitive Advantage

achieved by a firm when it can produce a superior product and or bring the product to market at a lower price that most, or all of its competitors

Network administrator

acquires, implements, manages, maintains, and troubleshoots networks; implements security

encryption algorithms

algorithms used to transform clear text into coded, unintelligible text for secure storage or communication. common used are DES, 3DES, AES

MAC address

also called physical address. a permanent address given to each network interface card (NIC) at the factory

Hash Function

an algorithm that produces a fixed-length number called a hash or message digest

Digital Cash

an alternative payment system development for e-commerce in which unique, authenticating tokens representing cash value are transmitted from consumers to merchants

Virtual Reality (VR)

an application that mimics sensory reality using software; simulates sight, hearing, and touch

Chapter 7 easy p. 209 2. Which of the following is not a key to keeping strong passwords? A) using upper- and lowercase characters B) change your password regularly C) use at least eight characters D) choose a common name that is easy to remember

answer d

Internet service provider (ISP)

any company that provides internet access to people or organizations

Globalization does not do which of the following: a) stimulate economic growth b) lower prices for goods and services c) strengthens local communities d) destroys jobs in advanced countries

c) strengthens local communities

key escrow

control procedure whereby a trusted party is given a copy of a key used to encrypt database data

Imaging

converts documents into images; this saves paper

modem (modulator/demodulator)

converts the computer's digital data into signals that can be transmitted over telephone or cable lines

Compiler -

converts the programmer's code into binary digits that make up machine-language

E-Procurement Firm

creates and sells access to digital electronic markets

Versioning

creating multiple versions of information goods and selling essentially the same product to different market segments at different prices

Rapid prototyping

creating one-of-a-kind products to test design in three dimensions

system definition phase

first phase of the sdlc in which developers with the help of eventual users, define new system's goals and scope, assess its feasibility, form a project team and plan the project

Router

forwards data packets across two or more distinct networks toward their destinations, through a process known as routing

implementation phase

fourth phase in the sdlc in which developers build and integrate system component, test the system, and convert to the new system

Strategy

framework, or approach, to obtaining an advantageous position

Open Source Software

free source code; developed through voluntary collaboration of programmers; source code is available to public (ex: FireFox, Linux)

Open-source software -

freely available to anybody and you can modify it

Campus Area Networks (Can)

generally, a local area network operating within a single organization that leases access to the Web directly from regional and national carriers

Project Management Tools

help plan projects and track progress

Market research

helps discover populations and regions that are most likely to purchase product

narrowband

internet communication lines that have transmission speeds of 56kbps or less. a dial up modem provides narrowband access

Strategic Resourcing

involves forming a long term relationship with another company and then setting prices through negotiation Ex. A company's large-scale computer purchases over time

Returns Process

involves physically shipping any damaged, incorrect, or incomplete products back to the vendor and verifying that the vendor sends a replacement shipment

Channel Conflict

occurs when a new venue for selling products or services threatens to destroy existing venues for selling goods

hacking

occurs when a person gains unauthorized access to a computer system.

usurpation

occurs when unauthorized programs invade a computer system and replace legitimate programs.

network effect

occurs where users receive value from the fact that everyone else uses the same tool or product

Independent Software Vendors (ISVs)

offer highly specialized niche applications for various industries and functions

Portal

offers users powerful web search tools as well as an integrated package of content and services all in one place

Ad hoc reporting tools

put users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters

Pricing

putting a value on goods and services

Input Devices

receive signals from outside of computer and transfer them into the computer

Market Opportunity

refers to the company's intended marketspace and the overall potential financial opportunities available to the firm in that marketspace

Stateless

refers to the fact that the server does not have to maintain an ongoing, dedicated interaction with the client

Row or record

represents a single instance of whatever the table keeps track of

Credit Card

represents an account that extends credit to consumer, permits consumers to purchase items while deferring payment, and allows consumers to make payments to multiple vendors at one time

Complementary Resources

resources and assets not directly involved in the production of the product but required for success, such as marketing, management, financial assets, and reputation

Scalability

resources can be expanded or upgraded to provide increased power

Database Management Systems (DBMS)

software for creating, maintaining, and manipulating databases

Network-management software

software that enables a manager on a networked desktop to monitor the use of individual computers and shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses

Rich internet application

software that has the functionality and complexity of traditional application software, but does not require local installation and runs in a web browser

10/100/1000 ethernet

type of ethernet that conforms to the IEEE 802.3 protocol and allows for transmission at rate of 10, 100, 1000 mbps

unauthorized data disclosure

when a person inadvertently releases data in violation of policy

purchase order

when the purchasing department receives the requisition, it selects a suitable supplier and creates this; is an agreement to purchase the stated material, for the stated price, under the stated terms.

packing list

when the vendor sends the shipment, a delivery document will accompany it; includes data about the purchase order for the shipment, the dates when the purchase order was filled and shipped, and the persons involved in preparing the order and details of the items in the shipment ex:weight and quantity

Data item -

the specific value of an attribute

7. ______ refers to the strategic decision made by a business to bring various services or functions 'back-in-house'(Chapter 9, page 266, hard) a. Global sourcing b. In-sourcing c .Onshoring d. Nearshoring e. Offshoring

In-sourcing

11. This group handles unique aspects of the project. a. Project management b. Analyst c. Specialist d. Public Relations

Specialist

Project Resources

Identifying and managing all the materials, resources, and people needed in order to complete a project effectively

Project Scope

Identifying and managing all the tasks required to complete a project

Corrective Controls

Implemented to remedy a situation in which risk is realized; meant to prevent repeated recurrence. Example: ATM card is disabled when bank customer fails to change PIN by specified deadline.

Servers

Computers on a network running server software that provides resources to other computers on the networks.

Clients

Computers on a network that is running client software that request services from the servers.

Scalability

Concept related to the number of users or the volume of operations that a given hardware/software combination can manage

Half-duplex channel

a communications channel that can transmit data in either directions, but not simultaneously

Simplex channel

a communications channel that can transmit data in only one direction

XML

(eXtensible Markup Language) a language similar to HTML that emphasizes the structure and meaning of data; is used primarily to transfer and store data, and interpret what data is. Ex: A website that displays a company and information about a company in a table using tags to identify the data.

T1 and T3 Lines

point-to-point dedicated digital circuits provided by telephone companies

hyperlink

pointer on a web page to another web page

Business Intelligence Systems (BI)

***Systems that glean relationships and trends from raw data to help organization compete better

Trends in IS

*Growing power/decreasing cost of computers *Growing capacity/decreasing costs of data storage devices *Increasing variety/ingenuity of computer programs *Available, reliable, affordable, and fast communications links to Internet *Internet Growth *Increasing computer literacy of the workforce

encryption

proces of transforming clear text into coded unintelligible text for secure storage or communication

Brainstorming

process of a group of colleagues meeting and collaborating to generate creative solutions and new ideas

plunge installation

(direct installation) system conversion in which the organization shuts off the old system and starts the new system

systems development

process of creating and maintaining informtaion systems (systems analysis and design)

Debugging

process of locating and fixing program errors

___ is the buying at market prices determined by supply and demand from someone that the consumer does not know. A. Spot buying B. Strategic sourcing C. One-to-one market buying D. E-commerce

A. Spot buying

Match the following functions with their respective objectives: 1. project scope management 2. time management 3. cost management 4. quality management a. Preparing a budget and managing the costs of the project to stay within budget. b. Identifying and managing all the tasks required to complete a project. c. Ensuring that the finished project satisfies its defined goals. d. Estimating the duration of the project, developing an acceptable schedule, and managing the project to ensure timely completion.

ANSWER: 1-b, 2-d, 3-a, 4-c FROM: Chapter 6, page 175 DIFFICULTY: easy

Web 2.0

An industry-led group is seeking to define what will make successful the next generation of Web applications and companies. e.g., The web applications allow users to control their own data.

Sql (Structured Query Language)

An industry-standard database query and manipulation language used in relational databases

2. ROM is associated with short-term memory storage. [chapter 2, slide 5, easy] a. True b. False

B

A merchant account is a company that provides a network to process encrypted transactions from a merchant's Web site. [chapter 8, slide 27, moderate] a) True b) False

B

If you are having a problem with a computer on campus you should not call EITS. [guest speaker presentation, easy] a) True b) False

B

This is a special form of output created by a business process that is returned to the system A. Value Chain B. Feedback C. Support Activities D. Competitive Advantage

B

What is a major limitation of Surf-the-Channel? a. Quality of videos significantly reduced as compared to purchased videos b. Links are user-posted, so they are not guaranteed to be accurate or safe c. Site only uses illegal video sites as clients d. Site requires entry of sensitive data over a non-secure HTML connection

B

What is the function of server-side programming? a. What the server displays on the monitor of the user's computer, rather than the HTML code b. When programs run on the Web server rather than the computer itself to promote dynamic interaction c. When the server encrypts sensitive information input from the user's computer d. When a programmer actively writes code for use on a server or website

B

Which type of application allows users to send invitations for parties along with sending reminders? [student presentation, moderate] a. Meeting Wizard b. Evite c. Pandora d. Facebook Marketplace

B

9. HTTP standardized the rules for transferring data from user to user (over a secure connection) over the Internet. [Chapter 8, pg. 228, Easy] a) True b) False

B) FALSE

How much does it typically cost to have your handwriting made into a font? (mytypeface.com Presentation) A. Nothing, it's free B. $10 C. $5 D. $7

B.) $10

Google runs its services on a couple of supercomputers. (Phillip Grossman Presentation) A.True B. False

B.) False

The World is Flat

Coined by Thomas Friedman, a perspective that globalization has helped even the playing field among global economies (thus, "flattening" the world)

data mining uses

Collaborative filtering Customer churn Fraud detection Financial modeling Hiring and promotio

Database

Componenet of an ES, used to store data associated with the ES

Software

Component of an ES, includes specialized operating system software and custom applications

Hardware

Component of an ES, physical mainframe of computers

Digital Systems

Computers and related devices that use the binary system (two digits)

Internet Protocol Suite

Consists of : Transmission Control Protocol (TCP) Internet Protocol (IP)

What would be an example of the impact e-commerce technologies have on business today? (Chapter 7, Page 200) A. Compliance B. Higher information density C. Ubiquity and accessibility D. Both B and C are correct E. None of the above are correct

D.) Both B and C are correct

Data Warehouse

Def: A means of storing and managing large amounts of data for information access, typically composed of data from one or more transaction databases. Consist of data that has been cleaned and restricted to fit the model and to support queries, summary reports, and analysis Ex: A business's collection of data on finance, sales, customer service, manufacturing, and such.

Presentation Layer

How you interact with the application (using menus, typing selecting)

Tacit Knowledge

Knowledge that is within people that they gain through experience, insight, and discovery. Reading, movies, life experiences, and experiences of others contribute to this type of knowledge. Example: Perhaps if your parents are mad at you, you would use your experience and see what has worked in the past to get you on your parents' good side once again.

Health Insurance Portability and Accountability Act (HIPAA)

Law mandating that health care providers and related agencies must protect patients' privacy. Relevant to IS because patients health records are increasingly stored in electronic records systems which may imply some concern for the privacy of patient data.

B2C E-Commerce Transaction

Online equivalent of the retail store as well as other services. Ex.Using the Apple iTunes store to purchase songs and movies

Database management systems (DBMS)

Sometimes called "database software"; software for creating, maintaining, and manipulating data

TRUE or FALSE, Based on Ron Swift's presentation, a company 'segments' their customers in order to achieve greater costs savings and sales.

True

Internet Marketing

Using the Web-as well as traditional channels- to develop a positive, long-term relationship with customers, thereby creating a competitive advantage for the firm by allowing it to charge a higher price for products or services than its competitors can charge

Storage Hardware

Various hardware media and devices used to contain large amounts of data and instructions for the long term. They retain data and instructions even after shutting down the computer. Example: Computer hard drive, the diskette, CDs and DVDs, and USB flash memory

Merchant Account

a bank account that allows companies to process credit card payments and receive funds from those transactions

Character -

a basic building block of information, consisting of uppercase letters, lowercase letters, numeric digits, or special symbols

E-Commerce Business Model

a business model that aims to use and leverage the unique qualities of the internet and the world wide web

Data definition language (DDL) -

a collection of instructions and commands used to define and describe data and relationships in a specific database

Internet

a collection of interconnected networks, all freely exchanging information

shared workspace

a common work area where authorized project members and colleagues can share documents, issues, models, schedules, spreadsheets, photos, and all forms of information to keep each other current on the status of projects or topics of common interest

Internet protocol (IP)

a communication standard that enables traffic to be routed from one network to another as needed

Which of the following is NOT an input in the IPO model? [chapter 1, slide 13-14, moderate] a. Business Value b. Information c. Knowledge d. Data e. Decisions

a. Business Value

What does Ron Swift's company, TeraData, specialize in? [guest speaker, Ron Swift, presentation, easy] a. Data Warehousing b. Business Process Management c. Marketing Processes d. Data Modeling e. Relational Databases

a. Data Warehousing

3) The business process transforms what? [Chapter 4, Page 89, moderate] a) Inputs to Outputs b) Outputs to Inputs c) Inputs to Inputs d) Outputs to Outputs

a. Inputs to Outputs

3. Which computer type has the largest and fastest relative processing power? (Chapter 5, slide #4, moderate) a. Supercomputer b. Mainframe c. Personal Computer d. Embedded Processors

a. Supercomputer

12. Businesses use mass customization and personalization to create business value based on a customization oriented approach to e-commerce. [Chapter 8, E-commerce PowerPoint slide 15, Moderate] a. True B. False

a. True

An extranet is a collaborative network that uses Internet technology to link businesses with their customers. [chapter 7, slide 46, moderate] a. True b. False

a. True

The company that Ron Swift, who gave a presentation in class, works for, Teradata, consolidates a single source of data for decision-making from an enterprise view of the business. [guest speaker presentation, moderate] a. True b. False

a. True

6. What application allows you to enter a blog feed in 140 characters or less? a. Twitter b. Stumble Upon c. iLike d. Surf the Channel

a. Twitter

adware

programs installed on user's computer without user knowledge or permission. watches activity and produces pop-up ads

Spreadsheets

an office productivity application that is used to store numbers and perform complex mathematical, statistical, and financial analysis functions

Data modeling

analysis of an organization's data and identification of the data relationships; a proactive process; this develops a conceptual blueprint of the database

ethernet

another name or the IEEE-802.3 protocol, ethernet is a network protocol that operates at Layers 1 and 2 of the TCP/IP-OSI architecture.

Web Client

any computing device attached to the Internet that is capable of making HTTP requests and displaying HTML pages, most commonly a Windows PC or Macintosh

Phishing

any deceptive, online attempt by a third party to obtain confidential information for financial gain

Telecommunications medium

any material substance that carries an electronic signal and serves as an interface between a sending device and a receiving device

Key (Cipher)

any method for transforming plain text to cipher text

Decision

arises when more than one solution to problem exists

ubiquity

available just about everywhere, at all times

Utility programs -

programs that help to perform maintenance or correct problems wit hat computer system

Chief information officer (CIO)

responsible for all aspects of information system; often a corporate vice president

7) A project is said to be what when the technology is available to solve the problem and a company is technically capable of acquiring and using the technology? [Chapter 6, Slide 6, Moderate] a. Technically Feasible b. Technically Available c. Financially Feasible d. Organizationally Feasible e. Technically Operationable

a. technically feasible

11) A stakeholder analysis should begin as part of the feasibility study and should be continued during the course of the project. [Chapter 6, slide 9, medium] a) True b) False

a. true

Match the following: a. packet b. router c. ping d. ping of death e. proxy server f. firewall 1. type of attack on a computer that involves sending a malicious ping to a computer 2. a formatted unit of data 3. hardware & software to guard a computer against unauthorized access when connected to a network 4. hardware & software to route/forward packets 5. a server that services the requests of its clients by forwarding request to other servers 6. a computer network tool used to test whether a particular host is reachable across a network

a2, b4, c6, d1, e5, f3

Role of enterprise systems in the procurement process

aggregate information How is the process doing? Execute the Process Create Purchase Requisition Create Purchase Order Receive Shipment Receive Invoice and Send Payment Capture and Store Process Data Monitor the Process Instance-Level Information Flow Process-Level Information Flow

Intellectual Property

all forms of human expression that can be put into tangible medium such as text, cd's or on the web

Shopping Cart

allows shoppers to set aside desired purchases in preparation for checkout, review what they have selected edit their selections as necessary, and then actually make the purchase by clicking a button

VoIP

allows voice and phone systems to travel over the internet

Risk Assessment

an assessment of the risks and points of vulnerability

Uniform resource locator (URL)

an assigned address on the internet for each computer

Library Effect

an attempt to appeal to consumers on the basis of the total number of products offered

Wired equivalent privacy (WEP)

an early attempt at securing wireless communications based on encryption using a 64- or 128-bit key that is not difficult for hackers to crack

Data encryption standard (DES)

an early data encryption standard developed in the 1970s that uses a 56-bit private key algorithm

Industry Structural Analysis

an effort to understand and describe the nature of competition in an industry, the nature of substitute products, the barriers, to entry, and the relative strength of consumers and suppliers

Data mining -

an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse

Mashup

an integrated application containing some or all features from several applications; provides enhanced features for the end user

mashup

an integration of several client-server applications; rely on web services to send and receive data between and among ES

Electronic data interchange (EDI)

an intercompany, application-to-application communication of data in a standard format, permitting the recipient to perform a standard business transaction, such as processing purchase orders

T3

an international telephone standard for digital communication that offers guaranteed delivery at 45 Mbps

Web auction

an internet site that matches buyers and sellers

Internet service provider (ISP)

an isp provides users with Internet access. gives them an address, gateway, passes communication, collect money on your behalf

Entity

an object about which an organization chooses to collect data such as people, events, and products

What is the ability of a nation to move towards an economy that relies more on computer technology? a. Globalization b. E-readiness c. Strategic Technology d. ITC

b) E-readiness

1. Which guest speaker discussed IS consulting in which an experienced individual advises a client on the best choice of IS system for his business? [guest speaker presentation, easy] a) Matthew Gonzales b) Philip Grossman c) Ron Swift

b) Philip Grossman

8. ____________ is the ability to buy a site license online and then download one copy, which can be burned on CDs and reduces organizations' cost and time. [Chp. 7 p. 216] a) Travel b) Software c) Financing d) Banking e) Leasing

b) Software

Hard drive, CDs/DVDs, flash drive are all examples of ________. a. Memory Hardware b. Storage Hardware c. Communications Hardware d. System Software

b) Storage Hardware

______ is a knowledge work activity that involves thoughtful investigation and examination of the available data, info, and knowledge. a) synthesis b)analysis c)communication d) transformation

b) analysis

The basic unit of the binary number system, a convenient number system that only uses the digits 1 and 0, is: a) a byte b) a bit c) a character d) none of the above

b) bit (base two)

8) Give an example of event-driven marketing (Guest speaker presentation Ron Swift, medium) a. Business takes notice that a client has graduated from college b. Businesses utilize targeted email- relevant offers that motivate clients to take action. c. Business' clients are segmented into groups- such as 'quality oriented', 'low income', and 'family oriented'. d. Both a and b

b. Businesses utilize targeted email- relevant offers that motivate clients to take action.

The first server-side programming technology was named ____________ and was programmed using ___________ (Programming Language). (Chapter 8, pg. 239, Difficult) a. Common Gateway Interface; PHP b. Common Gateway Interface; PERL c. Microsoft.net; PERL d. PHP; PHP

b. Common Gateway Interface; PERL

Mytypeface.com is used to: [bonus application presentation, mytypeface.com, easy] a. Make personalized flashcards b. Create a personalized font c. Find your favorite music artists d. Look at and organize your pictures

b. Create a personalized font

The application presented in class, Typeface, is useful for doing what? [bonus application presentation, easy] a. Uploading and sharing pictures and videos b. Creating a font based on one's own handwriting c. communicating with other members via email d. writing and publishing essays online to be read by members e. none of the above

b. Creating a font based on one's own handwriting

Database administrator (DBA)

responsible for databases and data warehouses

8) When developing an IS, which method takes the longest time and has the highest cost, but provides a competitive advantage? a. Acquistion b. Building c. Stealing d. Leasing

b. building

The integration between Business and Technology creates which of the following: a. A network b. Business value c. A Knowledge Worker d. Megabyte

b. business value

Transport Layer

responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application

6) The process of scrambling a message so that it is meaningful only to the person holding the key is: [Chapter 8, page 246, moderate] a. Secure Gateway Provider b. Encryption c. E-Commerce d. Secure Socket Layer

b. encryption

SSL (Secure Socket Layer)

protocol that allows a client and a server to communicate in a way that prevents eavesdropping ,message forgery, or tampering. e.g., OASIS uses a this to prevent forgery of personal information from the students such as bank account numbers and social security numbers.

2. An example of a good managed through B2C transactions would be: (Chapter 7, pg. 198, Moderate a. Office furniture b. iTunes song c. Virus protection software d. Fishing license application and fee

b. iTunes Song

9) Which of the applications demonstrated in class is an online service that allows users to download and share music? [Bonus application presentation, easy] a) Pandora b) ilike c) Evite d) Both a and c

b. ilike

10) Dynamic content, where a web page changes depending on a number of factors such as time and date, user profile, or browser location emerged in which generation of ecommerce? a. First Generation b. Second Generation c. Third Generation d. Fourth Generation

b. second generation

One frequently used way of _________ is bringing together different pieces of data and information in order to form a complete picture of the situation. a) analysis b) discovery c) synthesis d) transformation

c) synthesis

Ip

protocol that provides the Internet's addressing scheme and is responsible for the actual delivery of the packets

secure socket layer (SSL)

protocol that uses both asymmetric and symmetric encryption.

What is E-Commerce? a. to buy and sell over the internet b. use of information systems, technologies, and computer networks to carry out transactions in order to create or support the creation of business value c. when people go to a store and buy something d. only buying products that start with the letter "e"

b. use of information systems, technologies, and computer networks to carry out transactions in order to create or support the creation of business value

What does the acronym "CARROTS" stand for? a. Complete; Associated; Reliable; Random; Overt; Timely; Sustainable b. Creative; Accurate; Reliable; Relevant; Opportunity; Timely; Substance c. Complete; Accurate; Reliable; Relevant; Objective; Timely; Source d. Creative; Associated; Reliable; Relevant; Opportunity; Timely; Source

c.

Issuing Bank

bank that actually issues credit cards and processes transactions

Symmetric Key Encryption (Secret Key Encryption)

both the sender and the receiver use the same key to encrypt and decrypt the message

Technology Convergence

building several technologies into a single piece of hardware; examples include cell phones, xbox; digital cameras connected to internet, etc

business-to-business commerce

businesses must purchase most of their materials directly from other companies according to business requirements; ex: B2B commerce requires a standardized process for buying and selling commercial goods and also for transferring funds to pay for those goods in an efficient manner

e-commerce

buying and selling of goods and services over public or private computer networks

Spot Buying

buying at market prices determined by supply and demand from someone that the consumer does not know Ex. Companies engage in this type of buying to purchase goods. Those goods include gas, paper and cleaning supplies

11. In Mr. Phillip Grossman's presentation, he described two real-world examples of the type of work a consultant in his field would be asked to do. In his Sprint PCS example, he explained that Sprint wanted to reduce the handling time on their call center calls to save money. The task required an analysis of all systems and processes that supported the call center, and the solution included improved information architecture and a _____________________________________ solution. a) database efficiency b) Information Technology management c) content/ knowledge management d) customer care

c)

7. Which of the following fits the description of a Common Gateway Interface or GCI? [Chp.8 p. 239] a) Script embedded within a webpage along with its HTML b) Able to run a servlet or small Java program on a server c) Program that can be written using just about any computer language d) Component of Microsoft's family of software development technologies e) Includes server codes that can separate the code from its content

c) Program that can be written using just about any computer language

3. A bank who installs an ATM with the expectation of using technology to perform certain tasks with greater efficiency is an example of...[chapter 4, slide 21, moderate] a) informating b) transforming c) automating d) updating

c) automating

Data is... a) when a person combines information with judgement b) adds insight and ethics to the data-information-knowledge continuum c) raw, unorganized facts, numbers, pictures, and so on.

c) data: raw, unorganized facts, numbers, and so on; data has to be organized in a way usable by the knowledge worker

9.The use of information systems, computer networks, and technologies by people and organizations to carry out transactions in order to create or support the creation of business value is _____________. [Chp.7 p. 197, easy] a) a-commerce b) electronic data interchange (EDI) c) e-commerce d) knowledge worker e) automating

c) e-commerce

5. Which of the following is an application on a popular networking site that can be used to list items and services for sale? [bonus application presentation, easy] a. Stumbleupon b. Twitter c. Facebook Marketplace d. Group Identification Network (GIN)

c. Facebook Marketplace

5) ________ protocol is the standardized rules for exchanging data over the web. [Chapter 8, page 228, moderate] a. HTML b. ISP c. HTTP d. FTP

c. HTTP

12) Which of the following are NOT parts of the IS Project? [Chapter 6, slide 5, moderate] a) Technical Analysis b) Financial Analysis c) Management Analysis d) Organizational Analysis

c. Management Analysis

If a company wanted it's decision making to occur lower in its organization system and closer to the customer, which organization structure would it choose? [chapter 4, slide 12, hard] a. Functional b. Decentralized c. Matrix d. Linear

c. Matrix

Nearshoring is business done with partners... [chapter 9, page 267, easy] a. In the same country b. A far distance outside the country c. Outside the country, but in the same geographic region d. No partners are used

c. Outside the country, but in the same geographic region

Entity-Relationship Diagram (ERD), is a model used in what kind of design? [chapter 6, page 171, moderate] a. Data Warehouse b. File Processing c. Relational Database d. Querying

c. Relational Database

Which of the following is NOT one of the three parts of a feasibility study? [chapter 6, slide 5, hard] a. Technical Analysis b. Organizational Analysis c. Stakeholder Analysis d. None of the Above e. All of the Above

c. Stakeholder Analysis

Search engines are used for the first time in what generation of e-commerce? [chapter 8, April 21st lecture, easy] a. First b. Second c. Third d. Fourth e. Fifth

c. Third

transport layer security (tls)

protocol using both asymmetric and symmetric encryption that works between levels 4 and 5 of TCP-OSI protocol architecture

Which one of the following applications that was shown in class is used as an online studying device? a. Ilike b. Pandora c. Flashcard DB d. Study Pro e. None of the Above

c. flashcard DB

custom applications

provide capabilities needed to complete specific tasks such as filling a customer order

Application Layer

provides a wide variety of applications with the ability to access the services of the lower layers

Symmetric DSL

provides high speed in both directions for short-distance communications

Database Approach

provides powerful mechanism for managing and manipulating data where data is organized as entities

11) Which of the following is NOT one of the Four Dragons? a. Singapore b. Taiwan c. Thailand d. Hong Kong

c. thailand

Packing List

provides the details about the materials contained in the shipment (quantity, weights) dates when filled and shipped, people involved in preparing the order

Shareware and freeware -

cannot modify source code, but it is very inexpensive or maybe even free

Customization

changing the product, not just the marketing message, according to user preferences

HTML tags

codes that let the web browser know how to format text - as a heading, as a list, or as body text - and whether images, sound, and other elements should be inserted

Input

collect and introduce data to system

Botnet

collection of captured bot computers

Network

collection of computers that communicate with one another over transmission lines

Record

collection of related fields

File

collection of related records

Suite

collection of various applications that perform multiple interrelated functions; includes Microsoft Office, Lotus SmartSuite, OpenOffice.org, ThinkFree

key

column or group of columns that identifies a unique row in a table. a number used to encrypt data

Encapsulation

combined storage of data and relevant procedures to process it; allows object to be "planted" in different data sets

Manufacturing resource planning (MRP II)

combines MRP with other related activities to plan the entire manufacturing process; uses master production schedule

Pathping

combines the functionality offered by Ping and Tracert

Synergy

combining resources to produce output that exceeds the sum of outputs of the separate resources by themselves; Greek "work together"

Notebook Computer (laptop)

compact personal computer powered by rechargeable battery

Business-to-business Commerce (B2B)

companies must purchase most of their materials directly from other companies according to business requirements

Routing Algorithm

computer program that ensures that packets take the best available path toward their destination

commerce server

computer that operates web-based programs that display products. support online ordering, record and process payments and interface with inventory-management applications

Process-Level Information

concerned with the purchasing process on an overall level, across multiple instances aggregated over a period of time

Supply Chain Management

connect a company's ERP system to those of its suppliers

Access point (hotspot)

connection between wireless device and a wired network; allows internet access within range of equipment

Supply Chain Management (SCM)

connects a company to other companies that supply the materials it needs to make its products

Local Area Network (LAN)

connects computers that reside in a single geographic location

Bridge

connects one LAN to another LAN using the same telecommunications protocol

Customer Retention Costs

costs incurred in convincing an existing customer to purchase again

Visual Programming Languages

create graphical screen objects by selecting icons from a palette

graphics programs

create intricate graphical images and manipulate digital photographs

Webmaster

creates and maintains Web site

11. Dr. Meredith Belbin has developed a system of nine widely accepted team roles. Which of the following answer choices is NOT one of those roles? [chapter 4, page 112-3, moderate] a) Monitor-evaluator b) Teamworker c) Implementer d) Reviewer Finisher e) Completer Finisher

d) Reviewer Finisher

5. A web service obtains or processes data from a sending application and then delivers the data over the network using a standard data format called: a. SQL b. HTML c. Java d. XML

d) XML

Which statement below is NOT a "pro" of globalization? a. Lower prices for goods and services b. Stimulates economic growth c. Creates jobs d. Moves work to countries with fewer labor and environmental regulations

d.

1) A business is an organization with one or more people who...[Chapter 1, Page 5, easy] a) Decide on one or more goals to pursue b) Work together to locate and organize resources c.) Create processes in order to achieve the desired goal or goals d.) All of the above

d. All of the above

Which one is NOT a disadvantage of File Systems? a.Data redundancy b.Data inaccessibility c.Poor file management d. Database administrators

d. Database administrators

10. Which of the following is not a phase of the life cycle that an information system goes through? [Chapter 6, PowerPoint presentation slide 14-15, Moderate] a. Construction b. Transition c. Elaboration d. Diagnosis e. Retirement

d. Diagnosis

Firewall

refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on a security policy

User Profile

refers to the nature of customer requests and customer behavior at a site

Tracert

one of several route-tracing utilities that allow you to follow the path of a message you send from your client to a remote computer on the Internet

Single-user license -

one user can use it, usually only on one computer

Direct Reference Groups

one's family, profession or occupation, religion, neighborhood, and schools

Indirect Reference Groups

one's life-cycle stage, social class, and lifestyle group

Economic order quantity (EOQ)

optimal quantity of a raw material that minimizes overstocking and saves cost, without missing production deadlines

Interaction

part of VR; allows users to simulate changes in the environment using VR devices

Immersion

part of VR; user senses that she/he is surrounded by the simulated environment

malware definitions

patterns that exist in malware code.

Stylus

pen-like device used to enter data through a touch screen

drive-by sniffer

people who take computers with wireless connections through an are and search for unprotected wireless networks in an attempt to gain free INternet access or to gather unauthorized data.

Utilities

perform other OS functions such as hardware diagnostics, disk check, and file sorting

Data processing

performs calculations on input

merchant companies

in e-commerce companies that take title to the goods they sell. they buy goods and resell them

web storefront

in e-commerce web based app that enable customers to enter and manage their orders

tag

in markup language such as HTML and XML, notation used to define data element for display or other purposes

database tier

in the three tier architecture the tier that runs the DBMS and receives and processes SQL requests to retrieve and store data

user generated content (UGC)

in web 2.0 data and information that is provided by users.

returns process

involves physically shipping any damaged, incorrect, or incomplete products back to the vendor and verifying that the vendor sends a replacement shipment

Model-Driven Data Mining

involves the use of a model that analyzes the key variables of interest to decision makers

data mart

is a database focused on addressing the concerns of a specific problem (e.g., increasing customer retention, improving product quality) or business unit (e.g., marketing, engineering).

Online analytical processing (OLAP)

is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube

procurement process

is a series of steps that a company takes to obtain or acquire necessary materials: create requisition, create and send purchase order, receive shipment, receive invoice, send payment

data warehouse

is a set of databases designed to support decision making in an organization. It is structured for fast online queries and exploration; may aggregate enormous amounts of data from many different operational systems.

item total

is the cost of the specified quantity of material on each line

analytics

is the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions

Affiliate program

linking to other companies and rewarding the linker for click-throughs

Bill of materials (BOM)

list of all raw materials and subcomponent demands to produce a product

database administration

management, development, operation, and maintenance, of the database so as to achieve the org's objectives.

Projecting -

manipulating data to eliminate columns in a table

Permission Marketing

marketing strategy in which companies obtain permission from consumers before sending them information or promotional messages

Parallel Processing

multiple processors running simultaneously (aka multiprocessing)

Electronic Billing Presentment And Payment (Ebpp) System

new form of online payment systems for monthly bills

Bluetooth

new technology standard for short-range wireless communication under 10 meters

Traditional File Approach

no mechanism for tagging, retrieving, or manipulating data; has program-data dependency, high data redundancy, and low data integrity

Credit Card Association

nonprofit association that sets standards for issuing banks

independent software vendors (IVS)

offer highly specialized niche applications for various industries and functions ex:vendavo is a small ISV that produces a pricing management tool to assist retailers in maximizing profit for retail sales

Merchant Server Software Package (E-Commerce Server Suite)

offers an integrated environment that provides most or all of the functionality and capabilities needed to develop a sophisticated, customer-centric site

Midrange Computers

often act as servers within organizations or through the Internet

Affiliate Marketing

one Web site agrees to pay another Web site a commission for new business opportunities it refers to the site

Proprietary software -

one and done stuff. You write it just for you, and it does specifically what you need it to do

Competitive intelligence -

one aspect of business intelligence limited to information about competitors and the ways that knowledge affects strategy, tactics, and operations

organizational feasibility

one of four dimensions of feasibility

technical feasibility

one of four dimensions of feasibility

Industry Structure

refers to the nature of the players in an industry and their relative bargaining power

Online Stored Value Payment System

permits consumers to make instant, online payments to merchants and other individuals based on value stored in an online account

Competitive Environment

refers to the other companies operating in the same marketspace selling similar products

Product differentiation

persuading customers that your product is better than competitors'; usually achieved through advertising and customer experience

Free-on-Board (FOB)

point at which ownership of the material in the shipment legally transfers from one company to another

transaction data

reflect the day-to-day activities of an organization; is constantly changing ex:when a company sends a purchase order to a vendor this transaction data is generated: dates, quantities, prices, delivery location

Relational Databases

represent data as two-dimensional tables with records organized in rows and attributes in columns; data within different tables can be flexibly related as long as the tables share a common element

Internet Layer

responsible for addressing, packaging, and routing messages on the Internet

Actual Product

the set of characteristics designed to deliver the product's core benefits

phishing

technique used for obtaining unauthorized dat that uses pretexting via email

service-oriented architecture

technologies that could help link, or integrate many different client-server systems together in new and very valuable ways

product quality assurance (pqa)

testing of a systems. test plan, automated test programs

Cipher Text

text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver

Availability

the ability to ensure that an e-commerce site continues to function as intended

Nonrepudiation

the ability to ensure that e-commerce participants do not deny (i.e. repudiate) their online actions

Integrity

the ability to ensure that information being displayed on a Web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party

Confidentiality

the ability to ensure that messages and data are available only to those who are authorized to view them

Domain -

the allowable values for data attributes

Marketspace

the area of actual or potential commercial value in which a company intends to operate

Feature Set

the bundle of capabilities and services offered by the product or service

Backward Compatibility

the capability to work with older hardware or software

Data manipulation language (DML) -

the commands that are used to manipulate the data in a database

Worldwide interoperability for microwave access (WiiMax)

the common name for a set of IEEE 802.16 wireless metropolitan area network standards that support different types of communications access

Computer network

the communications media, devices, and software needed to connect two or more computer systems or devices

Brand Equity

the estimated value of the premium customers are willing to pay for using a branded product when compared to unbranded competitors

Information Requirements

the information elements that the system must produce in order to achieve the business objectives

Hypertext Transfer Protocol (Http)

the internet protocol used for transferring Web pages

Process

the manipulation of data, usually with the goal of producing information

Electronic Mail (E-Mail)

the most-used application of the Internet. Uses a series of protocols to enable messages containing text, images, sound, and video clips to be transferred from one Internet user to another

Tunneling

the process by which VPNs transfer information by encapsulating traffic in IP packets over the internet

Encryption

the process of converting an original message into a form that can only be understood by the intended receiver

Business intelligence -

the process of gathering enough of the right information in a timely manner and usable form and analyzing it to have a positive impact on business strategy, tactics, or operations

Viral Marketing

the process of getting customers to pass along a company's marketing message to friends, family, and colleagues

configuration

the process of setting up the ES so it can support the work of a business

authentication

the process whereby an information system approves a user by checking the user's password

Demand Curve

the quantity of goods that can be sold at various prices

Channel bandwidth

the rate at which data is exchanged over a telecommunications channel, usually measured in bits per second

Firm Value Chain

the set of activities a firm engages in to create final products from raw inputs

Value Chain

the set of activities performed in an industry or in a firm that transforms raw inputs into final products and services

SAP

the software vendor can spread the cost of software development across many of its customers and thereby reduce the purchase price of the ES for each company; modified purchased package applications to suit their particular needs; generated significant cost savings9


Related study sets

PNU 116 PrepU Chapter 8: Communication

View Set

HESI Remediation Packet Maternity

View Set

Accounting 102 - Chapter 1 Practice Questions

View Set

CompTIA A+ Exam 220-901 Practice Test Part 2

View Set