Final Study Guide Flashcards
(79 cards)
Adware
Software that generates ads that install themselves on a computer when a person downloads some other program from the internet.
Spyware
A special class of adware that collects data about the user and transmits it over the internet without the users knowledge or permission.
Agile MIS infrastructure
Includes the hardware software and telecommunications equipment that, when combined provides the underlying foundation to support the organizations goals.
Attribute
(Also called columns or fields) are the data elements associated with an entity
Ex.attributes for the entity MUSICIANS are MusicianID, musician name, musician photo,and musician notes
Banner Ad
A banner ad is a box running across a website that advertises the products and services of another business, usually another e-business.
Ext: The banner generally contains a link to the advertisers website.
Blogs
A blog, or web log, is an online journal that allows users to post their own comments, graphics, and video.
Broadband
Brad Benson is a high-speed Internet connection that is always connected.
Clickstream data
Records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased.
Cookie
cookies allow websites to record the comings and going’s of customers, usually without their knowledge or consent.
A cookie is a small file deposited on a hard drive by a website containing information about customers and their browsing Activities
Counterfeit software
Counterfeit software is software that is manufactured to look like the real thing and sold as such.
Data
Raw facts that describe the characteristics of an event or object. The smallest or basic unit of information
Database Management System (DBMS)
Creates, reads, updates, and deletes data in the database while controlling access and security.
Denial-of-service(Dos)
Floods a website with so many request for service that it slows down or crashes the site.
Disintermediation
Occurs when a business sells direct to the customer online and cuts out the intermediary.
Ebusiness
Includes e-commerce along with all activities related to internal and asked external business operations such as servicing customers accounts, collaborating with partners, and exchanging real-time information.
Entity
And entity stores information about a person, place, thing, transaction, or event.
Fire wall
A firewall is a hardware and/or software that’s guard a private network by analyzing incoming and outgoing information for the correct markings.
Grid Computing
Grid computing is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem.
Hypertext transfer protocol
SHTTP is a combination of HTTP and SSL to provide encryption and secure identification of an internet server.
Information
Can tell an organization how it’s current operations are performing and help it estimate and strategize about how future operations might perform. Data converted into a meaningful and useful context.
Intranet
An intranet is a restricted network that relies on internet technologies to provide an internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.
Key logger
A program that records every keystroke and mouse click
Knowledge
The skills, experience, and expertise, coupled with information and intelligence, that creates a person’s intellectual resources.
Business intelligence
Information collected from multiple sources that analyze patterns, trends, and relationships for strategic decision making.