Final Study Guide Flashcards

(79 cards)

1
Q

Adware

A

Software that generates ads that install themselves on a computer when a person downloads some other program from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spyware

A

A special class of adware that collects data about the user and transmits it over the internet without the users knowledge or permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Agile MIS infrastructure

A

Includes the hardware software and telecommunications equipment that, when combined provides the underlying foundation to support the organizations goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attribute

A

(Also called columns or fields) are the data elements associated with an entity
Ex.attributes for the entity MUSICIANS are MusicianID, musician name, musician photo,and musician notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Banner Ad

A

A banner ad is a box running across a website that advertises the products and services of another business, usually another e-business.
Ext: The banner generally contains a link to the advertisers website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Blogs

A

A blog, or web log, is an online journal that allows users to post their own comments, graphics, and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broadband

A

Brad Benson is a high-speed Internet connection that is always connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Clickstream data

A

Records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cookie

A

cookies allow websites to record the comings and going’s of customers, usually without their knowledge or consent.
A cookie is a small file deposited on a hard drive by a website containing information about customers and their browsing Activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Counterfeit software

A

Counterfeit software is software that is manufactured to look like the real thing and sold as such.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data

A

Raw facts that describe the characteristics of an event or object. The smallest or basic unit of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Database Management System (DBMS)

A

Creates, reads, updates, and deletes data in the database while controlling access and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial-of-service(Dos)

A

Floods a website with so many request for service that it slows down or crashes the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disintermediation

A

Occurs when a business sells direct to the customer online and cuts out the intermediary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ebusiness

A

Includes e-commerce along with all activities related to internal and asked external business operations such as servicing customers accounts, collaborating with partners, and exchanging real-time information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Entity

A

And entity stores information about a person, place, thing, transaction, or event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fire wall

A

A firewall is a hardware and/or software that’s guard a private network by analyzing incoming and outgoing information for the correct markings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Grid Computing

A

Grid computing is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hypertext transfer protocol

A

SHTTP is a combination of HTTP and SSL to provide encryption and secure identification of an internet server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Information

A

Can tell an organization how it’s current operations are performing and help it estimate and strategize about how future operations might perform. Data converted into a meaningful and useful context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intranet

A

An intranet is a restricted network that relies on internet technologies to provide an internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Key logger

A

A program that records every keystroke and mouse click

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Knowledge

A

The skills, experience, and expertise, coupled with information and intelligence, that creates a person’s intellectual resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Business intelligence

A

Information collected from multiple sources that analyze patterns, trends, and relationships for strategic decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Operational
At this level employees develop, control, and maintain core business activities required to run the day to day operations. Decisions are considered structured decisions.
26
Managerial
Employees are continuously evaluating company operations to hone the firms abilities to identify, adapt to, and leverage change. These decisions are semi-structured decisions.
27
Strategic
Managers develop overall business strategies, goals, and objectives as part of the company's strategic plan.
28
Modem
A device that enables a computer to transmit and receive data.
29
Packet
Is a single unit of binary data routed through a network.
30
Privacy
Is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
31
Pirated software
Is the unauthorized use, duplication, distribution, or sale of copyrighted software.
32
Scalability
Describes how well a system can scale up or adapt to the increased demands of growth.
33
Smart grid
Delivers electricity using two-way digital technology.
34
Structured query language
Users write lines of code to answer questions against a database.
35
Transmission Control Protocol/ Internet protocols (TCP/IP)
Provides the technical foundation for the public internet as well as for large numbers of private networks.
36
Trace route
A utility application that monitors the network path of packet data sent to a remote computer.
37
Typosquatting
A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
38
Unstructured decision
Occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice.
39
Virus
A virus is software written with malicious intent to cause annoyance or damage.
40
Web accessibility initiative. (WAI)
Brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities.
41
Wifi
A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.
42
Adwords
A part of the google site, allows advertisers to bid on common search terms.
43
Analytical information
Encompasses all organizational information, and it's primary purpose is to support the performing of managerial analysis tasks.
44
Application program interface. (API)
A set of routines, protocol, and tools for building software applications.
45
Bandwidth
The maximum amount of data that can pass from one pint to another in a unit of time.
46
Biometrics
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
47
Bluetooth
Wireless PAN technology that's transmits signals over short distances between cell phones, computers, and other devices.
48
Cloud computing
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
49
Copyright
The legal protection afforded an expression of an idea, such as a song, book, or video game.
50
Critical success factors(CSF's)
Crucial steps companies perform to achieve their goals and objectives and implement their strategies.
51
Database
Maintains information about various type of objects (inventory), events (transactions), people (employees), and places (warehouse).
52
Decision making process
1. Problem identification 2.data collection, 3.Solution Generation, 4.Solution generation 5. Solution Selection 6. Solution Implementation
53
Digital rights management
A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
54
Disruptive technology
A new way of doing things that initially does not meet the needs of existing customers.
55
Ecommerce
The buying and selling of goods and services over the internet.
56
Extranet
An extension of an intranet that is only available to authorized outsiders, such as customers, partners, and suppliers
57
Foreign key
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
58
Hypertext markup Language (HTML)
Links documents allowing users to move from one to another simply by clicking on a hot spot or link.
59
Infomediaries
Provide specialized information on behalf of producers of goods and services and their potential customers.
60
Intellectual property
Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
61
ISP
Another level down is an Internet service provider, which specializes in providing management, support, and maintenance to a network. A company that provides access to the internet for a monthly fee.
62
Key performance indicators.
Quantifiable metrics a company uses to evaluate progress towards critical success factors.
63
Knowledge management system(KMS)
Supports the capturing, organization, and dissemination of knowledge throughout an organization.
64
Logical relationship
A relational database model stores information in the form of logically related two-dimensional tables.
65
Moores law
Refers to the computer chip performance per dollar doubling every 18 months
66
Primary key
A field (or group of fields) that uniquely identifies a given record in a table
67
Relational database
Stores information in the form of logically related two-dimensional tables
68
RFID
Uses electronic tags and labels to identify objects wirelessly over short distances.
69
Semi-structured decision
Occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommend decision.
70
Structured decision
Involves situations where established processes offer potential solutions.
71
Sustaining technology
Produces an improved product customers are eager to buy, such as a faster car or larger hard drive.
72
Teergrubing
An anti spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spammer
73
Transactional information
Encompasses all of the information contained within a single business process or unit of work, and it's primary purpose is to support the performing of daily operational or structure decisions.
74
Universal resource locator.
The address of a file or resource on the web such as www.apple.com
75
Virtualized computing
Most computers only run on one operating system, such as windows or Mac OS, and only one application.
76
VoIP
Uses IP technology to transmit telephone calls
77
Web browser
Allows users to access the WWW.
78
Worm
Spreads itself, not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread the can tunnel themselves into computers.
79
Applet
Is a Program that runs within another application such as a website