Lesson 5 - Concepts Flashcards

(96 cards)

1
Q

Analysis and design

A

Analysis of system and design for creation of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Analysis for digital systems

A

Using analytical techniques to capture and summarize business and user requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Activity-based process definition methods

A

Analysis tools used to identify the relationship between tasks within a business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Process

A

Part of a system that has a clearly defined purpose or objective and clearly defined inputs and outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Process mapping

A

Identification of location and responsibilities for processes within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Task analysis

A

Identification of different tasks, their sequence and how they are broken down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Workflow management ( WFM)

A

The automation of information flows; provides tools for processing the information according to a set of procedural rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Entity

A

A grouping of related data, such as customer entity, implemented as a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Database table

A

Each database comprises several tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attribute

A

A property or characteristic of an entity, implemented as a field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Field

A

Attributes of products, such as date of birth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Record

A

A collection of fields for one instance of an entity, such as Customer Smith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social sign-in

A

Users or members of sites can sign-in with their social network accounts such as Google+, Facebook or LinkedIn through use of APIs exchanging data between different web services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Relationship

A

Describes ow different tables are linked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Primary key

A

The field that uniquely identifies each record in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secondary key

A

A field that is used to link tables, by linking to a primary key in another table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Big Data

A

Within marketing, this concept describes the opportunity to harness customer data from different touchpoints, including as point-of-sale transactions, desktop and mobile sites and apps, and social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

System design

A

Defines how an information system will operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Client-server model

A

A system architecture in which end-user machines such as PCs, known as ‘clients’, run applications while accessing data and possibly programs from a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Three-tier client-server

A

The first tier is the client that handles display, second is application logic and business rules. third is database storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Thin client

A

An end-user access device ( terminal) where computing requirements such as processing and storage ( and so cost), are minimized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

User-centered design(UX)

A

Design based on optimising the user experience according to all factors, including the user interface, which affect this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Customer experience management ( CXM)

A

User experience improvements are broadened to consider the context of use to different physical locations or customer touchpoints across different digital platforms including desktop, mobile sites, apps, social networks and email marketing. Context of use includes device type, location and interactions with customer service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Conversion Rate Optimization ( CRO)

A

Improving the commercial returns from a transactional site through increasing conversion to key goals such as sales, quotes, bookings, or leads. CRO combines customer and competitor research with evaluation of customer behaviour using web analytics and AB multivariate testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Online customer experience
The combination of rational and emotional factors of using a company's online services that influences customer's perceptions of a brand online.
26
Usability
An approach to website design intended to enable completion of user tasks.
27
Expert review
An analysis of an existing site or prototype, by an experienced usability expert who will identify deficiencies and improvements to a site based on their knowledge of web design principles and best practice.
28
Usability/user-testing
Representative users are observed performing representative tasks using a system
29
Eyetracking
A usability testing technique that provides a visual overlay of where visitors most commonly look at on the screen ( heatmaps) and individual common paths ( gaze trails).
30
Use-case modelling
A user-centred approach to modelling system requirements
31
Unified Modelling Language ( UML)
A language used to specify visualize and document the artefacts of an object0oriented system
32
Web design personas
A summary of the characteristics, needs, motivations, and environment of typical website users.
33
Customer scenarios ( user journeys)
Alternative tasks or outcomes required by a visitor to a website. Typically accomplished in a series of stages of different tasks.
34
Primary persona
A representation of the typical site user, who is strategically important to the effectiveness of the site, but one whose needs are challienging to fulfill.
35
Actors
People, software or other devices that interface/interact with a system
36
Use-case
The sequence of transactions between an actor and a system that supports the activities of the actor
37
Talk-through
A user verbally describes the required actions
38
Walk-through
A user executes their actions through using a system or mock-up
39
Scenario
A particular path or flow of events or activities within a use-case
40
Information architecture
The combination of organization, labelling and navigation schemes composing an information system
41
Site map
A graphical or text depiction of the relationship between different groups of content on a website
42
Card sorting or web classification
The process of arranging a way of organizing objects on the website in a consistent manner
43
Blueprints
Show the relationships between pages and other content components
44
Wireframe
Also known as ' schematics', a way of illustrating the layout of an individual web page
45
Storyboarding
The use of static drawings or screenshots of the different parts of a website to review the design concept with user groups
46
Page template
A standard page layout format which is applied to each page of a website. Typically defined for different page categories ( e.g. category page, product page, search page)
47
Cascading Style Sheets ( CSS)
A simple mechanism for adding style ( Eg. fonts, colours, spacing) to web socuments. CSS enables different style elements to be controlled across an entire site or section of site.
48
Customer Orientation
Developing site content and services to appear to different customer segments or other members of the audience
49
Marketing-led site design
Site design elements are developed to achieve customer acquisition, retention and communication of marketing messages
50
Persuasion Marketing
Using design elements such as layout , copy and typography together with promotional messages to encourage site users to follow particular paths and specific actions rather than giving them complete choice in their navigation
51
Information organization schemes
The structure chosen to group and categorize information
52
Site navigation scheme
Tools provided to the user to move between different information on a website
53
Flow
Flow describes how easy it is for users of a site to move between the different pages of content of the site
54
Narrow and deep navigation
Fewer choices, more clicks to reach required content
55
Broad and shallow navigation
More choices, fewer click to reach required content
56
Deep linking
Jakob Nielsen's term for a user arriving at a site deep within its structure
57
Responsive design
Layout and formatting of website content is modified at the point of rendering to suit different screen resolutions and capabilities to produce a better experience to users of a range of desktop, tablet and smartphone devices using web development methods like CSS and image scaling.
58
Media Queries
A styling approach within Cascading Style Sheets ( CSS3) enabling the layout to change based on the type of device at its scale
59
Adaptive mobile web design
Generally a more sophisticated approach than Responsive web design that involves delivering an experience optimized for the handsets targeted and splits the code and processing to render on different devices between the client and the server
60
Accessibility
An approach to site design intended to accommodate site usage using different browsers and settings particularly required by the visually impaired.
61
Accessibility legislation
Legislation intended to protect users of website with disabilities, including those with visual disability
62
ALT tags
Alt tags ( alternative tags ) appear after an image tag and contain a phrase associated with that image
63
Malware
Malicious software or toolbars, typically downloaded via the Internet, which acts as a 'Trojan horse' by executing unwanted activities such as keylogging of user passwords or viruses which may collect email addresses.
64
Firewall
A specialized software application mounted on a server at the point where the company is connected to the internet to prevent unauthorized access.
65
Information Security Management System
An organisational process to protect information assets
66
Information security policy
A definition of the organizational approaches to information security and the responsibilities of employee in protecting information
67
Information Asset register ( IAR)
A repository for the types, value, and ownership of all information within an organization
68
Business continuity management or disaster recovery
Measures taken to ensure that information can be restored and accessed if the original information and access method are destroyed
69
Computer virus
A program capable of self-replication, allowing it to spread from one machine to another. It may be malicious and delete data, or benign.
70
Boot-sector virus
Occupies boot record of hard and floppy disks and is activated during computer start-up
71
worm
A small program that self-replicates and transfers across a network from machine to machine. A form of virus.
72
Trojan
A virus that masquerades as a bona fide application
73
Anti-virus software
Software to detect and eliminate viruses
74
managed email service
Receipt and transmission of emails is managed by a third party
75
Phishing
Obtaining personal details online through sites and emails masquerading as legitimate businesses
76
Employee communications monitoring
Companies monitor staff emails and websites they access
77
Acceptable-use policy
Statement of employee activities involving use of networked computers that are not considered acceptable by management
78
Scanning software
Identifies email or web-page access that breaches company guidelines or acceptable-use policies
79
Filtering software
Software that blocks specified content or activities
80
Impact assessment
An assessment of the employee monitoring process in the workplace to identify improvement to minimize infringement of employee privacy
81
covert monitoring
Monitoring which the employer undertakes without notification of staff
82
Spam
Unsolicited email ( usually bulk-mailed and untargeted)
83
Botnet
Independent computers, connected to the Internet, are used together, typically for malicious purposes through controlling software. For example, they may be used to send out spam or for denial-of-service attack
84
Email filter
Software used to identify spam according to its characteristics such as keuwords.
85
Blacklist
A compilation of known sources of spam that are used to block email
86
Whitelist
A compilation of trusted sources of email that is permitted to enter an inbox
87
Hacking
The process of gaining unauthorized access to computer systems, typically across a network
88
Social engineering
Exploiting human behaviour to gain access to computer security information from employees and individuals
89
Ethical hacker
Hacker employed legitimately to test the quality of system security
90
Digital certificates ( keys)
Consist of keys made up of large numbers that are used to uniquely identify individuals
91
Symmetric encryption
Both parties to a transaction use the same key to encode and decode messages
92
Assymetric encryption
Both parties use a related but different key to encode and decode messages
93
Digital signatures
A method of identifying individuals or companies using public-key encryption
94
Certificate and certificate authorities ( CAs)
A certificate is a valid copy of a public key of an individuals or organization together with identification information. It is issued by a trusted third party ( TTP) or certificate authority ( CA).
95
Virtual Private network ( VPN)
Private network created using the public network infrastructure of the Internet.
96
Security Sockets Layer ( SSL)
A commonly used encryption technique for scrambling data as it is passed across the Internet from a customer's web browser to a merchant's web server.