Midterm Review Flashcards

(47 cards)

1
Q

Reducing costs with E-Business

A

E-Businesses operate 24 hours a day, 7 days a week. This availability directly reduces transaction costs, since consumers no longer have to spend a lot of time researching purchases or traveling great distances to make them. The faster delivery cycle for online sales helps strengthen customer relationships, improving customer satisfaction and ultimately sales.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewall

A

Hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acceptable Use Policy (AUP)

A

A policy that a user must agree to follow to be provided access to corporate email, information systems, and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Strategic business making

A

IDK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Benchmarks

A

Baseline values the system seeks to attain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

E-Business

A

Includes commerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Critical Success Factor

A

The crucial steps companies perform to achieve their goals and objectives and implement their strategies:

  • Create high-quality products
  • Retain competitive advantages
  • Reduce product costs
  • Increase customer satisfaction
  • Hire and retain the best business professionals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing

A

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MIS Business Consultants

A

IDK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Age

A

The present time, during which infinite quantities of facts are widely available to anyone who can use a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Competitive Intelligence

A

The process of gathering information about the competitive environment, including competitors’ plans, activities, and products, to improve a company’s ability to succeed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality

A

The assurance that messages and information remain available only to those authorized to view them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Analytics

A

IDK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Collection

A

IDK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Downtime

A

Refers to a period of time when a system is unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dynamic Scaling

A

Means that the MIS infrastructure can be automatically scaled up or down based on needed requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

E-Waste

A

Refers to discarded, obsolete, or broken electronic devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Moore’s Law

A

Refers to the computer chip performance per dollar doubling every 18 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

High availability

A

Occurs when a system is continuously operational at all times

20
Q

Information Security

21
Q

Security Policies

A

Identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings never sharing passwords with anyone, and changing passwords every 30 days.

22
Q

Key Performance Indicators (KPI)

A

Quantifiable metrics a company uses to evaluate progress towards critical success factors

23
Q

Website Traffic

24
Q

Business Environment

25
Performance Measure
How quickly a system performs a process transaction
26
Privacy
The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent
27
Up time
IDK
28
Market Share
The proportion of the market that a firm captures
29
Organizational Structure
IDK
30
Identity Theft
The forging of someone's identity for the purpose of fraud
31
Knowledge Worker
Individuals valued for their ability to interpret and analyze information
32
Viruses
Software written with malicious intent to cause annoyance or damage
33
E-business Model
A plan that deals how a company creates, delivers, and generates revenues on the internet
34
E-commerce Model
IDK
35
Business to Business Model
Applies to businesses buying from and selling to each other over the internet
36
Information Reach
Measures the number of people a firm can communicate with all over the world
37
Elements of systems thinking
IDK
38
Click stream data metric
Exact pattern of a consumer's navigation through a site
39
Business model
A plan that details how a company creates, delivers, and generates revenues
40
Information age
The present time, during which infinite quantities of facts are widely available to anyone who can use a computer
41
Digital Darwinism
Implies that organizations that cannot adapt to the new demands places on them for surviving in the information age are doomed to extinction
42
Competitive Intelligence
The process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed
43
E-business Revenue
IDK
44
Porter's 5 Forces
``` Rivalry amongst existing competitors Threat of substitute products or services Supplier Power Threat of new entrants Buyer power ```
45
Spyware
A special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission
46
Sustainable Technology (MIS)
IDK
47
4 Types of e-business
IDK