Test 2 Flashcards

(143 cards)

1
Q

A plan that details how a company creates, delivers, and generates revenues on the internet

A

Ebusiness Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Applies to businesses buying from and selling to each other over the Internet.

A

Business to Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Applies to any business that sells its products or services to consumers over the Internet.

A

Business to Consumer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Applies to any consumer that sells a product or service to a business over the Internet.

A

Consumer to Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet.

A

Consumer to Consumer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 Common Business to Consumer Models

A

Brick and Morter Business
Click and Morter Business
Pure Play (Virtual) Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Website software that finds other pages based on keyword matching similar to Google

A

Search Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evaluates variables that search engines use to determine where a URL appears on the list of search results

A

Search Engine Ranking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking

A

Search Engine Optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ebusiness Revenue Models (5)

A
Advertising fees
License fees
Subscription fees
Transaction fees
Affiliate model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

6 Ebusiness Tools for Connecting and Communicating

A
Email
IM
Podcasting
Videoconference
Web COnferencing
Connect Management System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4 Challenges of Ebusiness

A

IDentifying Limited Market Segments
Managing Customer Trust
Ensuring Consumer Protection
Adhering to Taxing Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3 Managerial decision-making challenges

A

Analyze large amounts of information
Apply sophisticated analysis techniques
Make decisions quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define the problem as clearly and precisely as possible

A

Problem Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gather problem Related data, including who, what, where, when, why and how. Be sure to gather facts, not rumors or opinions about the problem

A

Data Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision

A

Semistructured Decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice

A

Unstructured Decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A simplified representation or abstraction of reality

A

Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of decision is a transaction processing system

A

Structured Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of decision is a decision support system

A

Semistructured Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of decision is an executive information system

A

Unstructured Strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Basic business system that serves the operational level and assists in making structured decisions

A

Transaction Processing System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Capturing of transaction and event information using technology to process, store, and update

A

ONline transaction Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The original transaction record

A

Source Document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Manipulation of information to create business intelligence in support of strategic decision making
ONline analytical processing
26
Models information to support managers and business professionals during the decision-making process
Decision Support System
27
Four quantitative models used by DSSs include
What-if analysis Sensitivity analysis Goal-seeking analysis Optimization analysis
28
A specialized DSS that supports senior level executives within the organization
Executive Information System
29
3 types of EIS
Granularity Visualization Digital Dashboard
30
Simulates human intelligence such as the ability to reason and learn
Artificial intelligence
31
Various commercial applications of artificial intelligence
Intelligent System
32
Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems
Expert System
33
Attempts to emulate the way the human brain works
Neutral Network
34
A mathematical method of handling imprecise or subjective information
Fuzzy Logic
35
An artificial intelligent system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
Genetic Algorithm
36
Software that will search several retailer websites and provide a comparison of each retailer’s offerings including price and availability
Shopping Bot
37
Special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users
Intelligent Agent
38
A computer-simulated environment that can be a simulation of the real world or an imaginary world
Virtual Realtiy
39
As organizations’ reliance on software grows, so do the business-related consequences of software successes and failures including
Increase or decrease revenue Repair or damage to brand reputation Prevent or incur liabilities Increase or decrease productivity
40
The overall process for developing information systems from planning and analysis through implementation and maintenance
Systems Development Life Cycle
41
7 phases of the SDLC
``` Planning Analysis Design Development Testing Implementation Maintenance ```
42
Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system
Analysis Phase
43
Establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation
Design Phase
44
Involves taking all of the detailed design documents from the design phase and transforming them into the actual system
Development Phase
45
Involves bringing all the project pieces together into a special testing environment to eliminate errors and bugs, and verify that the system meets all of the business requirements defined in the analysis phase
Testing Phase
46
Involves placing the system into production so users can begin to perform actual business operations with it
Implementation Phase
47
Assess if the entire system meets the design requirements of the users
Alpha Testing
48
Test the system to ensure it is bug-free
Development Testing
49
Verify that separate systems can work together passing data back and forth correctly
Integration Testing
50
Verify that the units or pieces of code function correctly when integrated
System Testing
51
Determine if the system satisfies the user and business requirements
User Acceptance Testing
52
Test individual units or pieces of code for a system
Unit Testing
53
4 Implementations of the systems development life cycle
Parallel Plunge Pilot Phased
54
Uses both the legacy system and new system until all users verify that the new system functions correctly
Parallel Implementation
55
Discards the legacy system and immediately migrates all users to the new system
Plunge Implementation
56
Assigns a small group of people to use the new system until it is verified that it works correctly, then the remaining users migrate to the new system
Pilot Implementation
57
Installs the new system in phases (for example, by department) until it is verified that it works correctly
Phased Implementation
58
Involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet its business goals
Maintenance Phase
59
A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools and includes the following four common characteristics
Big Data
60
4 characteristics of big data
variety veracity volume velocity
61
6 types of structured data
``` Sensor data Weblog data Financial data Click-stream data Point of sale data Accounting data ```
62
6 types of unstructured data
``` Satellite images Photographic data Video data Social media data Text message Voice mail data ```
63
The two primary computing models that have shaped the collection of big data include:
Distributed Computing | Virtualization
64
Processes and manages algorithms across many machines in a computing environment
Distributed Computing
65
The creation of a virtual (rather than actual) version of computing resources, such as an operating system, a server, a storage device, or network resources
Virtualization
66
3 Focus areas of big data
Data Mining Data Analysis Data Visualization
67
The process of analyzing data to extract information not offered by the raw data alone
Data Mining
68
3 elements of data mining
Data Discovery Deployment
69
Foundation for data-directed decision making
Data
70
Process of identifying new patterns, trends, and insights
Discovery
71
Process of implementing discoveries to drive success
Deployment
72
A data mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products
Recommendation Engine
73
Assigns records to one of a predefined set of classes
Classification
74
Determines values for an unknown continuous variable behavior or estimated future value
Estimation
75
Determines which things go together
Affinity Grouping
76
Segments a heterogeneous population of records into a number of more homogeneous subgroups
Clustering
77
Use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making
Data Mining Tools
78
Data mining uncovers patterns and trends such as:
Building budgets and other financial information Detecting fraud by identifying deceptive spending patterns Finding the best customers who spend the most money Keeping customers from leaving or migrating to competitors Promoting and hiring employees to ensure success
79
- A statement about what will happen or might happen in the future; for example, predicting future sales or employee turnover. Prediction modeling techniques include:
Predicition
80
3 modeling of prediction
optimization forecasting regression
81
is the common term for the representation of multidimensional information
Information Cube
82
Mathematical formulas placed in software that performs an analysis on a data set. Algorithms help uncover:
Algorithms
83
The process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set
Anomaly Detection
84
A data value that is numerically distant from most of the other data points in a set of data
Outliers
85
User goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome
Analysis Paralysis
86
The application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value
Fast Data
87
8 analysis test that data scientists perform
``` Behavioral analysis Correlation analysis Exploratory data analysis Pattern recognition analysis Social media analysis Speech analysis Text analysis Web analysis ```
88
Describes technologies that allow users to “see” or visualize data to transform information into a business perspective
Data Visualization
89
Move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more
Data Visualization Tools
90
Track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis
Business Intelligence Dashboards
91
The next generation of Internet use – a more mature, distinctive communications platform characterized by three qualities
Web 2.0
92
3 qualities of Web 2.0
Collaboration Sharing Free
93
Nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system
Open System
94
3 Characteristics of an open system
Source code Open source Closed source
95
Created and updated by many users for many users
User Contributed Content
96
2 Characteristics of User Contributed
Reputation System | Native Advertising
97
Tools that support the work of teams or groups by facilitating the sharing and flow of information
Collaboration System
98
Collaborating and tapping into the core knowledge of all employees, partners, and customers
Collective Intelligence
99
- Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions
Knowledge Management
100
Knowledge-based assets fall into two categories
Explicit | Tacit
101
Consists of anything that can be documented, achieved, and codified, often with the help of IT
Explicit
102
Knowledge contained in people’s heads
Tacit
103
the wisdom of the crowd
Crowdsourcing
104
2 forms of crowdsourcing
Asynchronous | Synchronous
105
Websites that rely on user participation and user-contributed content
Social Media
106
An application that connects people by matching profile information
Social Network
107
The practice of expanding your business and/or social contacts by a personal network
Social Networking
108
– Specific keywords or phrases incorporated into website content for means of classification or taxonomy
Tags
109
Forms of Tags
SOcial Tags Folksonomy Website bookmark social bookmarking
110
Tools for Collaborating
Blog Wiki Mashup
111
An online journal that allows users to post their own comments, graphics, and videos. Popular business examples include Sweet Leaf Tea
Blog
112
Collaborative website that allows users to add, remove, and change content. Popular business examples include Wikipedia
Wiki
113
Content from more than one source to create a new product or service
Mashup
114
Examples of a blog
Microblogging | Real Simple Syndication
115
Example of a wiki
Network Effect
116
Examples of a mashup
Application programming interface | Mashup editor
117
Based on “intelligent” Web applications using natural language processing, machine-based learning and reasoning, and intelligence applications
Web 3.0
118
A component of Web 2.0 that describes things in a way that computers can understand
Semantic Web
119
Involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government
Egovernment
120
The ability to purchase goods and services through a wireless Internet-enabled device
Mobile Business
121
enable the transmission of data over public or private networks.
Tellecommuncating Systems
122
a communications systems created by linking two or more devices and establishing a standard methodology by which they can communicate.
Network
123
4 Main Principles of Networks
Each computer must have a network interface to provide a doorway for information The network usually has at least one connecting device The network must have communications media to transport information Each computer must have software to move information in and out of the computer
124
A typical home network system has
An Ethernet network card in each computer or a wireless card in each laptop Network cables to transmit signals, or no cables for wireless A DSL or cable modem connection and a broadband/home router
125
an expansion card or PC card that connects your computer to a network
NIC (Network Interface Card)
126
the most common type of network interface card
Ethernet Card
127
device that allows a computer to use radio waves to access a network Connects to hub or switch with a cable like a wired computer May be built into broadband router and not require separate cabling
Wireless Access Point
128
a device to connect computers together to share DSL or cable Internet service in a home or small office One port to plug into DSL or cable connection to connect to the Internet Usually several ports to build a network for home computers or printers and share Internet connection
Broadband or Home Route
129
Makes each computer's hardware work Can use Windows Turn on filesharing to make files available to other computers on the network
Software
130
a device that connects computers into a network and repeats all transmissions to every connected computer
HUb
131
a device that connects computers and repeats transmissions only to intended recipient
Switch
132
a device that connects subnetworks (subnets) of a larger network
Router
133
network that serves a building or buildings in a contiguous area
Local Area Network (LAN)
134
a set of connected networks serving areas not immediately contiguous
Wireless Area Network (WAN)
135
large computer network usually spanning a city
Metropolitan Area NEtwork (MAN)
136
The amount of information that can be transferred in a given amount of time Usually expressed as bits per second (bps) Higher bandwidths expressed as (gigabytes (GB, terabytes (TB)
Bandwidth
137
4 Internet connection types
Phone line and DSL modem Cable TV line and cable modem Satellite modem Dedicated high-speed business lines
138
high-capacity telecommunications line capable of providing high-speed Internet service
Broadband
139
4 principles of network security
Confidentiality Authenticity Integrity Availability
140
information can be obtained only by those authorized to access it Bank statements, credit reports, employee evaluations Threatened by capture of network transmissions and easily-guessed passwords
Confidentiality
141
information really comes from the source it claims to come from Military orders, medical diagnoses, stockbroker directions Threatened by fraudulent e-mails and misspellings of popular Web site names
Authenticity
142
information has not been altered Bank balance, corporate Web site, prescriptions, credit card charges Threatened by forged network transmissions and faulty server software
Integrity
143
a service or resource is available when it's supposed to be Mail-order Web site, corporate e-mail server Threatened by network failures, faulty server software, and high volumes of malicious network traffic
Availability