Info 210 Test *2* – Flashcards

Unlock all answers in this set

Unlock answers
question
Disruptive Technology
answer
A new way of doing things that initially does not meet the needs of existing customers. Tend to open new markets and destroy old ones. Disruptive technologies usually enter at the low end of the market and eventually evolve to displace high end competitors. Sony is a perfect example, started with tiny portable radios, now are crazy big, one of the best.
question
Sustaining Technology
answer
produces an improved product customers are eager to buy, such as faster cars or larger hard drives. Tend to provide us with better faster and cheaper products in established markets.
question
Internet
answer
is a massive network that connects computers all over the world and allows them to communicate with one another. Computers connected via the internet can send and retrieve information including text, graphics, voice, video, and software. Started by ARMY for emergencies.
question
World Wide Web
answer
provides access to internet information through documents including text. Graphics, audio, video files that use a special formatting language called HTML
question
HTML
answer
links documents allowing users to move from one to another simply by clicking on a hot spot or link.
question
Web Browsers
answer
such as internet explorer or chrome, allow users to access the WWW.
question
Hyper Text Transport Protocol
answer
is the internet protocol web browsers use to request and display web pages using universal resource locators.
question
Ebusiness
answer
Includes ecommerce along with all activates related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real time information.
question
Intermediaries
answer
are agents, software, or business that provides a trading infrastructure to bring buyers and sellers together.
question
Disintermediation
answer
brought about by the introduction of Ebusiness, occurs when a business sells directly to the customer online an cuts out the intermediary (middle Man) this process lets the company shorten the order process and add value without reduced costs or a more responsive and efficient service.
question
Reintermediation
answer
Steps are added to the value chain as new players find ways to add value to the business process. Allowing more retailers to sell its product.
question
Cybermediation
answer
- refers to the creation of new kinds of intermediaries that simply could nt have existed before the advent of ebusiness, including comparison-shopping sites such as kelkoo and bank account aggression services such as Citibank
question
Business Model
answer
is a plan that details how a company creates
question
C2B
answer
applies to any consumer who sells a product or a service to a business on the internet. One example is a customer of Priceline.com, who set their own prices for items such as airline tickets and wait for a seller to decide wheater to supply them. The demand for C2B business will increase over the next few years due to customers desire for greater convenience and lower prices.
question
C2C
answer
applies to customers offering goods and services to each other on the internet. A good example is an auction where buyers and sellers solicit consecutive bids from each other and prices are determined dynamically. Ebay
question
B2B
answer
applies to businesses buying from and selling to aeach other over the internet. Examples include medical billing service, software sales and licensing and virtual assistant businesses. B2B relationships represent 80% of all online business and are more complex with greater security needs than other types.
question
B2C
answer
applies to any business that sells its products or services directly to customers online. Carfax offers buyers detailed histories of used vehicles for a fee.
question
Brick and Mortar
answer
A business that operates in a physical store without an internet presence. TJ max
question
Click and Mortar Business
answer
A business that operates in a physical location and on the internet. Barnes and Noble.
question
Pure-Play Business
answer
a business that operates on the internet only without a physical store. Google.
question
Web 2.0: Business 2.0-
answer
is the next generation of internet use- a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free. In Business 2.0 technical skills are no longer required to use and publish information to the world wide web, eliminating entry barriers for online businesses.
question
Open System
answer
consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add on products to plug into or interoperate with systems. Thousands of third party vendors interoperate with computers, like ipods, drawling software, and mice.
question
Source Code
answer
contains instructions written by a programmer specifying the actions to be performed by computer software.
question
Open Source
answer
refers to any software whose source code is made available free for any third party to review and modify. Mozilla is an example, it gives its Firefox web browser, and email for free.
question
User Contributed Content
answer
Or User-generated Content, is created and updated by many users for many users. Websites such as Flicker, Wikipedia, and Youtube, for example move control of online media from the hands of leaders to the hands of users.
question
Reputation Systems
answer
One of the most popular User Generated content, where buyers post feedback on sellers. Reviews that people give on sellers on eBay are an example.
question
Explicit Knowledge
answer
consists of anything that can be documented, archived, and codified, often with the help of IT.
question
Tacit Knowledge
answer
- is the knowledge contained in peoples heads. The challenge ingerent in tacit k knowledge is figuring out how to recognize, generate, share, and mange knowledge that resides in peoples heads. Email, IM, and related technologies can help facilitate these disseminations, but identifying it in the first place is the major obstacle.
question
Collective Intelligence
answer
is collaborating and tapping into the core knowledge of all employees, partners, and customers. Knowledge can be a real competitive edge for an organization.
question
Knowledge Management
answer
the most common collective intelligence found, which involves capturing classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions.
question
Knowledge Management System
answer
supports the capturing, organizing, and dissemination of knowledge throughout and organization. KMs can distribute an organizations knowledge base by interconnecting people and digitally gathering their expertise.
question
a. Asynchronous Communication
answer
- Communication such as email in which the message and the response do not occur at the same time.
question
Synchronous
answer
are communications that occur at the same time, such as IM's or chat. Like facebook chat, or AIM. This was brought upon by business 2.0
question
Blogs
answer
An online journal that allows users to post their own comments, graphics, and video. Unlike tradition HTML web pages, blog websites let writers communicate on a regular basis thought a simple yet customizable interface that does not require any programing.
question
Mircoblogging
answer
is the practice of sending brief posts (140-200 characters) to a personal blog, wither publically or to a private group of subscribers who can read the post as IM's or as a text message. The main advantage is that posts can be submitted by a variety of means. Such as IM's, email, or by the web. Most popular is Twitter 5) Challenges
question
• Tech Dependence
answer
People are addicted to technology, they use it for work and play. What happens when something goes down? How do they function? How long can one go without checking emils, twitter, and Facebook? We are only relying on tech more, and when it does all actually crash... ***** gonna be crazy.
question
• Information Vandalism
answer
Allowing anyone to edit something can cause damage, destroy, or vandalize website content. EX: Wiki
question
• Plagiarism
answer
Can be done by the click of a mouse, takes other peoples work and claiming it as your own. Can also occur in blogs and Wiki's but here the blame can not be put on one person
question
Web 3.0
answer
offers a way for people to describe information such that computers can start to understand the relationships among concepts and topics. Based on "intelligent" web applications using natural language processing, machine-based learning and reasoning, and intelligent applications.
question
Intelligent Applications
answer
the use of agents, machine learning, and semantic web concepts to complete intelligent tasks for users.
question
Semantic Web
answer
a component of web 3.0 that describes things in a way that computers can understand. Not about links between web pages; rather is describes the relationships between things (such as A is a part of B and Y is a member of Z) and the properties of things (weight, age, prices)
question
Copyright
answer
the legal protection afforded an expression of an idea, such as a song, book, or video game.
question
Intellectual Property
answer
is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
question
Privacy
answer
is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without consent.
question
Confidentiality
answer
- is the assurance that messages and information remain available only to those authorized to view them.
question
Pirated Software
answer
is the unauthorized use, duplication, distribution, or sale of copyrighten software.
question
Counterfeit Software-
answer
Software this is manufactured to look like the real thing and sold as such.
question
Information Management Policies (ePolicies)
answer
are policies and procedures that address information management along with the ethical use of computers and the internet in the business environment.
question
Ethical Computer Use Policy
answer
contains general principles to guide computer user behavior. EX- it might explicitly state that users should refrain from playing computer games during working hours. If one ignores the rule, said person could be fired.
question
Information Privacy
answer
contains general principles regarding information privacy. Inovant by visa is an example.
question
Acceptable Use Policy
answer
requires a user to agree to follow it to be provided access to cooperate email, info systems, and the Internet.
question
Email privacy Policy
answer
details the extent to which email messages may be read by others. Email is so pervasive in organizations that it requires its own specific policy.
question
Social media Policy
answer
outlines the corporate guidelines or principles governing employee online communications. One single social media policy may not be enough to ensure the company's online reputation is protected. So more specific, social media policies may be made.
question
Key logger
answer
a program that records every keystroke and mouse click • Hardware key logger- a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
question
Cookie
answer
a small file deposited on a hard drive by a website containing information about customers and their web activities. Allows websites to record the comings and going of customers, usually without their knowledge or consent.
question
Adware
answer
Software that generates ads that install themselves on a computer when a person downloads some other program from the internet.
question
Spyware
answer
Software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computers CPU and storage for some task the user knows nothing about.
question
Web Log
answer
Consists of one line of information for every visitor to a website and is usually stored on a server.
question
Clickstream
answer
Records information about a customer during a Web surfing session such as what websites were visited, how long the visits last, and what ads were viewed, and what was purchased.
question
Downtime
answer
: refers to a period of time when a system is unavailable.
question
Financial Performance
answer
Revenue recognition, cash flow, payment guarantees, credit ranking, stock price.
question
Revenue (in the aspect of downtime)
answer
direct loss, compensatory payment, lost future revenue, billing losses, lost productivity.
question
Damaged Reputation (in the aspect of downtime)
answer
- customers, supplies, financial markets, banks, business partners.
question
Other Expenses (lost in the aspect of downtime)
answer
Temp employees, equipment rentals, overtime costs, extra shipping charges, travel expenses, legal obligations
question
Black-hat Hackers
answer
Break into other peoples computers systems and may just look around or may steal and destroy info.
question
Crackers
answer
have criminal intent when hacking
question
Cyber terrorists
answer
seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction.
question
Hactivists
answer
Have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
question
Script Kiddies
answer
Script Bunnies) find hacking code on the internet and click and point their way into systems to cause damage or spread viruses.
question
White-hat Hackers
answer
work at the request of athe system owner to find system vulnerabilities and plug the holes.
question
Insiders
answer
Are legitimate users who purposely or accidently misuse their access to the environment and cause some kind of business affecting incident. EX- writing your password on a sticky note and putting it on your computer.
question
Social Engineering
answer
hackers can use their social skills to trick people into revealing access credentials or other valuable information.
question
Dumpster Diving
answer
or looking through peoples trash is another way hackers can obtain information.
question
Authentication
answer
is a method for confirming a users identiites.
question
Authorization-
answer
is the process of providing a user with permission incudling access levels, and abiliites such as file access, hours access, and amount of allocated storage space.
question
Authorization and Authentication
answer
are second line of defense
question
Authorization and Authentication techniques
answer
o Something the user knows (ID and password) o Something the user has (passcard or token) o Something that is apart of the user (fingerprint or eye scan)
question
Phishing
answer
is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as thought thy came from legit businesses.
question
Pharming
answer
Reroutes requests for legit websites to false websites. For example, typing in your bank website and being taken to a fake one.
question
Encryption
answer
scrambles info into an alternative form that requires a key or pass word to decrypt.
question
Certificate Authority
answer
- is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
question
digital certificates
answer
Digital certificate- data file tat identifies individuals or organizations online and is comparable to a digital signature.
question
Firewall
answer
is a hardware and or software that guard a private network by analyzing incoming and outgoing info for the correct markings. If the markings are missing the firewall prevents the info from entering the network.
question
Anti Virus Software
answer
scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware. Antivirus software must be frequently updated to protect against newly created viruses.
question
Intrusion Detection Software
answer
features full-time monitoring tools that search for patterns in network traffic to identify intruders. Protects against suspicious network traffic and attempts to access files and data.
question
Information MIS Infrastructure
answer
- means the plans for how a firm will build, deploy, use, and share its data.
question
Backup
answer
is an exact copy of a systems information
question
Recovery
answer
is the ability to get a system up and running in the event of a system crash or failure that includes restoration of the information backup.
question
Business Continuity Plan
answer
details how a company recovers and restores critical business operations and systems after a disaster.
question
Recovery Plan
answer
detailed process for recovering info or a system in the event of catastrophic disaster.
question
Disaster recovery cost curve
answer
1. The cost to the company of the unavailability of information and technology. 2. The cost to the company of recovering from a disaster over time.
question
Hot site
answer
a separate and fully equipped facility where a company can move immediately after a disaster and resume business
question
Cold site
answer
separate facility that does not have any computer equipment, but is a place where employees can move after a disaster.
question
Warm site
answer
a separate facility with computer equipment that requires installation, and configuration.
question
Emergency Notification Service
answer
an infrastructure built for notifying people in the event of an emergency.
question
Accessibility
answer
refers to the varying levels that define what a user can access, view, or preform when operating a system
question
Availability
answer
refers to the time frames when the system is operational.
question
Maintainability
answer
refers to how quickly a system can transform to support environmental changes. Like, a small business dealing with international currency.
question
Portability
answer
the ability of an application to operate on different devices or software platforms, such as different operating systems, itunes compatible for both macs and pc.
question
Reliability
answer
(accuracy) ensures the system is functioning correctly and providing accurate information.
question
Scalability
answer
describes how well a system can adapt to the increase demands of growth
question
• Usability
answer
the degree to which a system is easy to learn and efficient and satisfying to use.
question
• Mores Law
answer
refers to the commuter chip performance per dollar doubles every 18 months.
question
• Ewaste
answer
refers to discarded, obsolete, or broken electronic devices.
question
• Grid computing
answer
is collection of computers, often geographically dispersed, that are coordinated to solve a common problem.
question
• Virtualized Computing
answer
creates multiple "virtual" machines on a single computing device, example a computer printer, now you can buy a virtualized computer printer.
question
• Software as a service
answer
delivers applications over the cloud using a pay per use revenue model.
question
• Platform as a Service
answer
supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model.
question
World Wide Web
answer
provides access to internet infomartion through documents including text, graphics,.video that uses a special formatting language called HTMl
question
HTML
answer
links documents allowing users to move from one to another simply by clicking on a hot spot or link.
question
HTTP
answer
internet protocol web browsers ide to request and display web pages using univeral resource locators.
question
URl
answer
identifies a url address and finds it. Like apple.com
question
Web 1.0
answer
is a term to refer to the world wide web during its first web years of operation between 1991 and 2003.
question
Infrastructure as a srevice
answer
offer scomputer hardware and networking equipment on a pay per use basis
question
Software as a service
answer
offers applications on a pay per use basis
question
Platform as a service
answer
offers hardware, networking, and applcations on a pay per use basis
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New