Info Exam 2 – Flashcards

Unlock all answers in this set

Unlock answers
question
disruptive technology
answer
a new way of doing things that initially does not meet the needs of existing customers. These tend to open new markets and destroy old ones. This tech typically enter the low end of the marketplace and eventually evolve to displace high-end competitors and their reigning technologies.
question
sustaining technology
answer
produces an improved product customers are eager to buy, such as a faster car or larger hard drive. These tend to provide us with better, faster, and cheaper products in established markets. Incumbent companies most often lead this technology to market, but they virtually never lead in markets opened by disruptive tech.
question
Internet
answer
a massive network that connects computers all over the world and allows them to communicate with one another. Originally, it was essentially an emergency military communications system operated by the US Department of Defense Advanced Research Project Agency, which called the network ARPANET.
question
World Wide Web (WWW)
answer
provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML.
question
Hypertext markup language (HTML)
answer
Internet language which links documents, allowing users to move from one to another simply by clicking on a hot spot or link.
question
Hypertext transport protocol (HTTP)
answer
the Internet protocol Web browsers use to request and display Web pages using universal resource locators.
question
universal resource locator (URL)
answer
the address of a file or resource on the Web such as www.apple.com. A domain name identifies a URL address, 'apple.com' being the domain name.
question
Web 1.0
answer
term used to refer to the WWW during its first few years of operation between 1991 and 2003. The competitive advantages for first movers would be enormous, thus spurring the beginning of this internet boom. During this period, entrepreneurs began creating the first forms of ebusiness.
question
Ecommerce
answer
the buying and selling of goods and services over the Internet, refers only to online transactions.
question
Ebusiness
answer
includes ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information.
question
paradigm shift
answer
occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave. Ebusiness opened up a new marketplace for any company willing to move its business operations online, this transformed entire industries and changed enterprise-wide business processes that fundamentally rewrote traditional business rules.
question
information richness
answer
refers to the depth and breadth of detail contained in a piece of textual, graphic, audio, or video information. Easy access to real-time information is a primary benefit of ebusiness. Buyers need this make informed purchases.
question
information reach
answer
measures the number of people a firm can communicate with all over the world. Sellers need this to properly market and differentiate themselves from the competition.
question
personalization
answer
occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions. 'Mass customization' is the ability of an organization to tailor its products or services to the customers' specifications.
question
long tail
answer
In this context, refers to an extremely large selection of content or products. Is a phenomenon whereby firms can make money by offering a near-limitless selection.
question
intermediaries
answer
are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.
question
disintermediation
answer
occurs when a business sells directly to the customer online and cuts out the intermediary, the introduction of ebusiness brought this about.
question
reintermediation
answer
steps are added to the value chain as new players find ways to add value to the business process
question
cybermediation
answer
refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation such as Citibank.
question
interactivity
answer
measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, the number of pages viewed, and number of repeat visits to the advertisement.
question
clickstream data
answer
through this process, businesses can observe the exact pattern of a consumer's navigation through a site.
question
ebusiness forms
answer
an ebusiness model is a plan that details how a company creates, delivers, and generates revenues specifically on the Internet. Forms are: content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers.
question
business-to-business (B2B)
answer
type of ebusiness model; applies to businesses buying from and selling to each other over the internet. Examples include medical billing service, software sales and licensing, and virtual assistant businesses. B2B relationships represent 80% of all online business and are more complex with greater security needs than the other types.
question
business-to-consumer (B2C)
answer
type of ebusiness model; applies to any business that sells its products or services directly to consumers online. An eshop is an online version of a retail store where customers can shop at any hour. There are three ways to operate as a B2C: brick-and-mortar, click-and-mortar, and pure play.
question
consumer-to-business (C2B)
answer
type of ebusiness model; applies to any consumer who sells a product or service to a business on the Internet. Priceline
question
consumer-to-consumer (C2C)
answer
type of ebusiness model; applied to customer offering goods and services to each other on the Internet. Ebay
question
Internet service provider (ISP)
answer
a company that provides access to the internet for a monthly fee.
question
ebusiness tools for communication
answer
email, IM, videoconferencing, web coonferencing, podcasting, content management systems.
question
content management systems (CMS)
answer
help companies manage the creation, storage, editing, and publication of their website content. Are user-friendly; most include Web-based publishing, search, and navigation, and indexing to organize information; and they let users with little or no technical experience make website changes.
question
taxonomy
answer
used for indexing the content on the website into categories and subcategories of topics.
question
information architecture
answer
the set of ideas about how all information in a given context should be organized. Many companies hire information architects to create their website taxonomies.
question
the advantages of ebusiness 2.0
answer
Content Sharing Through Open Sourcing, User-Contributed Content, Collaboration Inside the Organization, and Collaboration Outside the Organization.
question
Web 2.0
answer
the next generation of Internet use for businesses - a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free. In 'Business 2.0', technical skills are no longer required to use and publish information to the WWW, eliminating entry barriers for online businesses.
question
open system
answer
consists of nonproprietary hardware and software based on publicly known standards that allows third parties to creates add-on products to plug into or interoperate with the system.
question
source code
answer
contains instructions written by a programmer specifying the actions to be performed by computer software. 'Open source' refers to any software whose source code is made available for free for any third party to review and modify.
question
user-contributed content
answer
is created and updated by many users for many users. Websites such as Flickr, Wikipedia, and Youtube move control of online media from the hands of leaders to the hands of users.
question
collaboration system
answer
a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information.
question
collective intelligence
answer
is collaborating and tapping into the core knowledge of all employees, partners, and customers.
question
knowledge management (KM)
answer
knowledge can be a competitive advantage for an organization, this is the most common form of collective intelligence - involves capturing, classifying, evaluating, retrieving and sharing information assets in a way that provides context for effective decisions and actions. Primarily used to ensure that a company's knowledge of facts, sources of information, and solutions are readily available.
question
knowledge management system (KMS)
answer
supports the capturing, organization, and dissemination of knowledge throughout an organization. Can distribute an organization's knowledge base by interconnecting people and digitally gathering their expertise.
question
explicit knowledge
answer
consists of anything that can be documented, archived, and codified, often with the help of IT. Examples are assets such as patents, trademarks, business plans, marketing research and customer lists.
question
tacit knowledge
answer
the knowledge contained in people's heads. The challenge inherent in this knowledge is figuring out how to recognize, generate, share, and manage knowledge that resides in people's mind.
question
crowdsourcing
answer
the most common form of collective intelligence found outside the organization, refers to the wisdom of the 'crowd'. The idea that collective intelligence is greater than the sum of its individual parts has been around for a long time.
question
social media
answer
refers to websites that rely on user participation and user-contributed content, such as Facebook, youtube, and Digg. A 'social network' is an application that connects people by matching profile information. Social networking is the practice of expanding your business and/or social contacts by constructing a personal network.
question
social networking analysis
answer
A process of mapping a group's contacts to identify who knows whom and who works with whom.
question
tags
answer
are specific keywords or phrases incorporated into website content for means of classification or taxonomy. 'Social tagging' describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search.
question
folksonomy
answer
The result of personal free tagging of information and objects. The tagging is done in a social enviroment.
question
website bookmark
answer
locally stored URL or the address of a file or Internet page served as a shortcut. 'Social bookmarking' allows users to share, organize, search, and manage bookmarks.
question
blog
answer
an online journal that allows users to post their own comments, graphics, and video. These websites let writers communicate - and reader's respond - on a regular basis through a simple yet customizable interface that does not require any programming.
question
microblogging
answer
the practice of sending brief posts to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages. Posts can be submitted by a variety of means, such as instant messaging, email or the Web.
question
Real Simple Syndication (RSS)
answer
is a Web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format. These documents or feeds include full or summarized text, plus other information such as publication date and authorship.
question
wiki
answer
a type of collaborative Web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required.
question
network effect
answer
describes how products in a network increase in value to users as the number of users increases.
question
application programming interface (API)
answer
content used in 'mashups' is typically sourced from this, which is a set of routines, protocols, and tools for building software applications.
question
semantic web
answer
an evolving extension of the WWW in which web content can be expressed not only in natural language, but also in a format that can be read and used by software agents, thus permitting them to find, share, and integrate information more easily.
question
Egovernment
answer
involves the use of strategies and technologies to transform governments by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government.
question
Copyright
answer
the legal protection afforded an expression of an idea, such as a song, book, or video game.
question
intellectual property
answer
is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
question
ethics
answer
the principles and standards that guide our behavior toward other people.
question
privacy
answer
is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
question
confidentiality
answer
related to privacy, which is the assurance that messages and information remain available only to those authorized to view them.
question
information ethics
answer
govern the ethical and moral issues arising from the development and use of information technologies. as well as the creation, collection, duplication, distribution, and processing of information itself
question
pirated software
answer
the unauthorized use, duplication, distribution, or sale of copyrighted software. 'Counterfeited software' is software that is manufactured to look like the real thing and sold as such.
question
information management
answer
examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
question
information governance
answer
a method or system of government for information management or control. 'Information compliance' is the act of conforming, acquiescing, or yielding information.
question
Ediscovery
answer
refers to the ability of a company to identify, search, gather, seize or export digital information in responding to a litigation, audit, investigation, or information, inquiry.
question
Epolicies
answer
are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
question
ethical computer use policy
answer
contains general principles to guide computer user behavior.This policy ensures the users know how to behave at work and the organization has a published standard to deal with infractions.
question
information privacy policy
answer
an organization wanting to protect its information should develop this type of policy, which contains general principles regarding information privacy.
question
acceptable use policy (AUP)
answer
requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet. Useres generally agree to the following: 1) Not using the service as part of violating any law. 2) not attempting to break the security of any computer network or user. 3) not posting commercial messages to groups without prior persmission. 4) not performing any nonrepudiation.
question
nonrepudiation
answer
a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions. This type of clause is usually contained in an acceptable use policy.
question
email privacy policy
answer
details the extent to which email messages may be read by others. A typical policy includes: 1) defines legitimate email users and explains what happens to accounts after a person leaves the organization. 2) explains backup procedures. 3) describes the legitimate grounds for reading email and the process required before such action is performed. 4) discourages sending junk email or spam to anyone who does not want to receive it.
question
Internet use policy
answer
contains general principles to guide the proper use of the Internet. 1) describes the Internet services available to users, 2) defines the organization's positions on the purpose of Internet access and what restrictions, if any, are placed on that access. 3) describes user responsibility for citing sources, properly handling offensive material, and protecting the organization's good name. 4) states the ramifications if the policy is violated. 5) prohibits attempting to mail bomb a site. 6) informs users that the organization has no control over email once it has been transmitted outside the organization.
question
spam
answer
unsolicited email. An 'anti-spam policy' simply states that email users will not send unsolicited emails (or spam)
question
social media policy
answer
Outlines the corporate guidelines or principles governing employee online communications. Might include: employee online communication policy detailing brand communication, employee blog and personal blog policies, employee social network and personal social network policies, twitter, linkedin, facebook, and youtube policies could be specified.
question
information technology monitoring
answer
tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed. The best path for an organization planning to engage in employee monitoring is open communication including 'employee monitoring policy' stating explicitly how, when, and where the company monitors its employees.
question
downtime
answer
refers to a period of when a system is unavailable. The cost is - financial performance, decreased revenue, damaged reputation, and other expenses.
question
information security
answer
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside and organization. Is the primary tool an organization can use to combat the threats associated with downtime.
question
hackers
answer
experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
question
virus
answer
software written with malicious intent to cause annoyance or damage. Some hackers create and leave these causing massive computer damage.
question
adware
answer
software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the user.
question
spyware
answer
a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission.
question
Insiders
answer
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
question
social engineering
answer
through this, hackers use their social skills to trick people into revealing access credentials or other valuable information
question
dumpster diving
answer
looking through people's trash, is another valuable way hackers obtain information
question
information security policies
answer
policy which identifies the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.
question
identity theft
answer
the forging of someone's identity for the purpose of fraud. The fraud is often financial, because thieves apply for and use credit cards or loans in the victim's name.
question
Phishing
answer
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses. The messages appear genuine, with official looking formats and logos, and typically ask for verification of important information such as passwords and account numbers, ostensibly for accounting and auditing purposes.
question
Pharming
answer
reroutes requests for legitimate websites to false websites. For example, if you were to type in the URL to your bank, this could redirect to a fake site that collects your information.
question
authentication
answer
a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user.
question
authorization
answer
the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.
question
content filtering
answer
occurs when organizations use software that filters content such as emails, to prevent the accidental or malicious transmission of unauthorized information.
question
biometrics
answer
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting. Unfortunately, biometric authentication can be costly and intrusive.
question
encryption
answer
scrambles information into an alternative form that requires a key or password to decrypt. If there were a security breach and the stolen information were encrypted, the thief would be unable to read it. Can switch the order of characters, replace characters with others, insert or remove characters, or use a mathematical formula to convert the information into a code. Companies that transmit sensitive information over the Internet, such as credit card numbers, use this.
question
Public key encryption (PKE)
answer
encryption technology which uses two keys: a public key which everyone can have and a private key for only the recipient.
question
certificate authority
answer
a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
question
digital certificates
answer
a data file that identifies individuals or organizations online and is comparable to a digital signature.
question
firewall
answer
hardware and/or software that guards a private network by analyzing and outgoing and information for the correct markings.
question
Antivirus software
answer
software which scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware.
question
intrusion detection software
answer
software which features full-time monitoring tools that search for patterns in network traffic to identify intruders. IDS protects against suspicious network traffic and attempts to access files and data.
question
prevention and resistance
answer
technologies stop intruders from accessing intellectual capital. Include: content filtering, encryption, and firewalls.
question
MIS infrastructure
answer
includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets. A solid infrastructure can reduce costs, improve productivity, optimize business operations, generate growth, and increase profitability.
question
client
answer
a computer designed to request information from a server.
question
server
answer
a computer dedicated to providing information in response to requests
question
enterprise architect
answer
a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business. Firms employ these people to help manage change and dynamically update MIS infrastructure.
question
information MIS infrastructure
answer
supporting operations; identifies where and how important information, such as customer records, is maintained and secured.
question
agile MIS infrastructure
answer
supporting change; includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals.
question
sustainable MIS infrastructure
answer
supporting the environment; identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
question
backup
answer
an exact copy of a system's information. 'Recovery' is the ability to get a system up and running in the event of a system crash failure that includes restoring the information backup.
question
fault tolerance
answer
the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service. This enables a business to support continuous operations if there is a power failure or flood. Is an expensive form of backup, and only mission-critical applications and operations use it.
question
failover
answer
a specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server. Is a high-speed and high-cost method of backup and recovery.
question
failback
answer
occurs when the primary machine recovers and resumes operations, taking over from the secondary server.
question
disaster recovery plan
answer
a detailed process for recovering information or a system in the event of a catastrophic disaster. This plan includes such factors as which files and systems need to have backups and their corresponding frequency and methods along with the strategic location of the storage in a separate physical site that is geographically dispersed.
question
cold site
answer
alternative disaster site; a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.
question
warm site
answer
alternative disaster site; a separate facility with computer equipment that requires installation and configuration.
question
hot site
answer
alternative disaster site; a separate facility that is fully equipped where the company can move immediately after a disaster and resume business.
question
business continuity planning
answer
details how a company recovers and restores critical business operations and systems after a disaster or extended disruption. This plan includes such factors as identifying critical systems, business processes, departments, and the maximum amount of time the business can continue to operate without functioning systems.
question
emergency notification system
answer
sometimes part of a business continuity plan, it's an infrastructure built for notifying people in the event of an emergency. A firm will implement these in order to warn employees of unexpected events and provide them with instructions about how to handle the situation.
question
accessibility
answer
...refers to the varying levels that define what a user can access, view, or perform when operating a system.
question
availability
answer
...refers to the time frames when the system is operational. A system is called unavailable when it is not operating and cannot be used. High availability occurs when a system is continuously operational at all times.
question
maintainability
answer
...refers to how quickly a system can transform to support environmental changes, AKA flexibility. Building and deploying flexible systems allow easy updates, changes, and reconfigurations, for unexpected business or environmental changes.
question
portability
answer
...refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.
question
reliability
answer
...ensures a system is functioning correctly and providing accurate information, AKA accuracy. Housing unreliable information on a website can put a company at risk of losing customers, placing inaccurate supplier orders, or even making unreliable business decisions.
question
scalability
answer
describes how well a system can scale up, or adapt to the increased demand of growth. Anticipating expected, and unexpected, growth is key to building scalable systems that can support that development.
question
usability
answer
the degree to which a system is easy to learn and efficient and satisfying to use. Providing hints, tips, shortcuts, and instructions for any system, regardless of its ease to use, is recommended.
question
Moore's Law
answer
a law which refers to the computer chip performance per dollar doubles every 18 months.
question
sustainable MIS disposal
answer
refers to the safe disposal of MIS assets at the end of their life cycle. It ensure that ewaste does not end up in landfills causing environmental issues.
question
grid computing
answer
An aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data.
question
cloud computing
answer
refers to the use of resources and applications hosted remotely on the Internet.
question
Infrastructure as a Service
answer
a service that delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model.
question
Software as a Service
answer
one of the first applications of cloud computing, delivers applications over the cloud using a a pay-per-use revenue model. The software is priced on a per-use basis with no up-front costs, so companies get the immediate benefit of reducing capital expenditures.
question
Platform as a Service
answer
supports the development of entire systems including hardware, networking, and applications using a pay-per-use revenue model. With this service, the development, deployment, management, and maintenance is based entirely in the cloud and performed by the provider, allowing the company to focus resources on its core initiatives.
question
virtualization
answer
creates multiple "virtual" machines on a single computing device; a process that allows networked computers to run multiple operating systems and programs through one central computer at the same time
question
data center
answer
A facility used to house management information systems and associated components, such as telecommunications and storage systems. Sometimes referred to as 'server farms', they consume power and require cooling and floor space while working to support business growth without disrupting normal business operations and the quality of service.
question
Web 3.0
answer
the next generation of the Internet and Web applications. Is based on "intelligent" Web applications using natural language processing, machine-based learning and reasoning, and intelligent applications. This version of the web offers a way for people to describe information such that computers can start to understand the relationships among concepts and topics; transforming the web into a database, a move toward making content accessible by multiple non-browser applications, the leverage of AI technologies, or semantic web and evolution toward 3D.
question
network
answer
a communications system created by linking two or more devices establishing a standard methodology in which they can communicate.
question
cell reference
answer
is used when you refer to a particular cell or range of cells within a formula or function instead of a value.
question
relative cell reference
answer
cell reference that adjusts to a new location when copied or moved. When you copy or AutoFill as formula to the right or left, the relative cell reference to the column will change. When you copy or AutoFill a formula up or down, the reference to the row will change.
question
absolute cell reference
answer
refers to the address of a cell, when both the column and row needs to remain constant regardless of the position of the cell when the formula is copied to other cells. Cell reference that does not adjust to the new cell location when copied or moved. $D$2 or $A$1*B4
question
mixed cell reference
answer
refers to referencing a cell within the formula where part of the cell address is preceded by a dollar sign to lock - either the column letter or the row value - as absolute and leaving the other part of the cell as relatively referenced. When you add one dollar sign, but not the other, you have a mixed - $B10 or B$10.
question
pie chart
answer
type of chart; commonly used for depicting parts of the whole such as comparing staff performance within a department or comparing the number of transactions of each product category within a period of time.
question
line chart
answer
type of chart; help convey change over a period of time. These are great for exploring how data in a business, such as sales or production, changes over time.
question
column chart
answer
type of chart; useful for comparing data sets that are categorized, like departments, product categories, or survey results. Useful for showing categories over time where each column represents a unit of time, good for comparisons both individually, in groups, or stacked.
question
bar chart
answer
type of chart; useful for comparing data in groups and are similar to column charts. The bars are horizontal representations of the data rather than vertical. Typically not used with time, and can be 'stacked' to show how the individual parts add up to create the entire length of each bar.
question
scatter chart
answer
type of chart; a particular type of chart that conveys the relationship between two numeric variables. Very common as a statistical tool depicting the correlation between two variables.
question
area chart
answer
type of chart; a variation of a stacked line chart that emphasizes the magnitude of change over time and visually depicts a trend. This type of chart has a nice visual characteristic because each colored layer changes, growing or shrinking, as it moves across time periods.
question
sparklines
answer
small charts that are embedded into spreadsheet, usually beside the data to facilitate quick analysis of trends. Can be used within a spreadsheet to give an immediate visual trend analysis, and it adjusts as the source data changes. This type of chart can graphically depict the data over time through either a line chart or a bar chart that accumulates the data.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New