Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
148 Cards in this Set
- Front
- Back
IEEE 802.3 - aka "___"
|
"ethernet"
|
|
IEEE 802.11 - "___"
Range for b is ___ and ___ for g |
Wireless Protocol "WiFi"
802.11b - 300ft 802.11g - 100ft |
|
IEEE 802.15 - "___"
Range? |
Bluetooth
Range: 10-30ft |
|
IEEE 802.16 - "___"
Range? MBPS? |
WiMax
Range: 30 miles 70 Mbps |
|
IEEE 802.20 - "___"
Ex. |
Mobile Broadband Wireless Access
Google's "G-Phone" |
|
Bluetooth originated because of a king in ___
|
Denmark
|
|
3 Important things to do for WiFi security?
|
1. Set unique Service Set ID
2. Enable WEP or WPA 3. Use Firewall |
|
___ ___ provides functions for the network like error checking (ex. bounced email) and data security
|
Communications Software
|
|
Treating people through telecommunications
Ex. pacemaker |
Telemedicine
|
|
___ ___ ___ is a way to communicate data from one company to another and from one application to another in standard format, permitting the recipient to perform a standard business transaction, such as processing purcahse orders.
2 Types? |
Electonic Data Interchange
(EDI) EDI Link (vendor<->customer) Third party clearinghouse |
|
GPS is a collection of __ satelites owned by the government
|
24
|
|
A collection of interconnected networks, all freely exchanging information.
|
Internet
*worlds largest computer network* |
|
In 1991 the High Perf Comp and Comm Act was initiated and passed by ___
|
Al Gore
|
|
___ ___ is a communication standard that enables traffic to be routed from one network to another as needed. "post office of the internet"
|
Internet Protocol (IP)
|
|
Breaks data into small chucks (called data packets) and manages packet switching.
or The widely used Transport-layer protocol hat most internet applications use with IP |
Transmission Control Protocol
(TCP) |
|
___ is an assigned address on the internet for each computer.
|
Uniform Resource Locator
(URL) |
|
Every computer and every router on the internet has a unique ___ ___
|
IP address
Can be static or dynamic |
|
Domain Names
|
More human friendly addresses like goog.com or amazon.com
|
|
___ ___ ___ changes domain names into IP addresses.
|
Domain Name Servers (DNS)
|
|
The ___ is a network of web servers that stores a particular type of file on the internet, which uses a Client server model.
|
World Wide Web
|
|
Files on the WWW are called ___, and writen in ___
|
hypertext
HTML - uses tags in the page to format the text |
|
The World Wide Wide was created by ____ in ___
|
Tim Berners-Lee in 1989
|
|
The protocol to call documents on the WWW is ___
|
HTTP (HyperText Transfer Protocol)
|
|
___ is used to log on to another computer to access files: uses terminal emulation
|
Telnet
|
|
___ ___ ___ is a secure connectio between two points on the internet.
|
Virtual Private Network (VPN)
|
|
___ is software that creates a unique hypermedia-based menu on a computer screen, providing graphical interface to the web.
|
Web Browser
|
|
A small program embedded in Web pages
|
Applet
|
|
___ is an object oriented programming language based on C++, which allows small programs to be embedded within an HTML document
|
Java
|
|
A tool that submits keywords to several search engines and returns the results from all search engines quiered.
|
Meta-Search Engine
|
|
___ ___ is the automatic transmission of information over the internet rather than making users search for it with their browsers.
|
Push Technology
|
|
A ___ is a device that can broadcast any TV program coming into your home to a broadband internet-connected PC
|
Slingbox
|
|
___ is an internal corporate network using internet and WWW standards and technologies, that is closed to public network address.
|
Intranet
|
|
___connects selected resources inside of an Intranet with the outside (suppliers, customers, etc)
|
Extranet
|
|
___ is the process by which VPN's transfer information by encapsulating traffic in IP packets over the internet using encryption.
|
Tunneling
|
|
The ____, formerly known as Abilene, is a network that will not be open to the public but will have transfer speeds of ___
ISU joined in __ |
Internet2
6.2gb/sec 2007 |
|
Three Basic componenets of a sucessful E-Commerce Model:
|
Content - (industry news, economic news, stock prices)
Commerce - Consumers and businesses buying and selling Community - Message boards/Chate rooms |
|
An ecommerce challenge:
A distribution system that requires cases of goods to be opened on the receiving dock and distributing. |
Split-Case Distribution
|
|
One major challenge for firms when swithcing from traditional commerce to eCommerce is:
|
Web-based Order Processing must be linked to traditional back-end systems
|
|
Three processes in Supply Chain Management:
|
Demand Planning - anticipate market demand
Supply Planning - allocate the right amt of resources to meet the demand Demand Fulfillment - fulfill deman quickly and efficiently |
|
Benefits of the eCommerces supply chain (3)
|
Increased Revenues and Decreased Costs
Improved Customer Satisfaction Inventory reduction across the supply chain |
|
__ ___ relies on the use of wireless devices, such as personal digital assistants, cell phones, and smart phones to place orders and conducts business
Issues (3)? |
Mobile Commerce (M-commerce)
User-friendliness of the device Network Speed Security |
|
___ ___ ___ is a standard set of specifications for internet applications that run on handheld , wireless devices
|
Wireless Application Protocol (WAP)
|
|
A form of ecommerce: direct sales from B to C, uses electronic stroefronts, centers around shopping cart and online catalog
|
Electronic Retailing (e-tailing)
|
|
Groups of stores/products/services on one website is called a ___
|
Cybermall
|
|
An electronic forum where manufactureers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations.
|
Electronic Exchange
|
|
___ ___ is the identification of specific markets to target them with advertising messages.
|
Market Segmentation
|
|
____ is finding and using detailed info about customer's behaviors, preferences, patterns, and uses of online information.
|
Technology-Enabled Relationship Management
|
|
A method of billing whereby a vendor posts and image of your statement on the internet and alerts you by email that you bill has arrived.
|
Electronic Bill Presentent
|
|
Technology Infrastructure from top to bottom: (4)
|
eCommerce Software
Server Software Server Operating System Web Server Hardware |
|
At the top of the tech infrastructure is Ecommerce Software which controls:
|
Catalog management
Shopping cart Product configuration (dell.com) Automates transaction processes Web traffic data analysis |
|
The server software cotnrols:
|
Security, identification, web site tracking, website development tools, webpage construction software
|
|
The web server hardware controls:
|
storage capacity, volume of ecommerce transactions, website hosting
|
|
___ ___: data embedded in website or email to verify identity or sender.
|
Digital Certificate
|
|
___ ___: Independent 3rd party organization that issues digital certificates.
|
Certificate Authority
|
|
___ ___ ___: Protocol to encrypt and protect against theft (looks like a key or lock in bottom right )
|
Secure Sockets Layer (SSL)
|
|
___ ___: Computerized cash
Ex. Paypal |
Electronic Cash
|
|
___ __: Hold credit card, eCash, owner ID, and address info
|
Electronic Wallets
|
|
Strategies a company can use to be sucessful at eCommerce: (4)
|
Develop an effective web presence
Put up a Website Build traffic to website (using meta tags - html tag that is not visible but contains key words or phrases) Maintain and improve your website |
|
___is the data gathered based on the web sites you visit and the items you click.
|
Clickstream data
|
|
___ ___ systems handle routine business operations and maintain those records
|
Transaction Processing Systems
|
|
Waht does a TPS do? (5)
|
Process data about transactions
Maintain data accuracy and integrity Avoid fraudulent transactions Produce timely reports Increase labor efficiency |
|
TPS competitive advantages:(6)
|
Customer Loyalty
Superior Service to Cust. Better relationshp w/ supplier Superior Info gathering Costs reductions Reduced Inventory |
|
___ processing inputs and proceesses data in groups
Typical activities that would use this? |
Batch Processing
Payroll transactions and billing |
|
___ ___ processing :transactions are completed as they occur
Typical activities that would use this? |
Online Transaction Procressing
(OLTP) Fedex tracking shipments |
|
TPS data processing activities:
Data ___: capturing and gathering all data necessary to complete the processing of transactions |
Data Collection
|
|
TPS data processing activities:
Data ___: The process of checking data for validity and completeness. |
Data Editing
|
|
TPS data processing activities:
Data ___: The process of reentering data that was not typed or scanned properly. |
Data Correction
|
|
TPS data processing activities:
Data ___: The process of performing calculations and other data transformations related to business transactions. |
Data Manipulation
|
|
TPS data processing activities:
Data ___: The process of updating one or more databases with new transactions. |
Data Storage
|
|
TPS data processing activities:
Document ____: The process of generating output records and reports. |
Document Production
|
|
__ ___ __ is a formal plan describing the actions that must be taken to restore computer operations and services in the event of a disaster.
|
Disaster Recovery Plan (DRP)
|
|
Characteristics of TPS's: (5)
|
Very connected to eachother
Bad data in, bad data out Generate different reports Important to audit and control Many ways to access |
|
Itegrated set of programs that manage a company's vital business operations for the entire multisite organization.
This is a single system with software components/modules that work like individual TPS's |
Enterprice Resource Planning
(ERP) *Real-time monitoring of business functions |
|
What is the difference between TPS and ERP
|
TPs are individual systems connected together whereas ERP is a single system
|
|
ERP Advantages: (4)
|
Access to integrated database for better decision making
Eliminates costly legacy systems Improved work processes Improved technology infastructure |
|
ERP disadvantages: (3)
|
Expensive / time consuming
Radical change making it difficult to implement Risk of failure |
|
List the Components of decision making and problem solving in order: (5 + def)
The first three are components of decision making! |
Intelligence- probs/opportunities
Design- possible solutions & feasability Choice- select a solution Implementation- carry out solution Monitoring- decide if changes need to be made |
|
____ decisions find solutions using some rule or procedure: structured.
Easy to program computer to solve |
Programmed Decisions
usually "if" "then" questions |
|
___ Decision is more difficult to quantify; unstructured. Deals with unique or exceptional situation.
|
Non-programmed Decisions
|
|
3 approaches to making decisions:
|
Optimization Model
Satisficing Model Heuristics |
|
___ find the best solution or the organizaiton
Ex. excel solver |
Optimization Model
|
|
___finds a good (not necessarily the best) solution
|
Satisficing Model
|
|
___uses rule of thumb (or commonly accepted guidelines) to make decisions
|
Heuristics
|
|
A ____ is an integrated collection of people, procedures, databases, and devices that provides managers and decision makers with information to help achieve organizational goals.
|
Management Information System
(MIS) |
|
Inputs to an MIS: (3)
|
Data from different databases:
Supply Chain ERP and TPS Database |
|
___ reports: standard, produced periodically, used to monitor status.
|
Scheduled Reports
|
|
___ reports: Summarizes crucial activities for previous day/month, used to take quick, corrective action
|
Key Indicator
|
|
___ reports: Reports developed based on a user's request.
|
Demand
|
|
___ reports: Automatically produced when an unusual event occurs (trigger)
|
Exception
|
|
___ reports: Reports that provide different (deeper) levels of detail
|
Drill Down
|
|
This MIS reporting system puts many kinds of real-time information at managers' fingertips to aid in decision making.
|
Executive Dashboard
|
|
A computer system capable of assembling, storing, manipulating, and displaying geographical information (accoridng to its location)
|
Geographic Information System
(GIS) |
|
Characteristics of a DSS: (4)
|
Perform complex, sophisticated analysis
Tries to answer "what if" questions Handles large amounts of data from various sources rapidly Offers both textual and graphical orientation |
|
In a DSS: This type of analysis starts with a goal and the system will tell you what the data needs to look like to meet that goal.
|
Goal-Seeking Analysis
|
|
___: Replication features of a real system to test the unknown
|
Simulation
|
|
___ ___ DSS - primarily performs qualitative analysis based on the data already in the company's databases.
|
Data-Driven DSS
|
|
___ ___ DSS - primarily performs mathematical or quantitative analysis. (uses some theoretical model to make predictions)
|
Model-Driven DSS
|
|
___ ___ is a user interface that allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases.
|
Dialogue Manager
|
|
___ ___ is part of a DSS that provides decision makers access to a variety of models and assists them in decision making.
|
Model base
|
|
Differences between DSS's and MIS's:(4)
|
A DSS handles unstructured problems
A DSS does not ever replace the decision maker DSS users are more directly involved. A DSS develops the best decision for you based on available rules |
|
A spoecial type of DSS to support group decision making is a ___ ___ ___ ___
|
Group Decision Supoort System
(GDSS) |
|
Characteristics of a GDSS: (7)
|
Special Design
Ease of Use Flexibility Decision-making support Annonymous input Prevents groupthink Automated record keeping |
|
Specialized DSS that includes all hardware, software, data, procedures, and people used to assist senior level executives within the organization.
|
Executive Support System
|
|
Executive Support Systems are used by who and when is it good to use?
|
Tailored for individual executives
Good to use when uncertainty is high Future Oriented |
|
This deals with breaking data into chunks or packets
|
TCP
|
|
This tells the router where each packet should be forwarded
|
IP
|
|
Example of a domain name:
|
Walmart.com
|
|
This computer changes IP addresses to more human friendly names and vice-versa
|
DNS
|
|
Web pages are actually just text pages written in hypertext markup language
|
True
|
|
"http" is the protocol of the www
T or F |
True
|
|
In order to see the graphics, colors, links, etc, on a webpage, you must use a browser application.
|
True
|
|
This web page technology allows you to easily allow others to download your files .
|
FTP
|
|
This web page technology, which looks like a dumb terminal emulation, allows you to log on to another machine and access its files, processing, etc.
|
Telenet
|
|
You can only access this network from inside an org
|
Intranet
|
|
Which of the following is NOT a component of the ecommerce success model:
|
Competition
|
|
In the eCommerce supply chain, forcasting customer demand falls under which subprocess?
|
Demand Planning
|
|
In the eCommerce supply chain, transportation planning falls under which subprocess?
|
Supply Planning
|
|
Which is the largest market of ecommerce interations?
|
B2B
|
|
This refers to getting rid of the middle man between the producer and consumer (therby lowering costs)?
|
Disintermediation
|
|
An electronic exchange is used in which application area?
|
Manufacturing
|
|
Technology enabled relationship management is used in marketing to divide the pool of potential customers into target groups. T or F?
|
FALSE
|
|
Which of the following is NOT an example of eCommerce-specific software?
|
Web Site development tool
|
|
Which is a protocol to encrypt and secure snesitive data?
|
Secure Socket Slayer (SSL)
|
|
Which is Not an example of an effective supply chain management?
|
Increased Inventory
|
|
TPS's deal more with routine data than MIS's. T or F?
|
True
|
|
A database is NOT part of a TPS. T or F?
|
False
|
|
____processing of transactions provides immediate results to the system operator or customer?
|
Online
|
|
Data manipulation is a data processing activity of a TPS. T or F?
|
True
|
|
Finding ways to deal with TPS downtime (which could seriously effect your business) is called
|
Disaster Recovery Planning
|
|
How long does it take for scientists to accuratly give a tornado warning?
|
13 minutes
|
|
Which component of decision making deals with understanding the possible solutions for a problem?
|
Design
|
|
Deciding how to best regulate the internet would best be described as a ___ decision
|
Non programmed
|
|
Deciding what grade each student will get in this class at the end of the semester is an example of a ___ decision
|
Programmed
|
|
These are comminly accepted guidlines or "rules of thumb" used to make decisions?
|
Heuristics
|
|
If I want to find a good enough solution for my problem, I would use a/an ___model
|
Satisficing Model
|
|
As a manager, you recieve a special request from headquarters for a report on the top selling products from the last holiday season?
|
Demand Report
|
|
As a personell director, you want a report generated on a particular employee as soon as he or she is absent 10 times.
|
Exception report
|
|
An MIS output that helps determine when to reorder new inventory is a ____
|
JIT report
|
|
If you are trying to decide if your customers would like to see more variations in your product, you would use a/an ____
|
Marketing Research Report
|
|
A DSS is typically used to make programmed decisions. T or F?
|
False
|
|
A DSS that performs based on theoretical and/or mathmatical analyses
|
Model-Driven DSS
|
|
The process of determining the problem data set for a given result is called:
|
Goal Seeking Analysis
|
|
The part of the DSS that users actually interact with is called the:
|
Dialogue Manager
|
|
Development of DSS's usually do not involve its users. T or F?
|
False
|
|
A(n) ___ is a text file that an internet company can place on a hardisk of a computer system to track usre movements.
|
Cookie
|
|
The "reduction of negative groupe behavior" is characteristic of:
|
GDSS
|
|
The world wide web was developed by____
|
Tim Bernes-Lee
|
|
A(n) ____ is a tool that submits keywords to several serach engines and returns the results from those queried
|
Meta-search engine
|