• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/148

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

148 Cards in this Set

  • Front
  • Back
IEEE 802.3 - aka "___"
"ethernet"
IEEE 802.11 - "___"
Range for b is ___ and ___ for g
Wireless Protocol "WiFi"

802.11b - 300ft
802.11g - 100ft
IEEE 802.15 - "___"

Range?
Bluetooth

Range: 10-30ft
IEEE 802.16 - "___"

Range?
MBPS?
WiMax

Range: 30 miles
70 Mbps
IEEE 802.20 - "___"

Ex.
Mobile Broadband Wireless Access

Google's "G-Phone"
Bluetooth originated because of a king in ___
Denmark
3 Important things to do for WiFi security?
1. Set unique Service Set ID
2. Enable WEP or WPA
3. Use Firewall
___ ___ provides functions for the network like error checking (ex. bounced email) and data security
Communications Software
Treating people through telecommunications
Ex. pacemaker
Telemedicine
___ ___ ___ is a way to communicate data from one company to another and from one application to another in standard format, permitting the recipient to perform a standard business transaction, such as processing purcahse orders.

2 Types?
Electonic Data Interchange
(EDI)

EDI Link (vendor<->customer)
Third party clearinghouse
GPS is a collection of __ satelites owned by the government
24
A collection of interconnected networks, all freely exchanging information.
Internet

*worlds largest computer network*
In 1991 the High Perf Comp and Comm Act was initiated and passed by ___
Al Gore
___ ___ is a communication standard that enables traffic to be routed from one network to another as needed. "post office of the internet"
Internet Protocol (IP)
Breaks data into small chucks (called data packets) and manages packet switching.
or
The widely used Transport-layer protocol hat most internet applications use with IP
Transmission Control Protocol
(TCP)
___ is an assigned address on the internet for each computer.
Uniform Resource Locator
(URL)
Every computer and every router on the internet has a unique ___ ___
IP address

Can be static or dynamic
Domain Names
More human friendly addresses like goog.com or amazon.com
___ ___ ___ changes domain names into IP addresses.
Domain Name Servers (DNS)
The ___ is a network of web servers that stores a particular type of file on the internet, which uses a Client server model.
World Wide Web
Files on the WWW are called ___, and writen in ___
hypertext

HTML - uses tags in the page to format the text
The World Wide Wide was created by ____ in ___
Tim Berners-Lee in 1989
The protocol to call documents on the WWW is ___
HTTP (HyperText Transfer Protocol)
___ is used to log on to another computer to access files: uses terminal emulation
Telnet
___ ___ ___ is a secure connectio between two points on the internet.
Virtual Private Network (VPN)
___ is software that creates a unique hypermedia-based menu on a computer screen, providing graphical interface to the web.
Web Browser
A small program embedded in Web pages
Applet
___ is an object oriented programming language based on C++, which allows small programs to be embedded within an HTML document
Java
A tool that submits keywords to several search engines and returns the results from all search engines quiered.
Meta-Search Engine
___ ___ is the automatic transmission of information over the internet rather than making users search for it with their browsers.
Push Technology
A ___ is a device that can broadcast any TV program coming into your home to a broadband internet-connected PC
Slingbox
___ is an internal corporate network using internet and WWW standards and technologies, that is closed to public network address.
Intranet
___connects selected resources inside of an Intranet with the outside (suppliers, customers, etc)
Extranet
___ is the process by which VPN's transfer information by encapsulating traffic in IP packets over the internet using encryption.
Tunneling
The ____, formerly known as Abilene, is a network that will not be open to the public but will have transfer speeds of ___

ISU joined in __
Internet2

6.2gb/sec

2007
Three Basic componenets of a sucessful E-Commerce Model:
Content - (industry news, economic news, stock prices)

Commerce - Consumers and businesses buying and selling

Community - Message boards/Chate rooms
An ecommerce challenge:

A distribution system that requires cases of goods to be opened on the receiving dock and distributing.
Split-Case Distribution
One major challenge for firms when swithcing from traditional commerce to eCommerce is:
Web-based Order Processing must be linked to traditional back-end systems
Three processes in Supply Chain Management:
Demand Planning - anticipate market demand
Supply Planning - allocate the right amt of resources to meet the demand
Demand Fulfillment - fulfill deman quickly and efficiently
Benefits of the eCommerces supply chain (3)
Increased Revenues and Decreased Costs

Improved Customer Satisfaction

Inventory reduction across the supply chain
__ ___ relies on the use of wireless devices, such as personal digital assistants, cell phones, and smart phones to place orders and conducts business

Issues (3)?
Mobile Commerce (M-commerce)

User-friendliness of the device
Network Speed
Security
___ ___ ___ is a standard set of specifications for internet applications that run on handheld , wireless devices
Wireless Application Protocol (WAP)
A form of ecommerce: direct sales from B to C, uses electronic stroefronts, centers around shopping cart and online catalog
Electronic Retailing (e-tailing)
Groups of stores/products/services on one website is called a ___
Cybermall
An electronic forum where manufactureers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations.
Electronic Exchange
___ ___ is the identification of specific markets to target them with advertising messages.
Market Segmentation
____ is finding and using detailed info about customer's behaviors, preferences, patterns, and uses of online information.
Technology-Enabled Relationship Management
A method of billing whereby a vendor posts and image of your statement on the internet and alerts you by email that you bill has arrived.
Electronic Bill Presentent
Technology Infrastructure from top to bottom: (4)
eCommerce Software
Server Software
Server Operating System
Web Server Hardware
At the top of the tech infrastructure is Ecommerce Software which controls:
Catalog management
Shopping cart
Product configuration (dell.com)
Automates transaction processes
Web traffic data analysis
The server software cotnrols:
Security, identification, web site tracking, website development tools, webpage construction software
The web server hardware controls:
storage capacity, volume of ecommerce transactions, website hosting
___ ___: data embedded in website or email to verify identity or sender.
Digital Certificate
___ ___: Independent 3rd party organization that issues digital certificates.
Certificate Authority
___ ___ ___: Protocol to encrypt and protect against theft (looks like a key or lock in bottom right )
Secure Sockets Layer (SSL)
___ ___: Computerized cash

Ex. Paypal
Electronic Cash
___ __: Hold credit card, eCash, owner ID, and address info
Electronic Wallets
Strategies a company can use to be sucessful at eCommerce: (4)
Develop an effective web presence
Put up a Website
Build traffic to website (using meta tags - html tag that is not visible but contains key words or phrases)
Maintain and improve your website
___is the data gathered based on the web sites you visit and the items you click.
Clickstream data
___ ___ systems handle routine business operations and maintain those records
Transaction Processing Systems
Waht does a TPS do? (5)
Process data about transactions
Maintain data accuracy and integrity
Avoid fraudulent transactions
Produce timely reports
Increase labor efficiency
TPS competitive advantages:(6)
Customer Loyalty
Superior Service to Cust.
Better relationshp w/ supplier
Superior Info gathering
Costs reductions
Reduced Inventory
___ processing inputs and proceesses data in groups

Typical activities that would use this?
Batch Processing

Payroll transactions and billing
___ ___ processing :transactions are completed as they occur

Typical activities that would use this?
Online Transaction Procressing
(OLTP)

Fedex tracking shipments
TPS data processing activities:

Data ___: capturing and gathering all data necessary to complete the processing of transactions
Data Collection
TPS data processing activities:

Data ___: The process of checking data for validity and completeness.
Data Editing
TPS data processing activities:

Data ___: The process of reentering data that was not typed or scanned properly.
Data Correction
TPS data processing activities:

Data ___: The process of performing calculations and other data transformations related to business transactions.
Data Manipulation
TPS data processing activities:

Data ___: The process of updating one or more databases with new transactions.
Data Storage
TPS data processing activities:

Document ____: The process of generating output records and reports.
Document Production
__ ___ __ is a formal plan describing the actions that must be taken to restore computer operations and services in the event of a disaster.
Disaster Recovery Plan (DRP)
Characteristics of TPS's: (5)
Very connected to eachother
Bad data in, bad data out
Generate different reports
Important to audit and control
Many ways to access
Itegrated set of programs that manage a company's vital business operations for the entire multisite organization.
This is a single system with software components/modules that work like individual TPS's
Enterprice Resource Planning
(ERP)

*Real-time monitoring of business functions
What is the difference between TPS and ERP
TPs are individual systems connected together whereas ERP is a single system
ERP Advantages: (4)
Access to integrated database for better decision making
Eliminates costly legacy systems
Improved work processes
Improved technology infastructure
ERP disadvantages: (3)
Expensive / time consuming
Radical change making it difficult to implement
Risk of failure
List the Components of decision making and problem solving in order: (5 + def)

The first three are components of decision making!
Intelligence- probs/opportunities

Design- possible solutions & feasability

Choice- select a solution

Implementation- carry out solution

Monitoring- decide if changes need to be made
____ decisions find solutions using some rule or procedure: structured.
Easy to program computer to solve
Programmed Decisions

usually "if" "then" questions
___ Decision is more difficult to quantify; unstructured. Deals with unique or exceptional situation.
Non-programmed Decisions
3 approaches to making decisions:
Optimization Model
Satisficing Model
Heuristics
___ find the best solution or the organizaiton

Ex. excel solver
Optimization Model
___finds a good (not necessarily the best) solution
Satisficing Model
___uses rule of thumb (or commonly accepted guidelines) to make decisions
Heuristics
A ____ is an integrated collection of people, procedures, databases, and devices that provides managers and decision makers with information to help achieve organizational goals.
Management Information System
(MIS)
Inputs to an MIS: (3)
Data from different databases:
Supply Chain
ERP and TPS
Database
___ reports: standard, produced periodically, used to monitor status.
Scheduled Reports
___ reports: Summarizes crucial activities for previous day/month, used to take quick, corrective action
Key Indicator
___ reports: Reports developed based on a user's request.
Demand
___ reports: Automatically produced when an unusual event occurs (trigger)
Exception
___ reports: Reports that provide different (deeper) levels of detail
Drill Down
This MIS reporting system puts many kinds of real-time information at managers' fingertips to aid in decision making.
Executive Dashboard
A computer system capable of assembling, storing, manipulating, and displaying geographical information (accoridng to its location)
Geographic Information System
(GIS)
Characteristics of a DSS: (4)
Perform complex, sophisticated analysis

Tries to answer "what if" questions

Handles large amounts of data from various sources rapidly

Offers both textual and graphical orientation
In a DSS: This type of analysis starts with a goal and the system will tell you what the data needs to look like to meet that goal.
Goal-Seeking Analysis
___: Replication features of a real system to test the unknown
Simulation
___ ___ DSS - primarily performs qualitative analysis based on the data already in the company's databases.
Data-Driven DSS
___ ___ DSS - primarily performs mathematical or quantitative analysis. (uses some theoretical model to make predictions)
Model-Driven DSS
___ ___ is a user interface that allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases.
Dialogue Manager
___ ___ is part of a DSS that provides decision makers access to a variety of models and assists them in decision making.
Model base
Differences between DSS's and MIS's:(4)
A DSS handles unstructured problems
A DSS does not ever replace the decision maker
DSS users are more directly involved.
A DSS develops the best decision for you based on available rules
A spoecial type of DSS to support group decision making is a ___ ___ ___ ___
Group Decision Supoort System
(GDSS)
Characteristics of a GDSS: (7)
Special Design
Ease of Use
Flexibility
Decision-making support
Annonymous input
Prevents groupthink
Automated record keeping
Specialized DSS that includes all hardware, software, data, procedures, and people used to assist senior level executives within the organization.
Executive Support System
Executive Support Systems are used by who and when is it good to use?
Tailored for individual executives

Good to use when uncertainty is high
Future Oriented
This deals with breaking data into chunks or packets
TCP
This tells the router where each packet should be forwarded
IP
Example of a domain name:
Walmart.com
This computer changes IP addresses to more human friendly names and vice-versa
DNS
Web pages are actually just text pages written in hypertext markup language
True
"http" is the protocol of the www
T or F
True
In order to see the graphics, colors, links, etc, on a webpage, you must use a browser application.
True
This web page technology allows you to easily allow others to download your files .
FTP
This web page technology, which looks like a dumb terminal emulation, allows you to log on to another machine and access its files, processing, etc.
Telenet
You can only access this network from inside an org
Intranet
Which of the following is NOT a component of the ecommerce success model:
Competition
In the eCommerce supply chain, forcasting customer demand falls under which subprocess?
Demand Planning
In the eCommerce supply chain, transportation planning falls under which subprocess?
Supply Planning
Which is the largest market of ecommerce interations?
B2B
This refers to getting rid of the middle man between the producer and consumer (therby lowering costs)?
Disintermediation
An electronic exchange is used in which application area?
Manufacturing
Technology enabled relationship management is used in marketing to divide the pool of potential customers into target groups. T or F?
FALSE
Which of the following is NOT an example of eCommerce-specific software?
Web Site development tool
Which is a protocol to encrypt and secure snesitive data?
Secure Socket Slayer (SSL)
Which is Not an example of an effective supply chain management?
Increased Inventory
TPS's deal more with routine data than MIS's. T or F?
True
A database is NOT part of a TPS. T or F?
False
____processing of transactions provides immediate results to the system operator or customer?
Online
Data manipulation is a data processing activity of a TPS. T or F?
True
Finding ways to deal with TPS downtime (which could seriously effect your business) is called
Disaster Recovery Planning
How long does it take for scientists to accuratly give a tornado warning?
13 minutes
Which component of decision making deals with understanding the possible solutions for a problem?
Design
Deciding how to best regulate the internet would best be described as a ___ decision
Non programmed
Deciding what grade each student will get in this class at the end of the semester is an example of a ___ decision
Programmed
These are comminly accepted guidlines or "rules of thumb" used to make decisions?
Heuristics
If I want to find a good enough solution for my problem, I would use a/an ___model
Satisficing Model
As a manager, you recieve a special request from headquarters for a report on the top selling products from the last holiday season?
Demand Report
As a personell director, you want a report generated on a particular employee as soon as he or she is absent 10 times.
Exception report
An MIS output that helps determine when to reorder new inventory is a ____
JIT report
If you are trying to decide if your customers would like to see more variations in your product, you would use a/an ____
Marketing Research Report
A DSS is typically used to make programmed decisions. T or F?
False
A DSS that performs based on theoretical and/or mathmatical analyses
Model-Driven DSS
The process of determining the problem data set for a given result is called:
Goal Seeking Analysis
The part of the DSS that users actually interact with is called the:
Dialogue Manager
Development of DSS's usually do not involve its users. T or F?
False
A(n) ___ is a text file that an internet company can place on a hardisk of a computer system to track usre movements.
Cookie
The "reduction of negative groupe behavior" is characteristic of:
GDSS
The world wide web was developed by____
Tim Bernes-Lee
A(n) ____ is a tool that submits keywords to several serach engines and returns the results from those queried
Meta-search engine