• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/143

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

143 Cards in this Set

  • Front
  • Back
Network
a collection of computers that communicate with one another over transmission lines
Local Area Network (LAN)
connects computers that reside in a single geographic location on the premises of the company that operates this network; number of connected computers can range from two to several hundred
Wide Area Network (WAN)
connects computers at different geographic locations; the computers in two separate company site must be connected using this network
internet
a network of networks; connects networks
"the Internet"
the collection of networks used when sending an e-mail or accessing a website
Protocol
a set of rules that two communicating devices follow; both devices must use the same set of rules
Switch
a special-purpose computer that receives and transmits messages on the LAN
Network Interface Card (NIC)
connects the device's circuity to the cable; works with programs in each device to implement the protocols necessary for communication
Onboard NIC
an NIC built into the computer
MAC (Media Access Control) Address
each NIC's unique identifier
Unshielded Twisted Pair (UTP) Cable
the computers printers, switches, and other devices on the LAn are connected using one of two media- this is one; most connections are made using this cable; RJ-45 connector= ethernet, used to connect the UTP cable into NIC devices on the LAN
Optical Fiber Cables
the connections between switches can use UTP cable but if they carry a lot of traffic or are far apart this may replace UTP cable; the signals on such cables are light rays; they are reflected inside the glass core of the optical fiber cable; the core is surrounded by a cladding to contain the light signals, the cladding is wrapped with an outer layer to protect it; this type of cable uses special connectors called ST and SC connectors
Access Point (AP)
A point in a wireless network that facilitates communication among wireless devices and serves as a point of interconnection between wireless and wired networks. The AP must be able to process messages according to both the 802.3 and 802.11 standards, because it sends and receives wireless traffic using the 802.11 protocol and communicates with wired networks using the 802.3 protocol. 120
Internet Service Provider (ISP)
An ISP provides users with Internet access. An ISP provides a user with a legitimate Internet address; it serves as the user's gateway to the Internet; and it passes communications back and forth between the user and the Internet. ISPs also pay for the Internet. They collect money from their customers and pay access fees and other charges on the users' behalf. 122
Analog
A wavy signal. A modem converts the computer’s digital data into these signals that can be transmitted over dial-up Internet connections. 122
Modem
Short for modulator/demodulator, this converts the computer's digital data into signals that can be transmitted over telephone or cable lines. 122
Dial-Up Modem
performs the conversion between analog and digital in such a way that the signal can be carried on a regular telephone line; when two devices connected by modems use different speeds the slower speed is the one at which they operate
Point-to-Point Protocol (PPP)
the way in which messages are packaged and handled between your modem and the ISP is governed by a protocol
Digital Subscriber Line (DSL) Modem
A type of modem. DSL modems operate on the same lines as voice telephones and dial-up modems, but they operate so that their signals do not interfere with voice telephone service. DSL modems provide much faster data transmission speeds than dial-up modems. Additionally, DSL modems always maintain a connection, so there is no need to dial in; the Internet connection is available immediately. 123
Asymmetric Digital Subscriber Lines (DSL)
DSL lines that have different upload and download speeds. 123
most homes and small businesses use this; download> upload
Symmetrical Digital Subscriber Lines (SDSL)
DSL lines that have the same upload and download speeds. 123
typically used by larger businesses; download= upload
Cable Modem
A type of modem that provides high-speed data transmission using cable television lines. The cable company installs a fast, high-capacity optical fiber cable to a distribution center in each neighborhood that it serves. At the distribution center, the optical fiber cable connects to regular cable-television cables that run to subscribers’ homes or businesses. Cable modems modulate in such a way that their signals do not interfere with TV signals. Like DSL lines, they are always on. 124
Narrowband
Internet communication lines that have transmission speeds of 56 kbps or less. A dial-up modem provides access. 124
Broadband
Internet communication lines that have speeds in excess of 256 kbps. DSL and cable modems provide broadband access. 124
Network of Leased Lines
A WAN connection alternative. Communication lines are leased from telecommunications companies and connected into a network. The lines connect geographically distant sites. 124
Access Devices
Devices, typically special-purpose computers, that connect network sites. The particular device required depends on the line used and other factors. Sometimes switches and routers are employed, but other types of equipment are needed as well. 124
Router
a special-purpose computer that moves network traffic from one node on a network to another
Public Switched Data Network (PSDN)
WAN alternative; a network of computers and leased lines that is developed and maintained by a vendor that leases time on the network to other organizations; a utility that supplies a network for other companies to lease
Point of Presence (POP)
when using a PSDN, each site must lease a line to connect to the PSDN network; this is the location at which this occurs; this is the access point into the PSDN
Encryption
the process of transforming clear text into coded, unintelligible text for secure storage or communication; can only be used for short messages
Encryption Algorithms
used to transform clear text into coded, unintelligible text for secure storage or communication. Commonly used methods are DES, 3DES, and AES. 128
Key
A number used to encrypt data. The encryption algorithm applies the key to the original message to produce the coded message. Decoding (decrypting) a message is similar; a key is applied to the coded message to recover the original text.
Symmetric Encryption
the same key is used to encode and to decode; simpler and much faster
Asymmetric Encryption
different keys used; one key encodes the message, and the other key decodes the message
Public Key/ Private Key
a special version of asymmetric encryption; popular on the internet; with this method, each site has a public key for encoding messages and a private key for decoding them; the private keys are never communicated
HTTPS
An indication that a Web browser is using the SSL/TLS (Secure Socket Layer or Transport Layer Security: data are encrypted using this protocol) protocol to ensure secure communications. 128; using this strategy, the bulk of the secure communication occurs using the faster symmetric encryption; use of SSL/ TLS makes it safe to send sensitive data; be certain that browser reads as https//: and not just http://
Firewall
A computing device located between a firm’s internal and external networks that prevents unauthorized access to or from the internal network. A firewall can be a special-purpose computer or it can be a program on a general-purpose computer or on a router. 129
Access Control List (ACL)
encodes the rules stating which addresses are to be allowed and which are to be prohibited
Virtual Private Network (VPN)
the fourth WAN alternative;A WAN connection alternative that uses the Internet or a private internet to create the appearance of private point-to-point connections. In the IT world, the term virtual means something that appears to exist that does not exist in fact. Here, a VPN uses the public Internet to create the appearance of a private connection. 130
Tunnel
A virtual, private pathway over a public or shared network from the VPN client to the VPN server. 130
Protocol
a standardized means for coordinating an activity between two or more entities
Communications Protocol
a means for coordinating an activity between two or more communicating computers
Transmission Control Program/ Internet Protocol (TCP/IP) Architecture
five-layered blend of the two architectures, used by the internet
Architecture
an arrangement of protocol layers in which each layer is given specific tasks to accomplish
Protocol
at each layer of architecture, there are one more of these sets of rules; each is a set of rules that accomplishes the tasks assigned to its layer
Program
a specific computer product that implements a protocol
MAC Address/ Physical Address
permanent address given to each network interface card (NIC) at the factory. This address enables the device to access the network via a Level 2 protocol. By agreement among computer manufacturers, these are assigned in such a way that no two NIC devices will ever have the same one.
IP Addresses/ Logical Addresses
A series of dotted decimals in a format like 192.168.2.28 that identifies a unique device on a network or internet.
Internet Corporation for Assigned Names and Numbers (ICANN)
The non-profit organization responsible for managing the assignment of public IP addresses and domain names for use on the Internet; makes sure that there are not multiple URLs
Dynamic Host Configuration Protocol (DHCP)
distributes temporary IP address to computers
Domain Name System (DNS)
the purpose is to convert user-friendly names into their IP addresses
Domain Name
any registered, valid name; the process of changing a name into its IP address is called resolving the domain name
Top-Level Domain (TLD)
the last letters in any domain name
Uniform Resource Locator (URL)
a document's address on the web
Domain Name Resolution
the process of converting a domain name into a public IP address
Domain Name Resolvers
Computers that facilitate domain name resolution by storing the correspondence of domain names and IP addresses.
Calculation Systems
the very first information systems. The goal of such systems was to relieve workers of tedious, repetitive calculations. These systems were labor-saving devices that produced little information.
Functional Systems
sometimes called "islands of automation,"The second era of information systems. The goal of such systems was to facilitate the work of a single department or function. Over time, in each functional area, companies added features and functions to encompass more activities and to provide more value and assistance.
Integrated, Cross-Functional Systems
also called cross-departmental or process-based; the third era of computing systems. In this era, systems are designed not to facilitate the work of a single department or function, but rather to integrate the activities of a complete business process.
Push Production Planning
the organization creates a production plan or schedule and "pushes" goods through manufacturing and sales
Pull Production Planning
the organizations manufacturing responds to customer demand
Radio-Frequency Identification Tags (RFIDs)
a computer chip that transmits data about the container, product, or equipment to which it is attached
Sarbanes-Oxley Act
Law passed by the U.S. Congress in 2002 that governs the reporting requirements of publicly held companies. Among other things, it strengthened requirements for internal controls and management’s responsibility for accurate financial reporting.
Contingent Liability
possible liability; for example, Failure to adequately secure a company’s data
Customer Relationship Management (CRM) System
An information system that maintains data about customers and all their interactions with the organization; support the business processes of attracting, selling, managing, delivering, and supporting customers; systems integrate all of the primary business activities, track all interactions with the customer from prospect through follow-up service and support
Enterprise Resource Planning (ERP) Systems
The integration of all of the organization's principal processes; most users are manufacturing companies. Supports all of the primary business processes as well as the human resource and accounting support processes; integrates sales, order, inventory, manufacturing, and customer service activities.
Business Process Design
The creation of new, usually crossdepartmental business practices during information systems development; organizations do not create new information systems to automate existing business practices. Rather, they use technology to enable new, more efficient business processes.
Inherent Processes
The procedures that must be followed to effectively use licensed software. For example, the processes inherent in MRP systems assume that certain users will take specified actions in a particular order; For example, when an organization acquires a business application from Oracle or SAP, the processes for using the software are built-in.
Customer Life Cycle
Four phases: marketing, customer acquisition, relationship management, and loss/churn
Process Blueprint
ERP's formal approach that is based on documented, tested business models.
Enterprise Application Integration (EAI)
The integration of existing systems by providing layers of software that connect applications and their data together.
E-commerce
the buying and selling of goods and services over the web; ex: buying a weather service subscription that is paid and received over the Internet
Supply Chain Management (SCM)
systems that integrate the primary in-bound logistics business activity; applications have features and functions to source, order, and settle
Interorganizational Transaction Processing
systems that process routine transactions among two or more organizations
Thin-client e-commerce
the client needs only a browser to participate
Thick-client e-commerce
the client requires that software in addition to a browser to participate
Drop Shipping
"you" request the vendor to ship the item directly to your customer
Virtual Organizations
An organization that exists by means of electronic networks and service agreements, but that does not exist in a three-dimensional, bricks-and-mortar form
Merchant Companies
companies that take title to the goods they sell; buy goods and resell them
Nonmerchant Companies
companies that arrange for the purchase and sale of goods without ever owning or taking title to those goods
Web storefront
in e-commerce, a Web-based application that enables customers to enter and manage their orders.
E-commerce auctions
match buyers and sellers by using an e-commerce version of a standard auction
Clearinghouses
provide goods and services at a stated price and they arrange for the delivery of the goods without ever taking title in the goods
Electrionic Exchanges
example of clearinghouse businesses; match buyers and sellers; the business process is similar to that of a stock exchange
Disintermediation
the elimination of middle layers in the supply chain
Price Elasticity
A measure of the sensitivity in demand to changes in price.
Commerce Server
a computer that operates Web-based programs that display products, support online ordering, record and process payments, and interface with inventory-management applications
Simple Mail Transport Protocol (SMTP)
USED FOR E-MAIL; A Layer-5 architecture used to send email.
File Transfer Protocol (ftp)
USED TO EXCHANGE FILES;A Layer-5 protocol used to copy files from one computer to another.
Hypertext Transfer Protocol (HTTP)
A Layer-5 protocol used to process Web pages.
Hypertext Markup Language (HTML)
A language that defines the structure and layout of Web page content.
Web farm
a facility that runs multiple Web servers; work is distributed among the computers so as to minimize customer delays
Petabytes
10^15 bytes; roughly the amount of all printed material ever written
Exabytes
2.5=2500 petabytes
Business Intelligence (BI) System
A system that provides the right information, to the right user, at the right time. A tool produces the information, but the system ensures that the right information is delivered to the right user at the right time. 199
Reporting Systems
A system that creates information from disparate data sources and delivers that information to the proper users on a timely basis.
Data-mining Systems
The application of statistical techniques to find patterns and relationships among data and to classify and predict.
Market-Basket Analysis
A data-mining technique for determining sales patterns. A market-basket analysis shows the products that customers tend to buy together.
Knowledge-Management Systems
n information system for storing and retrieving organizational knowledge, whether that knowledge is in the form of data, documents, or employee know-how.
Expert Systems
Knowledge-sharing systems that are created by interviewing experts in a given business domain and codifying the rules used by those experts
Dirty Data
Problematic data. Examples are a value of B for customer gender and a value of 213 for customer age. Other examples are a value of 999-999-9999 for a U.S. phone number, a part color of green, and an email address of WhyMe@GuessWhoIAM-Hah-Hah.org. All these values are problematic when data mining
Granularity
The level of detail in data. Customer name and account balance is large granularity data. Customer name, balance, and the order details and payment history of every customer order is smaller granularity.
Clickstream Data
E-commerce data that describes a customer’s clicking behavior. Such data includes everything the customer does at the Web site.
Curse of Dimensionality
The more attributes there are, the easier it is to build a data model that fits the sample data but that is worthless as a predictor.
Data Warehouse
Facilities that prepare, store, and manage data specifically for reporting and data mining.
Data Mart
Facilities that prepare, store, and manage data for reporting and data mining for specific business functions. 204
Data Mining
The application of statistical techniques to find patterns and relationships among data and to classify and predict. 205
Unsupervised Data Mining
A form of data mining whereby the analysts do not create a model or hypothesis before running the analysis. Instead, they apply the data-mining technique to the data and observe the results. With this method, analysts create hypotheses after the analysis to explain the patterns found. 206
Cluster Analysis
An unsupervised data-mining technique whereby statistical techniques are used to identify groups of entities that have similar characteristics. A common use for cluster analysis is to find groups of similar customers in data about customer orders and customer demographics. 206
Supervised Data Mining
A form of data mining in which data miners develop a model prior to the analysis and apply statistical techniques to data to estimate values of the parameters of the model. 206
Regression Analysis
analysis which measures the impact of a set of variables on another variable
Neural Networks
A popular supervised data-mining technique used to predict values and make classifications such as "good prospect" or "poor prospect." 207
Database Marketing
The application of data business intelligence systems to the planning and execution of marketing programs. 483
RFM analysis
A way of analyzing and ranking customers according to the recency, frequency, and monetary value of their purchases. 484
R score
customers who have ordered most recently
F score
customers who have ordered most frequently
M score
customers who have ordered the most expensive items
cross-selling
The sale of related products; salespeople try to get customers who buy product X to also buy product Y. 485
support
In market-basket terminology, the probability that two items will be purchased together. 485
confidence
In market-basket terminology, the probability estimate that two items will be purchased together. 486
lift
In market-basket terminology, the ratio of confidence to the base probability of buying an item. Lift shows how much the base probability changes when other products are purchased. If the lift is greater than 1, the change is positive; if it is less than 1, the change is negative. 486
decision tree
A hierarchical arrangement of criteria for classifying customers, items, and other business objects. 486
Reporting System
A system that creates information from disparate data sources and delivers that information to the proper users on a timely basis. 199, 493
Static Reports
Reports that are prepared once from the underlying data, and they do not change. A report of the past year's sales, for example, is a static report. 495
Report Type
In reporting systems, the categorization of reports into either static or dynamic. 495
Dynamic
Report that is generated at the time of request; the reporting system reads the most current data and generates the report using that fresh data. A report on sales today and a report on current stock prices are both dynamic reports. 495
Query Reports
prepared in response to data entered by users
Report Media
In reporting systems, the channels by which reports are delivered, such as in paper form or electronically. 496
Digital Dashboard
An electronic display that is customized for a particular user. 496
Alerts
A form of report, often requested by recipients, that tells them some piece of usually time-related information, such as notification of the time for a meeting. 496
Report Mode
In reporting systems, the categorization of reports into either push reports or pull reports. 497
Online analytical processing (OLAP)
A dynamic type of reporting system that provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. Such reports are dynamic because users can change the format of the reports while viewing them. 499
measure
The data item of interest on an OLAP report. It is the item that is to be summed, averaged, or otherwise processed in the OLAP cube. Total sales, average sales, and average cost are examples of measures. 499
dimension
A characteristic of an OLAP measure. Purchase date, customer type, customer location, and sales region are examples of dimensions. 4
OLAP cube
A presentation of an OLAP measure with associated dimensions. The reason for this term is that some products show these displays using three axes, like a cube in geometry. Same as OLAP report. 501
drill down
With an OLAP report, to further divide the data into more detail. 501
OLAP servers
Computer servers running software that performs OLAP analyses. An OLAP server reads data from an operational database, performs preliminary calculations, and stores the results of those calculations in an OLAP database. 501
dimensional databases
databases that are structured to support OLAP processing
Supply Chain
A network of organizations and facilities that transforms raw materials into products delivered to customers. 463
Supply Chain Profitability
The difference between the sum of the revenue generated by the supply chain and the sum of the costs that all organizations in the supply chain incur to obtain that revenue. 466
Bullwhip Effect
Phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier. 466
Supplier relationship management (SRM)
A business process for managing all contacts between an organization and its suppliers. 468
Speed
The dollar-value rate at which goods are exchanged in a given period of time within a supply chain. 469