Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
143 Cards in this Set
- Front
- Back
Network
|
a collection of computers that communicate with one another over transmission lines
|
|
Local Area Network (LAN)
|
connects computers that reside in a single geographic location on the premises of the company that operates this network; number of connected computers can range from two to several hundred
|
|
Wide Area Network (WAN)
|
connects computers at different geographic locations; the computers in two separate company site must be connected using this network
|
|
internet
|
a network of networks; connects networks
|
|
"the Internet"
|
the collection of networks used when sending an e-mail or accessing a website
|
|
Protocol
|
a set of rules that two communicating devices follow; both devices must use the same set of rules
|
|
Switch
|
a special-purpose computer that receives and transmits messages on the LAN
|
|
Network Interface Card (NIC)
|
connects the device's circuity to the cable; works with programs in each device to implement the protocols necessary for communication
|
|
Onboard NIC
|
an NIC built into the computer
|
|
MAC (Media Access Control) Address
|
each NIC's unique identifier
|
|
Unshielded Twisted Pair (UTP) Cable
|
the computers printers, switches, and other devices on the LAn are connected using one of two media- this is one; most connections are made using this cable; RJ-45 connector= ethernet, used to connect the UTP cable into NIC devices on the LAN
|
|
Optical Fiber Cables
|
the connections between switches can use UTP cable but if they carry a lot of traffic or are far apart this may replace UTP cable; the signals on such cables are light rays; they are reflected inside the glass core of the optical fiber cable; the core is surrounded by a cladding to contain the light signals, the cladding is wrapped with an outer layer to protect it; this type of cable uses special connectors called ST and SC connectors
|
|
Access Point (AP)
|
A point in a wireless network that facilitates communication among wireless devices and serves as a point of interconnection between wireless and wired networks. The AP must be able to process messages according to both the 802.3 and 802.11 standards, because it sends and receives wireless traffic using the 802.11 protocol and communicates with wired networks using the 802.3 protocol. 120
|
|
Internet Service Provider (ISP)
|
An ISP provides users with Internet access. An ISP provides a user with a legitimate Internet address; it serves as the user's gateway to the Internet; and it passes communications back and forth between the user and the Internet. ISPs also pay for the Internet. They collect money from their customers and pay access fees and other charges on the users' behalf. 122
|
|
Analog
|
A wavy signal. A modem converts the computer’s digital data into these signals that can be transmitted over dial-up Internet connections. 122
|
|
Modem
|
Short for modulator/demodulator, this converts the computer's digital data into signals that can be transmitted over telephone or cable lines. 122
|
|
Dial-Up Modem
|
performs the conversion between analog and digital in such a way that the signal can be carried on a regular telephone line; when two devices connected by modems use different speeds the slower speed is the one at which they operate
|
|
Point-to-Point Protocol (PPP)
|
the way in which messages are packaged and handled between your modem and the ISP is governed by a protocol
|
|
Digital Subscriber Line (DSL) Modem
|
A type of modem. DSL modems operate on the same lines as voice telephones and dial-up modems, but they operate so that their signals do not interfere with voice telephone service. DSL modems provide much faster data transmission speeds than dial-up modems. Additionally, DSL modems always maintain a connection, so there is no need to dial in; the Internet connection is available immediately. 123
|
|
Asymmetric Digital Subscriber Lines (DSL)
|
DSL lines that have different upload and download speeds. 123
most homes and small businesses use this; download> upload |
|
Symmetrical Digital Subscriber Lines (SDSL)
|
DSL lines that have the same upload and download speeds. 123
typically used by larger businesses; download= upload |
|
Cable Modem
|
A type of modem that provides high-speed data transmission using cable television lines. The cable company installs a fast, high-capacity optical fiber cable to a distribution center in each neighborhood that it serves. At the distribution center, the optical fiber cable connects to regular cable-television cables that run to subscribers’ homes or businesses. Cable modems modulate in such a way that their signals do not interfere with TV signals. Like DSL lines, they are always on. 124
|
|
Narrowband
|
Internet communication lines that have transmission speeds of 56 kbps or less. A dial-up modem provides access. 124
|
|
Broadband
|
Internet communication lines that have speeds in excess of 256 kbps. DSL and cable modems provide broadband access. 124
|
|
Network of Leased Lines
|
A WAN connection alternative. Communication lines are leased from telecommunications companies and connected into a network. The lines connect geographically distant sites. 124
|
|
Access Devices
|
Devices, typically special-purpose computers, that connect network sites. The particular device required depends on the line used and other factors. Sometimes switches and routers are employed, but other types of equipment are needed as well. 124
|
|
Router
|
a special-purpose computer that moves network traffic from one node on a network to another
|
|
Public Switched Data Network (PSDN)
|
WAN alternative; a network of computers and leased lines that is developed and maintained by a vendor that leases time on the network to other organizations; a utility that supplies a network for other companies to lease
|
|
Point of Presence (POP)
|
when using a PSDN, each site must lease a line to connect to the PSDN network; this is the location at which this occurs; this is the access point into the PSDN
|
|
Encryption
|
the process of transforming clear text into coded, unintelligible text for secure storage or communication; can only be used for short messages
|
|
Encryption Algorithms
|
used to transform clear text into coded, unintelligible text for secure storage or communication. Commonly used methods are DES, 3DES, and AES. 128
|
|
Key
|
A number used to encrypt data. The encryption algorithm applies the key to the original message to produce the coded message. Decoding (decrypting) a message is similar; a key is applied to the coded message to recover the original text.
|
|
Symmetric Encryption
|
the same key is used to encode and to decode; simpler and much faster
|
|
Asymmetric Encryption
|
different keys used; one key encodes the message, and the other key decodes the message
|
|
Public Key/ Private Key
|
a special version of asymmetric encryption; popular on the internet; with this method, each site has a public key for encoding messages and a private key for decoding them; the private keys are never communicated
|
|
HTTPS
|
An indication that a Web browser is using the SSL/TLS (Secure Socket Layer or Transport Layer Security: data are encrypted using this protocol) protocol to ensure secure communications. 128; using this strategy, the bulk of the secure communication occurs using the faster symmetric encryption; use of SSL/ TLS makes it safe to send sensitive data; be certain that browser reads as https//: and not just http://
|
|
Firewall
|
A computing device located between a firm’s internal and external networks that prevents unauthorized access to or from the internal network. A firewall can be a special-purpose computer or it can be a program on a general-purpose computer or on a router. 129
|
|
Access Control List (ACL)
|
encodes the rules stating which addresses are to be allowed and which are to be prohibited
|
|
Virtual Private Network (VPN)
|
the fourth WAN alternative;A WAN connection alternative that uses the Internet or a private internet to create the appearance of private point-to-point connections. In the IT world, the term virtual means something that appears to exist that does not exist in fact. Here, a VPN uses the public Internet to create the appearance of a private connection. 130
|
|
Tunnel
|
A virtual, private pathway over a public or shared network from the VPN client to the VPN server. 130
|
|
Protocol
|
a standardized means for coordinating an activity between two or more entities
|
|
Communications Protocol
|
a means for coordinating an activity between two or more communicating computers
|
|
Transmission Control Program/ Internet Protocol (TCP/IP) Architecture
|
five-layered blend of the two architectures, used by the internet
|
|
Architecture
|
an arrangement of protocol layers in which each layer is given specific tasks to accomplish
|
|
Protocol
|
at each layer of architecture, there are one more of these sets of rules; each is a set of rules that accomplishes the tasks assigned to its layer
|
|
Program
|
a specific computer product that implements a protocol
|
|
MAC Address/ Physical Address
|
permanent address given to each network interface card (NIC) at the factory. This address enables the device to access the network via a Level 2 protocol. By agreement among computer manufacturers, these are assigned in such a way that no two NIC devices will ever have the same one.
|
|
IP Addresses/ Logical Addresses
|
A series of dotted decimals in a format like 192.168.2.28 that identifies a unique device on a network or internet.
|
|
Internet Corporation for Assigned Names and Numbers (ICANN)
|
The non-profit organization responsible for managing the assignment of public IP addresses and domain names for use on the Internet; makes sure that there are not multiple URLs
|
|
Dynamic Host Configuration Protocol (DHCP)
|
distributes temporary IP address to computers
|
|
Domain Name System (DNS)
|
the purpose is to convert user-friendly names into their IP addresses
|
|
Domain Name
|
any registered, valid name; the process of changing a name into its IP address is called resolving the domain name
|
|
Top-Level Domain (TLD)
|
the last letters in any domain name
|
|
Uniform Resource Locator (URL)
|
a document's address on the web
|
|
Domain Name Resolution
|
the process of converting a domain name into a public IP address
|
|
Domain Name Resolvers
|
Computers that facilitate domain name resolution by storing the correspondence of domain names and IP addresses.
|
|
Calculation Systems
|
the very first information systems. The goal of such systems was to relieve workers of tedious, repetitive calculations. These systems were labor-saving devices that produced little information.
|
|
Functional Systems
|
sometimes called "islands of automation,"The second era of information systems. The goal of such systems was to facilitate the work of a single department or function. Over time, in each functional area, companies added features and functions to encompass more activities and to provide more value and assistance.
|
|
Integrated, Cross-Functional Systems
|
also called cross-departmental or process-based; the third era of computing systems. In this era, systems are designed not to facilitate the work of a single department or function, but rather to integrate the activities of a complete business process.
|
|
Push Production Planning
|
the organization creates a production plan or schedule and "pushes" goods through manufacturing and sales
|
|
Pull Production Planning
|
the organizations manufacturing responds to customer demand
|
|
Radio-Frequency Identification Tags (RFIDs)
|
a computer chip that transmits data about the container, product, or equipment to which it is attached
|
|
Sarbanes-Oxley Act
|
Law passed by the U.S. Congress in 2002 that governs the reporting requirements of publicly held companies. Among other things, it strengthened requirements for internal controls and management’s responsibility for accurate financial reporting.
|
|
Contingent Liability
|
possible liability; for example, Failure to adequately secure a company’s data
|
|
Customer Relationship Management (CRM) System
|
An information system that maintains data about customers and all their interactions with the organization; support the business processes of attracting, selling, managing, delivering, and supporting customers; systems integrate all of the primary business activities, track all interactions with the customer from prospect through follow-up service and support
|
|
Enterprise Resource Planning (ERP) Systems
|
The integration of all of the organization's principal processes; most users are manufacturing companies. Supports all of the primary business processes as well as the human resource and accounting support processes; integrates sales, order, inventory, manufacturing, and customer service activities.
|
|
Business Process Design
|
The creation of new, usually crossdepartmental business practices during information systems development; organizations do not create new information systems to automate existing business practices. Rather, they use technology to enable new, more efficient business processes.
|
|
Inherent Processes
|
The procedures that must be followed to effectively use licensed software. For example, the processes inherent in MRP systems assume that certain users will take specified actions in a particular order; For example, when an organization acquires a business application from Oracle or SAP, the processes for using the software are built-in.
|
|
Customer Life Cycle
|
Four phases: marketing, customer acquisition, relationship management, and loss/churn
|
|
Process Blueprint
|
ERP's formal approach that is based on documented, tested business models.
|
|
Enterprise Application Integration (EAI)
|
The integration of existing systems by providing layers of software that connect applications and their data together.
|
|
E-commerce
|
the buying and selling of goods and services over the web; ex: buying a weather service subscription that is paid and received over the Internet
|
|
Supply Chain Management (SCM)
|
systems that integrate the primary in-bound logistics business activity; applications have features and functions to source, order, and settle
|
|
Interorganizational Transaction Processing
|
systems that process routine transactions among two or more organizations
|
|
Thin-client e-commerce
|
the client needs only a browser to participate
|
|
Thick-client e-commerce
|
the client requires that software in addition to a browser to participate
|
|
Drop Shipping
|
"you" request the vendor to ship the item directly to your customer
|
|
Virtual Organizations
|
An organization that exists by means of electronic networks and service agreements, but that does not exist in a three-dimensional, bricks-and-mortar form
|
|
Merchant Companies
|
companies that take title to the goods they sell; buy goods and resell them
|
|
Nonmerchant Companies
|
companies that arrange for the purchase and sale of goods without ever owning or taking title to those goods
|
|
Web storefront
|
in e-commerce, a Web-based application that enables customers to enter and manage their orders.
|
|
E-commerce auctions
|
match buyers and sellers by using an e-commerce version of a standard auction
|
|
Clearinghouses
|
provide goods and services at a stated price and they arrange for the delivery of the goods without ever taking title in the goods
|
|
Electrionic Exchanges
|
example of clearinghouse businesses; match buyers and sellers; the business process is similar to that of a stock exchange
|
|
Disintermediation
|
the elimination of middle layers in the supply chain
|
|
Price Elasticity
|
A measure of the sensitivity in demand to changes in price.
|
|
Commerce Server
|
a computer that operates Web-based programs that display products, support online ordering, record and process payments, and interface with inventory-management applications
|
|
Simple Mail Transport Protocol (SMTP)
|
USED FOR E-MAIL; A Layer-5 architecture used to send email.
|
|
File Transfer Protocol (ftp)
|
USED TO EXCHANGE FILES;A Layer-5 protocol used to copy files from one computer to another.
|
|
Hypertext Transfer Protocol (HTTP)
|
A Layer-5 protocol used to process Web pages.
|
|
Hypertext Markup Language (HTML)
|
A language that defines the structure and layout of Web page content.
|
|
Web farm
|
a facility that runs multiple Web servers; work is distributed among the computers so as to minimize customer delays
|
|
Petabytes
|
10^15 bytes; roughly the amount of all printed material ever written
|
|
Exabytes
|
2.5=2500 petabytes
|
|
Business Intelligence (BI) System
|
A system that provides the right information, to the right user, at the right time. A tool produces the information, but the system ensures that the right information is delivered to the right user at the right time. 199
|
|
Reporting Systems
|
A system that creates information from disparate data sources and delivers that information to the proper users on a timely basis.
|
|
Data-mining Systems
|
The application of statistical techniques to find patterns and relationships among data and to classify and predict.
|
|
Market-Basket Analysis
|
A data-mining technique for determining sales patterns. A market-basket analysis shows the products that customers tend to buy together.
|
|
Knowledge-Management Systems
|
n information system for storing and retrieving organizational knowledge, whether that knowledge is in the form of data, documents, or employee know-how.
|
|
Expert Systems
|
Knowledge-sharing systems that are created by interviewing experts in a given business domain and codifying the rules used by those experts
|
|
Dirty Data
|
Problematic data. Examples are a value of B for customer gender and a value of 213 for customer age. Other examples are a value of 999-999-9999 for a U.S. phone number, a part color of green, and an email address of WhyMe@GuessWhoIAM-Hah-Hah.org. All these values are problematic when data mining
|
|
Granularity
|
The level of detail in data. Customer name and account balance is large granularity data. Customer name, balance, and the order details and payment history of every customer order is smaller granularity.
|
|
Clickstream Data
|
E-commerce data that describes a customer’s clicking behavior. Such data includes everything the customer does at the Web site.
|
|
Curse of Dimensionality
|
The more attributes there are, the easier it is to build a data model that fits the sample data but that is worthless as a predictor.
|
|
Data Warehouse
|
Facilities that prepare, store, and manage data specifically for reporting and data mining.
|
|
Data Mart
|
Facilities that prepare, store, and manage data for reporting and data mining for specific business functions. 204
|
|
Data Mining
|
The application of statistical techniques to find patterns and relationships among data and to classify and predict. 205
|
|
Unsupervised Data Mining
|
A form of data mining whereby the analysts do not create a model or hypothesis before running the analysis. Instead, they apply the data-mining technique to the data and observe the results. With this method, analysts create hypotheses after the analysis to explain the patterns found. 206
|
|
Cluster Analysis
|
An unsupervised data-mining technique whereby statistical techniques are used to identify groups of entities that have similar characteristics. A common use for cluster analysis is to find groups of similar customers in data about customer orders and customer demographics. 206
|
|
Supervised Data Mining
|
A form of data mining in which data miners develop a model prior to the analysis and apply statistical techniques to data to estimate values of the parameters of the model. 206
|
|
Regression Analysis
|
analysis which measures the impact of a set of variables on another variable
|
|
Neural Networks
|
A popular supervised data-mining technique used to predict values and make classifications such as "good prospect" or "poor prospect." 207
|
|
Database Marketing
|
The application of data business intelligence systems to the planning and execution of marketing programs. 483
|
|
RFM analysis
|
A way of analyzing and ranking customers according to the recency, frequency, and monetary value of their purchases. 484
|
|
R score
|
customers who have ordered most recently
|
|
F score
|
customers who have ordered most frequently
|
|
M score
|
customers who have ordered the most expensive items
|
|
cross-selling
|
The sale of related products; salespeople try to get customers who buy product X to also buy product Y. 485
|
|
support
|
In market-basket terminology, the probability that two items will be purchased together. 485
|
|
confidence
|
In market-basket terminology, the probability estimate that two items will be purchased together. 486
|
|
lift
|
In market-basket terminology, the ratio of confidence to the base probability of buying an item. Lift shows how much the base probability changes when other products are purchased. If the lift is greater than 1, the change is positive; if it is less than 1, the change is negative. 486
|
|
decision tree
|
A hierarchical arrangement of criteria for classifying customers, items, and other business objects. 486
|
|
Reporting System
|
A system that creates information from disparate data sources and delivers that information to the proper users on a timely basis. 199, 493
|
|
Static Reports
|
Reports that are prepared once from the underlying data, and they do not change. A report of the past year's sales, for example, is a static report. 495
|
|
Report Type
|
In reporting systems, the categorization of reports into either static or dynamic. 495
|
|
Dynamic
|
Report that is generated at the time of request; the reporting system reads the most current data and generates the report using that fresh data. A report on sales today and a report on current stock prices are both dynamic reports. 495
|
|
Query Reports
|
prepared in response to data entered by users
|
|
Report Media
|
In reporting systems, the channels by which reports are delivered, such as in paper form or electronically. 496
|
|
Digital Dashboard
|
An electronic display that is customized for a particular user. 496
|
|
Alerts
|
A form of report, often requested by recipients, that tells them some piece of usually time-related information, such as notification of the time for a meeting. 496
|
|
Report Mode
|
In reporting systems, the categorization of reports into either push reports or pull reports. 497
|
|
Online analytical processing (OLAP)
|
A dynamic type of reporting system that provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. Such reports are dynamic because users can change the format of the reports while viewing them. 499
|
|
measure
|
The data item of interest on an OLAP report. It is the item that is to be summed, averaged, or otherwise processed in the OLAP cube. Total sales, average sales, and average cost are examples of measures. 499
|
|
dimension
|
A characteristic of an OLAP measure. Purchase date, customer type, customer location, and sales region are examples of dimensions. 4
|
|
OLAP cube
|
A presentation of an OLAP measure with associated dimensions. The reason for this term is that some products show these displays using three axes, like a cube in geometry. Same as OLAP report. 501
|
|
drill down
|
With an OLAP report, to further divide the data into more detail. 501
|
|
OLAP servers
|
Computer servers running software that performs OLAP analyses. An OLAP server reads data from an operational database, performs preliminary calculations, and stores the results of those calculations in an OLAP database. 501
|
|
dimensional databases
|
databases that are structured to support OLAP processing
|
|
Supply Chain
|
A network of organizations and facilities that transforms raw materials into products delivered to customers. 463
|
|
Supply Chain Profitability
|
The difference between the sum of the revenue generated by the supply chain and the sum of the costs that all organizations in the supply chain incur to obtain that revenue. 466
|
|
Bullwhip Effect
|
Phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier. 466
|
|
Supplier relationship management (SRM)
|
A business process for managing all contacts between an organization and its suppliers. 468
|
|
Speed
|
The dollar-value rate at which goods are exchanged in a given period of time within a supply chain. 469
|