• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/51

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

51 Cards in this Set

  • Front
  • Back
a web site or web app that uses content from omre than one source to create a completely new service
mashup
most efficient programming translation (going from source code to machine code (binary) ) approach
Compiling (faster)
REVIEW THE READINGS FROM THE PACKETS!!!
DO IT NOW!
Interpreting (programming)
write once useable multiple places (compiles as it's being read)
type of testing that examines if the new system will work with the retained elements of the old system
Integration Testing

(review different implementation testing methods)
technology used to prevent emails containing sensitive info from leaving an organization
Content Filtering
wiki
web based tools that allows users to easily update/swap out content online
e-business model (review all for final) for which ebay is best known
c2c (consumer to consumer)
Mostly translated computer code made available to users for download
bytecode
a new way of doing things that initially does not meet the needs of current customers
disruptive technology
occurs when a new system is implemented one module at a time
Phased Conversion
How often an individual chooses to back up their files
frequency
the buying and selling of goods and services over the internet
ecommerce
because computers don't speak human and humans don't speak in binary
why do we compile/interpret binary code?
first line of defense against security threats
humans/individual users
phase of the systems dev. lifecycle where the business requirements are determined
Analysis
organizations which cannot adapt to the new demands placed on them for surviving in the info age are doomed to extinction
Digital darwinism
an internet retailer that has no physical store (amazon.com) expedia .com)
pure play
a type of virus that spreads itself not only from file to file but computer to computer
Worm
phase in which detailed user documentation is written
implementation
planning
analysis
design
dev.
testing
implrmentation
maintaence
systems development stages (7)
a set of economic social and tech. trends that collectively form the basis for inoovation and collaboaration
web 2.0
used to translate java applets
Java Virtual Machine
the use of high level math functions to encode data
encryption
situation where not all groups or classes of people have equal opportunity to access the internet
Digital Divide
most costly phase of the systems dev. lifecycle
maintenance
program error manifiest after users begin using an application
run-time error or logic error.
2 types of programming errors
run-time

syntax
The most important consideration regarding information systems
What is the business?
purchase of goods and services through a wirelsess internet device
mobile ecommerce
hackers that find hacking code on the internet bc they lack the expertise to hack on their own
script kiddie/script bunnie

(review chart with diff. types of hackers)
phase of they system dev lifecycle where screen layouts and db structure are devised
design phase
Content filters, encryption, and firewalls
prevention technologies (2nd line of defense)
knowlege based organizaton assets that cannot be codified but rather exist in peoples heads
tacit knowlege
provides individuals and other companies access to the internet
internet provider
what is a knowledge management system
supports the capturing and documentation of an organizations tacit knowledge
overall process fro dev. info systems from planning and analysis through implementation and maintenance
SDLC, system dev. life cycle
forging someone's id to commit fraud
identity theft
ebusiness model for which amazon.com is most known
b2c

business to consumer
best and most exciting major at BYU
Isys
an organizations key strength what it does better than anything else
core competency
changing gov. regulations problems in the current IS, changing business
the factors that lead to IS change (change drivers)
errors associated with the wrting of the code itself
syntax error
a set of methods aimed at improving the ranking on search engines
what is search engine optimization
SEO
A virus worm, trojan horse, spywary
malicious code (malware)
type of collaboration that includes document exchange, shard whiteboards, discussion, forums and e-mail
unstructured or information collaboration
phase of the systems dev. team is selected
planning
an intranet that is available to strategic allies
extranet
the most common type of detection and prevention technology
anti-virus software
the process of determing if the costs of a new system are outweighted by the benfits of the system
economical feasibility analysis
software that supports team interaction including calendering, scheduling, and videoconferencing
groupware