Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
51 Cards in this Set
- Front
- Back
a web site or web app that uses content from omre than one source to create a completely new service
|
mashup
|
|
most efficient programming translation (going from source code to machine code (binary) ) approach
|
Compiling (faster)
|
|
REVIEW THE READINGS FROM THE PACKETS!!!
|
DO IT NOW!
|
|
Interpreting (programming)
|
write once useable multiple places (compiles as it's being read)
|
|
type of testing that examines if the new system will work with the retained elements of the old system
|
Integration Testing
(review different implementation testing methods) |
|
technology used to prevent emails containing sensitive info from leaving an organization
|
Content Filtering
|
|
wiki
|
web based tools that allows users to easily update/swap out content online
|
|
e-business model (review all for final) for which ebay is best known
|
c2c (consumer to consumer)
|
|
Mostly translated computer code made available to users for download
|
bytecode
|
|
a new way of doing things that initially does not meet the needs of current customers
|
disruptive technology
|
|
occurs when a new system is implemented one module at a time
|
Phased Conversion
|
|
How often an individual chooses to back up their files
|
frequency
|
|
the buying and selling of goods and services over the internet
|
ecommerce
|
|
because computers don't speak human and humans don't speak in binary
|
why do we compile/interpret binary code?
|
|
first line of defense against security threats
|
humans/individual users
|
|
phase of the systems dev. lifecycle where the business requirements are determined
|
Analysis
|
|
organizations which cannot adapt to the new demands placed on them for surviving in the info age are doomed to extinction
|
Digital darwinism
|
|
an internet retailer that has no physical store (amazon.com) expedia .com)
|
pure play
|
|
a type of virus that spreads itself not only from file to file but computer to computer
|
Worm
|
|
phase in which detailed user documentation is written
|
implementation
|
|
planning
analysis design dev. testing implrmentation maintaence |
systems development stages (7)
|
|
a set of economic social and tech. trends that collectively form the basis for inoovation and collaboaration
|
web 2.0
|
|
used to translate java applets
|
Java Virtual Machine
|
|
the use of high level math functions to encode data
|
encryption
|
|
situation where not all groups or classes of people have equal opportunity to access the internet
|
Digital Divide
|
|
most costly phase of the systems dev. lifecycle
|
maintenance
|
|
program error manifiest after users begin using an application
|
run-time error or logic error.
|
|
2 types of programming errors
|
run-time
syntax |
|
The most important consideration regarding information systems
|
What is the business?
|
|
purchase of goods and services through a wirelsess internet device
|
mobile ecommerce
|
|
hackers that find hacking code on the internet bc they lack the expertise to hack on their own
|
script kiddie/script bunnie
(review chart with diff. types of hackers) |
|
phase of they system dev lifecycle where screen layouts and db structure are devised
|
design phase
|
|
Content filters, encryption, and firewalls
|
prevention technologies (2nd line of defense)
|
|
knowlege based organizaton assets that cannot be codified but rather exist in peoples heads
|
tacit knowlege
|
|
provides individuals and other companies access to the internet
|
internet provider
|
|
what is a knowledge management system
|
supports the capturing and documentation of an organizations tacit knowledge
|
|
overall process fro dev. info systems from planning and analysis through implementation and maintenance
|
SDLC, system dev. life cycle
|
|
forging someone's id to commit fraud
|
identity theft
|
|
ebusiness model for which amazon.com is most known
|
b2c
business to consumer |
|
best and most exciting major at BYU
|
Isys
|
|
an organizations key strength what it does better than anything else
|
core competency
|
|
changing gov. regulations problems in the current IS, changing business
|
the factors that lead to IS change (change drivers)
|
|
errors associated with the wrting of the code itself
|
syntax error
|
|
a set of methods aimed at improving the ranking on search engines
|
what is search engine optimization
SEO |
|
A virus worm, trojan horse, spywary
|
malicious code (malware)
|
|
type of collaboration that includes document exchange, shard whiteboards, discussion, forums and e-mail
|
unstructured or information collaboration
|
|
phase of the systems dev. team is selected
|
planning
|
|
an intranet that is available to strategic allies
|
extranet
|
|
the most common type of detection and prevention technology
|
anti-virus software
|
|
the process of determing if the costs of a new system are outweighted by the benfits of the system
|
economical feasibility analysis
|
|
software that supports team interaction including calendering, scheduling, and videoconferencing
|
groupware
|