• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/158

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

158 Cards in this Set

  • Front
  • Back
Acceptance
An expression of willingness to take an offer, including all of its stated terms
Authority to bind
The ability of an individual to commit his or her company to a contract
Consideration
The bargained for exchange of something valuable, such as money, property, or future services
Contract
An agreement between two or more legal entities that provides for an exchange of value between or among them
Copy control
An electronic mechanism for providing a fixed upper limit to the number of copies that one can make of a digital work
Copyright
A legal protection of intellectual property
Cybersquatting
the practice of registering a domain name that is a trademark of another person or company in hopes that the trademark owner will pay large amounts for the domain rights
Defamation
statement that is false and injures the reputation of a person or company
Disparagement
Statement that is false and injures the reputation of a product or service
Fair use
The approved limited use of copyright material when certain conditions are met
Implied contract
An agreement between two or more parties to act as if a contract exists, even if no contract has been written and signed.
Income tax
Taxes that are levied by national, state, and local governments on the net income generated by business activities
Intellectual property
A general term that includes all products of the human mind, including tangible and intangible products
Jurisdiction
A government’s ability to exert control over a person or corporation
Patent
An exlusive right to make, use, and sell aninvention granted by the government to the inventor
Opt-in/out
personal information collection polict in which the company collecting the information does not use the information for any other purpose unless the customer specifically allows
Service mark
A distinctive mark, device, motto, or implement used to identify serices provided by a company
Terms of service
Rules and regulations intended to limit the Web site owner’s liability for what a visitor might do with information obtained from the site
Transaction tax
Sales taxes, use taxes, excise taxes and customs duties that are levied on the products or services that a company sells or uses
Use tax
tax levied by a state on property in that state that was not purchased in that state
Active Server pages (ASP)
Applications that are embedded transparently in web pages that cause action to occur
Benchmarking
Testing that compares hardware and software performances
Black list spam filter
Software that looks for From addresses in incoming messages that are known to be spammers.
Blade server
A server configuration in which small server computers are each installed on a single computer board and then many of those board are installed into a rack-mounted frame
Centralized architecture
A server structure that uses a few very large and fast computers
Challenge-response
A content-filtering security technique that requires a known sender to reply to a challenge presented in an email
Database server
The server computer on which database management software runs
Dead link
web link that when clicked displays an error message instead of a web page
Decentralized architecture
A server structure that uses a large number of less-powerful computers and divides the workload among them
Distributed architecture
Synonymous with decentralized architecture
Dynamic content
No static information constructed in response to a web client’s request
Java Server Pages
A server side scripting program developed by Sun Microsystems
Link checker
A site management tool that examines each page on the site and reports any URLs that are broken
Load balancing
network hardware that monitors the workloads of servers attached to it assigns incoming web traffic to the server that has the most available capacity at that instant in time
Log file
A collection of data that shows information about web site visitors’ access habits
N-tier architecture
Higher-order client-server architectures that have more than three tiers
Open-source
Software that is developed by a community of programmers who make the software available for download and use at no cost
Orphan file
file on a web site that is not linked to any page
PHP
PreProcessing Hypertext Protocol
Ping
a program that tests the connectivity between computers connected to the Internet
Remote server administration
Control of a Web site by an administrator from any internet-connected computer
Response time
the amount of time a server requires to process one request
Reverse link checker
web site management program that checks on sites with which a company has entered a link exchange program to ensure partners are fulfilling the agreement
Server farm
large collection of e-commerce web site servers
Spam
Electronic junk mail
Static page
a web page that displays unchanging information retrieved from a disk
Telnet
A program that allows users to log on to a computer and access its contents from a remote location
Throughput
the number of HTTP requests that a particular hardware and software combination can process in a unit of time
Tracert
route-tracing program that sends data packets to every computer on the path between one computer and another computer and clocks the packets’ roundtrip times, providing an indication of the time it takes a message to travel from one computer to another and back, pinpointing any data traffic congestion, and ensuring that the remote computer is online
Virtual host
Multiple servers that exist on a single computer
White list spam filter
Software that looks for From addresses in incoming messages that are known to be good addresses
Application integration
The coordination of all of a company’s existing systems to each other and to the company’s Web site
Application Service Providers (ASP)
Web-based site that provides management of applications such as spreadsheets, human resources management, or email to companies for a fee
Business logic
Rules of a particular business
Co-location
An internet service arrangement in which the service providers rents a physical space to the client to install its own server hardware
Commerce Service Providers (CSP)
Web host service that also provides commerce hosting services on its computer
Content management software/system
Software used by companies to control the large amounts of text, graphics, and media files used in business
Customer Relationship Management (CRM)
Synonymous with technology-enabled relationship management, it is the obtaining and use of detailed customer information
Data mining
A technique that examines stored information and looks for patterns in the data that are not yet known or suspected. Also called analytical processing.
Dedicated hosting
web hosting option in which the hosting company provides exclusive use of a specified server computer that is owned and administered by the hosting company
Dynamic catalog
A web page whose content is shaped by a program in response to a user
Enterprise Application Integration (EAI)
the coordination of all of a company’s existing systems to each other and to the company’s Web site
Enterprise Resource Planning (ERP)
Business software that integrates all facets of a business, including planning, manufacturing, sales and marketing
Interoperability
The coordination of a company’s information systems so that they all work together
Knowledge Management
The intentional collection, classification, and dissemination of information about a company, its products, and its processes
Middleware
Software that handles connections between electronic commerce software and accounting systems
Scalable
A system’s ability to be adapted to meet changing requirements
Self-hosting
A system of Web hosting in which the online business owns and maintains the server and all its software
Shared hosting
A web hosting arrangement in which the hosting company provides Web space on a server computer that also hosts other Web sites
Simple Object Access Protocol (SOAP)
A standardized protocol used by a mail server to format and administer e-mail
Static catalog
A simple list of products written in HTML and displayed on a Web page or a series of web pages
Supply Chain Management (SCM) software
Software used by companies to coordinate planning and operations and their partners in the industry supply chains of which they are members
Transaction processing
Processes that occur as part of completing a sale; these include the calculation of discounts, taxes, or shipping costs and transmission of payment data
Web services
A combination of software tools that let application software in one organization communicate with other applications over a network using the SOAP, UDDI, and WSDL protocol
Active content
Programs that are embedded transparently in Web pages that causes action to occur
ActiveX
An object, or control, that contains programs and properties that are put in Web pages to perform particular
Applet
A program that executes within another program; it cannot execute directly on a computer
Certification Authority (CA)
A company that issues digital certificates to organizations or individuals
Computer forensics
The field responsible for the collection, preservation, and analysis of computer-related evidence to be used in legal proceedings
Countermeasure
A physical or logical procedure that recognizes, reduces, or eliminates a threat
Cryptography
The science that studies encryption, which is the hiding of messages so that only the sender and receivers can read them
Cybervandalism
The electronic defacing of an existing web page
Decrypt
Information that has been decoded; the opposite of encrypted
Digital certificate (digital ID)
An attachment to an email message or data embedded in a web page that verifies the identity of a sender or a Web site
Digital Signature
An encryption message digest
Domain Name Server
A computer on the Internet that maintains directories that link domain names to IP addresses
Eavesdropper
A person or device who is able to listen in on and copy Internet transmissions
Encryption
The coding of information using a mathematical-based program and secret key; it makes messages illegible to casual observers or those without the decoding key
Firewall
computer that provides defense between one network ant another network that could pose a threat to the inside network, all traffic must go through the firewall, only authorized traffic is allowed to pass. Also describes software
First-party cookies
a cookie that is placed on the client computer by the web server site
Hash
the process used to calculate a number from a message
Integrity
The category of computer security that addresses the validity of data; confirmation that data has not been modified
Intrusion detection system
A part of a firewall that monitors attempts to log in to servers and analyzes those attempts for patterns that might indicate a cracker’s attack is underway
Java sandbox
a web browser security feature that limits the actions that can be performed by a java applet that has been downloaded from the web
JavaScript
scripting language developed by Netscape to enable Web page designers to build active content
Masquerading (spoofing)
Pretending to be someone you are not or representing a web site as an original when it is an imposter
Persistent cookie
A cookie that exists indefinitely
Phishing
masquerading attack that combines spam with spoofing.
Plug-ins
application that helps a browser to display information
Pretty Good Privacy (PGP)
A popular technology used to implement public key encryption to protect the privacy of e-mail messages
Private key
encoding of a message using a single numeric key to encode and decode data, it requires both the sender and receiver of the message to know the key, which must be guarded from public disclosure
Public key
The encoding of messages using two mathematically related but distinct numeric keys
Scripting language
programming language that provides scripts, or commands that are executed
Secure Sockets Layer (SSL)
A protocol for transmitting private information securely over the internet
Security policy
a written statement describing assets to be protected, the reasons for protecting the assets, the parties responsible for protection, and acceptable and unacceptable behaviors
Session cookie
a cookie that exists only until you shut down your browser
Sniffer program
a program that taps into the Internet and records information that passes through a router from the data’s source to its destination
Stateless connection
A connection between a client and server over the internet in which each transmission of information is independent; no continuous connection is maintained
Third-party cookies
a cookie that originates on a web site other than the site being visited
Trusted/untrusted network
network within a firewall/network outside a firewall
Warchalking
Practice of placing a chalk mark on a building that has an easily entered wireless network
Wardrivers
network attackers who drive around in cars using their wireless-equipped laptop computers to search for unprotected wireless network access points
Zombie
Program that secretly takes over another computer for the purpose of launching attacks on other computers. Zombie attacks can be difficult to trace to their perpetrators.
Automated Clearing House (ACH)
One of the several systems set up by banks or government agencies, such as the US Federal Reserve Board, that process high volumes of low dollar amount electronic fund transfers
Charge card
A payment card with no preset spending limit. The entire amount charged to the card must be paid in full each month
Chargeback
The process in which a merchant bank retrieves the money it placed in a merchant account as a result of a cardholder successfully contesting a charge
Check 21
US law that permits banks to replace the physical movement of checks with transmission of scanned images
Client-side electronic wallet
An electronic wallet that stores a consumers’ information on the consumer’s own computer
Closed loop system
payment card arrangement involving a consumer, a merchant, and a payment card company (such as AmEx or Discover) that processes transactions between the consumer and merchant without involving banks
Credit card & association
member-run organizations that issue credit cards to individual consumers, also called customer issuing banks
Debit card
payment card that removes the amount of the charge form the cardholder’s bank account and transfers it to the seller’s bank account
Double spending
The spending of the same unit of electronic cash twice by submitting the same electronic currency to two different vendors
Electronic cash
A form of electronic payment that is anonymous and can only be spent once
Electronic wallet (e-wallet)
A software utility that holds credit card information, owner identification and address information, and provides this data automatically at electronic commerce sites; electronic wallets can also store electronic cash
Identity theft
A criminal act in which the perpetrator gathers personal information about a victim then uses it to obtain credit in the victim’s name
Merchant account
an account that a merchant must hold with a bank that allows the merchant to process payment card transactions
Micropayments
internet payments for items costing very little-usually $1 or less
Money laundering
a technique used by criminals to convert money that they have obtained illegally into cash that they can spend without having it identified as proceeds of an illegal activity
Open loop system
payment card arrangement involving a customer and his or her bank, a merchant and its bank, and a third party (Visa or MC) that processes transactions between the customer and merchant
Payment card
general term for plastic cards used instead of cash to make purchases
Pharming attack
the use of a zombie farm, often by an organized crime association, to launch a massive phishing attack
Server-side electronic wallet
An electronic wallet that stores a customer’s information on a remote server that belongs to a particular merchant or to the wallet’s publisher
Smart card
plastic card with an embedded microchip that contains information about the card-owner
Stored-value card
either an elaborate smart card or a simple plastic card with a magnetic strip that revords currency balance, such as a prepaid phone, copy, subway, or bus card
24/7
The operation of a site or service 24 hours a day 7 days a week
Applications specialist
The member of an electronic commerce team who is responsible for maintenance of software that performs a specific function, such as catalog, payment processing, accounting, human resources, and logistics software
Call center
A company that customer handles telephone calls and emails for other companies
Capital investment
a major outlay of funds by a company to purchase fixed assets such as property, a factory or equipment
Capital project
synonymous with capital investment
Change management
the process of helping employees cope with changes in the workplace
Component outsourcing
synonymous with partial outsourcing; the outsourcing of the design, development, implementation, or operation of specific portions of an electronic commerce system
Content creator/editor/manager
person who writes purchases and adapts material for a Web site
Database administration
the person or team that is responsible for defining the data elements in an organization’s database design and the operation of its database management software
Downstream strategies
Tactics that improve the value that a business provides to its customers
Early outsourcing
The hiring of an external company to do initial ecommerce site design and development. The external team then trains the original company’s information systems professionals in the new technology, eventually handing over complete responsibility of the site to the internal team
Fast venturing
The joining of an existing company that wants to launch an ecommerce initiative with external equity partners and operational partners who provide experience and skills needed to develop and scale up the project very rapidly
Incubator
A company that offers start-up businesses a physical location with offices accounting and legal assistance, computers, and Internet connections at a very low monthly cost
Late outsourcing
the hiring of an external company to maintain an ecommerce site that has been designed and developed by an internal information systems team
Metrics
Measurements that companies use to assess the value of site visitor activity
Network operations
staff whose responsibilities include load estimation and monitoring, resolving network problems as they arise, designing and implementing fault-resistance technologies, and managing any network operations that are outsourced to ISPs, CSPs, or telephone companies
Opportunity costs
lost benefits from an action not taken
Outsourcing
The hiring of another company to perform design, implementation, or operational tasks for an information systems project
Partial outsourcing
the outsourcing of the design, development, implementation, or operation of specific portions of an ecommerce system
Post-audit review
A formal review of a project after it is up and running
Project management
formal techniques for planning and controlling activities undertaken to achieve a specific goal
Return on Investment (ROI)
method for evaluating the potential costs and benefits of a proposed capital investment
Total Cost of Ownership (TCO)
Business activity costs including the costs of hiring training, and paying the personnel who will design the web site, write or customize the software, create the content and operate and maintain the site. TCO also includes hardware and software costs
Upstream strategies
Tactics that focus on reducing costs or generating value by working with suppliers or inbound logistics