• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/33

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

33 Cards in this Set

  • Front
  • Back
Business intelligence
The process of gathering the information as well as the information itself
server farms
Massive clusters of computers
grid computing
Refers to combining the computing power of many smaller computers to obtain more power without using a costly supercomputer
open source
stability and low cost. Open source software can be improved upon, fully licensed software cannot be. Open source: cheap
data mining
A process companies use to sort and analyze information to better understand their customers, products, markets, or any other phase of their business for which data has been captured
data warehouse
Integration of multiple large databases into one
tacit knowledge
reflect the processes that are located within a persons mind on how to effectively perform a particular task
TCP/IP
Transmission control protocol/Internet protocol. TCP breaks
o TCP: breaks info into small chunks called packets and manages to transfer of the packets from computer to computer
o IP: defines how a data packet must be formed and to where a router must forward each packet
repeater
a network device used to regenerate or replicate a signal as it weakens when traveling on a network; also moves data from one media segment to another and effectively extends the size of a network
smart label
bar code that represents a number, that represents something else. E.g: UPS uses smart labels for tracking
router
an intelligent device used to connect two or more individual networks
MoDem
a modem is a device that enables a computer to transmit data over telephone lines
coaxial
network cable containing inner copper conductor, most commonly used for cable TV installations and for networks operating at 10 Mbps
Infrared line of site
uses high frequency light waves to transmit data on an unobstructed path between nodes-computers or some other device such as printers-on a network, at a distance up to 24.4 meters
TCP
breaks info into small chunks called packets and manages to transfer of the packets from computer to computer
B2B
Business to business
• Wal-mart buys from distributors
Disintermediation
the phenomenon of cutting out the “middleman” in transactions and reaching customers more directly and efficiently
Physical storefront
Brick and mortar
extranet
in order to communicate proprietary information with authorized users outside organizational boundaries, a company can impliment an extranet. An extranet enables two or more firms to use the internet to do business together
Brand (VQ)
Red Oxx management felt that a website is an excellent lever for communicating an organization's' ___brand__.
E-Integration
Providing customers with ability to gain personalized info by querying corporate databases and other info sources
The long tail
Refers to the focus on niche markets, rather than purely on mainstream products
Intrinsic
E.G.: quality of tote bag, and the strength and comfort of the strap
60 % (VQ)
amount of home networks that are unsecured
threat to infrastructure system security
oAccidents and natural disasters
oEmployees and consultants
oLinks to outside business contacts
oOutsiders
Denial of Service
Attacked by unauthorized users, often zombie computers that makes a network resource, e.g: website unavailable to users or poor service
viruses
destructive program
worms
Destructive computer code that is designed to copy and send itself throughout networked computers
phishing
Attempts to trick financial account and credit card holders into giving away personal information
Firewall
system designed to detect intrusion and prevent unauthorized access
VPN (virtual private networks)
o Connection constructed dynamically within an existing network
oSecure tunnel
• Encrypted information
Public Key
Assymetric key system, each individual has a pair of keys
correct answers:
Different Key
Risk Embracement