• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/183

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

183 Cards in this Set

  • Front
  • Back
Electronic Commerence (e-commerce)
commerce, but it is commerce accelerated and enhanced by IT, in particular the Internet
Path-to-Profitability (P2P)
a formal business plan that outiline key business issues such as customer targets (by demopgraphic, industry,, etc.), marketing strategies, operations strategies (ex: production, transportation, and logistics), and projected targets for income-statement and balence-sheet items
Business to Buesiness (B2B) e-commerce
when a business sells producets and services to customers who are primarily other businesses
Ad-supported
derives revenue by selling advertising space, much like the conscep of an affiliate program
Affiliate program
an arrangement made between two e-commerce sites tha directs viewers from one site to the other
Business to Consumer (B2C) e-commerce
when a business sells products and servicesto customers who are primarily individuals
Business to Government (B2G) e-commerce
occurs when a business sells products and services to a government entity
Click-and-motar
refers to those organizations that have a presence in the physical world such as a building you can visits and also a presence in the virtual wordls of the Internet
Click-and-order (Pure Play)
an organization that has a presence in the virtual world but no presence in the physical world
Click-through
a count of the number of people who visit one site. click on an ad, and are taken to the site of the advertiser
Consumer to Business (C2B) e-commerce
when an individual sells products and services to a business
Consumer to Consumer (C2C) e-commerce
When an individual sell products and services to other individuals
Consumer to Government (C2G) e-ecommerce
when an individual sells products and services to a government entity
Conversion rate
the percentage of potential customers who visit your site who actually buy something
Demand aggregation
the combining of purchase request from multiple buyers into a single larer order, which justifies a discount from the business
Digital immigrant
people who were born and raised in a time prior to the digital society in which we now live
Digital native
generation of oepole ushered into this world in the midst of the digital revolution
Digital wallet
both software and information- the software provides security for the transaction and the information includes payment information (ex: the credit card number and expriration date) and delivery information
Direct Materials
materials that are used in production in a manufactuing company or are placed on the shelf for sale in a retail environment
Electronic Bill Presentment and Payment (EBPP)
a system that sends bills (usually to end consumers ) over the Internet and provides an easy-to-use mechanism (sucah as clicking on a button) to pay them if the amount looks correct
Electronic check
a mechanism for sending money from your checking or savings account to antoher person or organization
Electronic commerce (e-commerce)
commerce, but it sis accelerated and enhavnce by IT, in particular the Internet
Electronic data interchange (EDI)
direct computer-to-computer transfer of transaction information contained in starndard business documents, sucha s invoiuces and pruchase orders, in a standard format
Electronic government (e-government)
use of digital technonlogies to transform government operations in order to improve efficiency, effectiveness, and service delivery
Encryption
scrambles the contents of a file so that you can NOT read it without having the right decryption key
Financial cyermediary
Interntet-based company that makes it easy for one person to pay another person or organziation over the internet
Financial EDI (financial electronic data interchange)
an electronic jprocess used primarily within the Business to Business e-commerece model for the payment of purchases
Government to Business (G2B) e-commerce
when a government entity sells products and sercices to businesses
Government to Consumer (G2C) e-commerce
the electronic commerce activities performed between a governement and its citizens or consuemrs including paying taxes, registering vehicles, and providing inforamtion and services
Government to Government (G2G) e-commerce
either (1) the electronic commerence activites performed within a single nation's government or (2) the electonic commerece activites performed between two or more nations' governments including providing foreign aid
Horizontal e-marketplace
an electonic marketplace that connects buyers and sellers across may industries, primarily for MRO materials commerce
Horizontal government integration
electronic intergation or agencies, activities, and processes across a specific level of government
Long Tail
refers to the tail of a sales curve-first offered by Chris Anderson, editor-in-chief of Wired Magazine, as a way of explaining e-commerce profitability
M-Commerce (Wireless e-commerce)
term used to describe electronic commerce conducted over a wireless decice such as a cell phone, PRA, or notebook
Maintenance, Repair, and Operations (MRO) materials (indirect materials)
materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities
Marketing mix
set of marketing tools that your organization will use to pursue its marketing objectives in reaching and attracting potential customers
Mass Customization
ability of an organization to give its customers the opportunity to tailor its product or service to the customer's specifications
Mobile Computing
broad general term describing your ability to use technology to wirelessly connect to and use centrally located information and/or application software
Online Ad (banner ad)
small advertisement that appears on other sites
Path-to-profitability (p2p)
a formal business plan that outlines key business issues such as customer targets (by demographics, industry, etc.), marketing strategies, operations, strategies (eg: production, transportations, and logistics), and projected targets for income-statement and balance-sheet items.
Pop-under ad
a form of a pop-up that you do not see until you close your current browser window.
Pop-up ad
small Web page containing an advertisement that appears on your screen outside the current Web site loaded into your browser
Public key encryption (PKE)
an encryption system that uses two keys; a public key that everyone can have a private key for only the recipient
Push Technology
an environment in which businesses and organizations come to you via technology with information, services, and product offerings based on your profile
Reverse auction
the process in which a buyer posts its interest in buying a certain quantity of items with notations concerning quality, specification, and delivery timing, and sellers compete for the business by submitting successively lower bids until there is only one seller left.
Screenager
the term applied to the current generation of young people because they spend so much time in front of a screen
Secure Electronic Transaction (SET)
a transmission security method that ensures transaction are legitimate as well as secure
Secure Sockets Layer (SSL)
creates a secure and private connections between a Web client computer and a Web server computer, encrypts the information, and ten sends the information over the Internet
Smart Card
a plastic card the size of a credit card that contains an embedded chip on which digital information can be stored and updated
Vertical e-marketplace
an electronic marketplace that connects users an sellers in a given industry (eg: oil and gas, textiles, and retail)
Vertical government integration
electronic integration of agencies, activities, and processes up and down federal, state, and local government levels
Viral marketing
encourages users of a product or service supplied by a B2C e-commerce business to encourage friends to join in as well
Agile Methodology
form of extreme programming that aims for customer satisfaction through early and continuous delivery of useful software components.
Analysis phase
of the system development life cycle involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system
Business requirements
a detailed set of knowledge worker requests that the system must meet to be successful
Component-based development (CBD)
a general approach to systems development that focuses on building small self-contained blocks of code (components) that can be reused across a variety of applications within an organization
Critical success factor (CSF)
a factor simply critical to your organization's success
Design phase
of the systems development life cycle builds a technical blueprint of how the proposed system will work
Development phase
of the systems development life cycle takes all your detailed design documents from the design phase and transforms them into an actual system
Extreme programming (XP) methodology
breaks a project into tiny phases and developers cannot continue on to the next phase until the first phase is complete
Feature Creep
occurs when developers add extra features that were not part of the initial requirements
Help Desk
a group of people who respond to knowledge workers' questions
Implementation phase
of the systems development life cycle distributes the system to all the knowledge workers and they begin using the system to perform their everyday jobs
In sourcing
Using IT specialists within your organization to develop the system
Integration testing
verifies that separate systems can work together
Invisible backlog
the list of all systems that an organization needs to develop but-because of the prioritization of systems development needs- never get funded because of the lack of organizational resources
Joint application development (JAD)
occurs when knowledge workers and IT specialist meet, sometimes for several days, to define and review the business requirements for the system
Maintenance phase
of the systems development life cycle monitors and supports the new system to ensure it continues to meet the business requirements
Near shore outsourcing
contracting an outsourcing arrangement with a company in a nearby country
Offshore outsourcing
contracting with a company that is geographically far away.
Online training
runs over the Internet or off a CD or DVD
Onshore outsourcing
the process of engaging another company in the same country for services
Outsourcing
the delegation of specific work to a third party for a specified length of time, at a specified cost, and at a specified level of service
Parallel implementation
using both the old and new system until you're sure that the new system performs correctly
Phased implementation
implementing the new system in phases (eg: accounts receivables, then accounts payable) until you're sure it works correctly and then implementing the remaining phases of the new system
Pilot implementation
having only a small group of people us the new system until you know it works correctly and then adding the remaining people to the system
Planning phase
of the systems development life cycle, in which you create a solid plan for developing your information system
Plunge implementation
discarding the old system completely and immediately using the new system
Project manager
an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure all key project milestones are completed on time
Project milestone
represents a key date by which you need a certain group of activities performed
Project plan
defines the what, when, and who questions of systems development including all activities to be performed, the individuals, or resources, who will perform the activities, and the tie required to complete each activity.
Project scope document
a written definition of the project scope, usually non longer than a paragraph.
Proof-of- concept prototype
a prototype you use to prove the usually no longer than a paragraph
Prototype
a smaller-scale representation or working model of the user's requirements or a proposed design for an information system
Prototyping
the process of building a model that demonstrates the features of a proposed product, service, or system
Rapid application development (RAD) (rapid prototyping) methodology
emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the system development process
Request for proposal (RFP)
formal document that describes in detail your logical requirements for a proposed system ad invites outsourcing organization (or "vendors") to submit bids for its development
Requirements definition document
defines all the business requirements and prioritizes them in order of business importance
Scope creep
occurs when the scope of the project increases beyond its original intentions
Selfscourcing (end-user development)
the development and support of IT system by end users (knowledge workers) with little or no help form IT specialist
Selling prototype
prototype you use to convince people of the worth of a proposed system
Service level agreement (SLA)
formal contractually obligated agreement between two parties; within different environment, an SLA takes on different meanings
Service level objective (SLO)
supporting document to a service level agreement that clearly defines key metrics fro success regarding the SLA
service level specification (SLS)
same as SLO
Service-oriented architecture (SOA or SoA)
a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code (called services) to meet all the application software needs of an organization
Sign-off
knowledge workers' actually signatures indicating they approve all the business requirements
System development life cycle (SDLC)
a structured step-by-step approach for developing information systems
System testing
verifies that the units or pieces of code written for a system function correctly when integrated into the total system
Technical architecture
defines the hardware, software, and telecommunications equipment required to run the system
Test condition
detailed steps the system must perform along with the expected results of each step
Testing phase
of the systems development life cycle verifies that the system works and meets all the business requirements defined in the analysis phase
Unit testing
test individual units or pieces of code for a system
User acceptance testing (UAT)
determines if the system satisfies the business requirements and enables knowledge workers to perform their jobs correctly
User documentation
highlights how to use the system
Waterfall methodology
a sequential, activity-based process in which one phase in the SDLC is followed by another from planning through implementation
Workshop training
held in a classroom environment and is led by an instructor
1-tier infrastructure
most basic setup because it involves a single tier on a single machine
2-tier infrastructure
basic client/server relationship
3-tier infrastructure
most common approach used for Web applications today
abandon rate
the percentage of callers who hang up while waiting for their call to be answered
abandon registration
number of visitors who start the process of completing a registration page and then abandon the activity.
abandon shopping cart
number of visitors who create a shipping cart and start the process of completing a registration page and then abandon the activity
accuracy
usually measured inversely as error rate, or the number of errors per thousand (or millions) that a system generates
application service provider (ASP)
supplies software applications (and often related services such as maintenance , technical support, and the like) over the Internet that would otherwise reside on its customers' in-house computers.
average speed to answer (ASA)
average time, usually in seconds, that it takes for a call to be answered by an actual person
benchmark
a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance.
benchmarks (other one is benchmarking)
baseline values a system seeks to attain
business continuity plan (BCP)
step-by-step guideline defining how the organization will recover from a disaster or extended disruption of its business processes
call center metric
measure the success of call center efforts
centralized infrastructure
involves sharing of information systems in one central area or one central mainframe
click-through
a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser
client/server infrastructure (client/server network)
network in which one or more computers are servers and provide service tot he other computers, call clients
cold site
separate facility that does not have any computer equipment but is a place where the knowledge workers can more after the disaster
collocation facility
available to a company that rents space and telecommunications equipment from another company
conversion rate
the percentage of potential customers who visit your site who actually buy something.
cost-per-thousand (CPM)
sales dollars generated per dollar of advertising, commonly used to make the case for spending money to appear on a search engine
decentralized infrastructure
involves little or no sharing of information systems
disaster recovery cost curve
charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering form a disaster over time
disaster recovery path
detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood
distributed infrastructure
involves distributing the information and processing power of IT systems via a network
effectiveness
refers to doing the right thing
efficiency
doing something right (ex: in the least time, at the lowest cost, which the fewest errors, etc)
first call resolution (FCR)
the percentage of calls that can be resolved without having to call back
hot site
a separate and fully equipped facility where the company can move immediately after the disaster and resume
infrastructure
relative term meaning " the structure beneath a structure"
Infrastructure-centric metric
typically a measure of the efficiency, speed, and/or capacity of technology
interoperability
capability of two or more computing components to share information and other resources, even if they are made by different manufactures
n-tier infrastructure
balances the work of the network over several different servers
page exposures
average number of page exposures to an individual visitor
requirement recovery document
formal document that describes in detail your logical requirements for a proposed system and invites outsourcing organization (or "vendors") to submit bids for its development
response time
average time to respond to a user-generated event, such as a request for a report, a mouse click, and so on
risk assessment
process of evaluating IT assets, their importance to the organization, an their susceptibility to threats to measure the risk exposure of these assets
Scalability
refers to how well your system can adapt to increased demands
service level agreement (SLA)
a formal contractually obligated agreement between two parties; within different environment, an SLA takes on different meanings
service level objective ( SLO)
supporting document to a service level agreement that clearly defines key metrics for success regarding the SLA
service level specification (SLS)
supporting document to a service level agreement that clearly defines key metrics for success regarding the SLA
Service -oriented architecture (SoA or SOA)
a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code (called services) to meet all the application software needs of an organization
System availability
usually measured inversely as downtown, or the average amount of time a system is down and unavailable to end users and customers
throughput
amount of information that can pass through a system in a given amount of time
Tiered infrastructure (layer infrastructure)
IT system is partitioned into tiers (or layers) where each tier (or layer) performs a specific type of functionality
time service factor (TSF)
percentage of calls answered within a specific time frame, such as 30 or 90 seconds
total hits
number of visits to your Web site, many of which may be by the same visitor
transaction speed
speed at which a system can process a transaction
unique visitors
number of unique visitors to your sites in a given time
web-centric metric
a measure of the success of your Web and e-business initiatives.
Adware
software to generate ads that installs itself on your computer when you download some other (usually free) programs from the Web
Anonymous Web browsing (AWB)
hides your identity from the Web sites you visit
Anti-virus software
detects and removes or quarantines computer viruses
Biometrics
use of physiological characteristics-such as you fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breathe-to provide identification
Clickstream
stored record about your Web surfing sessions, such as which Web sites you visited, how long you were there, what ads you looked at, and what you bought
Computer virus (virus)
software that is written with malicious intent to cause annoyance or damage
Cookie
small record deposited on your hard disk by a Website containing information about you
Copyright
legal protection afforded an expression of an idea, such as a song, video game,and some types of proprietary
Denial-of-service attack (DoS)
floods a server or network with so many request for service that it slows down or crashes
Encryption
scrambles the contents of a file so that you can't read it without having the right decryption key
Ethics
principles and standards that guide our behavior toward other people
Fair Use Doctrine
allows you to use copyrighted material in certain situations
Firewall
software and/or hardware that protects a computer or network form intruders
Hacker
knowledgeable computer user who use his or her knowledge to invade other people's computers
Hardware key logger
hardware device that captures keystrokes on their journey from the keyboard tot he motherboard
Identity theft
forgoing of someone's identity for the purpose of fraud
Intellectual property
intangible creative work that is embodied in physical form
Key logger software (key trapper software)
program that, when installed on a computer, records every keystroke and mouse click
Pharming
rerouting of your request for a legitimate website, that is, you type in the correct address for your bank and are redirected to a fake site that collects information from you.
Phishing (carding or brand spoofing
technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
Pirated software
unauthorized use, duplication, distribution or sale of copyrighted software
Privacy
right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
Public key encryption (PKE)
encryption system that uses to keys; a public key that everyone can have and a private key for only the recipient
Spam
unsolicited e-mail (electronic junk mail) from businesses that advertises good and services
Spyware (sneakware or stealthware)
malicious software that collects information about you and your computer and reports it to someone else without your permission
Trojan horse software
software you do NOT want hidden inside software you do want
Web log
consists of one line of information for every visitor to a website and is usually stored on a web server
Worm
type of virus that replicates and spreads itself, not just from file to file, but form computer to computer via e-mail and other internet traffic