Term
|
Definition
| a method for confirming users’ identities- 3 levels of security : (1) what they know, (2) something they have, or (3) biometrics |
|
|
Term
|
Definition
| -the process of giving someone permission to do or have something. |
|
|
Term
|
Definition
| the amount of times that a user chooses to back up their files or website media. |
|
|
Term
|
Definition
| - the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting. |
|
|
Term
|
Definition
| occurs when organizations use software that filters content to prevent the transmission of unauthorized information |
|
|
Term
|
Definition
| floods a site with so many requests for service that it slows down or crashes the site |
|
|
Term
|
Definition
| scrambles information into an alternative form that requires a key or password to decrypt the information |
|
|
Term
|
Definition
| hardware and/or software that guards a private network by analyzing the information leaving and entering the network (between server and internet) |
|
|
Term
|
Definition
| hackers that lack expertise to hack on their own so they find it on the internet |
|
|
Term
|
Definition
| attack computer systems by transmitting a virus hoax with a real virus attached, people more readily send them along and thus it affects more people |
|
|
Term
|
Definition
| -a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
|
Definition
| legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident. |
|
|
Term
| Intrusion detection software |
|
Definition
| searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm |
|
|
Term
|
Definition
| a virus, worm, trojan horse, or spyware |
|
|
Term
|
Definition
| consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network |
|
|
Term
|
Definition
| a technique to gain personal information for the purpose of identity theft |
|
|
Term
|
Definition
| content filters, encryption, firewalls |
|
|
Term
|
Definition
| antivirus software(The most effective) |
|
|
Term
|
Definition
| a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing |
|
|
Term
|
Definition
| a program or device that can monitor data traveling over a network, shows all the data being transmitted including passwords and sensitive information |
|
|
Term
|
Definition
| using ones social skills to trick people into revealing access credentials or other information valuable to the attacker, also includes dumpster diving and going through trash |
|
|
Term
|
Definition
| forging of the return address on an email so that the email message appears to come from someone other than the actual sender, easier way to get people to open attached viruses |
|
|
Term
|
Definition
| software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses the CPU and storage for some task the user knows nothing about |
|
|
Term
|
Definition
| - small electronic devices that change user passwords automatically |
|
|
Term
|
Definition
| hides inside other software, usually as an attachment (that is downloaded) or a downloadable file |
|
|
Term
|
Definition
| software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
| - A type of virus that spreads itself not only from file to file, but also from computer to computer. *can come from email attachments |
|
|
Term
|
Definition
| - grammatically incorrect code |
|
|
Term
| SDLC (Systems Development Life Cycle) |
|
Definition
| Planning, Analysis, Design, Development, Testing, Implementation, and Maintenance |
|
|
Term
|
Definition
involves establishing a high-level plan of the intended project and determining project goals. Steps include: 1.Identify and select the system for development (choose waterfall, RAD, extreme programming, agile, etc) work is not done here, it is only selected 2.Assess project feasibility 3.Develop the project plan 4. Recruit project members |
|
|
Term
|
Definition
1.Identify and select the system for development (choose waterfall, RAD, extreme programming, agile, etc) work is not done here, it is only selected 2.Assess project feasibility 3.Develop the project plan 4. Recruit project members |
|
|
Term
|
Definition
involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system Primary analysis activities include: 1.Gather business requirements 2.Create process diagrams 3.Perform a buy vs. build analysis |
|
|
Term
|
Definition
1.Gather business requirements 2.Create process diagrams 3.Perform a buy vs. build analysis |
|
|
Term
|
Definition
involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation Primary design activities include: 1.Design the IT infrastructure 2.Design system models |
|
|
Term
|
Definition
1.Design the IT infrastructure 2.Design system models |
|
|
Term
| SDLC Development/Construction |
|
Definition
| )- involves taking all of the detailed design documents from the design phase and transforming them into the actual system. A PROTOTYPE! |
|
|
Term
| Steps of SDLC Development/Construction |
|
Definition
1.Develop the IT infrastructure 2.Develop the database and programs |
|
|
Term
|
Definition
| - involves bringing all the project pieces together into a special testing environment to test for errors, bugs, and interoperability, in order to verify that the system meets all the business requirements defined in the analysis phase. Involves integration - Does it work with other systems already in place? |
|
|
Term
|
Definition
1.Write the test conditions 2.Perform the system testing |
|
|
Term
|
Definition
involves placing the system into production so users can begin to perform actual business operations with the system |
|
|
Term
| Steps in SDLC Implementation |
|
Definition
1.Write detailed user documentation 2.Determine implementation method 3.Provide training for the system users 4. Phased conversion - introducing system changes one piece at a time |
|
|
Term
|
Definition
| involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals. Most expensive phase |
|
|
Term
| Steps in SDLC Maintenance |
|
Definition
1.Build a help desk to support the system users 2.Perform system maintenance 3.Provide an environment to support system changes |
|
|
Term
| Software Development Methodologies |
|
Definition
set of policies, procedures, standards, processes, tools techniques, tasks that people apply to technical and management challenges: 1) Waterfall 2) Rapid Application Development 3) Extreme Programming 4) Agile |
|
|
Term
| Waterfall (Software Development Method) |
|
Definition
| cascades linearly through the 7 phases; supposed to be all sequential; activity-based process, each phase of SLDC is performed sequentially; inflexible, expensive |
|
|
Term
| Rapid Application Development (RAD) (Software Development Method) |
|
Definition
| rapid prototyping, interactive user involvement emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes (small scale replica of system) of a system to accelerate the systems development process |
|
|
Term
| Extreme Programming (XP) (Software Development Method) |
|
Definition
| breaks a project into tiny manageable phases, iterate with user feeback; do tiny parts to completion then move on to next iteration like agile, breaks project into tiny pieces, the faster the communication the faster the results, four parts: planning, designing, coding, testing |
|
|
Term
| Agile (Software Development Method) |
|
Definition
| variation of XP-small projects delivered quickly and frequently; daily collaboration with users; aims for customer satisfaction through early and continuous delivery of useful components developed by an iterative process; fast, efficient, small, nimble, lower cost, fewer features → they work together all at once |
|
|
Term
| Different forms of Implementation: 1) Direct/Plunge 2) Parallel Conversion 3) Phased Conversion 4) Pilot Conversion |
|
Definition
| 1) Direct/Plunge -- Just switching from old to new 2) Parallel Conversion -- Two systems at the same time and slowly take the old one out 3) Phased Conversion -- Occurs when a new system is implemented one module at a time 4) Pilot conversion -- activate and test the new system in one branch of an organization; way to reduce risk |
|
|
Term
|
Definition
| web based tools that make it easy for users to add remove and change content online. |
|
|
Term
|
Definition
| An IT based set of tools that support the work of teams by facilitating the sharing and flow of information. (e.g. online meetings, telecommunication, deploying applications etc...) |
|
|
Term
| content management system |
|
Definition
| - provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment. |
|
|
Term
|
Definition
| a company’s main strength |
|
|
Term
| digital asset management system |
|
Definition
| - though similar to document management, generally works with binary rather than text files, such as multimedia file types |
|
|
Term
|
Definition
| Organizations that cannot adapt to the new market are doomed to extinction. |
|
|
Term
|
Definition
| situation where not all groups or classes of people have equal opportunity to access the Internet. May have profound impact on what a country can do economically using technology.. |
|
|
Term
|
Definition
| A new way of doing things that initially doesn’t meet the needs of current customers. MP3 replaced CD players. (Displaces the original technology. When it starts it usually isn’t as cool or good.) |
|
|
Term
| document management system |
|
Definition
| supports the electronic capturing, storage disruption, archival, and accessing of documents |
|
|
Term
|
Definition
| -the type of knowledge that can be codified |
|
|
Term
|
Definition
| software that supports team interaction including calendaring, scheduling, videoconferencing. |
|
|
Term
| Hypertext transport protocol |
|
Definition
| the Internet standards that supports the exchange of information on the WWW |
|
|
Term
| unstructured/information collaboration |
|
Definition
| includes doc exchange, shared whiteboards, discussion forums, email |
|
|
Term
|
Definition
| - global public network of computer networks that pass information from one to another using common computer protocols |
|
|
Term
| knowledge management system |
|
Definition
| - Supports the capturing and use of an organization’s know-how |
|
|
Term
|
Definition
| standards that specify the format of data as well as the rules to be followed during transmission |
|
|
Term
|
Definition
| an evolving extension of the WWW in which web content can be expressed not only in natural language, but also a format that can be read and used by software agents, thus permitting them to find, share, and integrate information more easily |
|
|
Term
| service-oriented architecture |
|
Definition
| a collection of services that communicate with each other, for example, passing data from one service to another or coordinating an activity between one or more service |
|
|
Term
|
Definition
| Something that is a better version of a previous version. Example: If he has a 2 terabyte hard drive, but finds in a year that he is able to sell a 3 terabyte hard drive... |
|
|
Term
|
Definition
| knowledge based organizational assets that cannot be codified, but are in people’s heads |
|
|
Term
|
Definition
| a set of interactive telecommunication technologies that allow two or more locations to interact via a two-way video and audio transmission simultaneously; a type of groupware |
|
|
Term
|
Definition
| a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet -- a more mature, distinctive medium characterized by user participation, openness, and network ethics |
|
|
Term
|
Definition
| blends audio, video, and document-sharing technologies to create virtual meetings rooms where people “gather” at a password-protected website |
|
|
Term
| web content management systems |
|
Definition
| adds an additional layer to document and digital asset management that enables publishing content both to intranets and to public websites |
|
|
Term
|
Definition
| web-based tools that make it easy for users to add, remove, and change online content |
|
|
Term
| workflow management systems |
|
Definition
| facilitate the automation and management of business processes and control the movement of work through the business process |
|
|
Term
| Application service provider (ASP) |
|
Definition
| offers access over the Internet to systems and related services that would otherwise have to be located in organizational computers |
|
|
Term
| Brick-and-morter business |
|
Definition
| a business that operates in a physical store without an internet presence |
|
|
Term
| Business-to-business (B2B) |
|
Definition
| applies to business buying from and selling to each other over the internet; walmart buying from suppliers, biggest source of money out of the four types. |
|
|
Term
| Business-to-consumer (B2C) |
|
Definition
| applies to any business that sells its products or services to consumers over the internet; Amazon is most known for this type |
|
|
Term
| Click-and-morter business |
|
Definition
| a business that operates in a physical store and on the internet; REI, Barnes and Noble |
|
|
Term
|
Definition
| the exact pattern of a consumer’s navigation through a site |
|
|
Term
|
Definition
| the count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser |
|
|
Term
| Consumer-to-business (C2B) |
|
Definition
| applies to any customer that sells a product or service to a business over the internet; more rare |
|
|
Term
| Consumer-to-consumer (C2C) |
|
Definition
| The business model for which e-bay is best known. involves consumers selling things directly to consumers. |
|
|
Term
|
Definition
| companies that use the internet to distribute copyrighted content (news, music, games, books, movies) retrieving and paying for content is the 2nd largest revenue source for the B2C ebusiness |
|
|
Term
|
Definition
| conducting business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners |
|
|
Term
|
Definition
| The buying and selling of goods over the Internet |
|
|
Term
|
Definition
| the B2B purchase and sale of supplies and services over the internet, tries to link organization directly to pre-approved suppliers catalogs and to process the entire purchasing transaction online |
|
|
Term
|
Definition
| a version of a retail store where customers can ship at any location...on the web |
|
|
Term
|
Definition
| an intranet that is available to strategic allies |
|
|
Term
|
Definition
| - measures the visit interactions with the target ad |
|
|
Term
|
Definition
| agents, software, or businesses that bring buyers and sellers together that provide a trading infrastructure to enhance e-business |
|
|
Term
| Internet service provider (ISP) |
|
Definition
| provides individuals and other companies access to the Internet |
|
|
Term
|
Definition
| internalized portion of the Internet, protected from outside access, for employees |
|
|
Term
|
Definition
| publicly accessible computer system that allows interactive information browsing |
|
|
Term
| Mobile commerce (m-commerce) |
|
Definition
| buying and selling of goods through a wireless Internet-enabled device |
|
|
Term
|
Definition
| act as intermediaries between buyers and sellers of goods and services |
|
|
Term
| Online service provider (OSP) |
|
Definition
| offers an extensive array of unique Web services |
|
|
Term
|
Definition
| Web site that offers a broad array of resources and services such as email, online discussion groups, serarch engines, and online shopping |
|
|
Term
| Pure-play (virtual) business |
|
Definition
| an Internet retailer that has no physical store, such as Expedia.com and Amazon.com |
|
|
Term
| Service level agreements (SLAs) |
|
Definition
| define the specific responsibilities of the service provider and set the customer expectations |
|
|
Term
|
Definition
| when a business uses the website or content of another company or source to create a completely new site |
|
|
Term
| Wireless internet service provider (WISP) |
|
Definition
| an ISP that allows subscribers to connect to a server at designated hotspots or access points using a wireless connection |
|
|
Term
|
Definition
| Used to translate Java applets |
|
|
Term
|
Definition
| error that occurs after the user uses the program |
|
|
Term
|
Definition
| Mostly translated computer code made available to users for download |
|
|
Term
|
Definition
| The most efficient translation approach |
|
|
Term
|
Definition
| both a compiler and a interpreter |
|
|
Term
| Why do we compile/interpret code |
|
Definition
| because computers don’t speak human and humans don’t speak in binary |
|
|
Term
| Three kinds of translation |
|
Definition
| Compiling, Interpreting, Bytecode |
|
|
Term
|
Definition
| translates a complete high-level language program into a complete machine language program. |
|
|
Term
|
Definition
| translates each programming statement or instruction into machine language when the program is run. One statement is translated and executed and then the next statement is translated. When it is no longer needed, it is discarded. Must be installed on each machine. Slower than compiled programs. Uses HTML and VBA. Translation must happen every time the computer is run. Good for short programs and programs that are updated regularly. Discards commands that are no longer needed. Specific to each type of machine. |
|
|