Term
| What is electronic commerce |
|
Definition
| Commerce accelerated and enhanced by IT, in particular the Internet |
|
|
Term
| How can use you a B2B e-marketplace to reduce your dependency on a particular supplier? |
|
Definition
| You can use a B2B e-marketplace to find other suppliers and also participate in reverse auctions to find the best supplier with the best price. |
|
|
Term
| How do convenience and specialty items differ in the B2C e-commerce business model? |
|
Definition
| Convenience items are lower-priced but something needed on a frequent basis. Specialty items are higher-priced, ordered on a less frequent basis, and often require customization. |
|
|
Term
| Why do commodity-like and digital items sell well in the B2C e-commerce business model? |
|
Definition
| Commodity-like items work well because they are the same no matter where you buy them. Digital products work well because there is no real associated shipping or storage costs. |
|
|
Term
| What is mass customization? |
|
Definition
Mass customization is the ability of an organization to give its customers the opportunity to tailor its product or service to the customer’s specifications.
|
|
|
Term
| How does a reverse auction work? |
|
Definition
| In a reverse auction, you place a request for products and/or services and suppliers continually submit lower bids until there is only one supplier left. |
|
|
Term
| How are vertical and horizontal e-marketplaces different? |
|
Definition
| Vertical e-marketplaces connect buyers and sellers in a given industry while horizontal e-marketplaces connect buyers and sellers across many industries. |
|
|
Term
| What can a marketing mix include for a B2C e-commerce business? |
|
Definition
| A marketing mix for a B2C business can include registering with search engines, online ads, viral marketing, and affiliate programs. |
|
|
Term
| What are the major types of B2C e-commerce payment systems? |
|
Definition
| The major types of B2C e-commerce payment systems include credit cards, smart cards, financial cybermediaries, electronic checks, and Electronic Bill Presentment and Payment. |
|
|
Term
| . What is the difference between a client-side digital wallet and a server-side digital wallet? |
|
Definition
| You keep a client-side digital wallet on your personal computer while a server-side digital wallet is stored on a Web server. |
|
|
Term
| How are Secure Sockets Layers (SSLs) and Secure Electronic Transactions (SETs) different? How are they the same? |
|
Definition
| SSLs and SETs are different in that SETs also provide a mechanism for ensuring the legitimacy of the user of the payment device. They are both the same in that they create a secure connection between the client and the server computers. |
|
|
Term
| What are the three primary groups of people who undertake the systems development process? |
|
Definition
| The three primary groups of people who undertake the systems development process are in-house IT specialists (insourcing), end users (selfsourcing), and another organization (outsourcing). |
|
|
Term
| What is the systems development life cycle? |
|
Definition
| The SDLC is a structured step-by-step approach for developing information systems. |
|
|
Term
| What are scope creep and feature creep? |
|
Definition
| Scope creep occurs when the scope of the project increases beyond its original intentions. Feature creep occurs when developers (and end users) add extra features that were not part of the initial requirements. |
|
|
Term
| How do the four implementation methods differ? |
|
Definition
| Parallel implementation uses both the old and new systems until the new system is verified. Plunge implementationimmediately ceases using the old system and begins using the new system. Pilot implementation converts only a group of users until the new system is verified. Phased implementation converts only a portion of the system until it can be verified. |
|
|
Term
| What is component-based development? |
|
Definition
| Component-based development is a general approach to systems development that focuses on building small self-contained b locks of code (components) that can be reused across a variety of applications within an organization. |
|
|
Term
| How are component-based development and a service-oriented architecture related? |
|
Definition
| Component-based development (CBD) is a technical implementation of a service-oriented architecture (SoA). The SoA is a holistic perspective of how an organization views and treats resources such as information and technology. CBD focuses on building small self-contained blocks of code called components which can be re-used in a variety of applications. Service-oriented architecture (SoA) also focuses on blocks of code called services. If an organization chooses to use the SoA approach to software development, it would use the same re-useable components that are available from CBD. |
|
|
Term
| Why do organizations prototype? |
|
Definition
| Organizations prototype for a variety of reasons: (1) to gather requirements, (2) to help determine requirements, (3) to prove that a system is technically feasible, and (4) to sell the idea of a proposed system. |
|
|
Term
| What are the advantages of self-sourcing? |
|
Definition
| The advantages of selfsourcing are many including: improving requirements determination, increasing end user participation and sense of ownership, increasing speed of systems development, and reducing the invisible backlog. |
|
|
Term
| What is the difference between a selling prototype and a proof-of-concept prototype? |
|
Definition
| A selling prototype is used to convince people of the worth of a proposed system while a proof-of-concept prototype is used to prove the technical feasibility of a proposed system. |
|
|
Term
| What is the role of a service level agreement (SLA) in outsourcing? |
|
Definition
| A service level agreement in outsourcing defines the work to be done, the time frame, the metrics that will be used to measure the success of the systems development effort, and the costs. |
|
|
Term
| What are the three geopolitical forms of outsourcing? |
|
Definition
| The three geopolitical forms of outsourcing include onshore outsourcing, nearshore outsourcing, and offshore outsourcing. |
|
|
Term
| How can a service-oriented architecture (SoA) be used to guide the organization of the future? |
|
Definition
| A service-oriented architecture (SoA) can guide the organization of the future by enabling it to respond more adeptly to customers, end users, software development, information needs, and hardware requirements. |
|
|
Term
| How have ERP systems evolved over the last 30 years? |
|
Definition
ERP starts in the 1970s as basic material requirements planning systems. They then moved into an MRP II stage in which decision support and executive support capabilities were added. In the early 1990s, financials and accounting functions were integrated. Today finally, they are called ERP II, a complete integration of resource planning driven by customer relationship management and supply chain management activities.
|
|
|
Term
| Why is interoperability important? |
|
Definition
Interoperability provides the capability for two or more computing components to share information and other resources, even if they are made by different manufacturers.
|
|
|
Term
| What are the main differences between a decentralized infrastructure and a centralized infrastructure? |
|
Definition
| A decentralized infrastructure involves little or no sharing of IT and IT-related resources, while a centralized infrastructureinvolves the complete sharing of IT and IT-related resources (albeit from one centrally-control location). |
|
|
Term
| How does a client/server infrastructure work? |
|
Definition
| A client/server network works by having one or more computers that are servers, provide services to other computers, called clients. |
|
|
Term
| What are the four types of a tiered infrastructures? |
|
Definition
| The four types of tiered infrastructures are 1-tier (presentation), 2-tier (application), 3-tier (data), and n-tier (business logic). |
|
|
Term
| How do efficiency and effectiveness metrics differ? |
|
Definition
| Efficiency focuses on doing something right, such as reducing time or number of errors, while effectiveness focuses on doing the right things, such as making the right decisions. |
|
|
Term
| What are some commonly used infrastructure-centric metrics? |
|
Definition
| Commonly used infrastructure-centric metrics include throughput, transaction speed, system availability, accuracy, response time, and scalability. |
|
|
Term
| What are some commonly used Web-centric metrics? |
|
Definition
Commonly used Web-centric metrics include unique visitors, total hits, page exposures, conversion rate, click-through, cost-per-thousand, abandoned registrations, and abandoned shopping carts.
|
|
|
Term
| Why are service level agreements important when contracting the services of an application service provider (ASP)? |
|
Definition
| A service level agreement (SLA) would provide the quantifiable measures by which the ASP must provide services. |
|
|
Term
| What is a business continuity plan? |
|
Definition
| A business continuity plan is a step-by-step guideline defining how the organization will recover from a disaster or extended disruption of its business processes. |
|
|
Term
| Why do organizations implement a disaster recovery plan before testing it? |
|
Definition
Organizations implement a disaster recovery plan before testing it because organizations cannot test their disaster recovery plans until the plan is implemented.
|
|
|
Term
| What are ethics and how do ethics apply to business? |
|
Definition
| Ethics are the principles and standards that guide our behavior toward other people. Ethics are indispensable to anyone who wants to have a good career. Business involves commercial interaction between people and so, naturally, how people treat each other is important in business. |
|
|
Term
| What situation would qualify as an exception to the copyright law? |
|
Definition
| A teacher copying a diagram out of a book for instructional purposes. |
|
|
Term
|
Definition
| Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent. |
|
|
Term
| What is pirated software? |
|
Definition
| Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software. |
|
|
Term
|
Definition
| Identity theft is the forging of someone’s identity for the purpose of fraud. |
|
|
Term
| What does a key logger do? |
|
Definition
| There are two types of key loggers: key logger software and hardware key loggers. They both record the input actions of the person using the computer. Key logger or key trapper, software is a program that, when installed on a computer, records every keystroke and mouse click. A hardware key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard. |
|
|
Term
|
Definition
| Spyware or sneakware or stealthware is malicious software that collects information about you and your computer and reports it to someone without your permission. |
|
|
Term
| What is a denial-of-service attack? |
|
Definition
A denial-of-service (DoS) attack floods a network or server with so many requests for service that it slows down or crashes.
|
|
|
Term
| What is public key encryption? |
|
Definition
| Public key encryption (PKE) is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient. |
|
|
Term
| How will software-as-a-service (Saas) make use of a personal application service provider? |
|
Definition
| The SaaS model requires that a personal ASP provide you with software (and potentially storage space) over the Internet so you can take advantage of it while using portable technologies that do not contain the software you need. |
|
|
Term
| How does push technology differ from spam? |
|
Definition
| Information coming via push technology will be personalized whereas spam is designed as generic information to be pushed to the masses. |
|
|
Term
| What is disintermediation? How does the F2b2C e-commerce model support disintermediation? |
|
Definition
| Distintermediation is the use of the Internet as a delivery vehicle, whereby intermediate players in a distribution channel are bypassed. The F2b2C model basically makes the Web business into an insignificant intermediary between the factory and the consumer. |
|
|
Term
| What exciting applications are associated with the Web 2.0? |
|
Definition
| Some applications include wikis, social networking sites, blogs, RSS feeds, and podcasting. |
|
|
Term
| How does automatic speech recognition work? |
|
Definition
| Automatic speech recognition works in three steps: (1) feature analysis which captures your words and eliminates background noise, (2) pattern classification which matches your spoken phonemes to phonemes stored in a database, and (3) language processing which attempts to make sense of what you’re saying by comparing your word phonemes with a language model database. |
|
|
Term
| What are the devices commonly associated with virtual reality? |
|
Definition
Devices commonly associated with virtual reality include gloves, headsets, and walkers.
|
|
|
Term
| What role do haptic interfaces play? |
|
Definition
| Haptic interfaces add the sense of touch to an environment that previously only had visual and textual elements. |
|
|
Term
| What is the best form of personal identification? |
|
Definition
| The best form of personal identification includes three things: (1) what you have to know, (2) what you have, and (3) who you are, or a biometric. |
|
|
Term
| How can you expect cell phones to change in the future? |
|
Definition
| Cell phones will be become very small computers with CPUs, RAM, disk storage, and support for things like video. |
|
|
Term
|
Definition
| RFID uses a microchip in a tag or label to store information, and information is transmitted from, or written to, the tag or label when the microchip is exposed to the correct frequency of radio waves. |
|
|
Term
| How does nanotechnology differ from traditional manufacturing? |
|
Definition
| Nanotechnology starts with the smallest element (an atom) and builds up from there. Traditional manufacturing starts with something big and presses, squeezes, slices, and dices to make something small. |
|
|