click below
click below
Normal Size Small Size show me how
mana 3330 final
Vocab for ch 6-9
Question | Answer |
---|---|
__________ how well a system can adapt to increased demands. This is more of a conceptual metric that assesses your ability to upgrade the implemented infrastructure at minimal cost and service interruption | Scalability |
__________ is the amount of information that can pass through a system in a given amount of time | Throughput |
__________ is a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code (called services) to meet all the application software needs of an organization | Service-oriented architecture (SoA or SOA) |
__________ delivery model for software in which you pay for software on a pay-per-use basis instead of buying the software outright | Software-as-a-service (SaaS) |
__________ usually measured inversely as downtime, or the average amount of time a system is down and unavailable to end users and customers | System availability |
__________ the IT system is partitioned into tiers (or layers) where each tier (or layer) performs a specific type of functionality | Tiered infrastructure (layer infrastructure) |
__________ is the speed at which a system can process a transaction. | Transaction speed |
__________ the number of unique visitors to your sites in a given time. This is commonly used by Nielsen/Net ratings to rank the most popular Web sites | Unique visitors |
__________ measures of the success of your Web and e-business initiatives, including unique visitors, total hits, page exposures, conversion rate, click-through, cost-per-thousands (CPM), abandoned registrations, and abandoned registrations | Web-centric metric |
__________ is the percentage of calls answered within a specific time frame, such as 30 or 90 seconds | Time service factor (TSF |
__________ number of visits to your Web site, many of which may be by the same visitor | Total hits |
__________ is the basic client/server relationship. In essence, the client handles the display, the server handles the request | 2-tier infrastructure |
__________is the most common approach used for Web applications today. A typical example of this model is the Web browser that acts as he client, an application server that handles the business logic, and a separate tier that handles database functions. | 3-tier infrastructure |
__________is the percentage number of callers who hang up while waiting for their call to be answered | Abandon rate |
__________is the number of visitors who start the process of completing a registration page and then abandon the activity. | Abandoned registration |
__________is the number of visitors who create a shopping cart and start shopping and then abandon the activity before paying for the merchandise | Abandoned shopping cart |
__________also usually measured inversely as error rate, or the number of errors per thousand (or million) that a system generates | Accuracy |
__________is the IT system is partitioned into tiers where each tier performs a specific type of functionality. | Client/server infrastructure (client/ server network) |
__________ is a relative term meaning "the structure beneath a structure | Infrastructure |
__________ model in which you acquire all your technology needs in the cloud. | Infrastructure-as-a-service (laaS) |
__________ are measures of efficiency, speed, and for capacity of technology, including throughput, transaction !peed, system availability, accuracy, resp011Se time, and scalability | Infrastructure-centric metric |
__________refers to the capability of two or more computing components to share information and other resources, even if they are made by different manufacturers | interoperability |
__________when multiple people can simultaneously use a single instance of a piece of software | Multi-tenancy |
__________is the average time, usually in seconds, that it takes for a call to be answered by an actual person | Average speed to answer (ASA) |
__________is a baseline values a system seeks to attain | Benchmark |
__________ is the process of continuously measuring system results and comparing those results to benchmarking | Benchmarking |
__________ a step-by-step guideline defining how the organization will recover from a disaster or extended disruption of its business processes | Business continuity plan |
__________ is a rigorous and well-informed organizational methodology for developing a business continuity plan | Business continuity planning (BCP) |
__________ measures of the success of call center efforts, including abandon rate, average spud Ill answer (ASA), time service /aclllr (TSF), and first call resolution (FCR) | Call center metric |
__________ is a technology model in which any and all resources application software, processing power, data storage, backup facilities, development tools, literally everything-are delivered as a set of services via the Internet. | Cloud computing |
__________ is a separate facility that does not have any computer equipment but is a place where employees can move after the disaster. | Cold site |
__________ is available to a company that rents space and telecommunications equipment from another company | Collocation facility |
__________ percentage of potential customers who visit your site who actually buy something | Conversion rate |
__________ sales dollars generated per dollar of advertising. This is commonly used to make the case for spending money to appear on a search engine | Cost-per-thousand (CPM) |
__________ is the cost to your organization of the unavailability of information and technology as compared to the cost to your organization of recovering from a disaster over time | Disaster recovery cost curve |
__________ which identifies collocation facilities, hot sites, and cold sites and illustrates a disaster recovery cost curve | Disaster recovery plan |
__________ is distributing the information and processing power of IT systems via a network | Distributed infrastructure |
__________ is doing the right thing | Effectiveness |
__________ means doing something right (e.g., in the least time, at the lowest cost, with the fewest errors, etc.), | Efficiency |
__________ the percentage of calls that can be resolved without having to call back | First call resolution (FCR) |
__________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business | Hot site |
__________ balances the work of the network over several different servers | n-tier infrastructure |
__________ average number of page exposures to an individual visitor | Page exposures |
__________ delivery model for software like SaaS with the additional features of (I) the ability to customize data entry forms, screens, reports, and the like, and (2) access to software development tools to alter the way in which the software works | Platform-as-a-service (PaaS) |
__________ is cloud computing services established and hosted by an organization on its internal network and available only to employees and departments within that organization | Private cloud |
__________ as its name suggests, comprises cloud services that exist on the Internet offered to anyone and any business | Public cloud |
__________ is a detailed document that describes ( 1) the distinction between critical and noncritical IT systems and information, (2) each possible threat, and (3) the possible worst case scenarios that can result from each disaster. | Requirement recovery document |
__________ is the average time to respond to a user-generated event, such as a request for a report, a mouse click, and so on | Response time |
__________ is the process of evaluating IT assets, their importance of the organization, and their susceptibility to threats | Risk assessment |
__________ is sexting between two consenting adults. In short, you take a suggestive (and perhaps sexually explicit) photo of yourself with your phone, attach a message to it, and send it to someone else's phone | Adult sexting |
__________ is software to generate ads that installs itself on your computer when you download some other (usually free) program from the Web | Adware |
__________ are services, which, in effect, hide your identity from the Web sites you visit | Anonymous Web browsing (AWB) |
__________ are the principles and standards that guide our behavior toward other people | Ethics |
__________ says that you may use copyrighted material in certain situations | Fair Use Doctrine |
__________ is hardware and for software that protects a computer or network from intruders | Firewall |
__________ are victims who knew the person who stole their identity | Friendly fraud |
__________ are generally knowledgeable computer users who use their knowledge to invade other people's computers | Hacker |
__________ is the unauthorized use, duplication, distribution or sale of copyrighted software. | Pirated software |
__________ is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent | Privacy |
__________ is what the probability of the harm or benefit if you take the action | Likelihood of effect. |
__________ is what do you perceive society thinks of your intended action? | Society's opinion. |
__________ is how much or how little benefit or harm will come from particular decision | Consequences |
__________ is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient | Public key encryption (PKE) |
__________ is how long will it take for the benefit or harm to take effect | Time to consequences. |
__________ detects and removes or quarantines computer viruses | Anti-virus software |
__________ is how much do you identify with the person or persons who will receive the benefit or suffer the harm | Relatedness. |
__________ is the use of physiological characteristics-such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breath | Biometrics |
__________ is how many people will be affected by your action | Reach of result |
__________ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought | Clickstream |
__________ is software that is written with malicious intent to cause annoyance or damage | Computer virus (virus) |
__________ is a small file that contains information about you and your Web activities, which a Web site you visit places on your computer | Cookie |
__________ is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard | Hardware key logger |
__________ is the forging of someone 's identity for the purpose of fraud | Identity theft |
__________ is intangible creative work that is embodied in physical form | Intellectual property |
__________ is the sending of sexually explicit messages and/or photos, primarily between mobile phones. | Sexting |
__________ is unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services | Spam |
__________ is phishing that is targeted to specific individuals | Spear phishing |
__________ is malicious software that collects information about you and your computer and reports it to someone without your permission | Spyware (sneakware or stealthware) |
__________ is the legal protection afforded an expression of an idea, such as a song or a video game and some types of proprietary documents | Copyright |
__________ floods a server or network with so many requests for service that it slows down or crashes. | Denial-of-service attack (DoS) |
__________ is a program that, when installed on a computer, records every keystroke and mouse click | Key logger software (key trapper software) |
__________ meaning that it's software you don't want hidden inside software you do want | Trojan horse software |
__________ which is the rerouting of your request for a legitimate Web site | Pharming |
__________ scrambles the contents of a file so that you can't read it without having the right decryption key | Encryption |
__________ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail | Phishing (carding or brand spoofing) |
__________ the use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals | Whaling |
__________ is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic | Worm |
__________ is the viewing of the physical world with computer-generated layers of information added to it | Augmented reality |
__________ is system that not only captures spoken words but also distinguishes word groupings to form sentences | Automatic speech recognition (ASR) |
The __________ system captures your words as you speak into a microphone, eliminates any background noise, and converts the digital signals of your speech into phonemes (syllables) | Feature analysis |
__________ is an input device that captures and records the shape and movement of your hand and fingers and the strength of your hand and finger movements | Glove |
__________ technology chip that can perform a variety of physiological functions when inserted into the human body. | Biochip |
__________ is the use of physiological characteristics-such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breath-to provide identification | Biometrics |
__________ is the standard for transmitting information in the form of short-range radio waves over distances of up to 30 feet | Bluetooth |
__________ uses technology to add the sense of touch to an environment that previously only had visual and textual elements | Haptic interface |
__________ is a combined input and output device that (1) captures and records the movement of your head and (2) contains a screen that covers your entire field of vision and displays various views of an environment based on your movements | Headset (head-mounted display) |
The __________ system matches your spoken phonemes to a phoneme sequence stored in an acoustic model database | Pattern classification |
__________ is a delivery model for personal productivity software such as Microsoft Office in which you pay for personal productivity software on a pay-per-use basis instead of buying the software outright | Personal software-as-a-service (Saas) |
__________ is a technology environment in which businesses and organizations come to you via technology with information, services, and product offerings based on your profile | Push technology |
__________ is a special3-D virtual reality room that can display images of other people and objects located in other__________ all over the world | Cave automatic virtual environment, (CAVE) |
__________ is the use of the Internet as a delivery vehicle, whereby intermediate players in a distribution channel can be bypassed | Disintermediation |
CAVEs are _________ that create, capture, and for display images in true three-dimensional form | Holographic device |
__________ a technology-enabled microchip implanted into the human body that stores important information about you (such as your identification and medical history) and that may be CPS-enabled to offer a method of tracking | Implant chip |
__________is the use of a chip or label to store information, by which information is transmitted from, or written to, the tag or label when the chip is exposed to the correct frequency of radio waves. | Radio frequency identification (RFID) |
__________ is three-dimensional computer simulation in which you actively and physically participate | Virtual reality |
__________ allows you to send voice communications over the Internet and avoid the toll charges that you would normally receive from your long distance carrier | Voice over Internet Protocol (VoiP) |
__________ is software that provides identification by evaluating facial characteristics | Facial recognition software |
__________ is an e-commerce business model in which consumers provide product specifications to a factory that makes the customized and personalized product to the consumer's specifications and then ships it to the consumer. | Factory-to-business-to-Consumer (F2b2C) |
The__________ system attempts to make sense of what you're saying by comparing the word phonemes generated in step 2 with a language model database | Language processing |
__________works with information represented in more than just two states, probably 10 states with each state representing a digit between 0 and 9 | Multi-state CPU |
__________ is a discipline that seeks to control matter at the atomic and sub-atomic levels for the purpose of building devices on the same small scale | Nanotechnology |
__________ is an input device that captures and records the movement of your feet as you walk or turn in different directions | Walker |
__________ is the so-called second generation of the Web and focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services | Web 2.0 |
__________ is short-range wireless technology developed mainly for use in mobile phones | Near Field Communication (NFC) |
__________ is the third generation of the Web focused on semantics | Web 3.0 |
__________ is the standard for transmitting information in the form of radio waves over distances up to about several miles | Wi-Fi (wireless fidelity) |
__________ interfaces capture and utilize your body characteristics, such as your breath, your voice, your height and weight, and even the iris in your eye | Physiological |
________ is a form of XP, aims for customer satisfaction through early and continuous delivery of useful software components | Agile methodology |
The ______ of the SDLC involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system | Analysis phase |
The ________ are the detailed set of end-user requests that the system must meet to be successful | Business requirement |
_________is a general approach to systems development that focuses on building small self-contained blocks of code (components) that can be reused across a variety of applications within an organization | Component-based development(CBD) |
A__________ is simply a factor critical to your organization's success | Critical success factor (CSF) |
The primary goal of the ________ of the SDLC is to build a technical blueprint of how the proposed system will work. | Design phase, |
During _______ of the SDLC, you take all your detailed design documents from the design phase and transform them into an actual system. | Development phase |
This phase marks the point at which you go from physical design to physical implementation | Development phase |
________breaks a project into tiny phases and developers cannot continue on to the next phase until the current phase is complete | Extreme programming (XP) methodology |
_______ empowers developers to respond to changing customer and business requirements, even late in the systems development life cycle, and emphasizes teamwork. | Extreme programming (XP) methodology |
A lack of a scope document can lead to ________, occurs when developers (and end users) add extra features that were not part of the initial requirements. | Feature creep |
During the ________ stage you must define the system to be developed: You must identify and select the system for development or determine which system is required to support the strategic goals of your organization | planning |
_______ economy is one marked by the lack of seeking perfection, focusing rather on getting "good enough products out the door, often allowing them to evolve and improve over time through user feedback | Good-enough technology economy |
A ______ is a group of people who respond to users, questions is a terrific way to provide comprehensive support for users using new systems | Help desk |
During the _______you distribute the system to all the users and they begin using the system to perform their everyday jobs | Implementation phase |
During testing each time the actual result is different from the expected result, a ______ is generated, and the system goes back to development for a "bug fix." | "bug" |
______ involves in-house IT specialists within your organization to develop the system. | insourcing |
___________verifies that separate systems can work together | Integration testing |
_______is the list of all systems that an organization needs to develop but-because of the prioritization of systems development needs-never get funded because of the lack of organizational resources | Invisible backlog |
During a __________ session users and IT specialists meet, sometimes for several days, to define and review the business requirements for the system | Joint application development (JAD) |
During _______of the SDLC, you monitor and support the new system to ensure it continues to meet the business goals | Maintenance phase |
___________is contracting an outsourcing arrangement with a company in a nearby country | Nearshore outsourcing |
_________ is contracting with a company that is geographically far away | Offshore outsourcing |
______ allows employees to perform the training at any time, on their own computers, at their own pace. | Online training |
_______is the process of engaging another company in the same country for services | Onshore outsourcing |
_______is the delegation of specific work to a third party for a specified length of time, at a specified cost, and at a specified level of service | Outsourcing |
_________ implementation uses both the old and new systems until you're sure that the new system performs correctly | Parallel implementation |
_________ implementation installs the new system in phases (e.g., accounts receivable, then accounts payable) until you're sure it works correctly and then the remaining phases of the new system are implemented | Phased implementation |
_________ implementation has only a small group of people using the new system until you know it works correctly and then the remaining people are added to the system | Pilot implementation |
During the _______ of the SDLC you create a solid plan for developing your information system | Planning phase |
_________ implementation discards the old system completely and immediately uses the new system | Plunge implementation |
A ___________ is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that all key project milestones are completed on time | Project manager |
_________ represent key dates by which you need a certain group of activities performed | Project milestone |
__________ defines the what, when, and why questions of systems development including all activities to be performed, the individuals, or resources, who will perform the activities, and the time required to complete each activity | Project plan |
_______ is a written document of the project scope that clearly defines the high-level requirements and is usually no longer than a paragraph | Project scope document |
Using a prototype you try to prove the technical feasibility of a proposed system is known as a | Proof-of-concept prototype |
A _____, is a model of a proposed product, service, or system | Prototype |
________is the process of building a model that demonstrates the features of a proposed product, service, or system. | Prototyping, |
________emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process | Rapid application development (RAD) (rapid prototyping) methodology |
_______is a formal document that describes in excruciating detail your logical requirements for a proposed system and invites outsourcing organizations (which we'll refer to as vendors) to submit bids for its development | Request for proposal (RFP) |
Once you define all the business requirements, you prioritize them in order of business importance and place them in a formal comprehensive document known as _________ | , the Requirements definition document |
________ occurs when the scope of the project increases beyond its original intentions often results from not having a scope document | Scope creep |
______ is the development and support of IT systems by end users (knowledge workers) with little or no help from IT specialists | Self sourcing (end-user development) |
These services within the SoA architecture perspective are exactly the same as ______in any of the component-based development methodologies. | components |
A prototype you use to convince people of the worth of a proposed system is a | Selling prototype |
_______is a formal contractually obligated agreement between two parties | Service level agreement (SLA) |
Technical specifications are included in a supporting document (similar to a contract addendum) called a _____ or a | Service level objective (SLO), Service level specification (SLS) |
_________is a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code (called services) to meet all the application software needs of an organization | Service-oriented architecture (SOA or SoA) |
The_______ is the users' actual signatures indicating they approve all the business requirements document. | Sign-off |
_______is a structured step-by-step approach for developing information systems. It includes seven key phases and numerous activities within each | Systems development life cycle (SDLC) |
_______verifies that the units or pieces of code written for a system function correctly when integrated into the total system | System testing |
The______ defines the hardware, software, and telecommunications equipment required to run the system | Technical architecture |
The_____ are the detailed steps the system must perform along with the expected results of each step | Test conditions |
The ______ of the SDLC verifies that the system works and meets all the business requirements defined in the analysis phase | Testing phase |
_______ tests individual units or pieces of code for a system | Unit testing |
______determines if the system satisfies the business requirements and enables users to perform their jobs correctly | User acceptance testing (UAT) |
When you install the system, you must also provide employees with ________ that highlights how to use the system because users find it extremely frustrating to have a new system without documentation | User documentation |
Systems development life cycle( SDLC) or _________ is a structured step-by-step approach for developing information systems. It includes seven key phases and numerous activities within each | Waterfall methodology |
_________is held in a classroom environment and is led by an instructor, and is most suitable for difficult systems for which employees need one-on-one time with an individual instructor | Workshop training |