Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

mana 3330 final

Vocab for ch 6-9

QuestionAnswer
__________ how well a system can adapt to increased demands. This is more of a conceptual metric that assesses your ability to upgrade the implemented infrastructure at minimal cost and service interruption Scalability
__________ is the amount of information that can pass through a system in a given amount of time Throughput
__________ is a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code (called services) to meet all the application software needs of an organization Service-oriented architecture (SoA or SOA)
__________ delivery model for software in which you pay for software on a pay-per-use basis instead of buying the software outright Software-as-a-service (SaaS)
__________ usually measured inversely as downtime, or the average amount of time a system is down and unavailable to end users and customers System availability
__________ the IT system is partitioned into tiers (or layers) where each tier (or layer) performs a specific type of functionality Tiered infrastructure (layer infrastructure)
__________ is the speed at which a system can process a transaction. Transaction speed
__________ the number of unique visitors to your sites in a given time. This is commonly used by Nielsen/Net ratings to rank the most popular Web sites Unique visitors
__________ measures of the success of your Web and e-business initiatives, including unique visitors, total hits, page exposures, conversion rate, click-through, cost-per-thousands (CPM), abandoned registrations, and abandoned registrations Web-centric metric
__________ is the percentage of calls answered within a specific time frame, such as 30 or 90 seconds Time service factor (TSF
__________ number of visits to your Web site, many of which may be by the same visitor Total hits
__________ is the basic client/server relationship. In essence, the client handles the display, the server handles the request 2-tier infrastructure
__________is the most common approach used for Web applications today. A typical example of this model is the Web browser that acts as he client, an application server that handles the business logic, and a separate tier that handles database functions. 3-tier infrastructure
__________is the percentage number of callers who hang up while waiting for their call to be answered Abandon rate
__________is the number of visitors who start the process of completing a registration page and then abandon the activity. Abandoned registration
__________is the number of visitors who create a shopping cart and start shopping and then abandon the activity before paying for the merchandise Abandoned shopping cart
__________also usually measured inversely as error rate, or the number of errors per thousand (or million) that a system generates Accuracy
__________is the IT system is partitioned into tiers where each tier performs a specific type of functionality. Client/server infrastructure (client/ server network)
__________ is a relative term meaning "the structure beneath a structure Infrastructure
__________ model in which you acquire all your technology needs in the cloud. Infrastructure-as-a-service (laaS)
__________ are measures of efficiency, speed, and for capacity of technology, including throughput, transaction !peed, system availability, accuracy, resp011Se time, and scalability Infrastructure-centric metric
__________refers to the capability of two or more computing components to share information and other resources, even if they are made by different manufacturers interoperability
__________when multiple people can simultaneously use a single instance of a piece of software Multi-tenancy
__________is the average time, usually in seconds, that it takes for a call to be answered by an actual person Average speed to answer (ASA)
__________is a baseline values a system seeks to attain Benchmark
__________ is the process of continuously measuring system results and comparing those results to benchmarking Benchmarking
__________ a step-by-step guideline defining how the organization will recover from a disaster or extended disruption of its business processes Business continuity plan
__________ is a rigorous and well-informed organizational methodology for developing a business continuity plan Business continuity planning (BCP)
__________ measures of the success of call center efforts, including abandon rate, average spud Ill answer (ASA), time service /aclllr (TSF), and first call resolution (FCR) Call center metric
__________ is a technology model in which any and all resources application software, processing power, data storage, backup facilities, development tools, literally everything-are delivered as a set of services via the Internet. Cloud computing
__________ is a separate facility that does not have any computer equipment but is a place where employees can move after the disaster. Cold site
__________ is available to a company that rents space and telecommunications equipment from another company Collocation facility
__________ percentage of potential customers who visit your site who actually buy something Conversion rate
__________ sales dollars generated per dollar of advertising. This is commonly used to make the case for spending money to appear on a search engine Cost-per-thousand (CPM)
__________ is the cost to your organization of the unavailability of information and technology as compared to the cost to your organization of recovering from a disaster over time Disaster recovery cost curve
__________ which identifies collocation facilities, hot sites, and cold sites and illustrates a disaster recovery cost curve Disaster recovery plan
__________ is distributing the information and processing power of IT systems via a network Distributed infrastructure
__________ is doing the right thing Effectiveness
__________ means doing something right (e.g., in the least time, at the lowest cost, with the fewest errors, etc.), Efficiency
__________ the percentage of calls that can be resolved without having to call back First call resolution (FCR)
__________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business Hot site
__________ balances the work of the network over several different servers n-tier infrastructure
__________ average number of page exposures to an individual visitor Page exposures
__________ delivery model for software like SaaS with the additional features of (I) the ability to customize data entry forms, screens, reports, and the like, and (2) access to software development tools to alter the way in which the software works Platform-as-a-service (PaaS)
__________ is cloud computing services established and hosted by an organization on its internal network and available only to employees and departments within that organization Private cloud
__________ as its name suggests, comprises cloud services that exist on the Internet offered to anyone and any business Public cloud
__________ is a detailed document that describes ( 1) the distinction between critical and noncritical IT systems and information, (2) each possible threat, and (3) the possible worst case scenarios that can result from each disaster. Requirement recovery document
__________ is the average time to respond to a user-generated event, such as a request for a report, a mouse click, and so on Response time
__________ is the process of evaluating IT assets, their importance of the organization, and their susceptibility to threats Risk assessment
__________ is sexting between two consenting adults. In short, you take a suggestive (and perhaps sexually explicit) photo of yourself with your phone, attach a message to it, and send it to someone else's phone Adult sexting
__________ is software to generate ads that installs itself on your computer when you download some other (usually free) program from the Web Adware
__________ are services, which, in effect, hide your identity from the Web sites you visit Anonymous Web browsing (AWB)
__________ are the principles and standards that guide our behavior toward other people Ethics
__________ says that you may use copyrighted material in certain situations Fair Use Doctrine
__________ is hardware and for software that protects a computer or network from intruders Firewall
__________ are victims who knew the person who stole their identity Friendly fraud
__________ are generally knowledgeable computer users who use their knowledge to invade other people's computers Hacker
__________ is the unauthorized use, duplication, distribution or sale of copyrighted software. Pirated software
__________ is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Privacy
__________ is what the probability of the harm or benefit if you take the action Likelihood of effect.
__________ is what do you perceive society thinks of your intended action? Society's opinion.
__________ is how much or how little benefit or harm will come from particular decision Consequences
__________ is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient Public key encryption (PKE)
__________ is how long will it take for the benefit or harm to take effect Time to consequences.
__________ detects and removes or quarantines computer viruses Anti-virus software
__________ is how much do you identify with the person or persons who will receive the benefit or suffer the harm Relatedness.
__________ is the use of physiological characteristics-such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breath Biometrics
__________ is how many people will be affected by your action Reach of result
__________ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought Clickstream
__________ is software that is written with malicious intent to cause annoyance or damage Computer virus (virus)
__________ is a small file that contains information about you and your Web activities, which a Web site you visit places on your computer Cookie
__________ is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard Hardware key logger
__________ is the forging of someone 's identity for the purpose of fraud Identity theft
__________ is intangible creative work that is embodied in physical form Intellectual property
__________ is the sending of sexually explicit messages and/or photos, primarily between mobile phones. Sexting
__________ is unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services Spam
__________ is phishing that is targeted to specific individuals Spear phishing
__________ is malicious software that collects information about you and your computer and reports it to someone without your permission Spyware (sneakware or stealthware)
__________ is the legal protection afforded an expression of an idea, such as a song or a video game and some types of proprietary documents Copyright
__________ floods a server or network with so many requests for service that it slows down or crashes. Denial-of-service attack (DoS)
__________ is a program that, when installed on a computer, records every keystroke and mouse click Key logger software (key trapper software)
__________ meaning that it's software you don't want hidden inside software you do want Trojan horse software
__________ which is the rerouting of your request for a legitimate Web site Pharming
__________ scrambles the contents of a file so that you can't read it without having the right decryption key Encryption
__________ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail Phishing (carding or brand spoofing)
__________ the use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals Whaling
__________ is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic Worm
__________ is the viewing of the physical world with computer-generated layers of information added to it Augmented reality
__________ is system that not only captures spoken words but also distinguishes word groupings to form sentences Automatic speech recognition (ASR)
The __________ system captures your words as you speak into a microphone, eliminates any background noise, and converts the digital signals of your speech into phonemes (syllables) Feature analysis
__________ is an input device that captures and records the shape and movement of your hand and fingers and the strength of your hand and finger movements Glove
__________ technology chip that can perform a variety of physiological functions when inserted into the human body. Biochip
__________ is the use of physiological characteristics-such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breath-to provide identification Biometrics
__________ is the standard for transmitting information in the form of short-range radio waves over distances of up to 30 feet Bluetooth
__________ uses technology to add the sense of touch to an environment that previously only had visual and textual elements Haptic interface
__________ is a combined input and output device that (1) captures and records the movement of your head and (2) contains a screen that covers your entire field of vision and displays various views of an environment based on your movements Headset (head-mounted display)
The __________ system matches your spoken phonemes to a phoneme sequence stored in an acoustic model database Pattern classification
__________ is a delivery model for personal productivity software such as Microsoft Office in which you pay for personal productivity software on a pay-per-use basis instead of buying the software outright Personal software-as-a-service (Saas)
__________ is a technology environment in which businesses and organizations come to you via technology with information, services, and product offerings based on your profile Push technology
__________ is a special3-D virtual reality room that can display images of other people and objects located in other__________ all over the world Cave automatic virtual environment, (CAVE)
__________ is the use of the Internet as a delivery vehicle, whereby intermediate players in a distribution channel can be bypassed Disintermediation
CAVEs are _________ that create, capture, and for display images in true three-dimensional form Holographic device
__________ a technology-enabled microchip implanted into the human body that stores important information about you (such as your identification and medical history) and that may be CPS-enabled to offer a method of tracking Implant chip
__________is the use of a chip or label to store information, by which information is transmitted from, or written to, the tag or label when the chip is exposed to the correct frequency of radio waves. Radio frequency identification (RFID)
__________ is three-dimensional computer simulation in which you actively and physically participate Virtual reality
__________ allows you to send voice communications over the Internet and avoid the toll charges that you would normally receive from your long distance carrier Voice over Internet Protocol (VoiP)
__________ is software that provides identification by evaluating facial characteristics Facial recognition software
__________ is an e-commerce business model in which consumers provide product specifications to a factory that makes the customized and personalized product to the consumer's specifications and then ships it to the consumer. Factory-to-business-to-Consumer (F2b2C)
The__________ system attempts to make sense of what you're saying by comparing the word phonemes generated in step 2 with a language model database Language processing
__________works with information represented in more than just two states, probably 10 states with each state representing a digit between 0 and 9 Multi-state CPU
__________ is a discipline that seeks to control matter at the atomic and sub-atomic levels for the purpose of building devices on the same small scale Nanotechnology
__________ is an input device that captures and records the movement of your feet as you walk or turn in different directions Walker
__________ is the so-called second generation of the Web and focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services Web 2.0
__________ is short-range wireless technology developed mainly for use in mobile phones Near Field Communication (NFC)
__________ is the third generation of the Web focused on semantics Web 3.0
__________ is the standard for transmitting information in the form of radio waves over distances up to about several miles Wi-Fi (wireless fidelity)
__________ interfaces capture and utilize your body characteristics, such as your breath, your voice, your height and weight, and even the iris in your eye Physiological
________ is a form of XP, aims for customer satisfaction through early and continuous delivery of useful software components Agile methodology
The ______ of the SDLC involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system Analysis phase
The ________ are the detailed set of end-user requests that the system must meet to be successful Business requirement
_________is a general approach to systems development that focuses on building small self-contained blocks of code (components) that can be reused across a variety of applications within an organization Component-based development(CBD)
A__________ is simply a factor critical to your organization's success Critical success factor (CSF)
The primary goal of the ________ of the SDLC is to build a technical blueprint of how the proposed system will work. Design phase,
During _______ of the SDLC, you take all your detailed design documents from the design phase and transform them into an actual system. Development phase
This phase marks the point at which you go from physical design to physical implementation Development phase
________breaks a project into tiny phases and developers cannot continue on to the next phase until the current phase is complete Extreme programming (XP) methodology
_______ empowers developers to respond to changing customer and business requirements, even late in the systems development life cycle, and emphasizes teamwork. Extreme programming (XP) methodology
A lack of a scope document can lead to ________, occurs when developers (and end users) add extra features that were not part of the initial requirements. Feature creep
During the ________ stage you must define the system to be developed: You must identify and select the system for development or determine which system is required to support the strategic goals of your organization planning
_______ economy is one marked by the lack of seeking perfection, focusing rather on getting "good enough products out the door, often allowing them to evolve and improve over time through user feedback Good-enough technology economy
A ______ is a group of people who respond to users, questions is a terrific way to provide comprehensive support for users using new systems Help desk
During the _______you distribute the system to all the users and they begin using the system to perform their everyday jobs Implementation phase
During testing each time the actual result is different from the expected result, a ______ is generated, and the system goes back to development for a "bug fix." "bug"
______ involves in-house IT specialists within your organization to develop the system. insourcing
___________verifies that separate systems can work together Integration testing
_______is the list of all systems that an organization needs to develop but-because of the prioritization of systems development needs-never get funded because of the lack of organizational resources Invisible backlog
During a __________ session users and IT specialists meet, sometimes for several days, to define and review the business requirements for the system Joint application development (JAD)
During _______of the SDLC, you monitor and support the new system to ensure it continues to meet the business goals Maintenance phase
___________is contracting an outsourcing arrangement with a company in a nearby country Nearshore outsourcing
_________ is contracting with a company that is geographically far away Offshore outsourcing
______ allows employees to perform the training at any time, on their own computers, at their own pace. Online training
_______is the process of engaging another company in the same country for services Onshore outsourcing
_______is the delegation of specific work to a third party for a specified length of time, at a specified cost, and at a specified level of service Outsourcing
_________ implementation uses both the old and new systems until you're sure that the new system performs correctly Parallel implementation
_________ implementation installs the new system in phases (e.g., accounts receivable, then accounts payable) until you're sure it works correctly and then the remaining phases of the new system are implemented Phased implementation
_________ implementation has only a small group of people using the new system until you know it works correctly and then the remaining people are added to the system Pilot implementation
During the _______ of the SDLC you create a solid plan for developing your information system Planning phase
_________ implementation discards the old system completely and immediately uses the new system Plunge implementation
A ___________ is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that all key project milestones are completed on time Project manager
_________ represent key dates by which you need a certain group of activities performed Project milestone
__________ defines the what, when, and why questions of systems development including all activities to be performed, the individuals, or resources, who will perform the activities, and the time required to complete each activity Project plan
_______ is a written document of the project scope that clearly defines the high-level requirements and is usually no longer than a paragraph Project scope document
Using a prototype you try to prove the technical feasibility of a proposed system is known as a Proof-of-concept prototype
A _____, is a model of a proposed product, service, or system Prototype
________is the process of building a model that demonstrates the features of a proposed product, service, or system. Prototyping,
________emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process Rapid application development (RAD) (rapid prototyping) methodology
_______is a formal document that describes in excruciating detail your logical requirements for a proposed system and invites outsourcing organizations (which we'll refer to as vendors) to submit bids for its development Request for proposal (RFP)
Once you define all the business requirements, you prioritize them in order of business importance and place them in a formal comprehensive document known as _________ , the Requirements definition document
________ occurs when the scope of the project increases beyond its original intentions often results from not having a scope document Scope creep
______ is the development and support of IT systems by end users (knowledge workers) with little or no help from IT specialists Self sourcing (end-user development)
These services within the SoA architecture perspective are exactly the same as ______in any of the component-based development methodologies. components
A prototype you use to convince people of the worth of a proposed system is a Selling prototype
_______is a formal contractually obligated agreement between two parties Service level agreement (SLA)
Technical specifications are included in a supporting document (similar to a contract addendum) called a _____ or a Service level objective (SLO), Service level specification (SLS)
_________is a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code (called services) to meet all the application software needs of an organization Service-oriented architecture (SOA or SoA)
The_______ is the users' actual signatures indicating they approve all the business requirements document. Sign-off
_______is a structured step-by-step approach for developing information systems. It includes seven key phases and numerous activities within each Systems development life cycle (SDLC)
_______verifies that the units or pieces of code written for a system function correctly when integrated into the total system System testing
The______ defines the hardware, software, and telecommunications equipment required to run the system Technical architecture
The_____ are the detailed steps the system must perform along with the expected results of each step Test conditions
The ______ of the SDLC verifies that the system works and meets all the business requirements defined in the analysis phase Testing phase
_______ tests individual units or pieces of code for a system Unit testing
______determines if the system satisfies the business requirements and enables users to perform their jobs correctly User acceptance testing (UAT)
When you install the system, you must also provide employees with ________ that highlights how to use the system because users find it extremely frustrating to have a new system without documentation User documentation
Systems development life cycle( SDLC) or _________ is a structured step-by-step approach for developing information systems. It includes seven key phases and numerous activities within each Waterfall methodology
_________is held in a classroom environment and is led by an instructor, and is most suitable for difficult systems for which employees need one-on-one time with an individual instructor Workshop training
Created by: romoore245
Popular Management sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards