Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Final INFO 439

cumulative

QuestionAnswer
Ecosystem building relationships with various players in one's business ecosystem is the current strategi objective for use of IT and the Internet.
Supply Push companies are organized to build a supply of products or services and "push" them to end customers, ons tore shelves, in catalogs, and such
Demand Pull companies offer customers the components of a service or product, and the customer creates their own personalized versions, creating the demand that pulls the specific product or service they want through the supply chain
Tacit Knowledge "known" but not easily explained to others
Explicit Knowledge knowledge that has been articulated, codified, and made public
Procedure-based activities large volume transactions, where each transaction has relatively low cost or value. The activities are well defined; therefore, the principal performance measure is efficiency
Knowledge-based activities handle fewer transactions, but each one has a higher value. These activities, which can be accomplished in various ways, must therfore be measured by results, that is, attainment of objectives or goals
Internet global system of interconnected computer networks that use the standard internet protocol suite (TCP/IP)
Intranet an internal company network that takes advantage of the internet's infrastructure, telecommunications protocols, and browsers.
Electronic Data Interchange - EDI business transactions, such as orders, that cross company boundaries via a network using carefully defined protocols and data formats
Business Process Redesign - BPR significantly restructuring the operational business processes in a firm
Business Process Management focuses on aligning all aspects of an organization with the wants and needs of clients. Attempts to improve processes continuously. Described as a process optimization process
Strategic Planning target horizon is 3-5 years. Issues include strategic planning and business process reengineering.
Tactical Planning target horizon is 1-2 years. issues include resource allocatino adn project sekection
Nolan and Gibson growth model observed that many organizations go through four stages in the introduction and assimilatin of new technology
Scenerio Planning the goal is not to predict the future, but to expore the forces that could cause different futures to take place and then decide on actions to take if those forces begin to materialize
Portfolio Management is of great value to senior and functional executives to ensure that they are working on a broad front that will lead to success in the internet economy
Distributed systems a computer system that has components physically distributed around a company or among companies
Open Systems system based on national or international standards so that the products of many manufacturers work with each other
Types of client-server systems distributed man-machine interface, remote man-machine interface, distributed business application, remote information management, distributed database
Distributed man-machine interface puts all data, all the application software, and some of the presentation software on a server. Appropriate for wireless web-based computing.
Remote man-machine interface puts all the software on the client machine but leaves the applications and information (data)on the remote server. Used to put transaction processing behind web sites
Distributed business application places all the software on the client, all the data on the server, and splits the application software between the client and the server
Remote information management places all the software on the client, leaving only data and information management software on the server
Distributed database places all presentation and application software as well as some of the data on the client. Remaining data are on the server
Web Services second-generation internet-based system environment that gives software modules URLs (internet addresses) so they can be called upon to perform their function as a service via the internet.
Intranet a computer netwrok that uses Internet Protocol technology to share an organization's information within that organization
Extranet A computer network that allows controlled access from the outside, for specific business or education purposes.
Digital Convergence Intertwining of various forms of media - voice, data, and video. All separate media will be replaced by integrated digital appliances.
WPAN -Wireless Personal Area Netwok Networks that provide high-speed connections between devices that are up to 30 feet apart.
Wireless Local Area Network (WLAN) Networks that provide access to corporate computers in office buildings, retail stores, and hospitals, or access to Internet hot spots where people congregate.
Wireless Metropolitan Area Network (WMAN) Networks that provide connections in cities and campuses at distances up to 30 miles
Wireless Wide Area Network (WWAN) Networks that provide broadband wireless connections over thousands of miles
Data consists of facts devoid of meaning or intent
Information is data in context, which means the data has been given an explicit meaning in a specific context
Knowledge is information with direction or intent, where intent is derived rom strategies or objects
Hierarchical structures data so that each element is subordinate to another in a distinct hierarchical manner. Each data item can have only one parent
Network allows each data item to have more than one parent. More flexible. Relationships stated by pointers stored with the data
Relational data stored in tables (that represent entities) in a form that is intuitive for users.
Object Oriented expands the view of data by storing and managing objects
Data Administrator administers databases and software that mangoes them to provide accurate and timely information to users
Database Administrator concerned with the technical aspects and physical storage of data
Metadata part of the data warehouse that defines the data/explains meaning of each data element and sets standards
Data Warehouse stores data used to make decisions, gives insights into customer behavior, internal operations, product mixes, and can yield business intelligence
Document Management Computer system used to track and store electronic documents. OFten provides history tracking. Supports communication among people and groups
Content Management Searching, filtering, synthesizing, assimilating, and sharing knowledge resources.
Knowledge Management a range of strategies and practices used in an organization to identify, create, represent, distribute, and enable adoption of insights and experiences.
External measures what customers see, directly relates to customer satisfaction
Internal measures of interest to IS people.
Global Focus rapid development in communication, globalization and increased mobility of resources among countries
Just In Time (JIT) goods and services are produced upon receipt of order with customizations, it reduces inventory costs
Product Development product life cycle continues to shorten, products are replaced very quickly.
Collaborative one company becomes the prime contractor for numerous facets of IS operations but some of the work is provided by other ESPs
Best-of-Breed one outsourcer handled desktop operations, another data-center operations, and a third network management
Waterfall Development Methodology a way to view the systems development process as a series of steps. should only move to the next phase once the current phase is complete
CASE tools (computer aided software engineering) a class of software that automates many of the activities in the various life cycle phase. assists in creation, maintenance, and management of software
1st GL machine-leel languages, which are harder to learn and harder to implement, but efficient
2nd GL assembly languages, which are readable commands that must be "assembled" to be read by the computer
3rd GL Highly usable languages
4th GL languages created to reduce effort and time put into development, which allows more effort to be put into system design
Prototyping an iterative process for developing a software system. It focuses on the development of a basic system in order to quickly provide needed functionality
Object Oriented Development developers just need to click at generic items - menus, dialog boxes, radio buttons and other graphical components - and then rearrange them to create a screen
Timeboxing CASE technique used to guarantee delivery of a system within a fixed period (120 days or less). Often used in conjunction with RAD
Middleware software that eases connection between clients and servers in a client-server system
Sponsor the person or group who legitimizes the change.
Change Agent the person or group who causes the change to happen. Change agents are often the IS staff. They can introduce the change but not enforce its use.
Target the person or group who is being expected to change and at whom the change is being aimed
Reverse Engineering extracting and converting data elements from existing systems and formats
Forward Engineering moving them to new hardware platforms and creating new application
Project Charter is a statement of the scope, objectives and participants in a project. It provides a preliminary delineation of roles and responsibilities, outlines the project objectives, identifies the main stakeholders, and defines the authority of the project manager
Security Management information security is more than just protecting hardware and software from from being crashed, it is about protecting the information resources that keep the company operating
Man-in-the-Middle attacker makes independent connections with the victim and relays messages between them, making them believe that they are talking directly to each other over private connection, when in fact entire conversation is controlled by the attacker.
Denial of Service an attempt to make a computer resource unavailable to its intended users. Prevent website or service from functioning efficiently or at all, temporarily or indefinitely.
Trojan Horse is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system
Network sniffing trying to read or intercept information
Spoofing an e-mail that directs you to a different website
non-repudiation preventing parties from denying actions they have taken
Encryption using an algorithm to make plain text unreadable to anyone that has a key
Business Continuity Involves not only disaster recover, but also having back-up work procedures and office space for displaced employees to work with telephone lines and computers so that the business can continue to operate
Computer Viruses a computer program that can replicate itself and spread from one computer to another
Data Mining use of computers to uncover unknown or relations from a large data set
Agent based modeling a simulation technology for studying emergent behavior
Neural Network a the of decision making system organized like the brain
Risk Avoidance identify and eliminate source of perceived risk
Risk limitation implementing controls to contain potential risk effects
risk transfer letting others assume risk (outsourcing)
Big Bang Approach authoritative management style and fixed budget
Improvisation participative management style adjustable budget
Guided Evolution participative management style and fixed budget
Top-Down Coordination authoritative management style and adjustable budget
Critical Success Factors focuses on individual managers and their current information needs. It has become a popular planning approach.
Nolan and Gibson Growth Model Stage 1: early successes Stage 2: Contagion Stage 3: Control Stage 4: Integration
Early successes beginning use of new technology. early successes lead to increased interest and experimentation
Contagion uncontrolled growth adn rapid rise in the use of IT
Control management begins to believe the costs of using the new technology are too high and the variety of approaches generates waste.
Primary Activities inbound logistics, outbound logistics, operations, marketing and sales, service
Supporting Activities Human Resources, Organizational Infrastructure, Technology Development, Procurement
Created by: JazminNava
Popular Business sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards