Busy. Please wait.
Log in with Clever

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever

Username is available taken
show password

Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Didn't know it?
click below
Knew it?
click below
Don't Know
Remaining cards (0)
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

DAC1 WGU Terms B

3-tier infrastructure the most common approach used for Web applications today.
Ad hoc (nonrecurring) decision decision you make infrequently (perhaps only once) and for which you may even have different criteria for determining the best solution for each time.
Affiliate program an arrangement made between two e-commerce sites that directs viewers from one site to the other.
Agent-based modeling way of simulating human organizations using multiple intelligent agents, each of which follows a set of simple rules and can adapt to changing conditions.
Agent-based technology (software agent) a small piece of software that acts on your behalf (on behalf of another piece of software) performing tasks assigned to it.
Agile methodology a form of extreme programming that aims for customer satisfaction through early and continuous delivery of useful software components.
Analysis phase of the systems development life cycle involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system.
Analytics the science of fact-based decision making.
Application generation subsystem of a DBMS contains facilities to help you develop transaction-intensive applications.
Arithmetic logic unit (ALU) a component of the CPU that performs arithmetic, as well as comparison and logic operations.
Autonomous agent software agent that can adapt and alter the manner in which it attempts to achieve its assigned task.
Basic formatting tag HTML tag that allows you to specify formatting for text.
Biomimicry learning from ecosystems and adapting their characteristics to human and organizational situations.
Black-hat hacker a cyber vandal.
Bot computer program that runs automatically.
Browser-safe colors 215 colors that can be viewed by all browsers and computers.
Business requirement a detailed set of knowledge worker requests that the system must meet to be successful.
Buyer agent or shopping bot an intelligent agent on a Web site that helps you, the customer, find the products and services you want.
Buyer power in Porter’s Five Forces Model it is high when buyers have many choices from whom to buy, and low when their choices are few.
Byte a group of eight bits that represents one natural language character.
Choice the third step in the decision-making process where you decide on a plan to address the problem or opportunity.
Class contains information and procedures and acts as a template to create objects.
Client/server infrastructure (client/server network) a network in which one or more computers are servers and provide services to the other computers, called clients.
Collocation facility available to a company that rents space and telecommunications equipment from another company.
CompactFlash (CF) card a flash memory card that is slightly larger than a half-dollar, with a capacity of up to 6 gigabytes.
Component-based development (CBD) a general approach to systems development that focuses on building small self-contained blocks of code (components) that can be reused across a variety of applications within an organization.
Composite primary key consists of the primary key fields from the two intersecting relations.
Constant a named element whose value doesn’t change.
Control unit the component of the CPU that directs what happens in your computer, sends to RAM for instructions and the information it needs.
Cost-per-thousand (CPM) sales dollars generated per dollar of advertising, commonly used to make the case for spending money to appear on a search engine.
CPU (machine) cycle consists of retrieving, decoding, and executing the instruction, then returning the result to RAM, if necessary.
CPU cache a type of memory on the CPU where instructions called up by the CPU wait until the CPU is ready to use them.
CPU clock a sliver of quartz that beats at regular intervals in response to an electrical charge.
Cracker a hacker for hire; a person who engages in electronic corporate espionage.
Critical success factor (CSF) a factor simply critical to your organization’s success.
CRM analytics the analysis of CRM data to improve functions such as sales force automation and customer service and support.
Crossover the process within a genetic algorithm where portions of good outcomes are combined in the hope of creating an even better outcome.
Crowdsourcing when businesses provide technologies that enable people (i.e., crowds)—instead of a designated paid employee—to create, modify, and oversee the development of a product or service.
CRT a monitor that looks like a traditional television set.
CRUD (Create, Read, Update, Delete) the four procedures, or ways, a system can manipulate information.
Custom Filter function allows you to hide all the rows in a list except those that match criteria, besides “is equal to,” that you specify.
Customer relationship management (CRM) system uses information about customers to gain insights into their needs, wants, and behaviors in order to serve them better.
Cyberterrorist one who seeks to cause harm to people or destroy critical systems or information.
Data administration the function in an organization that plans for, oversees the development of, and monitors the information resource.
Data administration subsystem of a DBMS helps you manage the overall database environment by providing facilities for backup and recovery, security management, query optimization, concurrency control, and change management.
Data definition subsystem of a DBMS helps you create and maintain the data dictionary and define the structure of the files in a database.
Data management component of a DSS that performs the function of storing and maintaining the information that you want your DSS to use.
Data manipulation subsystem of a DBMS helps you add, change, and delete information in a database and query it for valuable information.
Data mart a subset of a data warehouse in which only a focused portion of the data warehouse information is kept.
Data warehouse a logical collection of information—gathered from many different operational databases—used to create business intelligence that supports business analysis activities and decision-making tasks.
Database a collection of information that you organize and access according to the logical structure of that information.
Database administration the function in an organization that is responsible for the more technical and operational aspects of managing the information contained in organizational information repositories (databases, data warehouses, and data marts).
Database management system (DBMS) helps you specify the logical organization for a database and access and use the information within a database.
Data-mining agent an intelligent agent that operates in a data warehouse discovering information.
Data-mining tool a software tool you use to query information in a data warehouse.
DBMS engine accepts logical requests from the various other DBMS subsystems, converts them into their physical equivalent, and actually accesses the database and data dictionary as they exist on a storage device.
Decision support system (DSS) a highly flexible and interactive IT system that is designed to support decision making when the situation includes nonstructured element.
Demand aggregation the combining of purchase requests from multiple buyers into a single larger order, which justifies a discount from the business.
Denial-of-service (DoS) attack floods a server or network with so many requests for service that it slows down or crashes.
Design the second step in the decision-making process, where you consider possible ways of solving the problem, filling the need, or taking advantage of the opportunity.
Direct materials materials that are used in production in a manufacturing company or are placed on the shelf for sale in a retail environment.
Disaster recovery cost curve charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time.
Disintermediation use of the Internet as a delivery vehicle, whereby intermediate players in a distribution channel can be bypassed.
Disk optimization software utility software that organizes your information on your hard disk in the most efficient way.
Distributed agent software agent that works on multiple distinct computer systems.
Distributed denial-of-service (DDoS) attack attack from multiple computers that floods a server or network with so many requests for service that it slows down or crashes.
Distributed infrastructure involves distributing the information and processing power of IT systems via a network.
Distribution chain the path followed from the originator of a product or service to the end consumer.
Domain name (technical name for a Web site address) identifies a specific computer on the Web and the main page of the entire site.
DS3 a high-speed business network circuit running at 44.736 Mbps.
Effectiveness refers to doing the right thing.
Efficiency doing something right (e.g., in the least time, at the lowest cost, with the fewest errors, etc.).
E-gallery electronic gallery of works that demonstrates your skills.
Electronic Bill Presentment and Payment (EBPP) a system that sends bills (usually to end consumers) over the Internet and provides an easy-to-use mechanism (such as clicking on a button) to pay them if the amount looks correct.
Electronic marketplace (e-marketplace) an interactive business providing a central space where multiple buyers and sellers can engage in e-commerce and/or other e-commerce business activities.
Electronic portfolio (e-portfolio) collection of Web documents used to support a stated purpose such as demonstrating writing, photography, or job skills.
Encapsulation information hiding.
Enterprise resource planning (ERP) system software system for business management, supporting areas such as planning, manufacturing, sales, marketing, distribution, accounting, finance, human resource management, project management, inventory management, service and maintenance, transportation, a
Entity class a concept—typically people, places, or things—about which you wish to store information and that you can identify with a unique key (called a primary key).
Entity-relationship (E-R) diagram a graphic method of representing entity classes and their relationships.
Entry barrier a product or service feature that customers have come to expect from organizations in a particular industry and that must be offered by an entering organization to compete and survive.
Expert system (knowledge-based system) an artificial intelligence system that applies reasoning capabilities to reach a conclusion.
Extraction, transformation, and loading (ETL) a three-step process that includes: (1) extracting needed data from its sources, (2) transforming the data into a standardized format, and (3) loading the transformed data into a data warehouse.
Extreme programming (XP) methodology breaks a project into tiny phases and developers cannot continue on to the next phase until the first phase is complete.
Fair Use Doctrine allows you to use copyrighted material in certain situations.
Feature analysis captures your words as you speak into a microphone, eliminates any background noise, and converts the digital signals of your speech into phonemes (syllables).
File transfer protocol (ftp) communications protocol that allows you to transfer files of information from one computer to another.
Filter function filters a list and allows you to hide all the rows in a list except those that match criteria you specify.
Financial cybermediary an Internet-based company that makes it easy for one person to pay another person or organization over the Internet.
Financial EDI (financial electronic data interchange) an electronic process used primarily within the Business to Business e-commerce model for the payment of purchases.
Firewire (IEEE 1394 or I-Link) port fits hot-swap, plug-and-play Firewire connectors and you can connect up to 63 Firewire devices to a single Firewire port by daisy-chaining the devices together.
First call resolution (FCR) the percentage of calls that can be resolved without having to call back.
First-mover advantage being the first to market with a competitive advantage and thus having a significant impact on gaining market share.
Five Forces Model helps business people understand the relative attractiveness of an industry and the industry’s competitive pressures.
Focus (in Porter’s three generic strategies) focusing on offering products and services (1) to a particular market segment or buyer group, (2) within a segment of a product line, and/or (3) to a specific geographic market.
Foreign key a primary key of one file (relation) that appears in another file (relation).
Forensic image copy an exact copy or snapshot of the contents of an electronic medium.
Friendly fraud identity theft when the victim knows the person who stole his/her identity.
Ftp (file transfer protocol) server maintains a collection of files that you can download.
Function procedure a VBA macro that returns a single value.
Genetic algorithm an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.
Geographic information system (GIS) a decision support system designed specifically to analyze spatial information.
Gigabyte (GB or Gig) roughly 1 billion bytes.
Gigahertz (GHz) the number of billions of CPU cycles per second that the CPU can handle.
Goal Seek works backward from an objective to compute an unknown value.
Good-enough technology economy marked by the lack of seeking perfection, focusing rather on getting “good enough” products out the door, often allowing them to evolve and improve over time through user feedback.
Horizontal e-marketplace an electronic marketplace that connects buyers and sellers across many industries, primarily for MRO materials commerce.
Horizontal market software application software that is general enough to be suitable for use in a variety of industries.
Hot swap an operating system feature that allows you—while your computer is running—to unplug a device and plug in a new one without first shutting down your computer.
HTML document a file that contains your Web site content and HTML formatting instructions.
HTML tag specifies the formatting and presentation of information on a Web site.
Hub a device that connects computers together and passes messages by repeating all network transmissions to all the other computers.
Hypertext markup language (HTML) the language you use to create a Web site.
Hypertext transfer protocol (http) the communications protocol that supports the movement of information over the Web.
Information agent intelligent agent that searches for information of some kind and brings it back.
Information decomposition breaking down the information and procedures for ease of use and understandability.
Infrastructure-as-a-service (IaaS) delivery model for all the “extra” technologies necessary in a networked environment (e.g., network routers, communications servers, firewalls, anti-”you name it” software) in which you pay for the technologies on a pay-per-use basis instead of buying the
Infrastructure-centric metric is typically a measure of the efficiency, speed, and/or capacity of technology.
Inheritance the ability to define superclass and subclass relationships among classes.
Instance an occurrence of an entity class that can be uniquely described with a primary key.
Integrated collaboration environment (ICE) the environment in which virtual teams do their work.
Integrity constraint rule that helps ensure the quality of the information.
Intellectual property intangible creative work that is embodied in physical form.
Intelligence the first step in the decision-making process where you find or recognize a problem, need, or opportunity (also called the diagnostic phase of decision making).
Intelligent agent software agent that incorporates artificial intelligence capabilities such as learning and reasoning; software that assists you, or acts on your behalf, in performing repetitive computer-related tasks.
Interoperability the capability of two or more computing components to share information and other resources, even if they are made by different manufacturers.
Intersection relation (composite relation) a relation you create to eliminate a many-to-many relationship.
Intrusion detection system (IDS) a device that watches network traffic for intrusion attempts and reports them.
Intrusion prevention system (IPS) type of intrusion detection system (IDS) that also takes action against intrusion attempts, for example, by creating new policies in a firewall to block the source of the attack.
Intrusion-detection software looks for people on the network who shouldn’t be there or who are acting suspiciously.
Invisible backlog the list of all systems that an organization needs to develop but—because of the prioritization of systems development needs—never get funded because of the lack of organizational resources.
IRC (Internet Relay Chat) server supports your use of discussion groups and chat rooms.
Knowledge management (KM) system an IT system that supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization.
Knowledge-based system (expert system) an artificial intelligence system that applies reasoning capabilities to reach a conclusion.
Legacy information system (LIS) represents a massive, long-term business investment; such systems are often brittle, slow, and nonextensible.
Linux an open-source operating system that provides a rich operating environment for high-end workstations and network servers.
List a collection of information arranged in columns and rows in which each column displays one particular type of information.
List definition table a description of a list by column.
Location mashup a geographic information system (GIS) that displays a particular geographic area and then overlays content according to the user’s desires.
Location-based services (social locationing) the use of a mobile device and its location (as determined by GPS) to check into locations such as businesses and entertainment venues, find friends and their locations, and receive rewards and take advantage of “specials” based on location.
Logical view focuses on how you as a knowledge worker need to arrange and access information to meet your particular business needs.
Long Tail refers to the tail of a sales curve—first offered by Chris Anderson, editor-in-chief of Wired Magazine, as a way of explaining e-commerce profitability.
Looping repeating a block of statements or code numerous times.
Macro language a programming language that includes built-in commands that mimic the functionality available from menus and dialog boxes within an application.
Management information systems (MIS) deals with the planning for, development, management, and use of information technology tools to help people perform all tasks related to information processing and management.
Mashup a combination of content from more than one source.
Mass customization the ability of an organization to give its customers the opportunity to tailor its product or service to the customers’ specifications.
Massively multiplayer online role-playing game (MMORPG) a game in which thousands or perhaps millions of people play and interact in a robust virtual world.
M-commerce the term used to describe electronic commerce conducted over a wireless device such as a cell phone, PDA, or notebook.
MD5 hash value a mathematically generated string of 32 letters and digits that is unique for an individual storage medium at a specific point in time.
Message how objects communicate with each other.
Minicomputer (mid-range computer) a computer designed to meet the computing needs of several people simultaneously in a small to medium-size business environment.
Mobile agent software agent that can relocate itself onto different computer systems.
Mobile analytics the analysis of data related to the use of mobile devices by customers and employees.
Mobisode short one-minute video clips of TV shows designed for viewing on a small cell phone screen.
Model management component of a DSS that consists of both the DSS models and the DSS model management system.
Monitoring-and-surveillance agent (predictive agent) intelligent agent that constantly observes and reports on some entity of interest, that could, for example, be a network or manufacturing equipment.
Multi-channel service delivery the term that describes a company’s offering of multiple ways in which customers can interact with it.
Multidimensional analysis (MDA) tool slice-and-dice technique that allows you to view multidimensional information from different perspectives.
MultiMediaCard (MMC) flash memory card that looks identical to an SD card (but SD cards have copy protection built-in), is a little larger than a quarter, and is slightly thicker than a credit card.
Multi-state CPU works with information represented in more than just two states, probably 10 states with each state representing a digit between 0 and 9.
Multi-tenancy multiple people simultaneously using a single instance of a piece of software.
Mutation the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcomes.
Network access point (NAP) a point on the Internet where several connections converge.
Network hub a device that connects multiple computers into a network.
Network interface card (NIC) an expansion card for a desktop computer or a PC card for a notebook computer that connects your computer to a network and provides the doorway for information to flow in and out.
Network service provider (NSP) such as MCI or AT&T, owns and maintains routing computers at NAPs and even the lines that connect the NAPs to each other.
Neural network (artificial neural network or ANN) an artificial intelligence system that is capable of finding and differentiating patterns.
Nonstructured decision a decision for which there may be several “right” answers and there is no precise way to get a right answer.
Normalization process of assuring that a relational database structure can be implemented as a series of two-dimensional tables.
N-tier infrastructure balances the work of the network over several different servers.
Object an instance of a class.
Objective information quantifiably describes something that is known.
Object-oriented approach combines information and procedures into a single view.
Object-oriented database works with traditional database information and also complex data types such as diagrams, schematic drawings, video, and sound and text documents.
Object-oriented programming language a programming language used to develop object-oriented systems.
Online analytical processing (OLAP) the manipulation of information to support decision making.
Online transaction processing (OLTP) the gathering of input information, processing that information, and updating existing information to reflect the gathered and processed information.
Operational database a database that supports OLTP.
Optical character reader reads characters that appear on a page or sales tag (often used in point-of-sale [POS] systems in retail environments).
Optical mark reader detects the presence or absence of a mark in a predetermined spot on the page (often used for true/false and multiple choice exams answers).
Optical storage media plastic discs on which information is stored, deleted, and/or changed using laser light.
Organic light emitting diode (OLED) uses many layers of organic material emitting a visible light and therefore eliminating the need for backlighting.
Overall cost leadership (in Porter’s three generic strategies) offering the same or better quality product or service at a price that is less than what any of the competition is able to do.
Path-to-profitability (P2P) a formal business plan that outlines key business issues such as customer targets (by demographic, industry, etc.), marketing strategies, operations strategies (e.g., production, transportation, and logistics), and projected targets for income- statement
Pattern classification matches your spoken phonemes to a phoneme sequence stored in an acoustic model database.
Peer-to-peer collaboration software permits users to communicate in real time and share files without going through a central server.
Personal information management software (PIM) helps you create and maintain (1) to-do lists, (2) appointments and calendars, and (3) points of contact.
Personal software-as-a-service (personal SaaS) a delivery model for personal productivity software such as Microsoft Office in which you pay for personal productivity software on a pay-per-use basis instead of buying the software outright.
Pharming the rerouting of your request for a legitimate Web site, that is, you type in the correct address for your bank and are redirected to a fake site that collects information from you.
Physical view deals with how information is physically arranged, stored, and accessed on some type of storage device such as a hard disk.
Platform-as-a-service (PaaS) a delivery model for software identical to SaaS with the additional features of (1) the ability to customize data entry forms, screens, reports, and the like and (2) access to software development tools to alter the way in which the software works by addi
Plotter form output by moving a pen across the surface of a piece of paper.
Plunge implementation discarding the old system completely and immediately using the new system.
Polymorphism to have many forms.
Portable document format (PDF) standard electronic distribution file format.
Portable document format (PDF) résumé a standard electronic distribution format typically used for e-mailing.
Prediction goal the question you want addressed by the predictive analytics model.
Prediction indicator specific measurable value based on an attribute of the entity under consideration.
Predictive analytics uses a variety of decision tools and techniques—such as neural networks, data mining, decision trees, and Bayesian networks—to analyze current and historical data and make predictions about the likelihood of the occurrence of future events.
Primary key a field (or group of fields in some cases) that uniquely describes each record.
Procedure manipulates or changes information.
Procedure view contains all of the procedures within a system.
Proof-of-concept prototype a prototype you use to prove the technical feasibility of a proposed system.
Prototyping the process of building a model that demonstrates the features of a proposed product, service, or system.
PS/2 port fits PS/2 connectors, which you often find on keyboards and mice.
Public key encryption (PKE) an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient.
Rapid application development methodology (RAD, rapid prototyping) emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.
Recurring decision a decision that you have to make repeatedly and often periodically, whether weekly, monthly, quarterly, or yearly.
Relation describes each two-dimensional table or file in the relational model (hence its name relational database model).
Relational database uses a series of logically related two-dimensional tables or files to store information in the form of a database.
Report generator helps you quickly define formats of reports and what information you want to see in a report.
Requirement recovery document a detailed document which describes (1) the distinction between critical and noncritical IT systems and information, (2) each possible threat, and (3) the possible worst-case scenarios that can result from each disaster.
Requirements definition document defines all the business requirements and prioritizes them in order of business importance.
Response time average time to respond to a user-generated event, such as a request for a report, a mouse click, and so on.
Reverse auction the process in which a buyer posts its interest in buying a certain quantity of items with notations concerning quality, specification, and delivery timing, and sellers compete for the business by submitting successively lower bids until there is only one
RFID (radio frequency identification) uses a microchip (chip) in a tag or label to store information, and information is transmitted from, or written to, the tag or label when the microchip is exposed to the correct frequency of radio waves.
Rivalry among existing competitors in the Five Forces Model is high when competition is fierce in a market, and low when competition is more complacent.
Rootkit software that gives you administrator rights to a computer or network whose purpose is to allow you to conceal processes, files, or system data, from the operating system.
Run-grow-transform (RGT) framework an approach in which you allocate in terms of percentages how you will spend your IT dollars on various types of business strategies.
Scalability refers to how well your system can adapt to increased demands.
Scannable (or ASCII) résumé a paper résumé without any formatting that becomes electronic when it is scanned into a computer.
Search engine a facility on the Web that helps you find sites with the information and/or services you want.
Search engine optimization (SEO) improving the visibility of a Web site through the use of tags and key terms found by search engines.
Secure Digital (SD) card flash memory card that looks identical to an MMC card (but SD cards have copy protection built-in), is a little larger than a quarter, and is slightly thicker than a credit card.
Secure Electronic Transaction (SET) a transmission security method that ensures transactions are legitimate as well as secure.
Secure Sockets Layer (SSL) creates a secure and private connection between a Web client computer and a Web server computer, encrypts the information, and then sends the information over the Internet.
Selection the process within a genetic algorithm that gives preference to better outcomes.
Selling prototype a prototype you use to convince people of the worth of a proposed system.
Service level specification (SLS) or service level objective (SLO) supporting document to a service level agreement that clearly defines key metrics for success regarding the SLA.
Service-oriented architecture (SOA or SoA) a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code (called services) to meet all the application software needs of an organization.
Skill words nouns and adjectives used by organizations to describe job skills which should be woven into the text of an applicant’s résumé.
Slack space the space left over from the end of the file to the end of the cluster.
Social media analytics the analysis of data related to social media use, mainly by customers or competitors, to help an organization better understand the interaction dynamics of itself with its customers and also to help an organization scan social media for competitive intell
Spoofing the forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.
Steganography the hiding of information inside other information.
Storage area network (SAN) an infrastructure for building special, dedicated networks that allow rapid and reliable access to storage devices by multiple servers.
Structure tag HTML tag that sets up the necessary sections and specifies that the document is indeed an HTML document.
Structured decision a decision where processing a certain kind of information in a specified way will always get you the right answer.
Structured query language (SQL) a standardized fourth-generation query language found in most DBMSs.
Sub procedure computer code that performs some action on or with objects.
Subjective information attempts to describe something that is unknown.
Supplier power in the Five Forces Model is high when buyers have few choices from whom to buy, and low when their choices are many.
Swarm (collective) intelligence collective behavior of groups of simple agents that are capable of devising solutions to problems as they arise, eventually leading to coherent global patterns.
Switching cost a cost that makes customers reluctant to switch to another product or service supplier.
System availability usually measured inversely as downtime, or the average amount of time a system is down and unavailable to end users and customers.
System bus electrical pathways that move information between basic components of the motherboard, including between RAM and the CPU.
System software handles tasks specific to technology management and coordinates the interaction of all technology devices.
System testing verifies that the units or pieces of code written for a system function correctly when integrated into the total system.
Systems development life cycle (SDLC) a structured step-by-step approach for developing information systems.
TCP/IP (Transport control protocol/Internet protocol) the primary protocol for transmitting information over the Internet.
Technical architecture defines the hardware, software, and telecommunications equipment required to run the system.
Technology-literate knowledge worker person who knows how and when to apply technology.
Text analytics process of using statistical, artificial intelligence, and linguistic techniques to convert information content in textual sources—like surveys, e-mails, blogs, and social media—into structured information.
Threat of new entrants in the Five Forces Model is high when it is easy for new competitors to enter a market, and low when there are significant entry barriers to entering a market.
Threat of substitute products or services in the Five Forces Model is high when there are many alternatives to a product or service, and low when there are few alternatives from which to choose.
Tiered infrastructure (layer infrastructure) the IT system is partitioned into tiers (or layers) where each tier (or layer) performs a specific type of functionality.
Time service factor (TSF) the percentage of calls answered within a specific time frame, such as 30 or 90 seconds.
Top-level domain (TLD) extension of a Web site address that identifies its type.
Traditional technology approach has two primary views of any computer-based system—information and procedures—and it keeps these two views separate and distinct at all times.
Transaction speed the speed at which a system can process a transaction.
Twitter jockey person who focuses on Twitter to communicate with customers, sponsors, business partners, and the like.
U3 Smart drive looks like and is a USB flash drive, but it stores and can launch and run software on any computer.
Ubiquitous computing computing and technology support anytime, anywhere with access to all needed information and access to all business partners, both internal and external to the organization.
Unallocated space the set of clusters that have been set aside to store information, but have not yet received a file, or still contain some or all of a file marked as deleted.
Uniform resource locator (URL) an address for a specific Web page or document within a Web site.
User acceptance testing (UAT) determines if the system satisfies the business requirements and enables knowledge workers to perform their jobs correctly.
User agent (personal agent) an intelligent agent that takes action on your behalf.
User interface management component of a DSS that allows you to communicate with the DSS.
Value-added network (VAN) B2B service that offers information-sharing intermediary services between organizations based on various standards regarding the format of the information and how it will be sent and received.
Variable a place to store a piece of information.
Vertical e-marketplace an electronic marketplace that connects buyers and sellers in a given industry (e.g., oil and gas, textiles, and retail).
Vertical market software application software that is unique to a particular industry.
View allows you to see the contents of a database file, make whatever changes you want, perform simple sorting, and query to find the location of specific information.
Viral marketing encourages users of a product or service supplied by a B2C e-commerce business to encourage friends to join in as well.
Virtual good nonphysical object.
Virtual private network (VPN) uses encryption to protect the confidentiality of all network transmissions between two endpoints.
Visual Basic Editor (VBE) a separate application where you write and edit your Visual Basic macros.
Waterfall methodology a sequential, activity-based process in which one phase in the SDLC is followed by another from planning through implementation.
Web 3.0 third-generation of the Web focused on semantics.
Web authoring software helps you design and develop Web sites and pages that you publish on the Web.
Web browser software enables you to surf the Web.
Web-centric metric a measure of the success of your Web and e-business initiatives.
Wiki a Web site that allows you—as a visitor—to create, edit, change, and often eliminate content.
Wired communications media transmit information over a closed, connected path.
Worm a type of virus that replicates and spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic.
xD-Picture (xD) card flash memory card that looks like a rectangular piece of plastic smaller than a penny and about as thick, with one edge slightly curved.
Created by: wbellah
Popular Management sets




Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
restart all cards