Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

MIS 140

QuestionAnswer
business over the internet e-commerce
formal business plan path-to-profitability
business with a presence in the real world too click-and-mortar
business with only a presence in the virtual world click-and-order
the ability of an organization to give its customers a tailored product or service mass customization
combination of purchase requests from multiple buyers to get a larger supplier discount demand aggregation
materials used in production or retail direct materials
buyer posts specifications and recieves bids from sellers reverse auction
place where multiple buyers and sellers can engage in e-commerce e-marketplace
set of marketing tools used by a business to achieve its marketing goals marketing mix
encourages users to encourage friends to participate as well viral marketing
arrangement between two e-commerce sites that directs viewers from one site to the other affiliate program
count of the number of people who click on an ad to be taken to that site click-through
percentage of potential customers who visit your site and actually buy something conversion rate
internet company that makes payment online easier financial cybermediary
scrambiling the contents of a file so that you can't read it without having a key encryption
businesses come to you via technology push technologies
in-house specialists develop IT systems insourcing
development of IT systems by the end user or knowledge worker selfsourcing
delegation of work to a third party outsourcing
structured step-by-step approach to developing information systems systems development life cycle
building a model that demonstrates the features of a proposed product, service, or system prototyping
simple model of a proposed product, service, or system prototype
formal document that describes in detail the requirements for a proposed system that will be submitted for bids for development request for proposal
creating a solid plan for developing your information system planning
gathering, understanding, and documenting the business requirements analysis
building a technical blueprint of how the proposed system will work design
taking all the design documents and transforming them into an actual system development
verifying that the system works and meets all requirements testing
distributing and using the new system implementation
monitoring and supporting the new system maintenance
systematic process for finding new IT systems systems planning
factors that can be monetarily quantified tangible cost
factors that cannot be monetarily quantified intangible cost
possibility that a system will not achieve the predicted benefits IT systems risk
calculates a measure of IT systems value capital investment analysis
principles and standards that guide our behavior toward other people ethics
intangible creative work that is embodied in physical form intellectual property
legal protection of intellectual property copyright
says you may use copyrighted material in certain situations fair use doctrine
unauthorized use of copyrighted software pirated software
software that tracks every keystroke or mouse click key logger software
forging someones identity for fraud identity theft
gaining personal information for the purpose of identity theft, usually by email phishing
rerouting of your request to an illigitimate website made to look like the real one pharming
small file containing info about you and your website activities cookie
unsolicited junk email spam
software that generates ads that install on your computer when you download some other program adware
software you don't want hidden inside software you do want trojan horse software
malicious software that collects information about you and reports it to someone without your permission spyware
records one line for every visitor to a website web log
records information during a web surfing session clickstream
software written to cause damage virus
virus that spreads itself from computer to computer worm
use of physiological characteristics to provide identification biometrics
converts URLs to IP addresses domain name server
connection of 2 or more IT components network
electronic movement of information telecomminications
degree to which you can increase or decrease capacity of a network scalability
an organization's private internet intranet
security software that protects against outside access firewall
the paths over which info travels communications media
the range of frequencies available on a communications medium bandwidth
collection, authentication, preservation, and examination of electronic information for presentation in court computer forensics
exact copy of an electronic medium forensic image copy
unique number that is based on the contents of the medium MD5 hashvalue
Created by: emz739
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards