click below
click below
Normal Size Small Size show me how
MIS 140
| Question | Answer |
|---|---|
| business over the internet | e-commerce |
| formal business plan | path-to-profitability |
| business with a presence in the real world too | click-and-mortar |
| business with only a presence in the virtual world | click-and-order |
| the ability of an organization to give its customers a tailored product or service | mass customization |
| combination of purchase requests from multiple buyers to get a larger supplier discount | demand aggregation |
| materials used in production or retail | direct materials |
| buyer posts specifications and recieves bids from sellers | reverse auction |
| place where multiple buyers and sellers can engage in e-commerce | e-marketplace |
| set of marketing tools used by a business to achieve its marketing goals | marketing mix |
| encourages users to encourage friends to participate as well | viral marketing |
| arrangement between two e-commerce sites that directs viewers from one site to the other | affiliate program |
| count of the number of people who click on an ad to be taken to that site | click-through |
| percentage of potential customers who visit your site and actually buy something | conversion rate |
| internet company that makes payment online easier | financial cybermediary |
| scrambiling the contents of a file so that you can't read it without having a key | encryption |
| businesses come to you via technology | push technologies |
| in-house specialists develop IT systems | insourcing |
| development of IT systems by the end user or knowledge worker | selfsourcing |
| delegation of work to a third party | outsourcing |
| structured step-by-step approach to developing information systems | systems development life cycle |
| building a model that demonstrates the features of a proposed product, service, or system | prototyping |
| simple model of a proposed product, service, or system | prototype |
| formal document that describes in detail the requirements for a proposed system that will be submitted for bids for development | request for proposal |
| creating a solid plan for developing your information system | planning |
| gathering, understanding, and documenting the business requirements | analysis |
| building a technical blueprint of how the proposed system will work | design |
| taking all the design documents and transforming them into an actual system | development |
| verifying that the system works and meets all requirements | testing |
| distributing and using the new system | implementation |
| monitoring and supporting the new system | maintenance |
| systematic process for finding new IT systems | systems planning |
| factors that can be monetarily quantified | tangible cost |
| factors that cannot be monetarily quantified | intangible cost |
| possibility that a system will not achieve the predicted benefits | IT systems risk |
| calculates a measure of IT systems value | capital investment analysis |
| principles and standards that guide our behavior toward other people | ethics |
| intangible creative work that is embodied in physical form | intellectual property |
| legal protection of intellectual property | copyright |
| says you may use copyrighted material in certain situations | fair use doctrine |
| unauthorized use of copyrighted software | pirated software |
| software that tracks every keystroke or mouse click | key logger software |
| forging someones identity for fraud | identity theft |
| gaining personal information for the purpose of identity theft, usually by email | phishing |
| rerouting of your request to an illigitimate website made to look like the real one | pharming |
| small file containing info about you and your website activities | cookie |
| unsolicited junk email | spam |
| software that generates ads that install on your computer when you download some other program | adware |
| software you don't want hidden inside software you do want | trojan horse software |
| malicious software that collects information about you and reports it to someone without your permission | spyware |
| records one line for every visitor to a website | web log |
| records information during a web surfing session | clickstream |
| software written to cause damage | virus |
| virus that spreads itself from computer to computer | worm |
| use of physiological characteristics to provide identification | biometrics |
| converts URLs to IP addresses | domain name server |
| connection of 2 or more IT components | network |
| electronic movement of information | telecomminications |
| degree to which you can increase or decrease capacity of a network | scalability |
| an organization's private internet | intranet |
| security software that protects against outside access | firewall |
| the paths over which info travels | communications media |
| the range of frequencies available on a communications medium | bandwidth |
| collection, authentication, preservation, and examination of electronic information for presentation in court | computer forensics |
| exact copy of an electronic medium | forensic image copy |
| unique number that is based on the contents of the medium | MD5 hashvalue |