Term
|
Definition
a method for confirming users’ identities- 3 levels of security : (1) what they know, (2) something they have, or (3) biometrics |
|
|
Term
|
Definition
-the process of giving someone permission to do or have something. |
|
|
Term
|
Definition
the amount of times that a user chooses to back up their files or website media. |
|
|
Term
|
Definition
- the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting. |
|
|
Term
|
Definition
occurs when organizations use software that filters content to prevent the transmission of unauthorized information |
|
|
Term
|
Definition
floods a site with so many requests for service that it slows down or crashes the site |
|
|
Term
|
Definition
scrambles information into an alternative form that requires a key or password to decrypt the information |
|
|
Term
|
Definition
hardware and/or software that guards a private network by analyzing the information leaving and entering the network (between server and internet) |
|
|
Term
|
Definition
hackers that lack expertise to hack on their own so they find it on the internet |
|
|
Term
|
Definition
attack computer systems by transmitting a virus hoax with a real virus attached, people more readily send them along and thus it affects more people |
|
|
Term
|
Definition
-a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
|
Definition
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident. |
|
|
Term
Intrusion detection software |
|
Definition
searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm |
|
|
Term
|
Definition
a virus, worm, trojan horse, or spyware |
|
|
Term
|
Definition
consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network |
|
|
Term
|
Definition
a technique to gain personal information for the purpose of identity theft |
|
|
Term
|
Definition
content filters, encryption, firewalls |
|
|
Term
|
Definition
antivirus software(The most effective) |
|
|
Term
|
Definition
a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing |
|
|
Term
|
Definition
a program or device that can monitor data traveling over a network, shows all the data being transmitted including passwords and sensitive information |
|
|
Term
|
Definition
using ones social skills to trick people into revealing access credentials or other information valuable to the attacker, also includes dumpster diving and going through trash |
|
|
Term
|
Definition
forging of the return address on an email so that the email message appears to come from someone other than the actual sender, easier way to get people to open attached viruses |
|
|
Term
|
Definition
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses the CPU and storage for some task the user knows nothing about |
|
|
Term
|
Definition
- small electronic devices that change user passwords automatically |
|
|
Term
|
Definition
hides inside other software, usually as an attachment (that is downloaded) or a downloadable file |
|
|
Term
|
Definition
software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
- A type of virus that spreads itself not only from file to file, but also from computer to computer. *can come from email attachments |
|
|
Term
|
Definition
- grammatically incorrect code |
|
|
Term
SDLC (Systems Development Life Cycle) |
|
Definition
Planning, Analysis, Design, Development, Testing, Implementation, and Maintenance |
|
|
Term
|
Definition
involves establishing a high-level plan of the intended project and determining project goals. Steps include: 1.Identify and select the system for development (choose waterfall, RAD, extreme programming, agile, etc) work is not done here, it is only selected 2.Assess project feasibility 3.Develop the project plan 4. Recruit project members |
|
|
Term
|
Definition
1.Identify and select the system for development (choose waterfall, RAD, extreme programming, agile, etc) work is not done here, it is only selected 2.Assess project feasibility 3.Develop the project plan 4. Recruit project members |
|
|
Term
|
Definition
involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system Primary analysis activities include: 1.Gather business requirements 2.Create process diagrams 3.Perform a buy vs. build analysis |
|
|
Term
|
Definition
1.Gather business requirements 2.Create process diagrams 3.Perform a buy vs. build analysis |
|
|
Term
|
Definition
involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation Primary design activities include: 1.Design the IT infrastructure 2.Design system models |
|
|
Term
|
Definition
1.Design the IT infrastructure 2.Design system models |
|
|
Term
SDLC Development/Construction |
|
Definition
)- involves taking all of the detailed design documents from the design phase and transforming them into the actual system. A PROTOTYPE! |
|
|
Term
Steps of SDLC Development/Construction |
|
Definition
1.Develop the IT infrastructure 2.Develop the database and programs |
|
|
Term
|
Definition
- involves bringing all the project pieces together into a special testing environment to test for errors, bugs, and interoperability, in order to verify that the system meets all the business requirements defined in the analysis phase. Involves integration - Does it work with other systems already in place? |
|
|
Term
|
Definition
1.Write the test conditions 2.Perform the system testing |
|
|
Term
|
Definition
involves placing the system into production so users can begin to perform actual business operations with the system |
|
|
Term
Steps in SDLC Implementation |
|
Definition
1.Write detailed user documentation 2.Determine implementation method 3.Provide training for the system users 4. Phased conversion - introducing system changes one piece at a time |
|
|
Term
|
Definition
involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals. Most expensive phase |
|
|
Term
Steps in SDLC Maintenance |
|
Definition
1.Build a help desk to support the system users 2.Perform system maintenance 3.Provide an environment to support system changes |
|
|
Term
Software Development Methodologies |
|
Definition
set of policies, procedures, standards, processes, tools techniques, tasks that people apply to technical and management challenges: 1) Waterfall 2) Rapid Application Development 3) Extreme Programming 4) Agile |
|
|
Term
Waterfall (Software Development Method) |
|
Definition
cascades linearly through the 7 phases; supposed to be all sequential; activity-based process, each phase of SLDC is performed sequentially; inflexible, expensive |
|
|
Term
Rapid Application Development (RAD) (Software Development Method) |
|
Definition
rapid prototyping, interactive user involvement emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes (small scale replica of system) of a system to accelerate the systems development process |
|
|
Term
Extreme Programming (XP) (Software Development Method) |
|
Definition
breaks a project into tiny manageable phases, iterate with user feeback; do tiny parts to completion then move on to next iteration like agile, breaks project into tiny pieces, the faster the communication the faster the results, four parts: planning, designing, coding, testing |
|
|
Term
Agile (Software Development Method) |
|
Definition
variation of XP-small projects delivered quickly and frequently; daily collaboration with users; aims for customer satisfaction through early and continuous delivery of useful components developed by an iterative process; fast, efficient, small, nimble, lower cost, fewer features → they work together all at once |
|
|
Term
Different forms of Implementation: 1) Direct/Plunge 2) Parallel Conversion 3) Phased Conversion 4) Pilot Conversion |
|
Definition
1) Direct/Plunge -- Just switching from old to new 2) Parallel Conversion -- Two systems at the same time and slowly take the old one out 3) Phased Conversion -- Occurs when a new system is implemented one module at a time 4) Pilot conversion -- activate and test the new system in one branch of an organization; way to reduce risk |
|
|
Term
|
Definition
web based tools that make it easy for users to add remove and change content online. |
|
|
Term
|
Definition
An IT based set of tools that support the work of teams by facilitating the sharing and flow of information. (e.g. online meetings, telecommunication, deploying applications etc...) |
|
|
Term
content management system |
|
Definition
- provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment. |
|
|
Term
|
Definition
a company’s main strength |
|
|
Term
digital asset management system |
|
Definition
- though similar to document management, generally works with binary rather than text files, such as multimedia file types |
|
|
Term
|
Definition
Organizations that cannot adapt to the new market are doomed to extinction. |
|
|
Term
|
Definition
situation where not all groups or classes of people have equal opportunity to access the Internet. May have profound impact on what a country can do economically using technology.. |
|
|
Term
|
Definition
A new way of doing things that initially doesn’t meet the needs of current customers. MP3 replaced CD players. (Displaces the original technology. When it starts it usually isn’t as cool or good.) |
|
|
Term
document management system |
|
Definition
supports the electronic capturing, storage disruption, archival, and accessing of documents |
|
|
Term
|
Definition
-the type of knowledge that can be codified |
|
|
Term
|
Definition
software that supports team interaction including calendaring, scheduling, videoconferencing. |
|
|
Term
Hypertext transport protocol |
|
Definition
the Internet standards that supports the exchange of information on the WWW |
|
|
Term
unstructured/information collaboration |
|
Definition
includes doc exchange, shared whiteboards, discussion forums, email |
|
|
Term
|
Definition
- global public network of computer networks that pass information from one to another using common computer protocols |
|
|
Term
knowledge management system |
|
Definition
- Supports the capturing and use of an organization’s know-how |
|
|
Term
|
Definition
standards that specify the format of data as well as the rules to be followed during transmission |
|
|
Term
|
Definition
an evolving extension of the WWW in which web content can be expressed not only in natural language, but also a format that can be read and used by software agents, thus permitting them to find, share, and integrate information more easily |
|
|
Term
service-oriented architecture |
|
Definition
a collection of services that communicate with each other, for example, passing data from one service to another or coordinating an activity between one or more service |
|
|
Term
|
Definition
Something that is a better version of a previous version. Example: If he has a 2 terabyte hard drive, but finds in a year that he is able to sell a 3 terabyte hard drive... |
|
|
Term
|
Definition
knowledge based organizational assets that cannot be codified, but are in people’s heads |
|
|
Term
|
Definition
a set of interactive telecommunication technologies that allow two or more locations to interact via a two-way video and audio transmission simultaneously; a type of groupware |
|
|
Term
|
Definition
a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet -- a more mature, distinctive medium characterized by user participation, openness, and network ethics |
|
|
Term
|
Definition
blends audio, video, and document-sharing technologies to create virtual meetings rooms where people “gather” at a password-protected website |
|
|
Term
web content management systems |
|
Definition
adds an additional layer to document and digital asset management that enables publishing content both to intranets and to public websites |
|
|
Term
|
Definition
web-based tools that make it easy for users to add, remove, and change online content |
|
|
Term
workflow management systems |
|
Definition
facilitate the automation and management of business processes and control the movement of work through the business process |
|
|
Term
Application service provider (ASP) |
|
Definition
offers access over the Internet to systems and related services that would otherwise have to be located in organizational computers |
|
|
Term
Brick-and-morter business |
|
Definition
a business that operates in a physical store without an internet presence |
|
|
Term
Business-to-business (B2B) |
|
Definition
applies to business buying from and selling to each other over the internet; walmart buying from suppliers, biggest source of money out of the four types. |
|
|
Term
Business-to-consumer (B2C) |
|
Definition
applies to any business that sells its products or services to consumers over the internet; Amazon is most known for this type |
|
|
Term
Click-and-morter business |
|
Definition
a business that operates in a physical store and on the internet; REI, Barnes and Noble |
|
|
Term
|
Definition
the exact pattern of a consumer’s navigation through a site |
|
|
Term
|
Definition
the count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser |
|
|
Term
Consumer-to-business (C2B) |
|
Definition
applies to any customer that sells a product or service to a business over the internet; more rare |
|
|
Term
Consumer-to-consumer (C2C) |
|
Definition
The business model for which e-bay is best known. involves consumers selling things directly to consumers. |
|
|
Term
|
Definition
companies that use the internet to distribute copyrighted content (news, music, games, books, movies) retrieving and paying for content is the 2nd largest revenue source for the B2C ebusiness |
|
|
Term
|
Definition
conducting business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners |
|
|
Term
|
Definition
The buying and selling of goods over the Internet |
|
|
Term
|
Definition
the B2B purchase and sale of supplies and services over the internet, tries to link organization directly to pre-approved suppliers catalogs and to process the entire purchasing transaction online |
|
|
Term
|
Definition
a version of a retail store where customers can ship at any location...on the web |
|
|
Term
|
Definition
an intranet that is available to strategic allies |
|
|
Term
|
Definition
- measures the visit interactions with the target ad |
|
|
Term
|
Definition
agents, software, or businesses that bring buyers and sellers together that provide a trading infrastructure to enhance e-business |
|
|
Term
Internet service provider (ISP) |
|
Definition
provides individuals and other companies access to the Internet |
|
|
Term
|
Definition
internalized portion of the Internet, protected from outside access, for employees |
|
|
Term
|
Definition
publicly accessible computer system that allows interactive information browsing |
|
|
Term
Mobile commerce (m-commerce) |
|
Definition
buying and selling of goods through a wireless Internet-enabled device |
|
|
Term
|
Definition
act as intermediaries between buyers and sellers of goods and services |
|
|
Term
Online service provider (OSP) |
|
Definition
offers an extensive array of unique Web services |
|
|
Term
|
Definition
Web site that offers a broad array of resources and services such as email, online discussion groups, serarch engines, and online shopping |
|
|
Term
Pure-play (virtual) business |
|
Definition
an Internet retailer that has no physical store, such as Expedia.com and Amazon.com |
|
|
Term
Service level agreements (SLAs) |
|
Definition
define the specific responsibilities of the service provider and set the customer expectations |
|
|
Term
|
Definition
when a business uses the website or content of another company or source to create a completely new site |
|
|
Term
Wireless internet service provider (WISP) |
|
Definition
an ISP that allows subscribers to connect to a server at designated hotspots or access points using a wireless connection |
|
|
Term
|
Definition
Used to translate Java applets |
|
|
Term
|
Definition
error that occurs after the user uses the program |
|
|
Term
|
Definition
Mostly translated computer code made available to users for download |
|
|
Term
|
Definition
The most efficient translation approach |
|
|
Term
|
Definition
both a compiler and a interpreter |
|
|
Term
Why do we compile/interpret code |
|
Definition
because computers don’t speak human and humans don’t speak in binary |
|
|
Term
Three kinds of translation |
|
Definition
Compiling, Interpreting, Bytecode |
|
|
Term
|
Definition
translates a complete high-level language program into a complete machine language program. |
|
|
Term
|
Definition
translates each programming statement or instruction into machine language when the program is run. One statement is translated and executed and then the next statement is translated. When it is no longer needed, it is discarded. Must be installed on each machine. Slower than compiled programs. Uses HTML and VBA. Translation must happen every time the computer is run. Good for short programs and programs that are updated regularly. Discards commands that are no longer needed. Specific to each type of machine. |
|
|