• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/215

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

215 Cards in this Set

  • Front
  • Back
Developing Sys (Ch17,B14,B15)
Start
SDLC
"(Systems Development Life Cycle) pg 241: also known as the software life cycle of the application life cycle, which is the overall process for developing information systems from planning and analysis through implementation and maintenance.
Adaptive Maintenance
pg 509: making changes to increase system functionality to meet new business requirements
Agile Method
pg 246: a form of XP (extreme programming), aims for customer satisfaction through early and continuous delivery of useful software components. Agile is similar to XP but with less focus on team coding and more on limiting project scope. An agile project sets a minimum number of requirements and turns them into a deliverable product. Agile means what it sounds like: fast and efficient; small and nimble; lower cost; fewer features; shorter projects.
Analysis
pg 242: The analysis phase involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system. Business requirements are the detailed set of business requests that the system must meet in order to be successful. The analysis phase is obviously critical. A good start is essential, and the organization must spend as much time, energy, and resources as necessary to perform a detailed, accurate analysis.
Application Testing
pg 508: Verifies that all unites of code work together and the total system satisfies all of its functional and operational requirements
Business requirements
pg 242 (under “Analysis”): are the detailed set of business requests that the system must meet in order to be successful
Change control board
(CCB) pg 509: responsible for approving or rejecting all change requests. The CCB’s composition typically includes a representative for each business area that has a stake in the project. The CCB’s decision to accept of reject each change is based on an impact analysis of the change. For example, if one department wants to implement a change to the software that will increase both deployment time and cost, then the other business owners need to agree that the change is valid and that it warrants the extended time frame and increased budget. (Provide an Environment to Support System Changes section)
Commercial off the shelf
(COTS) pg 503: software package or solution that is purchased to support one or more business functions and information systems. Most customer relationship management, supply chain management, and enterprise resource planning solutions are COTS. (Buy vs. Build Section)
Corrective Maintenance
pg 509: making changes to repair system defects (perform system maintenance section)
Cost benefit analysis
pg 500: A cost-benefit analysis determines which projects offer the organization the greatest benefits with the least amount of cost.
Critical path
pg 521: The critical path is a path from the start to the finish that passes through all the tasks that are critical to completing the project in the shortest amount of time. PERT charts frequently display a project’s critical path.
Critical success factor
(CSF) pg 500: is a factor that is critical to an organization’s success. To determine which system to develop, and organization tracks all the proposed systems and prioritizes them by business impact or critical success factors. This allows the business to prioritize which problems require immediate attention and which problems can wait. (Figure 14.3)
Data flow diagram
(DFD) pg 502: illustrates the movement of information between external entities and the processes and data stores within the system (Figure 14.6). Process models and data flow diagrams establish the specifications of the system.
Dependency
pg 521: is a logical relationship that exists between the project tasks, or between a project task and a milestone. PERT charts define dependency between project tasks before those tasks are scheduled (Figure B15.4)
Design
pg 242: The design phase involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams pseudo code, and other documentation.
Development
pg 242: The development phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system. In this phase the project transitions from preliminary designs to the actual physical implementation.
Documentation Testing
pg 508: verifies that the instruction guides are helpful and accurate
Economic Feasibility
(often called a “cost-benefit analysis) pg 501: Identifies the financial benefits and costs associated with the systems development project.
Entity Relationship Diagram
(ERD) pg 505: is a technique for documenting the relationships between entities in a database environment (Figure B14.10)
Extreme programing
(xp methodology) pg 245: breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete. The primary difference between the waterfall and XP methodologies is that XP divides its phases into iterations with user feedback. The waterfall approach develops the entire system, whereas XP develops the system in iterations (see Figure 17.3 good figure to understand)
Feature creep
(under “Keep requirements to a minimum”) pg 247: occurs when developers add extra features that were not part of the initial requirements. Both scope creep and feature creep are major reasons software development fails.
Gantt Chart
pg 521: is simple bar chart that depicts project tasks against a calendar. In a Gantt chart, tasks are listed vertically and the project’s time frame is listed horizontally. A Gantt chart works well for representing the project schedule. It also shows actual progress of tasks against the planned duration (B15.5)
GUI
(graphical user interface) pg 505: is the interface to an information system. GUI screen design is the ability to model the information system screens for an entire system using icons, buttons, menus, and submenus.
Implementation
pg 242: The implementation phase involves placing the system into production so users can begin to perform actual business operations with the system.
Integration Testing
pg 508: Exposes faults in the integration of software components or software units.
ITIL
Information technology infrastructure library.PG 246. A framework of best practice approaches intended to facilitate the delivery of high quality IT services.
Legal Feasibility
PG 501. Study that examines all potential legal ramifications of the proposed system.
Maintenance
PG 499. Seventh step in the SDLC (systems development life cycle) that involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.
Operational Feasibility
PG 501. Study that examines de likelihood that the project will attain the desired objectives.
Parallel Implementation
PG 508. Using both the old and the new systems until it is evident that the new system performs correctly.
Perfective Maintenance
PG 509. Making changes to enhance the system and improve such things as processing performance and usability.
PERT
PG 568. (Program Evaluation and Review Technique) A graphical network model that depicts a project’s tasks and the relationships between those tasks.
Phased Implementation
PG 508. Implementing the new system in phases (i.e. accounts receivable then accounts payable) until it is evident that the new system performs correctly and then implementing the remaining phases of the new system.
Pilot Implementation
PG 508. Having only a small group of people use the new system until it is evident that the new system performs correctly and then adding the remaining people to start the new system.
Planning
PG 499. SDLC Phase that involves establishing a high level plan of the intended project and determining project goals.
Plunge Implementation
PG 508. Discarding the old system completely and immediately using the new system.
Preventive Maintenance
PG 509. Making changes to reduce the change of future system failures.
Process modelling
PG 502. Involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment.
Project deliverables
PG 518. Any measurable, tangible, variable outcome, result or item that is produced to complete a project or part of a project.
Project exclusions
PG 520. Product, services, or processes that are not specifically a part of the project.
Project Management
PG 518. The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholders’ needs and expectations from a project.
Project management culture
PG 520. Catching the groove of the project’s vision.
Project Milestones
PG 518. Represent key dates when a certain group of activities must be performed.
Project Objectives
PG 520. Quantifiable criteria that must be met for the project to be considered a success.
Project Product
PG 520. A description of the characteristics the product or service has undertaken.
Project risk
PG 524. An uncertain even or condition that, if it occurs, has a positive or negative effect on a project’s objectives.
Prototype
PG 244. A smaller-scale representation or working model of the users’ requirements or a proposed design for an information system.
Rapid Application Development
(RAD) Methodology: PG 244. Emphasized extensive user involvement and the rapid evolutionary construction of working prototypes of a system to accelerate the systems’ development process.
Recovery Testing
PG 340. This one wasn’t there, but you can figure it out by the name.
Requirements definition
PG 501. Document that contains the final set of business requirements, prioritized in order of business importance.
Scalability
Refers to how well a system can adapt to increased demands (83). A number of factors can create organizational growth including market, industry, and economy factors. If an organization grows faster than anticipated, it might experience all types of performance degradations, ranging from running our of disk space to a slowdown in transaction speeds. Anticipating expected – and unexpected – growth is key to building scalable systems that can support that growth. (344)
Scheduling Feasibility
Assesses the likelihood that all potential time frames and completion dates will be met. (501).
Scope
the work that must be completed to deliver a product with the specified features and functions. The project scope statement is important because it specifies clear project boundaries. The project scope typically includes the following: Project product, objectives, deliverables, and exclusions. (520).
Scope creep
Occurs when the scope of the project increases.
Sign-Off
The system users’ actual signatures indicating they approve all of the business requirements. It is one of the first major milestones on the project plan (501).
Strategic Alignment
Projects that are in line with the organization’s strategic goals and objectives are given priority over projects not in line with the organization’s strategic goals and objectives (500).
Technical Feasibility
Determines an organization’s ability to build and integrate the proposed system (501).
Testing
involves bringing all the project pieces together into a special testing environment to test for errors, bugs, and interoperability, in order to verify that the system meets all the business requirements defined in the analysis phase. Two primary activities in the testing phase are 1) write the test conditions and 2) perform the system testing (506).
Time to market
If time to market is a priority, then purchasing a good base technology and potentially building on to it will likely yield results faster than starting from scratch (503).
Unit Testing
Tests each unit of code as soon as the unit is complete to expose faults in the unit regardless of its interaction with other units (508).
User Acceptance Testing
Determines whether a system satisfies its acceptance criteria, enabling the customer to decide whether or not to accept a system (508).
Value chain analysis
The value chain determines the extent to which the new system will add value to the organization. Systems with greater value are given priority over systems with less value (500).
Waterfall method
"– A sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance. It is one of the oldest software development methods and has been around for more than 30 years. The success rate for projects that follow this method is only 1 in 10. It does not sufficiently consider the level of uncertainty in new projects (244).
Decision Making (Ch 9)
next section
Artificial Intelligence (AI)
simulates human intelligence such as the ability to reason and learn. AI systems can learn or understand from experience, make sense of ambiguous or contradictory information, and even use reasoning to solve problems and make decisions effectively. (124-128).
Association detection
Reveals the degree to which variables are related and the nature and frequency of these relationships in the information (129).
Cluster analysis
A technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible (129).
Consolidation
Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
Data mining
The process of analyzing raw data to extract information not offered by the raw data alone (95, 128-131).
Decision support system (DSS)
Models information to support managers and business professionals during the decision-making process (120-121).
Digital dashboards
Integrates information from multiple components and tailors the information to individual preferences (56,122-124).
Drill-down
Enables users to get details, and details of details, of information (94-95,122).
Executive information system (EIS)
A specialized DDS that supports senior level executives within the organization (122).
Expert Systems
Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems (125).
Genetic algorithms
An artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem (127).
Goal-seeking analysis
Finds the inputs necessary to achieve a goal such as a desired level of output (120-121).
Intelligent agent
a special-purpose knowledge based information system that accomplishes specific tasks on behalf of its users. Intelligent agents use their knowledge base to make decisions and accomplish tasks in a way that fulfills the intentions of a user. (pg 127)
Neural Networks
also called an ARTIFICIAL NEUTRAL NETWORK, is a category of AI that attempts to emulate the way the human brain works. The types of decisions which neural networks are most useful are those that involve pattern or image recognition. (pg 126)
Online transaction processing (OLTP)
is a capturing of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information. (pg 119)
Sensitivity analysis
Is the study of the impact that changes in one or more parts of the model have on other parts of the model. Users change the value of one variable repeatedly and observe the resulting changes in other variables. (pg 120)
Shopping bot
Software that will search several retailer Web sites and provide a comparison of each retailer’s offerings including price and availability. (pg 127)
Slice-and-dice
Is the ability to look at information from different perspectives . One slice of information could display all product sales during a given promotion. Another slice could display a single product’s sales for all promotions. (pg 122)
Statistical analysis
Statistical analysis performs such functions as information correlations, distributions, calculations, and variance analysis.. It is a form of data mining. (pg 130)
Transaction processing system (TPS)
Is the basic business system that serves the operational level in an organization. The most common example of TPS is an operational accounting system such as a payroll system or an order-entry system. (pg 119)
What-if analysis
Checks the impact of a change in an assumption on a proposed solution. For example, “What will happen to the supply chain if a hurricane in South Carolina reduces holding inventory from 30 percent to 10 percent?” (pg 120)
Innovation/Collab.(Ch 13 & 15)
next section
business wikis
Are collaborative Web pages that allow users to edit documents, share ideas, or monitor the status of a project. Ex) Wikipedia, Intel, Motorola. (page 206)
collaboration system
is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information. Collaboration solves specific business tasks such as telecommuting, online meetings, deploying applications, and remote project and sales management. (pg 200)
content management system
Provides tools to manage the creation, storage, editing, and publication of information in a collaborative setting (ex. Google docs) Pg 205-206
core competency
An organization's key strength or business function that it does better than any of its competitors. Pg 200
core competency strategy
When an organization chooses to focus specifically on what it does best (its core competency) and forms partnerships and alliances with other specialist organizations to handle nonstrategic business processes. Pg 200
database-based workflow systems
Stores documents in a central location and automatically asks the team members to access the document when it is their turn to edit the document. Pg 207
digital asset manangement system (DAM)
Though similar to document management, DAM generally works with binary rather than text files, such as multimedia file types. Pg 206
Digital Darwinism
Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction. Pg 179
digital divide
When those with access to technology have great advantages over those without access to technology. Pg 183
disruptive technology
A new way of doing things that initially does not meet the needs of existing customers. Pg 179-181
document management system (DMS)
Supports the electronic capturing, storage, distribution, archival, and accessing of documents. Pg 206
explicit knowledge
Consists of anything that can be documented, archived, and codified, often with the help of IT. Pg 203
groupware
Software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing. Pg 209
Hypertext transport protocol (HTTP)
The internet standard that supports the exchange of information on the WWW. Pg 182, 360
Unstructured Collaboration (information collaboration)
Includes document exchange, shared whiteboards, discussion forums, and e-mail. These functions can improve personal productivity, reducing the time spent searching for information or chasing answers. Pg 201
information partnership
Occurs when two or more organizations cooperate by integrating their IT systems, thereby providing customers with the best of what each can offer. Pg 200
instant messaging
(p. 211, 228,390) creating a kind of private chatroom to communicate with someone in realtime over the internet. AOL started allowing consumers to IM in 1992. IM allows individuals and organizations to collaborate more than they could with traditional email.
Internet
(181-186) A global public network of computer networks that pass information from one to another using common computer protocols. Built by US government in 1960 during the coldwar in order to create a bomb proof communication system. Scientists became interested in the internet next, followed by average consumers and businesses.
joint problem solving
(203-205) Joint problem solving, along with shadowing, are two of the best practices for transferring or re-creating tacit knowledge inside and organization (in other words these are two types of knowledge management). JPS is similar to shadowing, but it is more involved. With JPS, an expert and novice work hand in hand on a project (with shadowing the novice merely observes).
knowledge management
(202) (KM) involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions. It is essentially the company generating value from its knowledge by making that knowledge available to all employees whenever needed. Technology is often a tool used in KM, but technology by itself does not constitute KM.
knowledge management system
(202-205) (KMS) supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization. Primary reason organization launch KMS’s is to increase profits or revenues. These systems are used to find and share explicit knowledge (anything that can be documented, archived, and codified) and tacit knowledge. Shadowing and joint problem solving are two examples.KM technologies: databases, expertise tools, e-learning applications, discussion and chat technologies, search and data mining tools.
messaging-based workflow systems
(207) Sends work assignments through an e-mail system. Each time a team member completes their step of a project, the workflow system automatically emails the work document to the next team member. Messaging based workflow systems and data-based workflow systems (system automatically asks team members to access the work document when it is their turn) are the two primary types of workflow systems.
process collaboration
using collaboration systems to produce? I couldn’t find a specific definition for this, but it seems pretty self explanatory.
protocols
(182) A standard that specifies the format of data as well as the rules to be followed during transmission. HTTP (hypertext transport protocol) is the internet standard (protocol) that the WWW uses.
semantic Web
(185) An evolving extension of the WWW in which Web content can be expressed not only in natural language, but also in a format that can be read an used by software agents, thus permitting them to find, share, and integrate information more easily. Some believe that web 3.0 is the merging of semantic web with service-oriented architecture.
service-oriented architecture
(186) (SOA) A collection of services that communicate with each other, for example, passing data from one service to another or coordinating an activity between one or more services (in other words, it allows all the systems that are involved in the business value chain to work together). Enterprise architects believe that SOA can help businesses respond more quickly and cost-effectively to changing market conditions. Main driver of SOA is that it links computational resources and promotes their reuse.
shadowing
(203) Less experienced staff observe more experienced staff to learn how to do a task. It is recommended that the protégé discuss her observations with the expert. One type of KM.
social networking analysis
(205) (SNA) A process of mapping a group’s contacts (whether personal or professional) to identify who knows whom and who works with whom. It helps an organization know who to call when they have a problem. When implementing KMS, it’s important to know this information so you know how knowledge flows through your organization.
structured collaboration
(or process collaboration) (201) One category of collaboration system (an IT based set of tools that supports the work of teams by facilitating the sharing and flow of information). Involves shared participation in business processes, such as workflow, in which knowledge is hard coded as rules. This is beneficial in terms of improving automation and the routing of information. The strengths of any collaboration process lie with the integration of the following systems: KMS, content management system, workflow management system, and groupware systems. Collaboration systems are growing in necessity as many business go global.
sustaining technology
(179) Produces an improved product customers are eager to buy, such as a faster car or a larger hard drive. As opposed to disruptive technology, which is a new way of doing things that initially does not meet the needs of existing customers. Disruptive products destroy old markets and open new ones. If companies do not adapt to the new demands, digital darwanism states that they will be doomed to extinction. Sustaining technologies provide us with better, faster, and cheaper products in established markets. Incumbent companies usually create sustaining technologies, while disruptive technologies typically come from the low end of the market (newer or smaller companies).
tacit knowledge
(203) The knowledge contained in people’s heads. Unlike explicit knowledge (anything that can be documented), tacit knowledge is difficult to manage. This presents a problem for KMS. Shadowing and joint problem solving are the two best practices for transferring or re-creating tacit knowledge inside and organization.
unstructured collaboration
(201) (or information collaboration) One of the two catagories of collaboration systems. Includes document exchange, shared whiteboards, discussion forums, and e-mail. These functions can improve personal productivity, reducing the time spent searching for information or chasing answers.
videoconference
(210) one type of groupware (software that supports team interaction). It is a distant synchronous groupware system (See the diagram of types of groupware systems on page 209). A set of interactive telecommunication technologies that allow two or more locations to interact via two-way video and audio transmissions simultaneously. Reasons to use: 60% of conversation is nonverbal; 56% of business professionals waste 30 min a day using inefficient communication methods; conferencing tech is reliable and easy to use; must use, or fall behind competition.
Web 2.0
(184) A set of economic, social, and technology trends that collectively form the basis for the next generation of the internet—a more mature, distinctive medium characterized by user participation, openness, and network effects. Web 2.0’s impact is just beginning. It doesn’t refer to technical changes. It refers to how software developers and users use the web as a platform (a user-driven web).
Web conferencing
(211) Blends audio, video, and document-sharing technologies to create virtual meeting rooms where people “gather” at a password-protected Web site. Users do not need to have the same software to communicate with each other. It is simpler and cheaper than videoconferencing.
web content management systems
(206) (WCM) Adds an additional layer to document and digital asset management that enables publishing content both to intranets and to public Web sites. In addition to maintaining the content itself, WCM systems often integrate content with online processes like e-business systems.
wikis
(206-207) one type of web content management. Web-based tools that make it easy for users to add, remove, and change online content. Business wiki’s are collaborative pages that allow users to edit documents, share ideas, monitor status of projects.
workflow
(207-209) Defines all the steps or business rules, from beginning to end, required for a business process. Features listed on workflow on page 208.
workflow management systems
(207-209) Facilitates the automation and management of business processes and controls the movement of work through the business process. Two primary types of workflow systems: messaging-based and data-based.
World Wide Web
(182-184) Global hypertext system that uses internet as its transport mechanism. The WWW took the internet to regular people, rather than just the military.
Telecomm/LANs (Ch 16 & B5)
next section
Bluetooth
An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together. Page 216-217, 220
Coaxial cable
Cable that can carry a wide range of frequencies with low signal loss. Page 362-363
Fiber-optic cable
The technology associated with the transmission of information as light impulses along a glass wire or fiber. Page 362, 363
File Transfer Protocol (FTP)
Allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network. Page 360
Firewall
Hardware and/or software that guards a private network by analyzing the information leaving and entering the network. Page 260, 376, 377, 382
Gateway
A computer or a network that allows or controls access to another computer or network.
Geographic information system (GIS)
Designed to work with information that can be shown on a map. Page 220
Global positioning system (GPS)
A device that determines current latitude, longitude, speed, and direction of movement. Page 219, 220, 222
Hub
Is a device for connecting multiple twisted pair or fiver optic Ethernet devices together, making them act as a single network segment
Hypertext Transfer Protocol (HTTP)
The Internet standard that supports the exchange of information on the WWW. Page 182, 360
Microwave transmitters
Commonly used to transmit network signals over great distances. Page 219
Packet-switching
Occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer. Page 356
ping
is a computer network tool used to test whether a particular host is reachable across an IP network.
Radio frequency identification (RFID)
Technologies using active or passive tags in the form of chips or smart labels, that can store unique identifiers, and relay this information to electronic readers. Page 216-218
Remote desktop
Refers to software or an OS feature allowing graphical applications to be run remotely on a server, while being displayed locally.
Repeater
Is an electronic device that receives a signal and retransmits it at a higher level and/or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances without degradation.
Router
An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination. Page 356
Simple Mail Transfer Protocol (SMTP)
TCP/IP's own messaging system for e-mail. Page 360
Simple Network Management Protocol (SNMP)
Allows the management of networked nodes to be managed from a single point. Page 360
Switch
The switch is referred to as a "gate" when abstracted to mathematical form. In the philosophy of logic, operational arguments are represented as logic gates. The use of electronic gates to function as a system of logical gates is the fundamental basis for the computer—i.e. a computer is a system of electronic switches which function as logical gates.
tracert
traceroute is a computer network tool used to determine the route taken by packets across an IP network.
Transmission control protocol/Internet protocol (TCP/IP)
Provides the technical foundation for the public Internet as well as for large numbers of private networks. Page 359-360
Twisted-pair wiring
A type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath. Page 362
Value-added network (VAN)
A private network, provided by a third party, for exchanging information through a high-capacity connection. Page 364, 453
Virtual private network (VPN)
A way to use the public telecommunication infrastructure (e.g., Internet) to provide secure access to an organization's network. Page 364
Voice over IP (VoIP)
Uses TCP/IP technology to transmit voice calls over long-distance telephone lines. Page 364
Wi-fi
A means of linking computers using infrared or radio signals. Page 214
E-Business (Ch 14 & B11)
next section
Application service profider (ASP)
A company that offers an organization access over the Internet to systems and related services that would otherwise have to be located in personal or organizational computers. (Essentially outsourcing Example=IBM) (450)
Brick-and-morter business
a business that operates in a physical store without an internet presence. (191)
Business-to-business (B2B)
applies to businesses buying from and selling to each other over the Internet. (191) (see also figure in 460)
Business-to-consumer (B2C)
applies to any business that sells its products or services to consumers over the internet. Example=Carfax (191) (see also figure in 460)
Click-and-morter business
A business that operates in a physical store and on the internet. Example= REI and Barnes and Noble. See also e-shop (191)
Clickstream data
the exact pattern of a consumer’s navigation through a site. (458)
Click-through
a count of the number of people who visit one site and click on a nadvertisement that takes them to the site of the advertiser. (457)
Consumer-to-business (C2B)
applies to any consumer that sells a product or service to a business over the internet. (192) (see also figure in 460)
Consumer-to-consumer (C2C)
applies to sites primarily offering goods and services to assist consuers interacting with each other over the internet. Example=e-bay (192) (see also figure in 460)
Content provider
companies that use the Internet to distribute copyrighted content, including news, music, games, books, movies, and other types of information. (457)
E-business
derived from the term e-commerce, is the conduction of business on the internet, not only buying and selling, but also serving customers and collaborating with business partners. Primary difference to e-commerce is this also refers to the online exchange of information e.g. a manufacture allowing suppliers to monitor production schedules etc. (189)
E-commerce
is the buying and selling of goods and services over the internet. Refers only to online transactions. (189)
E-procurement
the B2B purchase and sale of supplies and services over the Internet. (454)
E-shop
OR e-store OR e-tailer, is a version of a retail store where customers can shop at any hour of the day without leaving their home or office. (known as “bricks and clicks” or “click and mortar” such as gap www.gap.com etc. (191)
Extranet
is an intranet that is available to strategic allies (such as customers, suppliers, and partners). Example= Walmart’s extranet for its suppliers. (447)
Interactivity
measures the visitor interactions with the target ad. (duration of time viewing, number of pages viewed, repeat visits.) (458)
Intermediaries
agents, software, or business that bring buyers and sellers together that provide a trading infrastructure to enhance e-business. (455)
Internet service provider (ISP)
a company that provides individuals and companies access to the internet along with additional related services such as Web site building. Examples= AT&T, MCI, Worldnet. (448)
Intranet
an internalized portion of the internet, protected from outside access that allows an organization to provide access to information and application software to only its employees. (I believe BYU is example) (447)
Kiosk
Publicly accessible computer system set up to allow interactive information browsing. (Think of the kiosks at BYU) (448)
Mobile commerce (m-commerce)
is the ability to purchase goods and services through a wireless internet-enabled device. (460)
Online brokers
act as intermediaries between buyers and sellers of goods and services. Example= travel agents (457)
Online service provider (OSP)
offers an extensive array of unique services such as its own version of a web browser. Different from ISP cause offers own online content like AOL. ISP would be Earthlink. (449)
Portal
a web site that offers a broad array of resources and services, such as e-mail, online discussion groups, search engines, online shopping malls. Examples= Yahoo!, Netscape, Microsoft, AOL. (447)
Portals
Same as portal?
Pure-play (virtual) business
a business that operates on the Internet only without a physical store. (Example- Expedia.com, Amazon.com) (446)
Service level agreements (SLAs)
(pg. 450)- service level agreements define the specific responsibilities of the service provider and set the customer expectations . SLAs include such items as availability, accessibility, performance, maintenance, backup/recovery, upgrades equipment ownership software ownership security, and confidentiality.
Web mashup
(pg. 193)- is a Web site or Web application that uses content from more than one source to create a completely new service.
Wireless internet service provider (WISP)
(pg. 449) – WISP is an ISP that allows subscribers to connect to a server at designated hotspots or access points using a wireless connection. A member of the ISP family-
Programming Logic
next section
compiler
(pg. 76) - A compiler translates a complete high level language program such as C++ or Pascal into a complete machine language program. After compilation, the complete machine language program can be run on a computer.
data types
(pg.87) - Each memory address must be given a data type. This data type restricts the variable or memory address to accept only one type of data. For example, Double data type will restrict the variable to accept only number but not alpha values. (String, double, integer, Boolean)
event-driven
"(Wikipedia)(I did not find it in the book or packet)- In computer programming, event-driven programming or event-based programming is a programming paradigm in which the flow of the program is determined by events — i.e. sensor outputs or user actions (mouse clicks, key presses) or messages from other programs or threads.
high-level language
(pg.75) – High-level languages are subsets of human languages and used to fund command words and specific grammar. This allows programmers to write code in a more intuitive less tedious way. In addition, the code is much easier to read because common words such as print and calculate, that can be easily be understood, replace long sequences of very specific low level programming commands. Thus in high level languages a single line of code may accomplish the same task as many lines of code in low level languages.
interpreter
(pg. 76) - An interpreter sequentially translates each programming statement or instruction into machine language when the program is run. One statement is translated and executed and then the ext. statement is translated. When a stamen is no longer needed, it is discarded by the computer.
java virtual machine
(Wikipedia)(I did not find it in the book or packet)- is a set of computer software programs and data structures which use a virtual machine model for the execution of other computer programs and scripts. The model used by a JVM accepts a form of computer intermediate language commonly referred to as Java bytecode. This language conceptually represents the instruction set of a stack-oriented, capability architecture. As of 2006, there are an estimated 4 billion JVM enabled devices worldwide.
logic error
(pg.80) - Runtime errors are often caused by incorrect logic, known as a logic error.
low-level language
(p. 75)- Low level languages are generally written to interface with a specific type of hardware such as a specific computer processor. The first programs that were developed to run early computers were low level languages. Low level languages are tedious to humans to write directly because the instructions are very detailed and specific and it therefore requires many small instructions to accomplish a given task.
runtime error
(pg. 80) - These are errors that do not violate the specified the specified syntax of the programming language but are logically incorrect.
scripts vs. applets
"An applet is a program written in the Java programming language that can be included in an HTML page, much in the same way an image is included in a page. When you use a Java technology-enabled browser to view a page that contains an applet, the applet's code is transferred to your system and executed by the browser's Java Virtual Machine (JVM).
syntax error
(pg. 80) - A programmer creates a syntax error when he or she uses incorrect key words or grammar. In other words the syntax is wrong.
variables
-(this is what the packet’s definition was) A variable in programming is much like the variables you worked with in algebra classes. X+Y=5 --- X and Y are the variables.
Flowcharting
next section
connector (small circle)
(pg. 65) -The connector symbol is used when more than one flow arrow head needs to come together.
decision (diamond)
(pg. 65) - the decision symbol is a junction where a decision must be made. A single entry may have any number of alternative solution choices, but only one can be chosen.
flowchart symbols
SEE ROBBIE'S WORD FILE
input (parallelogram)
(pg. 65) - the input/output symbol is used to represent any type of input or output. Common types include Input, display (to screen), and Print (to paper).
logic flow
Flow is typically downward.
looping, repetition, iteration
(pg. 65) - control pattern where a step or a set of steps are repeated until a certain condition is met.
order of precedence
"(I believe this is talking about order of operations because I found no description within the packet)
output (parallelogram)
(pg. 65) - the input/output symbol is used to represent any type of input or output. Common types include Input, display (to screen), and Print (to paper).
process (rectangle)
(pg. 65) - the process symbol is used to represent any type of function or action. This symbol may be used to represent one step or a sequence of steps.
selection or condition
SEE ROBBIE'S WORD FILE
sequential
SEE ROBBIE'S WORD FILE
event-driven
(I did not find it in the book or packet)- In computer programming, event-driven programming or event-based programming is a programming paradigm in which the flow of the program is determined by events — i.e. sensor outputs or user actions (mouse clicks, key presses) or messages from other programs or threads. Event-driven programming can also be defined as an application architecture technique in which the application has a main loop which is clearly divided down to two sections: the first is event selection (or event detection), and the second is event handling. In embedded systems the same may be achieved using interrupts instead of a constantly running main loop; in that case the former portion of the architecture resides completely in hardware.
order of precedence
"(I believe this is talking about order of operations because I found no description within the packet) Do everything with parentheses first; Inner parentheses takes precedence over outer parentheses; The power operator (^) takes precedence over (*) or (/); (*) and (/) take precedence over (+) and (-)
SDLC
"(Systems Development Life Cycle) pg 241: also known as the software life cycle of the application life cycle, which is the overall process for developing information systems from planning and analysis through implementation and maintenancez; Planning, Analysis, Design, Development
Waterfall method
"– A sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance. It is one of the oldest software development methods and has been around for more than 30 years. The success rate for projects that follow this method is only 1 in 10. It does not sufficiently consider the level of uncertainty in new projects (244). Planning; Analysis; Design; Development; Testing; Implementation; Maintenance
SDLC
"(Systems Development Life Cycle) pg 241: also known as the software life cycle of the application life cycle, which is the overall process for developing information systems from planning and analysis through implementation and maintenancez; Planning, Analysis, Design, Development, Testing, Implementation, Maintenance.