Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
33 Cards in this Set
- Front
- Back
Business intelligence
|
The process of gathering the information as well as the information itself
|
|
server farms
|
Massive clusters of computers
|
|
grid computing
|
Refers to combining the computing power of many smaller computers to obtain more power without using a costly supercomputer
|
|
open source
|
stability and low cost. Open source software can be improved upon, fully licensed software cannot be. Open source: cheap
|
|
data mining
|
A process companies use to sort and analyze information to better understand their customers, products, markets, or any other phase of their business for which data has been captured
|
|
data warehouse
|
Integration of multiple large databases into one
|
|
tacit knowledge
|
reflect the processes that are located within a persons mind on how to effectively perform a particular task
|
|
TCP/IP
|
Transmission control protocol/Internet protocol. TCP breaks
o TCP: breaks info into small chunks called packets and manages to transfer of the packets from computer to computer o IP: defines how a data packet must be formed and to where a router must forward each packet |
|
repeater
|
a network device used to regenerate or replicate a signal as it weakens when traveling on a network; also moves data from one media segment to another and effectively extends the size of a network
|
|
smart label
|
bar code that represents a number, that represents something else. E.g: UPS uses smart labels for tracking
|
|
router
|
an intelligent device used to connect two or more individual networks
|
|
MoDem
|
a modem is a device that enables a computer to transmit data over telephone lines
|
|
coaxial
|
network cable containing inner copper conductor, most commonly used for cable TV installations and for networks operating at 10 Mbps
|
|
Infrared line of site
|
uses high frequency light waves to transmit data on an unobstructed path between nodes-computers or some other device such as printers-on a network, at a distance up to 24.4 meters
|
|
TCP
|
breaks info into small chunks called packets and manages to transfer of the packets from computer to computer
|
|
B2B
|
Business to business
• Wal-mart buys from distributors |
|
Disintermediation
|
the phenomenon of cutting out the “middleman” in transactions and reaching customers more directly and efficiently
|
|
Physical storefront
|
Brick and mortar
|
|
extranet
|
in order to communicate proprietary information with authorized users outside organizational boundaries, a company can impliment an extranet. An extranet enables two or more firms to use the internet to do business together
|
|
Brand (VQ)
|
Red Oxx management felt that a website is an excellent lever for communicating an organization's' ___brand__.
|
|
E-Integration
|
Providing customers with ability to gain personalized info by querying corporate databases and other info sources
|
|
The long tail
|
Refers to the focus on niche markets, rather than purely on mainstream products
|
|
Intrinsic
|
E.G.: quality of tote bag, and the strength and comfort of the strap
|
|
60 % (VQ)
|
amount of home networks that are unsecured
|
|
threat to infrastructure system security
|
oAccidents and natural disasters
oEmployees and consultants oLinks to outside business contacts oOutsiders |
|
Denial of Service
|
Attacked by unauthorized users, often zombie computers that makes a network resource, e.g: website unavailable to users or poor service
|
|
viruses
|
destructive program
|
|
worms
|
Destructive computer code that is designed to copy and send itself throughout networked computers
|
|
phishing
|
Attempts to trick financial account and credit card holders into giving away personal information
|
|
Firewall
|
system designed to detect intrusion and prevent unauthorized access
|
|
VPN (virtual private networks)
|
o Connection constructed dynamically within an existing network
oSecure tunnel • Encrypted information |
|
Public Key
|
Assymetric key system, each individual has a pair of keys
|
|
correct answers:
|
Different Key
Risk Embracement |