Lesson 5 - Concepts Flashcards

1
Q

Analysis and design

A

Analysis of system and design for creation of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Analysis for digital systems

A

Using analytical techniques to capture and summarize business and user requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Activity-based process definition methods

A

Analysis tools used to identify the relationship between tasks within a business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Process

A

Part of a system that has a clearly defined purpose or objective and clearly defined inputs and outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Process mapping

A

Identification of location and responsibilities for processes within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Task analysis

A

Identification of different tasks, their sequence and how they are broken down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Workflow management ( WFM)

A

The automation of information flows; provides tools for processing the information according to a set of procedural rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Entity

A

A grouping of related data, such as customer entity, implemented as a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Database table

A

Each database comprises several tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attribute

A

A property or characteristic of an entity, implemented as a field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Field

A

Attributes of products, such as date of birth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Record

A

A collection of fields for one instance of an entity, such as Customer Smith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social sign-in

A

Users or members of sites can sign-in with their social network accounts such as Google+, Facebook or LinkedIn through use of APIs exchanging data between different web services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Relationship

A

Describes ow different tables are linked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Primary key

A

The field that uniquely identifies each record in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secondary key

A

A field that is used to link tables, by linking to a primary key in another table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Big Data

A

Within marketing, this concept describes the opportunity to harness customer data from different touchpoints, including as point-of-sale transactions, desktop and mobile sites and apps, and social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

System design

A

Defines how an information system will operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Client-server model

A

A system architecture in which end-user machines such as PCs, known as ‘clients’, run applications while accessing data and possibly programs from a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Three-tier client-server

A

The first tier is the client that handles display, second is application logic and business rules. third is database storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Thin client

A

An end-user access device ( terminal) where computing requirements such as processing and storage ( and so cost), are minimized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

User-centered design(UX)

A

Design based on optimising the user experience according to all factors, including the user interface, which affect this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Customer experience management ( CXM)

A

User experience improvements are broadened to consider the context of use to different physical locations or customer touchpoints across different digital platforms including desktop, mobile sites, apps, social networks and email marketing. Context of use includes device type, location and interactions with customer service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Conversion Rate Optimization ( CRO)

A

Improving the commercial returns from a transactional site through increasing conversion to key goals such as sales, quotes, bookings, or leads. CRO combines customer and competitor research with evaluation of customer behaviour using web analytics and AB multivariate testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Online customer experience

A

The combination of rational and emotional factors of using a company’s online services that influences customer’s perceptions of a brand online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Usability

A

An approach to website design intended to enable completion of user tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Expert review

A

An analysis of an existing site or prototype, by an experienced usability expert who will identify deficiencies and improvements to a site based on their knowledge of web design principles and best practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Usability/user-testing

A

Representative users are observed performing representative tasks using a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Eyetracking

A

A usability testing technique that provides a visual overlay of where visitors most commonly look at on the screen ( heatmaps) and individual common paths ( gaze trails).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Use-case modelling

A

A user-centred approach to modelling system requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Unified Modelling Language ( UML)

A

A language used to specify visualize and document the artefacts of an object0oriented system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Web design personas

A

A summary of the characteristics, needs, motivations, and environment of typical website users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Customer scenarios ( user journeys)

A

Alternative tasks or outcomes required by a visitor to a website. Typically accomplished in a series of stages of different tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Primary persona

A

A representation of the typical site user, who is strategically important to the effectiveness of the site, but one whose needs are challienging to fulfill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Actors

A

People, software or other devices that interface/interact with a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Use-case

A

The sequence of transactions between an actor and a system that supports the activities of the actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Talk-through

A

A user verbally describes the required actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Walk-through

A

A user executes their actions through using a system or mock-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Scenario

A

A particular path or flow of events or activities within a use-case

40
Q

Information architecture

A

The combination of organization, labelling and navigation schemes composing an information system

41
Q

Site map

A

A graphical or text depiction of the relationship between different groups of content on a website

42
Q

Card sorting or web classification

A

The process of arranging a way of organizing objects on the website in a consistent manner

43
Q

Blueprints

A

Show the relationships between pages and other content components

44
Q

Wireframe

A

Also known as ‘ schematics’, a way of illustrating the layout of an individual web page

45
Q

Storyboarding

A

The use of static drawings or screenshots of the different parts of a website to review the design concept with user groups

46
Q

Page template

A

A standard page layout format which is applied to each page of a website. Typically defined for different page categories ( e.g. category page, product page, search page)

47
Q

Cascading Style Sheets ( CSS)

A

A simple mechanism for adding style ( Eg. fonts, colours, spacing) to web socuments. CSS enables different style elements to be controlled across an entire site or section of site.

48
Q

Customer Orientation

A

Developing site content and services to appear to different customer segments or other members of the audience

49
Q

Marketing-led site design

A

Site design elements are developed to achieve customer acquisition, retention and communication of marketing messages

50
Q

Persuasion Marketing

A

Using design elements such as layout , copy and typography together with promotional messages to encourage site users to follow particular paths and specific actions rather than giving them complete choice in their navigation

51
Q

Information organization schemes

A

The structure chosen to group and categorize information

52
Q

Site navigation scheme

A

Tools provided to the user to move between different information on a website

53
Q

Flow

A

Flow describes how easy it is for users of a site to move between the different pages of content of the site

54
Q

Narrow and deep navigation

A

Fewer choices, more clicks to reach required content

55
Q

Broad and shallow navigation

A

More choices, fewer click to reach required content

56
Q

Deep linking

A

Jakob Nielsen’s term for a user arriving at a site deep within its structure

57
Q

Responsive design

A

Layout and formatting of website content is modified at the point of rendering to suit different screen resolutions and capabilities to produce a better experience to users of a range of desktop, tablet and smartphone devices using web development methods like CSS and image scaling.

58
Q

Media Queries

A

A styling approach within Cascading Style Sheets ( CSS3) enabling the layout to change based on the type of device at its scale

59
Q

Adaptive mobile web design

A

Generally a more sophisticated approach than Responsive web design that involves delivering an experience optimized for the handsets targeted and splits the code and processing to render on different devices between the client and the server

60
Q

Accessibility

A

An approach to site design intended to accommodate site usage using different browsers and settings particularly required by the visually impaired.

61
Q

Accessibility legislation

A

Legislation intended to protect users of website with disabilities, including those with visual disability

62
Q

ALT tags

A

Alt tags ( alternative tags ) appear after an image tag and contain a phrase associated with that image

63
Q

Malware

A

Malicious software or toolbars, typically downloaded via the Internet, which acts as a ‘Trojan horse’ by executing unwanted activities such as keylogging of user passwords or viruses which may collect email addresses.

64
Q

Firewall

A

A specialized software application mounted on a server at the point where the company is connected to the internet to prevent unauthorized access.

65
Q

Information Security Management System

A

An organisational process to protect information assets

66
Q

Information security policy

A

A definition of the organizational approaches to information security and the responsibilities of employee in protecting information

67
Q

Information Asset register ( IAR)

A

A repository for the types, value, and ownership of all information within an organization

68
Q

Business continuity management or disaster recovery

A

Measures taken to ensure that information can be restored and accessed if the original information and access method are destroyed

69
Q

Computer virus

A

A program capable of self-replication, allowing it to spread from one machine to another. It may be malicious and delete data, or benign.

70
Q

Boot-sector virus

A

Occupies boot record of hard and floppy disks and is activated during computer start-up

71
Q

worm

A

A small program that self-replicates and transfers across a network from machine to machine. A form of virus.

72
Q

Trojan

A

A virus that masquerades as a bona fide application

73
Q

Anti-virus software

A

Software to detect and eliminate viruses

74
Q

managed email service

A

Receipt and transmission of emails is managed by a third party

75
Q

Phishing

A

Obtaining personal details online through sites and emails masquerading as legitimate businesses

76
Q

Employee communications monitoring

A

Companies monitor staff emails and websites they access

77
Q

Acceptable-use policy

A

Statement of employee activities involving use of networked computers that are not considered acceptable by management

78
Q

Scanning software

A

Identifies email or web-page access that breaches company guidelines or acceptable-use policies

79
Q

Filtering software

A

Software that blocks specified content or activities

80
Q

Impact assessment

A

An assessment of the employee monitoring process in the workplace to identify improvement to minimize infringement of employee privacy

81
Q

covert monitoring

A

Monitoring which the employer undertakes without notification of staff

82
Q

Spam

A

Unsolicited email ( usually bulk-mailed and untargeted)

83
Q

Botnet

A

Independent computers, connected to the Internet, are used together, typically for malicious purposes through controlling software. For example, they may be used to send out spam or for denial-of-service attack

84
Q

Email filter

A

Software used to identify spam according to its characteristics such as keuwords.

85
Q

Blacklist

A

A compilation of known sources of spam that are used to block email

86
Q

Whitelist

A

A compilation of trusted sources of email that is permitted to enter an inbox

87
Q

Hacking

A

The process of gaining unauthorized access to computer systems, typically across a network

88
Q

Social engineering

A

Exploiting human behaviour to gain access to computer security information from employees and individuals

89
Q

Ethical hacker

A

Hacker employed legitimately to test the quality of system security

90
Q

Digital certificates ( keys)

A

Consist of keys made up of large numbers that are used to uniquely identify individuals

91
Q

Symmetric encryption

A

Both parties to a transaction use the same key to encode and decode messages

92
Q

Assymetric encryption

A

Both parties use a related but different key to encode and decode messages

93
Q

Digital signatures

A

A method of identifying individuals or companies using public-key encryption

94
Q

Certificate and certificate authorities ( CAs)

A

A certificate is a valid copy of a public key of an individuals or organization together with identification information. It is issued by a trusted third party ( TTP) or certificate authority ( CA).

95
Q

Virtual Private network ( VPN)

A

Private network created using the public network infrastructure of the Internet.

96
Q

Security Sockets Layer ( SSL)

A

A commonly used encryption technique for scrambling data as it is passed across the Internet from a customer’s web browser to a merchant’s web server.