Midterm Flashcards

1
Q

An information system (IS) is an organized collection of __________, ___________, ___________ ____________, and ____________ _____________, designed to transform inputs into outputs, in order to achieve a goal.

A

people; information; business processes; information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are five components of IT. What are they?

A

1) Accepting and storing data and information
2) Performing mathematical calculations
3) Applying logic to make decisions
4) Retrieving, displaying, and sending information
5) Consistently repeating the above actions many time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The part of the IT platform that is the electronic and mechanical components you can see and touch.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Known as the set of instructions that direct the hardware.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Part of the IT platform that increases the power of IT by allowing the sharing of resources

A

Network Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two types of networks?

A

Wired and wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three types of physical cables that transmit data on wired networks? In order of speed transmissions.

A

Copper Wire -> Coaxial cable -> Fiber Optics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Frequency transmits data in wireless networks. Examples include… (4)

A

Microwave; Satellite
Infrared
Radio; Cell Phones
Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A WiFi network consists of _________ __________ __________ ( _ _ _ ) that are connected to a wired network.

A

Wireless Access Points (WAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Globalization mean in respect to the use of information technology in modern businesses? (3)

A

1) expand their market to customers around the globe.
2) to find the lowest-cost suppliers regardless of location
3) to create 24-hour business days by shuttling work across time zones and nations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Much of globalization is built around the ______________.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Simply a large number of cooperating computer networks that use the same rules for sending messages.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the most widely used component of the Internet?

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Allows us to transfer text, images, audio, and video, as well as new was of buying and selling goods, that is, carrying out commerce in the global marketplace.

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What protects people, information, software, hardware, networks, and organizations from the harmful actions of others?

A

Information System Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Businesses are increasingly relying on the use of Information Systems to support and enable the creation of ___________ __________.

A

Business Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the first line of defense for a “phishing” attempt by a hacker to gain access to passwords by pretending to be a legitimate email or website?

A

The Individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To connect to the Internet, your computer will usually first connect through a _________ _____________ _________ to a either a local area network (LAN) or to a modem and telephone or cable connection.

A

network interface card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What connects to the Internet Service Provider ?

A

The Local Area Network or cable/phone modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the ISP connected to?

A

A regional network via high-speed telephone lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Internet is an application. True or False.

A

False. The Internet is a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The World Wide Web is a network. True or False.

A

False. The World Wide Web is an application just like email, file transfer, instant messaging, Internet telephony, and desktop videoconferencing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A body of software and a set of protocols and conventions based on hypertext and multimedia that make the Internet easy to use and browse.

A

The World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The Web relies on three basic standards:

A

1) A Uniform Resource Locator (URL)
2) The Hypertext Transfer Protocol (HTTP)
3) Hypertext Markup Language (HTML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Specifies a unique address for each page that indicates the location of a document or page.
Uniform Resource Locator (URL)
26
Provides rules used by browsers and servers for formatting and transmitting messages over the Web.
Hypertext Transfer Protocol (HTTP)
27
Provides a language for encoding the information so a variety of IT devices can display it.
Hypertext Markup Language (HTML)
28
______________ is the use of information systems, technologies, and ___________ ___________ to carry out ___________ in order to create or support the creation of business value.
E-commerce; computer networks, transactions
29
What are the FOUR stages/generations of E-Commerce
1) Establishing a Web Presence 2) Providing Interaction 3) e-Commerce - securely order and purchase online 4) Transforming processes
30
Which generation of e-Commerce involves static content such as company information, online marketing, and company brochures?
First Generation: Establishing a Web Presence
31
Which generation of e-Commerce includes use of dynamic content where Web page changes depending on a number of factors such as time and date, user profile, or browser location?
Second Generation: Providing Interaction
32
To be able to carry out e-commerce transactions, it is necessary to store data about the customer on the client side. One way to do this is to use a _________, a small bit of data stored on the client machine and passed back and forth between it and the Web server to identify the user.
Cookie
33
What are the two customization-oriented approaches to e-commerce to create business value?
- Mass customization - to create custom products or services on-demand - Personalization - is a marketing message that a business personalizes for each potential customer's interests based on searching, browsing, or buying habits.
34
All e-commerce sites must have components for processing ___________ and accepting _____________.
Orders; Payments
35
What are the four primary components of a typical e-commerce site?
1. The shopping and ordering system 2. The merchant account 3. The secure payment gateway 4. The security system
36
The order and payment systems in e-commerce must be secure to protect both the ___________ and the ___________.
Customer and Merchant
37
Most e-commerce security technologies relate to the _______ _________ _________ protocol, which allows a client and a server to communicate in a way that prevents eavesdropping, message forgery, or tampering.
Secure Socket Layer (SSL)
38
A server that encrypts data using the SSL protocol is known as a _______ _______ and uses https instead of http.
secure server
39
A website can signal that it uses SSL to encrypt data by purchasing an _ _ _ ______ _____________.
SSL site certificate
40
The most common method of providing security to e-commerce transactions, as well as most other Internet activity, is _____________, which is the process of scrambling a message so that it is meaningful only to the person holding the key to deciphering it.
Encryption
41
______________ converts a seemingly senseless character string into the original message.
Decryption
42
What are the two primary forms of encryption systems?
``` Private Key (symmetric) Public Key (asymmetric) ```
43
What generation of e-commerce is moving us into the realm of automatic interaction between computers at one business automatically interacting with computers at another business?
Fourth Generation: Transforming Processes
44
This business model in the e-commerce environment is usually concerned with strategic sourcing of critical goods and services.
Business-to-business
45
An ______________ ___________ is a general formula for how a business is going to use computer networks and information systems to compete in a global marketplace.
e-commerce strategy
46
To build an e-commerce strategy requires two views of an organization’s strategy:
What is wants to do (conceptual strategy) and how it will do it (technology strategy).
47
Business-to-Consumers e-Business can be classified according to its online component. (3)
−Bricks and mortar: traditional organizations with physical locations −Bricks and clicks: traditional organizations with physical locations that also operate an online business −Pure plays: organizations with only an online business
48
An information system (IS) is an organized collection of __________, ___________, ___________ ____________, and ____________ _____________, designed to transform inputs into outputs, in order to achieve a goal.
people; information; business processes; information technology
49
There are five components of IT. What are they?
1) Accepting and storing data and information 2) Performing mathematical calculations 3) Applying logic to make decisions 4) Retrieving, displaying, and sending information 5) Consistently repeating the above actions many time
50
The part of the IT platform that is the electronic and mechanical components you can see and touch.
Hardware
51
Known as the set of instructions that direct the hardware.
Software
52
Part of the IT platform that increases the power of IT by allowing the sharing of resources
Network Technology
53
What are the two types of networks?
Wired and wireless
54
What are the three types of physical cables that transmit data on wired networks? In order of speed transmissions.
Copper Wire -> Coaxial cable -> Fiber Optics
55
Frequency transmits data in wireless networks. Examples include... (4)
Microwave; Satellite Infrared Radio; Cell Phones Bluetooth
56
A WiFi network consists of _________ __________ __________ ( _ _ _ ) that are connected to a wired network.
Wireless Access Points (WAP)
57
What does Globalization mean in respect to the use of information technology in modern businesses? (3)
1) expand their market to customers around the globe. 2) to find the lowest-cost suppliers regardless of location 3) to create 24-hour business days by shuttling work across time zones and nations
58
Much of globalization is built around the ______________.
Internet
59
Simply a large number of cooperating computer networks that use the same rules for sending messages.
Internet
60
What is the most widely used component of the Internet?
World Wide Web
61
Allows us to transfer text, images, audio, and video, as well as new was of buying and selling goods, that is, carrying out commerce in the global marketplace.
World Wide Web
62
What protects people, information, software, hardware, networks, and organizations from the harmful actions of others?
Information System Security
63
Businesses are increasingly relying on the use of Information Systems to support and enable the creation of ___________ __________.
Business Value
64
What is the first line of defense for a "phishing" attempt by a hacker to gain access to passwords by pretending to be a legitimate email or website?
The Individual
65
To connect to the Internet, your computer will usually first connect through a _________ _____________ _________ to a either a local area network (LAN) or to a modem and telephone or cable connection.
network interface card (NIC)
66
What connects to the Internet Service Provider ?
The Local Area Network or cable/phone modem.
67
What is the ISP connected to?
A regional network via high-speed telephone lines.
68
The Internet is an application. True or False.
False. The Internet is a network.
69
The World Wide Web is a network. True or False.
False. The World Wide Web is an application just like email, file transfer, instant messaging, Internet telephony, and desktop videoconferencing.
70
A body of software and a set of protocols and conventions based on hypertext and multimedia that make the Internet easy to use and browse.
The World Wide Web
71
The Web relies on three basic standards:
1) A Uniform Resource Locator (URL) 2) The Hypertext Transfer Protocol (HTTP) 3) Hypertext Markup Language (HTML)
72
Specifies a unique address for each page that indicates the location of a document or page.
Uniform Resource Locator (URL)
73
Provides rules used by browsers and servers for formatting and transmitting messages over the Web.
Hypertext Transfer Protocol (HTTP)
74
Provides a language for encoding the information so a variety of IT devices can display it.
Hypertext Markup Language (HTML)
75
______________ is the use of information systems, technologies, and ___________ ___________ to carry out ___________ in order to create or support the creation of business value.
E-commerce; computer networks, transactions
76
What are the FOUR stages/generations of E-Commerce
1) Establishing a Web Presence 2) Providing Interaction 3) e-Commerce - securely order and purchase online 4) Transforming processes
77
Which generation of e-Commerce involves static content such as company information, online marketing, and company brochures?
First Generation: Establishing a Web Presence
78
Which generation of e-Commerce includes use of dynamic content where Web page changes depending on a number of factors such as time and date, user profile, or browser location?
Second Generation: Providing Interaction
79
To be able to carry out e-commerce transactions, it is necessary to store data about the customer on the client side. One way to do this is to use a _________, a small bit of data stored on the client machine and passed back and forth between it and the Web server to identify the user.
Cookie
80
What are the two customization-oriented approaches to e-commerce to create business value?
- Mass customization - to create custom products or services on-demand - Personalization - is a marketing message that a business personalizes for each potential customer's interests based on searching, browsing, or buying habits.
81
All e-commerce sites must have components for processing ___________ and accepting _____________.
Orders; Payments
82
What are the four primary components of a typical e-commerce site?
1. The shopping and ordering system 2. The merchant account 3. The secure payment gateway 4. The security system
83
The order and payment systems in e-commerce must be secure to protect both the ___________ and the ___________.
Customer and Merchant
84
Most e-commerce security technologies relate to the _______ _________ _________ protocol, which allows a client and a server to communicate in a way that prevents eavesdropping, message forgery, or tampering.
Secure Socket Layer (SSL)
85
A server that encrypts data using the SSL protocol is known as a _______ _______ and uses https instead of http.
secure server
86
A website can signal that it uses SSL to encrypt data by purchasing an _ _ _ ______ _____________.
SSL site certificate
87
The most common method of providing security to e-commerce transactions, as well as most other Internet activity, is _____________, which is the process of scrambling a message so that it is meaningful only to the person holding the key to deciphering it.
Encryption
88
______________ converts a seemingly senseless character string into the original message.
Decryption
89
What are the two primary forms of encryption systems?
``` Private Key (symmetric) Public Key (asymmetric) ```
90
What generation of e-commerce is moving us into the realm of automatic interaction between computers at one business automatically interacting with computers at another business?
Fourth Generation: Transforming Processes
91
This business model in the e-commerce environment is usually concerned with strategic sourcing of critical goods and services.
Business-to-business
92
An ______________ ___________ is a general formula for how a business is going to use computer networks and information systems to compete in a global marketplace.
e-commerce strategy
93
To build an e-commerce strategy requires two views of an organization’s strategy:
What is wants to do (conceptual strategy) and how it will do it (technology strategy).
94
Business-to-Consumers e-Business can be classified according to its online component. (3)
−Bricks and mortar: traditional organizations with physical locations −Bricks and clicks: traditional organizations with physical locations that also operate an online business −Pure plays: organizations with only an online business
95
IT can be applied to value chain activities and assist with achieving the organization's goals by creating business value in 3 ways:
1) automating 2) informating 3) transforming
96
______________ uses technology to perform tedious or repetitive tasks faster, cheaper, more consistently, and with greater accuracy.
Automating
97
______________ is recognizing an existing automated process also creates new data and information, for instance, collecting and analyzing customer data gathered from on-line ordering forms.
Informating
98
Seeking to use IT to acquire or continue a competitive advantage over competitors.
Transforming
99
What is the IS integration problem?
Combining many disparate technologies into a single overall system.
100
What is Middleware?
Middleware links applications that use dissimilar software or hardware platforms and acts like a specialized messenger/translator to manage the exchange of information.
101
A ______________ consists of interrelated records that are stored in files for easy access of specific pieces of data.
Database
102
A ____________ ________________ ____________ is a collection of software that allows users to create and work with a database.
Database Management System
103
What are some advantages of Data Management Systems?
- Data organization is independent of any one software application - Data can be organized in a manner that reduces redundancy - Can include features for maintaining quality or data, handling security, and synchronizing access by simultaneous users. - Allows capabilities such as: improved data access; allowing different views of the data for different users; and report generation
104
Relational Database Management Systems
It is a method of logically storing data in a database that is independent of the method used to physically store the data and the applications that will create, maintain, and use the data. Most popular way of storing large amounts of data.
105
Related Tables
Within a database, we use a data hierarchy as a way to organized stored data in progressively larger levels of complexity.
106
Relational database model stores information in the form of ______, ________, and _______.
fields; records; tables
107
An __________ is a person, place, thing, transaction, or event about which information is stored.
entity
108
A ____________ ___________ consists of one or more logically related tables that consist of records corresponding to entities.
relational database
109
___________ are often referred to as attributes and correspond to columns of the tables.
Fields
110
Attributes are: (2)
Fields or properties of an entity | The columns in each table contain the attributes.
111
Each table in a relational database has a unique field called the ____________ _____ that may be a single field or several fields together.
primary key
112
Tables are related (connected) via...
matching fields
113
If the primary key in one table is the reference key to another table, it is referred to as a __________ ______.
foreign key
114
_____________ _____ - field(s) that uniquely identifies a given entity or record in a table
primary key
115
___________ ______ - an attribute (or field) in a table that references a primary key in a related table
foreign key
116
The primary method of using a database is to _________ it using the _____________ ________ _____________.
query; structured query language
117
To write an SQL query, you define what three things?
1) the fields to be displayed, 2) the tables to be searched, and 3) the conditions that are to be matched.
118
Some of the key elements of a SQL query are: ___________, _____________, and ___________.
Select; From; Where
119
Databases are not the only or necessarily the best way of storing data for all business needs. True or False.
TRUE.
120
A ________ ________________ is a way of storing and managing data for information access.
data warehouse
121
____________ _______________ is a process for gaining competitive advantage through the intelligent use of data and information in decision-making.
business intelligence
122
Information System Life Cyle (7) Steps
1. Pre-Inception 2. Inception 3. Elaboration 4. Construction 5. Transition 6. Production 7. Retirement
123
Any SAD project involves four essential ingredients:
1. People 2. Methodology 3. Management 4. Tools
124
It is useful to have a framework for planning, structuring and controlling software development projects called ___________ ______________ __________________.
Software Development Methodologies
125
A ___________, sometimes known as a development life cycle, provides a project team with structure to ensure that everyone is working towards the same project goals.
Methodology
126
With _________ ______________, the development team develops software in short development cycles or increments.
agile development
127
“… the application of knowledge skills, tools, and techniques to project activities to deliver requirements in order to meet or exceed stakeholder needs and expectations….”
Project Management
128
Project Management includes: (3 steps)
1. Developing the project plan 2. Executing the project plan 3. Coordinating changes to the plan
129
The job of risk management is to _________, __________, and _________ sources of risk before they become a threat to the successful completion of the project.
recognize, address, and eliminate