Business Informatics Final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/109

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

110 Terms

1
New cards

Unique features of E-Commerce: Ubiquity

Ease of access, internet is avalible everywhere no need to go to a Physical market

2
New cards

Unique features of E-Commerce: Global Reach

Billions of potential customer due to online stores not being limited by reigion

3
New cards

Unique features of E-Commerce: Universal Standards

Only one set of standards which is the internet standards. which lowers search costs and market entry costs.

4
New cards

Unique features of E-Commerce: richness

Supports Video, audio and text messages. all these media types can be included in marketing. (Tip the human version of adding enrichment to a cats food)

5
New cards

Unique features of E-Commerce: Interactivity

Technology works through interaction with the user, therefor online stores can tailer to their customers exact needs

6
New cards

Unique features of E-Commerce: Information Density

The amount and quality of available information is huge.

7
New cards

Unique features of E-Commerce: Personalization

Technology allows for personalisation of products or services to tailer to an individual or group of people.

8
New cards

Unique features of E-Commerce: Social Technology

Technology allows for social networking, and user-generated content

9
New cards

What does E-commerce enable?

price discrimination, dynamic pricing, price disintermediation

10
New cards

What does E-commerce reduce?

information asymmetry, reduces search costs, transaction costs, and menu costs

11
New cards

Information Asymmetry

When one party of a transasction has more knowladge than another

12
New cards

Menu Costs

The costs of changing prices

13
New cards

Transaction Costs

Costs to participate in a market/ cost of purchasing (ie. no need for gas)

14
New cards

Price Discrimination

different prices in different markets depending on how much a buyer is willing to pay

15
New cards

Dynamic pricing

Changing price based on factors of demand, such as more people are searching this product now, so increase price

16
New cards

List E-commerce business models

Portal, E-tailer, Content Provider, Transaction Broker, Market Creator, Service provider, Community provider

17
New cards

List E-commerce Revenue Models

Advertising, sales, subscriptions, transaction fee, affiliate

18
New cards

What is a value proposition?

How a companys products fullfill the customers needs

19
New cards

What are some Web 2.0 Services?

Croud Searching/wisdom of the crowds, Website Visiter Tracking, website personalisation

20
New cards

What is an EDI?

Electronic data Interchange, is a tool used to automate Buisness to Buisness trasactions (BTB)

21
New cards

What are the essential components of a network?

PC with a network interface ward, Network Switch, Server, Router

22
New cards

What is packet Switching?

Slicing the message/data into parts then sending them separately. Once the Data reaches its destination the message/data is returned into its original form

23
New cards

What is client Server Computing?

A client PC requests a serivce which a main central server then process and provides the required data.Cleints are linked by a centralized mainframe computing system (The internet)

24
New cards

Components of networks in large companies?

Local Area networks are linked to a corporate network of powerful servers. Includes back end systems. Such as Mobile wireless lans, video conference systems and so on

25
New cards

TCP and IP Connectivity

Connectivity between two different computers is based on certain protocols. These protocols are rules that govern the transmission between two point. Transmission control protocol and Internet Protocol.

26
New cards

TCP/IP connectivity example

Application — Transport — Internet — Network Interface -

|

Application — Transport — Internet — Network Interface

27
New cards

Domain Name System

root domain is . , top level domain is com, edu, org , second level domain is google congress expidia, third level domain is the host

28
New cards

Internet services

Email, Instant messaging/chatting, File Transfer Protocal (FTP), VoIP, Vitual Private Network, World Wide Web (www)

29
New cards

File Transfer Protocal (FTP)

a standard network protocol used for the transfer of files from one host to another over a TCP-based network, such as the Internet

30
New cards

VoIP

technology that allows you to make voice calls

31
New cards

Components of the World Wide Web (www)

HTML, Hyper Text Transfer Protocols (HTTP), Uniform Resource Locators (URL), Web Servers, Search engine, Shopping bots

32
New cards

HTML

standard language for documents designed to be displayed in a web browser

33
New cards

Hyper Text Transfer Protocols (HTTP)

set of rules which allows data to be transferred in web pages

34
New cards

Web 2.0

more interactive, real time user control, social participation, user generated content

35
New cards

Web 3.0

more intelegent computing, seemless experiance, making searches more relevent to the user

36
New cards

Raidio Frequency Identification (RFID)

tag with a microchip containing data about an items location and antenna. They transmit data to RFID readers, which send the data to a network for processing.

37
New cards

Common Uses of RFID

Automate toll collection, and track goods in the supply chain. It also requires special hardware and software. But become cheap so becoming accessible

38
New cards

IT infrastructure

Set of devices and software required to operate an enterprise.

39
New cards

What services does IT infrastructure provide?

Telecommunications services, data management services, computing services, service platform perspective (more accurate view of investments)

40
New cards

What is the evolution of IT infrastructure?

Mainframe and micro computing, personal computer, client server network, enterprise computing, cloud computing.

41
New cards

Mainframe and Micro computing

Mainframes can process requests from a number of users simultaneously, whereas a microcomputer is designed to be used by one person at a time

42
New cards

enterprise computing

the information technology infrastructure, systems, and applications that businesses and large organizations use to manage and process their data on a large scale

43
New cards

cloud computing

on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user

44
New cards

Laws of IT Infrastructure: moore’s law

computing doubles every 18 months

45
New cards

Laws of IT Infrastructure: metcalf’s law

power of a network grows exponentially as a function of the network members. the more network members a network has the higher demand to join a network has.

46
New cards

Laws of IT Infrastructure: law of mass digital storage

the data stored doubles each year

47
New cards

Laws of IT Infrastructure: declining communication

communicatopom and internet are becmoing more accessable. Therefor usage of comuting facilities increase.

48
New cards

What are the 7 main components of IT infrastructure?

computer hardware

operating system

enterprise software

data maanagment and storage

networking and telecommunications platform

Internet Platform

Consulting system integration services

49
New cards

Computer Hardware Trends

mobiles, grid computing, virtualization, on-demand, green computing, multi processors, autonomic computing

50
New cards

Grid Computing

connects geographicly remote computers in order to create a single super computer

51
New cards

Virtualization

allows a single physical resource to act as multiple logical ones

52
New cards

On demand

offloading peak demand for computing power to remote large scale data processing centers

53
New cards

Green computing

practices and technologys for manufactoring using and disposing of computing networking hardware. Attemts to make computing mroe eco freindly and reduce energy consumption

54
New cards

Types of software

Open source, ajax, service oriented, apps, machups, widgets, software packages, cloud based software, software outsearching

55
New cards

Software out searching (domestic,offshore)

"Software outsourcing" is when a company hires another company or individuals to do some of its software development work. domestic outsourcing is hiring people within the country. Offshore is hiring people out of country

56
New cards

Total cost of ownership model (TCO)

Analysing the direct and indirect costs, cost of teh software and hardware (20%), cost of training, installation, space, downtime.

57
New cards

How can TCO be reduced?

Centralization, standardization of hardware, and use of cloud services

58
New cards

Viruses

Rogue software program that attaches itself to other software programs or data files in order to be executed

59
New cards

Worms

Independent computer programs that copy themselves from one computer to other computers over a network

60
New cards

Trojan horses

Software program that appears to be benign but then does something other than expected

61
New cards

SQL injection attacks

Hackers submit data to web forms that exploits site’s unprotected software and sends rogue SQL query to database

62
New cards

Spyware

Small programs install themselves surreptitiously on computers to monitor user web surfing activity and serve up advertising

63
New cards

Key loggers

Record every keystroke on computer to steal serial numbers, passwords, launch internet attacks

64
New cards

Hackers Activities include:

System intrusion, system damage, cybervandalism

65
New cards

Sniffer

Eavesdropping program that monitors information traveling over network Enables hackers to steal proprietary information such as e-mail, company files

66
New cards

Click fraud

Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

67
New cards

Why systems are vulnerable

Accessibility of networks, Hardware problems, Software problems, Loss and theft of portable devices

68
New cards

Denial-of-service attacks (DoS)

Flooding server with thousands of false requests to crash the network

69
New cards

Identity theft

Theft of personal Information

70
New cards

Evil twins

Wireless networks that pretend to offer trustworthy Wi-Fi connections to the internet

71
New cards

Spoofing

Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else

72
New cards

Phishing

Setting up fake websites/emails that look like legitimate businesses to ask users for confidential personal data

73
New cards

Pharming

Redirects users to a bogus web page, even when the individual types the correct web page address into their browser

74
New cards

How can security threats originate from within the organization?

inside knowledge, Sloppy security procedures, User lack of knowledge

75
New cards

Social engineering

Tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information

76
New cards

Software vulnerability

software contains hidden bugs, these bugs can open networks to intruders. Patches are small peirces of software which repare bugs. but exploits are created faster than patches.

77
New cards

What are technical Safegaurds

Identification and authentication, firewalls, malware protection

78
New cards

Firewalls

network security device that monitors traffic to or from your network

79
New cards

Malware Protection

Instaling anti virus and anti spyware programs, frequent comuter scans, install software updates

80
New cards

Digital certificate

Data file used to establish the identity of users and electronic assets for protection of online transactions Uses a trusted third party, certification authority (CA), to validate a user’s identity. CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key

81
New cards

Data Safegaurds

protect databases and other organizational data

82
New cards

Data administration

an organization-wide function develops data policies
enforce data standards

83
New cards

Database administration

particular database function procedures for multi-user processing Encryption keysprotection of database

84
New cards

Encryption keys

are used with Encryption algorithm/ciphers to protect data

85
New cards

Backup copies

Store off-premise, Check validity

86
New cards

Physical security

Lock and control access to facility, Maintain entry log

87
New cards

Third party contracts

Safeguards are written into contracts, Right to inspect premises and interview personnel

88
New cards

Security in the cloud

Firms must ensure providers provide adequate protection, meets the Service level agreements (SLA), and complies with SOC2

89
New cards

What is MIS audit?

Examines a firm’s overall security level, reviews technologies, procedures, and documentation, and may stimulate disasters in order to test response. assesses financial and organisational impact of threats.

90
New cards

Risk assessment

determines the levels of risk if an activity is not properly controlled. Takes into account: the type of threat, probability of occurrence, potential loss, expected annual loss

91
New cards

Software metrics

bjective assessments of system in form of quantified measurements such as: Number of transactions, Online response time, Payroll checks printed per hour, Known bugs per hundred lines of code

92
New cards

Walkthrough

Review of specification or design document by small group of qualified people

93
New cards

Debugging

Process by which errors are eliminated

94
New cards

First mover vs fast follwers

first movers: inventors of disruptive technologies. Fast followers: firms with the size and resources to captalize on that technology

95
New cards

What are disruptive technologies

Technology that brings about sweeping change to businesses, industries, markets

96
New cards

Agency costs

the costs of managing a firm’s employees

97
New cards

Why does IT flatten organization

since decision-making is pushed down, and Organizations flatten because, in postindustrial societies, authority increasingly relies on knowledge and competence rather than formal positions

98
New cards

What are the four statigies for dealing with competitive forces?

Low-cost leadership, Product differentiation, Focus on market niche, Strengthen customer and supplier intimacy

99
New cards

Low cost leadership

Produce products at a lower price than competitors while enhancing quality and level of service

100
New cards

Product differentiation

enable new products or services, greatly change customer convience and experience