Business Informatics Final

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 109

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

110 Terms

1

Unique features of E-Commerce: Ubiquity

Ease of access, internet is avalible everywhere no need to go to a Physical market

New cards
2

Unique features of E-Commerce: Global Reach

Billions of potential customer due to online stores not being limited by reigion

New cards
3

Unique features of E-Commerce: Universal Standards

Only one set of standards which is the internet standards. which lowers search costs and market entry costs.

New cards
4

Unique features of E-Commerce: richness

Supports Video, audio and text messages. all these media types can be included in marketing. (Tip the human version of adding enrichment to a cats food)

New cards
5

Unique features of E-Commerce: Interactivity

Technology works through interaction with the user, therefor online stores can tailer to their customers exact needs

New cards
6

Unique features of E-Commerce: Information Density

The amount and quality of available information is huge.

New cards
7

Unique features of E-Commerce: Personalization

Technology allows for personalisation of products or services to tailer to an individual or group of people.

New cards
8

Unique features of E-Commerce: Social Technology

Technology allows for social networking, and user-generated content

New cards
9

What does E-commerce enable?

price discrimination, dynamic pricing, price disintermediation

New cards
10

What does E-commerce reduce?

information asymmetry, reduces search costs, transaction costs, and menu costs

New cards
11

Information Asymmetry

When one party of a transasction has more knowladge than another

New cards
12

Menu Costs

The costs of changing prices

New cards
13

Transaction Costs

Costs to participate in a market/ cost of purchasing (ie. no need for gas)

New cards
14

Price Discrimination

different prices in different markets depending on how much a buyer is willing to pay

New cards
15

Dynamic pricing

Changing price based on factors of demand, such as more people are searching this product now, so increase price

New cards
16

List E-commerce business models

Portal, E-tailer, Content Provider, Transaction Broker, Market Creator, Service provider, Community provider

New cards
17

List E-commerce Revenue Models

Advertising, sales, subscriptions, transaction fee, affiliate

New cards
18

What is a value proposition?

How a companys products fullfill the customers needs

New cards
19

What are some Web 2.0 Services?

Croud Searching/wisdom of the crowds, Website Visiter Tracking, website personalisation

New cards
20

What is an EDI?

Electronic data Interchange, is a tool used to automate Buisness to Buisness trasactions (BTB)

New cards
21

What are the essential components of a network?

PC with a network interface ward, Network Switch, Server, Router

New cards
22

What is packet Switching?

Slicing the message/data into parts then sending them separately. Once the Data reaches its destination the message/data is returned into its original form

New cards
23

What is client Server Computing?

A client PC requests a serivce which a main central server then process and provides the required data.Cleints are linked by a centralized mainframe computing system (The internet)

New cards
24

Components of networks in large companies?

Local Area networks are linked to a corporate network of powerful servers. Includes back end systems. Such as Mobile wireless lans, video conference systems and so on

New cards
25

TCP and IP Connectivity

Connectivity between two different computers is based on certain protocols. These protocols are rules that govern the transmission between two point. Transmission control protocol and Internet Protocol.

New cards
26

TCP/IP connectivity example

Application — Transport — Internet — Network Interface -

|

Application — Transport — Internet — Network Interface

New cards
27

Domain Name System

root domain is . , top level domain is com, edu, org , second level domain is google congress expidia, third level domain is the host

New cards
28

Internet services

Email, Instant messaging/chatting, File Transfer Protocal (FTP), VoIP, Vitual Private Network, World Wide Web (www)

New cards
29

File Transfer Protocal (FTP)

a standard network protocol used for the transfer of files from one host to another over a TCP-based network, such as the Internet

New cards
30

VoIP

technology that allows you to make voice calls

New cards
31

Components of the World Wide Web (www)

HTML, Hyper Text Transfer Protocols (HTTP), Uniform Resource Locators (URL), Web Servers, Search engine, Shopping bots

New cards
32

HTML

standard language for documents designed to be displayed in a web browser

New cards
33

Hyper Text Transfer Protocols (HTTP)

set of rules which allows data to be transferred in web pages

New cards
34

Web 2.0

more interactive, real time user control, social participation, user generated content

New cards
35

Web 3.0

more intelegent computing, seemless experiance, making searches more relevent to the user

New cards
36

Raidio Frequency Identification (RFID)

tag with a microchip containing data about an items location and antenna. They transmit data to RFID readers, which send the data to a network for processing.

New cards
37

Common Uses of RFID

Automate toll collection, and track goods in the supply chain. It also requires special hardware and software. But become cheap so becoming accessible

New cards
38

IT infrastructure

Set of devices and software required to operate an enterprise.

New cards
39

What services does IT infrastructure provide?

Telecommunications services, data management services, computing services, service platform perspective (more accurate view of investments)

New cards
40

What is the evolution of IT infrastructure?

Mainframe and micro computing, personal computer, client server network, enterprise computing, cloud computing.

New cards
41

Mainframe and Micro computing

Mainframes can process requests from a number of users simultaneously, whereas a microcomputer is designed to be used by one person at a time

New cards
42

enterprise computing

the information technology infrastructure, systems, and applications that businesses and large organizations use to manage and process their data on a large scale

New cards
43

cloud computing

on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user

New cards
44

Laws of IT Infrastructure: moore’s law

computing doubles every 18 months

New cards
45

Laws of IT Infrastructure: metcalf’s law

power of a network grows exponentially as a function of the network members. the more network members a network has the higher demand to join a network has.

New cards
46

Laws of IT Infrastructure: law of mass digital storage

the data stored doubles each year

New cards
47

Laws of IT Infrastructure: declining communication

communicatopom and internet are becmoing more accessable. Therefor usage of comuting facilities increase.

New cards
48

What are the 7 main components of IT infrastructure?

computer hardware

operating system

enterprise software

data maanagment and storage

networking and telecommunications platform

Internet Platform

Consulting system integration services

New cards
49

Computer Hardware Trends

mobiles, grid computing, virtualization, on-demand, green computing, multi processors, autonomic computing

New cards
50

Grid Computing

connects geographicly remote computers in order to create a single super computer

New cards
51

Virtualization

allows a single physical resource to act as multiple logical ones

New cards
52

On demand

offloading peak demand for computing power to remote large scale data processing centers

New cards
53

Green computing

practices and technologys for manufactoring using and disposing of computing networking hardware. Attemts to make computing mroe eco freindly and reduce energy consumption

New cards
54

Types of software

Open source, ajax, service oriented, apps, machups, widgets, software packages, cloud based software, software outsearching

New cards
55

Software out searching (domestic,offshore)

"Software outsourcing" is when a company hires another company or individuals to do some of its software development work. domestic outsourcing is hiring people within the country. Offshore is hiring people out of country

New cards
56

Total cost of ownership model (TCO)

Analysing the direct and indirect costs, cost of teh software and hardware (20%), cost of training, installation, space, downtime.

New cards
57

How can TCO be reduced?

Centralization, standardization of hardware, and use of cloud services

New cards
58

Viruses

Rogue software program that attaches itself to other software programs or data files in order to be executed

New cards
59

Worms

Independent computer programs that copy themselves from one computer to other computers over a network

New cards
60

Trojan horses

Software program that appears to be benign but then does something other than expected

New cards
61

SQL injection attacks

Hackers submit data to web forms that exploits site’s unprotected software and sends rogue SQL query to database

New cards
62

Spyware

Small programs install themselves surreptitiously on computers to monitor user web surfing activity and serve up advertising

New cards
63

Key loggers

Record every keystroke on computer to steal serial numbers, passwords, launch internet attacks

New cards
64

Hackers Activities include:

System intrusion, system damage, cybervandalism

New cards
65

Sniffer

Eavesdropping program that monitors information traveling over network Enables hackers to steal proprietary information such as e-mail, company files

New cards
66

Click fraud

Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

New cards
67

Why systems are vulnerable

Accessibility of networks, Hardware problems, Software problems, Loss and theft of portable devices

New cards
68

Denial-of-service attacks (DoS)

Flooding server with thousands of false requests to crash the network

New cards
69

Identity theft

Theft of personal Information

New cards
70

Evil twins

Wireless networks that pretend to offer trustworthy Wi-Fi connections to the internet

New cards
71

Spoofing

Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else

New cards
72

Phishing

Setting up fake websites/emails that look like legitimate businesses to ask users for confidential personal data

New cards
73

Pharming

Redirects users to a bogus web page, even when the individual types the correct web page address into their browser

New cards
74

How can security threats originate from within the organization?

inside knowledge, Sloppy security procedures, User lack of knowledge

New cards
75

Social engineering

Tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information

New cards
76

Software vulnerability

software contains hidden bugs, these bugs can open networks to intruders. Patches are small peirces of software which repare bugs. but exploits are created faster than patches.

New cards
77

What are technical Safegaurds

Identification and authentication, firewalls, malware protection

New cards
78

Firewalls

network security device that monitors traffic to or from your network

New cards
79

Malware Protection

Instaling anti virus and anti spyware programs, frequent comuter scans, install software updates

New cards
80

Digital certificate

Data file used to establish the identity of users and electronic assets for protection of online transactions Uses a trusted third party, certification authority (CA), to validate a user’s identity. CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key

New cards
81

Data Safegaurds

protect databases and other organizational data

New cards
82

Data administration

an organization-wide function develops data policies
enforce data standards

New cards
83

Database administration

particular database function procedures for multi-user processing Encryption keysprotection of database

New cards
84

Encryption keys

are used with Encryption algorithm/ciphers to protect data

New cards
85

Backup copies

Store off-premise, Check validity

New cards
86

Physical security

Lock and control access to facility, Maintain entry log

New cards
87

Third party contracts

Safeguards are written into contracts, Right to inspect premises and interview personnel

New cards
88

Security in the cloud

Firms must ensure providers provide adequate protection, meets the Service level agreements (SLA), and complies with SOC2

New cards
89

What is MIS audit?

Examines a firm’s overall security level, reviews technologies, procedures, and documentation, and may stimulate disasters in order to test response. assesses financial and organisational impact of threats.

New cards
90

Risk assessment

determines the levels of risk if an activity is not properly controlled. Takes into account: the type of threat, probability of occurrence, potential loss, expected annual loss

New cards
91

Software metrics

bjective assessments of system in form of quantified measurements such as: Number of transactions, Online response time, Payroll checks printed per hour, Known bugs per hundred lines of code

New cards
92

Walkthrough

Review of specification or design document by small group of qualified people

New cards
93

Debugging

Process by which errors are eliminated

New cards
94

First mover vs fast follwers

first movers: inventors of disruptive technologies. Fast followers: firms with the size and resources to captalize on that technology

New cards
95

What are disruptive technologies

Technology that brings about sweeping change to businesses, industries, markets

New cards
96

Agency costs

the costs of managing a firm’s employees

New cards
97

Why does IT flatten organization

since decision-making is pushed down, and Organizations flatten because, in postindustrial societies, authority increasingly relies on knowledge and competence rather than formal positions

New cards
98

What are the four statigies for dealing with competitive forces?

Low-cost leadership, Product differentiation, Focus on market niche, Strengthen customer and supplier intimacy

New cards
99

Low cost leadership

Produce products at a lower price than competitors while enhancing quality and level of service

New cards
100

Product differentiation

enable new products or services, greatly change customer convience and experience

New cards
robot