Business Information & Systems Exam 3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/169

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

170 Terms

1
New cards

Digital Darwinism

implies that organizations which cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction

2
New cards

Innovator’s Dilemma

discusses how established companies can take advantage of disrupting technologies without hindering existing relationships with customers, partners, and stakeholders

3
New cards

Internet

massive network that connects computers all over the world and allows them to communicate with one another

4
New cards

World Wide Web

provides access to internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML (hypertext markup language)

5
New cards

Web Browser

allows user to access world wide web

6
New cards

Hypertext Transport Protocol

the internet protocol web browsers use to request and display web pages using URL (universal resource locator)

7
New cards

Ebusiness

includes ecommerce along with all activities related to internal and external business operations

8
New cards

Ecommerce

buying and selling of goods over the internet

9
New cards

Paradigm Shift

occurs when a new & radical form of business enters the market that reshapes the way companies and organizations behave

10
New cards

Web 1.0

term that refers to WWW during its first few years of operation (1991-2003)

11
New cards

Information Richness

depth and breadth of information

12
New cards

Information Reach

number of people business could communicate with was now limitless

13
New cards

The Long Tail

refers to tail of typical sales curve

14
New cards

Intermediaries

agents, software, or businesses that provide a trading infrastructure to bring buyers

15
New cards

Disintermediation

occurs when a business sells directly to the customer and cuts out the intermediary

16
New cards

Heat Map

two-dimensional representation of data in which values are represented by colors

17
New cards

Viral Marketing

technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message’s visibility and effect

18
New cards

Clickstream Data

can reveal length of stay on site, number of page views, how they arrived on page, where they went after leaving page, number of abandoned shopping cart

19
New cards

Ebuisness Model

plan that details how a company creates, delivers, and generates revenue on the internet

20
New cards

Business to Business (B2B)

applies to businesses buying and selling to each other over the internet

21
New cards

Business to Consumer (B2C)

applies to businesses selling their products or services to consumers over the internet

22
New cards

Common B2C Models

Brick-and-Mortar, Click-and-Mortar, Pure-Play (Virtual) Business

23
New cards

Consumer to Business (C2B)

applies to any consumer that sells a product or service to a business over the internet

24
New cards

Consumer to Consumer (C2C)

applies to sites primarily offering goods and services to assist consumers interacting with each other over the internet

25
New cards

Dot-com

original term for a company operating on the internet

26
New cards

Key Word

word used in performing a search

27
New cards

Search Engine Optimization (SEO)

combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search rankings

28
New cards

Ebuisness Revenue Models

Advertising Fees, License Fees, Subscription Fees, Transaction Fees, Value-added Service Fees, Pay-per-click, Pay-per-call, Pay-per-conversion

29
New cards

Affiliate Program

allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant’s website

30
New cards

Hitbots

create the illusion that a large number of potential customers are clicking the advertiser’s links, when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser

31
New cards

Click Fraud

practice of artificially inflating traffic statistics for online advertisements

32
New cards

Ebusiness Tools

email, podcasting, video chat, instant messaging, content management

33
New cards

Web 2.0

next generation of internet use, more mature & distinctive communication platform characterized by collaboration, sharing, and being free

34
New cards

Direct-to-Consumer (DTC)

ebuisness model where companies build, market, sell, and ship products themselves without relying on traditional stores or intermediaries

35
New cards

Characteristics of Business 2.0

Content Sharing Through Open Sourcing, Collaboration Inside Organization, Collaboration Outside Organization, User-contributed content

36
New cards

Open System

consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or incorporate into the system

37
New cards

Source Code

contains instructions written by a programmer specifying actions to be performed by computer software

38
New cards

Open Source Code

any software whose source code is free to use and modify

39
New cards

Closed Source Code

any proprietary software licensed under exclusive legal rights of the copyright holder

40
New cards

User-Contributed Content

created and updated by many users for many users

41
New cards

Collaboration System

tools that support the work of teams or groups by facilitating the sharing and flow of information

42
New cards

Collective Intelligence

collaborating and tapping into the core knowledge of all employees, partners, and customers

43
New cards

Knowledge Management

involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions

44
New cards

Knowledge Management System (KMS)

supports the capture, organization, and dissemination of knowledge throughout an organization (explicit knowledge or tacit knowledge)

45
New cards

Crowdsourcing

wisdom of the crowd

46
New cards

Crowdfunding

sources capital for a project by raising many small amounts from many individuals, typically via the internet

47
New cards

Social Media

websites that rely on user participation and user-contributed content

48
New cards

Social Network

application that connects people by matching profile information

49
New cards

Social Networking

practice of expanding your business and/or social contacts by a personal network

50
New cards

Social Networking Analysis

maps group contacts (personal and professional) identifying who knows each other and who works together

51
New cards

Tags

specific key words or phrases incorporated into website content for means of classification or taxonomy (hashtag, social tagging, social bookmarking, website bookmark)

52
New cards

Folksonomy

similar to taxonomy except that crowdsourcing determines the tags or key-word based classification system

53
New cards

Snackable Content

content that is designed to be easy for readers to share and consume

54
New cards

Blog

online journal that allows users to post their own comments, graphic, and video

55
New cards

Wiki

collaborative web page that allows users to add, remove, and change content, which can easily be organized and reorganized as required

56
New cards

Metcalfe’s Law

states the value of telecommunications network is proportional to the square of the number of users connected to the system

57
New cards

Network Effect

describes how products in a network increase in value to users as the number of users increases

58
New cards

Misinformation

refers to false information that is presented as fact without an intent to deceive

59
New cards

Disinformation

refers to false information that is presented as fact with an intent to deceive

60
New cards

Fake News

refers to false news stories created to be widely shared or distributed for the purpose of promoting or discrediting a public figure, political movement, or company

61
New cards

Parts of Web 3.0

semantic web, deep web, dark web

62
New cards

Semantic Web

component of Web 3.0 that describes things in a way computers can understand

63
New cards

Deep Web

large part of the internet inaccessible to conventional search engines

64
New cards

Dark Web

portion of the internet intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser

65
New cards

Local Area Network (LAN)

connects a group of computers in close proximity

66
New cards

Wide Area Network (WAN)

spans a large geographical area

67
New cards

Metropolitan Area Network (MAN)

large computer network usually spanning a city

68
New cards

Mobile

technology that can travel with user; download software, email messages, and web pages onto a laptop or other mobile device

69
New cards

Mobile Business

ability to purchase goods and services through a wireless internet-enabled device

70
New cards

Wireless

refers to any type of operation accomplished without the use of a hardwired connection

71
New cards

Wireless Fidelity (Wi-Fi)

means by which portable devices can connect wirelessly to a local area network, using access points that can send and receive data via radio waves

72
New cards

Wi-Fi Infrastructure

includes inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal

73
New cards

Bandwidth

maximum amount of data that can pass from one point to another in a unit of time

74
New cards

Bit

smallest element of data that has either a value of 0 or 1

75
New cards

Bit Rate

number of bits transferred or received per unit of time

76
New cards

Personal Area Networks (PAN)

provide communication over a short distance that is intended for use with devices owned and operated by a single owner

77
New cards

Bluetooth

wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices

78
New cards

Wireless LAN (WLAN)

local area network that uses radio signals to transmit and receive data over distances of a few hundred feet

79
New cards

Access Point

computer or network device that serves as an interface between devices and the network

80
New cards

Wireless Access Point

enables devices to connect to a wireless network to communicate with each other

81
New cards

Multiple-in/Multiple-out Technology

multiple transmitters and receivers allowing them to send and receive greater amounts of data than traditional networking devices

82
New cards

Wireless MAN (WMAN)

metropolitan area network that uses radio signals to send and receive data

83
New cards

Worldwide Interoperability for Microwave Access (WiMAX)

communications technology aimed at providing high-speed wireless data over metropolitan area networks

84
New cards

Wireless WAN (WWAN)

wide area network that uses radio signals to transmit and receive data

85
New cards

Streaming

method of sending audio and video files over the internet in such a way that the user can view the file while it is being transferred

86
New cards

Streaming Data

data that are generated continuously by thousands of data sources, which typically send in the data records simultaneously, and in small sizes

87
New cards

5G

fifth generation wireless broadband technology that will greatly increase the speed and responsiveness of wireless networks

88
New cards

Wi-Fi 6

next generation of wi-fi expected to operate at 9.6 Gbps

89
New cards

Satellite

space station that orbits the earth receiving and transmitting signals from earth-based stations over a wide area

90
New cards

Actor

entity capable of participating in an action or network

91
New cards

Bad Actor

entity that is participating with ill intentions

92
New cards

Wired Equivalent Privacy (WEP)

encryption algorithm designed to protect wireless transmission data

93
New cards

Wi-Fi Protected Access

wireless security protocol to protect wi-fi networks

94
New cards

SSL Certificate

electronic document that confirms identity of a website or server and verifies that public key belongs to a trustworthy individual or company

95
New cards

Secure Hypertext Transfer Protocol

combination of HTTP and SSL to provide encryption and secure identification of an internet server

96
New cards

IT Consumerization

blending of personal and business use of technology devices and applications

97
New cards

Pervasive Computing

growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user’s need to interact with computers

98
New cards

Enterprise Mobility Management (EMM)

enterprise-wide security strategy to enforce corporate e-policies while enabling employee use of mobile devices

99
New cards

Mobile Application Management (MAM)

security strategy that administers and enforces corporate e-policies for applications on mobile devices

100
New cards

Mobile Application Development

set of processes and procedures involved in writing software for use on wireless devices