Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Match the below terms and concepts with one of the brief examples or definitions that follow. Find the best fit for the answers. Write out

Match the below terms and concepts with one of the brief examples or definitions that follow. Find the best fit for the answers. Write out the term name beside the most appropriate example or definition.

Audit trail

B2B

B2C

Backup

Biometric security

Bluetooth

C2C

Centralization

Chargeback systems

Client server network

Coaxial

CRM

Data center

Data mining

Decentralization

Disaster recovery plan

Downsizing

DSS

Ecommerce channel

Ecommerce integration

Ecommerce marketplaces

Ecommerce success factors

Economic feasibility

EDI

EFT

Encryption

End user

ERP

Expert systems

Extranet

Failures in IT management

Fault tolerant

fiber optics

Firewall

Genetic algorithms

GIS

Global business drivers

GUI

Hacking

Human factors feasibility

Intranet

LAN

Legal / political feasibility

microwave

Middleware

Network topology

Neural network

Offshore

Open system

Operational feasibility

Opt in / opt out

Outsource

Prototype

SCM

SDLC

Software piracy

Spam

Systems thinking

Technical feasibility

Time and resource theft

Transborder data flows

Transnational strategy

Twisted pair

VOIP

WAN

Data dictionary

Data modeling

DBMS

Character

Field

Record

File

Database

Metadata

SQL

Data Warehouse

Object Oriented Database

Entity Relationship Diagram

Data Flow Diagram

Distributed Database

_______________A communication media that uses glass or plastic strands to transmit photons of light energy

_______________A communication media that utilizes extremely short wave wireless transmission

_______________A computer system that uses common standards creating easy access by end users. Usually poorly supported since there is no single organization responsible for development

_______________A DSS that uses input from human experts as its knowledge source

_______________A grouping of related characters

_______________A half-duplex network media

_______________A hardware and/or software function that prevents unauthorized access to a computer or network from outside of the computer or network.

_______________A method of allocating technology costs based on the time of use in a department

_______________A model of a proposed system with limited functionality used as a selling tool and for proof of concept.

_______________A network system that operates over multiple metropolitan areas.

_______________A network that is usually confined to a single building or campus.

_______________A process during which the relationships among data elements are identified.

_______________A process frequently used to develop computer systems. It involves several steps that are iterative in nature until the system is fully developed.

_______________A single analphabetic, numeric, or other symbol.

_______________A software module and database containing descriptions and definitions concerning the structure, data elements, interrelationships and other characteristics of a database.

_______________A software program that serves to convert data from one format to another. Frequently needed in database upgrades to import legacy data.

_______________A software system that supports decision making in an organization

_______________A user interface that is based on images rather than text

_______________A written method for insuring an organization is able to recover from catastrophic computer events.

_______________All of the fields used to describe the attributes of an entity grouped together.

_______________An enterprise system that allows an organization to manage its customer information, contacts and relationships

_______________An information system that utilizes geographic data

_______________An integrated collection of logically related data elements.

_______________An internet-based system that provides for information exchange between an organization and its authorized external stakeholders.

_______________An internet-based system that provides for information exchange between an organization and its authorized internal stakeholders

_______________An organization integrates global business activities through close cooperation and interdependence among international divisions.

_______________An organizational unit that uses centralized computing resources to perform information processing activities for an organization

_______________Architecture based on the human brains meshlike structure

_______________Business transactions occurring between consumers using internet capabilities. Ebay and Craigslist are examples.

_______________Can we afford to develop the system we are planning?

_______________Computer formulas that learn and mutate themselves

_______________Computer networks where one of the computers connected together provides a service to the other computers in the network.

_______________Coordinating ecommerce activities with the other marketing/sales channels of an organization

_______________Data about data.

_______________Data planning tool that models the relationships among the tables in a database.

_______________Data values describing the attributes of an entity plus the operations that can be performed upon the data.

_______________Database Management System.

_______________Determining whether a proposed systems development is compliant with the laws affecting its use and operation. This is especially important in international organizations where data is subject to transborder data flows.

_______________Distributing hardware, software, databases and information specialists throughout the business units of an organization

_______________Does an organization have access to the skills and talent to develop a planned computer system

_______________Does the technology exist to develop a system?

_______________Exchanging commercial data through electronic media

_______________Finely stranded wire, usually copper, insulated and intertwined to reduce the affect of electromagnetic pulse.

_______________Focusing computer hardware, software, databases and information specialists at the corporate level of an organization.

_______________Gaining unauthorized access to a computer

_______________Grouping of related records.

_______________Integrated collection of data extracted from operational, historical, and external databases to provide business intelligence for decision making.

_______________International factors that affect business trends

_______________Internet transactions that occur between businesses

_______________Making redundant copies of files for security purposes

_______________Managing the flow of goods and services through an organization is facilitated by this system

_______________Moving computer operations to a division or organization outside of the United States.

_______________Moving computer operations to an organization independent of our own on a contractual basis.

_______________Moving data across international boundaries

_______________Moving from a mainframe to small computing platforms.

_______________Not using information technology both effectively and efficiently.

_______________Placing components of a database in places where it is most frequently accessed.

_______________Portal, catalog, exchange and auction are examples

_______________Query language whos basic form is Select From Where.

_______________Recognizing the systems interrelationships in a situation

_______________Scrambling data to prevent unauthorized access during data transfer

_______________Security systems based on human physical characteristics

_______________Selection, performance, personal attention and security are examples

_______________Short range wireless communication media

_______________Should our subscribers be required to join or mailing list or do we create a mailing list and allow them to withdraw themselves

_______________Star, Ring, Bus

_______________Stealing software

_______________The ability of an IT system to maintain operations in the event of partial system failure

_______________The consumer of a computer technology

_______________The marketing or sales unit established to manage ecommerce transactions

_______________The presence of information and procedures that allow a transaction to be traced through all stages of information processing.

_______________The process of integrating all the enterprise computer platforms in an organization. Also known as enterprise integrated information systems.

_______________The transfer of voice signals over the internet

_______________Transactions on the internet similar to a customer shopping in a store but online.

_______________Transferring money through electronic media

_______________Undesired email

_______________Using an organizations computer resources during work hours for unauthorized purposes.

_______________Using software to analyze data from a data warehouse to find hidden patterns and trend

_______________A graphical diagramming tool that uses a few simple symbols to illustrate the flow of data among external entities, processing activities, and data storage elements.

_______________Will the system we are planning actually do the job we intend it to do?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Expert Oracle Database Architecture

Authors: Thomas Kyte, Darl Kuhn

3rd Edition

1430262990, 9781430262992

More Books

Students also viewed these Databases questions

Question

9. Acquire group actions history data.

Answered: 1 week ago