Question
Match the below terms and concepts with one of the brief examples or definitions that follow. Find the best fit for the answers. Write out
Match the below terms and concepts with one of the brief examples or definitions that follow. Find the best fit for the answers. Write out the term name beside the most appropriate example or definition.
Audit trail
B2B
B2C
Backup
Biometric security
Bluetooth
C2C
Centralization
Chargeback systems
Client server network
Coaxial
CRM
Data center
Data mining
Decentralization
Disaster recovery plan
Downsizing
DSS
Ecommerce channel
Ecommerce integration
Ecommerce marketplaces
Ecommerce success factors
Economic feasibility
EDI
EFT
Encryption
End user
ERP
Expert systems
Extranet
Failures in IT management
Fault tolerant
fiber optics
Firewall
Genetic algorithms
GIS
Global business drivers
GUI
Hacking
Human factors feasibility
Intranet
LAN
Legal / political feasibility
microwave
Middleware
Network topology
Neural network
Offshore
Open system
Operational feasibility
Opt in / opt out
Outsource
Prototype
SCM
SDLC
Software piracy
Spam
Systems thinking
Technical feasibility
Time and resource theft
Transborder data flows
Transnational strategy
Twisted pair
VOIP
WAN
Data dictionary
Data modeling
DBMS
Character
Field
Record
File
Database
Metadata
SQL
Data Warehouse
Object Oriented Database
Entity Relationship Diagram
Data Flow Diagram
Distributed Database
_______________A communication media that uses glass or plastic strands to transmit photons of light energy
_______________A communication media that utilizes extremely short wave wireless transmission
_______________A computer system that uses common standards creating easy access by end users. Usually poorly supported since there is no single organization responsible for development
_______________A DSS that uses input from human experts as its knowledge source
_______________A grouping of related characters
_______________A half-duplex network media
_______________A hardware and/or software function that prevents unauthorized access to a computer or network from outside of the computer or network.
_______________A method of allocating technology costs based on the time of use in a department
_______________A model of a proposed system with limited functionality used as a selling tool and for proof of concept.
_______________A network system that operates over multiple metropolitan areas.
_______________A network that is usually confined to a single building or campus.
_______________A process during which the relationships among data elements are identified.
_______________A process frequently used to develop computer systems. It involves several steps that are iterative in nature until the system is fully developed.
_______________A single analphabetic, numeric, or other symbol.
_______________A software module and database containing descriptions and definitions concerning the structure, data elements, interrelationships and other characteristics of a database.
_______________A software program that serves to convert data from one format to another. Frequently needed in database upgrades to import legacy data.
_______________A software system that supports decision making in an organization
_______________A user interface that is based on images rather than text
_______________A written method for insuring an organization is able to recover from catastrophic computer events.
_______________All of the fields used to describe the attributes of an entity grouped together.
_______________An enterprise system that allows an organization to manage its customer information, contacts and relationships
_______________An information system that utilizes geographic data
_______________An integrated collection of logically related data elements.
_______________An internet-based system that provides for information exchange between an organization and its authorized external stakeholders.
_______________An internet-based system that provides for information exchange between an organization and its authorized internal stakeholders
_______________An organization integrates global business activities through close cooperation and interdependence among international divisions.
_______________An organizational unit that uses centralized computing resources to perform information processing activities for an organization
_______________Architecture based on the human brains meshlike structure
_______________Business transactions occurring between consumers using internet capabilities. Ebay and Craigslist are examples.
_______________Can we afford to develop the system we are planning?
_______________Computer formulas that learn and mutate themselves
_______________Computer networks where one of the computers connected together provides a service to the other computers in the network.
_______________Coordinating ecommerce activities with the other marketing/sales channels of an organization
_______________Data about data.
_______________Data planning tool that models the relationships among the tables in a database.
_______________Data values describing the attributes of an entity plus the operations that can be performed upon the data.
_______________Database Management System.
_______________Determining whether a proposed systems development is compliant with the laws affecting its use and operation. This is especially important in international organizations where data is subject to transborder data flows.
_______________Distributing hardware, software, databases and information specialists throughout the business units of an organization
_______________Does an organization have access to the skills and talent to develop a planned computer system
_______________Does the technology exist to develop a system?
_______________Exchanging commercial data through electronic media
_______________Finely stranded wire, usually copper, insulated and intertwined to reduce the affect of electromagnetic pulse.
_______________Focusing computer hardware, software, databases and information specialists at the corporate level of an organization.
_______________Gaining unauthorized access to a computer
_______________Grouping of related records.
_______________Integrated collection of data extracted from operational, historical, and external databases to provide business intelligence for decision making.
_______________International factors that affect business trends
_______________Internet transactions that occur between businesses
_______________Making redundant copies of files for security purposes
_______________Managing the flow of goods and services through an organization is facilitated by this system
_______________Moving computer operations to a division or organization outside of the United States.
_______________Moving computer operations to an organization independent of our own on a contractual basis.
_______________Moving data across international boundaries
_______________Moving from a mainframe to small computing platforms.
_______________Not using information technology both effectively and efficiently.
_______________Placing components of a database in places where it is most frequently accessed.
_______________Portal, catalog, exchange and auction are examples
_______________Query language whos basic form is Select From Where.
_______________Recognizing the systems interrelationships in a situation
_______________Scrambling data to prevent unauthorized access during data transfer
_______________Security systems based on human physical characteristics
_______________Selection, performance, personal attention and security are examples
_______________Short range wireless communication media
_______________Should our subscribers be required to join or mailing list or do we create a mailing list and allow them to withdraw themselves
_______________Star, Ring, Bus
_______________Stealing software
_______________The ability of an IT system to maintain operations in the event of partial system failure
_______________The consumer of a computer technology
_______________The marketing or sales unit established to manage ecommerce transactions
_______________The presence of information and procedures that allow a transaction to be traced through all stages of information processing.
_______________The process of integrating all the enterprise computer platforms in an organization. Also known as enterprise integrated information systems.
_______________The transfer of voice signals over the internet
_______________Transactions on the internet similar to a customer shopping in a store but online.
_______________Transferring money through electronic media
_______________Undesired email
_______________Using an organizations computer resources during work hours for unauthorized purposes.
_______________Using software to analyze data from a data warehouse to find hidden patterns and trend
_______________A graphical diagramming tool that uses a few simple symbols to illustrate the flow of data among external entities, processing activities, and data storage elements.
_______________Will the system we are planning actually do the job we intend it to do?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started