Term
|
Definition
A set of routines, protocols, and tools for building software applications |
|
|
Term
|
Definition
When those with access to technology have great advantages over those without access to technology |
|
|
Term
|
Definition
The conducting of business on the internet, not only buying and selling, but also serving customers and collaborating with business partners / the buying and selling of goods and services over the internet |
|
|
Term
|
Definition
Hypertext Markup Language / hypertext transport protocol / Uniform Resource Locator |
|
|
Term
|
Definition
Software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing |
|
|
Term
|
Definition
An IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information |
|
|
Term
|
Definition
Web-based tools that make it easy for users to add, remove, and change online content |
|
|
Term
B2B/B2C/C2B/C2C Business-to-business/business-to-consumer/consumer-to-business/consumer-to-consumer |
|
Definition
Applies to businesses buying from and selling to each other over the internet / Applies to business that sells its products or services to consumers over the internet / Applies to any consumer that sells a product or service to a business over the internet / Applies to sites primarily offering goods and services to assist consumers interacting with each other over the internet |
|
|
Term
|
Definition
A new way of doing things that initially does not meet the needs of existing customers |
|
|
Term
|
Definition
Consists of a number of eshops; it serves as a gateway through which the visitor can access other eshops |
|
|
Term
|
Definition
A type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the internet |
|
|
Term
|
Definition
WYSIWYGs (What You See Is What You Get) for mashups that provide a visual interface to build a mashup, often allowing the user to drag and drop data points into a web application |
|
|
Term
|
Definition
A set of interactive telecommunication technologies that allow two or more locations to interact via two-way video and audio transmissions simultaneously |
|
|
Term
Workflow Management System |
|
Definition
Facilitates the automation and management of business processes and controls the movement of work through the business process |
|
|
Term
|
Definition
Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction. |
|
|
Term
Document Management System (DMS) |
|
Definition
Supports the electronic capturing, storage, distribution, archival, and accessing of documents |
|
|
Term
|
Definition
Consists of anything that can be documented, archived, and codified, often with the help of IT / The knowledge contained in people's heads |
|
|
Term
Knowledge Management System (KMS) |
|
Definition
Supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization |
|
|
Term
|
Definition
An evolving extension of the World Wide Web in which web content can be expressed not only in natural language, but also in a format that can be read and used by software agents, thus permitting them to find, share, and integrate information more easily |
|
|
Term
|
Definition
A website or web application that uses content from more than one source to create a completely new service |
|
|
Term
|
Definition
A global hypertext system that uses the internet as its transport mechanism |
|
|
Term
Systems Development Life Cycle (SDLC) |
|
Definition
The overall process for developing information systems from planning and analysis through implementation and maintenance |
|
|
Term
|
Definition
A technique for identifying and tracking assets and individuals via technologies such as radio frequency identification and smart cards |
|
|
Term
|
Definition
A smaller-scale representation or working model of thae user's requirements or a proposed design for an information system |
|
|
Term
|
Definition
Uses small teams to produce small pieces of delieverable software using sprints, or 30-day intervals, to achieve an appointed goal |
|
|
Term
|
Definition
A path from the start to the finish that passes through all the tasks that are critical to completing the project in the shortest amount of time |
|
|
Term
|
Definition
The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project |
|
|
Term
Outsourcing (On/Offshore) |
|
Definition
An arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house |
|
|
Term
|
Definition
Contains a microchip and an antenna, and typically works by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag |
|
|
Term
|
Definition
Blending computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations |
|
|
Term
|
Definition
A simple bar chart that depicts project tasks against a calendar |
|
|
Term
|
Definition
Defines the work that must be completed to deliver a product with the specified features and functions |
|
|
Term
|
Definition
Occurs when developers add extra featuresthat were not part of the initial requirements / Occurs when the scope of the project increases |
|
|
Term
|
Definition
A sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance |
|
|
Term
Program Evaluation and Review Technique (PERT) |
|
Definition
A graphical network model that depicts a project's tasks and the relationships between those tasks |
|
|
Term
|
Definition
The forgoing of someone's identity for the purpose of fraud |
|
|
Term
|
Definition
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting |
|
|
Term
|
Definition
Scrambles information into an alternative form that requires a key or password to decrypt the information |
|
|
Term
|
Definition
Includes a variety of threats such as viruses, worms, and Trojan horses |
|
|
Term
|
Definition
A program or device that can monitor data traveling over a network |
|
|
Term
|
Definition
Software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker |
|
|
Term
|
Definition
A method for confirming users' identities |
|
|
Term
|
Definition
Breaks into other people's computer systems and may just look around or steal and destroy information / Works at the request of the system owners to find system vulnerabilities and plug the holes |
|
|
Term
|
Definition
Hardware and/or software that guards a private network by analyzing the information leaving and entering the network |
|
|
Term
|
Definition
Technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email |
|
|
Term
|
Definition
The forgoingof the return address on an email so that the email message appears to come from someone other than the actual sender |
|
|
Term
|
Definition
Hides inside other software, usually as an attachment or a downloadable file |
|
|
Term
|
Definition
Viruses that open a way into the network for future attacks |
|
|
Term
|
Definition
People very knowledgeable about computers who use their knowledge to invade other people's computers / A hacker with criminal intent |
|
|
Term
|
Definition
Attack computer systems by transmitting a virus hoax, with a real virus attached |
|
|
Term
|
Definition
Find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses |
|
|
Term
|
Definition
Software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about |
|
|
Term
|
Definition
A type of virus that spreads itself, not only from file to file, but also from computer to computer |
|
|
Term
|
Definition
Stimulates human intelligence such as the ability to reason and learn |
|
|
Term
|
Definition
A category of AI that attempts to emulate the way the human brain works |
|
|
Term
Decision Support System (DSS) |
|
Definition
Models information to support managers and business professionals during the decision-making process |
|
|
Term
|
Definition
Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems |
|
|
Term
|
Definition
A mathematical method of handling imprecise or subjective information |
|
|
Term
Management Information Systems (MIS) |
|
Definition
A general name for the business function and academic discipline covering the application of people, technologies, and procedures - collectively call information systems - to solve business problems |
|
|
Term
Random Access Memory/Read-only Memory (RAM/ROM) |
|
Definition
The computer's primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor's high-speed external data bus / The portion of a computer's primary storage that does not lose its contents when one switchs off the power |
|
|
Term
|
Definition
Group of eight bits represents one natural language character |
|
|
Term
|
Definition
A field (or group of fields) that uniquely identifies a given entity in a table |
|
|
Term
|
Definition
|
|
Term
Data Mining / Data Warehouse |
|
Definition
The process of analyzing data to extract information not offered by the raw data alone / A logical collection of information - gathered from many different operational databases - that supports business analysis activities and decision-making tasks |
|
|
Term
|
Definition
Computer that is designed to request information from a server / Computer that is dedicated to providing information in response to external requests |
|
|
Term
|
Definition
An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together |
|
|
Term
|
Definition
An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination |
|
|