ex 2 Flashcards

(71 cards)

1
Q

E-business

A

Using internet technologies to support business operations, including e-commerce, communication, and collaboration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

E-commerce

A

Buying and selling goods or services over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

B2B (Business-to-Business)

A

Online transactions between businesses (e.g., manufacturer to wholesaler).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

B2C (Business-to-Consumer)

A

Selling products or services directly to customers online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

C2C (Consumer-to-Consumer)

A

Consumers selling to other consumers online (e.g., eBay, Facebook Marketplace).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

B2G (Business-to-Government)

A

Businesses providing products or services to government agencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pure-play (Virtual Business)

A

A business that operates entirely online with no physical store.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Click-and-Mortar (Brick-and-Click)

A

Combines online and physical operations for customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Value Chain

A

A series of business processes that add value to a product or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disruptive Technology

A

New technology that changes the way industries operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sustaining Technology

A

Improves existing products or services that customers already use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disintermediation

A

Removing intermediaries (middlemen) through technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Re-intermediation

A

Adding new intermediaries that add value to the supply chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cybermediation

A

Use of technology to reintroduce intermediaries such as Expedia.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Long Tail

A

Selling niche products to many small audiences online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Effect

A

A product or service becomes more valuable as more people use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Business Model

A

A plan for how a company creates, delivers, and captures value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Revenue Model

A

How a business earns money (advertising, subscriptions, transactions, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Open System

A

System that allows free exchange of information with other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Knowledge Management System (KMS)

A

System that supports capturing, organizing, and sharing organizational knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Ethics

A

Principles of right and wrong that guide behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Information Ethics

A

Issues related to ethical and moral aspects of information use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Privacy

A

The right to be left alone and control personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Information Security

A

Protecting information from unauthorized use, access, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Confidentiality
Ensuring information is accessible only to authorized users.
26
Integrity
Ensuring data is accurate and has not been altered.
27
Availability
Ensuring information is available to authorized users when needed.
28
Authentication
Process of confirming a user’s identity.
29
Authorization
Giving someone permission to access certain resources.
30
Malware
Malicious software designed to damage or disable systems.
31
Virus
Malware that attaches to legitimate software and spreads when executed.
32
Worm
Malware that spreads automatically through networks.
33
Trojan Horse
Software that appears legitimate but hides malicious functions.
34
Phishing
Fake emails or websites designed to steal personal information.
35
Spoofing
Pretending to be someone else online (fake identity or IP address).
36
Social Engineering
Manipulating people into revealing confidential information.
37
Encryption
Scrambling data so it can only be read with a decryption key.
38
Firewall
Hardware or software that prevents unauthorized access to a network.
39
Intrusion Detection System (IDS)
Monitors network traffic for suspicious activity.
40
Acceptable Use Policy (AUP)
Rules for appropriate use of company information systems.
41
Email Privacy Policy
Details how emails are monitored and protected.
42
Internet Use Policy
Defines employee rights and responsibilities when using the internet.
43
Workplace Monitoring Policy
Outlines how, when, and where a company monitors employees.
44
Information Security Plan
Plan describing how security policies will be implemented.
45
Digital Divide
The gap between people with and without access to technology.
46
Green Computing
Using computing resources in an environmentally responsible way.
47
Disaster Recovery Plan (DRP)
Plan for restoring IT systems after a disaster.
48
Business Continuity Plan (BCP)
Plan to keep operations running after a major disruption.
49
Information MIS Infrastructure
Defines how a company will build, deploy, and share its data and MIS assets.
50
Agile MIS Infrastructure
Supports organizational change and flexibility.
51
Sustainable MIS Infrastructure
Minimizes environmental impact of technology.
52
Hardware
Physical devices of a computer system (e.g., servers, routers).
53
Software
Set of instructions a computer executes to perform tasks.
54
Network
A communications system connecting computers or devices.
55
Data Center
Facility used to house MIS resources like servers and storage.
56
Virtualization
Creating multiple virtual machines on a single physical device.
57
Cloud Computing
Internet-based computing delivering IT resources on demand.
58
SaaS (Software as a Service)
Delivers applications over the internet (e.g., Google Workspace).
59
PaaS (Platform as a Service)
Provides a platform for developers to build, test, and deploy apps.
60
IaaS (Infrastructure as a Service)
Offers virtualized computing resources online (e.g., AWS).
61
Scalability
System’s ability to grow or shrink performance and cost based on demand.
62
Elasticity
Ability to automatically increase or decrease resources as needed.
63
Utility Computing
Paying only for computing resources used.
64
Grid Computing
Connecting computers to work together as one large system.
65
Service Level Agreement (SLA)
Contract defining expected service performance (e.g., uptime guarantee).
66
Moore’s Law
Computing power doubles roughly every two years.
67
Energy Efficient MIS
Technology that uses less power and reduces waste.
68
E-waste
Discarded electronic devices or equipment.
69
Carbon Emissions
Greenhouse gases produced by technology and energy use.
70
Vendor Lock-In
Difficulty switching providers due to dependency on one vendor.
71
Server Farm (Cloud Center)
Large collection of servers providing computing services.