Shared Flashcard Set

Details

Management Information Systems
Final Exam
47
Computer Networking
Undergraduate 2
12/12/2010

Additional Computer Networking Flashcards

 


 

Cards

Term
* A business process is a network of activities
Definition
resources, facilities, and information that interact to achieve some business function.
Term
* In business processes
Definition
facilities are structures used within the business process. (ex. Inventories and databases)
Term
* information is knowledge derived from data
Definition
where data is defined as recorded facts or figures.
Term
* Good information is accurate
Definition
timely, and relevant
Term
* Information needs to be sufficient for the purpose for which it is generated
Definition
but just barely so.
Term
* For information to be worth its cost
Definition
An appropriate relationship must exist between the cost of information and its value.
Term
- five forces model- According to this model
Definition
five competitive forces determine industry profitability: bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, and rivalry among existing firms. The intensity of each of the five forces determines the characteristics of the industry, how profitable it is, and how sustainable that profitability will be.
Term
- primary activities: marketing and sales
Definition
in-bound logistics, operations, out-bound logistics, and service.
Term
- Support activities- in the generic value chain contribute indirectly to the production
Definition
sale, and service of the product. They include human resources, accounting and infrastructure, and technology. They add value indirectly but also have costs.
Term
- Porters model of business activities includes linkages
Definition
which are interactions across value activities. Linkages are important sources of efficiencies and are readily supported by information systems.
Term
- Organizations gain a competitive advantage by creating new products or services
Definition
by enhancing existing products or services, and by differentiating their products and services from those of their competitors
Term
- Because business processes are critical
Definition
complex, and dynamic in structure, well-managed organizations practice business process management (BPM).BPM is the systematic process of creating, assessing, and altering business processes.
Term
- BPM varies in scope through functional processes
Definition
cross-functional processes, and interorganizational processes
Term
- As the name implies
Definition
cross-functional processes involve activities among several, or even many, business departments. A classic example is the customer relationship management (CRM) process, which involves the activities of various departments, such as sales, marketing, operations, and customer support.
Term
- The order-processing example at REI is an interorganizational process. It includes activities at REI of course
Definition
but it also includes activities at the company that processes your credit card transactions and activities at the shipper.
Term
- Accordingly
Definition
a software-industry standards organization called the Object Management Group (OMG) created a standard set of terms and graphical notations for documenting business processes. That standard, called Business Process Modeling Notation (BPMN), is documented at www.bpmn.org.
Term
- According to Porters model
Definition
one should add cost to a value chain (here, the business process) if the change generates value greater than its cost
Term
- Over time
Definition
information systems developers studied best-of-practice techniques and from these developed a design philosophy known as service-oriented architecture (SOA).SOA was originally used to design interacting computer programs. More recently, systems designers have applied SOA principles to business process activities, whether those activities are manual, partly automated, or fully automated
Term
- When the logic for some service is isolated in this way
Definition
the logic is said to be encapsulated in the service. Encapsulation places the logic in one place, which is desirable; all other services go to that one place for that service.
Term
- XML
Definition
which stands for the eXtensible Markup Language, is used to model and structure data.
Term
- XML includes tags
Definition
which are metadata that name and identify data items
Term
- Two other standards are important for service-oriented architecture. SOAP (which
Definition
oddly enough, is not an acronym) is a protocol for exchanging messages encoded in XML. A SOAP message can include metadata that specifies how the message is to be routed, what services need to process it, how security and encryption are to be handled, and so forth
Term
- Web Services Description Language (WSDL). . To expose a service or services to the world
Definition
the designer of the service creates a WSDL document that describes, in a standard way, the particular features that the service provides and the data that need to be sent or that will be returned from the service
Term
* Problems in security threats can be unauthorized data disclosure
Definition
incorrect data modification, faculty service, denial of service, and loss of infrastructure.
Term
* Three sources of security threats are human error and mistakes
Definition
malicious human activity, and natural events and disasters.
Term
* Natural events and disasters are the third source of security problems. This category includes fires
Definition
floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature
Term
* Spoofing is another term for someone pretending to be someone else. If you pretend to be your professor
Definition
you are spoofing your professor. IP spoofing occurs when an intruder uses another sites IP address as if it were that other site. Email spoofing is a synonym for phishing.
Term
* Sniffing is a technique for intercepting computer communications. With wired networks
Definition
sniffing requires a physical connection to the network
Term
* With wireless networks
Definition
no such connection is required: Drive-by sniffers simply take computers with wireless connections through an area and search for unprotected wireless networks.
Term
* The third problem category
Definition
faulty service, includes problems that result because of incorrect system operation. Usurpation occurs when unauthorized programs invade a computer system and replace legitimate programs
Term
* The user name identifies the user (the process of identification)
Definition
and the password authenticates that user (the process of authentication).
Term
* A smart card is a plastic card similar to a credit card. The microchip
Definition
which holds far more data than a magnetic strip, is loaded with identifying data
Term
* Biometric authentication uses personal physical characteristics such as fingerprints
Definition
facial features, and retinal scans to authenticate users
Term
* Malware is viruses
Definition
worms, Trojan horses, spyware, and adware
Term
* Database administration refers to a function that pertains to a particular database. The ERP
Definition
CRM, and MRP databases each have a database administration function.
Term
* One potential problem with stored data
Definition
however, is that
Term
* the key might be lost or that disgruntled or terminated employees might destroy it. Because of this possibility
Definition
when data are encrypted, a trusted party should have a copy of the encryption key. This safety procedure is sometimes called key escrow.
Term
* Human safeguards involve the people and procedure components of information systems. Human safeguards include position definitions
Definition
hiring and screening, dissemination and enforcement, and termination.
Term
* Given appropriate job descriptions
Definition
user accounts should be defined to give users the least possible privilegeneeded to perform their jobs
Term
* Account administration includes account management
Definition
password management, and help desk policies
Term
* Cold sites
Definition
in contrast, provide office space, but customers themselves provide and install the equipment needed to continue operations.
Term
* Collaboration occurs when two or more people work together to achieve a common goal
Definition
result, or work product
Term
* content management. When multiple users are contributing and changing documents
Definition
schedules, task lists, assignments, andso forth, one users work might interfere with anothers.
Term
* Workflow control is the third key driver of effective collaboration. A workflow is a process or procedure by which content is created
Definition
edited, used, and disposed
Term
* 2. Over time
Definition
the team increases in capability. Working together becomes easier and more effective.
Term
Business Process
Definition
a network of activities, resources, facilities, and information that interact to achieve some business function.
Supporting users have an ad free experience!