Term
| 5 Summary of how a business generates revenue, identify product offering, rev, and target customers |
|
Definition
|
|
Term
| 5 what are the 3 stages of websites |
|
Definition
e-integration e-transcation e-information |
|
|
Term
| 5 Priceline.coms were customers specify the product and price willing to pay |
|
Definition
|
|
Term
| 5 trying to out smart a search engine to improve page rankings |
|
Definition
|
|
Term
| 5 C2C is categorized according to |
|
Definition
| number of buyers and sellers |
|
|
Term
|
Definition
| all data sent over the internet is routed and treaded the same |
|
|
Term
|
Definition
| practice of trying to increase company's visibility |
|
|
Term
|
Definition
| anaylzying web surfers behavior |
|
|
Term
|
Definition
| paying a fee, for higher visiblitity |
|
|
Term
|
Definition
| Methods used to increase a sites ranking |
|
|
Term
|
Definition
| stage were web pages are created on the fly to produce tailored info that address partticular shit |
|
|
Term
| 6 what are the pillars of web 2.0? |
|
Definition
Innovative web tech Leveraging the data of all customers Using the Web as the business platform |
|
|
Term
|
Definition
| adding key words to pieces of info |
|
|
Term
|
Definition
| data about data. inches, ft |
|
|
Term
| 6 Netcasts can also be called? |
|
Definition
|
|
Term
|
Definition
| comm is when ppl are all meeting at the same time |
|
|
Term
|
Definition
| really simple indication- feed used to publish music video, ect |
|
|
Term
|
Definition
| tech allowing organ to access data without intimate knowledge of each others systems behind the firewall. |
|
|
Term
| 6 Content management System? |
|
Definition
| software allowing users to publish,edit, track, and retrive digital info |
|
|
Term
| 7 what is considered a primary threat to an IS? |
|
Definition
| accidents, and natural disasters |
|
|
Term
| 7 what are some technical safegaurds |
|
Definition
| firewall and physical access restrictions |
|
|
Term
|
Definition
| encoding messages before they enter the network, decoding at the other end |
|
|
Term
|
Definition
|
|
Term
|
Definition
| a computer infected by a virus that allows the attacker control without the owners knowledge |
|
|