OC820107

Elite Note Taker
66Uploads
0Likes
0Blog Articles
All Activity
Uploads (66)
Blog Articles (0)
Homework Help (0)
RYERSONACC 406Alison BeavisWinter

ACC 406 Chapter Notes - Chapter 3: Inkjet Printing, Fixed Cost, Variable Cost

OC8201078 Page
20 Apr 2016
26
View Document
RYERSONACC 406Alison BeavisWinter

ACC 406 Chapter Notes - Chapter 7: Cost Driver, Quality Costs

OC8201078 Page
20 Apr 2016
27
These measures and rates produce average costs that over- or understate individual product costs. Unit- and non-unit-level activities: unit-level activ
View Document
RYERSONACC 406Alison BeavisWinter

ACC 406 Chapter Notes - Chapter 10: Corn Chip

OC82010710 Page
20 Apr 2016
37
Chapter 10: standard costing: a managerial control tool. Budgets set standards that are used to control and evaluate managerial performance. Budgets id
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 14: Search Engine Optimization, Web Design, E-Procurement

OC8201073 Page
14 Apr 2016
30
Much of canada"s job growth can be atributed to small businesses. Large organizaions shited focus to b2b, which opens up opportunity for b2c e-business
View Document
RYERSONACC 406Alison BeavisWinter

ACC 406 Chapter Notes - Chapter 11: Cost Driver, Stabilisation Force In Bosnia And Herzegovina

OC82010713 Page
12 Apr 2016
35
Performance reports: compares actual costs with budgeted costs. Two ways to make comparisons: staic budget. Compare actual costs with budgeted costs fo
View Document
RYERSONACC 406Alison BeavisWinter

ACC 406 Chapter Notes - Chapter 13: Apple Pie, Income Statement, Longrun

OC82010710 Page
11 Apr 2016
31
Make consists of choosing alternaives with immediate/limited end in view. Some decisions that are short-run have long-run consequences. Oten small-scal
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 13: World Intellectual Property Organization, Michael Geist, Shrink Wrap

OC8201074 Page
8 Apr 2016
25
Personal informaion can easily gathered on the internet. Increasing privacy concerns led to development of legislaion within canada and abroad. The per
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 12: Database Marketing, Web Banner, Lead Generation

OC8201073 Page
8 Apr 2016
26
Metrics: measures e-business performance range from the number of website hits to the proporion of customer visits leading to sales and proit. Internet
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 11: Barter, Online Advertising, Cybersquatting

OC8201072 Page
7 Apr 2016
11
Uilizaion of the internet and electronic technologies to assist in the creaion, implementaion and evaluaion of markeing strategy. Useful in online bran
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 8: Uptodate, Dynamic Pricing, Vickrey Auction

OC8201074 Page
7 Apr 2016
14
The complete business process for acquiring goods though electronic means. The tradiional e-procurement process comprises the following steps: Supplier
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 10: Xml, Balanced Scorecard, Data Warehouse

OC8201074 Page
7 Apr 2016
20
Business intelligence (bi) is a tool used to capture, analyze, interpret, and report data. Concepts of bi originate from data-mining techniques, decisi
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 9: Computer Telephony Integration, Business Process Reengineering, Sales Force Management System

OC8201073 Page
7 Apr 2016
36
Crm: the use of tech. to establish, develop, maintain and opimize relaionships with customers. Markeing would develop beter campaigns by using customer
View Document
RYERSONACC 406Alison BeavisWinter

ACC 406 Chapter Notes - Chapter 1: Industrial Engineering, Securities Fraud, Total Quality Management

OC8201073 Page
9 Mar 2016
92
Managerial accounting: the provision of accounting info for a company"s internal users. Not bound by generally accepted accounting principles (gaap) or
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 7: Travelocity, Reverse Logistics, Service-Level Agreement

OC8201074 Page
26 Feb 2016
33
Originally driven by need to reduce cost/price while improving customer service and product quality. Supply chain: set of processes that encompasses ev
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 4: Database Model, Business Process Reengineering, Glossary Of Computer Hardware Terms

OC8201072 Page
26 Feb 2016
15
Enterprise-wide systems: any info system used throughout an enterprise. Can be purchased as one major piece or by linking together multiple systems usi
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 5: Standard Operating Procedure, Breakcore, Disaster Recovery

OC8201073 Page
26 Feb 2016
18
Every info system face risks of error, fraud, malicious acts or disaster. Risk: the probability of an event occurring that leads to undesirable consequ
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 1: Xml, Canada Revenue Agency, User Friendly

OC8201072 Page
26 Feb 2016
28
Internet: a global network based on a common digital communication standard. Ebusiness: any business carried out in electronic data interchange (edi) E
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 6: Ebay, Cheque Clearing, Mastercard

OC8201072 Page
26 Feb 2016
15
Online payments is cost-effective and encourages consumers to buy (b2c) (b2b) economic incentive to have online billing/payment. Credit cards are the p
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 2: Compuserve, Strategic Management, Jda Software

OC8201072 Page
26 Feb 2016
18
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Lecture Notes - Lecture 3: Voice Over Ip, Knowledge Management, Craigslist

OC8201072 Page
26 Feb 2016
15
Internet connects uniquely numbered computing devices that relay info using internet protocol (ip) Internet protocol (ip): a protocol that uses rules t
View Document
RYERSONLAW 122Theresa MiedemaFall

Law 122 Lecture 7: Ethics

OC8201072 Page
25 Feb 2016
27
View Document
RYERSONLAW 122Theresa MiedemaFall

LAW 122 Chapter Notes - Chapter 4: Gas Lighting, Risk Management, Contributory Negligence

OC8201074 Page
25 Feb 2016
30
Purpose: to compensate for harmful risky actions conducted carelessly, but to allow for careful risk-taking. Slip and fall on icy sidewalk in front of
View Document
RYERSONLAW 122Theresa MiedemaFall

LAW 122 Chapter Notes - Chapter 5: No Liability, Qualified Privilege, Vicarious Liability

OC8201072 Page
25 Feb 2016
27
View Document
RYERSONLAW 122Theresa MiedemaFall

LAW 122 Chapter Notes - Chapter 1-2: Variety Store, Ultra Vires

OC8201072 Page
25 Feb 2016
23
View Document
RYERSONLAW 122Theresa MiedemaFall

LAW 122 Chapter Notes - Chapter 7-8: Posting Rule

OC8201072 Page
25 Feb 2016
24
Elements of a contract: - intention to create legal relations. Meeting of the minds (offer and acceptance) Exchange of value (consideration: intention
View Document
RYERSONLAW 122Theresa MiedemaFall

LAW 122 Chapter Notes - Chapter 21: Canada Business Corporations Act, Search Report, Limited Partnership

OC8201071 Page
25 Feb 2016
42
View Document
RYERSONLAW 122Theresa MiedemaFall

LAW 122 Chapter Notes - Chapter 3: Product Liability, Vicarious Liability, Strict Liability

OC8201072 Page
25 Feb 2016
24
Tort - a failure to fulfill a private obligation imposed by law. Tortfeasor - a person who commits a tort. Tort law - includes almost every sort of pri
View Document
RYERSONITM 305Lin Ying DongFall

ITM 305 Chapter Notes - Chapter 1 & 8: Business Analysis, Structured Analysis, Waterfall Model

OC8201073 Page
25 Feb 2016
22
Business analysis - ensures that an information system developed fits organization needs. Computer application - a software program that executes on a
View Document
RYERSONITM 305Lin Ying DongFall

ITM 305 Chapter Notes - Chapter 9: Work Breakdown Structure, Project Risk Management, Risk Management

OC8201073 Page
25 Feb 2016
21
6 phases of a project: enthusiasm, disillusionment, panic, search for guilty, punishment of the innocent, praise and honor for the non-participant. The
View Document
RYERSONITM 305Lin Ying DongFall

ITM 305 Chapter Notes - Chapter 3: Functional Decomposition, Use Case, Business Process

OC8201073 Page
25 Feb 2016
18
Use case - an activity that the system performs, usually in response to a request by a user. Analysts decompose the system into a set of use cases (fun
View Document
RYERSONITM 305Lin Ying DongFall

ITM 305 Chapter Notes - Chapter 5: Use Case

OC8201071 Page
25 Feb 2016
26
Several variaions may exist within single use case. Capture diferent ways (steps) through which a use case could be accomplished. Ofer convenience for
View Document
RYERSONITM 305Lin Ying DongFall

ITM 305 Chapter Notes - Chapter 2: Activity Diagram, Unified Modeling Language, Functional Requirement

OC8201072 Page
25 Feb 2016
13
View Document
RYERSONITM 301Nurul HudaFall

ITM 301 Lecture Notes - Lecture 8: Hypervisor, Point-To-Point Tunneling Protocol, Service Provider

OC8201071 Page
25 Feb 2016
25
Remote access: allows user to connect with lan/wan in a different geo. location. Dial-up network: dialing directly into private network"s remote access
View Document
RYERSONITM 301Nurul HudaFall

ITM 301 Lecture Notes - Lecture 5: Dot-Decimal Notation, Classful Network, Internet Protocol Suite

OC8201072 Page
25 Feb 2016
20
Separates network into multiple logically defined segments (subnets). (geo locations, department boundaries, tech type) Reasons to separate traffic: en
View Document
RYERSONITM 301Nurul HudaFall

ITM 301 Lecture Notes - Lecture 7: Transport Layer, Network Interface Device, X.25

OC8201071 Page
25 Feb 2016
20
Pstn (public switched telephone network): network of lines providing telephone service. Co (central oice): where tele companies terminate lines. Local
View Document
RYERSONITM 301Nurul HudaFall

ITM 301 Lecture Notes - Lecture 4: Operating System, Internet Control Message Protocol Version 6, Telnet

OC8201073 Page
25 Feb 2016
21
View Document
RYERSONITM 301Nurul HudaFall

ITM 301 Lecture Notes - Lecture 2: Checksum, Session Layer, Osi Model

OC8201072 Page
25 Feb 2016
25
Simplicity: easy to design once layers and their interaction are defined clearly. Flexibility: easy to modify and develop networks by separate layers m
View Document
RYERSONITM 301Nurul HudaFall

ITM 301 Lecture Notes - Lecture 1: Computer Network, Wide Area Network, Network Management

OC8201072 Page
25 Feb 2016
23
Computer based system - system uses a microprocessor/computer for executing the task it is designed to perform. To connect, or network, computer system
View Document
RYERSONITM 301Nurul HudaFall

ITM 301 Lecture Notes - Lecture 3: Digital Subscriber Line, Network Layer, Coaxial Cable

OC8201072 Page
25 Feb 2016
26
Electrical signal strength - directly proportional to voltage. Amplitude - measure strength at given point in time. Frequency - number of times amplitu
View Document
RYERSONITM 301Nurul HudaFall

ITM 301 Lecture Notes - Lecture 6: Interior Gateway Routing Protocol, Routing Information Protocol, Virtual Lan

OC8201071 Page
25 Feb 2016
18
Vlan (virtual local area network): locally separate networks within networks. Broadcast domain: port combinaion making a layer 2 segment. Ports rely on
View Document