• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/87

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

87 Cards in this Set

  • Front
  • Back

Social Graph

ability to collect, express, and leverage the connections between the site’s users, or as some describe it, “the global mapping of everyone and how they’re related.”

Network effects

the value of a product or service increases as the number of users grows.

Switching Costs

The cost a consumer incurs in moving from one product to another

Dark Web

Internet content that can't be indexed by Google and other search engines

APIs

Application programming interfaces- guidelines published by firms that tell other programs how to get a service to perform a task

Free Rider problem

When others take advantage of a user or service without providing any sort of reciprocal benefit

Walled Garden

closed network or single set of services controlled by one dominant firm

Content Adjacency

concern that an advertisement will run rear offensive material, embarrassing an advertiser

Cloud

collection of resources available for access over the internet

OSS

Software that is free and whose code can be accessed and potentially modified by anyone

Impressions

each time an ad is served to a user for viewing

CPM

cost per thousand impressions

Engagement & Banner ads

promotion technique popular with social media that attempts to get consumers to interact with an ad

Crowdsourcing

the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined generally large group of people

Localization

adapting products and services for different languages and regional differences

Affiliate programs

performance-based marketing in which a business rewards one or more affiliates for each visitor or customer brought by the affiliate's own marketing efforts.

Hardware Software Layer cake

user


application


operating system


hardware

UI

user interface- mechanism through which users interact with a computing device

Embedded systems

special-purpose software designed and included inside physical products


-smarter


-diagnose problems


-provide alerts

Platform Independence

Products and services that allow for the development and integration of software and complementary goods

Desktop software

Applications installed on a personal computer, typically supporting tasks performed by a single user.

ERP

Enterprise resource planning- software package that integrates the many functions of a business

CRM

Customer relationship management- systems used to support customer-related sales and marketing activities

SCM

Supply chain management- systems that can help a firm manage aspects of its value chain, from flow of raw materials into the firm, through delivery of finished products and services

BI

Business Intelligence- use data created by other systems to provide reporting and analysis for organizational decision making

DBMS

or database software; software for creating, maintaining, and manipulating data

Distributed computing

a form of computing where systems in different locations communicate and collaborate to complete a task

server and client

-software program that makes request of a server program


-program that fulfills the requests of a client

Application server

Software that houses and serves business logic for use by multiple applications

Data Sharing Formats

EDI- electronic data interchange


XML- extensible markup language

Scripting Languages- VB and JAVA

executes within an application


VB- Microsoft


JAVA- designed for true platform independence for application developers



Cloud computing

replacing computing resources with services provided over the internet

SaaS benefits/risks

form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online

Service oriented architecture

robust set of Web services built around an organizations processes and procedures

Virtualization

type of software that allows a single computer to function as if it were several computers, each running its own operating system and software.

Why is OSS preferred?

open source software- preferred because free, reliable, secure, scalable, agility and time to market

Private clouds

pools of computing resources that reside inside an organization and that can be served up for specific tasks as need arrives

PaaS & IaaS

Platform as a service- cloud providers provide hardware, operating system, tools, and hosting




Infrastructure as a service- cloud providers offer services that include running the remote hardware and networking

Black swans

Unpredicted, but highly impactful events. Scalable computing resources can help a firm deal with spiking impact from such events

Server farm

massive network of computer servers running software to coordinate their collective use, provide backbone for SaaS

Analytics

term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions

Difference between data/information/knowledge

data- raw facts and figures


information- data presented in a context so that it can answer a question or support decision making


knowledge- insight derived from experience and expertise

Database

A single table or collections of related tables

SQL

Structured query language- language used to create and manipulate databases

DB administrator

Job title focused on directing, performing, or overseeing activities associated with a database or set of databases

Legacy systems

older information systems that are often incompatible with other systems, technologies, and ways of conducting business

Data warehouse

set of databases designed to support decision making in an organization

Data mart

database or databases focused on addressing the concerns of a specific problem or business unit

Data mining

process of using computers to identify hidden patterns in, and to build models from, large data sets

Opt-in and Opt-out

consumers are usually given benefits to opt-in to companies tracking their data such as where they use their card

ISP

Internet service provider- organization or firm that provides access to the Internet

URL

Uniform resource locator- or web address, identify resources on the Internet along with the application protocol need to retrieve it

HTTP

Hypertext transfer protocol- allows web browsers and web serves to communicate with each other

FTP

File transfer protocol- used to copy files from one computer to another

IP address

value used to identify a device that is connected to the internet

Load balancing

distributing a computing or networking workload across multiple systems to avoid congestion and slow performance

Fault tolerance

ability of a system to continue operation even if a component fails.





Cybersquatting

acquiring the domain name that refers to a firm, individual, product, or trademark with the goal of exploiting it for financial gain

HTML

Hypertext markup language- language used to compose web pages

Cache

temporary storage space used to speed computing tasks

TCP/IP

Transmission control protocol- works at both ends of most internet communication to ensure a perfect copy of message




Internet protocol- routing protocol that is in charge of forwarding packets on the internet

Wi-Fi, LTE, WiMAX

Wireless fidelity- term used to brand wireless local-area networking devices




LTE- long term evolution global winner




WiMAX- worldwide interoperability for microwave access

WEP & WAP

Wired Equivalent privacy- intention to provide data confidentiality comparable to traditional wired network




Wireless application protocol- technical standard for accessing information over a mobile wireless network

CDMA and GSM

Code division multiple access- allows users full access to the entire spectrum of bands




Global System for mobile communication- assigns time slots to multiple conversation streams

Virus

programs that infect other software or files

Worms

programs that take advantage of security vulnerability to automatically spread but unlike viruses worms do not require executable

Trojans

exploits that try to sneak in by masquerading as something they are not

Hacker/hacktivist

-someone who breaks into computer systems


-protester seeking to make a political point by leveraging technology tools, often defacement or damage

Phishing

a con executed using technology, typically targeted at acquiring sensitive information

Biometrics

technologies that measure and analyze human body characteristics for identification or authentication

Malware: botnets, adware, spyware

-hordes of surreptitiously infiltrated computer, linked and controlled remotely, also known as zombie networks


-programs installed without full user consent or knowledge


-software that monitors user actions, network traffic, or scans for files

dumpster diving and shoulder surfing

-combing through trash to identify valuable assets


-gaining compromising information through observation

Encryption

scrambling data using a code or formula

firewall

system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use

cipher

code used in encryption

patches

software updates that plug existing holes

Query

a search

PageRank

algorithm developed by Google cofounder Larry Page to rank Web sites

SEO

search engine optimization- process of improving a page's organic search results

SEM

search engine marketing- practice of designing, running and optimizing search engine ad campaigns

PPC

pay-per-click

CPC

cost-per-click

CTR

click-through rate- the number of times an ad is clicked on divided by the number of time the ad is delivered

CPM

cost per thousand views

Link fraud & click fraud

-process of creating a series of bogus web sites, all linking back to the pages one is trying to promote

Spiders/web crawlers

software that traverses available Web links in an attempt to perform a given task

Geotargetting

identifying a user's physical location for the purpose of delivering tailored ads or other content