• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/96

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

96 Cards in this Set

  • Front
  • Back

___ is the global mapping of users and organizations and how they are connected

social graph

___ happen when the value of a product or service increases as its number of users expands

network effects/metcalfe's law/network externalities

___ are the costs a consumer incurs when moving from one product to another. can involve actual money spent as well as investments in time, any data los, and so forth

switching costs

___ is internet content that cant be indexed by google or other search engines

Dark web

___ are programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data

APIs (Application programming interfaces)

___ is when others take advantage of a user or service without providing any sort of reciprocal benefit

free rider problem

___ is a network or single set of services controlled by one dominant firm

walled garden

___ is a collection of resources available for access over the internet

cloud

___ is software that is free and whose code can be accessed and potentially modified by anyone

OSS (Open Source Software)

___ is a promotion technique popular with social media that tries to get consumers to interact with an ad, then shares that action with friends

Engagement/banner ads

___ is the act of taking a job traditionally performed by a designated agent, and outsourcing it to an undefined generally large group of people in the form of an open call

crowdsourcing

___ is adapting products and services for different languages and regional differences

localization

___ is a mechanism thru which users interact with a computing device. it includes elements of the graphical user interface

UI (user interface)

___ are special purpose software designed and included inside physical products (often on firmware); help make devices "smarter," sharing usage information, diagnosing problems, etc

embedded systems

___ refers to technology you can use to implement things on one machine and use them on another machine without (or with minimal) changes

platform independence

___ are applications installed on a PC, typically supporting tasks performed by a single user

desktop software

___ are applications that address the needs of multiple users throughout an organization or work group

enterprise software

___ are software packages that integrate the many functions of a business

ERP (Enterprise Resource Planning)

___ are systems used to support customer-related sales and marketing activities

CRM (Customer Relationship Management)

___ are systems that can help a firm manage aspects of its value chain, from the flow of raw materials into the firm thru delivery of finished products and services at the point-of-consumption

SCM (Supply Chain Management)

___ are systems that use data created by other systems to provide reporting and analysis for organizational decision making

BI (Business Intelligence)

___ is software for creating, maintaining, and manipulating data

DBMS (Database Management System)


- also referred to as database software

___ is a form of computing where systems in different locations communicate and collaborate to complete a task

distributed computing

Server & Client

world wide web is an example; refers to 2 pieces of software, a client that makes a request, and a server that receives and attempts to fulfill the request

___ is software that house and serve business logic for use (and reuse) by multiple applications

application server

2 types of Data sharing formats

EDI (Electronic Data Interchange)


XML (Extensible Markup Language)

___ is a set of standards for exchanging messages containing formatted data between computer applications

EDI (Electronic Data Interchange)

___ is a tagging language that can be used to identify data fields made available for use by other applications. Most APIs and web services send messages where the data exchanged is wrapped in these tags

XML (Extensible Markup Language)

___ are programming tools that execute within an application. they are interpreted within their applications, rather than compiled to run directly by a microprocessor

Scripting Languages

___ is a scripting language that automates functions in office

VB

___ is a programming language designed to provide true platform independence ("write once, run anywhere") for application developers

JAVA

___ encompasses many different efforts; two categories SaaS and Utility computing

Cloud Computing

___ is when a firm subscribes to a third party software-replacing service that is delivered online

SaaS (Software as a Service)

___ includes variants such as platform as a service (PaaS) and infrastructure as a service (IaaS)

Utility Computing

___ is an architectural pattern in computer software design in which application components provide services to other components via a communications protocol, typically over a network

Service Oriented Architecture

___ is a type of software that allows a single computer to function as if it were several different computers running their own operating system and software. can make computing more efficient, cost effective, and scalable

virtualization

Why is OSS preferred?

cost, reliability, security, scalability, agility, and time to market

___ are pools of computing resources that reside inside an organization and that can be served up for specific tasks as need arrives

private clouds

___ are unpredicted but highly impactful events

black swans

___ are massive networks of computer servers running software to coordinate their collective use. provide the infrastructure backbone to SaaS and hardware cloud efforts

server farm

___ are the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions

analytics

Difference between data/information/knowledge

data: simply raw facts/figures


information: becomes information when it's presented in a context so that it can answer a question, etc.


knowledge: insight from experience and expertise

___ is a single table or collection of related tables; simply a list of data

database

___ are sometimes called "databade software" and is software for creating, maintaining, and manipulating data

DBMS (Database Management Systems)

___ is a language used to create and manipulate databases

SQL (Structured Query Language)

___ is the job title focused on directing, performing, or overseeing activities associated with a database or set of them

Database Administrator

___ are older information systems that are often incompatible with other systems, technologies, and ways of conducting business.

legacy systems

___ is a set of databases designed to support decision making in an organization

data warehouse

___ is a database or databases focused on addressing the concerns of a specific problem (e.g. increasing customer retention, improving product quality) or business unit

Data mart

___ is the process of using computers to identify hidden patterns in, and to build models from, large data sets

data mining

___ is a program that requires customer consent; or where all customers are enrolled and must get out

opt-in/opt-out programs

___ is the organization or firm that provides access to the internet

ISP (Internet Service Provider)

___ often used interchangeably with "web address," they identify resources on the internet along with the application protocol needed to retrieve it

URL (Uniform Resource Locator)

___ is application transfer protocol that allows web browsers and web servers to communicate with each other

HTTP (Hypertext Transfer Protocol)

___ is an application transfer protocol that is used to copy files from one computer to another

FTP (File Transfer Protocol)

___ is a value used to identify a device that is connected to the internet. usually expressed as four numbers separated by periods

IP Address

___ is distributing a computing or networking workload across multiple systems to avoid congestion and slow performance

load balancing

___ is the ability of a system to continue operation even if a component fails

fault tolerance

___ is acquiring a domain name that refers to a firm, product, or trademark, with the goal of exploiting it for financial gain

cybersquatting

___ is the language used to compose web pages

HTML (Hypertext Markup Language)

___ is temporary storage space used to speed computing tasks

Cache

___ works at both ends of most internet communication to ensure a perfect copy of a message is sent

TCP (Transmission Control Protocol)

___ is routing protocol that is in charge of forwarding packets on the internet

IP (Internet Protocol)

___'s intention was to provide data confidentiality comparable to that of a traditional wired network

WEP (Wired Equivalent Privacy)

___ is a web browser for mobile devices such as phones that use the protocol

WAP (Wireless Application Protocol)

2 major 3G Standards

CDMA and GSM

CDMA

code division multiple access

GSM

global system for mobile communications

___ is a program that infects other software or files. it requires an executable program to spread. attaches to other executables; can spread via operating systems, programs, etc.

virus

___ is a program that takes advantage of security vulnerability to automatically spread, but unlike viruses, these do not require an executable. some scan for and install themselves on vulnerable systems

worm

___ exploits that try to sneak in by masking itself as something it is not. released when user is duped into downloading and installing the malware cargo

trojans

___ is a term that can be applied to either someone who breaks into computer systems or is a particularly clever programmer

hacker

___ is a protestor seeking to make a political point by leveraging technology tools, often thru system infiltration defacement, or damage

hacktivist

___ is a con executed using technology, typically targeted at acquiring sensitive info or tricking someone into installing malicious software

phishing

___ are technologies that measure and analyze human body characteristics. Examples include finger scanners or eye scanners

biometrics

___ is a term used to refer to a variety of hostile/intrusive software

malware

___ are hordes or surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks

botnets

___ are programs installed without full user consent or knowledge that later serve unwanted ads

adware

___ is software that surreptitiously monitors user actions, network traffic, or scans for files

spyware

___ is combing through trash to identify valuable assets

dumpster diving

___ is gaining compromising information thru observation

shoulder surfing

___ is scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key

encryption

___ is a system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use

firewall

___ are software updates that plug existing holes

patches

___ is another term for search

query

___ is an algorithm developed by google cofounder larry page to rank websites

pagerank

___ is the process of improving a page's organic search results

SEO (Search Engine Optimization)

___ is the practice of designing, running and optimizing search engine ad campaigns

SEM (Search Engin Marketing)

___ is the concept where advertisers don't pay unless someone clicks on their ad

PPC (Pay per click)

___ is the max amount of money an advertiser will pay for each click on their ad

CPC (Cost per click)

___ is the number of users who clicked an ad divided by the number of times the ad was delivered (impressions). this measures the percentage of people who clicked on an ad to arrive at a destination site

CTR (Click through rate)

CPM

Cost per thousand impressions

___ creates a series of bogus websites, all linking back to a page, in hopes of increasing that page's results in organic search

link fraud

___ is when site operators generate bogus ad clicks to earn PPC income

Click fraud

___ are software that traverse available web links in an attempt to perform a given task. Search engines use these to discover documents for indexing and retrieval

Spiders/Web Crawlers

___ refers to the practice of delivering different content to a website user based on his or her geographic location

geotargeting