Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
96 Cards in this Set
- Front
- Back
___ is the global mapping of users and organizations and how they are connected |
social graph |
|
___ happen when the value of a product or service increases as its number of users expands |
network effects/metcalfe's law/network externalities |
|
___ are the costs a consumer incurs when moving from one product to another. can involve actual money spent as well as investments in time, any data los, and so forth |
switching costs |
|
___ is internet content that cant be indexed by google or other search engines |
Dark web |
|
___ are programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data |
APIs (Application programming interfaces) |
|
___ is when others take advantage of a user or service without providing any sort of reciprocal benefit |
free rider problem |
|
___ is a network or single set of services controlled by one dominant firm |
walled garden |
|
___ is a collection of resources available for access over the internet |
cloud |
|
___ is software that is free and whose code can be accessed and potentially modified by anyone |
OSS (Open Source Software) |
|
___ is a promotion technique popular with social media that tries to get consumers to interact with an ad, then shares that action with friends |
Engagement/banner ads |
|
___ is the act of taking a job traditionally performed by a designated agent, and outsourcing it to an undefined generally large group of people in the form of an open call |
crowdsourcing |
|
___ is adapting products and services for different languages and regional differences |
localization |
|
___ is a mechanism thru which users interact with a computing device. it includes elements of the graphical user interface |
UI (user interface) |
|
___ are special purpose software designed and included inside physical products (often on firmware); help make devices "smarter," sharing usage information, diagnosing problems, etc |
embedded systems |
|
___ refers to technology you can use to implement things on one machine and use them on another machine without (or with minimal) changes |
platform independence |
|
___ are applications installed on a PC, typically supporting tasks performed by a single user |
desktop software |
|
___ are applications that address the needs of multiple users throughout an organization or work group |
enterprise software |
|
___ are software packages that integrate the many functions of a business |
ERP (Enterprise Resource Planning) |
|
___ are systems used to support customer-related sales and marketing activities |
CRM (Customer Relationship Management) |
|
___ are systems that can help a firm manage aspects of its value chain, from the flow of raw materials into the firm thru delivery of finished products and services at the point-of-consumption |
SCM (Supply Chain Management) |
|
___ are systems that use data created by other systems to provide reporting and analysis for organizational decision making |
BI (Business Intelligence) |
|
___ is software for creating, maintaining, and manipulating data |
DBMS (Database Management System) - also referred to as database software |
|
___ is a form of computing where systems in different locations communicate and collaborate to complete a task |
distributed computing |
|
Server & Client |
world wide web is an example; refers to 2 pieces of software, a client that makes a request, and a server that receives and attempts to fulfill the request |
|
___ is software that house and serve business logic for use (and reuse) by multiple applications |
application server |
|
2 types of Data sharing formats |
EDI (Electronic Data Interchange) XML (Extensible Markup Language) |
|
___ is a set of standards for exchanging messages containing formatted data between computer applications |
EDI (Electronic Data Interchange) |
|
___ is a tagging language that can be used to identify data fields made available for use by other applications. Most APIs and web services send messages where the data exchanged is wrapped in these tags |
XML (Extensible Markup Language) |
|
___ are programming tools that execute within an application. they are interpreted within their applications, rather than compiled to run directly by a microprocessor |
Scripting Languages |
|
___ is a scripting language that automates functions in office |
VB |
|
___ is a programming language designed to provide true platform independence ("write once, run anywhere") for application developers |
JAVA |
|
___ encompasses many different efforts; two categories SaaS and Utility computing |
Cloud Computing |
|
___ is when a firm subscribes to a third party software-replacing service that is delivered online |
SaaS (Software as a Service) |
|
___ includes variants such as platform as a service (PaaS) and infrastructure as a service (IaaS) |
Utility Computing |
|
___ is an architectural pattern in computer software design in which application components provide services to other components via a communications protocol, typically over a network |
Service Oriented Architecture |
|
___ is a type of software that allows a single computer to function as if it were several different computers running their own operating system and software. can make computing more efficient, cost effective, and scalable |
virtualization |
|
Why is OSS preferred? |
cost, reliability, security, scalability, agility, and time to market |
|
___ are pools of computing resources that reside inside an organization and that can be served up for specific tasks as need arrives |
private clouds |
|
___ are unpredicted but highly impactful events |
black swans |
|
___ are massive networks of computer servers running software to coordinate their collective use. provide the infrastructure backbone to SaaS and hardware cloud efforts |
server farm |
|
___ are the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions |
analytics |
|
Difference between data/information/knowledge |
data: simply raw facts/figures information: becomes information when it's presented in a context so that it can answer a question, etc. knowledge: insight from experience and expertise |
|
___ is a single table or collection of related tables; simply a list of data |
database |
|
___ are sometimes called "databade software" and is software for creating, maintaining, and manipulating data |
DBMS (Database Management Systems) |
|
___ is a language used to create and manipulate databases |
SQL (Structured Query Language) |
|
___ is the job title focused on directing, performing, or overseeing activities associated with a database or set of them |
Database Administrator |
|
___ are older information systems that are often incompatible with other systems, technologies, and ways of conducting business. |
legacy systems |
|
___ is a set of databases designed to support decision making in an organization |
data warehouse |
|
___ is a database or databases focused on addressing the concerns of a specific problem (e.g. increasing customer retention, improving product quality) or business unit |
Data mart |
|
___ is the process of using computers to identify hidden patterns in, and to build models from, large data sets |
data mining |
|
___ is a program that requires customer consent; or where all customers are enrolled and must get out |
opt-in/opt-out programs |
|
___ is the organization or firm that provides access to the internet |
ISP (Internet Service Provider) |
|
___ often used interchangeably with "web address," they identify resources on the internet along with the application protocol needed to retrieve it |
URL (Uniform Resource Locator) |
|
___ is application transfer protocol that allows web browsers and web servers to communicate with each other |
HTTP (Hypertext Transfer Protocol) |
|
___ is an application transfer protocol that is used to copy files from one computer to another |
FTP (File Transfer Protocol) |
|
___ is a value used to identify a device that is connected to the internet. usually expressed as four numbers separated by periods |
IP Address |
|
___ is distributing a computing or networking workload across multiple systems to avoid congestion and slow performance |
load balancing |
|
___ is the ability of a system to continue operation even if a component fails |
fault tolerance |
|
___ is acquiring a domain name that refers to a firm, product, or trademark, with the goal of exploiting it for financial gain |
cybersquatting |
|
___ is the language used to compose web pages |
HTML (Hypertext Markup Language) |
|
___ is temporary storage space used to speed computing tasks |
Cache |
|
___ works at both ends of most internet communication to ensure a perfect copy of a message is sent |
TCP (Transmission Control Protocol) |
|
___ is routing protocol that is in charge of forwarding packets on the internet |
IP (Internet Protocol) |
|
___'s intention was to provide data confidentiality comparable to that of a traditional wired network |
WEP (Wired Equivalent Privacy) |
|
___ is a web browser for mobile devices such as phones that use the protocol |
WAP (Wireless Application Protocol) |
|
2 major 3G Standards |
CDMA and GSM |
|
CDMA |
code division multiple access |
|
GSM |
global system for mobile communications |
|
___ is a program that infects other software or files. it requires an executable program to spread. attaches to other executables; can spread via operating systems, programs, etc. |
virus
|
|
___ is a program that takes advantage of security vulnerability to automatically spread, but unlike viruses, these do not require an executable. some scan for and install themselves on vulnerable systems |
worm |
|
___ exploits that try to sneak in by masking itself as something it is not. released when user is duped into downloading and installing the malware cargo |
trojans |
|
___ is a term that can be applied to either someone who breaks into computer systems or is a particularly clever programmer |
hacker |
|
___ is a protestor seeking to make a political point by leveraging technology tools, often thru system infiltration defacement, or damage |
hacktivist |
|
___ is a con executed using technology, typically targeted at acquiring sensitive info or tricking someone into installing malicious software |
phishing |
|
___ are technologies that measure and analyze human body characteristics. Examples include finger scanners or eye scanners |
biometrics |
|
___ is a term used to refer to a variety of hostile/intrusive software |
malware |
|
___ are hordes or surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks |
botnets |
|
___ are programs installed without full user consent or knowledge that later serve unwanted ads |
adware |
|
___ is software that surreptitiously monitors user actions, network traffic, or scans for files |
spyware |
|
___ is combing through trash to identify valuable assets |
dumpster diving |
|
___ is gaining compromising information thru observation |
shoulder surfing |
|
___ is scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key |
encryption |
|
___ is a system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use |
firewall |
|
___ are software updates that plug existing holes |
patches |
|
___ is another term for search |
query |
|
___ is an algorithm developed by google cofounder larry page to rank websites |
pagerank |
|
___ is the process of improving a page's organic search results |
SEO (Search Engine Optimization) |
|
___ is the practice of designing, running and optimizing search engine ad campaigns |
SEM (Search Engin Marketing) |
|
___ is the concept where advertisers don't pay unless someone clicks on their ad |
PPC (Pay per click) |
|
___ is the max amount of money an advertiser will pay for each click on their ad |
CPC (Cost per click) |
|
___ is the number of users who clicked an ad divided by the number of times the ad was delivered (impressions). this measures the percentage of people who clicked on an ad to arrive at a destination site |
CTR (Click through rate) |
|
CPM |
Cost per thousand impressions |
|
___ creates a series of bogus websites, all linking back to a page, in hopes of increasing that page's results in organic search |
link fraud |
|
___ is when site operators generate bogus ad clicks to earn PPC income |
Click fraud |
|
___ are software that traverse available web links in an attempt to perform a given task. Search engines use these to discover documents for indexing and retrieval |
Spiders/Web Crawlers |
|
___ refers to the practice of delivering different content to a website user based on his or her geographic location |
geotargeting |