• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/131

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

131 Cards in this Set

  • Front
  • Back
ad hoc reporting tools
Tools that put users in control so that they can create custom reports on an as-needed basis by selecting fields. ranges. summary conditions. and other parameters.
analytics
A term describing the extensive use of data. statistical and quantitative analysis. explanatory and predictive models. and fact-based management to drive decisions and actions.
APIs
Application Programming Interfaces – enable one piece of software to talk to another. Used in MashUps for things like Google maps or for exchanging information between websites
application programming interfaces (APIs)
Programming hooks. or guidelines. published by firms that tell other programs how to get a service to perform a task such as send or receive data. For example. Amazon.com provides APIs to let developers write their own applications and Websites that can send the firm orders.
applications
Includes desktop applications. enterprise software. utilities. and other programs that perform specific tasks for users and organizations.
augmented-reality
Computer applications that overlay real-world views with computer-generated imagery and data.
backward compatibility
The ability to take advantage of complementary products developed for a prior generation of technology. We might say that a new product is backwards compatible with an older version of the product
bandwidth
Network transmission speed on a given internet connection. typically expressed in some form of bits per second (bps) DSL offers higher _____ than an modem connection
Biometrics
Technologies that measure and analyze human body characteristics for identification or authentication. These might include fingerprint readers. retina scanners. voice and face recognition. and more.
black hat hacker
A computer criminal.
blacklists
Programs can deny the connections from specific IP addresses as described by blacklists
Blogs
Online journal entries. usually made in a reverse chronological order. Blogs typically provide comment mechanisms where users can post feedback for authors and other readers.
botnets
Hordes of surreptitiously infiltrated computers. linked and controlled remotely. also known as zombie networks
brute-force attack
An attack that exhausts all possible password combinations in order to break into an account. The larger and more complicated a password or key. the longer a brute-force attack will take.
business intelligence (BI) systems
BI Systems use data created by other systems (and placed in the data warehouse) to provide reporting and analysis to support organizational decision making.
cache
A temporary storage space used to speed computing tasks.
canned reports
Reports that provide regular summaries of information in a predetermined format.
CAPTCHA
An acronym for Completely Automated Public Turing Test to Tell Computers and Humans Apart. CAPTCHAs are those scrambled character images that many sites require to submit some sort of entry (account setup. ticket buying). CAPTCHAs were developed because computers have difficulty discerning letters that are distorted or mixed inside a jumbled graphic. CAPTCHAs are meant to be aTuring Test—a test to distinguish if a task is being performed by a computer or a human.
client
A software program that makes requests of a server program.
cloud
A collection of resources available for access over the Internet.
cloud computing
Replacing computing resources—either an organization’s or individual’s hardware or software—with services provided over the Internet.
collaborative filtering
A classification of software that monitors trends among customers and uses this data to personalize an individual customer’s experience.
column or field
A column in a database table. Columns represent each category of data contained in a record (e.g.. first name. last name. ID number. date of birth).
complementary benefits
Products or services that add additional value to the primary product or service that makes up a network.
computer hardware
The physical components of information technology. which can include the computer itself plus peripherals such as storage devices. input devices like the mouse and keyboard. output devices like monitors and printers. networking equipment. and so on.
congestion effects
When increasing numbers of users lower the value of a product or service.
content delivery networks (CDN)
Systems distributed throughout the Internet (or other network) that help to improve the delivery (and hence loading) speeds of Web pages and other media. typically by spreading access across multiple sites located closer to users. Akamai is the largest CDN. helping firms like CNN and MTV quickly deliver photos. video. and other media worldwide.
convergence
When two or more markets. once considered distinctly separate. begin to offer features and capabilities. As an example: the markets for mobile phones and media players are converging.
crowdsourcing
The act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined generally large group of people in the form of an open call.
customer relationship management (CRM)
Systems used to support customer-related sales and marketing activities.
dashboards
A heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics.
data mart
A database or databases focused on addressing the concerns of a specific problem (e.g.. increasing customer retention. improving product quality) or business unit (e.g.. marketing. engineering).
data warehouse
"A set of databases designed to support decision making in an organization. Often a ""Read Only"" copy of most or all of the data in the organization"
database
A single table or a collection of related tables.
database administrator (DBA)
Job title focused on directing. performing. or overseeing activities associated with a database or set of databases. These may include (but not necessarily be limited to): database design. creation. implementation. maintenance. backup and recovery. policy setting and enforcement. and security.
database management system (DBMS)
Sometimes referred to as database software; software for creating. maintaining. and manipulating data.
database management systems (DBMS)
Sometimes called “databade software”; software for creating. maintaining. and manipulating data.
desktop software
Applications installed on a personal computer. typically supporting tasks performed by a single user.
distributed denial of service (DDoS)
An attack where a firm’s computer systems are flooded with thousands of seemingly legitimate requests. the sheer volume of which will slow or shut down the site’s use. DDoS attacks are often performed via botnets.
domain name service (DNS)
Internet directory service that allows devices and services to be named and discoverable. By converting domain names to ip addresses
embedded systems
Special-purpose software designed and included inside physical products (often on firmware). Embedded systems help make devices “smarter.” sharing usage information. helping diagnose problems. indicating maintenance schedules. providing alerts. or enabling devices to take orders from other systems.
Encryption
Scrambling data using a code or formula is known as encryption
enterprise resource planning (ERP)
A software package that integrates the many functions (accounting. finance. inventory management. human resources. etc.) of a business.
enterprise software
Applications that address the needs of multiple users throughout an organization or work group.
extensible markup language (XML)
A tagging language that can be used to identify data fields made available for use by other applications. Most APIs and Web services send messages where the data exchanged is wrapped in identifying XML tags.
fault tolerance
The ability of a system to continue operation even if a component fails.
file transfer protocol (FTP)
Application transfer protocol that is used to copy files from one computer to another.
firewall
A system that acts as a control for network traffic. blocking unauthorized traffic while permitting acceptable use.
firmware
Software stored on nonvolatile memory chips (as opposed to being stored on devices such as hard drives or removable discs). Despite the seemingly permanent nature of firmware. many products allow for firmware to be upgraded online or by connecting to another device.
flash memory
Nonvolatile. chip-based storage. often used in mobile phones. cameras. and MP3 players. Sometimes called flash RAM. flash memory is slower than conventional RAM. but holds its charge even when the power goes out.
Folksonomies / Tagging
Keyword-based classification systems created by user communities (also known as social tagging).
global positioning system (GPS)
A network of satellites and supporting technologies used to identify a device’s physical location.
hacker
A term that. depending on the context. may be applied to either 1) someone who breaks into computer systems. or 2) to a particularly clever programmer.
hardware clouds
A cloud computing model in which a service provider makes computing resources such as hardware and storage. along with infrastructure management. available to a customer on an as-needed basis. The provider typically charges for specific resource usage rather than a flat rate. In the past. similar efforts have been described as utility computing. hosting. or even time sharing.
honeypot
A seemingly tempting. but bogus target meant to draw hacking attempts. By monitoring infiltration attempts against a honeypot. organizations may gain insight into the identity of hackers and their techniques. and they can share this with partners and law enforcement.
hypertext markup language (HTML)
Language used to compose Web pages.
hypertext transfer protocol (http)
Application transfer protocol that allows Web browsers and Web servers to communicate with each other.
infrastructure as a service (IaaS)
_____ - Where cloud providers offer services that include running the remote hardware and networking - but not the operating system or applications
Internet service provider (ISP)
An organization or firm that provides access to the Internet.
intrusion detection system
A system that monitors network use for potential hacking attempts. Such a system may take preventative action to block. isolate. or identify attempted infiltration. and raise further alarms to warn security personnel.
IP address
A value used to identify a device that is connected to the Internet. IP addresses are usually expressed as four numbers (from 0 to 255). separated by periods.
Java
A programming language. initially developed by Sun Microsystems. designed to provide true platform independence (“write once. run anywhere”) for application developers. In most cases. Java apps are developed to be executed by a Java Virtual Machine—an interpreting layer that translates code as it executes. into the format required by the operating system and microprocessor. Without Java. application developers have to write and compile software to execute natively by a specific operating system / microprocessor combination (e.g.. Windows/Intel. Linux PowerPC. Mac/Intel. Linux/Intel).
key
Code that unlocks encryption.
legacy system
Older information systems that are often incompatible with other systems. technologies. and ways of conducting business. Incompatible legacy systems can be a major roadblock to turning data into information. and they can inhibit firm agility. holding back operational and strategic initiatives.
Linux
An open source software operating system.
load balancing
Distributing a computing workload across multiple servers to avoid congestion and slow performance†
localization
Adapting products and services for different languages and regional differences.
long tail
In this context. refers to an extremely large selection of content or products. The long tail is a phenomenon whereby firms can make money by offering a near-limitless selection.
mash-up
The combination of two or more technologies or data feeds into a single. integrated tool. product or service. A website which combines twitter and google maps could be described as a mashup
microblogging
A type of short-message blogging. often made via mobile device. Microblogs are designed to provide rapid notification to their readership (e.g.. a news flash. an update on one’s activities). rather than detailed or in-depth comments. Twitter is the most popular microblogging service.
microprocessor
The part of the computer that executes the instructions of a computer program.
Moore's Law
Chip performance per dollar doubles every eighteen months.
NAT (network address translation)
A technique often used to conserve IP addresses by maps devices on a private network to single Internet-connected device that acts on their behalf.
network effects
Also known as Metcalfe’s Law. or network externalities. When the value of a product or service increases as its number of users expands.
nonvolatile memory
Storage that retains data even when powered down (such as flash memory. hard disk. or DVD storage).
one-sided market
A market that derives most of its value from a single class of users (e.g.. instant messaging).
open source software (OSS)
Software that is free and whose code can be accessed and potentially modified by anyone.
operating system
The software that controls the computer hardware and establishes standards for developing and executing applications.
peer production
When users collaboratively work to create content. products. and services. Includes social media sites. open source software. and peer-produced services. such as Skype and BitTorrent. where the participation of users provide the infrastructure and computational resources that enable the service.
personal digital assistants (PDAs)
Handheld computing devices meant largely for mobile use outside an office setting. PDAs were initially (nonphone) handheld computing devices. but sophisticated computing capabilities have now been integrated into other mobile device classes. such as smartphones and tablets.
Phishing
A scam. typically executed using email and fake websites. tricking someone into installing malicious software or revealing their password
platform as a service (PaaS)
Where cloud providers offer services that include the hardware. operating system. tools. and hosting but not the applications
Podcasts
A digital audio 'blog' served as a series of audio recordings
point-of-sale (POS) systems
Transaction processing systems that capture customer purchases. Cash registers and store checkout systems are examples of point-of-sale systems. These systems are critical for capturing sales data and are usually linked to inventory systems to subtract out any sold items.
private clouds
Pools of computing resources that reside inside an organization and that can be served up for specific tasks as need arrives.
programming language
The syntax. statements. and instructions for writing computer software. There are many _____. examples include Java. PHP and C++
public key encryption
A two key system used for securing electronic transmissions. One key distributed publicly is used to encrypt (lock) data. but it cannot unlock data. Unlocking can only be performed with the private key. The private key also cannot be reverse engineered from the public key. By distributing public keys. but keeping the private key. Internet services can ensure transmissions to their site are secure.
radio frequency identification (RFID) tags
Small chip-based tags that wirelessly emit a unique identifying code for the item that they are attached to. Think of RFID systems as a next-generation bar code.
random-access memory (RAM)
The fast. chip-based volatile (main working memory) storage in a computing device. My Macbook has 4GB of RAM
relational database
The most common standard for expressing databases. whereby tables (files) are related based on common keys.
resource-based view of competitive advantage
The strategic thinking approach suggesting that if a firm is to maintain sustainable competitive advantage. it must control an exploitable resource. or set of resources. that have four critical characteristics. These resources must be (1) valuable. (2) rare. (3) imperfectly imitable. and (4) nonsubstitutable.
rich media
Content that is more complex than simple text. The term can refer to images. animation. audio. and video.
Router
A computing device that connects networks and exchanges data between them.
row or record
A row in a database table. Records represent a single instance of whatever the table keeps track of (e.g.. student. faculty. course title).
RSS
A method for sending/broadcasting data to users who subscribe to a service’s “RSS feed.” Many Web sites and blogs forward headlines to users who subscribe to their “feed.” making it easy to scan headlines and click to access relevant news and information.
scalability
Ability to either handle increasing workloads or to be easily expanded to manage workload increases. In a software context. systems that aren’t scalable often require significant rewrites or the purchase or development of entirely new systems.
security focused / hardened
Also known as “hardened.” Term used to describe technology products that contain particularly strong security features.
server
A program that fulfills the requests of a client.
server farm
A physical collection of servers often in it's own building
service level agreement (SLA)
A negotiated agreement between the customer and the vendor. The SLA may specify the levels of availability. serviceability. performance. operation. or other commitment requirements.
shoulder surfing
Gaining compromising information through physical observation of someone. perhaps at work or at the ATM
SMS
A text messaging standard used by many mobile phones.
software
A computer program or a collection of programs. It is a precise set of instructions that tells hardware what to do.
software as a service (SaaS)
A form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online.
Spoof
Term used in security to refer to forging or disguising the origin or identity. E-mail transmissions and packets that have been altered to seem as if they came from another source are referred to as being “spoofed.”
structured query language (SQL)
A language used to create and manipulate databases.
supply chain management (SCM)
Systems that can help a firm manage aspects of its value chain. from the flow of raw materials into the firm. through delivery of finished products and services at the point-of-consumption.
switching costs
The cost a consumer incurs when moving from one product to another. It can involve actual money spent (e.g.. buying a new product) as well as investments in time. any data loss. and so forth.
table or file
A list of data. arranged in columns (fields) and rows (records).
TCP (transmission control protocol)
The most common transmission protocol used on the internet - For example used by HTTP over IP. which ensures that a perfect copy of the data is received by the client
The Osborne Effect
When a firm preannounces a forthcoming product or service and experiences a sharp and detrimental drop in sales of current offerings as users wait for the new item.
total cost of ownership (TCO)
An economic measure of the full cost of owning a product (typically computing hardware and/or software). TCO includes direct costs such as purchase price. plus indirect costs such as training. support. and maintenance.
transaction
Some kind of business exchange.
tweet
A Twitter post. limited to 140 characters.
two-sided market
Network markets comprised of two distinct categories of participant. both of which that are needed to deliver value for the network to work (e.g.. video game console owners and developers of video games).
UDP (user datagram protocol)
Protocol that operates instead of TCP in applications where delivery speed is important and quality can be sacrificed.
URL (uniform resource locator)
Often used interchangeably with “Web address.” URLs identify resources on the Internet along with the application protocol need to retrieve it.
user interface (UI)
The mechanism through which users interact with a computing device. The UI includes elements of the graphical user interface (or GUI. pronounced “gooey”). such as windows. scroll bars. buttons. menus. and dialogue boxes; and can also include other forms of interaction. such as touch screens. motion sensing controllers. or tactile devices used by the visually impaired.
utility computing
A form of cloud computing where a firm develops its own software. and then runs it over the Internet on a service provider’s computers.
Viral Content
In this context. information or applications that shared rapidly between users.
virtual desktop
When a firm runs an instance of a PC’s software on another machine and simply delivers the image of what’s executing to the remote device. Using virtualization. a single server can run dozens of PCs. simplifying backup. upgrade. security. and administration.
voice over Internet protocol (VoIP)
Transmission technologies that enable voice communications (phone calls) to take place over the Internet as well as private packet-switched networks.
volatile memory
Storage (such as RAM chips) that is wiped clean when power is cut off from a device.
Web 2.0
A term broadly referring to Internet services that foster collaboration and information sharing; characteristics that distinctly set “Web 2.0” efforts apart from the static. transaction-oriented Web sites of “Web 1.0.” The term is often applied to Web sites and Internet services that foster social media or other sorts of peer production.
Web hosting service
A firm that provides hardware and services to run the Web sites of others.
Web services
Small pieces of code that are accessed via the application server which permit interoperable machine-to-machine interaction over a network.
what you see is what you get (WYSIWYG)
_____ - The abbreviation of a phrase used to describe graphical editing tools. such as those found in a wiki. page layout program. when that tool accurately displays how the finished page would look during the editing process
white hat hacker
Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security.
whitelists
Highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
Wi-Fi
A term used to brand wireless local-area networking devices. Devices typically connect to an antenna-equipped base station or hotspot. which is then connected to the Internet. Wi-Fi devices use standards known as IEEE 802.11. and various version of this standard (e.g.. b. g. n) may operate in different frequency bands and have access ranges.
XML
Abbreviation of Extensible Markup Language. A tagging language that can be used to identify data fields made available for use by other applications. For example. programmers may wrap XML tags around elements in an address data stream (e.g.. _business name_. _street address_. _city_. _state_) to allow other programs to recognize and use these data items.