MGMT 382 Exam 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/90

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:59 PM on 4/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

91 Terms

1
New cards

data

facts, text, graphics, images, sound, video

2
New cards

information

data processed to be useful in decision making

3
New cards

metadata

data that describes data

4
New cards

inaccessible dormant data

operational data may not be queryable

5
New cards

incompatable dormant data

legacy systems may not be compatible with newer tools

6
New cards

uninterpreted dormant data

simply lost, unknown, or unaddressed data

7
New cards

database

an organized collection of logically related data

8
New cards

databased management system

a data storage and retrieval system which permits data to be stored non-redundantly while making it appear to the user as if the data is well-integrated

9
New cards

relational databases

data is stored in multiple, related tabs

Data has to conform to a pre-defined schema

SQL

10
New cards

non-relational databases

doesn’t have to conform to a pre-defined schema

no SQL

11
New cards

entity

an abstract concept representing a type of thing you want to store information about

12
New cards

entity instance

one specific occurrence of that entity

13
New cards

attributes

defines an entity

14
New cards

indentifiers

keys

helps people understand which data point you are talking about

15
New cards

primary key

an attribute or attributes that uniquely identify individual instances of an entity type

16
New cards

candidate key

any attribute that could be a primary key

17
New cards

relationships

how entities act upon each other or are associated with each other

18
New cards

foreign key

a primary key from one table that appears in a related table in order to link the two

19
New cards

one-to-one relationship

each entity in the relationship will have exactly one related entity

20
New cards

one-to-many relationship

an entity on one side of the relationship can have many related entities, but an entity on the other side will have a maximum of one related entity

21
New cards

many-to-many relationship

entities on both sides of the relationship can have many related entities on the other side

22
New cards

conditional/situational cardinality constraints

the minimum number of instances of one entity that must be associated with each instance of another

23
New cards

entity-relationship diagram (ERD)

a graphical representation of relational databases

24
New cards

Brick & Mortar

a traditional street side business that deals with its customers face to face in an office or a store that the businesses own or rent

25
New cards

e-commerce

the buying and selling of goods online and the related businesses that facilitate it

accelerated and enhanced by information technology

26
New cards

the long tail

selling a large number of niche products that individually have low demand but collectively generally significant revenue, enabled by digital platforms and data-driven strategies

27
New cards

pareto principle

80% of sales comes from 20% products/customers

the law of the few

28
New cards

click & order

web presence only

29
New cards

click & mortar

both physical and web presence

30
New cards

digital pure play

products that can be digitalized and distributed without physical appearance

31
New cards

B2C

numerous payments for small amounts

32
New cards

B2B

aggregated payments for large amounts

33
New cards

digital transformation

the strategic use of digital technologies to fundamentally change how an organization operates, creates value, adn competes

34
New cards

operational processes

analyze, optimize, and automate workflows

35
New cards

customer experience

personalize and connect across channels

36
New cards

business models

create new value propositions

37
New cards

organize culture

upskilling and agility

38
New cards

infrastructure

provides scalable essential services and functionality

39
New cards

connectivity

connects people, objects, and systems to enable real-time data exchange

40
New cards

intelligence

converts decision making from art to science

41
New cards

virtualization

saves time and cost in modeling and testing

42
New cards

inversion

shifts value creation from inside to outside the firm

43
New cards

network effects

exist when the value of a good depends on the number of users adopting it

44
New cards

direct network effects

those pertaining to users on the same side of a network

45
New cards

indirect network effects

those pertaining to users on the other side of a network

46
New cards

platform

multi-sided markets and businesses

47
New cards

“PAPA”
four ethical issues of the information age

Privacy

Accuracy

Property

Accessibility

48
New cards

misinformation

false information that is spread, regardless of intent to mislead

49
New cards

disinformation

deliberately misleading false information that is spread

50
New cards

identity theft

the forging of someone’s identity for the purpose of fraud

51
New cards

phishing

sending official-looking correspondence for the purpose of identity theft (usually email)

52
New cards

smishing

using text messages for the purpose of identity theft

53
New cards

pharming

using an official-looking website for the purpose of identity theft

54
New cards

snooping

monitoring someone’s digital activity, can be legal and necessary

can be invasive and unethical

55
New cards

key loggers/trappers

record everything you type

56
New cards

screen capture programs

take screenshots of your activity

57
New cards

packet sniffers

monitor data traveling over a network

58
New cards

log analysis tools

track what users did

59
New cards

cookie

a small file that contains information about you and your Web activities, which a Web site you visit places on your computer

60
New cards

first-party cookies

created by the site you visit

61
New cards

third-party cookies

created by other companies than the website you’re visiting (usually advertisers)

62
New cards

trojan horse software

software you don’t want, hidden inside software you do want

63
New cards

adware

shows unwanted ads

64
New cards

spyware

secretly tracks you

65
New cards

spam

unsolicited email

66
New cards

confidentiality

information is accessible only by those authorized

67
New cards

authenticity

information really comes from its claimed source

68
New cards

integrity

information has not been altered

69
New cards

availability

service/resource is available when it is supposed to be

70
New cards

firewall

a hardware or software device that permits or denies network traffic based on security policy

71
New cards

intrusion detection/prevention system (IDS/IPS)

a device that watches network traffic for intrusion attempts and reports them

72
New cards

IDS

detects suspicious activity

73
New cards

IPS

detects and blocks suspicious activity

74
New cards

encryption

scrambling communication in such a way that only the intended recipient can unscramble it

75
New cards

copyright

protects the expression of an idea

76
New cards

patent

protects novel and useful inventions, and in some cases, ideas

77
New cards

software piracy

the unauthorized use, duplication, distribution, or sale of copyrighted software

78
New cards

computer virus

software that is written with malicious intent to cause annoyance or damage

79
New cards

benign virus

display a message on screen; slow down computer

80
New cards

malicious virus

corrupts or destroys a specific application or a set of file types

81
New cards

worm

a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic

82
New cards

denial-of-service attack

a type of computer attach that floods a server or network with so many requests for service that it slows down or crashes

83
New cards

black-hat hackers

bad people out to snoop, steal, destroy, or harm

84
New cards

white-hat hackers

good people paid to find vulnerabilities

85
New cards

hacktivists

philosophically or politically motivated hackers, often defacing websites in protest

86
New cards

script kiddies/bunnies

non-hacker bad people who use pre-written hacking code from the internet

87
New cards

crackers

bad people paid by other companies to engage in corporate espionage

88
New cards

cyberterrorists

really bad people out to harm or destroy

89
New cards

ransomware

a type of malicious software attack that denies access to a user’s system and data, demanding a payment to regain access

90
New cards

artificial intelligence

a field of science concerned with building computers and machines that reason, learn, and act in such a way that would normally require human intelligence

91
New cards