Management 3300 Exam 3 Mizzou

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/46

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

Technology's Role in the Sharing Economy

Enabler of sharing economy through digital platforms connecting users.

2
New cards

Uber's Data Analysis

Analyzes customer behavior, traffic patterns, and demand for optimization.

3
New cards

Sharing Economy

Economic model of resource sharing through digital platforms.

4
New cards

Challenges Faced by Uber and Airbnb

Competition, regulation, and labor classification issues.

5
New cards

Efficient Markets Hypothesis

Financial markets fully reflecting available information, no consistent higher returns.

6
New cards

Facebook/Meta's Culture, Revenue Model, Growth Engines, and Competitive Advantages

Innovation-driven culture, ad revenue, user base growth, network effects, data analytics.

7
New cards

Facebook's Rebrand to Meta

Strategic shift towards building the online 'metaverse'.

8
New cards

Shift in Product/Service Mix for Facebook

Developing new products and services beyond social media.

9
New cards

Financial Impact of Facebook's Rebrand

Investment in new technologies, potential resource diversion for future growth.

10
New cards

Cambridge Analytica Scandal

Data privacy scandal involving unauthorized use of Facebook user data.

11
New cards

Facebook's Efforts to Earn/Regain/Maintain Consumer Trust

Transparency, data privacy practices, user control over personal information.

12
New cards

Facebook's 'Walled Garden'

Control over user experience and data within its ecosystem.

13
New cards

Technology Startups' Capital Sources

Angel investors, venture capital firms, crowdfunding, government grants/loans.

14
New cards

Key Drivers of Outside Criticism of Facebook

Data privacy, advertising model, dominant position in social media.

15
New cards

Rent the Runway's Inventory/Supplier Management Approach

Data analytics, designer partnerships for efficient rental clothing management.

16
New cards

Comparison of Rent the Runway to Other Apparel Companies

Focus on rentals, influencing inventory, customer relationship, sustainability practices.

17
New cards

Rent the Runway's Use of Data for Strategic Advantage

Demand forecasting, personalized recommendations, inventory management.

18
New cards

Rent the Runway's Financial Performance and Goals

Profitability through high inventory utilization, customer retention.

19
New cards

Customer Acquisition Costs & Customer Lifetime Value

Cost of acquiring new customers, revenue from a customer over time.

20
New cards

Rent the Runway's Software Development Approach

Agile development, rapid iteration, responsiveness to customer feedback.

21
New cards

Rent the Runway's Marketing Techniques

Targeted digital marketing, partnerships, word-of-mouth for customer acquisition/retention.

22
New cards

Rent the Runway's COVID-19 Pivot

Strategic shift in response to the pandemic, operational model changes.

23
New cards

Minimum Viable Product (MVP)

Product with enough features to attract early adopters and validate an idea.

24
New cards

Components of Rent the Runway's Value Chain

Design selection, inventory management, customer service, logistics, digital platform.

25
New cards

Components of Hardware

Central processing unit (CPU), storage devices, input/output devices.

26
New cards

Software Types and Their Functions

Operating systems manage hardware, applications perform specific tasks.

27
New cards

SQL

Structured Query Language for managing and manipulating databases.

28
New cards

Healthcare.gov Rollout Mistakes

Technical issues, poor user experience, inadequate testing during launch.

29
New cards

Database Management Software

Software for creating, retrieving, updating, and managing databases.

30
New cards

Firmware

Low-level control software for specific hardware devices.

31
New cards

ERP Applications

Large-scale software for managing and automating core business processes.

32
New cards

APIs

Sets of definitions and protocols for building and integrating software.

33
New cards

EDI

Electronic Data Interchange for exchanging business documents electronically.

34
New cards

Integrated Development Environments (IDEs)

Software suites for software development, including code editing, debugging.

35
New cards

LAMP Stack

Open-source web development software stack: Linux, Apache, MySQL, PHP.

36
New cards

Heartbleed Bug and Apache Log4j Security Incidents

Security vulnerabilities leading to widespread issues on the internet.

37
New cards

SaaS, PaaS, and IaaS

Software, Platform, and Infrastructure as a Service in cloud computing.

38
New cards

Fixed vs. Marginal Costs

Fixed costs don't change with production volume, marginal costs for additional units.

39
New cards

Open Source Software

Software with accessible source code for inspection, modification, enhancement.

40
New cards

Total Cost of Ownership

Assessment of IT or other costs across enterprise boundaries over time.

41
New cards

Virtualization

Creating virtual versions of computer hardware, storage, network resources.

42
New cards

Shadow IT

Unapproved IT systems and solutions within organizations, leading to inefficiencies, risks.

43
New cards

Categories of Cyber Threat Actors

State-Sponsored, Cybercriminals, Hacktivists, Insiders, Terrorist Groups.

44
New cards

3 Core Principles of Cybersecurity Programs

Confidentiality, Integrity, Availability of information and systems.

45
New cards

Forms of Cyber Attacks

Malware, Phishing, Man-in-the-Middle Attacks, DoS/DDoS Attacks, SQL Injection.

46
New cards

Your Role in Upholding Cybersecurity

Awareness, Vigilance, Compliance with best practices and policies.

47
New cards

Red Flags Associated with Phishing Scams

Unusual sender, urgency, attachments/links, request for sensitive information, spelling/grammar mistakes.