Looks like no one added any tags here yet for you.
When referring to the "software layer cake" model, Microsoft Office, Angry Birds, and MySQL are all _______
applications
When referring to the "software layer cake" model, Android, Windows, and iOS are all
operating systems
Control programs stored on chips (often used in embedded systems) are sometimes referred to as
firmware
Scroll bars and menus displayed on the hardware of the computer display are examples of a graphical ___________
user interface
_____ refers to applications that address the needs of multiple users throughout an organization or work group
Enterprise software
____ systems help a firm manage aspects of its value chain, from the flow of raw materials into the firm, through delivery of finished products and services at the point-of-consumption
Supply chain management
Firms that invite other organizations to integrate with their systems via Web services and APIs are often thought of as turning their products into _______
platforms
A(n) _____ is a software program that makes requests of a server program.
client
_____ are programming hooks or guidelines, published by organizations tell how other programs can get a service to perform a task, such as send or receive data
Application programming interfaces (or APIs)
. Some programming languages are extended by _______________. These are libraries, templates, and extensions that simplify and standardize common tasks, speeding software development, reducing errors, and prompting reuse. Examples of popular frameworks used to develop websites include Rails (for Ruby), Django (for Python), AngularJS (for JavaScript), and ASP.NET (pronounced "ay-ess-pee dot net").
frameworks
Programming tools that execute within an application are called _____.
scripting languages
The __________ method (the classic, but increasingly out-of-favor approach) is a relatively linear sequential approach to software development (and other projects)
waterfall
The use of upfront documentation can help prevent __________, or expansion of the scope of a project.
feature creep
. _____ is a process-improvement approach that assists in assessing the maturity, quality, and development of certain organizational business processes, and suggests steps for their improvement
Capability maturity model integration (CMMI)
____ is the flagship open source product
Linux OS
The _____ of open source products is used to power many of the Internet's most popular websites
LAMP stack
_______________ is the name of the popular service where you'll find millions of open source projects hosted and shared
GitHub
_______is an OSS version of Microsoft Office.
LibreOffice
For consumers in most industrialized nations, the added complexity and ____________availability of desktop Linux just it isn't worth the one to two hundred dollars saved by giving up Windows.
limited desktop application
_____ refers to a form of cloud computing where a firm subscribes to third-party software and receives a service that is delivered online
Software as a service (SaaS)
The term _____ describes the use of cloud computing to provide excess capacity during periods of spiking demand.
cloudbursting
In _____, clients can select their own operating systems, development environments, underlying applications like databases, or other software packages, while the cloud firm usually manages the infrastructure.
infrastructure as a service (IaaS)
Many firms have developed rapid-deployment ________ modules that are preconfigured and packed inside shipping containers.
server farm
The phrase ____________ refers to a type of virtualization that allows applications to share an operating system, but it still lets resources be shuttled around from low-powered hardware to massive pools of servers if capacity spikes.
containers
_____ is the general term used to describe the massive amount of data available to today's managers
Big data
The acronym_____ refers to a technology that is often used to tag objects and inventory items so that they can "announce their presence" as they make their way along an organization's value chain.
RFID
____________ refers to type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming
Machine learning
The term ____________ refers to a technology that sends messages to smartphones and other devices using a low-energy Bluetooth signal.
iBeacon
Changing pricing based on demand conditions is known as ________
Dynamic pricing
Database technology known by the term __________________ is especially popular with Internet firms that rely on massive, unwieldy, and disparately structured data; and this technology is often at the heart of what are often characterized as "big data" efforts.
NoSQL
____ is a language used to create and manipulate databases.
Structured query language (SQL)
_____ refers to a job title focused on directing, performing, or overseeing activities associated with a database or set of databases.
Database administrator
____ are the most common standard for expressing databases, whereby tables (files) are related based on common keys.
Relational databases
Systems that record a transaction (some form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return are referred to as _____.
transaction processing systems (TPS)
_____ is the term used to describe some form of business exchange.
Transaction
_____ systems are often used to empower employees to track and record data at nearly every point of customer contact.
CRM or customer relationship management
It's believed that medical errors are the _____ leading cause of death in the United States.
third
In some instances, firms supplement operational data with additional input from _____and_________.
surveys; focus groups
Airbnb's "____________" feature helps by leveraging the firm's industry-leading dataset, far larger and more comprehensive than rivals, and constantly updated over time, to suggest the perfect rate
smart pricing
The open-source project known as ____________ was created to analyze massive amounts of raw information better than traditional, highly structured databases
Hadoop
The three Vs of "Big Data" are _, _, and ______; characteristics that distinguish it from conventional data analysis problems and require a new breed of technology.
volume, velocity, and variety
Systems that can absorb any type of data, structured or not, from any type of source are often called ____________.
schema-less
Addressing a data need to compete in business or address future goals is known as
data relevance
Addressing the data system housing, hardware and networking requirements is known as ___________
data hosting
____ are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise.
Expert systems
The category of AI technology used by Google to recognize patterns to improve speech recognition is known as ________
neural networks
An integrated shopping experience and unified customer view across channels is sometimes referred to as __________
omnichannel
_________ are model-building techniques where computers examine many potential solutions to a problem, iteratively modifying (mutating) various mathematical models, and comparing the mutated models to search for a best alternative function.
Genetic algorithms
_________ are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise.
Expert systems
_____ refers to the ratio of a company's annual sales to its inventory
Inventory turnover ratio
Walmart uses_____ technology to sift through massive amounts of social media data.
Hadoop
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.
distributed denial of service (DDoS)
____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.
Stuxnet
___ refers to a term that either means breaking into a computer system or a particularly clever solution.
Hack
Former CIA employee and NSA contractor, ____________ is seen by many as either a whistleblowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.
Edward Snowden
The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form of identification
two-factor or multi-factor authentication
The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.
tokenization
____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.
Ransomware
Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.
VPN or virtual private network
Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.
social engineering
___ refers to confidence scams executed through technology
Phishing
The _____ technique zeros in on a sloppy programming practice where software developers don't validate user input
SQL injection
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of ____
biometrics
_____ are scrambled character images used to thwart things like automated account setup or ticket buying
CAPTCHAs
____ refers to a trusted third party that provides authentication services in public key encryption schemes.
Certificate authority
_____ are seemingly tempting but bogus targets meant to draw hacking attempts.
Honeypots
______ are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
Whitelists
____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.
Firewalls
When a firm _____, it sells stock to the public for the first time.
goes public
_____ are systems distributed throughout the Internet (or other network) that help to improve the delivery (and hence loading) speeds of Web pages and other media, typically by spreading access across multiple sites located closer to users
Content delivery networks
Facebook followed Twitter's _____ with its own Facebook live video streaming tool.
Periscope
___ refer to programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as sending or receiving data.
Application programming interfaces
When others take advantage of a user or service without providing any sort of reciprocal benefit it is called a ____
free rider problem
China's fast-growing WeChat is the world's _________largest mobile-messaging service
third
If increasingly large parts of the Web reside inside a single (and, for the most part, closed) service, innovation, __________, and exchange may suffer.
competition
____ is a term used to describe each time an ad is served to a user for viewing
Impression
The advertising acronym CPM is defined as _____
cost per thousand impression
The acronym ARPU represents the phrase ______
average revenue per user
Issues of content adjacency and ______ can make social networking ads less attractive than ads running alongside search and professionally produced content sites.
user attention
The New York Times points out, fewer than half of global Internet users have __________ high enough to interest major advertisers
disposable incomes
Facebook's Mark Zuckerberg has declared Internet access to be a "____________."
human right
Market capitalization refers to the value of a firm calculated by multiplying its _____ by the number of shares.
share price
________ is the category of online advertising that captures the most advertising dollars
Search advertising (or paid search)
Google offers employees___________________ the ability to work the equivalent of one day a week on new projects that interest them.
20 percent time
___ refers to the search engine results that are returned and ranked according to relevance
Organic/Natural search
The phrase __________ refers to the process of improving a page's organic search results.
SEO or search engine optimization
Managers looking to plot changes in popularity of a given search term, or compare changes among several terms over time, can leverage a Google product known as __________
trends (or Google Trends)
____ refers to the practice of designing, running and optimizing search engine ad campaigns.
Search engine marketing
____ refers to advertisements that are targeted based on a user's query.
Keyword advertising
A Pinterest link for a vintage handbag that, when clicked, jumps immediately to bag vendor's page within the Etsy app. This is an example of the technique known in the industry as _________
deep linking
Advertising based on a website's content is called _____.
contextual advertising
Advertisers use _____ to indicate that an advertisement should not be shown when a query contains these terms.
negative keywords
Google's goodwill motto is ____________
Don't Be Evil
___ are hordes of surreptitiously infiltrated computers, linked and controlled by rogue software.
Zombie networks/botnets
___ contains sites that wrap data in tags that can be recognized by search engines, analysis tools, and other services to make it easier for computer programs to accurately categorize, compare, and present this information.
Semantic Web
_____ is the primary technology that enables Google Wallet to make wireless payments with the wave of a phone.
NFC or near field communication
_____ is the primary asset for competitive advantage that is created when users load their files, content, and other data onto free cloud storage
Switching cost
______ refers to content that is created, shared, and commented on by a broader community of users
Social media
______ is a term referring to the collective community of bloggers, as well as those who read and comment on blogs
Blogosphere
Links in a blog post that refer readers back to cited sources are called _____
trackbacks