mis frq

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/117

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

118 Terms

1
New cards
When referring to the "software layer cake" model, Microsoft Office, Angry Birds, and MySQL are all \_______
applications
2
New cards
When referring to the "software layer cake" model, Android, Windows, and iOS are all
operating systems
3
New cards
Control programs stored on chips (often used in embedded systems) are sometimes referred to as
firmware
4
New cards
Scroll bars and menus displayed on the hardware of the computer display are examples of a graphical \___________
user interface
5
New cards
\_____ refers to applications that address the needs of multiple users throughout an organization or work group
Enterprise software
6
New cards
\____ systems help a firm manage aspects of its value chain, from the flow of raw materials into the firm, through delivery of finished products and services at the point-of-consumption
Supply chain management
7
New cards
Firms that invite other organizations to integrate with their systems via Web services and APIs are often thought of as turning their products into \_______
platforms
8
New cards
A(n) \_____ is a software program that makes requests of a server program.
client
9
New cards
\_____ are programming hooks or guidelines, published by organizations tell how other programs can get a service to perform a task, such as send or receive data
Application programming interfaces (or APIs)
10
New cards
. Some programming languages are extended by \_______________. These are libraries, templates, and extensions that simplify and standardize common tasks, speeding software development, reducing errors, and prompting reuse. Examples of popular frameworks used to develop websites include Rails (for Ruby), Django (for Python), AngularJS (for JavaScript), and ASP.NET (pronounced "ay-ess-pee dot net").
frameworks
11
New cards
Programming tools that execute within an application are called \_____.
scripting languages
12
New cards
The \__________ method (the classic, but increasingly out-of-favor approach) is a relatively linear sequential approach to software development (and other projects)
waterfall
13
New cards
The use of upfront documentation can help prevent \__________, or expansion of the scope of a project.
feature creep
14
New cards
. \_____ is a process-improvement approach that assists in assessing the maturity, quality, and development of certain organizational business processes, and suggests steps for their improvement
Capability maturity model integration (CMMI)
15
New cards
\____ is the flagship open source product
Linux OS
16
New cards
The \_____ of open source products is used to power many of the Internet's most popular websites
LAMP stack
17
New cards
\_______________ is the name of the popular service where you'll find millions of open source projects hosted and shared
GitHub
18
New cards
\_______is an OSS version of Microsoft Office.
LibreOffice
19
New cards
For consumers in most industrialized nations, the added complexity and \____________availability of desktop Linux just it isn't worth the one to two hundred dollars saved by giving up Windows.
limited desktop application
20
New cards
\_____ refers to a form of cloud computing where a firm subscribes to third-party software and receives a service that is delivered online
Software as a service (SaaS)
21
New cards
The term \_____ describes the use of cloud computing to provide excess capacity during periods of spiking demand.
cloudbursting
22
New cards
In \_____, clients can select their own operating systems, development environments, underlying applications like databases, or other software packages, while the cloud firm usually manages the infrastructure.
infrastructure as a service (IaaS)
23
New cards
Many firms have developed rapid-deployment \________ modules that are preconfigured and packed inside shipping containers.
server farm
24
New cards
The phrase \____________ refers to a type of virtualization that allows applications to share an operating system, but it still lets resources be shuttled around from low-powered hardware to massive pools of servers if capacity spikes.
containers
25
New cards
\_____ is the general term used to describe the massive amount of data available to today's managers
Big data
26
New cards
The acronym\_____ refers to a technology that is often used to tag objects and inventory items so that they can "announce their presence" as they make their way along an organization's value chain.
RFID
27
New cards
\____________ refers to type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming
Machine learning
28
New cards
The term \____________ refers to a technology that sends messages to smartphones and other devices using a low-energy Bluetooth signal.
iBeacon
29
New cards
Changing pricing based on demand conditions is known as \________
Dynamic pricing
30
New cards
Database technology known by the term \__________________ is especially popular with Internet firms that rely on massive, unwieldy, and disparately structured data; and this technology is often at the heart of what are often characterized as "big data" efforts.
NoSQL
31
New cards
\____ is a language used to create and manipulate databases.
Structured query language (SQL)
32
New cards
\_____ refers to a job title focused on directing, performing, or overseeing activities associated with a database or set of databases.
Database administrator
33
New cards
\____ are the most common standard for expressing databases, whereby tables (files) are related based on common keys.
Relational databases
34
New cards
Systems that record a transaction (some form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return are referred to as \_____.
transaction processing systems (TPS)
35
New cards
\_____ is the term used to describe some form of business exchange.
Transaction
36
New cards
\_____ systems are often used to empower employees to track and record data at nearly every point of customer contact.
CRM or customer relationship management
37
New cards
It's believed that medical errors are the \_____ leading cause of death in the United States.
third
38
New cards
In some instances, firms supplement operational data with additional input from \_____and\_________.
surveys; focus groups
39
New cards
Airbnb's "\____________" feature helps by leveraging the firm's industry-leading dataset, far larger and more comprehensive than rivals, and constantly updated over time, to suggest the perfect rate
smart pricing
40
New cards
The open-source project known as \____________ was created to analyze massive amounts of raw information better than traditional, highly structured databases
Hadoop
41
New cards
The three Vs of "Big Data" are \_____, \_____, and \______; characteristics that distinguish it from conventional data analysis problems and require a new breed of technology.
volume, velocity, and variety
42
New cards
Systems that can absorb any type of data, structured or not, from any type of source are often called \____________.
schema-less
43
New cards
Addressing a data need to compete in business or address future goals is known as
data relevance
44
New cards
Addressing the data system housing, hardware and networking requirements is known as \___________
data hosting
45
New cards
\____ are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise.
Expert systems
46
New cards
The category of AI technology used by Google to recognize patterns to improve speech recognition is known as \________
neural networks
47
New cards
An integrated shopping experience and unified customer view across channels is sometimes referred to as \__________
omnichannel
48
New cards
\_________ are model-building techniques where computers examine many potential solutions to a problem, iteratively modifying (mutating) various mathematical models, and comparing the mutated models to search for a best alternative function.
Genetic algorithms
49
New cards
\_________ are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise.
Expert systems
50
New cards
\_____ refers to the ratio of a company's annual sales to its inventory
Inventory turnover ratio
51
New cards
Walmart uses\_____ technology to sift through massive amounts of social media data.
Hadoop
52
New cards
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as \_____ attacks.
distributed denial of service (DDoS)
53
New cards
\____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.
Stuxnet
54
New cards
\___ refers to a term that either means breaking into a computer system or a particularly clever solution.
Hack
55
New cards
Former CIA employee and NSA contractor, \____________ is seen by many as either a whistleblowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.
Edward Snowden
56
New cards
The phrase \______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form of identification
two-factor or multi-factor authentication
57
New cards
The phrase \__________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.
tokenization
58
New cards
\____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.
Ransomware
59
New cards
Public wireless networks are often vulnerable to monitoring and attack. The use of \_______ software can limit threats by encrypting network transmissions over a network.
VPN or virtual private network
60
New cards
Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as \_____ in security circles.
social engineering
61
New cards
\___ refers to confidence scams executed through technology
Phishing
62
New cards
The \_____ technique zeros in on a sloppy programming practice where software developers don't validate user input
SQL injection
63
New cards
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of \____
biometrics
64
New cards
\_____ are scrambled character images used to thwart things like automated account setup or ticket buying
CAPTCHAs
65
New cards
\____ refers to a trusted third party that provides authentication services in public key encryption schemes.
Certificate authority
66
New cards
\_____ are seemingly tempting but bogus targets meant to draw hacking attempts.
Honeypots
67
New cards
\______ are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
Whitelists
68
New cards
\____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.
Firewalls
69
New cards
When a firm \_____, it sells stock to the public for the first time.
goes public
70
New cards
\_____ are systems distributed throughout the Internet (or other network) that help to improve the delivery (and hence loading) speeds of Web pages and other media, typically by spreading access across multiple sites located closer to users
Content delivery networks
71
New cards
Facebook followed Twitter's \_____ with its own Facebook live video streaming tool.
Periscope
72
New cards
\___ refer to programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as sending or receiving data.
Application programming interfaces
73
New cards
When others take advantage of a user or service without providing any sort of reciprocal benefit it is called a \____
free rider problem
74
New cards
China's fast-growing WeChat is the world's \_________largest mobile-messaging service
third
75
New cards
If increasingly large parts of the Web reside inside a single (and, for the most part, closed) service, innovation, \__________, and exchange may suffer.
competition
76
New cards
\____ is a term used to describe each time an ad is served to a user for viewing
Impression
77
New cards
The advertising acronym CPM is defined as \_____
cost per thousand impression
78
New cards
The acronym ARPU represents the phrase \______
average revenue per user
79
New cards
Issues of content adjacency and \______ can make social networking ads less attractive than ads running alongside search and professionally produced content sites.
user attention
80
New cards
The New York Times points out, fewer than half of global Internet users have \__________ high enough to interest major advertisers
disposable incomes
81
New cards
Facebook's Mark Zuckerberg has declared Internet access to be a "\____________."
human right
82
New cards
Market capitalization refers to the value of a firm calculated by multiplying its \_____ by the number of shares.
share price
83
New cards
\________ is the category of online advertising that captures the most advertising dollars
Search advertising (or paid search)
84
New cards
Google offers employees\___________________ the ability to work the equivalent of one day a week on new projects that interest them.
20 percent time
85
New cards
\___ refers to the search engine results that are returned and ranked according to relevance
Organic/Natural search
86
New cards
The phrase \__________ refers to the process of improving a page's organic search results.
SEO or search engine optimization
87
New cards
Managers looking to plot changes in popularity of a given search term, or compare changes among several terms over time, can leverage a Google product known as \__________
trends (or Google Trends)
88
New cards
\____ refers to the practice of designing, running and optimizing search engine ad campaigns.
Search engine marketing
89
New cards
\____ refers to advertisements that are targeted based on a user's query.
Keyword advertising
90
New cards
A Pinterest link for a vintage handbag that, when clicked, jumps immediately to bag vendor's page within the Etsy app. This is an example of the technique known in the industry as \_________
deep linking
91
New cards
Advertising based on a website's content is called \_____.
contextual advertising
92
New cards
Advertisers use \_____ to indicate that an advertisement should not be shown when a query contains these terms.
negative keywords
93
New cards
Google's goodwill motto is \____________
Don't Be Evil
94
New cards
\___ are hordes of surreptitiously infiltrated computers, linked and controlled by rogue software.
Zombie networks/botnets
95
New cards
\___ contains sites that wrap data in tags that can be recognized by search engines, analysis tools, and other services to make it easier for computer programs to accurately categorize, compare, and present this information.
Semantic Web
96
New cards
\_____ is the primary technology that enables Google Wallet to make wireless payments with the wave of a phone.
NFC or near field communication
97
New cards
\_____ is the primary asset for competitive advantage that is created when users load their files, content, and other data onto free cloud storage
Switching cost
98
New cards
\______ refers to content that is created, shared, and commented on by a broader community of users
Social media
99
New cards
\______ is a term referring to the collective community of bloggers, as well as those who read and comment on blogs
Blogosphere
100
New cards
Links in a blog post that refer readers back to cited sources are called \_____
trackbacks