mis frq

studied byStudied by 2 people
0.0(0)
get a hint
hint

When referring to the "software layer cake" model, Microsoft Office, Angry Birds, and MySQL are all _______

1 / 117

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

118 Terms

1

When referring to the "software layer cake" model, Microsoft Office, Angry Birds, and MySQL are all _______

applications

New cards
2

When referring to the "software layer cake" model, Android, Windows, and iOS are all

operating systems

New cards
3

Control programs stored on chips (often used in embedded systems) are sometimes referred to as

firmware

New cards
4

Scroll bars and menus displayed on the hardware of the computer display are examples of a graphical ___________

user interface

New cards
5

_____ refers to applications that address the needs of multiple users throughout an organization or work group

Enterprise software

New cards
6

____ systems help a firm manage aspects of its value chain, from the flow of raw materials into the firm, through delivery of finished products and services at the point-of-consumption

Supply chain management

New cards
7

Firms that invite other organizations to integrate with their systems via Web services and APIs are often thought of as turning their products into _______

platforms

New cards
8

A(n) _____ is a software program that makes requests of a server program.

client

New cards
9

_____ are programming hooks or guidelines, published by organizations tell how other programs can get a service to perform a task, such as send or receive data

Application programming interfaces (or APIs)

New cards
10

. Some programming languages are extended by _______________. These are libraries, templates, and extensions that simplify and standardize common tasks, speeding software development, reducing errors, and prompting reuse. Examples of popular frameworks used to develop websites include Rails (for Ruby), Django (for Python), AngularJS (for JavaScript), and ASP.NET (pronounced "ay-ess-pee dot net").

frameworks

New cards
11

Programming tools that execute within an application are called _____.

scripting languages

New cards
12

The __________ method (the classic, but increasingly out-of-favor approach) is a relatively linear sequential approach to software development (and other projects)

waterfall

New cards
13

The use of upfront documentation can help prevent __________, or expansion of the scope of a project.

feature creep

New cards
14

. _____ is a process-improvement approach that assists in assessing the maturity, quality, and development of certain organizational business processes, and suggests steps for their improvement

Capability maturity model integration (CMMI)

New cards
15

____ is the flagship open source product

Linux OS

New cards
16

The _____ of open source products is used to power many of the Internet's most popular websites

LAMP stack

New cards
17

_______________ is the name of the popular service where you'll find millions of open source projects hosted and shared

GitHub

New cards
18

_______is an OSS version of Microsoft Office.

LibreOffice

New cards
19

For consumers in most industrialized nations, the added complexity and ____________availability of desktop Linux just it isn't worth the one to two hundred dollars saved by giving up Windows.

limited desktop application

New cards
20

_____ refers to a form of cloud computing where a firm subscribes to third-party software and receives a service that is delivered online

Software as a service (SaaS)

New cards
21

The term _____ describes the use of cloud computing to provide excess capacity during periods of spiking demand.

cloudbursting

New cards
22

In _____, clients can select their own operating systems, development environments, underlying applications like databases, or other software packages, while the cloud firm usually manages the infrastructure.

infrastructure as a service (IaaS)

New cards
23

Many firms have developed rapid-deployment ________ modules that are preconfigured and packed inside shipping containers.

server farm

New cards
24

The phrase ____________ refers to a type of virtualization that allows applications to share an operating system, but it still lets resources be shuttled around from low-powered hardware to massive pools of servers if capacity spikes.

containers

New cards
25

_____ is the general term used to describe the massive amount of data available to today's managers

Big data

New cards
26

The acronym_____ refers to a technology that is often used to tag objects and inventory items so that they can "announce their presence" as they make their way along an organization's value chain.

RFID

New cards
27

____________ refers to type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming

Machine learning

New cards
28

The term ____________ refers to a technology that sends messages to smartphones and other devices using a low-energy Bluetooth signal.

iBeacon

New cards
29

Changing pricing based on demand conditions is known as ________

Dynamic pricing

New cards
30

Database technology known by the term __________________ is especially popular with Internet firms that rely on massive, unwieldy, and disparately structured data; and this technology is often at the heart of what are often characterized as "big data" efforts.

NoSQL

New cards
31

____ is a language used to create and manipulate databases.

Structured query language (SQL)

New cards
32

_____ refers to a job title focused on directing, performing, or overseeing activities associated with a database or set of databases.

Database administrator

New cards
33

____ are the most common standard for expressing databases, whereby tables (files) are related based on common keys.

Relational databases

New cards
34

Systems that record a transaction (some form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return are referred to as _____.

transaction processing systems (TPS)

New cards
35

_____ is the term used to describe some form of business exchange.

Transaction

New cards
36

_____ systems are often used to empower employees to track and record data at nearly every point of customer contact.

CRM or customer relationship management

New cards
37

It's believed that medical errors are the _____ leading cause of death in the United States.

third

New cards
38

In some instances, firms supplement operational data with additional input from _____and_________.

surveys; focus groups

New cards
39

Airbnb's "____________" feature helps by leveraging the firm's industry-leading dataset, far larger and more comprehensive than rivals, and constantly updated over time, to suggest the perfect rate

smart pricing

New cards
40

The open-source project known as ____________ was created to analyze massive amounts of raw information better than traditional, highly structured databases

Hadoop

New cards
41

The three Vs of "Big Data" are _, _, and ______; characteristics that distinguish it from conventional data analysis problems and require a new breed of technology.

volume, velocity, and variety

New cards
42

Systems that can absorb any type of data, structured or not, from any type of source are often called ____________.

schema-less

New cards
43

Addressing a data need to compete in business or address future goals is known as

data relevance

New cards
44

Addressing the data system housing, hardware and networking requirements is known as ___________

data hosting

New cards
45

____ are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise.

Expert systems

New cards
46

The category of AI technology used by Google to recognize patterns to improve speech recognition is known as ________

neural networks

New cards
47

An integrated shopping experience and unified customer view across channels is sometimes referred to as __________

omnichannel

New cards
48

_________ are model-building techniques where computers examine many potential solutions to a problem, iteratively modifying (mutating) various mathematical models, and comparing the mutated models to search for a best alternative function.

Genetic algorithms

New cards
49

_________ are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise.

Expert systems

New cards
50

_____ refers to the ratio of a company's annual sales to its inventory

Inventory turnover ratio

New cards
51

Walmart uses_____ technology to sift through massive amounts of social media data.

Hadoop

New cards
52

The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.

distributed denial of service (DDoS)

New cards
53

____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.

Stuxnet

New cards
54

___ refers to a term that either means breaking into a computer system or a particularly clever solution.

Hack

New cards
55

Former CIA employee and NSA contractor, ____________ is seen by many as either a whistleblowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.

Edward Snowden

New cards
56

The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form of identification

two-factor or multi-factor authentication

New cards
57

The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.

tokenization

New cards
58

____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.

Ransomware

New cards
59

Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.

VPN or virtual private network

New cards
60

Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.

social engineering

New cards
61

___ refers to confidence scams executed through technology

Phishing

New cards
62

The _____ technique zeros in on a sloppy programming practice where software developers don't validate user input

SQL injection

New cards
63

Fingerprint readers, retina scanners, voice and face recognition technologies are all part of ____

biometrics

New cards
64

_____ are scrambled character images used to thwart things like automated account setup or ticket buying

CAPTCHAs

New cards
65

____ refers to a trusted third party that provides authentication services in public key encryption schemes.

Certificate authority

New cards
66

_____ are seemingly tempting but bogus targets meant to draw hacking attempts.

Honeypots

New cards
67

______ are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

Whitelists

New cards
68

____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.

Firewalls

New cards
69

When a firm _____, it sells stock to the public for the first time.

goes public

New cards
70

_____ are systems distributed throughout the Internet (or other network) that help to improve the delivery (and hence loading) speeds of Web pages and other media, typically by spreading access across multiple sites located closer to users

Content delivery networks

New cards
71

Facebook followed Twitter's _____ with its own Facebook live video streaming tool.

Periscope

New cards
72

___ refer to programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as sending or receiving data.

Application programming interfaces

New cards
73

When others take advantage of a user or service without providing any sort of reciprocal benefit it is called a ____

free rider problem

New cards
74

China's fast-growing WeChat is the world's _________largest mobile-messaging service

third

New cards
75

If increasingly large parts of the Web reside inside a single (and, for the most part, closed) service, innovation, __________, and exchange may suffer.

competition

New cards
76

____ is a term used to describe each time an ad is served to a user for viewing

Impression

New cards
77

The advertising acronym CPM is defined as _____

cost per thousand impression

New cards
78

The acronym ARPU represents the phrase ______

average revenue per user

New cards
79

Issues of content adjacency and ______ can make social networking ads less attractive than ads running alongside search and professionally produced content sites.

user attention

New cards
80

The New York Times points out, fewer than half of global Internet users have __________ high enough to interest major advertisers

disposable incomes

New cards
81

Facebook's Mark Zuckerberg has declared Internet access to be a "____________."

human right

New cards
82

Market capitalization refers to the value of a firm calculated by multiplying its _____ by the number of shares.

share price

New cards
83

________ is the category of online advertising that captures the most advertising dollars

Search advertising (or paid search)

New cards
84

Google offers employees___________________ the ability to work the equivalent of one day a week on new projects that interest them.

20 percent time

New cards
85

___ refers to the search engine results that are returned and ranked according to relevance

Organic/Natural search

New cards
86

The phrase __________ refers to the process of improving a page's organic search results.

SEO or search engine optimization

New cards
87

Managers looking to plot changes in popularity of a given search term, or compare changes among several terms over time, can leverage a Google product known as __________

trends (or Google Trends)

New cards
88

____ refers to the practice of designing, running and optimizing search engine ad campaigns.

Search engine marketing

New cards
89

____ refers to advertisements that are targeted based on a user's query.

Keyword advertising

New cards
90

A Pinterest link for a vintage handbag that, when clicked, jumps immediately to bag vendor's page within the Etsy app. This is an example of the technique known in the industry as _________

deep linking

New cards
91

Advertising based on a website's content is called _____.

contextual advertising

New cards
92

Advertisers use _____ to indicate that an advertisement should not be shown when a query contains these terms.

negative keywords

New cards
93

Google's goodwill motto is ____________

Don't Be Evil

New cards
94

___ are hordes of surreptitiously infiltrated computers, linked and controlled by rogue software.

Zombie networks/botnets

New cards
95

___ contains sites that wrap data in tags that can be recognized by search engines, analysis tools, and other services to make it easier for computer programs to accurately categorize, compare, and present this information.

Semantic Web

New cards
96

_____ is the primary technology that enables Google Wallet to make wireless payments with the wave of a phone.

NFC or near field communication

New cards
97

_____ is the primary asset for competitive advantage that is created when users load their files, content, and other data onto free cloud storage

Switching cost

New cards
98

______ refers to content that is created, shared, and commented on by a broader community of users

Social media

New cards
99

______ is a term referring to the collective community of bloggers, as well as those who read and comment on blogs

Blogosphere

New cards
100

Links in a blog post that refer readers back to cited sources are called _____

trackbacks

New cards

Explore top notes

note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 36 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 182 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard92 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard23 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard42 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard28 terms
studied byStudied by 295 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard100 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(5)
flashcards Flashcard76 terms
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard153 terms
studied byStudied by 3 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard256 terms
studied byStudied by 175 people
Updated ... ago
5.0 Stars(3)