Tags & Description
_____ is the raw material in the production of information.
Data
______ refers to the buying and selling goods and services via a telecommunications network.
E-commerce
Businesses such as Amazon.com and Buy.com that transact business only through an online environment are called _____ retailers.
pure play
In the _____ phase of transferring data from a transactional database to a data warehouse, specialists “cleanse” the data and modify it into a form that allows insertion into the data warehouse.
transformation
The process of _____ enables organizations to plan and carefully design their global sites to cater to local needs and preferences.
glocalization
_____ is a methodology of solving a new problem established on the solutions of similar problems.
Case-based reasoning
Some companies offer _____ specifically designed to analyze shoppers’ behavior at their sites based on captured data such as pages viewed, options clicked, and the sequence of pages shoppers viewed.
decision support systems (DSSs)
Since OLAP applications are designed to process large amounts of records and produce summaries, they are usually significantly faster than relational applications such as those using _____.
SQL queries
Several diagramming sets were developed by the 1970s, but in the late-1990s, a de facto standard emerged: _____.
unified modeling language
_____ make extensive use of iterative programming, involving users often, and keeping programmers open to modifications while the development is still under way.
Agile methods
A(n) _____ is a business event such as a sale, a purchase, the hiring of a new employee, and the like.
transaction
Business intelligence applications access large pools of data, usually transactional records stored in large databases called _____.
data warehouses
_____ are expenses incurred when a customer stops buying a product or service from one business and starts buying it from another.
Switching costs
_____ refers to the competitive advantage that a company can achieve by persuading customers that its product or service is better than its competitors'.
Product differentiation
_____ is a tool used to translate MS-Word documents to multiple languages.
Wordfast
The recent trend in less rich countries is to adopt _____ to avoid high costs.
free open source software
One objective of data mining is _____, the discovering of patterns in data that can lead to reasonable predictions.
forecasting
BI software has become so popular in large companies that Microsoft decided to integrate such software into its popular database management system, _____.
SQL Server
The concept of extracting business intelligence from large data warehouses often involves _____ of several information systems.
integration
In _____, criminals use personal information to attack organizational systems.
spear phishing
A _____ is a type of malware that spreads in a network without human intervention.
worm
_____ occurs when a website receives an overwhelming number of information requests, such as merely logging on to a site.
Denial of service (DoS)
CIOs often find the tasks of earmarking funds for _____ difficult because they cannot show the return on investment (ROI) of such planning.
disaster recovery programs
A(n) _____ is an activity that the system executes in response to a user.
use case
A(n) _____ is required when it is not possible to exploit expertise by coupling quantitative data from a database with decision models.
expert system
Companies such as Razorfish, DoubleClick, and Engage Software use _____ to collect consumer data.
spyware
In Japan, many people who order merchandise online prefer to pick it up at _____ called “konbini,” and pay there for what they purchased.
convenience stores
A team that is sharing project data by posting files in Google Drive is using the ____________ method of sharing content.
shared content with version management
The term _____ refers to the sequence of activities involved in producing a product or service.
supply chain
The main goals of _____ systems are to increase the quality of customer service, reduce the amount of labor involved in serving customers, and learn as much as possible about the service preferences of individual customers.
customer relationship management
_____ are normally responsible for developing cost analyses, design considerations, implementation timelines, and feasibility studies of a computer system before making recommendations to senior management.
Systems analysts
The _____ is responsible for all aspects of an organization’s ISs and is often a corporate vice president.
chief information officer
_____ provide customers with cheaper combined service and the convenience of one-stop shopping.
Alliances
_____ use physical characteristics of people, such as fingerprints and retina scans, for authentication and access to physical places and online information systems.
Biometrics
_____ includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.
Spyware
In the context of B2B trading, online advertising is done mainly in two ways: through _____ and through banners.
search engines
_____, which is any form of advertising through an online search site, is regarded by businesses as highly effective.
Search advertising
On the Web, _____ includes identifying the sites your audience frequently visits.
targeting
_____ has fewer restrictions on storage space and transactions, and since only one site resides on the disks, no other site can affect its functionality.
Dedicated hosting
_____ is determined by the relationship between resources expended and the benefits gained in achieving a goal.
Efficiency
The combination of customer relationship management (CRM) and supply chain management (SCM) systems is referred to as _____.
enterprise resource planning (ERP) systems
When a radio frequency identification tag is attached to a product, it contains a(n) _____.
electronic product code
A ____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records.
database model
A(n) _____ is the field by which records in a table are uniquely identified.
primary key
Many organizations have found that if they accumulate _____, they can use it for important management decisions, such as researching market trends or tracking down fraud.
transaction data
_____ involves high volumes of data compiled from traditional, ordinary business activities, as well as newer, nontraditional sources.
Big Data
As computers convert to operating systems that support _____, displaying different character sets should be less of a problem.
Unicode
_____ are the main reasons behind the slow adoption of new forms of electronic payments.
Security concerns
According to the _____ , all legal matters are confined to the country from which a site operates.
country-of-origin principle
The _____ enforces a privacy law called the Directive on Data Privacy.
European Union (EU)
The country-of-origin and country-of-destination principles deal with the issue of _____.
e-commerce jurisdiction
Businesses use _____ to analyze data.
models
Determining which stock will yield the highest return by the end of the year is an example of a(n) _____ problem.
semi-structured
A(n) _____ is a computer-based information system designed to help knowledge workers select one of many alternative solutions to a problem.
decision support system (DSS)
A _____ model is one that is automatically adjusted based on changing relationships among variables.
dynamically modified
Among the general statistical models, a(n) _____ model is the best-fit straight-line relationship between two variables, such as sales and the money spent on marketing.
linear regression
_____ are excellent tools for building both the data and the models that decision support systems need.
Spreadsheets
Some companies offer _____ specifically designed to analyze shoppers’ behavior at their sites based on captured data such as pages viewed, options clicked, and the sequence of pages shoppers viewed.
decision support systems (DSSs)
In banking, _____ is employed to find profitable customers and patterns of fraud.
data mining
The meaningful information gleaned from data warehouses using software tools is referred to as _____.
business intelligence
Large ISs that address structured problems are usually conceived, planned, developed, and maintained within a framework called the _____.
systems development life cycle (SDLC)
To find the _____, the net present value of the system is calculated by combining the net present value of the costs of the system with the net present value of the benefits of the system.
return on investment (ROI)
_____ is meant to guarantee that the experts have passed tests that ensure their skills.
Certification
A con artist telephones an employee, pretends to be from his own organization's IT unit, and says he must have the employee’s password to fix a problem. This is an example of _____.
social engineering
Sometimes a(n) _____ is automatically created using data, such as the date and time of a transaction or the name or password of the user updating the file.
audit trail
Coding a message into a form unreadable to an interceptor is called _____.
encryption
_____ records sums owed to the organization and by whom.
Accounts receivable
A _____ is an array of components that work together to achieve a common goal, or multiple goals, by accepting input, processing it, and producing output in an organized manner.
system
_____ have been used to provide service via the Web, such as helping residents find locations of different services on a city map or plan travel routes.
Geographic information systems
A _____ is responsible for the databases and data warehouses of an organization—a very sensitive and powerful position.
database administrator
One way to increase market share is to lower prices, and the best way to lower prices is to _____.
reduce costs
Which of the following patents does Priceline.com hold that prevents competitors from entering its business space?
Online reverse auctioning
_____ provide customers with cheaper combined service and the convenience of one-stop shopping.
Alliances
On the web, an example of alliances is a(n) _____.
affiliate program
Which of the following is a result of forming strategic alliances?
The same technology is used.
_____ involves adoption of new machinery and elimination of management layers.
Reengineering
_____ use physical characteristics of people, such as fingerprints and retina scans, for authentication and access to physical places and online information systems.
Biometrics
JetBlue obtained the strategic advantage of the _____ by implementing the latest available technologies of fast databases, VoIP, and a slick website.
late mover
While blogging is publishing text and other visual material, _____ is publishing sound and video.
podcasting
_____ might be thought of as “real-time e-mail,” because, unlike e-mail, it is synchronous in exchanging information.
Instant messaging
A(n) _____ is a network used only by the employees of an organization.
intranet
_____ is the term for any unsolicited commercial email.
Spam
Some hosting companies charge extra fees for shared hosting if the site experiences activity above a predetermined amount of data that is transferred, or number of visits from Web surfers, known as _____.
hits
_____ defines the degree to which a goal is achieved.
Effectiveness