CIS 105 - Final Exam Study Guide
How does Google's AdSense ad network work? (select all that apply) Content-provider websites run ads for Google in exchange for a cut of the money that Google makes from the ads Advertisers place ads on content-provider websites to reach more customers More participants bringing in more revenue also helps the ad network firm benefit from scale economies, offering a better ROI from its ad technology and infrastructure Advertisers attract content providers, which in turn attracts more advertisers creating strong network effects
(all options)
What is a SQL?
A domain-specific language used in programming and designed for managing data held in a relational database management system
(Term) In mathematics and computer science, an algorithm is an unambiguous specification of how to solve a class of problems. Algorithms can perform calculation, data processing, and automated reasoning tasks.
Algorithm
How can you debias the framing effect? (select all that apply) Decide how to decide up front Think through how you're going to make the decision before you go to make the decision Challenge the information you get Do your own analysis
All of the Above
The value derived from network effects comes from three sources: Exchange Staying Power Complementary Benefits All of the above
All of the above
What are the M's of Social Media? Megaphone for messages Magnet for inbound communication Monitoring and Mediation of conversations All of the answer selections are correct
All of the answer selections are correct
Which of the following tasks can be performed using online analytical processing (OLAP)? (select all that apply) Explore and compare data across multiple factors such as time, geography, product lines, etc. Slice and dice data to uncover new insights Drill down to uncover new insights View various dimensions of analysis in rows and columns, with summary values at the intersection
All options
What is a database?
An organized collection of data, generally stored and accessed electronically from a computer system
(Term) _____________ or focalism is a cognitive bias for an individual to rely too heavily on an initial piece of information offered (known as the "anchor") when making decisions.
Anchoring
_____ is a free linux-based mobile operating system. Windows 10: iOS Kindle Android
Android
(Term) ___________________ refers to the use of cable pulled devices or motors to emulate a human or an animal, or bring lifelike characteristics to an otherwise inanimate object.
Animatronics
(Term) sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals.
Artificial Intelligence
(Term) is a systematic and independent examination of books, accounts, statutory records, documents and vouchers of an organization to ascertain how far the financial statements as well as non-financial disclosures present a true and fair view of the concern
Audit
(Term) _____________ is the maximum rate of data transfer across a given path
Bandwidth
(Term) __________________ compares business processes and performance metrics to industry bests and best practices from other companies. In project management benchmarking can also support the selection, planning and delivery of projects.
Benchmarking
(Term) used to refer to data sets that are too large or complex for traditional data processing application software to adequately deal with.
Big Data
(Term) _____________ is a term used to refer to data sets that are too large or complex for traditional dataprocessing application software to adequately deal with. Data with many cases (rows) offer greater statistical power, while data with higher complexity (more attributes or columns) may lead to a higher false discovery rate.
Big data
(Term) In science, computing, and engineering, a ______________is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings.
Black Box
_______ hackers are the bad guys who try to break into (hack) computer systems.
Black Hats
Instead of competing with established firms in an existing network market, firms should seek uncontested, new market spaces. This is called: Blue Zone Strategy Blue Ocean Strategy Red Waters Strategy Shark Tank Strategy
Blue Ocean Strategy
_______ are networks of infiltrated and compromised machines controlled by a central command.
Botnets
(Term) The ______________________ is a traditional unit of heat; it is defined as the amount of heat required to raise the temperature of one pound of water by one-degree Fahrenheit.
British Thermal Unit (BTU
(Term) _______________ is business jargon for a business venture that generates a steady return of profits that far exceed the outlay of cash required to acquire or start it.
Cash cow
(Term) _________________ is shared pools of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility.
Cloud computing
(Term) ____________________ describes technology platforms that, broadly speaking, are based on the scientific disciplines of artificial intelligence and signal processing. These platforms encompass machine learning, reasoning, natural language processing, speech recognition and vision (object recognition), human-computer interaction, dialog and narrative generation, among other technologies.
Cognitive computing (CC)
Goldcorp offered prize money to anyone who came up with the best methods and estimates for reaping golden riches. Netflix offered prize money to any team that could improve the accuracy of movie recommendations by 10 percent. These are examples of: Free-riding Crowdsourcing Groupthink Winner Takes All
Crowdsourcing
(Term) _____________ is the reduction of bias, particularly with respect to judgment and decision making. Biased judgment and decision-making is that which systematically deviates from the prescriptions of objective standards such as facts, logic, and rational behavior or prescriptive norms.
Debiasing
(Term) The Advocatus Diaboli (Latin for ____________) was an official position within the Catholic Church: one who "argued against the canonization(sainthood) of a candidate in order to uncover any character flaws or misrepresentation of the evidence favoring canonization
Devils Advocate
(Term) An unmanned aerial vehicle (UAV), commonly known as a ___________________, is an aircraft without a human pilot aboard. UAVs are a component of an unmanned aircraft system (UAS); which include a UAV, a ground-based controller, and a system of communications between the two.
Drone
Which of the following apply to Moore's Law? (select all that apply) Chip performance per dollar doubles every eighteen months The next generation of chips will be twice as fast in 18 months, but will cost the same as today's models The next generation of chips will be half as expensive in 18 months but are the same speed as today's models Strictly speaking, Moore's Law does not apply to other technology components, but other computing components (such as storage) are also seeing their price versus performance curves skyrocket exponentially
Every Option
What are Trojans?
Exploits that try to sneak in by masquerading as something they are not. The payload is released when the user is duped into downloading and installing the malware cargo.
TRUE/FALSE In the case of CPC (cost per click), advertisers are charged for ad placement whether or not a user clicks on it.
False
TRUE/FALSE? Bob wins the lottery. Since he knows the overall probability of winning the lottery is really low, he does not bother buying another ticket. This is an example of Base Rate Fallacy.
False
(Term) The __________________ is an annual list compiled and published by Fortune magazine that ranks 500 of the largest United States corporations by total revenue for their respective fiscal years. The list includes publicly held companies, along with privately held companies for which revenues are publicly available.
Fortune 500
"Sasha scores an 'A' on every one of her tests. I bet she could be a good student leader." This is an example of: Decision by Extension The Halo Effect correct A Grade Bias Logical Ordering
Halo Effect
The tendency for an impression created in one area to influence the opinion in another area is called: Over-confidence Confirmation Halo Effect correct Ostrich Effect
Halo Effect
On Twitter, users can classify comments on a given topic using _____, allowing others to quickly find related tweets. notifications hashtags correct star tags emojis
Hashtags
Groupthink bias can occur due to: Herd Behavior The Wisdom of Crowds Crowdsourcing Network Effects
Herd Behavior
(Term) The ___________ is the network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data.
Internet of things (IoT)
(Term) _______________is a time interval between the stimulation and response, or, from a more general point of view, a time delay between the cause and the effect of some physical change in the system being observed.
Latency
(Term) _____________ is generally the detailed organization and implementation of a complex operation. In a general business sense, it is the management of the flow of things between the point of origin and the point of consumption in order to meet requirements of customers or corporations.
Logistics
(Term) In statistics and business, a long tail of some distributions of numbers is the portion of the distribution having a large number of occurrences far from the head or central part of the distribution.
Long tail (strategy)
(Term) ____________/programs are structured marketing strategies designed by merchants to encourage customers to continue to shop at or use the services of businesses associated with each program.
Loyalty card
(Term) _____________ is the study of algorithms and statistical models that computer systems use to progressively improve their performance on a specific task. Machine learning algorithms build a mathematical model of sample data, known as "training data", in order to make predictions or decisions without being explicitly programmed to perform the task.
Machine learning (ML)
(Term) _____________ or magnetic recording is the storage of data on a magnetized medium. Magnetic storage uses different patterns of magnetisation in a magnetisable material to store data and is a form of non-volatile memory
Magnetic storage
(Term) _______________________ are transactions in which the ownership of companies, other business organizations, or their operating units are transferred or consolidated with other entities
Mergers and acquisitions (M&A)
A market where there are many buyers but only one dominant seller is called a: Perfect Competition Duopoly Oligopoly Monopoly
Monopoly
(Term) ______________________ is a subfield of computer science, information engineering, and artificial intelligence concerned with the interactions between computers and human (natural) languages, in particular how to program computers to process and analyze large amounts of natural language data.
Natural language processing (NLP)
_______ and _______ result in one social network being favored over others in a particular region. Cost; collaboration Network effects; cultural differences Information asymmetry; peer production Cost; profit
Network effects; cultural differences
(Term) _______________ is an agreement in which one company hires another company to be responsible for an existing internal activity.
Outsourcing
______ refers to users working, often collaboratively, to create content and provide services online. Peer Production Peer Network Peer Platform Co-consumption
Peer Production
Many firms attempt to enhance their network effects by creating a ______ for the development of third-party products and services that enhance the primary offering. platform network mesh grid
Platform
(Term) ____________ is a tool for analyzing competition of a business. It draws from industrial organization (IO) economics to derive five forces that determine the competitive intensity and, therefore, the attractiveness (or lack of it) of an industry in terms of its profitability.
Porter's Five Forces Framework
(Term) ______________________ is a tool for analyzing competition of a business. It draws from industrial organization (IO) economics to derive five forces that determine the competitive intensity and, therefore, the attractiveness (or lack of it) of an industry in terms of its profitability
Porter's Five Forces Framework
(Term) _________________ of demand is a measure used in economics to show the responsiveness, or elasticity, of the quantity demanded of a good or service to a change in its price when nothing but the price changes. More precisely, it gives the percentage change in quantity demanded in response to a one percent change in price
Price elasticity
(Term) is the process of finding, agreeing terms, and acquiring goods, services, or works from an external source, often via a tendering or competitive bidding process.
Procurement
(Term) The degree to which a business or activity yields profit or financial gain.
Profitability
(Term) ___________________ uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically-stored information. Passive tags collect energy from a nearby RFID reader's interrogating radio waves
Radio-frequency identification (RFID)
______ comes about when we make judgments about the probability of an event under uncertainty. Framing Effect Over-confidence Bias Halo Effect Representative Heuristic
Representative Heuristic
(Term) ____________________, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon
Reverse engineering
The practice of running and optimizing search engine ad campaigns is referred to as: Unconstrained Optimization Search Engine Marketing (SEM) Pay per Click (PPC) Optimization Search Engine Optimization (SEO)
Search Engine Marketing (SEM)
(Term) An American reality television series that premiered on August 9, 2009, on ABC. The show is a franchise of the international format Dragons' Den, which originated in Japan in 2001. It shows aspiring entrepreneurs as they make business presentations to a panel of five "shark" investors, who then choose whether to invest as business partners.
Shark Tank
(Term) is an imitation of the operation of a real-world process or system. The act of simulating something first requires that a model be developed; this model represents the key characteristics, behaviors and functions of the selected physical or abstract system or process.
Simulation
(Term) A system of many tiny microelectromechanical systems (MEMS) such as sensors, robots, or other devices, that can detect, for example, light, temperature, vibration, magnetism, or chemicals.
Smartdust
At the heart of Facebook's appeal is the _______, which refers to Facebook's ability to collect, express, and leverage the connections between the site's users. It links how users are connected to other users, and captures information about tagged photos, comments, group membership, and apps installed. IT Platform Collaborative Graph Computer Network Social Graph
Social Graph
(Term) A system of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer.
Supply Chain
TRUE/FALSE Analytics is the discovery, interpretation, and communication of meaningful patterns in data, as well as the process of applying those patterns towards effective decision making.
True
TRUE/FALSE It is possible that a network may have both same-side and cross-side benefits.
True
TRUE/FALSE It is quite common for non-tech employees to work on development teams with technical staff, defining business problems, outlining processes, setting requirements, and determining the kinds of data the firm will need to leverage.
True
TRUE/FALSE Mash-ups promote the useful combination of different Web services, such as maps and other information feeds. Mash-up authors leverage technologies such as APIs and XML to combine seemingly unrelated data sources and services in new and novel ways.
True
TRUE/FALSE Organizations typically pull data together from a variety of sources including: enterprise software systems, surveys and focus groups, partner firms, data from aggregator firms, and public data from the internet.
True
TRUE/FASLE Google's "trick" is matchmaking: pairing Internet surfers with advertisers and taking a cut along the way.
True
The video game industry where console owners are attracted to platforms with the most games, and innovative developers are attracted to platforms that have the most users, is an example of: One-sided Market Two-sided Market
Two-sided Market
_____ refers to services targeted at harnessing the power of the internet to empower users to collaborate, create resources, and share information in a distinctly different way from the static web sites and transaction-focused storefronts. Web 3.0 Web 2.0 Parallel Computing Cloud Computing
Web 2.0
(Term) The ______________ is a branded graphical presentation developed and used by the American research, advisory and information technology firm Gartner to represent the maturity, adoption, and social application of specific technologies. The hype cycle provides a graphical and conceptual presentation of the maturity of emerging technologies through five phases (Technology Trigger, Peak of Inflated Expectations, Trough of Disillusionment, Slope of Enlightenment, Plateau of Productivity).
hype cycle
(Term) A ___________________ is a computer processor that incorporates the functions of a central processing unit on a single integrated circuit (IC), or at most a few integrated circuits.
microprocessor
(Term) is an operating system for phones, tablets, smartwatches, or other mobile devices. While computers such as typical laptops are 'mobile', the operating systems usually used on them are not considered mobile ones, as they were originally designed for desktop computers that historically did not have or need specific mobile features
mobile operating system (or mobile OS)
(Term) A ___________________ is an operator of multiple cable or direct-broadcast satellite television systems.
multiple-system operator (MSO)
Facebook's key resources for competitive advantage are ______ and _______. switching costs; technology technology; barriers to entry network effects; switching costs barriers to entry; location
network effects; switching costs
(Term) A ____________________, also known as a handheld PC is a variety mobile device which functions as a personal information manager.
personal digital assistant (PDA)
(Term) A ________________, also called a slice or substrate, is a thin slice of semiconductor material, such as a crystalline silicon, used in electronics for the fabrication of integrated circuits and in photovoltaics for conventional, wafer-based solar cells.
silicon wafer
(Term) A _____________ is a type of economic bubble taking place in stock markets when market participants drive stock prices above their value in relation to some system of stock valuation.
stock market bubble
Anyone can acquire _________, but ____________ is oftentimes considered a defensible source of competitive advantage.
technology; data
In ________ markets, users gain benefits from interacting with a separate, complementary class of users. This is called _______ exchange benefit. two-sided; same-side one-sided; same-side two-sided; cross-side one-sided; cross-side
two-sided; cross-side