Quizlet Flashcards on Internet and Network Concepts

¡Supera tus tareas y exámenes ahora con Quizwiz!

Intelligent agent

A chatbot is an example of an intelligent agent.

major CRM application software vendor

A company that provides CRM software solutions, such as Microsoft, Salesforce.com, Oracle, and SAP.

Modem

A device that makes possible the translation of digital signals to analog sound signals used by a computer network.

Digital Signal

A discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits.

Firewall Definition

A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

CLTV

A metric based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship.

Campus Area Network (CAN)

A network that spans a college or corporate facility.

Streaming

A publishing method for music and video files that flows a continuous stream of content to a user's device without being stored locally on the device.

Security policy

A statement ranking information risks and identifying security goals.

push-based model

A supply chain driven by forecasts or best guesses of consumer demand.

RFID

A technology used by Walmart to track items for sale on store shelves.

Analytical CRM

A tool used to analyze customer buying patterns.

ICANN

A. ICANN

Apple Pay Technology

A. True

DNS Hierarchical Structure

A. True

Fiber-optic Cable Cost

A. True

Small world theory

According to small world theory, you are only 6 links away from any other person on earth.

CRM Packages Modules

All CRM packages contain modules for PRM and ERM. B. False.

Implementation controls

Audit the systems development process at various points to ensure that the process is properly controlled and managed.

CRM Systems Functions

CRM systems typically provide software and online tools for sales, customer service, and: E. marketing.

Dynamic pricing

Changing the prices of products based on the level of demand characteristics of the customer.

UTM systems

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more.

downstream portion of the supply chain

Distribution and delivery of products to retailers.

Enterprise Systems Requirement

Enterprise systems do not require fundamental changes in the way the business operates. B. False.

DoS attacks

Flood a network server with thousands of requests for service.

SFA modules

Help sales staff increase their productivity by focusing sales efforts on the most profitable customers.

Cloud Computing Accountability

In cloud computing, accountability and responsibility for protection of sensitive data resides with the company owning the data.

Digital market information asymmetry

In digital markets: information asymmetry increases.

Menu costs in digital markets

In digital markets: menu costs are lower.

Network costs in digital markets

In digital markets: network costs decline.

Digital market search costs

In digital markets: search costs increase.

Switching costs in digital markets

In digital markets: switching costs decline.

Marginal cost of digital goods

In general, for digital goods, the marginal cost of producing another unit is about zero.

Social media presence

In planning a robust e-commerce presence, you will want to consider the blog platform as part of your social media presence.

upstream portion of the supply chain

Includes a company's suppliers, the suppliers' suppliers, and the processes for managing relationships with them.

Communities of practice

Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests.

Unsupervised machine learning

Involves programs that can 'teach themselves' without human intervention.

Supervised machine learning

Involves training a system by providing specific examples of desired inputs and outputs identified by humans in advance.

Internet security vulnerabilities

Large public networks, such as the Internet, are less vulnerable than internal networks.

Global Supply Chain Management

Managing a global supply chain is more complex than managing a domestic supply chain.

NFC Tags

NFC tags are not always passive.

Market creators

Provide a digital environment where buyers and sellers can establish prices for products.

Geoadvertising

Sends ads to users based on their GPS locations.

Social marketing control

Social marketing enables firms to tightly control their brands.

Web Server

Software for locating and managing stored web pages.

Trojan Horse

Software that appears to be benign but does something other than expected.

WMS Example

The WMS that Haworth Incorporated uses is an example of which of the following? A. Supply chain execution system.

Bandwidth

The difference between the highest and lowest frequencies that can be accommodated on a single channel.

AUP Definition

Which of the following defines acceptable uses of a firm's information resources and computing equipment? C. An AUP.

WPA3 Specification

Which of the following is the most recent specification of the security standard developed for Wi-Fi? A. WPA3.

Network Security Breaches Cause

Which of the following is the single greatest cause of network security breaches? C. User lack of knowledge.

War Driving

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? E. War driving.

Expert systems

Work by applying a set of decision cases against a knowledge base, both of which are extracted from human experts.

SEM

________ monetizes the value of the data stored by search engines.

Measures defined by management to evaluate success

are called KPIs.

Document management systems

are essentially large databases.

The impacts of knowledge-based investments

are not easy to measure.

Decisions regarding managing and monitoring day-to-day business activities

are referred to as operational intelligence.

Identity fraud loss

consumers lost $16.9 billion to identity fraud in 2019 according to the 2020 Identity Fraud Study by Javelin Strategy & Research.

Market creators

create revenue by providing digital content over the web.

MIS typically produce

fixed, regularly scheduled reports based on data extracted from the organization's TPS.

Revenue generation methods

generate revenue from advertising or from directing buyers to sellers.

Ambient data

includes a file deleted from a hard disk.

Corporate infrastructure

includes a large number of small LANs linked to each other as well as to corporate-wide networks.

The information system that supports a manager's role as a resource allocator

is DSS.

Streaming

is a publishing method for music and video files that flows a continuous stream of content to a user's device without being stored locally on the device.

neural network

is a type of intelligent technique that finds patterns and relationships in massive data sets too large for a human to analyze.

Amazon

is also a powerful product search engine in addition to being an online retailer.

VPN

is an encrypted private network configured within a public network.

Checking store inventory

is an example of a structured decision.

Domain name system management

is managed by ICANN.

Packet switching

is more efficient than telephone networks that use circuit switching.

At least 80 percent of an organization's business content

is semistructured or unstructured.

Coaxial cable

is similar to that used for cable television and consists of thickly insulated copper wire.

Internet

is the largest implementation of client/server computing.

MIMO

is used to reduce Wi-Fi network interference from nearby systems in the same spectrum.

The universal standards of the Internet and e-commerce

lower market entry costs.

Mobile search

makes up less than 50% of all Internet searches.

Digital marketplace

provide a digital environment where buyers and sellers can establish prices for products.

RSS

pulls content from websites and feeds it automatically to users' computers.

Cost transparency

refers to the ability of consumers to discover what merchants actually pay for products.

Web browser software

requests web pages from the Internet using the HTTP protocol.

Transaction processing

save users money and time by processing online sales transactions.

Direct sales

sell physical products directly to consumers or individual businesses.

When managers perform symbolic duties representing their company

they are acting in their interpersonal role.

Advertising networks

track a user's behavior at thousands of websites.

BPM

uses ideas similar to the balanced scorecard framework with a stronger emphasis on strategy.

What-if analysis

works forward from known or assumed conditions.

Cybervandalism

The intentional defacement or destruction of a website is called: E. cybervandalism.

E-procurement

The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements.

User Lack of Knowledge

The single greatest cause of network security breaches.

bps

The total amount of digital information that can be transmitted through any telecommunications medium is measured in bps.

Cycle Time

The total time it takes to complete a business process, from start to finish.

Two-Factor Authentication

Two-factor authentication utilizes a(n): D. a multistep process of authentication.

Digital Certificate System

Uses third party CAs to validate a user's identity.

DDoS Attack

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) B. DDoS attack.

Walmart's Replenishment Model

Walmart's continuous replenishment system is an example of a(n) C. pull-based model.

best practices

What enterprise software is built around, reflecting thousands of predefined business processes.

Zero-Day Vulnerability

When a hacker discovers a security hole in software that is unknown to the software's creator, it is an example of: C. a zero-day vulnerability.

identity theft

When hackers gain access to a database containing your personal private information.


Conjuntos de estudio relacionados

System Software (Operating System)

View Set

Quiz 3: Project Management Process Groups

View Set

Unit 6 - Communication with Clients

View Set

Psychology: Lifespan Development - Middle Adulthood | Chapter 8

View Set

Renewable and Nonrenewable Energy Sources

View Set

chapter 6 - rock identification study guide

View Set