Quizlet Flashcards on Internet and Network Concepts
Intelligent agent
A chatbot is an example of an intelligent agent.
major CRM application software vendor
A company that provides CRM software solutions, such as Microsoft, Salesforce.com, Oracle, and SAP.
Modem
A device that makes possible the translation of digital signals to analog sound signals used by a computer network.
Digital Signal
A discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits.
Firewall Definition
A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
CLTV
A metric based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship.
Campus Area Network (CAN)
A network that spans a college or corporate facility.
Streaming
A publishing method for music and video files that flows a continuous stream of content to a user's device without being stored locally on the device.
Security policy
A statement ranking information risks and identifying security goals.
push-based model
A supply chain driven by forecasts or best guesses of consumer demand.
RFID
A technology used by Walmart to track items for sale on store shelves.
Analytical CRM
A tool used to analyze customer buying patterns.
ICANN
A. ICANN
Apple Pay Technology
A. True
DNS Hierarchical Structure
A. True
Fiber-optic Cable Cost
A. True
Small world theory
According to small world theory, you are only 6 links away from any other person on earth.
CRM Packages Modules
All CRM packages contain modules for PRM and ERM. B. False.
Implementation controls
Audit the systems development process at various points to ensure that the process is properly controlled and managed.
CRM Systems Functions
CRM systems typically provide software and online tools for sales, customer service, and: E. marketing.
Dynamic pricing
Changing the prices of products based on the level of demand characteristics of the customer.
UTM systems
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more.
downstream portion of the supply chain
Distribution and delivery of products to retailers.
Enterprise Systems Requirement
Enterprise systems do not require fundamental changes in the way the business operates. B. False.
DoS attacks
Flood a network server with thousands of requests for service.
SFA modules
Help sales staff increase their productivity by focusing sales efforts on the most profitable customers.
Cloud Computing Accountability
In cloud computing, accountability and responsibility for protection of sensitive data resides with the company owning the data.
Digital market information asymmetry
In digital markets: information asymmetry increases.
Menu costs in digital markets
In digital markets: menu costs are lower.
Network costs in digital markets
In digital markets: network costs decline.
Digital market search costs
In digital markets: search costs increase.
Switching costs in digital markets
In digital markets: switching costs decline.
Marginal cost of digital goods
In general, for digital goods, the marginal cost of producing another unit is about zero.
Social media presence
In planning a robust e-commerce presence, you will want to consider the blog platform as part of your social media presence.
upstream portion of the supply chain
Includes a company's suppliers, the suppliers' suppliers, and the processes for managing relationships with them.
Communities of practice
Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests.
Unsupervised machine learning
Involves programs that can 'teach themselves' without human intervention.
Supervised machine learning
Involves training a system by providing specific examples of desired inputs and outputs identified by humans in advance.
Internet security vulnerabilities
Large public networks, such as the Internet, are less vulnerable than internal networks.
Global Supply Chain Management
Managing a global supply chain is more complex than managing a domestic supply chain.
NFC Tags
NFC tags are not always passive.
Market creators
Provide a digital environment where buyers and sellers can establish prices for products.
Geoadvertising
Sends ads to users based on their GPS locations.
Social marketing control
Social marketing enables firms to tightly control their brands.
Web Server
Software for locating and managing stored web pages.
Trojan Horse
Software that appears to be benign but does something other than expected.
WMS Example
The WMS that Haworth Incorporated uses is an example of which of the following? A. Supply chain execution system.
Bandwidth
The difference between the highest and lowest frequencies that can be accommodated on a single channel.
AUP Definition
Which of the following defines acceptable uses of a firm's information resources and computing equipment? C. An AUP.
WPA3 Specification
Which of the following is the most recent specification of the security standard developed for Wi-Fi? A. WPA3.
Network Security Breaches Cause
Which of the following is the single greatest cause of network security breaches? C. User lack of knowledge.
War Driving
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? E. War driving.
Expert systems
Work by applying a set of decision cases against a knowledge base, both of which are extracted from human experts.
SEM
________ monetizes the value of the data stored by search engines.
Measures defined by management to evaluate success
are called KPIs.
Document management systems
are essentially large databases.
The impacts of knowledge-based investments
are not easy to measure.
Decisions regarding managing and monitoring day-to-day business activities
are referred to as operational intelligence.
Identity fraud loss
consumers lost $16.9 billion to identity fraud in 2019 according to the 2020 Identity Fraud Study by Javelin Strategy & Research.
Market creators
create revenue by providing digital content over the web.
MIS typically produce
fixed, regularly scheduled reports based on data extracted from the organization's TPS.
Revenue generation methods
generate revenue from advertising or from directing buyers to sellers.
Ambient data
includes a file deleted from a hard disk.
Corporate infrastructure
includes a large number of small LANs linked to each other as well as to corporate-wide networks.
The information system that supports a manager's role as a resource allocator
is DSS.
Streaming
is a publishing method for music and video files that flows a continuous stream of content to a user's device without being stored locally on the device.
neural network
is a type of intelligent technique that finds patterns and relationships in massive data sets too large for a human to analyze.
Amazon
is also a powerful product search engine in addition to being an online retailer.
VPN
is an encrypted private network configured within a public network.
Checking store inventory
is an example of a structured decision.
Domain name system management
is managed by ICANN.
Packet switching
is more efficient than telephone networks that use circuit switching.
At least 80 percent of an organization's business content
is semistructured or unstructured.
Coaxial cable
is similar to that used for cable television and consists of thickly insulated copper wire.
Internet
is the largest implementation of client/server computing.
MIMO
is used to reduce Wi-Fi network interference from nearby systems in the same spectrum.
The universal standards of the Internet and e-commerce
lower market entry costs.
Mobile search
makes up less than 50% of all Internet searches.
Digital marketplace
provide a digital environment where buyers and sellers can establish prices for products.
RSS
pulls content from websites and feeds it automatically to users' computers.
Cost transparency
refers to the ability of consumers to discover what merchants actually pay for products.
Web browser software
requests web pages from the Internet using the HTTP protocol.
Transaction processing
save users money and time by processing online sales transactions.
Direct sales
sell physical products directly to consumers or individual businesses.
When managers perform symbolic duties representing their company
they are acting in their interpersonal role.
Advertising networks
track a user's behavior at thousands of websites.
BPM
uses ideas similar to the balanced scorecard framework with a stronger emphasis on strategy.
What-if analysis
works forward from known or assumed conditions.
Cybervandalism
The intentional defacement or destruction of a website is called: E. cybervandalism.
E-procurement
The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements.
User Lack of Knowledge
The single greatest cause of network security breaches.
bps
The total amount of digital information that can be transmitted through any telecommunications medium is measured in bps.
Cycle Time
The total time it takes to complete a business process, from start to finish.
Two-Factor Authentication
Two-factor authentication utilizes a(n): D. a multistep process of authentication.
Digital Certificate System
Uses third party CAs to validate a user's identity.
DDoS Attack
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) B. DDoS attack.
Walmart's Replenishment Model
Walmart's continuous replenishment system is an example of a(n) C. pull-based model.
best practices
What enterprise software is built around, reflecting thousands of predefined business processes.
Zero-Day Vulnerability
When a hacker discovers a security hole in software that is unknown to the software's creator, it is an example of: C. a zero-day vulnerability.
identity theft
When hackers gain access to a database containing your personal private information.