IDSC 3001 Exam 4 (Cumulative)
Six Managerial Decisions
- Data collection and storage - Secondary data use - Data accuracy - Authorized access - Automated judgment - Data merging and profiling
What is the importance of Backlinks?
- Increased organic traffic - Increased referral traffic - Credibility with google - Credibility with readers - Faster indexing time
What are the Goals/Benefits of a CRM?
- Provide a 360 degree view of customer facing processes - Help sales staff close deals faster - Cross-sell products more effectively - Satisfy, Retain existing customers - Discover and acquire new customers
Issues with data redundancy?
- waste of time to enter the same data repeatedly - waste of storage space and slow down queries - updates/corrections must be applied to multiple rows - increase the possibilities of errors and cause data integrity issues
CRM helps automate customer-facing business processes. Which of the following is NOT a customer-facing process? a) Order fulfillment b) Customer segmentation c) Account management d) Lead management
A
ERP implementation includes 5 steps. Which of the following is the largest and most difficult? a) configure software b) deploy the system c) gain approval d) plan the program
A
Security attacks may come from protesters who seek to make a political point, instead of money. Their attacks may involve system infiltration, defacement of a website, or denial-of-service attacks. These groups are hackers are often referred to as: a. Hacktivists b. Black hat hackers c. White hat hackers d. Data harvesters
A
The "What is CRM" article talks about three roles that CRM plays in a customer-centric strategy. Which of the following is NOT among the three? a) Streamlines customer services via social media and offers rewards to motivate customers to refer their friends and family b) Centralizes all customer data into one database to give a 360 degree view of customers c) Automates customer-facing business processes to meet the needs of customers d) Supports a customer-centric strategy with clear goals and a vision of what makes a meaningful customer experience
A
There are many ways of installing ERP systems. The most difficult or risky approach is to cast off all legacy systems at once and install a single ERP system across the enterprise, like what Cisco did in 1990s. What is the name of this approach? a) The Big Bang b) Staged rollout c) Franchising d) Slam dunk
A
Which of the following is NOT a business value of ERP? a) It gives accounting and finance departments flexibility in choosing and customizing systems that best serve their needs b) It gives a global, real-time view of data that can enable companies to address concerns proactively and drive improvements c) It automates business operations such as order-to-fulfillment and procure-to-pay d) It improves financial compliance with regulatory standards and reduces risk
A
Which of the following is NOT a criterion necessary for a crowd to be "smart"? a) Send timely updates to all participants b) Be decentralized so that no one at the top dictates answers c) Have people work independently d) Offer a collective verdict that summarizes participant opinions
A
Which of the following is NOT a problem of data redundancy? a) It makes it hard to manage many-to-many relationships b) It is a waste of time to enter the same data repeatedly c) It increases the possibilities of error d) Updates or corrections have to be made to multiple row
A
Which of the following is NOT a reason that why some ERP projects fail? a) Internal security threats b) Inappropriate package selection c) Internal resistance d) Ineffective executive sponsor
A
Which of the following is an example of a foreign key (in the table structure provided)? a. The column named "Supplier ID" in the "Part" table b. The column named "Part ID" in the "Part" table c. The column named "Part Name" in the "Part" table d. The column named "Supplier Name" in the "Supplier" table
A
Which of the following statements is TRUE about microblogging? a) Their key use is to distribute time-sensitive information, run contests, provide customer support, track issues associated with firms or products. b) Their key use is to encourage positive content by Internet users to obtain earned media. c) Their key use is to share ideas, obtain feedback, and mobilize a community. d) Their key use is to poll a diverse crowd and aggregate opinions to form a forecast of an eventual outcome.
A
What is a CRM?
A business strategy designed to improve revenues and profitability, reduce costs and increase customer loyalty. A software brings together all information from different touch points throughout the company to allow a holistic view of each customer in real time. The art of managing good customer relationships and prospective customers. It is all about understanding who your customers and potential customers are, and nurturing the relationships you have with them.
Data Lake
A centralized storage repository that holds a massive amount of structured and unstructured data (e.g., chat logs, emails, image, of receipts or checks).
Routers (Definition)
A computing device that connects networks and exchanges data between them.
Database (Definition)
A database is a structured collection of records or data that is stored in a computer system (e.g., a relational database is a collection of tables)
Database Management System (DBMS)
A database management system (DBMS) is a program used to create, process, and administer a database
Service-Oriented Architecture
A development strategy or methodology that builds all the software assets in the company using the service-oriented programming methodology
Software as a service (Saas) (Definition)
A firm subscribes to a third-party software service delivered online
Distributed Computing (Definition)
A form of computing where systems in different locations communicate and collaborate to complete a task
What is Wisdom of Crowds?
A group of individuals, often consisting of untrained amateurs, will collectively have more insight than a single or small group of trained professionals
What is Churn?
A measure of the loss of customers during a period of time. Usually expressed as a percentage.
5) Consider a site like Kayak.com. You go online and specify where you want to travel and the webpage instantly lists flight schedules on multiple airlines and the fares that it obtains from dozens of airline and travel sites. Which of the following enables this kind of interoperable machine-to-machine interactions? a) Web Services b) Application Programming Interface c) Electronic Data Interchange d)Distributed Computing
A or C (Both Right)
Hadoop
A set of mostly open-source tools to manage massive amounts of unstructured data for storage, extraction, and computation Typically used for massive datasets Advantages: Flexibility Scalability Cost effectiveness Fault tolerance
Key Performance Indicators (KPI)
A set of quantifiable measurements used to assess a business' overall performance
Data Mart
A subset of a data warehouse which focuses on addressing the concerns of a specific problem or business unit (e.g., marketing and sales data marts)
Imitation-Resistant Value Chain (Definition)
A way of doing business that competitors struggle to replicate and that involves technology in a key enabling role.
Guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data, obtain postal charges between locations etc. are termed ______________ (acronym or three word phrase)
API or Application Programming Interface
What is a Sponsored Search?
Advertisers specify and purchase keywords with which they want to be associated with and ads are placed along with organic search results
Hypertext Transfer Protocol (HTTP) (Definition)
Allows Web browsers and Web servers to communicate with each other.
Programming Software (Definition)
An Integrated Development Environment or IDE to write code
Entity Relationship Diagram
An entity-relationship diagram is used to clarify table relationships in a relational database. The most important piece of information provided by an entity-relationship diagram is the manner in which two tables are related to each other.
Data Mining Relationship - Sequential Patterns
Anticipate patterns and trends
Enterprise Software (Definition)
Applications that address the needs of multiple users throughout an organization or work group.
What Predicts Social Media Minutes?
Autonomy - "the condition or quality of being self-governing or free from excessive external control" Self-esteem - "the regard or respect a person has for oneself" Self-control - "ability to control impulses, alter emotions and thoughts, and to interrupt undesired behavioral tendencies and refrain from acting on them"
Amazon has an affiliate model in which they pay content providers (e.g. review sites) a small cut every time a user purchases a product using the affiliate link. The pricing model of paying an affiliate site for referrals that lead to product purchase or signing up for a service is called: a) Cost-per-click b) Cost-per-action c) Cost-per-impression d)Cost-per-thousand-impressions
B
Amazon uses browsing records, purchase patterns, and product ratings to present a custom page featuring products that the customer may like and make it easier for customers to buy from than any other site. Which of the following powerful resources is BEST illustrated in this capability Amazon has? a) Switching costs b) Differentiation c) Economy of Scale d) Network effects
B
Dashboards often prominently feature quantifiable measurements used to assess a user's overall performance, so that they are salient to users . These are called: a. Analytic maturity indicators b. Key performance indicators c. Predictive analytic indicators d. Integrated performance indicators
B
Flickr.com is a platform where users can upload, access, organize, and share their photos) Users use keywords or tags to annotate and organize photos) This method of having users collaboratively create and manage tags to annotate and organize content is called: a) Mashups b) Folksonomy c) Crowdsourcing d)Really Simple Syndication
B
The Mobile Commerce reading talks about Starbucks' mobile app as a good example. Which of the following is NOT a feature of the mobile app? a) Customers can add funds to the loyalty card and use their phone to buy drinks at coffee shops b) Customers can use augmented reality functionality to check stores and the surroundings before their visit c) Customers can earn loyalty points on the go and exchange them for free refills or snacks d) Customers can use geolocation services to locate nearby stores quickly
B
What is the term used by the author to describe "a unit of cultural transmission or a unit of imitation" that spreads quickly online? o A) Pantomime o B) Meme o C) Satire oD) Astroturfing
B
Which of the following describes technologies that measure and analyze human body characteristics for identification or authentication purposes? a) encryption b) biometrics c) smart tags d) strong passwords
B
Which of the following describes the hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks? a) honeypots b) botnets c) zombots d) megabots
B
Which of the following describes the process of breaking data in a table down into a series of tables? a) Transaction b) Normalization c) Standardization d) Segmentation
B
Which of the following is NOT a sign of organizational readiness (or need) for ERP systems? a) Sales and the customer experience are suffering b) Lack of frequent communication from top executives c) Lots of different software for different processes d) No easy access to information about the business
B
Which of the following maps "howstuffworks.com" to IP addresses such as 70.42.251.42? a) Mashups b) Domain Name Service c) Uniform Resource Locator d)Internet Exchange Points
B
Which property ensures that once the transaction has completed execution, the updates and modifications to the database are stored in and written to disk and they persist even if a system failure occurs? a) Consistency b) Durability c) Isolation d) Atomicity
B
Which transaction rule is known as the 'All or nothing rule'? a) Consistency b) Atomicity c) Isolation d) Durability
B
What is Business Intelligence?
BI Tools to consolidate, analyze, and visualize vast amounts of data to provide insights to improve business operations BA Tools to predict future trends and outcomes so as to change the operations BI focuses on descriptive & diagnostic and BA focus on predictive & prescriptive
The FreshDirect example shows the relationship between information technologies and strategic positioning. Which of the following does NOT describe an advantage that FreshDirect enjoys through its novel use of technologies? Bargaining power with customers to charge a higher price than local stores Higher inventory turns (e.g., fresh seafood stock turns every day) Labor costs that are 60% lower than traditional grocery stores Energy savings because they don't have open-air refrigerators
Bargaining power with customers to charge a higher price than local stores
According to the resource-based view, which of the following does NOT characterize resources that are crucial to a firm's sustainable competitive advantage? Being not easily imitable Being rare Being open Being not easily substitutable
Being open
What are the ERP deployment strategies?
Big Bang: To cast off all legacy systems at once and install a single ERP system across the entire company Staged Rollout: To begin with a demonstration or a pilot installation in a particular business unit and then incorporate other units Slam Dunk: To focus on a few key processes contained in specific modules such as SAP financial or HR
Tableau
Business Intelligence tools such as Tableau can gather data from multiple resources, and allow users to explore relationships and create powerful, consolidated reports and charts
According to the "CRM Examples" article, which of the following is NOT a benefit of virtual banking with live assistance tools? a) Reducing the number of contacts required for assistance b) Boosting customer trust and satisfaction c) Delivering a consistent multi channel support experience d) Delivering a personalized banking experience
C
According to the readings, which of the following describes the two dramatic limitations the world puts on the traditional entertainment industry? a) Lack of real time information and the need to find a local audience b) Language barriers and geographic constraints c) The need to find local audiences and physical constraints (e.g. limited shelf space) d) Lack of demand and lack of real time information
C
Businesses can bid to be placed in the sponsored ads section through Google Ads. One factor that affects quality score is the number of users who clicked the ad divided by the number of times the ad was delivered, which is called: a) Cost per click b) Price per click c) Click through rate d)View through rate
C
Imagine you work in the marketing department of a large restaurant chain and have been asked to develop its Social Media Awareness and Response Team (SMART) initiative. Which of the following is NOT among the steps you should focus on? a) Establishing the social media presence of the business b) Monitoring social media activity inside and outside of the firm c) Removing negative customer word-of-mouth on social media platforms d)Establishing firm wide policies on employee use of social media at work
C
Regarding the wisdom of crowds, which of the following is NOT a condition necessary for a crowd to be "smart"? a) Offer a collective verdict that summarizes participants' opinions b) Be decentralized so that no one at the top dictates answers c) Send timely updates to all participants d)Have people provide inputs independently
C
Which of the following describes cybercriminals who infiltrate systems and collect data for illegal resale? a) information hoarders b) cash-out fraudsters c) data harvesters d) white hat hackers
C
Which of the following is FALSE about Customer Relationship Management? a) It's a software that brings together information from different departments to give one, holistic view of each customer in real time. b) It is a company-wide business strategy designed to improve revenue and profitability, reduce costs, and increase customer loyalty. c) It is based on an important business principle that all customers are created equal and shall be treated equally well. d) It can help businesses understand who their customers and potential customers are and nurturing relationships with them.
C
Which of the following is NOT a new rule that is crucial to electronic commerce? a) Use recommendations to drive demand down the long tail b) Make everything available to embrace niches c) Focus on selling products in the long tail with advertising d) Pull consumers down the tail with lower prices
C
Which of the following is NOT a potential benefit of ERP projects? a) better decision making through shared data and collaboration b) improved efficiency and reduced time to complete business processes c) continuous data and system customization d) centralized database that is easier to secure
C
Platform as a service (PaaS) (Definition)
Cloud providers offer services for customers to build their own applications on the provider's infrastructure. Services include hardware, operating system, tools, and hosting.
Infrastructure as a service (IaaS) (Definition)
Cloud providers offer services that include running the remote hardware, storage, and networking. Client firms can choose the software used
Benefits of a Dashboard
Communicate key strategies continuously by tailoring metrics to employees based on roles and levels Monitor and adjust the execution of the strategy and plans on an hourly, daily, or monthly basis Deliver insights and information using graphical symbols, colors, and charts
What is Link Fraud?
Creating a series of bogus websites, all linking back to the pages one is trying to promote
According to the Long Tail video we watched in class, Barnes and Noble carried 100K books while Amazon had 3.7 million. Blockbuster carried 3K DVDs while Netflix had 60K. Which of the following statements is True? a) E-commerce businesses are only good at helping customers find hit items b) Traditional businesses have enough space to carry both hits and misses c) E-commerce businesses are constrained by geography just like traditional businesses d) Traditional businesses do not sell an item unless they can find a sizable local audience
D
Social media policies should revolve around three Rs. Which of the following is NOT among the three Rs? a) Responsibility b) Respect c) Representation d) Reputation
D
Sometimes, as part of their search engine optimization efforts, businesses may create a series of fake websites and link back to the pages they try to promote) This malpractice is called: a) Link fraud b) Link farming c) Spamdexing d)All of the above
D
The "CRM Examples" article talks about three key areas of good customer relationship management. Which of the following is NOT among the three? a) Growth in customer retention rates b) High levels of customer satisfaction c) Results in good customer experience d) Increases in social referrals by existing customers
D
The Mobile Commerce reading talks about 5 examples of outstanding mobile commerce applications. One of the examples is Sephora, an international cosmetic and beauty retailer. Which of the following best describes Sephora's mobile app? a) Simple interface with powerful features b) Smoothly integrated with the loyalty program to connect with target audience c) Offers a unique recommendation engine that transforms shopping experiences d) Offers customers a great omnichannel experience
D
There is now a large number of firms offering tracking and monitoring mentions of a client firm's name on social media platforms to identify sentiment trends and provide early warnings regarding positive and negative mentions gaining traction. These services are termed: a) Earned Media Marketing b) Really Simple Syndication c) Collaborative Consumption d)Online Reputation Management
D
What is the main goal of bad actors who spread disinformation, according to the author? o A) To make money from online advertising. o B) To have political influence, either foreign or domestic. o C) To cause trouble for the sake of it. o D) All of the above.
D
What type of relationship is it when, for any one entity, there are many examples of another entity? a) One-to-one relationship b) Many-to-many relationship c) One-to-two relationship d) One-to-many relationship
D
Which of the following describes an ERP system? a) information systems designed to support business processes in a particular functional area like finance b) the art and science that improves the way a company finds the raw materials to make a product or service and deliver it to its customers c) systems designed to summarize and report on a company's basic operations d) a system of integrated software applications that standardize, streamline, and integrate business processes across multiple functional areas
D
Which of the following describes someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities? a) hacktivist b) ethical cyber criminal c) data harvester d) white hat hacker
D
Which of the following is FALSE about blogs? a) It is an online publication with entries in reverse chronological order b) Both current and archived blog posts can be searched c) Businesses can use blogs to market products, gather feedback, and manage reputation d) Blogs are one-way communication tool for bloggers to share thoughts and opinions
D
Which of the following is NOT a reason why conventional businesses only sell popular products (blockbusters in videos and best sellers in books)? a) Brick-and-mortar stores do not draw enough demand from local customers for long tail products b) Their business model is limited by resource scarcity c) There is not enough shelf space for the long tail products d) They can negotiate better prices for popular products with their suppliers
D
Which of the following is TRUE about web search and Internet marketing? a) PageRank is a search algorithm that is well studied and understood for the purpose of search engine optimization b) Businesses can pay Google for their webpages to be indexed and ranked high among Google's organic search results c) Search engine marketing requires businesses to develop their own web spiders d)Content creators (like Mad World News) are paid by platforms like Google based on the traffic generated by their content.
D
Which of the following is TRUE about web search and Internet marketing? a) PageRank is a search algorithm that is well studied and understood for the purpose of search engine optimization b) Businesses can pay Google for their webpages to be indexed and ranked high among Google's organic search results c) Search engine marketing requires businesses to develop their own web spiders d)pay per view is the pricing model through which websites like Facebook pay content creators
D
Which of the following is TRUE? a) Ad quality is an estimate of the experience that users will have when they come to the landing page. b) Higher ad quality generally leads to better ad positions and lower cost. c) The ad quality score varies with the context of the search. d) All the above (a, b and c) e) Only a and b
D
Which of the following statements is TRUE for the term encryption? a) it refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. b) it refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software c) it refers to highly restrictive programs that permit communication only with approved entities or in an approved manner. d) it refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key
D
Which type of media are Advertisement and sponsorships? a) Earned media b) Rich media c) Owned media d) Paid media
D
A __________________ is a device that acts like a phonebook on the Internet to identify the source and destination of packets.
DNS (domain name server)
Enterprise Data Warehouse
Data warehousing is a technology that aggregates huge amounts of structured data, from multiple sources, to be queried and analyzed for business intelligence
Unstructured Decisions (Top of Pyramid)
Decision maker must provide judgment, evaluation, and insight to solve problem
Two Types of Click Fraud?
Depleting click fraud - clicking a rival's ads to exhaust their CPC advertising budget Enriching click fraud - when site operators generated bogus ad clicks to earn CPC income.
Applications (Definition)
Desktop applications, enterprise software, utilities, and other programs that perform specific tasks for users and organizations.
Action of originator who altered a video of Nancy Pelosi slowing it to make her seem drunk is ________________
Disinformation
content that is intentionally false and designed to cause harm is _______________
Disinformation
__________ __________ describes systems in different locations communicating and collaborating to complete business processes or tasks.
Distributed Computing
Data Mining Relationship - Clusters
Grouping Data according to logical relationships or consumer preferences.
Data Mining Relationship - Associations
Grouping Data to Form Associations - If then Statements that give the frequency and confidence levels of associations.
What is Cloud Computing?
Hardware and software exists "in the cloud," meaning somewhere on the Internet You only pay for the amount of processing, storage, and telecommunications used.
Internet Backbone (Definition)
High-speed data lines that interconnect and collectively form the core of the Internet.
Set of four numbers used to identify individual nodes on the Internet is ________________
IP Address
Uniform Resource Locator (URL) (Definition)
Identifies resources on the internet along with the application protocol needed to retrieve it. Often used interchangeably with "Web address."
SEO: Three Elements?
Indexability, Relevance, Authoritativeness
Domain Name Service (DNS) (Definition)
Internet directory service that allows devices and services to be named and discoverable (The Internet's Phonebook)
What are the key features and business use of a Wiki?
Key Features: Attributed edits, revision history, monitoring, searchable Business Use: Collaboration on common tasks or to create common knowledge base, improve meeting efficiency (Pixar), Cross-functional collaboration on projects (SONY)
What are the key features and business use of Electronic Social Networks?
Key Features: Feeds, profile pages, group affiliations, private messaging, media sharing Business Use: Networks for alumni, Locate expertise and organize groups
What are the key features and business use of a Blog?
Key Features: Immediate and unfiltered publication, reverse chronology, searchable, tags, Business Use: Sharing ideas, gathering feedback, press response
Local Area Network (LAN) (Definition)
Local Area Network (LAN) is a computer network covering a small physical area
Genuine information publicized and shared with an intent to cause harm is _________________
Malinformation
content that is false shared by a person who does not realize it is false or misleading ______________
Misinformation
Dashboards
Multilayered performance management systems, built on a business intelligence and data integration infrastructure, that enable organizations to measure, monitor, and manage business activity using financial and non-financial measures
Normalization
Normalization is the process of converting a poorly structured table into two or more well-structured tables to eliminate data redundancy.
Semi-Structured Decisions (Middle of Pyramid)
Only part of problem has clear-cut answer provided by accepted procedure
Internet Service Providers (ISP) (Definition)
Organizations or firms that provide access to the Internet.
Operational effectiveness refers to: Copying rival's strategies to reduce operational costs Copying rival's operations and business processes Performing the same tasks better than rivals perform them Performing different activities from those of rivals, or the same activities in a different way.
Performing the same tasks better than rivals perform them
How does the Internet typically influence price transparency and information asymmetry? Both price transparency and information asymmetry decrease Price transparency decreases while information asymmetry increases Price transparency increases while information asymmetry decreases Both price transparency and information asymmetry increase
Price transparency increases while information asymmetry decreases
Six IT Ethics Decisions
Privacy as embedded in Human rights - View privacy as human rights - "Omnibus" privacy bills - Federal privacy bureau with proactive power Privacy as embedded in Contracts - View privacy as negotiated contractually - "Sectoral" laws (legal liabilities defined for medical, credit card, video rental records) - Rely on self-help and voluntary control models
What is the Network Effects
Product or service becomes more valuable as more people use it. Ex: Facebook, Phones, etc.
Application Programming Interface (API) (Definition)
Programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data
Canned Reports
Provide regular summaries of information in a predetermined format.
Ad Hoc Reporting Tools
Puts users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters.
Information Ethics (Definition)
Refers to a form of theory or philosophy that can be applied to examine moral and ethical problems that can arise in IS/IT decisions.
Structured Decision (Bottom of Pyramid)
Repetitive and routine, involve definite procedure for handling so they are not treated each time as new
IP (Internet Protocol) (Definition)
Routing protocol that is in charge of forwarding packets on the internet.
What is Search Engine Marketing?
Search Engine Marketing (SEM) is the practice of designing, running and optimizing search engine ad campaigns
What is Search Engine Optimization?
Search Engine Optimization (SEO) is the process of improving a page's ranking among organic search results.
What is a Service?
Services are software chunks or components constructed so that they can be easily linked with other software components
Value Chain (Definition)
Set of activities through which a product or service is created and delivered to customers. Five primary components of the value chain: - Inbound logistics - Operations - Outbound logistics - Marketing and sales - Support
Web Services (Definition)
Small pieces of code that are accessed via the application server that permit interoperable machine-to-machine interactions over a network.
Operating System (OS) (Definition)
Software that controls the computer hardware and establishes standards for developing and executing applications.
The Theory of Stakeholder (Definition)
Stakeholders are anyone with a stake or claim on the firm such as stockholders, customers, employees, suppliers, and the local community - Respect the rights of each stakeholder - Give equal consideration to the legitimate interests of all stakeholders and to adopt corporate policies that produce the optimal balance among them - Stakeholders' rights are viewed as "trump cards" that override other consideration of interests.
Data Mining Relationship - Classes
Stored data is used to locate data in predetermined groups.
Profiling, Online ad targeting - Geotargeting, Demographic/Ethnic /interest/affiliation (Definition)
Superior targeting of ads online vs. offline, The ability of online advertisers to use IP addresses to target potential customers who live in certain geographic locations/age/demography/interests/affiliations, slippery slope in profiling, targeting
Amdahl's Law (Definition)
System's speed is determined by its slowest component.
Where do biases in AI come from?
Systems learn to make decisions based on training data, which can include biased human decisions or reflect historical or social inequities
Online Analytical Processing (OLAP)
Takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube.
Cache (Definition)
Temporary storage space used to speed computing tasks
Click fraud (Definition)
The act of clicking on competitors' ads to exhaust and waste their advertising money or clicking on ads to generate revenue
PageRank algorithm (Definition)
The algorithm used by Google to rank web pages based on page quality and quantity of incoming links
Mashups (Definition)
The applications that combine data from different sources into a single integrated view
Relational Databases
The basic data structure is a table with the rows representing entities (e.g., a customer) and the columns representing the various attributes of the entity (e.g., name, address, and email address)
Cloud computing (Definition)
The delivery of computing services over the Internet, such as infrastructure as a service, platform as a service, and software as a service
Peer production (Definition)
The form of collaboration between users to create content 1
Negative keywords (Definition)
The keywords that can be used to exclude certain search queries from triggering an ad
The Theory of Stockholder (Definition)
The managerial obligation is to maximize the financial returns of the stockholders, with two constraints and one assumption: - Through legal, non-deceptive means - To have a long-term orientation - Pursuing profits also promotes the interests of the society
Hardware/software layer cake (Definition)
The model that describes the components of a computer system from hardware to user interface
Long Tail (Definition)
The phenomenon that describes the large number of niche products or services that collectively make up a significant market share. Traditional limitations of physical constraints overcome.
Sharing economy, Collaborative Consumption (Definition)
The phenomenon that enables people to share access to goods and services through online platforms
Internet Search, Advertising, Search engine optimization, Search Engine Marketing (Definition)
The practice of improving the ranking of a webpage among organic search results
Crowdsourcing (Definition)
The practice of obtaining services, ideas, or content from a large group of people online
Moore's Law (Definition)
The prediction that computing power will double every two years
Virtualization (Definition)
The process that mimics the functions of physical hardware to allow a single computer to function as if it were several different computers
Application Programming Interface (Definition)
The set of rules and specifications that allow software components to communicate with each other
Key Distinction between Stockholder and Stakeholder Theory?
The stockholder theory sees all parties except stockholders as means to the end of profitability. The stakeholder theory sees all stakeholders as ends in themselves.
What is the Internet of Things? (IOT)
The trend of including low-cost sensors and smart processing in a wide array of products and our environment
The set of interrelated activities that create and bring products or services to customers including inbound logistics, operations, outbound logistics, marketing, sales, and customer support is called: The distribution channel The value chain The business process The supply chain
The value chain
What is The Web Spider?
The web spider (or crawler) is an automated script a search engine sends to the Internet to travel through web pages via page links and sends back content to be indexed.
Users' actions to share content without verifying it is central to the spread of disinformation (True/False)
True
Simple Mail Transfer Protocol (SMTP) (Definition)
Used for e-mail communication
File Transfer Protocol (FTP) (Definition)
Used to copy files from one computer to another
What are the Four V's of Big Data?
Volume, Velocity, Variety, Veracity
TCP (Transmission Control Protocol) (Definition)
Works at both ends of internet communication to ensure a perfect copy of a message is sent.
Server (Definition)
a program or computer that fulfills the requests of a client
Client (Definition)
a program or computer that makes requests of a server program or computer
Google's display of an ad for a hamburger chain on a site related to vegan recipes is an illustration of the ____________ problem for the advertiser.
content adjacency
The Five Domains of Digital Transformation
customers, competition, data, innovation, value