MIS 301 Final Flashcards

1
Q

raw facts and figures

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data presented in a context so that it can answer a question or support decision making

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

insight derived from experience and expertise

A

knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a single table or collection of related tables

A

database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sometimes referred to as database software; software for creating maintaining and manipulating data

A

database management systems (DBMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

language used to create and manipulate databases

A

structured query language (SQL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

job title focused on directing, performing or overseeing activities associated with a database or a set of databases. these may include (but not necessarily be limited to ) data base design , creation, implementation, maintenance, backup, and recovery, policy setting and enforcement and security

A

database administrator (DBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a list of data arranged in columns (fields) and rows (records)

A

table or file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

represent each category of data contained in a record, first name, last name

A

column or field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

row or record

A

row or record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

most common standard for expressing databases, whereby tables (files) are related based on common keys

A

relational databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a type of cloud computing where a third party vendor manages servers, replications, fault tolerance, computing scalability, and certain aspects of security, freeing software developers to focus on building “business solutions” and eliminating the need to spend time and resources managing the technology complexity of much of the underlying “IT solution”

A

serverless computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

query tools

A

query tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a general purpose programming language that is also popular for data analytics

A

python

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

allow a user to create a query through a point-and-click or drag-and-drop interface, rather than requiring programming knowledge

A

graphical query tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

reports that provide regular summaries of information in predetermined format

A

canned reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

tools that put users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions and other parameters

A

ad hoc reporting tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a heads up display of critical indicators that allow managers to get a graphical glance at key performance metrics

A

dashboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

graphical representation of data and information

A

data visualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

process of using computers to identify hidden patterns in and to build models from, large datasets

tasks:
association rules

classifications

regressions

cluster analysis

A

data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

build model with so many variables that the solutions arrived at might only on the subset of data you’ve used to create it

A

over-engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

the global mapping of users and organizations and how they are connected

A

social graph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

also know as Metcalfe’s Law or network externalities. When value of a product or service increases as its numbers of users expands

A

network effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the cost a consumer incurs when moving from one product to another. It can involve actual money spent as well as investments in time, any data loss and so forth

A

switching costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

a strategy whereby a firm with a significant customer base ads a feature to an existing product or service and elimiantes the need for any rival, stand-alone platforms. Think apple adding video to cameras and crushing the Flip cam market

A

envelopment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Internet content that can’t be indexed by Google and other search engines

A

deep web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  • Facebook has overlap with mobile and desktop
  • Mobile weaves deeper into hte lives of its users
  • Use users address book
  • Easier to share photos
  • Notifications
  • Icon with a constant visual reminder on the home screen
  • Authentication with sign-in
A

Why mobile is different and in some ways better than the desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Instagram
Oculus VR
WhatsApp

A

Facebook acquisitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receiving data. For example, amazon.com provides APIs to let developers write their own applications and websites that can send the firm orders

A

APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

when others take advantage of a user or service without providing any sort of reciprocal benefit

A

free rider problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

a closed network or single set of services controlled by one dominant firm

A

colassal walled garden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

search engine results returned and ranked according to relevance

A

organic or natural search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

algorithm developed by Google co-founder Larry PAge to rank websites

A

PageRank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

process of improving a page’s organic search rankings

A

search engine optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

also called “spamdexing” or “link farming” the process of creating a series of bogus websites, all linking back to the pages one is trying to promote

A

link fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

practice of designing, running, and optimizing search engine ad campaigns

A

search engine marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

advertisements that are targeted based on a user’s query

A

keyword advertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

a concept where advertisers don’t pay unless someon clicks on their ad

A

pay-per-click

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

a measurement of ad performance (CTR) and ad relevance, and landing page experience. Ads that are seen as relevant and that consumers respond to have higher quality scores, the firm uses quality score multiplied by the maximum CPC to determine an ad’s display ranking

A

quality score

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

number of users who clicked an ad divided by the number of times the ad was delivered ( the impressions) The CTR measures the percentage of people who clicked on an ad to arrive at a destination site

A

click-through rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

web page displayed when a user clicks on an advertisement

A

landing page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

ads are generated automatically based on the content of a website. Dynamic ads are particularly useful for firms with rapidly updating inventory or firms struggling to keep up with new search terms that may be relevant to their product lines

A

dynamic search ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

a link that takes a useser to a specific webpage (rather than the home page) or which launches an app and bring up a unique location rather than just launching the app. As an example, a deep link from Pinterest might take a user directly to the Etsy web page or app listing featuring the vendor of that item, rather than generically open Etsy.com

A

deep linking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

: an effort that links advertisers to websites and other content providers (app firms, games) that are willing to host advertisements, typically in exchange for payments

A

ad network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Bad apples
Social engineering
Phishing
Passwords

A

user and administrator threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

phishing

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

malware - malicious software that seeks to compromise a computing system without permission
Viruses, worms, trojans

A

technology threats

48
Q

an acronym standing for completely automated public Turing test to tell all computers and humans apart. Turing test is an idea (not an official test) that one can create a test to tell computers apart from humans

A

CAPTCHAs

49
Q

combining through trash to identify valuable assets

A

dumpster diving

50
Q

gaining compromising information through observation (as in looking over someone’s shoulder)

A

shoulder surfing

51
Q

the physical components of information technology, which can include the computer itself plus peripherals such as storage devices, input devices like the mouse and keyboard, output devices like monitors and printers, networking equipment and so on

A

computing hardware

52
Q

a computer program or a collective of programs. It is precise set of instructions that tells hardware what to do

A

software

53
Q

software that controls hardware and establishes standards for developing and executing applications

A

operating systems

54
Q

includes desktop applications, enterprise software, utilities, and other programs that perform specific tasks for users and organizations

A

applications

55
Q

products and services that allow for development and integration of software products and other complimentary goods. Window, IOS, Android and the standards that allow users to create facebook apps are all platforms

A

platforms

56
Q

applications installed on a personal computer, typically supporting task performed by a single user

A

desktop software

57
Q

applications that address the needs of multiple users throughout an organization or work group

A

enterprise software

58
Q

a software product offered commercially by a third party

A

software package

59
Q

a software package that integrates the many functions (accounting, finance, inventory management, HR) of a business

A

enterprise resource planning (ERP)

60
Q

systems used to support customer-related sales and marketing activities

A

customer relationship management (CRM)

61
Q

Business intelligence systems (BI)

A

business intelligence systems (BI)

62
Q

sometimes referred to as database software; software for creating, maintaining, and manipulating data

A

database management system (DBMS)

63
Q

a form of computing where systems in different locations communicate and collaborate to complete a task

A

distributed computing

64
Q

a program that fulfills the request of a client

A

server

65
Q

a software program that makes requests of a server program

A

client

66
Q

software that houses and serves business logic for use (and reuse) by multiple applications

A

application server

67
Q

small pieces of code that are accessed via the application server, and permit interoperable machine-to-machine interactions over network

A

web services

68
Q

robust set of web services that built around an organization’s processes and procedures

A

service-oriented architecture (SOA)

69
Q

a set of standards for exchanging messages containing formatted data between computer applications

A

EDI (electronic data interchange)

70
Q

a tagging language that can be used to identify data fields made available for use by other applications. Most APIs and web services send messages where the data exchanged is wrapped in identifying XML tags

A

Extensible markup language (XML)

71
Q

open source software operating system

A

linux

72
Q

also known as “hardened” term used to describe technology products that contain particularly strong security features

A

security focused

73
Q

: ability to either handle increasing workloads or to be easily expanded to manage workload increases. In a software context, systems that aren’t scalable often require significant rewrites or the purchase or development of entirely new systems

A

scalability

74
Q

a negotiated agreement between the consumer and the vendor, SLA may specify the levels of availability, serviceability, performance, operation, or other commitment requirements

A

service level agreements (SLA)

75
Q

sometimes referred to as vertical markets, products and services designed to target a specific industry (eg, pharmaceutical, legal, apparel, retail)

A

vertical niches

76
Q

Require network connection
Forced to adopt new versions to keep up with SaaS
Less flexible than installed software counterparts
Greater consumerization of technology

A

SaaS risks

77
Q

Linux
Apache
MySQL
PHP/Python

A

Much of what powers the site isopen source software (OSS).

78
Q

Login where it lets you sign in using Facebook, google. orApple

A

API Example

78
Q

GNU general public license agreement

  • Open Office (a Microsoft Office look-alike)
  • Firefox (a browser)
  • MySQL (a DBMS)
  • Apache (a Web server)
  • Ubuntu (a Windows-like desktop operating system)
  • Android (a mobile-device operating system)
  • Cassandra (a NoSQL DBMS)
  • Hadoop (a BigData processing system)
A

What open source software do you use?

79
Q

Facebook’s A/B testing, makes assumptions about people

A

Facebook’s personality test

80
Q

relationship status

parents together at age 21

smokes

drinks alcohol

uses drugs

caucasion/aa

Christianity or Islam

dem or republican

gay
lesbian
gender

A

things Facebook can figure out through likes

81
Q

Designing, running and optimizing search-engine ad campaigns.

A

SEM

82
Q

Advertisements targeted based on a user’s query.

A

key work advertising

83
Q

Process of improving a page’s organic search results.

A

SEO

84
Q

Creating a series of bogus websites, all linking back to the pages one is trying to promote

A

link fraud

85
Q

34% of clicks go to the top organic resultabout 17% goes to number two.
Danger of outsourcing SEO

A

JC Penny & BMW busted by google

86
Q

(cost-per-click) an advertiser is willing to pay.

A

maximum CPC

87
Q

Relevance of an ad’s text to the user’s query.

A

Click-through rate

88
Q

Ad Rank = f (Maximum CPC, Quality Score, expected impact of extensions and formats)

A

formula

89
Q

(retargeting): Shows custom targeted ads to a user when visiting other sites if the user has already visited a given page on the advertiser’s site

A

remarketing

90
Q

Line of identifying text, assigned and retrieved by a given Web server and stored by one’s browser.

Server:Have I seen you before?

Browser:No.

Server:Then take this unique string of numbers and letters (called a). I’ll use it to recognize you from now on.

A

cookies

91
Q

IP address
Type of browser used.
Computer type and its operating system.

A

customer profiling and behavioral targeting

92
Q

The company can collect personal information until the customer specifically requests the data not be collected

A

opt-out model (default is in)

93
Q

Prohibit an organization from collecting any personal information unless the customer specifically authorizes it

A

opt-in model (default is out)

94
Q

Pros

Lower costs and financial risk mitigation.

Scalable systems.

Ability to instantly deploy bug fixes and product enhancements.

Cons

Dependence on a single vendor

users may be forced to migrate to new versions

reliance on a network connection, which may be slower, less stable and less secure

A

Pros & Cons of adopting SaaS

95
Q

echnology that you can use to create virtual representations of servers, storage, networks, and other physical machines.

A

virtualization

96
Q

We want to implement something new:

How much code the company need or want to write?

How will the company pay for the application?

Where will the application run?

Write the software from scratch
Purchase a prewritten application
Use application service providers and SaaS vendors
Use open-source software
Use outsourcing (hire someone else to write the application)

A

Make, buy or rent

97
Q

user

application (Micro Office)

Operating system ( Micro Windows)

Hardware

A

hardware/software layers

98
Q

Physical components of information technology, which includes the computer and the following peripherals:
Storage devices
Input devices
Output devices
Software: Computer program or collection of programs.
operating system
applications

A

computing harware

99
Q

a website that takes different contents from a number of other websites and mixes them together

A

mashup

100
Q

Most SaaS firms earn money via a usage-based pricing model similar to a monthly subscription.

Other SaaS firms:

Offer free services that are supported by advertising.
Promote the sale of upgraded or premium versions for additional fees.

A

Why buy when you can rent?

101
Q

Identifies resources on the internet along with the application protocol needed to retrieve it.
protocol: Enables communication by defining the format of data and rules for exchange.
hypertext transfer protocol (HTTP)
simple mail transfer protocol (SMTP)
File Transfer Protocol (FTP)

A

URL (uniform resource leaders)

102
Q

Pay a registrar for the right to use that name.
The right is renewable over time.
Some simply register domain names while others are able to run a website on their Internet-connected servers for a fee.
Web hosting services: A firm that provides hardware and servers to run the websites of others.

A

how to buy a domain

103
Q

Using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else
E.g. a dispute betweenMicrosoftand aCanadianstudent named Mike Rowe over thedomain name”MikeRoweSoft.com”

A

cybersquatting

104
Q

Competition over domain names: the closer the domain name matches the company’s name, the easier the company is to locate
www.ua.com United Airline? or Under Armor?

A

domain names

105
Q

Works at both ends of internet communication to ensure a perfect copy of a message is sent.

A

TCP (transmission control protocol

106
Q

Operates instead of a TCP in applications where delivery speed is important and quality can be sacrificed.
VoIP (voice over Internet protocol): Enable

A

UDP (user datagram protocal

107
Q

authentication ( Who are you)
confirm identity

Authorization (What can you do)
determine which actions rights or privelges the person has based on verified identity

A

authorization vs authentification

108
Q

Internet directory service that allows devices and services to be named and discoverable.

A

DNS (domain name service)

109
Q

data: organized, an elemtary descriptions

Information: convey understanding experience

Knowledge: accummulated elaring and experties

A

data, information, knowledge

110
Q

refers to information that does not have a pre-defineddata modelor is not organized in a pre-defined manner

70-80% of the data in the world

A

unstructured data

111
Q

A column or a combination of columns that uniquely identifies each row in a table
Simple key (single field) / composite key (more than one field)

Guarantees that all rows are unique

We often create a primary key to insure uniqueness (e.g., StudentID, CustomerID, stock-keeping unit (SKU))

A

primary key

112
Q

A column or a combination of columns that serves as the primary key of another table in the database

Represents the relationship between two tables

A

foreign key

113
Q

Determines which behaviors/outcomes go together

Examples
Market basket analysis: determine what things go together in a shopping cart at the supermarket.
People who buy cat food also buy kitty litter with probability P.

cross-sell opportunities

A

association rules

114
Q

Examine the features of a newly presented instance (e.g., customer) and assigning it to one of a predefined set of categories

Goal: to build a model that can be applied to unclassified data in order to classify it

Examples
Voice Recognition
Hand-writing Recognition
Classify credit applicants as low, medium, or high risk
Classify customers as “loyal” vs. “likely to terminate contract”
Approve a loan or not

A

classification