MIS 301 Final Flashcards
raw facts and figures
data
data presented in a context so that it can answer a question or support decision making
information
insight derived from experience and expertise
knowledge
a single table or collection of related tables
database
sometimes referred to as database software; software for creating maintaining and manipulating data
database management systems (DBMS)
language used to create and manipulate databases
structured query language (SQL)
job title focused on directing, performing or overseeing activities associated with a database or a set of databases. these may include (but not necessarily be limited to ) data base design , creation, implementation, maintenance, backup, and recovery, policy setting and enforcement and security
database administrator (DBA)
a list of data arranged in columns (fields) and rows (records)
table or file
represent each category of data contained in a record, first name, last name
column or field
row or record
row or record
most common standard for expressing databases, whereby tables (files) are related based on common keys
relational databases
a type of cloud computing where a third party vendor manages servers, replications, fault tolerance, computing scalability, and certain aspects of security, freeing software developers to focus on building “business solutions” and eliminating the need to spend time and resources managing the technology complexity of much of the underlying “IT solution”
serverless computing
query tools
query tool
a general purpose programming language that is also popular for data analytics
python
allow a user to create a query through a point-and-click or drag-and-drop interface, rather than requiring programming knowledge
graphical query tools
reports that provide regular summaries of information in predetermined format
canned reports
tools that put users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions and other parameters
ad hoc reporting tools
a heads up display of critical indicators that allow managers to get a graphical glance at key performance metrics
dashboards
graphical representation of data and information
data visualization
process of using computers to identify hidden patterns in and to build models from, large datasets
tasks:
association rules
classifications
regressions
cluster analysis
data mining
build model with so many variables that the solutions arrived at might only on the subset of data you’ve used to create it
over-engineer
the global mapping of users and organizations and how they are connected
social graph
also know as Metcalfe’s Law or network externalities. When value of a product or service increases as its numbers of users expands
network effects
the cost a consumer incurs when moving from one product to another. It can involve actual money spent as well as investments in time, any data loss and so forth
switching costs
a strategy whereby a firm with a significant customer base ads a feature to an existing product or service and elimiantes the need for any rival, stand-alone platforms. Think apple adding video to cameras and crushing the Flip cam market
envelopment
Internet content that can’t be indexed by Google and other search engines
deep web
- Facebook has overlap with mobile and desktop
- Mobile weaves deeper into hte lives of its users
- Use users address book
- Easier to share photos
- Notifications
- Icon with a constant visual reminder on the home screen
- Authentication with sign-in
Why mobile is different and in some ways better than the desktop
Instagram
Oculus VR
WhatsApp
Facebook acquisitions
Programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receiving data. For example, amazon.com provides APIs to let developers write their own applications and websites that can send the firm orders
APIs
when others take advantage of a user or service without providing any sort of reciprocal benefit
free rider problem
a closed network or single set of services controlled by one dominant firm
colassal walled garden
search engine results returned and ranked according to relevance
organic or natural search
algorithm developed by Google co-founder Larry PAge to rank websites
PageRank
process of improving a page’s organic search rankings
search engine optimization
also called “spamdexing” or “link farming” the process of creating a series of bogus websites, all linking back to the pages one is trying to promote
link fraud
practice of designing, running, and optimizing search engine ad campaigns
search engine marketing
advertisements that are targeted based on a user’s query
keyword advertising
a concept where advertisers don’t pay unless someon clicks on their ad
pay-per-click
a measurement of ad performance (CTR) and ad relevance, and landing page experience. Ads that are seen as relevant and that consumers respond to have higher quality scores, the firm uses quality score multiplied by the maximum CPC to determine an ad’s display ranking
quality score
number of users who clicked an ad divided by the number of times the ad was delivered ( the impressions) The CTR measures the percentage of people who clicked on an ad to arrive at a destination site
click-through rate
web page displayed when a user clicks on an advertisement
landing page
ads are generated automatically based on the content of a website. Dynamic ads are particularly useful for firms with rapidly updating inventory or firms struggling to keep up with new search terms that may be relevant to their product lines
dynamic search ads
a link that takes a useser to a specific webpage (rather than the home page) or which launches an app and bring up a unique location rather than just launching the app. As an example, a deep link from Pinterest might take a user directly to the Etsy web page or app listing featuring the vendor of that item, rather than generically open Etsy.com
deep linking
: an effort that links advertisers to websites and other content providers (app firms, games) that are willing to host advertisements, typically in exchange for payments
ad network
Bad apples
Social engineering
Phishing
Passwords
user and administrator threats
phishing
phishing