Definition 1 of 153
Subsidized adoption created completmentary goods and services
exxon
amazon
e-commerce
ebay
Definition 2 of 153
The central processing unit that is generally made from a single integrated circuit.
Microprocessor
Software
Central Processing Unit (cpu)
Motherboard
Definition 3 of 153
uses AI techniques to enable computers to generate and understand natural human
languages, such as English
natural language processing
speech recognition
data mining
cloud computing
,Definition 4 of 153
A classification of software that monitors trends among customers and uses this data to
personalize an individual customer's experience.
cloud computing
viral marketing
collaborative filtering
crowdsourcing
Definition 5 of 153
planning and coordinating the movement of products along the supply chain, from the raw
materials to the final consumers
Open Source Software (oss)
Database Management System (dbms)
Search Engine Marketing (sem)
Supply Chain Management (SCM)
Definition 6 of 153
is a security threat that combines the characteristics of computer viruses, worms, and other
malicious codes with vulnerabilities found on public and private networks.
blended threat
trojan horse
virus
malware
,Definition 7 of 153
Decide how to decide up front
Challenge information given
Do your own analysis
Think about how you are going to make the decision
Switching costs
Debias framing effect
Financial modeling
Depleting fraud
Definition 8 of 153
An overcrowding; a clogging
hyperemia
convergence
pollution
congestion
Definition 9 of 153
An attacker issues a SQL command to a web server as part of the URL or as input to a form on
a company's website; web server might pass the command onto the database which then
allows potentially anything to be done to the database
Phishing
Trojan Horse
Cross-site Scripting
SQL Injection
, Definition 10 of 153
information technology, statistics, and business knowledge.
A successful marketing team requires only creativity and design skills
An effective sales team needs strong negotiation and persuasion abilities
A proficient software development team should focus solely on coding languages
A competent business analytics team should possess three critical skills
Definition 11 of 153
Type of secondary storage that users magnets to read and store data. Examples include
floppy disks and hard disks.
Volatile Memory
Quantum Mechanics
Cloud Computing
Magnetic Storage
Definition 12 of 153
Software that is free and whose code can be accessed and potentially modified by anyone.
Software as a service (saas)
Open System Software (oss)
Open Source Software (OSS)
Html (hypertext Markup language)
Definition 13 of 153
using spyware to record a user's keystrokes
Trojan Horse
Keylogger
Malware
Phishing
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller selftest. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.00. You're not tied to anything after your purchase.