BA325 Spring 2017
Across
- 3. small file deposited on a hard drive when a user visits a website
- 4. Storage Area Network
- 5. set of interrelated components that collect, retrieve, process, store, and distribute information to business operations, innovation, and decision making
- 7. software applications (e.g. data mining, online analytical processing, querying, reporting) used to analyze an organization's raw data
- 10. technology platforms that combine machine learning, reasoning, natural language processing, speech, vision, and human computer interaction to mimic the function of the human brain and help to improve human decision making
- 12. attempting to obtain sensitive information (e.g. credit card info) for malicious reasons by disguising as a trustworthy entity in an electronic communication
- 13. company website accessible only to authorized vendors/suppliers
- 14. Customer Relationship Management
- 17. Total Cost of Ownership
- 19. one trillion bytes of data
- 20. Service Level Agreement
- 21. computer speed of one trillion floating point operations per second
- 23. process of streamlining complex data to minimize redundancy, simplify relationships, and increasing stability and flexibility
- 25. Decision Support System
- 26. cloud-based ERP software provider to the distribution, retail, manufacturing, and service industries
- 27. internal network based on Internet standards
- 29. free Cloud-based collaboration software suite
- 30. Public Key Infrastructure
- 33. Supply Chain Management
- 34. Key Key field which is the unique identifier for all information in any row of a give database table
- 38. building a sustainable competitive advantage through information systems, continuous improving processes, and fact-based operations management
- 40. cloud computing services that provide a platform for customers to develop, run, and manage applications without building and maintaining their own computing infrastructure
- 41. Greenwich Mean Time; original basis of worldwide timezones
- 47. the growing network of physical devices that have Internet connectivity, the data they generate, and the communication between them and other Internet-enabled devices and systems
- 48. cognitive computing platform from IBM
- 49. 3D-printed self-driving minibus integrated with Watson
- 52. interaction in same place
- 53. loosely organized (Twitter/Facebook feeds) and complex data (log files) and audio/video data
- 55. in-memory database software and analytics for fast, massive data processing
- 56. stand-alone application designed to run on a specific platform and device
- 58. free website that allows companies to find and compare business software; "pay-per-click" business model
- 59. malicious software programs such as viruses, worms, and Trojan horses
- 60. analysis software mines text to detect favorable or unfavorable opinions about specific subjects
- 61. disciplined thinking that is clear, rational, open-minded, and informed by evidence
- 63. interlinked value-adding activities that convert inputs into outputs which, in turn, add to the bottom line and help create competitive advantage
- 64. agile team-based approach to delivering business value by creating incremental working product in short development cycles
- 65. characterized by the Four V's - volume, variety, velocity, and veracity
- 66. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- 67. the deliberate use of computer technology to disrupt the activities of a state or organization for strategic or military purposes
Down
- 1. certifies the ownership of a public key
- 2. the use of social networking platforms (e.g. Facebook/Twitter) and internal corporate social tools to engage employees, customers, and suppliers
- 4. traditional methodology referred to as "waterfall"
- 6. Internet-enabled application running on a server that is accessed a browser that
- 8. communication / interaction at same time
- 9. Management Information System
- 11. the process of converting information or data into a code, especially to prevent unauthorized access
- 15. founder and CEO of Amazon; famous quote "The best customer service is if the customer doesn’t need to call you, doesn’t need to talk to you. It just works."
- 16. a weakness or hole in software which is unknown to the vendor that hackers can exploit until it is fixed
- 18. tracking clicking behavior history of users on websites to understand their interests/intentions and expose them to advertisements uniquely suited to them
- 22. diagram which describes the entity relationships in a database
- 24. Business Process Management
- 28. Non-Disclosure Agreement
- 31. set of processes in an organization to create, store, transfer, and apply knowledge
- 32. a series of points (nodes) interconnected by communication paths for the purpose of exchanging data, voice, and video traffic
- 35. Random Access Memory
- 36. a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted in the cloud
- 37. a trusted entity that issues electronic documents that verify a digital entity's identity on the Internet for use in PKI
- 39. open-source software framework that enables distributed parallel processing of huge amount od f data across inexpensive computers
- 42. Virtual Private Network
- 43. contracting out of a business process and/or non-core operational functions to an outside party
- 44. occurs when hackers flood a network server or web service with thousands of false communications or requests
- 45. Executive Support System
- 46. data with a high degree of organization (e.g. transactional data in a relational database)
- 50. Universal Coordinated Time (used by computers; adjusted for leap seconds)
- 51. Enterprise Resource Planning
- 54. finds hidden patterns & relationships in large databases; infers rules to predict future behavior
- 57. metaphor for "the Internet"
- 62. Microsoft Cloud Computing Platform & Services Offering