BA520 - Summer 2017

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 2. Cognitive computing platform from IBM
  2. 7. Service Level Agreement
  3. 8. Parallel areas in a BPM which separate the steps performed by different actors
  4. 12. Interrelated components that collect/process/publish information for operations, innovation, decision-making
  5. 15. Computer speed of one trillion floating point operations per second
  6. 20. The principle of treating all data on the Internet without discrimination or preference
  7. 21. Enterprise Resource Planning
  8. 22. Interlinked activities that convert inputs to outputs; add to bottom line; help create competitive advantage
  9. 24. Finding hidden patterns/relationships in large databases; infers rules to predict future behavior
  10. 25. Stand-alone application designed to run on a specific platform & device
  11. 26. Set of processes in an organization to create, store, transfer, & apply knowledge
  12. 29. In-memory database software and analytics for fast, massive data processing
  13. 30. Cloud-based ERP software provider to the distribution, retail, manufacturing, and service industries
  14. 31. Software as a Service
  15. 32. Trusted entity that issues electronic documents which verify digital entities on the Internet
  16. 33. Key field which is the unique identifier for all information in any row of a given database table
  17. 37. Online collaboration software for creating business and technical diagrams
  18. 39. Using social networking platforms & internal social tools to engage employees, customers, suppliers
  19. 40. Free website that allows companies to find and compare business software using a "pay-per-click" business model
  20. 41. Amazon Web Services
  21. 44. Business Process Management
  22. 45. Microsoft Cloud PaaS and SaaS Offering
  23. 46. Internet of Things
  24. 47. Entity Relationship Diagram
Down
  1. 1. Small file deposited on a hard drive when a user visits a website
  2. 3. Metaphor for the Internet
  3. 4. Competitive Forces Model
  4. 5. Process that streamlines complex data to minimize redundancy and simplify relationships
  5. 6. Malicious software programs such as viruses, worms, and Trojan horses that can steal or destroy data
  6. 9. Random Access Memory
  7. 10. Management Information Systems
  8. 11. Free Cloud-based collaboration platform and software suite
  9. 13. Total Cost of Ownership
  10. 14. Open-source software framework that enables distributed parallel processing of a huge amount of data across inexpensive computers
  11. 16. Network device that monitors & blocks allows incoming/outoging network traffic based on security rules
  12. 17. Purposeful disruption of the activities of a state or organization using computer technology
  13. 18. Tracking click behavior history of users on websites to understand their interest/intentions and expose them to advertisements uniquely suited to them
  14. 19. Radio Frequency Identification
  15. 22. Virtual Private Network
  16. 23. National Institute of Standards and Technology
  17. 27. Attempting to obtain sensitive information for malicious reasons by disguising as a trustworthy entity
  18. 28. Disciplined thinking that is clear, rational, open-minded, and informed by evidence
  19. 34. Contracting out a business process and/or non-core operational function to an outside party
  20. 35. Software Development Life Cycle
  21. 36. Decision Support System
  22. 38. One trillion bytes of data
  23. 42. Storage Area Network
  24. 43. Public Key Infrastructure
  25. 48. Data Flow Diagram