BA325 Spring 2017

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667
Across
  1. 3. small file deposited on a hard drive when a user visits a website
  2. 4. Storage Area Network
  3. 5. set of interrelated components that collect, retrieve, process, store, and distribute information to business operations, innovation, and decision making
  4. 7. software applications (e.g. data mining, online analytical processing, querying, reporting) used to analyze an organization's raw data
  5. 10. technology platforms that combine machine learning, reasoning, natural language processing, speech, vision, and human computer interaction to mimic the function of the human brain and help to improve human decision making
  6. 12. attempting to obtain sensitive information (e.g. credit card info) for malicious reasons by disguising as a trustworthy entity in an electronic communication
  7. 13. company website accessible only to authorized vendors/suppliers
  8. 14. Customer Relationship Management
  9. 17. Total Cost of Ownership
  10. 19. one trillion bytes of data
  11. 20. Service Level Agreement
  12. 21. computer speed of one trillion floating point operations per second
  13. 23. process of streamlining complex data to minimize redundancy, simplify relationships, and increasing stability and flexibility
  14. 25. Decision Support System
  15. 26. cloud-based ERP software provider to the distribution, retail, manufacturing, and service industries
  16. 27. internal network based on Internet standards
  17. 29. free Cloud-based collaboration software suite
  18. 30. Public Key Infrastructure
  19. 33. Supply Chain Management
  20. 34. Key Key field which is the unique identifier for all information in any row of a give database table
  21. 38. building a sustainable competitive advantage through information systems, continuous improving processes, and fact-based operations management
  22. 40. cloud computing services that provide a platform for customers to develop, run, and manage applications without building and maintaining their own computing infrastructure
  23. 41. Greenwich Mean Time; original basis of worldwide timezones
  24. 47. the growing network of physical devices that have Internet connectivity, the data they generate, and the communication between them and other Internet-enabled devices and systems
  25. 48. cognitive computing platform from IBM
  26. 49. 3D-printed self-driving minibus integrated with Watson
  27. 52. interaction in same place
  28. 53. loosely organized (Twitter/Facebook feeds) and complex data (log files) and audio/video data
  29. 55. in-memory database software and analytics for fast, massive data processing
  30. 56. stand-alone application designed to run on a specific platform and device
  31. 58. free website that allows companies to find and compare business software; "pay-per-click" business model
  32. 59. malicious software programs such as viruses, worms, and Trojan horses
  33. 60. analysis software mines text to detect favorable or unfavorable opinions about specific subjects
  34. 61. disciplined thinking that is clear, rational, open-minded, and informed by evidence
  35. 63. interlinked value-adding activities that convert inputs into outputs which, in turn, add to the bottom line and help create competitive advantage
  36. 64. agile team-based approach to delivering business value by creating incremental working product in short development cycles
  37. 65. characterized by the Four V's - volume, variety, velocity, and veracity
  38. 66. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  39. 67. the deliberate use of computer technology to disrupt the activities of a state or organization for strategic or military purposes
Down
  1. 1. certifies the ownership of a public key
  2. 2. the use of social networking platforms (e.g. Facebook/Twitter) and internal corporate social tools to engage employees, customers, and suppliers
  3. 4. traditional methodology referred to as "waterfall"
  4. 6. Internet-enabled application running on a server that is accessed a browser that
  5. 8. communication / interaction at same time
  6. 9. Management Information System
  7. 11. the process of converting information or data into a code, especially to prevent unauthorized access
  8. 15. founder and CEO of Amazon; famous quote "The best customer service is if the customer doesn’t need to call you, doesn’t need to talk to you. It just works."
  9. 16. a weakness or hole in software which is unknown to the vendor that hackers can exploit until it is fixed
  10. 18. tracking clicking behavior history of users on websites to understand their interests/intentions and expose them to advertisements uniquely suited to them
  11. 22. diagram which describes the entity relationships in a database
  12. 24. Business Process Management
  13. 28. Non-Disclosure Agreement
  14. 31. set of processes in an organization to create, store, transfer, and apply knowledge
  15. 32. a series of points (nodes) interconnected by communication paths for the purpose of exchanging data, voice, and video traffic
  16. 35. Random Access Memory
  17. 36. a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted in the cloud
  18. 37. a trusted entity that issues electronic documents that verify a digital entity's identity on the Internet for use in PKI
  19. 39. open-source software framework that enables distributed parallel processing of huge amount od f data across inexpensive computers
  20. 42. Virtual Private Network
  21. 43. contracting out of a business process and/or non-core operational functions to an outside party
  22. 44. occurs when hackers flood a network server or web service with thousands of false communications or requests
  23. 45. Executive Support System
  24. 46. data with a high degree of organization (e.g. transactional data in a relational database)
  25. 50. Universal Coordinated Time (used by computers; adjusted for leap seconds)
  26. 51. Enterprise Resource Planning
  27. 54. finds hidden patterns & relationships in large databases; infers rules to predict future behavior
  28. 57. metaphor for "the Internet"
  29. 62. Microsoft Cloud Computing Platform & Services Offering