Miscellaneous Quiz / Computer Management Final

Random Miscellaneous Quiz

Can you name the Comp. Management Terms?

 Plays Quiz not verified by Sporcle

Forced Order
Also try: Initial Clicking
Score 0/77 Timer 20:00
A mode of thinking that people engage in when they are deeply involved in a cohesive in-group. It can occur when the following are present: directive leadership, homogeneity of mem
Systems that provide rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of customer activity
Process in which a tester takes a brand new computer, plugs it into the internet, and watches what happens next. The purpose of this is to see how long it takes until outsiders try
Refers to where the node is situated in relation to all of the ties in the network. Associated with benefits such as power, promotions, and influence.
The phenomenon whereby firms can make money by selling a near-limitless selection of less-popular products.
The approach where a firm seeks to create and compete in uncontested “blue ocean” market spaces, rather than competing in spaces or ways that have many, similar rivals.
A market that derives most of its values from a single class of users.
The period of time between an outlay of cash for part and the collection of payments for good made from them.
Technology that monitors trends among customers and uses this to personalize an individual consumer's experience.
The recruiting of a network of users to engage in click fraud with the goal of spreading IP addresses across several systems and make a fraud effort more difficult to detect.
Using a relatively simple technology that is available to other competing firms in a smart and effective way, giving you an advantage.
Hardware that silently and undetectably captures key strokes
The act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined group of large people.
Keyword Based classification system created by user communities as they generate and review content,
Online Community that allow users to establish a personal profile and communicate with others
When users collaboratively work to create content and provide services online.
4 characteristics a company needs in order to develop a sustainable competitive advantage: 1. Valuable 2. Rare 3. Inimitable. 4. Non-substitutable.
These are hordes of surreptitously infiltrated computers, linked and controlled remotely. This technique is used to perpetrate click fraud, as well as a variety of other security c
A business model that focuses on shifting revenue streams and spending for a certain service such as retail, advertising, music, etc. from one place/model to another place/model
Method for organizing tweets where keywords are preceded by the # character.
Symbolic embodiment of all information connected with a product or service
A firm that focuses on a specific product, service, or business model.
When a company wants to sell its product through two different channels that are in competition.
Outsourcing production to third-party firms.
Claims you are as central as your friends
A software robot that is run automatically on a computer
Online journal entries usually made in chronological order that typically provide comment mechanisms where users can provide feedback
When materials are scheduled to arrive exactly when they are needed in the production process.
An entity in a network
The set of interrelated activities that bring a product or service to market. It consists of inbound logistics, operations, outbound logistics, marketing and sales, and service.
Occurs when a firm is being taken over by, or merged with, another firm which is in the same industry and in the same stage of production as the merged firm
A kind of internet security device that is used to filter out automated computers that wish to send out spam, malware, and viruses.
Allows common people to interact with and access technology by making computers simpler. Uses pictures and symbols rather than codes
A set of databases designed to support decision making in an organization.
Those things that make it difficult for a new company to compete against companies already established in the field
The present value of the likely future income stream generated by an individual purchaser.
Describes process of expectations and views towards a new technology or product. Involves inflated expectation, trough of disillusionment, slope of enlightenment and plateau of pro
Hiring an external company to come in to an existing firm and perform some business process.
Handheld computing devices meant largely for mobile use outside an office setting.
A tactic used by intruders to make a computer resource unavailable to the normal user(s) for a period of time, which can be short, or indefinite. This attack is used on web servers
The process of cutting out the middle man in a company that is buying or selling products.
Refers to a firm that uses its resources, staff and services to fund the production of a good or service without outsourcing to another company.
Goods which are perceived all alike by consumers
Describes the effect that occurs when a small shift in demand gets amplified throughout the supply chain.
The value of a network is equal to the square of the number of users.
An update on an individual's activities that are broadcast to a member's contacts or 'friends.'
Refers to when a firm takes a part of its business and gives that part to another company, even though that service could be provided in-house.
A type of sealed-bid auction, where bidders submit written bids without knowing the bid of the other people in the auction. The highest bidder wins, but the price paid is the secon
When a single firms owns several layers in its value chain.
Product or service becomes more vaulable the more people that use them.
Transaction processing systems that capture customer purchases
The means by which a firm manages to keep making a profit and keep its position among competitors.
The concept that the loss of old jobs will lead to the creation of new jobs.
Relationships and interactions between two nodes.
The transfer of service operations to foreign countries in order to take advantage of a supply of skilled but relatively cheap labor. Services may be outsourced to a foreign compan
Claims that a group makes better decisions than any one individual in that group. Consists of more information and unbiased noise, diversity of opinions, independence of group memb
Refers to the part of the value chain that sets the company apart from its competitors. It is the main focus of the company and should never be outsourced.
The number of actual ties compared to the number of possible ties. There are two types:High and Low
The process of using computers to identify hidden patterns within large data sets and then build models from these patterns.
Using IT to better leverage existing organizational advantages.
Using IT to make data, information, or knowledge available at multiple levels of the organization.
A controversial practice used by companies, such as Netflix, that involves slowing down turn around times to less valuable customers, in order to save money.
The cost a consumer would incur from moving from one product to another
A part of a business that cannot be easily copied by competitors.
When rival company's watch a pioneer's efforts, learn from their success and missteps, then enter the market quickly with a superior or comparable product at a lower cost before th
Refers to Internet Services that foster collaboration and info sharing and foster social media
Short, ayncronous messaging system where users send messages to followers. Typically much shorter than blogs
An infiltration technique used by hackers that typically involve con games that trick employees into revealing information or performing other tasks that may compromise the firm.
How often and how well two nodes relate to one another. There are two types: Weak(better for finding jobs) and Strong(better for trust)
A determinant of ad placement by which firms pay money to a host each time somebody clicks on a link to their pages.
Using IT to make new markets to work in and sell your products to.
Using IT to conduct routine activities.
Used by companies to avoid the 'commodity trap'
Processing power per dollar doubles every 18 months.
Content that is created, shared and commented on by a broader community of users
The process by which the intruders find the weakness of systems and abuse them. The cycle includes: advanced intruders discovering vulnerabilities, crud exploit tools distributed,
Generating bogus clicks, either for financial gain, or to attack rivals by draining their online ad budget. Includes enriching, depleting, disbarring, and impression. Enriching is

You're not logged in!

Compare scores with friends on all Sporcle quizzes.
Join for Free
Log In

You Might Also Like...

Show Comments


Created Mar 10, 2010ReportNominate

Top Quizzes Today

Score Distribution

Your Account Isn't Verified!

In order to create a playlist on Sporcle, you need to verify the email address you used during registration. Go to your Sporcle Settings to finish the process.

Report this User

Report this user for behavior that violates our Community Guidelines.