Miscellaneous Quiz / Computer Management Final

Random Miscellaneous Quiz

Can you name the Comp. Management Terms?

Quiz not verified by Sporcle

Forced Order
Challenge
Share
Tweet
Embed
Score 0/77 Timer 20:00
DefinitionTermExample
The process of using computers to identify hidden patterns within large data sets and then build models from these patterns.
A business model that focuses on shifting revenue streams and spending for a certain service such as retail, advertising, music, etc. from one place/model to another place/model
Content that is created, shared and commented on by a broader community of users
Online journal entries usually made in chronological order that typically provide comment mechanisms where users can provide feedback
Relationships and interactions between two nodes.
Online Community that allow users to establish a personal profile and communicate with others
The means by which a firm manages to keep making a profit and keep its position among competitors.
The concept that the loss of old jobs will lead to the creation of new jobs.
Hiring an external company to come in to an existing firm and perform some business process.
Handheld computing devices meant largely for mobile use outside an office setting.
The set of interrelated activities that bring a product or service to market. It consists of inbound logistics, operations, outbound logistics, marketing and sales, and service.
Using IT to make new markets to work in and sell your products to.
The act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined group of large people.
Short, ayncronous messaging system where users send messages to followers. Typically much shorter than blogs
Refers to the part of the value chain that sets the company apart from its competitors. It is the main focus of the company and should never be outsourced.
Product or service becomes more vaulable the more people that use them.
Refers to a firm that uses its resources, staff and services to fund the production of a good or service without outsourcing to another company.
An infiltration technique used by hackers that typically involve con games that trick employees into revealing information or performing other tasks that may compromise the firm.
A set of databases designed to support decision making in an organization.
Systems that provide rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of customer activity
Using a relatively simple technology that is available to other competing firms in a smart and effective way, giving you an advantage.
The period of time between an outlay of cash for part and the collection of payments for good made from them.
Processing power per dollar doubles every 18 months.
Allows common people to interact with and access technology by making computers simpler. Uses pictures and symbols rather than codes
A firm that focuses on a specific product, service, or business model.
4 characteristics a company needs in order to develop a sustainable competitive advantage: 1. Valuable 2. Rare 3. Inimitable. 4. Non-substitutable.
DefinitionTermExample
The recruiting of a network of users to engage in click fraud with the goal of spreading IP addresses across several systems and make a fraud effort more difficult to detect.
Using IT to better leverage existing organizational advantages.
When a single firms owns several layers in its value chain.
The approach where a firm seeks to create and compete in uncontested “blue ocean” market spaces, rather than competing in spaces or ways that have many, similar rivals.
Generating bogus clicks, either for financial gain, or to attack rivals by draining their online ad budget. Includes enriching, depleting, disbarring, and impression. Enriching is
A part of a business that cannot be easily copied by competitors.
These are hordes of surreptitously infiltrated computers, linked and controlled remotely. This technique is used to perpetrate click fraud, as well as a variety of other security c
When materials are scheduled to arrive exactly when they are needed in the production process.
The phenomenon whereby firms can make money by selling a near-limitless selection of less-popular products.
Method for organizing tweets where keywords are preceded by the # character.
Claims that a group makes better decisions than any one individual in that group. Consists of more information and unbiased noise, diversity of opinions, independence of group memb
An entity in a network
A software robot that is run automatically on a computer
When users collaboratively work to create content and provide services online.
When rival company's watch a pioneer's efforts, learn from their success and missteps, then enter the market quickly with a superior or comparable product at a lower cost before th
How often and how well two nodes relate to one another. There are two types: Weak(better for finding jobs) and Strong(better for trust)
The cost a consumer would incur from moving from one product to another
Describes the effect that occurs when a small shift in demand gets amplified throughout the supply chain.
When a company wants to sell its product through two different channels that are in competition.
A market that derives most of its values from a single class of users.
The transfer of service operations to foreign countries in order to take advantage of a supply of skilled but relatively cheap labor. Services may be outsourced to a foreign compan
The value of a network is equal to the square of the number of users.
A kind of internet security device that is used to filter out automated computers that wish to send out spam, malware, and viruses.
An update on an individual's activities that are broadcast to a member's contacts or 'friends.'
A determinant of ad placement by which firms pay money to a host each time somebody clicks on a link to their pages.
Symbolic embodiment of all information connected with a product or service
DefinitionTermExample
Those things that make it difficult for a new company to compete against companies already established in the field
Describes process of expectations and views towards a new technology or product. Involves inflated expectation, trough of disillusionment, slope of enlightenment and plateau of pro
A controversial practice used by companies, such as Netflix, that involves slowing down turn around times to less valuable customers, in order to save money.
Process in which a tester takes a brand new computer, plugs it into the internet, and watches what happens next. The purpose of this is to see how long it takes until outsiders try
Technology that monitors trends among customers and uses this to personalize an individual consumer's experience.
Used by companies to avoid the 'commodity trap'
Refers to where the node is situated in relation to all of the ties in the network. Associated with benefits such as power, promotions, and influence.
Using IT to make data, information, or knowledge available at multiple levels of the organization.
The process of cutting out the middle man in a company that is buying or selling products.
A type of sealed-bid auction, where bidders submit written bids without knowing the bid of the other people in the auction. The highest bidder wins, but the price paid is the secon
Goods which are perceived all alike by consumers
Occurs when a firm is being taken over by, or merged with, another firm which is in the same industry and in the same stage of production as the merged firm
The number of actual ties compared to the number of possible ties. There are two types:High and Low
Refers to Internet Services that foster collaboration and info sharing and foster social media
Keyword Based classification system created by user communities as they generate and review content,
Refers to when a firm takes a part of its business and gives that part to another company, even though that service could be provided in-house.
Using IT to conduct routine activities.
Hardware that silently and undetectably captures key strokes
A mode of thinking that people engage in when they are deeply involved in a cohesive in-group. It can occur when the following are present: directive leadership, homogeneity of mem
The present value of the likely future income stream generated by an individual purchaser.
A tactic used by intruders to make a computer resource unavailable to the normal user(s) for a period of time, which can be short, or indefinite. This attack is used on web servers
Transaction processing systems that capture customer purchases
Claims you are as central as your friends
The process by which the intruders find the weakness of systems and abuse them. The cycle includes: advanced intruders discovering vulnerabilities, crud exploit tools distributed,
Outsourcing production to third-party firms.

You're not logged in!

Compare scores with friends on all Sporcle quizzes.
Sign Up with Email
OR
Log In

You Might Also Like...

Show Comments

Extras

Top Quizzes Today


Score Distribution

Your Account Isn't Verified!

In order to create a playlist on Sporcle, you need to verify the email address you used during registration. Go to your Sporcle Settings to finish the process.