The process of examining large and complex datasets to uncover patterns, trends, and insights that can inform decision-making. - Big Data Analysis, Financial Technology, referring to innovative technologies and startups - FinTech, The interdisciplinary field that uses scientific methods, algorithms, and systems to extract insights and knowledge from structured and unstructured data. - Data Science, The early stage of the World Wide Web characterized by static web pages with limited interactivity and user participation. - Web 1.0, The evolution of the World Wide Web towards dynamic, user-generated content, social media, and interactive web applications. - Web 2.0, The evolution of the internet characterized by decentralized, semantic web technologies and enhanced user interactions. - Web 3.0, Business strategies that bridge the online and offline worlds, often involving online marketing or salees channels that drive offline customers interactions or transactions. - Online to Offline O2O, A centralized repository for storing and managing large volumes of structured and unstructured data from various sources, designed for analysis and reporting - Data Warehouse, A wireless technology standard for short-range communication between devices, enabling data exchange and connectivity for various applications such as audio streaming and device pairing. - Bluetooth, A technology that creates a secure, encrypted connection over a public network such as the internet, allowing users to access private networks and browse the web anonymously. - Virtual Private Network (VPN), A medical facility that utilizes advanced technologies such as IoT, AI, and data analytics to improve patient care, operational efficiency, and healthcare outcomes. - Smart Hospital, The adoption and integration of digital technologies to fundamentally change business operations, models, and processes. - Digital Transformation, The collection, measurement, and analysis of data related to website traffic, user behaviour, and engagement to optimize website performance and marketing strategies. - Website Analytics, The field of AI that focuses on enabling computers to interpret and understand visual information from images or videos. - Computer Vision, The application of artificial intelligence technologies to enhance retail operations, including personalised marketing, inventory managemnt, and customer service. - AI Retail, A storage repository that holds a vast amount of raw data in its native format until it’s needed for analysis or other purposes. - Data Lake, The practice of protecting computer systems, networks, and data from unauthorized access, cyberattacks, and data breaches. - Cybersecurity, A decentralized and distributed digital ledger technology that records transactions across multiple computers in a secure and tamper-resistant manner. - Blockchain, Artificial intelligence techniques that enable machines to create new content, such as images, text, or music. mimicking human creativity. - Generative AI, Computing systems inspired by the structure and function of the human brain. used for tasks such as pattern recognition and classification. - Neural Networks, The branch of artificial intelligence focused on enabling computers to understand, interpret, and generate human language. - Natural Language Processing, The ability of machines to interpret and analyze visual information from images or videos, often used for object detection, recognition, and tracking - Machine Vision, A theoretical framework that assesses how users adopt and use new technologies. - Technology Acceptance Model, The process of discovering patterns, trends, and insights from large datasets using statistical and machine learning techniques. - Data Mining, The interconnected network of users, developers, suppliers, and complementors surrounding a platform, contributing to its growth and sustainability. - Platform Ecosystem, A framework for evaluating the effectiveness and success of information systems within organizations. - Information Systems Success Model, A set of rules and protocols that allows different software applications to communicate and share data with each other. - Application Programming Interface (API), A network of interconnected devices embedded with sensors and software, enabling them to collect and exchange data. - Internet of Things (IoT), The use of data analytics and machine learning to identify and prevent fraudulent activities, transactions, or behavior - Fraud Detection, Criminal activities carried out using computers or the internet, such as hacking, malware distribution, identify theft, and online fraud - Cybercrime, The study of economic interactions and dynamics within digital platforms, including the role of network effects and platform governance. - Platform Economics, A theory that examines the costs associated with transactions in economic activities, including bargaining, contracting, and enforcing agreements - Transaction Cost Economics, A structured collection of data organized for efficient storage, retrieval, and manipulation, typically managed by a database management system (DBMS) - Database, A conversational AI model developed by OpenAI, capable of generating human-like text responses based on input prompts. - ChatGPT, The simulation of human intelligence processes by machines, typically involving tasks such as learning, reasoning, and problem-solving - Artificial Intelligence, A subset of a data warehouse focused on specific business areas or user groups, providing tailored access to relevant data. - Data Mart, A subset of machine learning that uses artificial neural networks with multiple layers to learn from large amounts of data and perform complex tasks. - Deep Learning, A type of computing that harnesses the principles of quantum mechanics to perform calculations exponentially faster than classical computers. - Quantum Computing, AI-powered software programs designed to simulate human conversations, often used for customer support, sales, and other interactions. - Chatbots, A set of policies, procedures, and controls for managing data assets to ensure data quality, integrity, and security - Data Governance, Technology that overlays digital information or virtual objects onto the real world, enhancing users' perception and interaction with their environment. - Augmented Reality (AR), A simulated environment that immerses users in a completely digital world, typically experienced through a haed-mounted display. - Virtual Reality (VR), Measures and practices designed to protect internet-connected systems, networks, and data from cyber threats and attacks. - Internet Security, Measures and protocols implemented to protect data from unauthorized access, use, disclosure, disruption, modification, or destruction. - Data Security, A distributed computing paradigm where data processing and storage occur closer to the data source or edge devices, reducing latency and bandwidth usage. - Edge Computing, The protection of individuals' personal information and rights concerning the collection, storage, use, and sharing of their data. - Data Privacy, A set of techniques and tools for the acquisition and transformation of raw data into meaningful and useful information for business analysis purposes. - Business Intelligence, Computer-based systems that assist in decision-making activities. - Decision Support Systems, Measures taken to protect information systems from unauthorized access or malicious attacks. - Information Systems Security, The process of accessing and retrieving relevant information from a database or other storage systems. - Information Retrieval, A strategic management tool used to analyze the competitive environment of an industry based on five key factors: competition, bargaining power of suppliers, bargaining power of buyers, threat of substitutes, and threat of new entrants. - Five Forces Analysis, The phenomenon where the value of a product or service increases as more people use it, leading to positive feedback loops and network effects - Network Externalities, Artwork that incorporates smart technology, such as sensors or interactive elements. - Smart Art, A manufacturing facility that utilized advanced technologies like IoT and AI to optimize production processes and improve efficiency. - Smart Factory, Logistics systems enhanced with AI and automation to optimize transportation, storage, and distribution processes. - Intelligent Logistics, A sociological perspective that explains social behavior in terms of exchanges between individuals, where each party seeks to maximize rewards and minimize costs in relationships. - Social Exchange Theory, A computational model inspired by the structure and function of the human brain, used for tasks like pattern recognition and classification. - Artificial Neural Network, The convergence of Artificial Intelligence (AI) and the Internet of Things, enabling intelligent decision-making and automation in connected devices and systems. - AIoT, A programming language commonly used for building interactive web applications and dynamic content on websites. - JavaScript, The visual elements and controls through which users interact with software applications or devices. - User Interface (UI), The overall experience of a person using a product or service, encompassing usability, accessibility, and satisfaction. - User Experience (UX), A method of securing data by converting it into an unreadable format using encryption algorithms. - Data Encryption System, Electronic signatures that verify the authenticity and integrity of digital documents or transactions. - Digital Signatures, The study of ethical issues related to the creation, distribution, and use of information and communication technologies. - Information Ethics, The buying and selling of goods and services over the internet. - E-Commerce, Digital currencies that are not issued or regulated by any central authority, often used for online transactions. - Virtual Currency, The process of abstracting, managing, and presenting data from multiple sources as a single, virtualized data layer. - Data Virtualization, A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. - Firewall, The observation that the number of transistors on a microchip doubles approximately every two years, leading to exponential growth in computing power and technological advancement. - Moore's Law, A method of securing digital messages or files by encrypting their contents and attaching digital signatures for authentication and integrity verification. - Digital Envelope, The process of selecting, extracting, and transforming features from raw data to improve the performance of machine learning models. - Feature Engineering, Web development involves creating and maintaining websites and web applications to facilitate e-business activities. - Web Development, EDI enables the electronic exchange of business documents, such as purchase orders and invoices, between trading partners. - Electroning Data Interchange (EDI), Mobile applications are software programs designed for use on mobile devices to provide e-business functionalities and services. - Mobile Applications, Techniques and technologies to control access, distribution, and usage rights of digital content to protect intellectual property. - Digital Rights Management, Monitoring and tracking activities, communications, or behaviors of individuals or groups, often raising concerns about privacy and freedom. - Surveillance, Unauthorized use of someone's personal information to impersonate them or commit fraudulent activities - Identity Theft, Principle advocating for equal treatment of all internet traffic by internet service providers, without discrimination or favoritism - Net Neutrality, Legitimate testing of computer systems and networks for vulnerabilities to improve security measures and protect against malicious attacks. - Ethical Hacking, Confidence and reliance placed on individuals, organizations, or platforms when engaging in online interactions or transactions. - Online Trust, A subset of AI that enables systems to learn and improve from experience without being explicitly programmed. - Machine Learning, Large volumes of structured and unstructured data that require advanced analytics and processing techniques to extract insights and value. - Big Data, Computing systems that mimic human thought processes to understand, reason, and learn from complex data. - Cognitive Computing, The latest version of the Internet Protocol, designed to provide a larger address space and support the growing number of devices connected to the internet. - Internet Protocol Version 6 (IPv6), Security technology that uses unique biological characteristics, such as fingerprints or facial features, to verify a person's identity - Biometric Authentication , Systems that capture, store, analyze, and display geographic data to support decision-making and spatial analysis - Geographical Information Systems (GIS), A manufacturing process that creates three-dimensional objects layer by layer from digital models, offering customization, efficiency, and reduced waste - 3D Printing, The process of extracting data from various sources, transforming it into a consistent format, and loading it into a data warehouse or database - ETL (Extract, Transform, Load), The process of improving the performance of database queries by optimizing their execution plans and resource utilization - Query Optimization, The process of creating copies of database data to protect against data loss or corruption and restoring data to its original state in the event of a failure - Backup and Recovery, Tools, devices, and systems used to manage and process information within an organization - Information Technology, Processes and methodologies for setting organizational goals and objectives to achieve competitive advantage. - Strategic planning, The process of studying and evaluating an organization's systems and procedures to improve efficiency and effectiveness - System Analysis, Policies, procedures, and controls to ensure that IT investment align with business goals and deliver value. - IT Governance, Work performed outside of a traditional office setting, often facilitated by technology and telecommunications. - Remote Work, Electronic systems for making payments and transferring funds over the internet, enabling secure and efficient transactions. - E-Payment Systems, Applications and platforms that enable multiple users to work together on documents, projects, or tasks in real-time. - Collaborative Software, Legal agreements created, signed, and executed electronically, often used in e-commerce transactions. - Electronic Contracts, Adhering to legal and regulatory requirements, industry standards, and organizational policies related to information management. - Compliance, The metaverse is an expansive digital universe where users can interact with each other and digital content in real-time, transcending physical boundaries. - Metaverse,
0%
資訊管理 期中考
Podeli
Podeli
Podeli
autor
Stellakie34
Uredi sadržaj
Odštampaj
Ugradi
Više
Zadatke
Tabela
Fleš kartice
je otvoreni šablon. On ne generiše rezultate za tabelu rangiranja.
Prijava je obavezna
Vizuelni stil
Fontove
Potrebna je pretplata
Postavke
Promeni šablon
Prikaži sve
Više formata će se pojaviti tokom igranja aktivnosti.
Otvoreni rezultati
Kopiraj vezu
QR kôd
Izbriši
Vrati automatski sačuvano:
?