1. The ability of a system, network, or process to handle an increasing amount of work, or its
ability to be enlarged in order to accommodate that increase.
Virality
Internet
Scalability
Collective intelligence
2. A shared or group intelligence that emerges from the collaboration and competition of many
individuals and appears in consensus-decision-making in bacteria [clarification needed], animals,
and computer networks.
Collective Intelligence
Internet
Scalability
Virality
3. Internet slang for posting inflammatory, extraneous, or off-topic messages in an online
community– such as a forum, chat room, or blog– with the primary intention of provoking an
emotional response in its readers or otherwise disrupting normal discussion.
Internet
Scalability
Virality
Collective intelligence
4. The state or condition of being viral; tendency to spread by word of mouth.
Scalability
Internet
Virality
Collective intelligence
5. Publicity for political campaigns gained through newspaper articles, TV news stories, web news,
letters to the editor, op-ed pieces, and “fast polls” on TV and the web.
Earned media
Clickstream
Display advertising
Semantic analysis
6. The process of relating syntactic structures, from the levels of phrases, clauses, sentences and
paragraphs to the level of the writing as a whole, to their language-independent meanings,
removing features specific to particular linguistic and cultural contexts, to the extent that such a
project is possible.
Clickstream
Semantic analysis
Display advertising
Earned media
7. Online advertising that typically contains text (i.e., copy), logos, photographs or other images,
location maps, and similar items.
Clickstream
Semantic analysis
Earned media
Display advertising
8. A profile of a user’s activity in a web browser or other software, based on what is clicked.
Clickstream
Earned media
Display advertising
Semantic analysis
9. A proprietary open-wireless technology standard for exchanging data over short distances.
Bluetooth
MMS
SMS
Behavioral targeting
10. Standard way to send messages that include multimedia content to and from mobile phones.
Bluetooth
MMS Multimedia Messaging Service
Behavioral targeting
SMS
11. A text message sent on a cell phone.
Behavior advertising
Bluetooth
MMS
SMS
12. The range of technologies and techniques used by online website publishers and advertisers
which allows them to increase the effectiveness of their campaigns by capturing data generated
by website and landing page visitors.
Bluetooth
SMS
Behavioral targeting
MMS
13. A widely implemented model for managing a company’s interactions with customers, clients,
and sales prospects.
World Wide Web
Discourse
Widget
Customer relationship management
14. A formal lengthy exposition of some subject, either spoken or written.
Widget
Discourse
World Wide Web
Customer relationship management
15. Any one of the components of a computer application’s graphical user interface, such as a
Cancel button or text input box that a user interacts with.
Customer relationship management
Widget
Discourse
World Wide Web
16. Collectively, all of the web pages on the Internet which hyperlink to each other and to other
kinds of documents and media.
World Wide Web
Customer relationship management
Widget
Discourse
17. The state of being accountable; liability to be called on to render an account; accountableness;
responsible for; answerable for.
Real-time Web
Social media
Mobile application
Accountability
18. Interactive forms of media that allow users to interact with and publish to each other, generally
by means of the Internet.
Mobile application
Real-time Web
Social media
Accountability
19. A software application designed to run on smartphones, tablet computers and other mobile
devices.
Social media
Real-time Web
Mobile application
Accountability
20. A set of technologies and practices that enable users to receive information as soon as it is
published by its authors, rather than requiring that they or their software check a source
periodically for updates.
Accountability
Mobile application
Social media
Real-time Web
21. The main computer case containing the central components of a personal computer.
CAM
RAM
CPU
CMOS
22. Technology for constructing integrated circuits.
CMOS
CAM
RAM
CPU
23. The growing tendency for new IT to emerge first in the consumer market and then spread into
business and government organizations.
RAM
Consumerization
CPU
CMOS
24. A computer or a program which provides services to other programs or users, either in the same
computer or over a computer network.
Server
CPU
CMOS
RAM
25. Regarded as an amorphous omnipresent space for processing and storage on the Internet; the
focus of cloud computing.
CMOS
Server
CPU
Cloud
26. A widely implemented model for managing a company’s interactions with customers, clients
and sales prospects.
RAM
CPU
Customer Relationship Management
CMOS
27. A software or firmware system that provides a virtual machine and allows it to operate directly
on underlying hardware (instead of via emulation), but within specified constraints.
Hypervisor
WAN
LAN
Server
28. A computer network used for communication among computer and information technological
devices close to one person.
WAN
PAN
LAN
VPN
29. A network that connects computers and devices in a limited geographical area such as a home,
school, computer laboratory, office building, or closely positioned group of buildings.
PAN
VPN
LAN
WAN
30. A computer network that covers a large geographic area such as a city, country, or even
intercontinental distances, using a communications channel that combines many types of media
such as telephone lines, cables, and air waves.
WAN
PAN
VPN
LAN
31. A part of a computer network infrastructure that interconnects various pieces of network,
providing a path for the exchange of information between different LANs or subnetworks.
Backbone network
Wide area network
Local area network
Personal area network
32. A computer network in which some of the links between nodes are carried by open connections
or virtual circuits in some larger network (e.g., the Internet ) instead of by physical wires.
WAN
VPN
PAN
LAN
33. The branch of computer science dealing with the reproduction or mimicking of human-level
intelligence, self-awareness, knowledge, conscience, thought in computer programs.
Natural language
Artificial intelligence
Virtual reality
Knowledge base
34. A division or project of an organization to which costs can be specifically allocated.
Service center
Decision-making center
Cost center
Business center
35. A database consisting of separate tables, having explicitly defined relationships, and whose
elements may be selectively combined as the results of queries.
Machine learning
Database
Metadata
Relational database
36. Data that describes other data, serving as an informative label.
Relational database
Service data
Database
Metadata
37. A collection of information in a regular structure, usually, but not necessarily in a machinereadable format accessible by a computer.
Database
Relational database
Virtual database
Metadata
38. Information collected by the investigator conducting the research.
Primary data
Secondary data
Tabulation
Statistical analysis
39. A table displaying data in compact form.
Secondary data
Statistical analysis
Tabulation
Primary data
40. The process of examining data to draw conclusions or insights, and determine cause-and-effect
patterns between events; for example determining the safety and efficacy of new drugs by
drawing out a probability as to whether the fact that a patient got better (or worse) was due to
the drug or some other (perhaps random) factor.
Secondary data
Tabulation
Primary data
Statistical analysis
41. Information collected by someone other than the user of the data.
Tabulation
Tertiary data
Primary data
Secondary data
42. Commercial activity conducted via the Internet.
cloud
b2c
b2b
e-commerce
43. The process by which goods get to final consumers over a geographical market, including
storing, selling, shipping, and advertising.
b2b
b2c
c2c
Distribution
44. Unauthorized attempts to bypass the security mechanisms of an information system or
network. See also cracker.
Identity theft
Phishing
Hacking
VPN
45. The act of sending email that falsely claims to be from a legitimate organization.
VPN
Identity theft
Phishing
Hacking
46. The deliberate assumption of another person’s identity, usually to gain access to that person’s
finances or to frame a person for a crime.
phishing
vpn
hacking
identity theft
47. Programs that surreptitiously monitor and report the actions of a computer user.
spyware
adware
forced entry
malware
48. A software application that includes advertisements, which are displayed while the software is
running.
malware
spyware
forced entry
adware
49. Software which has been designed to operate in a malicious, undesirable manner.
adware
malware
forced entry
spyware
50. A method of scrambling and unscrambling information to protect it during digital transmission
(in the context of email).
Encryption
Malware
Spyware
Firewall
51. A gateway between the internet and a local network, allowing or denying access based upon
protocols.
Malware
Encryption
Spyware
Firewall
Purchase answer to see full
attachment