Term
|
Definition
Giving consumers a part of thier service for free and then having another part that is better but is a paid version |
|
|
Term
What customer value does Pandora Offer? |
|
Definition
Giving customers a free service while also giving them advertisments to make money themselves |
|
|
Term
|
Definition
|
|
Term
A Business Model as which compenants? |
|
Definition
Market Strategy, Market Opportunity, Competitive Advantage, Revenue Model |
|
|
Term
|
Definition
involves using the internet to enable individuals to collectively contribute money to support a project |
|
|
Term
|
Definition
Is an example of of crowdfunding |
|
|
Term
|
Definition
a program that allows you to check the connection between your client and server |
|
|
Term
|
Definition
|
|
Term
Do you think internet users should be charged based on the amount of bandwidth they use according to Akamai? |
|
Definition
|
|
Term
|
Definition
open source content management and web site design tool |
|
|
Term
Orbitz has dominated the market in what ways? |
|
Definition
|
|
Term
|
Definition
copies itself and then spread to others |
|
|
Term
|
Definition
type of malicious code that can be covertly installed on a computer when connected to the internet |
|
|
Term
|
Definition
good hackers who help organizations locate problems |
|
|
Term
|
Definition
hackers who believe they are doing good but are breaking in to revelal system flaws |
|
|
Term
|
Definition
hackers who act with the intention of causing harm |
|
|
Term
|
Definition
a type of eavesdropping program that monitors information |
|
|
Term
|
Definition
the process of transforming plain text of data into cipher text |
|
|
Term
|
Definition
avaliable just about everywhere |
|
|
Term
|
Definition
a set of application and technologies that allows users to create edit and distribute content, like bookmarks |
|
|
Term
Will the apps make the internet irrelevant? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What year was E-Commerce invented? |
|
Definition
|
|
Term
|
Definition
includes a variety of threats such as viruses, worms, trojan horses and bots |
|
|
Term
|
Definition
malware that is designed to spread from computer to computer |
|
|
Term
|
Definition
appears to be benugn, but then does something other than expected |
|
|
Term
|
Definition
an individual who intends to gain unauthorized information |
|
|
Term
|
Definition
any deceptive online attempt by a third party to obtain confidential infromation for financial gain |
|
|
Term
|
Definition
|
|
Term
Say one fact about anything from the case about the Latin America case |
|
Definition
|
|