Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
Information Technology
|
The Various appliances and devices for creating, storing, exchanging, and using information in diverse modes, including visual images, voice multimedia, and business data
|
|
E-Commerce
|
The use of the Internet and other electronic means for retailing and business-to-business transactions
|
|
Mass-Customization
|
Although companies produce in large volumes, each unit features the unique options the customer prefers
|
|
Internet
|
A gigantic system of interconnected computers-more than 100 million computers in over 100 countries
|
|
World Wide Web
|
A standardized code for accessing information and transmitting data over the Internet; the common language that allows information sharing on the Internet
|
|
Intranet
|
An organization's private network of internally linked Web sites accessible only to employees
|
|
Extranet
|
A system that allows outsider limited access to a firm's internal information network
|
|
Electronic Confrencing
|
IT that allows groups of people to communicate simultaneously from various locations via e-mail, phone or video
|
|
VSAT Satellite Communications
|
A network of geographically dispersed transmitter-receivers (transceivers) that send signals from a satellite, exchanging voice, video, and data transmissions
|
|
Computer Network
|
A group of two or more computers linked together by some form of cabling or by wireless technology to share data or resources, such as a printer
|
|
Client-Server Network
|
A common business network in which clients make requests for information or resources and servers provide the services
|
|
Wide Area Network (WAN)
|
Computers that are linked over long distances through telephone lines, microwave signals, or satellite communications
|
|
Local Area Network (LAN)
|
Computers that are linked in a small area, such as all of a firm's computers within a single building
|
|
Wireless Wide Area Network (WWAN)
|
A network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances
|
|
Wi-Fi
|
Short for wireless fidelity; a wireless local area network
|
|
Wireless Local Area Network
|
A local area network with wireless access points for PC users
|
|
Hardware
|
The physical components of a computer network, such as keyboards, monitors, system units, and printers
|
|
Software
|
Programs that tell the computer's hardware what resources to use and how
|
|
Information System (IS)
|
A system that uses IT resources to convert data into information and to collect, process, and transmit that information for use in decision making
|
|
Data
|
Raw facts and figures that, by themselves, may not have much meaning
|
|
Information
|
The meaningful, useful interpretation of data
|
|
Information Systems Managers
|
Managers who operate the systems used for gathering, organizing, and distributing information
|
|
Data Warehousing
|
The collection, storage, and retrieval of data in electronic files
|
|
Data Mining
|
The application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information
|
|
Knowledge Information System
|
Information system that supports knowledge workers by providing resources to create, store, use, and transmit new knowledge for useful applications
|
|
Computer-Aided Design (CAD)
|
IS with software that helps knowledge workers design products by simulating them and displaying them in three dimensional graphics
|
|
Management Information System (MIS)
|
Computer system that supports managers by providing information--reports, schedules, plans and budgets--that can be used for making decisions
|
|
Decision Support System (DSS)
|
Interactive system that creates virtual business models for a particular kind of decision and tests them with different data to see how they respond
|
|
Hacker
|
Cybercriminal who gains unauthorized access to a computer or network, either to steal information, money, or property or to tamper with data
|
|
Identity Theft
|
unauthorized stealing of personal information (such as social security number and address) to get loans, credit cards, or other monetary benefits by impersonating the victim
|
|
Intellectual Property
|
A product of the mind--something produced by the intellect, with great expenditure of human effort--that has commercial value
|
|
Spyware
|
Program unknowingly downloaded by users that monitors their computer activities, gathering e-mail addresses, credit card numbers, and other information that it transmits to someone outside the host system
|
|
SPAM
|
Junk e-mail sent to a mailing list or a newsgroup
|
|
Firewall
|
Security system with special software or hardware devices designed to keep computers safe from hackers
|
|
Anti-Virus Software
|
Product that protects systems by searching incoming e-mails and data files for "signatures" of known viruses and virus-like characteristics
|
|
Encryption System
|
Software that assigns an e-mail message to a unique code number (digital fingerprint) for each computer so only that computer, not others, can open and read the message
|