Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
31 Cards in this Set
- Front
- Back
why do students need to study IT
|
because IT is everywhere
|
|
intelligent agent
|
a special purpose knowledge based information that accomplishes specific tasks on behalf of its users
|
|
information-functional culture
|
employees use information as a means of exercising influences or power over others
|
|
fuzzy logic
|
a mathematical method of handeling imprecise or subjective information
|
|
check out
|
what u do in a store during purchase time
|
|
internet
|
a global public network of computer networks that pass information from one to another using common computer protocols
|
|
protocol
|
a standard that specifies the format of date as well as the rules to be followed during transmission
|
|
digital darwinism
|
organization that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extintion
|
|
insider
|
legitimate users who purposely or accidently misuse their access to the enviroment and cause some kind of business affecting incident
|
|
acceptable use policy
|
a policy that a user must agree to follow in order to be provided access to a network or to the internet
|
|
application architecture
|
determines how applications intergrate and relate to each other
|
|
enterprise architecture
|
includes the plans for how an organization will build, deploy, use, and share its data, process, and IT assets
|
|
enterprise architect (EA)
|
person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business
|
|
real time information
|
immediate, up to date information
|
|
entity
|
in the relational database model is a person, place, thing, transaction, or event about which information is stored
|
|
primary key
|
a field (or group of fields) that uniquely identifies a given entity in a table
|
|
voive over IP (VoIP)
|
uses TCP/IP technology to transmit voice calls over long-distance telephone lines
|
|
telecommunication system
|
enables the transmission of data over public or private networks
|
|
local area network (LAN)
|
designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home
|
|
virtual provate network (VPN)
|
a way to use the public telecommuication infrastructure (e.g. internet) to provide secure access to an organizations network
|
|
network
|
a communications, data exchange, and resource-sharing systems created by linking two or more computers and establishing standards, or protocols, so that they can work together
|
|
production
|
the creation of goods and services using the factors of production: land, labor, capital, enterpreneurship, and knowledge
|
|
operation management (OM)
|
the management of systems or processes that convert or transform resources( including human resources)into goods and services
|
|
information technology (IT)
|
a field concerned with the use of technology in managing and processing information.
|
|
authentication
|
a method for confirming users identities
|
|
spam
|
unsolicited email
|
|
infrastructure architecture
|
includes the hardware,software and telecommunication equipment that when combined provide the underlying foundation to support the organization goals
|
|
Value added network (VAN)
|
A private nerwork, provided by a third party, for exchanging information through a high-capacity connection
|
|
Transformation Process
|
often referred to as the technical core especially in manufacturing organizations and is the actual conversion of imputs to outputs.
|
|
Strategic Planning
|
Focuses on long-range planning such as plant size, location , and type of process to be used.
|
|
Tactical Planning
|
Focuses on producing goods and services as efficiently as possible within the strategic plan.
|