• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/34

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back
hardware
refers to the physical components used to collect, input, store, organize, and process data and to distribute information
software
programs that provide instructions to a computer so that it can perform a desired task
system software
performs critical functions necessary to operate a computer at the most basic level
applications software
software that helps users perform a desired task
internet
the worlds largest computer network, operating under a common set of rules so that they can communicate with each other
internet 2 I2
new high tech internet restricted to due paying members of a consortium, give it a speed far exceeding the internet
intranet
same as internet except it is confined to a single firms internal web severs and available only to that firms employees
extranets
allows limited access to selected group of stakeholders such as suppliers and key customers
cloud computing
going beyond a companies firewall to store data and run applications using internet based resources
data
the facts and figures a firm collects
information
processed, organized, and presented in a way that makes them useful to a decision maker
databases
files of related data organization according to a logical system and stored on hard drives or some other computer accessible storage media
decision support systems
give managers access to large amounts of data and the processing power to convert the data into high quality information quickly and efficiently
business intelligence systems
help businesses discover subtle and complex relationships hidden in their data
data warehouse
very large, organization wide database that provides a centralized location for storing data from both the organizations own databases and external sources
data mining
powerful statistical and mathematical techniques to analyze the vast amounts of data in a data warehouse to identify useful information that has been hidden
expert system
guides the manager through the decision making process
e commerce
usage of the internet to facilitate the exchange of goods and services
B2C ecommerce
business connect with final consumers
B2B e commerce
businesses buy from other and sell to other businesses
web 2.0
approach to e commerce that emphasizes interactive and collaborative websites in order to develop consumer loyalty and create more value
viral marketing
attempts to get customers to communicate a firms message to friends, family, and colleagues
cybermediary
an internet based company that specializes in the secure electronic transfer of funds
electronic bill presentment and payment
bills are sent to the customers email
e marketplace
specialized internet sites where many buyers and sellers in a specific B2B market can exchange information and buy and sell goods and services
radio frequency identification
stores info on small microchips than can transmit the info anytime they are within a range of a special reader
spyware
software that installs itself on your computer without permission and then tracks our computer in some way
computer viruses
small programs that install themselves on computers without the users knowledge or permission and spread from one computer to another
spam
unsolicited email advertisements sent to a mass number of people whether they are interested or not
Phishing
official looking documents that try to divulge private information like passwords, usernames and account numbers
pharming
like phishing, using fake websites to get secret information from someone
hackers
skilled computer users who have the expertise to gain unauthorized access to other peoples computers
firewalls
important tool to guard against hackers and other security threats
intellectual property
refer to the products that result from creative and intellectual efforts