Level 144 Level 146
Level 145

Information Technology for Business


40 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
information Technology
the various applications and devices for creating, storing, exchanging, and using information in diverse modes
E-Commerce
buying and selling goods and services through the Internet
mass-customization
building your own at different price levels
Internet
A global network connecting millions of computers, making it possible to exchange information.
hypertext transfer protocol and the world wide web
a branch of the Internet consisting of interlinked hypertext documents
used to send and receive email
simple message transfer protocol and post office protocol
intranets
private internets that are accessible to only employees and may contain confidential information on benefits on programs, etc
extranets
allow outsiders limited access to a firm's internal access to a firm's internal information network
electronic conferencing
allows groups of people to communicate simultaneously from various locations via email, phone, or video
VSAT satellite communications
have transmitter-receiver that sits outdoors with a direct line of sight to a satellite
computer network
a group of two or more computers linked together, either hardwired or wirelessly to share data or resources from a printer
client-server network
the most common type of network
wide area networks
computers that are linked over long distances, statewide or even nationwide through telephone lines, microwave signals or satellite communications
local area networks
computers linked in a smaller area such as an office or building
wireless wide area networks
more than 100 service providers such as Cellular One, T-Mobile and Vodafone in over 40 countries
Wi-Fi
hot spot or internet access point
wireless local area network
the network that Wi-Fi runs on
Hardware
All of the physical devices that collectively constitute the item we think of as a desktop or a laptop computer
Software
a collection of computer programs that tell the computer how to perform a particular task
IS
information system
data
Business __________ theft involves stealing proprietary business INFORMATION such as research for a new drug or a list of customers that competitors are eager to acquire.
Information
Data converted into a meaningful and useful context
Information Systems managers
operate the systems used for gathering, organizing, and distributing information
data warehousing
the goldmine of information about their business
Data Mining
__________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
knowledge information systems
provide resources to create, store, use, and transmit new knowledge for useful applications
computer aided design
helps knowledge workers and ordinary people design products
management information system
a computer system that supports managers by providing information, reports, schedules, plans, and budgets that can be used for making decisions
Decision Support System
An interactive, flexible computerized information system that enables managers to obtain and manipulate information as they are making decisions
hacker
cybercriminal who gains unauthorized access to a computer or network either to steal information, money, or property or to tamper with data
identity theft
unauthorized use of personal information to get loans, credit cards, or other monetary benefits by impersonating the victim
intellectual property
anything produced by the creative process of the human mind
spyware
program unknowingly downloaded by users that monitors their computer activities gathering email, addresses, credit card and other information that transmits to someone outside the host system
Spam
junk email send to a mailing list or a newsgroup
Firewall
(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers
anti-virus software
product that protects systems by searching incoming emails and data files for signatures of known viruses
encryption system
software that assigns an email message to a unique code number (usually digital finger printing) for each computer so only that computer, not others can open and read the message
World Wide Web
a collection of electronic files linked together
Super Wi-Fi Network
a powerful Wi-Fi network with extensive reach & strong signals that flow freely through physical object such as walls
Computer-Aided Manufacturing
IS that uses computers to design & control equipment in a manufacturing process