Chapter 13 Flashcards
Information Technology (IT)
includes the equipment and techniques used to manage and process information
Chief Information Officer (CIO)
is responsible for managing all information resources; immense important responsibility
Knowledge Worker
develop or use knowledge; contribute to and benefit from information they use to perform planning, acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions
Trading Hubs; E-Marketplace
facilitate electronic commerce between businesses in specific industries
Electronic Barter
auction and exchange of goods
Management Information Systems
methods and equipments that provide information about all aspects of a firm’s operations
Database
an electronic filing system that collects and organizes data and information
Database Management System (DBMS)
quickly and easily enter, store, organize, select, and retrieve data in a database
Enterprise Resource Planning systems (ERP)
bring together human resources, operations, and technology
Computer Network
is a group of two or more computer systems linked together by communications channels to share data; information networks include clients and servers
Enterprise Software
large programs with integrated modules that manages all of the company’s internal operations
Local Area Network (LAN)
lets people at one site exchange data and share the use of software and hardware from a variety of computer manufacturers
Wide Area Network (WAN)
connects computers at different sites via telecommunications media such as phone lines, satellites, and microwaves; Internet
Modem
connects the computer or a terminal to the telephone line and transmits data almost instantly, in less than a second
Wireless Wide Area Networks (WWAN)
used by telecommunications
Wireless Local Area Networks (WLAN)
radius of 500ft indoors and 1,000ft outdoors can be extended with antennas, transmitters, and other devices; Wi-Fi
Intranet
private corporate networks; operates behind a firewall that prevents unauthorized access
Enterprise Portal
an internal website that provides proprietary corporate information to a defined user group
Virtual Private Networks (VPN)
connects two or more private networks over a public network
Application Service Providers (ASP)
provides Enterprise applications, collaborative applications, and applications for personal use
Managed Service Providers (MSP)
represents the next generation of ASPs, offers greater customization and expanded capabilities that include business processes and complete management of the network servers
Management Information Systems
users, hardware, and software that support decision-making
Management Support Systems (MSS)
a dynamic system that allows users to analyze data to make forecasts, identify business trends, and model business strategies; uses the internal master database to perform high-tech analysis
Transaction Processing System (TPS)
receives raw data from internal and external sources and prepares these data for storage in a database similar to a microcomputer database but vastly larger
Batch Processing
where data are collected over some time period and then processed together
Online, real-time, Processing
processes data as soon as they become available
Data Warehouse
combines many databases across the whole company into one central database that supports management decision-making
Data Marts
special subsets of a data warehouse that each deal with a single area of data
Information Reporting System
uses summary data collected by the TPS to produce both regularly scheduled and special reports
Decision Support System (DSS)
helps managers make decisions using interactive computer models that describe real-world processes
Executive Information Systems (EIS)
customized for an individual executive; provide specific information for strategic decisions
Expert System
gives managers advice similar to what they would get from a human consultant
Knowledge Management (KM)
focuses on researching, gathering, organizing, and sharing an organization’s collective knowledge to improve productivity, foster innovation, and gain a competitive advantage
Key Logging Software
copies and transmits a users keystrokes form selected sites to thieves
Viruses
destory the contents of a computers hard drive or damage files
Worm
spreads itself automatically from computer to computer ; doesn’t require email replicate and transmits itself into other systemsn
Trojan Horse
programs that look harmless and legitimate and trick the user into installing them; do no infect other files or self-replicate
Piracy
using software without a license takes revenue away from the company that developed the program
Firewall
hardware or software designed to prevent unauthorized access to or from a private network
Data Mining
sophisticated database applications that look for hidden patterns in a group of data
Digital Forensics
digital evidence taken from an individual’s computer or corporate networks - web pages, documents, email, pictures
Digital Forensics Software
safeguards electronic evidence used in investigations by creating a duplicate of a hard drive that an investigator can search by keywords, file type, or access date
Grid/Cloud Computing (Utility or Peer-to-Peer Computing)
provides a way to divide the job into many smaller tasks and dispute them to a virtual supercomputer consisting of many small computers linked into a common network