Chapter 13 Flashcards
information technology (IT)
various appliances and devices for creating, storing, exchanging, and using information in diverse modes, including visual images, voice, multimedia, and business data
e-commerce
use of the internet and other electronic means for retailing and business-to-business transactions
mass-customization
principle in which companies produce in large volumes, but each unit features the unique options the customer prefers
internet
gigantic system of interconnected computers - more than 100 million computers in over 100 countries
hypertext transfer protocol (HTTP)
communications protocol used for the world wide web, in which related pieces of information on separate web pages are connected using hyperlinks
world wide web
branch of the internet consisting of interlinked hypertext documents, or web pages
simple message transfer protocol (SMTP)
basic communications protocol used to send email
post office protocol (POP)
one of the basic communications protocols used to receive email
intranet
organization’s private network of internally linked web sites accessible only to employees
extranet
system that allows outsiders limited access to a firm’s internal information network
electronic conferencing
IT that allows groups of people to communicate simultaneously from various locations via email, phone, or video
VSAT satellite communications
network of geographically dispersed transmitter-receivers (transceivers) that send signals to and receive signals from a satellite exchange voice, video, and data transmission
computer network
group of two or more computers linked together by some form of cabling or by wireless technology to share data or resources, such as a printer
client-server network
common business network in which clients make requests for information or resources, such as a printer
wide area network (WAN)
computers that are linked over long distances through telephone lines, microwave signals, or satellite communications
local area network (LAN)
computers that are linked in a small area, such as all of a firm’s computers within a single building
wireless wide area network (WWAN)
network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances
wi-fi
technology using a wireless local area network
wireless local area network
local area network with wireless access points for PC users
hardware
physical components of a computer network, such as keyboards, monitors, system units, and printers
software
programs that tell the computer’s hardware what resources to use and how to use them
information system (IS)
system that uses IT resources to convert data into information and to collect, process, and transmit that information for use in decision making
data
raw facts and figures that, by themselves, may not have much meaning
information
meaningful, useful interpretation of data
information systems managers
managers who operate they systems used for gathering, organizing, and distributing information
data warehousing
the collection, storage, and retrieval of data in electronic files
data mining
the application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information
knowledge information system
information system that supports knowledge workers by providing resources to create, store, use, and transmit new knowledge for useful applications
computer-aided design (CAD)
IS with software that helps knowledge workers design products by simulating them and displaying them in three-dimensional graphics
management information system (MIS)
computer system that supports managers by providing information - reports, schedules, plans, and budgets - that can be used for making decisions
decision support system (DSS)
interactive system that creates virtual business models for a particular kind of decision and tests them with different data to see how they respond
hacker
cybercriminal who gains unauthorized access to a computer or network, either to steal information, money, or property or to tamper with data
identity theft
unauthorized use of personal information (such as Social Security number and address) to get loans, credit cards, or other monetary benefits by impersonating the victim
intellectual property
something produced by the intellect or mind that has commercial value
spyware
program unknowingly downloaded by users that monitors their computer activities, gathering email addresses, credit card numbers, and other information that it transmits to someone outside the host system
spam
junk email sent to a mailing list or a newspaper
firewall
security system with special software or hardware devices designed to keep computers safe from hackers
anti-virus software
product that protects systems by searching incoming emails and data files for ‘signatures’ of known viruses and virus-like characteristics
encryption system
software that assigns an email message to a unique code number (digital fingerprint) for computer so only that computer, not others, can open and read the message