Chapter 13 Flashcards

1
Q

information technology (IT)

A

various appliances and devices for creating, storing, exchanging, and using information in diverse modes, including visual images, voice, multimedia, and business data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

e-commerce

A

use of the internet and other electronic means for retailing and business-to-business transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

mass-customization

A

principle in which companies produce in large volumes, but each unit features the unique options the customer prefers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

internet

A

gigantic system of interconnected computers - more than 100 million computers in over 100 countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hypertext transfer protocol (HTTP)

A

communications protocol used for the world wide web, in which related pieces of information on separate web pages are connected using hyperlinks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

world wide web

A

branch of the internet consisting of interlinked hypertext documents, or web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

simple message transfer protocol (SMTP)

A

basic communications protocol used to send email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

post office protocol (POP)

A

one of the basic communications protocols used to receive email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

intranet

A

organization’s private network of internally linked web sites accessible only to employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

extranet

A

system that allows outsiders limited access to a firm’s internal information network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

electronic conferencing

A

IT that allows groups of people to communicate simultaneously from various locations via email, phone, or video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VSAT satellite communications

A

network of geographically dispersed transmitter-receivers (transceivers) that send signals to and receive signals from a satellite exchange voice, video, and data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

computer network

A

group of two or more computers linked together by some form of cabling or by wireless technology to share data or resources, such as a printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

client-server network

A

common business network in which clients make requests for information or resources, such as a printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

wide area network (WAN)

A

computers that are linked over long distances through telephone lines, microwave signals, or satellite communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

local area network (LAN)

A

computers that are linked in a small area, such as all of a firm’s computers within a single building

17
Q

wireless wide area network (WWAN)

A

network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances

18
Q

wi-fi

A

technology using a wireless local area network

19
Q

wireless local area network

A

local area network with wireless access points for PC users

20
Q

hardware

A

physical components of a computer network, such as keyboards, monitors, system units, and printers

21
Q

software

A

programs that tell the computer’s hardware what resources to use and how to use them

22
Q

information system (IS)

A

system that uses IT resources to convert data into information and to collect, process, and transmit that information for use in decision making

23
Q

data

A

raw facts and figures that, by themselves, may not have much meaning

24
Q

information

A

meaningful, useful interpretation of data

25
Q

information systems managers

A

managers who operate they systems used for gathering, organizing, and distributing information

26
Q

data warehousing

A

the collection, storage, and retrieval of data in electronic files

27
Q

data mining

A

the application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information

28
Q

knowledge information system

A

information system that supports knowledge workers by providing resources to create, store, use, and transmit new knowledge for useful applications

29
Q

computer-aided design (CAD)

A

IS with software that helps knowledge workers design products by simulating them and displaying them in three-dimensional graphics

30
Q

management information system (MIS)

A

computer system that supports managers by providing information - reports, schedules, plans, and budgets - that can be used for making decisions

31
Q

decision support system (DSS)

A

interactive system that creates virtual business models for a particular kind of decision and tests them with different data to see how they respond

32
Q

hacker

A

cybercriminal who gains unauthorized access to a computer or network, either to steal information, money, or property or to tamper with data

33
Q

identity theft

A

unauthorized use of personal information (such as Social Security number and address) to get loans, credit cards, or other monetary benefits by impersonating the victim

34
Q

intellectual property

A

something produced by the intellect or mind that has commercial value

35
Q

spyware

A

program unknowingly downloaded by users that monitors their computer activities, gathering email addresses, credit card numbers, and other information that it transmits to someone outside the host system

36
Q

spam

A

junk email sent to a mailing list or a newspaper

37
Q

firewall

A

security system with special software or hardware devices designed to keep computers safe from hackers

38
Q

anti-virus software

A

product that protects systems by searching incoming emails and data files for ‘signatures’ of known viruses and virus-like characteristics

39
Q

encryption system

A

software that assigns an email message to a unique code number (digital fingerprint) for computer so only that computer, not others, can open and read the message