Chapter B,10,11 Flashcards
Name for business technology in the 1970s; primarily used to iprove the flow of financial information
Data Processing
An electronic storage file for information
Databases
Technology that helps companies do business; includes ATMs and voice mail.
Information Systems
The use of data analytic tools to analyze an organization’s raw data and derive useful insights from them
Business Intelligence
Define RADAR test
A framework used to evaluate sources and reference information:
Relevance
Authority
Date
Accuracy
Reputability
The process of collecting, organizing, storing, and analyzing large sets of data (“big data”) in order to identify patterns and other information that is useful to the business now and for making future decisions.
Data Analytics
Characteristics that makes information useful:
Quality
Completeness
Timeliness
Relevance
A company wide network, closed to public access, that uses internet-type technology
Intranet
a technique for looking for hidden patterns and unknown relationships in the data.
Data mining
A semiprivate network that allows more than one company to access the same information or allows people on different services to collaborate
Extranet
a private data network that creates secure connections, or”tunnels”, over regulate internet lines
VPN (Virtual Private Network)
The set of tools that allow people to build social and business connections, share information, and
Web 2.0
LAN
WAN
Technology used to store, retrieve, and send information efficiently.
Information Technology (IT)
An electronic storage file for information.
database
A combination of technologies that adds intelligence and changes how people interact with the web, and vice versa (consists of the semantic web, mobile web, and immersive Internet).
Web 3.0
A form of virtualization in which a company’s data and applications are stored at offsite data centers that are accessed over the Internet (the cloud).
Cloud computing
The private Internet system that links government supercomputer centers and a select group of universities; it runs more than 22,000 times faster than today’s public infrastructure and supports heavy-duty applications.
Internet2
The obtaining of individuals’ personal information, such as Social Security and credit card numbers, for illegal purposes.
Identity theft
A piece of programming code inserted into other programming to cause some unexpected and, for the victim, usually undesirable event.
virus
The personal satisfaction you feel when you perform well and complete goals.
intrinsic reward
Something given to you by someone else as recognition for good work
extrinsic reward
Studying workers to find the most efficient ways of doing things and then teaching people those techniques.
scientific management
The tendency for people to behave differently when they know they are being studied.
Hawthorne effect
a job enrichment strategy that involves combining a series of tasks into one challenging and interesting assignment
Job enlargement
a job enrichment strategy that involves moving employees from one job to another
Job rotation
Involves a cycle of discussion, review, and evaluation of objectives among top and middle-level managers, supervisors, and employees
Management by Objectives (MBO)
The idea that setting ambitious but attainable goals can motivate workers and improve performance if the goals are:
Goal Setting Theory
The amount of effort employees exert on a specific task depends on their expectations of the outcome.
Expectancy Theory