Understanding Business Bonus Chapter B

Flashcard maker : Lily Taylor
Data Processing (DP)
name for business technology in the 1970s ; included technology that supported an existing business and was primarily used to improve the flow of financial imformation
Information Systems (IS)
technology that helps companies do business; includes such tools as automated teller machines and voice mail
Information Technology (IT)
technology that helps companies change business by allowing them to use new methods
Business Intelligence (BI)
any of a variety of software applications that analyze an organization’s raw data and take out useful insight from it
raw, unanalyzed, and unorganized facts and figures
processed and organized data that managers can use for decision making
Virtual Private Network
a private data network that creates secure connections, or “tunnels”, over regular Internet lines
a semiprivate network that uses internet technology and allows more than one company to access the same information or allows people on different servers to collaborate
a company wide network, closed to public access, that uses internet-type technology
Broadband Technology
technology that offers users a continuous connection to the internet and allows them to send and receive mammoth files that include voice, video, and data much faster than ever before
the private internet system that links government supercomputer centers and a select group of universities; it runs more than 22,000 times faster than today’s public infrastructure and supports heavy duty applications
Web 2.0
the set of tools that allow people to build social and business connections, share information, and collaborate on projects online (including blogs, wikis, social networking sites and other online communities, and virtual worlds)
Data Warehouse
stores data on a single subject over a specific period
Data Mining
a technique for looking for hidden patterns and previously unknown relationships among the data
overabundance of data
Network Computing System (or client/server computing)
computer systems that allow personal computers (clients) to obtain needed information from huge databases in a central computer
Thin Client Networks
resemble the ill tempered dumb terminals of the 1980s, but the execution is much better
a process that allows networked computers to run multiple operating systems and programs through one central computer at the same time
Cloud Computing
a form of virtualization in which a company’s data and applications are stored at offsite data centers that are accessed over the internet
software that is copyrighted but distributed to potential customers free of charge
Public Domain Software (Freeware)
Software that is free for the taking
a piece of programming code inserted into other programming to cause some unexpected and, for the victim, usually undesirable event
a scammer will embellish an email message with stolen logo for a well recognized brand such as eBay, Paypal, or Citibank that makes the message look authentic; when the victims click the link contained in the message, they are sent to a phony web stie that takes their personal information and uses it to commit fraud
hackers could shut down the entire communications, money supply, electricity, and transportation systems
pieces of information, such as registration data or user preferences, sent by a Web site over the internet to a Web browser that the browser software is expected to save and send back to the server whenever the user returns to that Web site
Enterprise Portal
centralizes information and transactions and serves as an entry point to a variety of resources, such as email, financial records, schedules, and employment and benefits files
corporate generated sites like Google and Amazon
human resource change, security threats, privacy concerns, stability
four effects of information technology on management
new class of mobile worker that is nearly autonomous, not in the office, doing business in their own time staff

Get instant access to
all materials

Become a Member