A | B |
CIO (Chief Information Officer) | the top computer executive in most major organizations |
Server | store data and application software for the company’s PC workstations |
hackers | people who break into computer systems and steal, destroy, or alter information |
unethical | for online retailers to sell customers’ personal information without their knowledge would be considered |
firewalls | companies use these to screen people who enter or exit a network |
information overload | when companies struggle to effciently and effectively process information due to large amounts of information |
data base | a collection of data organized in a way that makes the data easy to find, update, and manage |
DSS (Decision suuport system) | A system that provides the ability to analyze “what if” scenarios |
eye strain, back aches | Common complaints by workers who use computers for long periods of time |
Ergonomic experts | study the relationships between people and machines |
extranet | businesses and supplier often use what type of system to access inventory information |
information | Data processed in a meaningful way |
data mining | process of using data in databases to find relationships between individuals and their behavior or preferences |
the internet | World Wide Web allowed common users to navigate what system |
Moore's Law | Law forecasts that the amount of data that could be processed by a computer chip would double about every 18 months |
CIOs | must protect and be knowledgable concerning their company's information |
telecommunications | refers to the movement of information from one location to another electronically |
server | A computer that stores data and application software for all PC workstations in a single building or building |
extranet | A private network that companies need in order to share selected information with selected people outside the organization |
wrist | Carpal tunnel syndrome is a health problem related to what part of the body |
biometric security | finger print scanning, eye scanning are methods of |
hacker proof | though firewalls can protect information they are not |
1940s | Electronic digital computers were developed in |
1980s | Personal computers and software that allowed individuals to enter and process their own data were developed in |
the internet | Data that are stored on the cloud reside on |
the Internet | Search engines are used to locate information |
information | Data are used to create |
information system | A computer system that processes data into meaningful information |
WAN | A network of linked computers that covers a wide geographic area |
web-hosting service | A private business that maintains the websites of individuals and organizations on its computers |
search engine | A program that assists in locating information on networks |
management information system | A system that integrates data from various departments to make it available to help managers with day-to-day business operations |
executive information system | Information system that combines and summarizes ongoing transactions within the company to provide top-level executives with information needed to make decisions affecting the goals and direction of an organization |
LAN | Network of linked computers that serves users in a single building or building complex |
data | Original facts and figures that businesses generate |
knowledge workers | People who work with information |
VoIP | Using the Internet for telephone services |