| A | B |
| CIO (Chief Information Officer) | the top computer executive in most major organizations |
| Server | store data and application software for the company’s PC workstations |
| hackers | people who break into computer systems and steal, destroy, or alter information |
| unethical | for online retailers to sell customers’ personal information without their knowledge would be considered |
| firewalls | companies use these to screen people who enter or exit a network |
| information overload | when companies struggle to effciently and effectively process information due to large amounts of information |
| data base | a collection of data organized in a way that makes the data easy to find, update, and manage |
| DSS (Decision suuport system) | A system that provides the ability to analyze “what if” scenarios |
| eye strain, back aches | Common complaints by workers who use computers for long periods of time |
| Ergonomic experts | study the relationships between people and machines |
| extranet | businesses and supplier often use what type of system to access inventory information |
| information | Data processed in a meaningful way |
| data mining | process of using data in databases to find relationships between individuals and their behavior or preferences |
| the internet | World Wide Web allowed common users to navigate what system |
| Moore's Law | Law forecasts that the amount of data that could be processed by a computer chip would double about every 18 months |
| CIOs | must protect and be knowledgable concerning their company's information |
| telecommunications | refers to the movement of information from one location to another electronically |
| server | A computer that stores data and application software for all PC workstations in a single building or building |
| extranet | A private network that companies need in order to share selected information with selected people outside the organization |
| wrist | Carpal tunnel syndrome is a health problem related to what part of the body |
| biometric security | finger print scanning, eye scanning are methods of |
| hacker proof | though firewalls can protect information they are not |
| 1940s | Electronic digital computers were developed in |
| 1980s | Personal computers and software that allowed individuals to enter and process their own data were developed in |
| the internet | Data that are stored on the cloud reside on |
| the Internet | Search engines are used to locate information |
| information | Data are used to create |
| information system | A computer system that processes data into meaningful information |
| WAN | A network of linked computers that covers a wide geographic area |
| web-hosting service | A private business that maintains the websites of individuals and organizations on its computers |
| search engine | A program that assists in locating information on networks |
| management information system | A system that integrates data from various departments to make it available to help managers with day-to-day business operations |
| executive information system | Information system that combines and summarizes ongoing transactions within the company to provide top-level executives with information needed to make decisions affecting the goals and direction of an organization |
| LAN | Network of linked computers that serves users in a single building or building complex |
| data | Original facts and figures that businesses generate |
| knowledge workers | People who work with information |
| VoIP | Using the Internet for telephone services |