Java Games: Flashcards, matching, concentration, and word search.

CH 12 Test BP-Technology and Management

AB
CIO (Chief Information Officer)the top computer executive in most major organizations
Serverstore data and application software for the company’s PC workstations
hackerspeople who break into computer systems and steal, destroy, or alter information
unethicalfor online retailers to sell customers’ personal information without their knowledge would be considered
firewallscompanies use these to screen people who enter or exit a network
information overloadwhen companies struggle to effciently and effectively process information due to large amounts of information
data basea collection of data organized in a way that makes the data easy to find, update, and manage
DSS (Decision suuport system)A system that provides the ability to analyze “what if” scenarios
eye strain, back achesCommon complaints by workers who use computers for long periods of time
Ergonomic expertsstudy the relationships between people and machines
extranetbusinesses and supplier often use what type of system to access inventory information
informationData processed in a meaningful way
data miningprocess of using data in databases to find relationships between individuals and their behavior or preferences
the internetWorld Wide Web allowed common users to navigate what system
Moore's LawLaw forecasts that the amount of data that could be processed by a computer chip would double about every 18 months
CIOsmust protect and be knowledgable concerning their company's information
telecommunicationsrefers to the movement of information from one location to another electronically
serverA computer that stores data and application software for all PC workstations in a single building or building
extranetA private network that companies need in order to share selected information with selected people outside the organization
wristCarpal tunnel syndrome is a health problem related to what part of the body
biometric securityfinger print scanning, eye scanning are methods of
hacker proofthough firewalls can protect information they are not
1940sElectronic digital computers were developed in
1980sPersonal computers and software that allowed individuals to enter and process their own data were developed in
the internetData that are stored on the cloud reside on
the InternetSearch engines are used to locate information
informationData are used to create
information systemA computer system that processes data into meaningful information
WANA network of linked computers that covers a wide geographic area
web-hosting serviceA private business that maintains the websites of individuals and organizations on its computers
search engineA program that assists in locating information on networks
management information systemA system that integrates data from various departments to make it available to help managers with day-to-day business operations
executive information systemInformation system that combines and summarizes ongoing transactions within the company to provide top-level executives with information needed to make decisions affecting the goals and direction of an organization
LANNetwork of linked computers that serves users in a single building or building complex
dataOriginal facts and figures that businesses generate
knowledge workersPeople who work with information
VoIPUsing the Internet for telephone services


Marketing Education/DECA
Terre Haute South High School
IN

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities