logo image

Chapter 7 Information Tech in Business

Broadband Technology
Technology that offers users a continuous connection to the Internet and allows them to send and receive mammoth files that include voice, video, and data much faster than ever before.
Cookies
Piece of information, such as registration data or user preferences, sent by a Web site over the Internet to a Web browser that the browser software is expected to save and send back to the server whenever the user returns to that Web site.
Data
Raw, un-analyzed, and unorganized facts and figures.
Data Mining
Looking for hidden patterns in the data in a data warehouse and discovering relationships among the data.
Data Processing
The name given to business technology in the 1970’s. Its primary purpose was to improve the flow of financial information.
Data Warehouse
An electronic storage place for data on a specific subject (such as sales) over a period of time.
E-business
Any electronic business data exchange using any electronic device.
E-commerce
The buying and selling of goods over the Internet.
Extranet
A semiprivate network that uses Internet technology and allows more than one company to access the same information or allows people on different servers to collaborate.
Firewall
Hardware or software that prevents outsiders from accessing information a user does not want others to see.
Hackers
People who unlawfully break into computer systems.
Infoglut
The phenomenon of information overload in business.
Information
The processed and organized data that can be used for managerial decision making.
Information Systems (IS)
The name give to business technology in the 1980’s. Its role changed from supporting the business to doing business.
Information Technology (IT)
The name given to business technology in the 1980s. Its role changed from supporting the business to doing business.
Instant Messaging (IM)
Allows business professionals to communicate in real time, for free, via computer.
Internet 2
The private Internet system that links government supercomputer centers and a select group of universities; it runs more than 22,000 times faster than today’s public infrastructure and supports heavy-duty applications.
Portal
An entry point onto a Web site.
Public Domain Software (freeware)
Software that is free for the taking.
Shareware
Software that is copyrighted buy distributed to potential customers free of charge.
Software
A set of programs and procedures used to operate a computer and perform specific tasks with the computer.
Unencrypted
An encryption is a secret code given to information when it is passing through the Internet; An unencrypted piece of data can be seen by anyone; it is not secure.
Virtual Private Network (VPN)
A private data network that creates secure connections, or “tunnels”, over regular Internet lines.
Virtualization
A process that allows networked computers to run multiple operating systems and programs through one central computer at the same time.
Virus
A harmful piece of programmed code inserted into other programming to cause an unexpected and usually undesirable event.
Web 2.0
The set of tools that allow people to build social and business connections, shrae information, and collaborate on projects online (including blogs, wikis, social networking sites and other online communities, and virtual worlds).
Wireless Fidelty (Wi-Fi)
The technology used to obtain an Internet connection without having to connect to a phone or cable line.
Wireless Networking
Refers to the ability of a computer or device to transport signals through the air.

Need essay sample on "Chapter 7 Information Tech in Business"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy