Term
|
Definition
The various appliances and devices for creating, storing, exchanging, and using information in diverse modes, including visual images, voice, multimedia, and business data. |
|
|
Term
|
Definition
The use of the internet and other electronic means for retailing and business to business tranctions. |
|
|
Term
|
Definition
A gigantic system of interconnected computers of more than 100 million computer in over 100 countries. |
|
|
Term
|
Definition
A standardized code for accessing informtion and transmitting data over the internet. |
|
|
Term
|
Definition
Portable offices, better service, efficient organizations. |
|
|
Term
|
Definition
Private internal information networks accessible only by employees. |
|
|
Term
|
Definition
Allow outsiders limited access to internal information networks. |
|
|
Term
|
Definition
Allows groups of people to communicate simultaneously from various locations via email, phone, or video. |
|
|
Term
VSAT Satellite Communications |
|
Definition
Satellite-based private network for voice, video, and data transmissions. |
|
|
Term
|
Definition
A group of two more computers linked together by some form of cabling or by wireless technology to share data or resources such as a printer. |
|
|
Term
|
Definition
The laptop or desktop computers through which users make requests for information or resources. |
|
|
Term
|
Definition
The computers that provide the services shared by users. |
|
|
Term
|
Definition
Computers linked over long distances. |
|
|
Term
|
Definition
Computers linked in a smaller area. |
|
|
Term
|
Definition
Use airborne electronic signals to link computers and devices. |
|
|
Term
|
Definition
An access point that forms its own small network. |
|
|
Term
|
Definition
A wireless local area network. |
|
|
Term
|
Definition
|
|
Term
|
Definition
System software, application software, & groupware |
|
|
Term
|
Definition
|
|
Term
|
Definition
The meaningful useful interpretation of data. |
|
|
Term
|
Definition
A system that uses IT resources and enables managers to turn data into information for use in decision making. |
|
|
Term
Information System Managers |
|
Definition
Operarte the systems used for gathering, organizing, and distributing information. |
|
|
Term
|
Definition
The collection, storage, and retrieval of data in electronic files. |
|
|
Term
|
Definition
The application of electronic technologies for searching, sifting, and reorganizing pools of datat to uncover useful information. |
|
|
Term
Information Systems for Knowledge Workers |
|
Definition
Provides resources to create, store, use, and transmit new knowledge for useful applications. |
|
|
Term
Information Systems for Managers |
|
Definition
Provide reports, schedules, plans, and budgets that can then be used for making decisons. |
|
|
Term
|
Definition
Interactive systems that create virtual business models and test them with different data to see how they respond. |
|
|
Term
|
Definition
Cyber criminals who gain unauthorized access to a compute r or network either to steal information, money, property or to tamper with data. |
|
|
Term
|
Definition
Stealing of personal information to get loans, credit cards, or other monetary benefits by impersonating the victim. |
|
|
Term
Intellectual Property Theft |
|
Definition
Theft of a product of the mind- something produced by the intellect, with great expenditure of human effort- that has commercial value. |
|
|
Term
Computer Viruses, Worms, & Trojan Horses |
|
Definition
Malicious programs that once installed can shut down a computer system. |
|
|
Term
|
Definition
Software that tranmits stolen personal information. |
|
|
Term
|
Definition
Widely broadcast, unsolicited email. |
|
|
Term
|
Definition
Security systems with special software or hardware devices designed to keep computers safe from hackers. |
|
|
Term
Components for filtering messages |
|
Definition
Security policy and Router |
|
|
Term
Preventing Identity Theft |
|
Definition
Fair and Accurate Credit Transaction Act of 2005 |
|
|
Term
|
Definition
|
|
Term
|
Definition
Works by locking an email message to a unique code number for each computer only that computer can open and read the message. |
|
|
Term
Avoiding Spam and Spyware |
|
Definition
Anti-spyware software & CAN-SPAM Act of 2006 |
|
|