Term
|
Definition
| The various appliances and devices for creating, storing, exchanging, and using information in diverse modes, including visual images, voice, multimedia, and business data. |
|
|
Term
|
Definition
| The use of the internet and other electronic means for retailing and business to business tranctions. |
|
|
Term
|
Definition
| A gigantic system of interconnected computers of more than 100 million computer in over 100 countries. |
|
|
Term
|
Definition
| A standardized code for accessing informtion and transmitting data over the internet. |
|
|
Term
|
Definition
| Portable offices, better service, efficient organizations. |
|
|
Term
|
Definition
| Private internal information networks accessible only by employees. |
|
|
Term
|
Definition
| Allow outsiders limited access to internal information networks. |
|
|
Term
|
Definition
| Allows groups of people to communicate simultaneously from various locations via email, phone, or video. |
|
|
Term
| VSAT Satellite Communications |
|
Definition
| Satellite-based private network for voice, video, and data transmissions. |
|
|
Term
|
Definition
| A group of two more computers linked together by some form of cabling or by wireless technology to share data or resources such as a printer. |
|
|
Term
|
Definition
| The laptop or desktop computers through which users make requests for information or resources. |
|
|
Term
|
Definition
| The computers that provide the services shared by users. |
|
|
Term
|
Definition
| Computers linked over long distances. |
|
|
Term
|
Definition
| Computers linked in a smaller area. |
|
|
Term
|
Definition
| Use airborne electronic signals to link computers and devices. |
|
|
Term
|
Definition
| An access point that forms its own small network. |
|
|
Term
|
Definition
| A wireless local area network. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| System software, application software, & groupware |
|
|
Term
|
Definition
|
|
Term
|
Definition
| The meaningful useful interpretation of data. |
|
|
Term
|
Definition
| A system that uses IT resources and enables managers to turn data into information for use in decision making. |
|
|
Term
| Information System Managers |
|
Definition
| Operarte the systems used for gathering, organizing, and distributing information. |
|
|
Term
|
Definition
| The collection, storage, and retrieval of data in electronic files. |
|
|
Term
|
Definition
| The application of electronic technologies for searching, sifting, and reorganizing pools of datat to uncover useful information. |
|
|
Term
| Information Systems for Knowledge Workers |
|
Definition
| Provides resources to create, store, use, and transmit new knowledge for useful applications. |
|
|
Term
| Information Systems for Managers |
|
Definition
| Provide reports, schedules, plans, and budgets that can then be used for making decisons. |
|
|
Term
|
Definition
| Interactive systems that create virtual business models and test them with different data to see how they respond. |
|
|
Term
|
Definition
| Cyber criminals who gain unauthorized access to a compute r or network either to steal information, money, property or to tamper with data. |
|
|
Term
|
Definition
| Stealing of personal information to get loans, credit cards, or other monetary benefits by impersonating the victim. |
|
|
Term
| Intellectual Property Theft |
|
Definition
| Theft of a product of the mind- something produced by the intellect, with great expenditure of human effort- that has commercial value. |
|
|
Term
| Computer Viruses, Worms, & Trojan Horses |
|
Definition
| Malicious programs that once installed can shut down a computer system. |
|
|
Term
|
Definition
| Software that tranmits stolen personal information. |
|
|
Term
|
Definition
| Widely broadcast, unsolicited email. |
|
|
Term
|
Definition
| Security systems with special software or hardware devices designed to keep computers safe from hackers. |
|
|
Term
| Components for filtering messages |
|
Definition
| Security policy and Router |
|
|
Term
| Preventing Identity Theft |
|
Definition
| Fair and Accurate Credit Transaction Act of 2005 |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Works by locking an email message to a unique code number for each computer only that computer can open and read the message. |
|
|
Term
| Avoiding Spam and Spyware |
|
Definition
| Anti-spyware software & CAN-SPAM Act of 2006 |
|
|