Sunteți pe pagina 1din 10

CHAPTER 1 hardware: Computer equipment used to perform input,

processing, storage, and output activities.


data: Raw facts such as an employee number or total hours
worked in a week. software: The computer programs that govern the operation
of a particular computing device, be it desktop, laptop, tablet,
information: A collection of data organized and processed so
smartphone, or some other device.
that it has additional value beyond the value of the individual
facts. consumerization of IT: The trend of consumer technology
practices influencing the way business software is designed
process: A set of logically related tasks performed to achieve
and delivered.
a defined outcome.
database: An organized collection of facts and information,
knowledge: The awareness and understanding of a set of
typically consisting of two or more related data files.
information and the ways that information can be made
useful to support a specific task or reach a decision. data warehouse: A database that stores large amounts of
historical data in a form that readily supports analysis and
Process of transforming data into information: Transforming
management decision making.
data into information starts by selecting data, then organizing
it, and finally manipulating the data. extract-transform-load (ETL): The process by which raw data
is extracted from various sources, transformed into a format
information system (IS): A set of interrelated components
to support the analysis to be performed, and loaded into the
that collect, process, store, and disseminate data and
data warehouse.
information; an information system provides a feedback
mechanism to monitor and control its operation to make sure big data: A term used to describe data collections that are so
it continues to meet its goals and objectives. enormous (think petabytes or larger) and complex (from
sensor data to social media data) that traditional data
computer-based information system (CBIS): A single set of
management software, hardware, and analysis processes are
hardware, software, databases, networks, people, and
incapable of dealing with them.
procedures that are configured to collect, manipulate, store,
and process data into information. network: A group or system of connected computers and
equipment—in a room, building, campus, city, across the
technology infrastructure: All the hardware, software,
country, or around the world—that enables electronic
databases, networks, people, and procedures that are
communication.
configured to collect, manipulate, store, and process data
into information. Internet: The world’s largest computer network, consisting of
thousands of interconnected networks, all freely exchanging
Components of a computer-based information system:
information.
Hardware, software, networks, people, and procedures are
part of a business’s technology infrastructure. public cloud computing: A means of providing computing
services wherein a service provider organization owns and
procedure: A set of steps that need to be followed to achieve
manages the hardware, software, networking, and storage
a specific end result, such as enter a customer order, pay a
devices, with cloud user organizations (called tenants)
supplier invoice, or request a current inventory report.
accessing slices of shared resources via the Internet.
personal IS: An information system that improves the
World Wide Web (WWW): A network of links on the Internet
productivity of individual users in performing stand-alone
to files containing text, graphics, video, and sound.
tasks.
intranet: A network that enables communication,
group IS: An information system that improves
collaboration, search functions, and information sharing
communications and support collaboration among members
between the members of an organization’s team using a Web
of a workgroup.
browser.
enterprise IS: An information system that an organization
extranet: A network based on Web technologies that allows
uses to define structured interactions among its own
selected outsiders, such as business partners and customers,
employees and/or with external customers, suppliers,
to access authorized resources of a company’s intranet.
government agencies, and other business partners.
Internet of Things (IoT): A network of physical objects or
organizational complement: A key component that must be in
“things” embedded with sensors, processors, software, and
place to ensure successful implementation and use of an
network connectivity capability to enable them to exchange
information system.
data with the manufacturer of the device, device operators, knowledge management system (KMS): An organized
and other connected devices. collection of people, procedures, software, databases, and
devices that stores and retrieves knowledge, improves
Internet of Everything: A network that encompasses not only
collaboration, locates knowledge sources, captures and uses
machineto-machine but also people-to-people and people-to-
knowledge, or in some other way enhances the knowledge
machine connections.
management process.
e-commerce: Involves the exchange of money for goods and
project: A temporary endeavor undertaken to create a unique
services over electronic networks and encompasses many of
product, service, or result.
an organization’s outwardfacing processes—such as sales,
marketing, order taking, delivery, procurement of goods and system acquisition: The process used to obtain the
services, and customer service—that touch customers, information system resources needed to provide the services
suppliers, and other business partners. necessary to meet a specific set of needs.

mobile commerce (m-commerce): The buying and selling of open source software: Software that is distributed for free,
goods and/or services using a mobile device, such as a tablet, with access permitted to the source code so that it can be
smartphone, or other portable device. studied, changed, and improved by software professionals at
the various user organizations—with no maintenance
electronic business (e-business): The use of information
charges.
systems and networks to perform business-related tasks and
functions beyond those performed for e-commerce. system development: The activity of building information
systems to meet users’ needs.
transaction: Any business-related exchange such as a
payment to an employee, a sale to a customer, or a payment cybercriminal: A computer hacker who is motivated by the
to a supplier. potential for monetary gain; cybercriminals hack into
computer systems to steal, often by transferring money from
transaction processing system (TPS): An organized collection
one account to another or by stealing and reselling credit
of people, procedures, software, databases, and devices used
card numbers, personal identities, and financial account
to process and record business transactions.
information.
management information system: An organized collection of
cyberterrorism: The intimidation of a government or a civilian
people, procedures, software, databases, and devices that
population by using information technology to disable critical
provides routine information to managers and decision
national infrastructure (e.g., energy, transportation, financial,
makers.
law enforcement, emergency response) to achieve political,
information silo: An isolated information system not easily religious, or ideological goals.
capable of exchanging information with other information
ethics: A set of beliefs about right and wrong behavior.
systems.
Ethical behavior conforms to generally accepted social
enterprise resource planning (ERP) system: A system that norms—many of which are almost universally accepted.
supports an organization’s routine business processes,
Internet censorship: The control or suppression of the
maintains records about those processes, and provides
publishing or accessing of information on the Internet.
extensive reporting and data analysis capabilities.
digital divide: The gulf between those who do and those who
business intelligence (BI): A wide range of applications,
don’t have access to modern information and
practices, and technologies for the extraction,
communications technology such as smartphones, personal
transformation, integration, visualization, analysis,
computers, and the Internet.
interpretation, and presentation of data to support improved
decision making. net neutrality: The principle that Internet service providers
(ISPs) should be required to treat all Internet traffic running
business analytics: The extensive use of data and quantitative
over their wired and wireless broadband networks the
analysis to support fact-based decision making within
same— without favoring content from some sources and/or
organizations.
blocking or slowing (also known as throttling) content from
data scientist: A person who understands the business and others.
the business analytics technology, while also recognizing the
limitations of their data, tools, and techniques; a data
scientist puts all of this together to deliver real improvements
in decision making with an organization.
CHAPTER 2 soft side of implementing change: The work designed to help
employees embrace a new information system and way of
organization: A group of people that is structured and
working.
managed to meet its mission or set of group goals.
change management model: A description of the phases an
value chain: A series (chain) of activities that an organization
individual or organization goes through in making a change
performs to transform inputs into outputs in such a way that
and principles for successful implementation of change.
the value of the input is increased.
Lewin’s change model: A threestage approach for
supply chain: A key value chain whose primary activities
implementing change that involves unfreezing, moving, and
include inbound logistics, operations, outbound logistics,
refreezing.
marketing and sales, and service.
force field analysis: An approach to identifying both the
supply chain management (SCM): The management of all the
driving (positive) and restraining (negative) forces that
activities required to get the right product into the right
influence whether change can occur.
consumer’s hands in the right quantity at the right time and
at the right cost—from the identification of suppliers and the driving forces: The beliefs, expectations, and cultural norms
acquisition of raw materials through manufacture and that tend to encourage a change and give it momentum.
customer delivery.
restraining forces: Forces that make it difficult to accept a
virtual team: A group of individuals whose members are change or to work to implement a change.
distributed geographically, but who collaborate and complete
Leavitt’s diamond: An organizational change model that
work through the use of information systems.
proposes that every organizational system is made up of four
innovation: The application of new ideas to the products, main components—people, tasks, structure, and
processes, and activities of a firm, leading to increased value. technology—that all interact; any change in one of these
elements will necessitate a change in the other three
reengineering (process redesign/business process
elements.
reengineering, BPR): The radical redesign of business
processes, organizational structures, information systems, organizational learning: The adaptations and adjustments
and values of the organization to achieve a breakthrough in made within an organization based on experience and ideas
business results. over time.

continuous improvement: Constantly seeking ways to technology acceptance model (TAM): A model that specifies
improve business processes and add value to products and the factors that can lead to better attitudes about an
services. information system, along with higher acceptance and usage
of it.
outsourcing: A long-term business arrangement in which a
company contracts for services with an outside organization diffusion of innovation theory: A theory developed by E.M.
that has expertise in providing a specific function. Rogers to explain how a new idea or product gains
acceptance and diffuses (or spreads) through a specific
offshore outsourcing (offshoring): An outsourcing
population or subset of an organization.
arrangement where the organization providing the service is
located in a country different from the firm obtaining the shadow IT: The information systems and solutions built and
services. deployed by departments other than the information systems
department. In many cases, the information systems
downsizing: Reducing the number of employees to cut costs.
department may not even be aware of these efforts.
culture: A set of major understandings and assumptions
certification: A process for testing skills and knowledge;
shared by a group, such as within an ethnic group or a
successful completion of a certification exam results in a
country.
statement by the certifying authority that confirms an
organizational culture: The major understandings and individual is capable of performing particular tasks.
assumptions for a business, corporation, or other
organization.

organizational change: How forprofit and nonprofit


organizations plan for, implement, and handle change.
CHAPTER 3 main memory: The component of a computer that provides
the CPU with a working storage area for program instructions
central processing unit (CPU): The part of a computer that
and data.
sequences and executes instructions.
byte (B): Eight bits that together represent a single character
memory: A component of the computer that provides the
of data.
processor with a working storage area to hold program
instructions and data. random access memory (RAM): A form of memory in which
instructions or data can be temporarily stored.
input/output device: A computer component that provides
data and instructions to the computer and receives results cache memory: A type of highspeed memory that a processor
from it. can access more rapidly than main memory.

bus: A set of electronic circuits used to route data and read-only memory (ROM): A nonvolatile form of memory.
instructions to and from the various components of a
secondary storage: A device that stores large amounts of
computer.
data, instructions, and information more permanently than
clock speed: A series of electronic pulses produced at a allowed with main memory
predetermined rate that affects machine cycle time.
magnetic tape: A type of sequential secondary storage
gigahertz (GHz): A unit of frequency that is equal to one medium, now used primarily for storing backups of critical
billion cycles per second; a measure of clock speed. organizational data in the event of a disaster.

instruction set architecture (ISA): A basic set of commands hard disk drive (HDD): A direct access storage device used to
(opcodes) that the processor can execute. store and retrieve data from rapidly rotating disks coated
with magnetic material.
processor family: A set of processors from the same
manufacturer that have similar features and capabilities. redundant array of independent/inexpensive disks (RAID): A
method of storing data that generates extra bits of data from
multiprocessing: The simultaneous execution of two or more
existing data, allowing the system to create a “reconstruction
instructions at the same time.
map” so that if a hard drive fails, the system can rebuild lost
coprocessor: The part of the computer that speeds data.
processing by executing specific types of instructions while
virtual tape: A storage device for less frequently needed data.
the CPU works on another processing activity.
With virtual tape systems, data appears to be stored entirely
multicore processor: A microprocessor that has two or more on tape cartridges, although some parts of it might actually
independent processing units, called cores, which are capable be located on faster hard disks.
of sequencing and executing instructions.
optical storage device: A form of data storage that uses lasers
parallel computing: The simultaneous execution of the same to read and write data.
task on multiple processors to obtain results faster.
compact disc read-only memory (CD-ROM): A common form
massively parallel processing system: A system that speeds of optical disc on which data cannot be modified once it has
processing by linking hundreds or thousands of processors to been recorded.
operate at the same time, or in parallel, with each processor
digital video disc (DVD): A form of optical disc storage that
having its own bus, memory, disks, copy of the operating
looks like a CD but that can store more data and access it
system, and applications.
more quickly.
grid computing: The use of a collection of computers, often
Solid state storage device (SSD): A storage device that stores
owned by multiple individuals or organizations, that work in a
data in memory chips rather than on hard disk drives or
coordinated manner to solve a common problem.
optical media.
integrated circuit (IC): A set of electronic circuits on one small
network-attached storage (NAS): A hard disk drive storage
piece of semiconductor material, normally silicon.
device that is set up with its own network address and
semiconductor fabrication plant: A factory where integrated provides file-based storage services to other devices on the
circuits are manufactured; also called a fab or a foundry. network.

storage area network (SAN): A high-speed, special-purpose


network that integrates different types of data storage
devices (e.g., hard disk drives, magnetic tape, solid state e-book: The digital media equivalent of a conventional
secondary storage devices) into a single storage system and printed book.
connects that to computing resources across an entire
portable computer: A computer small enough to carry easily.
organization.
wearable computer: An electronic device capable of storing
policy-based storage management: The automation of
and processing data that is incorporated into a person’s
storage using previously defined policies.
clothing or personal accessories.
storage as a service: A data storage model where a data
laptop: A personal computer designed for use by mobile
storage service provider rents space to individuals and
users, being small and light enough to sit comfortably on a
organizations.
user’s lap
data entry: Converting humanreadable data into a machine-
tablet: A portable, lightweight computer with no keyboard
readable form.
that allows you to roam the office, home, or factory floor
data input: Transferring machinereadable data into the carrying the device like a clipboard.
system.
thin client: A low-cost, centrally managed computer with no
source data automation: Capturing and editing data where it internal or external attached drives for data storage.
is initially created and in a form that can be directly entered
desktop computer: A nonportable computer that fits on a
into a computer, thus ensuring accuracy and timeliness.
desktop and provides sufficient computing power, memory,
speech-recognition technology : Input devices that recognize and storage for most business computing tasks.
human speech.
nettop: A very small, inexpensive desktop computer typically
magnetic stripe card: A type of card that stores a limited used for Internet access, email, accessing Web-based
amount of data by modifying the magnetism of tiny iron- applications, document processing, and audio/video
based particles contained in a band on the card. playback.

smart card: A credit card embedded with a computer chip workstations: A more powerful personal computer used for
that contains key consumer and account data; smart card mathematical computing, computer-assisted design, and
users must either enter their PIN (chip-and-PIN) or sign (chip- other high-end processing but still small enough to fit on a
and-sign) for each transaction to be approved. desktop.

contactless payment card: A card with an embedded chip that server: A computer employed by many users to perform a
only needs to be held close to a terminal to transfer its data; specific task, such as running network or Internet
no PIN number needs to be entered. applications.

point-of-sale (POS) device: A device used to enter data into a scalability: The ability to increase the processing capability of
computer system. a computer system so that it can handle more users, more
data, or more transactions in a given period.
radio frequency identification (RFID): A technology that
employs a microchip with an antenna to broadcast its unique mainframe computer: A large, powerful computer often
identifier and location to receivers. shared by hundreds of concurrent users connected to the
machine over a network.
computer graphics card: A component of a computer that
takes binary data from the CPU and translates it into an supercomputers: The most powerful computer systems with
image you see on your display device. the fastest processing speeds.

graphics processing unit (GPU): A powerful processing chip server farm: A facility that houses a large number of servers
that renders images on the screen display in the same room, where access to the machines can be
controlled and authorized support personnel can more easily
bioprinting: The use of 3D printers to build human parts and
manage and maintain the servers.
organs from actual human cells.
virtual server: A method of logically dividing the resources of
digital audio player: A device that can store, organize, and
a single physical server to create multiple logical servers, each
play digital music files.
acting as its own dedicated machine.
MP3: A standard format for compressing a sound sequence
container: A way for software developers and hardware
into a small file.
managers to package applications and software components
into a well-defined, compact envelope that can be used to user interface: The element of the operating system that
more easily manage it, including moving it across various allows people to access and interact with the computer
hosts. system.

blade server: A server that houses many individual computer command-based user interface: A user interface that requires
motherboards that include one or more processors, you to give text commands to the computer to perform basic
computer memory, computer storage, and computer activities.
network connections.
graphical user interface (GUI): An interface that displays
data center: A climateand-access-controlled building or a set pictures (icons) and menus that people use to send
of buildings that houses the computer hardware that delivers commands to the computer system.
an organization’s data and information services.
application programming interface (API): A set of
green computing: A program concerned with the efficient and programming instructions and standards that enables one
environmentally responsible design, manufacture, operation, software program to access and use the services of another
and disposal of IS-related products. software program.

Electronic Product Environmental Assessment Tool (EPEAT): A hardware independence: The ability of a software program to
system that enables purchasers to evaluate, compare, and run on any platform, without concern for the specific
select electronic products based on a set of environmental underlying hardware.
criteria.
embedded system: A computer system (including some sort
CHAPTER 4 of processor) that is implanted in and dedicated to the
control of another device.
system software: Software that includes operating systems,
utilities, and middleware that coordinate the activities and utility program: A program that helps to perform
functions of the hardware and other programs throughout maintenance or correct problems with a computer system.
the computer system.
middleware: Software that allows various systems to
application software: Programs that help users solve communicate and exchange data.
particular computing problems.
enterprise application integration (EAI): The systematic tying
sphere of influence: The scope of the problems and together of disparate applications so that they can
opportunities that the software addresses. communicate.

personal sphere of influence: The sphere of influence that service-oriented architecture (SOA): A software design
serves the needs of an individual user. approach based on the use of discrete pieces of software
(modules) to provide specific functions as services to other
personal productivity software: Software that enables users
applications.
to improve their personal effectiveness, increasing the
amount of work and quality of work they can do. rich Internet application (RIA): A Web-delivered application
combines hardware resources of the Web server and the PC
workgroup: Two or more people who work together to
to deliver valuable software services through a Web browser
achieve a common goal.
interface.
workgroup sphere of influence: The sphere of influence that
proprietary software: Oneof-a-kind software designed for a
helps workgroup members attain their common goals.
specific application and owned by the company, organization,
enterprise sphere of influence: The sphere of influence that or person that uses it.
serves the needs of an organization in its interactions with its
off-the-shelf software: Software produced by software
environment.
vendors to address needs that are common across
operating system (OS): A set of computer programs that businesses, organizations, or individuals.
controls the computer hardware and acts as an interface to
Software as a Service (SaaS): A service that allows businesses
application software.
to subscribe to Web-delivered application software.
kernel: The heart of the operating system that controls the
software suite: A collection of programs packaged together
most critical processes of the OS.
and sold in a bundle.
workgroup application software: Software that supports data model: A diagram of data entities and their
teamwork, whether team members are in the same location relationships.
or dispersed around the world.
enterprise data model: A data model that provides a
programming languages: Sets of keywords, commands, roadmap for building database and information systems by
symbols, and rules for constructing statements by which creating a single definition and format for data that can
humans can communicate instructions to a computer. ensure data compatibility and the ability to exchange and
integrate data among systems.
syntax: A set of rules associated with a programming
language. entity-relationship (ER) diagram: A data model that uses basic
graphical symbols to show the organization of and
compiler: A special software program that converts the
relationships between data.
programmer’s source code into the machine-language
instructions, which consist of binary digits. relational database model: A simple but highly useful way to
organize data into collections of two-dimensional tables
single-user license: A software license that permits you to
called relations.
install the software on one or more computers, used by one
person. domain: The range of allowable values for a data attribute.

CHAPTER 5 selecting: Manipulating data to eliminate rows according to


certain criteria.
database: A well-designed, organized, and carefully managed
collection of data. projecting: Manipulating data to eliminate columns in a table.

database management system (DBMS): A group of programs joining: Manipulating data to combine two or more tables.
used to access and manage a database as well as provide an
linking: The ability to combine two or more tables through
interface between the database and its users and other
common data attributes to form a new table with only the
application programs.
unique data attributes.
bit: A binary digit (i.e., 0 or 1) that represents a circuit that is
Data cleansing (data cleaning or data scrubbing): The process
either on or off.
of detecting and then correcting or deleting incomplete,
character: A basic building block of most information, incorrect, inaccurate, or irrelevant records that reside in a
consisting of uppercase letters, lowercase letters, numeric database.
digits, or special symbols.
SQL: A special-purpose programming language for accessing
field: Typically a name, a number, or a combination of and manipulating data stored in a relational database.
characters that describes an aspect of a business object or
ACID properties: Properties (atomicity, consistency, isolation,
activity.
durability) that guarantee relational database transactions
record: A collection of data fields all related to one object, are processed reliably and ensure the integrity of data in the
activity, or individual. database.

file: A collection of related records. schema: A description that defines the logical and physical
structure of the database by identifying the tables, the fields
hierarchy of data: Bits, characters, fields, records, files, and
in each table, and the relationships between fields and tables.
databases.
data definition language (DDL): A collection of instructions
entity: A person, place, or thing for which data is collected,
and commands used to define and describe data and
stored, and maintained.
relationships in a specific database.
attribute: A characteristic of an entity.
data dictionary: A detailed description of all the data used in
data item: The specific value of an attribute. the database.

primary key: A field or set of fields that uniquely identifies the concurrency control: A method of dealing with a situation in
record. which two or more users or applications need to access the
same record at the same time.
database approach to data management: An approach to
data management where multiple information systems share data manipulation language (DML): A specific language,
a pool of related data. provided with a DBMS, which allows users to access and
modify the data, to make queries, and to generate reports.
database administrators (DBAs): Skilled and trained IS Hadoop Distributed File System (HDFS): A system used for
professionals who hold discussions with business users to data storage that divides the data into subsets and distributes
define their data needs; apply database programming the subsets onto different servers for processing.
languages to craft a set of databases to meet those needs;
MapReduce program: A composite program that consists of a
test and evaluate databases; implement changes to improve
Map procedure that performs filtering and sorting and a
the performance of databases; and assure that data is secure
Reduce method that performs a summary operation.
from unauthorized access.
in-memory database (IMDB): A database management
data administrator: An individual responsible for defining and
system that stores the entire database in random access
implementing consistent principles for a variety of data
memory (RAM).
issues.
CHAPTER 6
database as a service (DaaS): An arrangement where the
database is stored on a service provider’s servers and computer network: The communications media, devices, and
accessed by the service subscriber over a network, typically software connecting two or more computer systems or
the Internet, with the database administration handled by devices.
the service provider.
communications medium: Any material substance that carries
data management: An integrated set of functions that defines an electronic signal to support communications between a
the processes by which data is obtained, certified fit for use, sending and a receiving device.
stored, secured, and processed in such a way as to ensure
that the accessibility, reliability, and timeliness of the data network topology: The shape or structure of a network,
meet the needs of the data users within an organization. including the arrangement of the communication links and
hardware devices on the network.
data governance: The core component of data management;
it defines the roles, responsibilities, and processes for star network: A network in which all network devices connect
ensuring that data can be trusted and used by the entire to one another through a single central device called the hub
organization, with people identified and in place who are node.
responsible for fixing and preventing issues with data.
bus network: A network in which all network devices are
data steward: An individual responsible for the management connected to a common backbone that serves as a shared
of critical data elements, including identifying and acquiring communications medium.
new data sources; creating and maintaining consistent
mesh network: A network that uses multiple access points to
reference data and master data definitions; and analyzing
link a series of devices that speak to each other to form a
data for quality and reconciling data issues.
network connection across a large area.
data lifecycle management (DLM): A policy-based approach
personal area network (PAN): A network that supports the
to managing the flow of an enterprise’s data, from its initial
interconnection of information technology devices close to
acquisition or creation and storage to the time when it
one person.
becomes outdated and is deleted.
local area network (LAN): A network that connects computer
data mart: A subset of a data warehouse that is used by
systems and devices within a small area, such as an office,
small- and medium-sized businesses and departments within
home, or several floors in a building.
large companies to support decision making.
metropolitan area network (MAN): A network that connects
data lake (enterprise data hub): A “store everything”
users and their computers in a geographical area that spans a
approach to big data that saves all the data in its raw and
campus or city.
unaltered form.
wide area network (WAN): A network that connects large
NoSQL database: A way to store and retrieve data that is
geographic regions.
modeled using some means other than the simple two
dimensional tabular relations used in relational databases. client/server architecture: An approach to computing
wherein multiple computer platforms are dedicated to
Hadoop: An open-source software framework including
special functions, such as database management, printing,
several software modules that provide a means for storing
communications, and program execution.
and processing extremely large data sets.
channel bandwidth: The rate at which data is exchanged,
usually measured in bits per second (bps).
broadband communications: High-speed Internet access that hyperlink: Highlighted text or graphics in a Web document
is always on and that is faster than traditional dial-up access. that, when clicked, opens a new Web page containing related
content.
wireless communication: The transfer of information
between two or more points that are not connected by an Web browser: Web client software— such as Chrome, Edge,
electrical conductor. Firefox, Internet Explorer, and Safari—used to view Web
pages.
near field communication (NFC): A very short-range wireless
connectivity technology that enables two devices placed Hypertext Markup Language (HTML): The standard page
within a few inches of each other to exchange data. description language for Web pages.

Bluetooth: A wireless communications specification that tag: A code that tells the Web browser how to format text—
describes how cell phones, computers, faxes, printers, and as a heading, as a list, or as body text—and whether images,
other electronic devices can be interconnected over distances sound, and other elements should be inserted.
of 10 to 30 feet at a rate of about 2 Mbps.
Extensible Markup Language (XML): The markup language
Wi-Fi: A medium-range wireless communications technology designed to transport and store data on the Web.
brand owned by the Wi-Fi Alliance.
Cascading Style Sheet (CSS): A markup language for defining
Long Term Evolution (LTE): A standard for wireless the visual design of a Web page or group of pages.
communications for mobile phones based on packet
Web 2.0: The Web as a computing platform that supports
switching.
software applications and the sharing of information among
network operating system (NOS): Systems software that users.
controls the computer systems and devices on a network and
search engine: A valuable tool that enables you to find
allows them to communicate with each other.
information on the Web by specifying words that are key to a
network-management software: Software that enables a topic of interest, known as keywords.
manager on a networked desktop to monitor the use of
search engine optimization (SEO): A process for driving traffic
individual computers and shared hardware (such as printers),
to a Web site by using techniques that improve the site’s
scan for viruses, and ensure compliance with software
ranking in search results.
licenses.
Instant messaging: The online, real-time communication
mobile device management (MDM) software: Software that
between two or more people who are connected via the
manages and troubleshoots mobile devices remotely, pushing
Internet
out applications, data, patches, and settings while enforcing
group policies for security. Web log (blog): A Web site that people and businesses use to
share their observations, experiences, and opinions on a wide
software-defined networking (SDN): An emerging approach
range of topics.
to networking that allows network administrators to have
programmable central control of the network via a controller podcast: An audio broadcast you can listen to over the
without requiring physical access to all the network devices. Internet.
Internet Protocol (IP): A communication standard that content streaming: A method for transferring large media
enables computers to route communications traffic from one files over the Internet so that the data stream of voice and
network to another as needed. pictures plays more or less continuously as the file is being
downloaded.
Internet backbone: One of the Internet’s high-speed, long-
distance communications links. virtual private network (VPN): A secure connection between
two points on the Internet; VPNs transfer information by
IP address: A 64-bit number that identifies a computer on the
encapsulating traffic in IP packets and sending the packets
Internet.
over the Internet.
Uniform Resource Locator (URL): A Web address that
cloud computing: A computing environment where software
specifies the exact location of a Web page using letters and
and storage are provided as an Internet service and are
words that map to an IP address and a location on the host.
accessed with a Web browser.
Internet service provider (ISP): Any organization that provides
infrastructure as a service (IaaS): An information systems
Internet access to people.
strategy in which an organization outsources the equipment
used to support its data processing operations, including digital certificate: An attachment to an email message or data
servers, storage devices, and networking components. embedded in a Web site that verifies the identity of a sender
or Web site.
platform as a service (PaaS): An approach that provides users
with a computing platform, typically including operating certificate authority (CA): A trusted third-party organization
system, programming language execution environment, or company that issues digital certificates.
database services, and Web server.
Transport Layer Security (TLS): A communications protocol or
private cloud environment: A single tenant cloud. system of rules that ensures privacy between communicating
applications and their users on the Internet.
hybrid cloud: A cloud computing environment is composed of
both private and public clouds integrated through electronic cash: An amount of money that is computerized,
networking. stored, and used as cash for e-commerce transactions.

autonomic computing: The ability of IT systems to manage p-card (procurement card or purchasing card): A credit card
themselves and adapt to changes in the computing used to streamline the traditional purchase order and invoice
environment, business policies, and operating objectives. payment processes.

CHAPTER 7

business-to-business (B2B) e-commerce: A subset of e-


commerce in which all the participants are organizations.

business-to-consumer (B2C) e-commerce: A form of e-


commerce in which customers deal directly with an
organization and avoid intermediaries.

consumer-to-consumer (C2C) e-commerce: A subset of e-


commerce that involves electronic transactions between
consumers using a third party to facilitate the process.

e-government: The use of information and communications


technology to simplify the sharing of information, speed
formerly paper-based processes, and improve the
relationship between citizens and government.

identity theft: The use of someone’s personal identification


information without his or her permission, often to commit
fraud or other crimes.

electronic exchange: An electronic forum where


manufacturers, suppliers, and competitors buy and sell
goods, trade market information, and run back-office
operations.

market segmentation: The identification of specific markets


to target them with tailored advertising messages.

storefront broker: A company that acts as an intermediary


between your Web site and online merchants who have the
products and retail expertise.

meta tag: An HTML code, not visible on the displayed Web


page, that contains keywords representing your site’s
content, which search engines use to build indexes pointing
to your Web site.

personalization: The process of tailoring Web pages to


specifically target individual consumers.

S-ar putea să vă placă și