Business Chapter 16

hardware

the physical tools and equipment used to collect, input, store, organize, and process data and to distribute information

software

programs that provide instructions to a computer so that is can perform a desired task

system software

software that performs the critical functions necessary to operate the computer at the most basic level

applications software

software that helps a user perform a desired task

internet

the world's largest computer network; essentially a network of computer networks all operating under a common set of rules that allow them to communicate with each other

broadband internet connection

an internet connection that is capable of transmitting large amounts of information very quickly

internet2 [12]

a new high-tech internet with access limited to a consortium of member organizations (and other organizations these members sponsor). 12 utilizes technologies that give it a speed and capacity far exceeding the current internet

intranet

a private network that has the look and feel of the internet and is navigated using a web browser, but which limits access to a single firm's employees (or a single organization's members)

extranet

an intranet that allows limited access to a selected group of stakeholders, such as suppliers or customers

cloud computing

the use internet-based storage capacity, processing power, and computer applications to supplement or replace internally owned information technology resources

data

raw, unprocessed facts and figures

information

data that have been processed in a way that makes them meaningful to their user

database

a file consisting of related data organized according to a logical system and stored on a hard drive or other computer-accessible media

decision support system (DSS)

a system that gives managers access to large amounts of data and the processing power to convert these data into high-quality information, thus improving the decision-making process

business intelligence system

a sophisticated form of decision support system that helps decision makers discover information that was previously hidden

data warehouse

a large, organization-wide database that stores data in a centralized location

data mining

the use of sophisticated statistical and mathematical techniques to analyze data and discover hidden patterns and relationships among data, thus creating valuable information

expert system [ES]

a decision support system that helps managers make better decisions in an area where they lack expertise

e-commerce

the marketing, buying, selling, and servicing of products over a network (usually the internet)

business-to-consumer [B2C] e-commerce

e-commerce in which businesses and final consumers interact

business-to-business [B2B] e-commerce

e-commerce in markets where businesses buy from and sell to other businesses

Web 2.0

websites that incorporate interactive and collaborative features in order to create a richer, more interesting, and more useful experience for their users

viral marketing

an internet marketing strategy that tries to involve customers and others not employed by the seller in activities that help promote the product

cybermediary

an internet-based firm that specializes in the secure electronic transfer of funds

electronic bill presentment and payment

a method of bill payment that makes it easy for the customer to make a payment, often by simply clicking on a payment option contained in an email

e-marketplace

a specialized internet site where buyers and sellers engaged in business to business e-commerce can communicate and conduct business

radio frequency identification [RFID]

a technology that stores information on small microchips that can transmit the information when they are within range of a special reader

malware

a general term for malicious software, such as spyware, computer viruses, and worms

spyware

software that is installed on a computer without the user's knowledge or permission for the purpose of tracking the user's behavior

computer virus

computer software that can be spread from one computer to another without the knowledge or permission of the computer users by attaching itself to emails or other files

worm

malicious computer software that, unlike viruses, can spread on its own without being attached to other files