Key Concepts in Information Technology and Ebusiness

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 95

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

96 Terms

1

Information Age

Period where information drives businesses and economic activities, primarily through technology.

New cards
2

Data

Raw facts with no meaning (e.g., 50, $20).

New cards
3

Information

Processed data with meaning (e.g., 50 items sold for $20 each).

New cards
4

Knowledge

Applying information to make decisions (e.g., Based on sales, we need more stock).

New cards
5

Threat of Substitute Products

Risk that customers switch to alternative products/services.

New cards
6

Threat of New Entrants

Risk of new competitors entering the market.

New cards
7

Supplier Power

Ability of suppliers to drive up prices.

New cards
8

Buyer Power

Ability of customers to drive prices down.

New cards
9

Rivalry Among Existing Competitors

Competition among existing companies.

New cards
10

Cost Leadership

Offering the lowest prices (Walmart).

New cards
11

Differentiation

Offering unique products/services (Apple).

New cards
12

Focused Strategy

Targeting a niche market (Rolex watches).

New cards
13

Operational Systems

Handle day-to-day business processes (Point of Sale systems).

New cards
14

Managerial Systems

Support middle management in decision-making (Reports, summaries).

New cards
15

Strategic Systems

Help senior executives make strategic decisions (Forecasting software).

New cards
16

Artificial Intelligence (AI)

Simulation of human intelligence in machines.

New cards
17

Expert Systems

Imitate human decision-making.

New cards
18

Neural Networks

Pattern recognition (e.g., Fraud detection).

New cards
19

Robotics

Perform human tasks (e.g., Warehouse robots).

New cards
20

Disruptive Technology

Creates a new market, replacing an old one (Streaming services like Netflix).

New cards
21

Sustaining Technology

Improves existing products without disrupting the market (New iPhone models).

New cards
22

Impact of Internet

Disrupted traditional businesses like newspapers, cable, and retail.

New cards
23

Web 1.0

Static web pages, read-only content, limited interaction.

New cards
24

Ebusiness Advantages

Global reach, Reduced costs, Improved customer service.

New cards
25

Email

Communication through digital messages.

New cards
26

Clickstream Data

Tracks website visitors' browsing patterns.

New cards
27

Asynchronous Communication

Communication that does not require real-time interaction (email, forum).

New cards
28

B2B (Business to Business)

Selling products between businesses.

New cards
29

B2C (Business to Consumer)

Selling products to individual customers.

New cards
30

C2C (Consumer to Consumer)

Individuals sell to other individuals (eBay).

New cards
31

C2B (Consumer to Business)

Individuals offer products to businesses (freelance).

New cards
32

Ebusiness Challenges

Security issues, Privacy concerns, Lack of personal interaction.

New cards
33

Web 2.0

User-generated content, collaboration, social media.

New cards
34

Key Characteristics of Web 2.0

Collaboration, Sharing, Dynamic content.

New cards
35

Social Media

Platforms for user interaction (Facebook, Twitter).

New cards
36

Blogs

Web logs for personal or professional content.

New cards
37

Wikis

Collaborative websites where users contribute (Wikipedia).

New cards
38

Privacy

Protection of personal information.

New cards
39

Intellectual Property

Ownership of ideas and creative work.

New cards
40

Pirated Software

Unauthorized copies of software.

New cards
41

Hackers

People who gain unauthorized access to systems.

New cards
42

Virus

Malicious software that can spread and damage systems.

New cards
43

Authentication

Verifying identity (password, fingerprint).

New cards
44

Authorization

Granting access to resources based on identity.

New cards
45

Public Key Encryption

Secure communication by encrypting data.

New cards
46

Basic Operation of Public Key Encryption

Uses a public key to encrypt and a private key to decrypt.

New cards
47

Input Devices

Devices that input data (keyboard, mouse).

New cards
48

Output Devices

Devices that display/output data (monitor, printer).

New cards
49

Storage Devices

Devices for data storage (hard drive, USB).

New cards
50

Processing Devices

Devices that process data (CPU).

New cards
51

Moore's Law

The number of transistors on a chip doubles every 18 months, decreasing the cost and increasing performance.

New cards
52

Primary Storage

Temporary storage, fast access (RAM).

New cards
53

Secondary Storage

Long-term storage (hard drive, SSD).

New cards
54

System Software

Manages hardware (operating systems).

New cards
55

Application Software

Performs specific tasks (Microsoft Word, Excel).

New cards
56

Utility Software

Maintains and protects the system (antivirus, firewall).

New cards
57

Antivirus

Software to protect against malware.

New cards
58

Artificial

Relating to AI (Artificial Intelligence).

New cards
59

Asynchronous

Communication not in real-time.

New cards
60

Clickstream

Data tracking user website activity.

New cards
61

Communication

Sharing information.

New cards
62

Cookie

Data stored by websites in your browser.

New cards
63

Decision

Process of making choices.

New cards
64

Disruptive

Technology that alters markets.

New cards
65

Downtime

Period when systems are unavailable.

New cards
66

Email

Electronic mail communication.

New cards
67

Encryption

Securing data by converting it to code.

New cards
68

Ethics

Principles guiding behavior.

New cards
69

Expert

A person with specialized knowledge.

New cards
70

Firewall

Security system to protect networks.

New cards
71

Gigahertz

Measurement of processing speed.

New cards
72

Hoaxes

False alarms or scams.

New cards
73

Human

Relating to people.

New cards
74

Information

Processed data with meaning.

New cards
75

Knowledge

Applied information for decision-making.

New cards
76

Managerial

Related to middle management.

New cards
77

Multitasking

Performing multiple tasks simultaneously.

New cards
78

Niche

Small, specialized market.

New cards
79

Open Source

Software with freely available code.

New cards
80

Operational

Related to day-to-day operations.

New cards
81

People

Individuals who use technology.

New cards
82

Pirated

Stolen or illegally copied.

New cards
83

Profitability

Earning more than expenses.

New cards
84

Property

Something owned.

New cards
85

Random Access Memory (RAM)

Temporary storage for quick access.

New cards
86

Security

Protecting data and systems.

New cards
87

Social Media

Platforms for online interaction.

New cards
88

Software

Programs used by a computer.

New cards
89

Spam

Unwanted emails or messages.

New cards
90

Spyware

Software that secretly gathers data.

New cards
91

Strategic

High-level planning for future goals.

New cards
92

Supply Chain

Network to produce/deliver products.

New cards
93

Transaction

Business exchange or operation.

New cards
94

Virus

Malicious software that spreads.

New cards
95

Viruses

Plural form of virus.

New cards
96

Worm

Malware that replicates itself.

New cards
robot