Key Concepts in Information Technology and Ebusiness

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:33 PM on 3/11/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

96 Terms

1
New cards

Information Age

Period where information drives businesses and economic activities, primarily through technology.

2
New cards

Data

Raw facts with no meaning (e.g., 50, $20).

3
New cards

Information

Processed data with meaning (e.g., 50 items sold for $20 each).

4
New cards

Knowledge

Applying information to make decisions (e.g., Based on sales, we need more stock).

5
New cards

Threat of Substitute Products

Risk that customers switch to alternative products/services.

6
New cards

Threat of New Entrants

Risk of new competitors entering the market.

7
New cards

Supplier Power

Ability of suppliers to drive up prices.

8
New cards

Buyer Power

Ability of customers to drive prices down.

9
New cards

Rivalry Among Existing Competitors

Competition among existing companies.

10
New cards

Cost Leadership

Offering the lowest prices (Walmart).

11
New cards

Differentiation

Offering unique products/services (Apple).

12
New cards

Focused Strategy

Targeting a niche market (Rolex watches).

13
New cards

Operational Systems

Handle day-to-day business processes (Point of Sale systems).

14
New cards

Managerial Systems

Support middle management in decision-making (Reports, summaries).

15
New cards

Strategic Systems

Help senior executives make strategic decisions (Forecasting software).

16
New cards

Artificial Intelligence (AI)

Simulation of human intelligence in machines.

17
New cards

Expert Systems

Imitate human decision-making.

18
New cards

Neural Networks

Pattern recognition (e.g., Fraud detection).

19
New cards

Robotics

Perform human tasks (e.g., Warehouse robots).

20
New cards

Disruptive Technology

Creates a new market, replacing an old one (Streaming services like Netflix).

21
New cards

Sustaining Technology

Improves existing products without disrupting the market (New iPhone models).

22
New cards

Impact of Internet

Disrupted traditional businesses like newspapers, cable, and retail.

23
New cards

Web 1.0

Static web pages, read-only content, limited interaction.

24
New cards

Ebusiness Advantages

Global reach, Reduced costs, Improved customer service.

25
New cards

Email

Communication through digital messages.

26
New cards

Clickstream Data

Tracks website visitors' browsing patterns.

27
New cards

Asynchronous Communication

Communication that does not require real-time interaction (email, forum).

28
New cards

B2B (Business to Business)

Selling products between businesses.

29
New cards

B2C (Business to Consumer)

Selling products to individual customers.

30
New cards

C2C (Consumer to Consumer)

Individuals sell to other individuals (eBay).

31
New cards

C2B (Consumer to Business)

Individuals offer products to businesses (freelance).

32
New cards

Ebusiness Challenges

Security issues, Privacy concerns, Lack of personal interaction.

33
New cards

Web 2.0

User-generated content, collaboration, social media.

34
New cards

Key Characteristics of Web 2.0

Collaboration, Sharing, Dynamic content.

35
New cards

Social Media

Platforms for user interaction (Facebook, Twitter).

36
New cards

Blogs

Web logs for personal or professional content.

37
New cards

Wikis

Collaborative websites where users contribute (Wikipedia).

38
New cards

Privacy

Protection of personal information.

39
New cards

Intellectual Property

Ownership of ideas and creative work.

40
New cards

Pirated Software

Unauthorized copies of software.

41
New cards

Hackers

People who gain unauthorized access to systems.

42
New cards

Virus

Malicious software that can spread and damage systems.

43
New cards

Authentication

Verifying identity (password, fingerprint).

44
New cards

Authorization

Granting access to resources based on identity.

45
New cards

Public Key Encryption

Secure communication by encrypting data.

46
New cards

Basic Operation of Public Key Encryption

Uses a public key to encrypt and a private key to decrypt.

47
New cards

Input Devices

Devices that input data (keyboard, mouse).

48
New cards

Output Devices

Devices that display/output data (monitor, printer).

49
New cards

Storage Devices

Devices for data storage (hard drive, USB).

50
New cards

Processing Devices

Devices that process data (CPU).

51
New cards

Moore's Law

The number of transistors on a chip doubles every 18 months, decreasing the cost and increasing performance.

52
New cards

Primary Storage

Temporary storage, fast access (RAM).

53
New cards

Secondary Storage

Long-term storage (hard drive, SSD).

54
New cards

System Software

Manages hardware (operating systems).

55
New cards

Application Software

Performs specific tasks (Microsoft Word, Excel).

56
New cards

Utility Software

Maintains and protects the system (antivirus, firewall).

57
New cards

Antivirus

Software to protect against malware.

58
New cards

Artificial

Relating to AI (Artificial Intelligence).

59
New cards

Asynchronous

Communication not in real-time.

60
New cards

Clickstream

Data tracking user website activity.

61
New cards

Communication

Sharing information.

62
New cards

Cookie

Data stored by websites in your browser.

63
New cards

Decision

Process of making choices.

64
New cards

Disruptive

Technology that alters markets.

65
New cards

Downtime

Period when systems are unavailable.

66
New cards

Email

Electronic mail communication.

67
New cards

Encryption

Securing data by converting it to code.

68
New cards

Ethics

Principles guiding behavior.

69
New cards

Expert

A person with specialized knowledge.

70
New cards

Firewall

Security system to protect networks.

71
New cards

Gigahertz

Measurement of processing speed.

72
New cards

Hoaxes

False alarms or scams.

73
New cards

Human

Relating to people.

74
New cards

Information

Processed data with meaning.

75
New cards

Knowledge

Applied information for decision-making.

76
New cards

Managerial

Related to middle management.

77
New cards

Multitasking

Performing multiple tasks simultaneously.

78
New cards

Niche

Small, specialized market.

79
New cards

Open Source

Software with freely available code.

80
New cards

Operational

Related to day-to-day operations.

81
New cards

People

Individuals who use technology.

82
New cards

Pirated

Stolen or illegally copied.

83
New cards

Profitability

Earning more than expenses.

84
New cards

Property

Something owned.

85
New cards

Random Access Memory (RAM)

Temporary storage for quick access.

86
New cards

Security

Protecting data and systems.

87
New cards

Social Media

Platforms for online interaction.

88
New cards

Software

Programs used by a computer.

89
New cards

Spam

Unwanted emails or messages.

90
New cards

Spyware

Software that secretly gathers data.

91
New cards

Strategic

High-level planning for future goals.

92
New cards

Supply Chain

Network to produce/deliver products.

93
New cards

Transaction

Business exchange or operation.

94
New cards

Virus

Malicious software that spreads.

95
New cards

Viruses

Plural form of virus.

96
New cards

Worm

Malware that replicates itself.