Site MapHelpFeedbackKey Terms Quiz
Key Terms Quiz
(See related pages)


Match the following term to its definition.
1


information technology (IT)

2


business intelligence (BI)

3


intranet

4


extranet

5


virtual private network (VPN)

6


broadband technology

7


Internet2

8


Web 2.0

9


network computing system (client/server computing)

10


virtualization

11


cloud computing

12


shareware

13


public domain software (freeware)

14


telecommuting (telework)

15


virus

16


phishing

A)A private data network that creates secure connections, or "tunnels," over regular Internet lines.
B)Technology that offers users a continuous connection to the Internet and allows users to send and receive mammoth files that include voice, video, and data much faster than ever before.
C)A piece of programming code inserted into other programming to cause some unexpected and, for the victim, usually undesirable event.
D)Technology that helps companies change business by allowing them to use new methods.
E)Computer systems that allow personal computers (clients) to obtain needed information from huge databases in a central computer (the server).
F)A companywide network, closed to public access, that uses Internettype technology.
G)A semiprivate network that uses Internet technology and allows more than one company to access the same information or allows people on different servers to collaborate.
H)The new Internet system that links government supercomputer centres and a select group of universities; it runs more than 22,000 times faster than today's public infrastructure and supports heavyduty applications.
I)Software that is copyrighted but distributed to potential customers free of charge.
J)The set of tools that allow people to build social and business connections, share information, and collaborate on projects online (including blogs, wikis, social networking sites and other online communities, and virtual worlds).
K)A form of virtualization in which a company's data and applications are stored at offsite data centres that are accessed over the Internet (the cloud).
L)Emails embellished with a stolen logo for a wellknown enterprise (often from financial institutions) that make the messages look authentic, but which are used to collect personal data and use it to commit fraud.
M)A process that allows networked computers to run multiple operating systems and programs through one central computer at the same time.
N)Software that is free for the taking.
O)Using computers linked to the company's network, mobile employees can transmit their work to the office from anywhere.
P)BI refers to a variety of software applications that analyze an organization's raw data and take useful insights from it.







Understanding Canadian BusinesOnline Learning Center

Home > Appendix A > Key Terms Quiz