{"id":4118,"date":"2023-03-22T15:10:34","date_gmt":"2023-03-22T15:10:34","guid":{"rendered":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/?post_type=chapter&#038;p=4118"},"modified":"2026-04-08T18:55:39","modified_gmt":"2026-04-08T18:55:39","slug":"module-17-cheat-sheet","status":"publish","type":"chapter","link":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/chapter\/module-17-cheat-sheet\/","title":{"raw":"Module 17: Cheat Sheet","rendered":"Module 17: Cheat Sheet"},"content":{"raw":"<p>The links below are designed for print; more screen reader friendly documents can be found on the Students: Additional Lumen Resources page.<\/p><h4 style=\"text-align: right;\"><a href=\"https:\/\/course-building.s3.us-west-2.amazonaws.com\/Intro+to+Business\/Cheat+Sheets\/Business+Cheat+Sheet+Module+17.pdf\" target=\"_blank\" rel=\"noopener\">Download a pdf of this page here.<\/a><\/h4>\r\n<h4 style=\"text-align: right;\"><a href=\"https:\/\/content-cdn.one.lumenlearning.com\/wp-content\/uploads\/sites\/15\/2023\/03\/14031038\/Modulo-17_-Hoja-de-trucos.pdf\" target=\"_blank\" rel=\"noopener\">Download the Spanish version here.<\/a><\/h4>\r\n<h2>Essential Concepts<\/h2>\r\n<h3>Information Technology in Business<\/h3>\r\n<p>Information technology (IT) is essential for businesses to manage and process information, playing a crucial role in daily operations and strategic decision-making in the knowledge-based economy. Technology has significantly transformed business through mobile solutions, cloud computing, extreme customer segmentation, increased connectivity, and social media, compelling businesses to embrace and adapt to these changes or face the risk of obsolescence.<\/p>\r\n<p>Business intelligence (BI) is a technology-driven process that analyzes data from both internal and external sources to provide useful information for decision-making, helping businesses gain a competitive advantage, identify market trends, and create new strategic opportunities.<\/p>\r\n<h3>How Businesses Use Information<\/h3>\r\n<p>Technology has made it easy for businesses to gather facts about their customers and business operations. However, data are\u00a0just facts and figures in their raw form. It\u2019s not until the data are\u00a0processed\u2014i.e., converted into information\u2014that businesses can use them to improve their operations.<\/p>\r\n<p>Businesses collect data in five broad categories: business process data, physical-world observations, biological data, public data, and personal data. Each offers valuable insights for improving efficiency, tracking physical objects, utilizing biometric information, leveraging publicly available data, and understanding individual preferences. However, the collection of these types of data also raises debates on privacy and data rights.<\/p>\r\n<p>Being able to collect data is central to most businesses; however, all that data needs to be stored somewhere so\u00a0users can retrieve it and use it. The creation of databases\u2014virtual warehouses where data is stored\u2014allows businesses to take the first step in managing and using data. Since the creation\u00a0of \u201ccloud computing,\u201d businesses have been able to\u00a0store their data offsite but still access it from anywhere in the world. Businesses mine data\u00a0in order to find valuable patterns and answers to questions.<\/p>\r\n<h3>Managing Information<\/h3>\r\n<p>In order to make the greatest use of data, it must be shared. In business, this means that data collected by marketing needs to be shared with other departments\u2014finance, production, research, and development\u2014or external partners and customers, via networks. Again, this is where businesses must make decisions about the best way to share data: through intranets, extranets, or the cloud. Each has its own set of advantages and disadvantages.<\/p>\r\n<p>A virtual private network (VPN) extends a private network over a public network, allowing users to securely send and receive data as if they were directly connected to the private network, providing functionality, security, and management benefits while utilizing the Internet's flexibility.<\/p>\r\n<h3>Issues in Information Technology<\/h3>\r\n<p>With big data comes big responsibility. This responsibility is about keeping customer and employee data safe from the threat of cyber criminals and illicit users. Large data security breaches have become more prevalent in recent years,\u00a0and businesses are constantly working to find better and more effective ways to protect their\u00a0data.<\/p>\r\n<p>The widespread collection and consolidation of personal information in electronic databases raise significant privacy concerns, as both corporations and governments have access to detailed profiles of individuals, leading to potential surveillance and misuse of data, while privacy advocates strive to protect consumer rights and restrict the sale of personal information.<\/p>\r\n<p>Artificial Intelligence (AI) is transforming businesses by enabling machines to learn, reason, and make independent decisions, impacting sectors like customer service and supply chain management. Augmented analytics combines human intuition with advanced algorithms to automate data analysis, uncovering insights and enhancing decision-making based on big data. Ethical hacking, or penetration testing, plays a crucial role in cybersecurity by identifying vulnerabilities and protecting sensitive information from unauthorized access. Additionally, digital forensics allows for the investigation and tracking of digital evidence, safeguarding corporate data and identifying potential threats.<\/p>\r\n<h3>Career Connection: Following Up<\/h3>\r\n<p>After a job interview, there are three ways to follow up: send a thank-you note to each interviewer within a day, mentioning something specific from the interview to reinforce your interest; send a follow-up note if the decision date has passed, expressing continued interest and asking if they need additional information; and if you were not offered the job but felt the interview went well, send a feedback note to inquire about constructive feedback for future reference. Additionally, if the organization is one you admire, communicate your continued interest and ask to be considered for future opportunities.<\/p>\r\n<h2>Glossary<\/h2>\r\n<p><strong>artificial intelligence (AI)<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">the simulation of human intelligence in machines, enabling them to learn, reason, and make decisions independently<\/p>\r\n<p><strong>augmented analytics<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">use of AI and advanced algorithms to automate data preparation, exploration, and analysis<\/p>\r\n<p><strong>business intelligence (BI)<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">a technology-driven process for analyzing data and presenting useful information to help executives, managers and other end users make informed business decisions<\/p>\r\n<p><strong>cloud computing<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">performing computer tasks using services provided over the Internet<\/p>\r\n<p><strong>data<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">any character, text, word, number<\/p>\r\n<p><strong>data mining<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">the identification of patterns and knowledge from large amounts of data<\/p>\r\n<p><strong>data warehousing<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">collecting and storing data from multiple internal and external sources that will be later used in analysis<\/p>\r\n<p><strong>digital forensics<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">the process of collecting, analyzing, and preserving electronic evidence to investigate and uncover information related to cybercrimes or other digital incidents<\/p>\r\n<p><strong>ethical hacking<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">also known as penetration testing, happens when organizations give permission to professionals to hack into systems to identify vulnerabilities in computer systems, networks, and applications to prevent unauthorized access and protect sensitive information by using the same methods as criminals<\/p>\r\n<p><strong>enterprise resource planning systems (ERP)<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">technology that tracks business resources and how they are used<\/p>\r\n<p><strong>extranet<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">when outside parties are provided access to a subset of the information accessible from an organization\u2019s intranet, the intranet becomes an extranet<\/p>\r\n<p><strong>information<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">data formatted in a manner that allows it to be utilized by human beings in some significant way<\/p>\r\n<p><strong>information technology (IT)<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">includes the equipment and techniques used to manage and process information<\/p>\r\n<p><strong>intranet<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">a private network accessible only to an organization\u2019s staff<\/p>\r\n<p><strong>point of sale systems (POS)<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">technology that tracks purchases by scanning barcodes and uses that data for inventory management, loyalty programs, supplier records, bookkeeping, issuing of purchase orders, quotations and stock transfers, sales reporting and in some cases networking to distribution centers<\/p>\r\n<p><strong>virtual private network (VPN)<\/strong><\/p>\r\n<p style=\"padding-left: 40px;\">extends a private network (intranet) across a public network (Internet), and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network<\/p>","rendered":"<p>The links below are designed for print; more screen reader friendly documents can be found on the Students: Additional Lumen Resources page.<\/p>\n<h4 style=\"text-align: right;\"><a href=\"https:\/\/course-building.s3.us-west-2.amazonaws.com\/Intro+to+Business\/Cheat+Sheets\/Business+Cheat+Sheet+Module+17.pdf\" target=\"_blank\" rel=\"noopener\">Download a pdf of this page here.<\/a><\/h4>\n<h4 style=\"text-align: right;\"><a href=\"https:\/\/content-cdn.one.lumenlearning.com\/wp-content\/uploads\/sites\/15\/2023\/03\/14031038\/Modulo-17_-Hoja-de-trucos.pdf\" target=\"_blank\" rel=\"noopener\">Download the Spanish version here.<\/a><\/h4>\n<h2>Essential Concepts<\/h2>\n<h3>Information Technology in Business<\/h3>\n<p>Information technology (IT) is essential for businesses to manage and process information, playing a crucial role in daily operations and strategic decision-making in the knowledge-based economy. Technology has significantly transformed business through mobile solutions, cloud computing, extreme customer segmentation, increased connectivity, and social media, compelling businesses to embrace and adapt to these changes or face the risk of obsolescence.<\/p>\n<p>Business intelligence (BI) is a technology-driven process that analyzes data from both internal and external sources to provide useful information for decision-making, helping businesses gain a competitive advantage, identify market trends, and create new strategic opportunities.<\/p>\n<h3>How Businesses Use Information<\/h3>\n<p>Technology has made it easy for businesses to gather facts about their customers and business operations. However, data are\u00a0just facts and figures in their raw form. It\u2019s not until the data are\u00a0processed\u2014i.e., converted into information\u2014that businesses can use them to improve their operations.<\/p>\n<p>Businesses collect data in five broad categories: business process data, physical-world observations, biological data, public data, and personal data. Each offers valuable insights for improving efficiency, tracking physical objects, utilizing biometric information, leveraging publicly available data, and understanding individual preferences. However, the collection of these types of data also raises debates on privacy and data rights.<\/p>\n<p>Being able to collect data is central to most businesses; however, all that data needs to be stored somewhere so\u00a0users can retrieve it and use it. The creation of databases\u2014virtual warehouses where data is stored\u2014allows businesses to take the first step in managing and using data. Since the creation\u00a0of \u201ccloud computing,\u201d businesses have been able to\u00a0store their data offsite but still access it from anywhere in the world. Businesses mine data\u00a0in order to find valuable patterns and answers to questions.<\/p>\n<h3>Managing Information<\/h3>\n<p>In order to make the greatest use of data, it must be shared. In business, this means that data collected by marketing needs to be shared with other departments\u2014finance, production, research, and development\u2014or external partners and customers, via networks. Again, this is where businesses must make decisions about the best way to share data: through intranets, extranets, or the cloud. Each has its own set of advantages and disadvantages.<\/p>\n<p>A virtual private network (VPN) extends a private network over a public network, allowing users to securely send and receive data as if they were directly connected to the private network, providing functionality, security, and management benefits while utilizing the Internet&#8217;s flexibility.<\/p>\n<h3>Issues in Information Technology<\/h3>\n<p>With big data comes big responsibility. This responsibility is about keeping customer and employee data safe from the threat of cyber criminals and illicit users. Large data security breaches have become more prevalent in recent years,\u00a0and businesses are constantly working to find better and more effective ways to protect their\u00a0data.<\/p>\n<p>The widespread collection and consolidation of personal information in electronic databases raise significant privacy concerns, as both corporations and governments have access to detailed profiles of individuals, leading to potential surveillance and misuse of data, while privacy advocates strive to protect consumer rights and restrict the sale of personal information.<\/p>\n<p>Artificial Intelligence (AI) is transforming businesses by enabling machines to learn, reason, and make independent decisions, impacting sectors like customer service and supply chain management. Augmented analytics combines human intuition with advanced algorithms to automate data analysis, uncovering insights and enhancing decision-making based on big data. Ethical hacking, or penetration testing, plays a crucial role in cybersecurity by identifying vulnerabilities and protecting sensitive information from unauthorized access. Additionally, digital forensics allows for the investigation and tracking of digital evidence, safeguarding corporate data and identifying potential threats.<\/p>\n<h3>Career Connection: Following Up<\/h3>\n<p>After a job interview, there are three ways to follow up: send a thank-you note to each interviewer within a day, mentioning something specific from the interview to reinforce your interest; send a follow-up note if the decision date has passed, expressing continued interest and asking if they need additional information; and if you were not offered the job but felt the interview went well, send a feedback note to inquire about constructive feedback for future reference. Additionally, if the organization is one you admire, communicate your continued interest and ask to be considered for future opportunities.<\/p>\n<h2>Glossary<\/h2>\n<p><strong>artificial intelligence (AI)<\/strong><\/p>\n<p style=\"padding-left: 40px;\">the simulation of human intelligence in machines, enabling them to learn, reason, and make decisions independently<\/p>\n<p><strong>augmented analytics<\/strong><\/p>\n<p style=\"padding-left: 40px;\">use of AI and advanced algorithms to automate data preparation, exploration, and analysis<\/p>\n<p><strong>business intelligence (BI)<\/strong><\/p>\n<p style=\"padding-left: 40px;\">a technology-driven process for analyzing data and presenting useful information to help executives, managers and other end users make informed business decisions<\/p>\n<p><strong>cloud computing<\/strong><\/p>\n<p style=\"padding-left: 40px;\">performing computer tasks using services provided over the Internet<\/p>\n<p><strong>data<\/strong><\/p>\n<p style=\"padding-left: 40px;\">any character, text, word, number<\/p>\n<p><strong>data mining<\/strong><\/p>\n<p style=\"padding-left: 40px;\">the identification of patterns and knowledge from large amounts of data<\/p>\n<p><strong>data warehousing<\/strong><\/p>\n<p style=\"padding-left: 40px;\">collecting and storing data from multiple internal and external sources that will be later used in analysis<\/p>\n<p><strong>digital forensics<\/strong><\/p>\n<p style=\"padding-left: 40px;\">the process of collecting, analyzing, and preserving electronic evidence to investigate and uncover information related to cybercrimes or other digital incidents<\/p>\n<p><strong>ethical hacking<\/strong><\/p>\n<p style=\"padding-left: 40px;\">also known as penetration testing, happens when organizations give permission to professionals to hack into systems to identify vulnerabilities in computer systems, networks, and applications to prevent unauthorized access and protect sensitive information by using the same methods as criminals<\/p>\n<p><strong>enterprise resource planning systems (ERP)<\/strong><\/p>\n<p style=\"padding-left: 40px;\">technology that tracks business resources and how they are used<\/p>\n<p><strong>extranet<\/strong><\/p>\n<p style=\"padding-left: 40px;\">when outside parties are provided access to a subset of the information accessible from an organization\u2019s intranet, the intranet becomes an extranet<\/p>\n<p><strong>information<\/strong><\/p>\n<p style=\"padding-left: 40px;\">data formatted in a manner that allows it to be utilized by human beings in some significant way<\/p>\n<p><strong>information technology (IT)<\/strong><\/p>\n<p style=\"padding-left: 40px;\">includes the equipment and techniques used to manage and process information<\/p>\n<p><strong>intranet<\/strong><\/p>\n<p style=\"padding-left: 40px;\">a private network accessible only to an organization\u2019s staff<\/p>\n<p><strong>point of sale systems (POS)<\/strong><\/p>\n<p style=\"padding-left: 40px;\">technology that tracks purchases by scanning barcodes and uses that data for inventory management, loyalty programs, supplier records, bookkeeping, issuing of purchase orders, quotations and stock transfers, sales reporting and in some cases networking to distribution centers<\/p>\n<p><strong>virtual private network (VPN)<\/strong><\/p>\n<p style=\"padding-left: 40px;\">extends a private network (intranet) across a public network (Internet), and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network<\/p>\n","protected":false},"author":21,"menu_order":1,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc\",\"description\":\"Putting It Together: Using Technology to Manage Business Information\",\"author\":\"Linda Williams and Lumen Learning\",\"organization\":\"\",\"url\":\"\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"}]","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"part":3260,"module-header":"cheat_sheet","content_attributions":[{"type":"cc","description":"Putting It Together: Using Technology to Manage Business Information","author":"Linda Williams and Lumen Learning","organization":"","url":"","project":"","license":"cc-by","license_terms":""}],"internal_book_links":[],"video_content":null,"cc_video_embed_content":{"cc_scripts":"","media_targets":[]},"try_it_collection":null,"_links":{"self":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/4118"}],"collection":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":11,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/4118\/revisions"}],"predecessor-version":[{"id":9910,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/4118\/revisions\/9910"}],"part":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/parts\/3260"}],"metadata":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/4118\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/wp\/v2\/media?parent=4118"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapter-type?post=4118"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/wp\/v2\/contributor?post=4118"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/wp\/v2\/license?post=4118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}