Electronic data interchange
Article Abstract:
Electronic data interchange (EDI) can streamline the inter-office exchange of documents and eliminate the volume of paper requirements. EDI puts business data into an electronic format that computers can use and is appropriate for recording the data on any standard paper form. EDI can be used to electronically send purchase orders to other firms. The other firms will electronically acknowledge the receipt of the orders, provide advanced shipping orders, and send invoices. The original firm can notify the bank to pay the other firms. The benefits of EDI in business include reductions in transaction times, data entry activity, and improved responsiveness. EDI should be used by businesses characterized by a time-sensitive environment, that handle a large volume of transactions, has a tight margin, and needs increased productivity to improve competitiveness.
Publication Name: Journal of Housing
Subject: Social sciences
ISSN: 0272-7374
Year: 1991
User Contributions:
Comment about this article or add new information about this topic:
How to use - not abuse - your local area network
Article Abstract:
A local area network (LAN) allows for the use of great resources, including more applications, file space, computing power, and printers. But because the LAN is used in a shared environment, it is important for users to know how to work safely and effectively so as not to cause problems for other LAN members. Being a good network user involves getting to know the personal computer by reading the user manual, taking responsibility for the security of one's own data as well as for the whole network community, conserving network and computer resources, and not monopolizing the printer during busy hours. Effective use of the LAN can lead to increased productivity, not only for one user, but also for the other network members.
Publication Name: Journal of Housing
Subject: Social sciences
ISSN: 0272-7374
Year: 1991
User Contributions:
Comment about this article or add new information about this topic:
Computer viruses
Article Abstract:
The threat of computer software contaminated with viruses can be reduced while still providing network users with the programs they need by taking proper security measures. Security measures include testing all software prior to its use in a computer system, protecting programs from alterations and storing them in a secure location, and using computer programs designed to seek out and destroy viruses.
Publication Name: Journal of Housing
Subject: Social sciences
ISSN: 0272-7374
Year: 1990
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Economic integration of major industrialized areas: an empirical tracking of the continued trend. Economic development and its impact on occupational grouping structure in Korea 1971-1990
- Abstracts: Location, innovation and trade: the role of localization and nation-based externalities. A simple, analytically solvable, Chamberlinian agglomeration model
- Abstracts: Mental accounting and changes in price: the frame dependence of reference dependence. The cognitive processing of misleading advertising in young and old adults: assessment and training
- Abstracts: Marketing and seduction: building exchange relationships by managing social consensus. Using drama to persuade
- Abstracts: Occupational attainment as a function of abilities and interests: a longitudinal analysis using project TALENT data