Term
|
Definition
any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability |
|
|
Term
|
Definition
an online or Internet-based illegal act |
|
|
Term
|
Definition
a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities |
|
|
Term
|
Definition
Affects a computer negatively by altering the way the computer works |
|
|
Term
|
Definition
Copies itself repeatedly, using up resources and possibly shutting down the computer or network |
|
|
Term
|
Definition
A malicious program that hides within or looks like a legitimate program |
|
|
Term
|
Definition
Program that hides in a computer and allows someone from a remote location take control |
|
|
Term
|
Definition
is a group of compromised computers connected to a network |
|
|
Term
|
Definition
|
|
Term
Denial of service attack (DoS attack) |
|
Definition
disrupts computer access to Internet services |
|
|
Term
|
Definition
a program or set of instructions in a program that allow users to bypass security controls |
|
|
Term
|
Definition
a technique intruders use to make their network or Internet transmission appear legitimate |
|
|
Term
|
Definition
is hardware and/or software that protects a network’s resources from intrusion |
|
|
Term
Intrusion Detection Software |
|
Definition
-Analyzes all network traffic -Assesses system vulnerablilities -Identifies any unauthorized intrusions -Notifies network administrators of suspicious behavior patterns or security breaches |
|
|
Term
|
Definition
Vulnerable computer that is set up to entice an intruder to break into it |
|
|
Term
|
Definition
the discovery, collection, and analysis of evidence found on computers and networks |
|
|
Term
|
Definition
a process of converting readable data into unreadable characters to prevent unauthorized access |
|
|
Term
|
Definition
A programmed formula that the originator of the data uses to encrypt the plain text and the recipient of the data uses the decrypt the text |
|
|
Term
VPN
Virtual Private Network |
|
Definition
A computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network |
|
|
Term
TLS
Transport Layer Security |
|
Definition
provide communications security over the Internet
encrypt the segments of network connections above the Transport Layer, using symmetric cryptography for privacy and a keyed message authentication code for message reliability |
|
|
Term
|
Definition
Prolonged malfunction of a computer |
|
|
Term
UPS
uninterruptable power supplies |
|
Definition
Protects from system failures caused by electrical power variations |
|
|
Term
|
Definition
duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
Ultimate Safeguard |
|
|
Term
WPA
Wi-Fi Protected Access |
|
Definition
A security standard that improves an older security standards by authenticating network users and providing more advanced devices can use it |
|
|
Term
|
Definition
an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace |
|
|
Term
|
Definition
involves reducing the electricity and environmental waste while using a computer |
|
|
Term
|
Definition
a small text file that a Web server stores on your computer |
|
|
Term
|
Definition
a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information |
|
|
Term
|
Definition
a scam where a perpetrator attempts to obtain your personal and financial information via spoofing |
|
|
Term
|
Definition
Gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety |
|
|
Term
|
Definition
the use of computers to observe, record, and review an employee's use of a computer |
|
|
Term
|
Definition
the process of restricting access to certain material on the Web |
|
|
Term
|
Definition
1974-Forbids federal agencies from allowing information to be use for a reason other than for which it was collected |
|
|
Term
Computer Fraud and Abuse Act |
|
Definition
1984-Outlaws unauthorized access of federal government computers |
|
|
Term
Telephone Consumer Protection Act |
|
Definition
1991-Restricts Activities of telemarketers |
|
|
Term
Computer Abuse Amendments Act |
|
Definition
1994-Amends 1984 act to outlaw transmission of harmful computer codes such as viruses |
|
|
Term
National Information Infrastructure Protection Act |
|
Definition
Penalizes theft of information across state lines, threats against networks and computer system trespassing |
|
|
Term
|
Definition
Closes a narrow loop hole in the law that allowed people to give away copyrighted material (such as software) on the internet without legal repercussions |
|
|
Term
Digital Millennium Copyright Act DMCA |
|
Definition
1998-Makes it illegal to circumvent antipiracy schemes in commercial software; outlaw sale of devices taht carry software illegally |
|
|
Term
|
Definition
Gives law enforcement the right to monitor people's activities, including web and e-mail habits |
|
|
Term
|
Definition
a collection of hardware, software, date, people, and procedures, that work together to produce quality information |
|
|
Term
System Development Life Cycle
SDLC - 5 Phases |
|
Definition
Planning Analysis Design Implementation Support or Maintenance |
|
|
Term
|
Definition
Participants Upper Management, Steering Committee
Key Activities & Outcomes -Prioritization of Project relative to other uses of resources -Project Manager and Project Team Assigned -Resources Allocated |
|
|
Term
|
Definition
Participants -Project Manager, Users, Systems Analyst Key Activities & Outcomes -Gather Information -Analyze current system or situation -Create Project Plan -Feasibility Study with Report -Create Data Flow Diagrams (DFD) -Create Entity Relationship Diagrams (ERD) -Create Project Dictionary -Create Data Dictionary -If Object-Oriented, Create Use Case Diagrams & Use Cases Create Class Diagrams -Complete Analysis Documentation -System Proposal |
|
|
Term
|
Definition
Participants -Project Manager, Systems Analyst, Architect, Designers
Key Activities & Outcomes -Identify or Acquire Hardware & Software -Identify Implementation Approach (Off-the-Shelf, Develop, Out-Source, Combination) -Create Input Output Design -Develop Prototype -Create Database Design -Create Program Design – Structure Chart & Pseudo Code for each module -Develop Training Material & User Documentation -Plan Conversion Strategy -Complete Design Documentation -Structured Walk Through or Design Inspection |
|
|
Term
SDLC 4. Implementation Phase |
|
Definition
Participants -Project Manager, Designers, Developers, Testers
Key Activities & Outcomes -Code each module -Unit Test each module -Integrate Modules -System Test complete Project stand alone -Integration Test complete Project in working environment -Acceptance Test complete Project with customer given data -Performance Test complete Project to verify it meets customer specifications -Train Users -Implement Conversion Strategy -Complete Technical Support Documentation -Complete User Documentation |
|
|
Term
SDLC 5. Support or Maintenance Phase |
|
Definition
Participants -Key Users, Project Manager, Systems Analyst, Architect, Key Designers
Key Activities & Outcomes -Security Plan -Post-Implementation System Review -Project Manager Final Report to Upper Management & Steering Committee -Process designated for bug fixes or enhancement requests |
|
|
Term
|
Definition
uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits
Also is used as a form of identity access management and access control |
|
|
Term
|
Definition
process of planning, scheduling, and then controlling the activities during system development |
|
|
Term
PERT
Program Evaluation & Review Technique |
|
Definition
Used for planning and scheduling times |
|
|
Term
|
Definition
Measures how well the proposed information system will work
Will users use it? Will they like it? Is it secure? |
|
|
Term
|
Definition
Measures whether the established deadlines for the project are reasonable
If not, a new schedule must be made.
If there's no time, reduced focus of work to reduce labor |
|
|
Term
|
Definition
Measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system |
|
|
Term
|
Definition
Measures whether the lifetime benefits of the proposed information system will be greater than it's lifetime costs |
|
|
Term
|
Definition
an analysis and design technique that describes processes that transform inputs into outputs |
|
|
Term
Entity-Relationship Diagram
ERD |
|
Definition
a tool that graphically shows the connections among entities in a system
Entities are objects in the system that have data |
|
|
Term
|
Definition
a tool that graphically shows the flow of data in a system |
|
|
Term
Joint-application Design (JAD) or Focus Groups |
|
Definition
a series of lengthy, structured, group meetings in which users are IT professionals work together to design or develop an application |
|
|
Term
|
Definition
combines the data with the processes that act on that data into a single unit, called an object |
|
|
Term
Unified Modeling Language
UML |
|
Definition
has been adopted as a standard notation for object modeling and development
UML includes 13 different diagrams |
|
|
Term
|
Definition
graphically shows how actors (users) interact with the information system |
|
|
Term
|
Definition
graphically shows classes and subclasses in a system
Each class can have one or more subclasses
Subclasses use inheritance to inherit methods and attributes of higher levels |
|
|
Term
|
Definition
-Request for quote -Request for proposal -Request for information |
|
|
Term
|
Definition
is a working model of the proposed system |
|
|
Term
|
Definition
Encrypted code that a person, web site, or organization attaches to an email to verify the identity of the message sender |
|
|
Term
|
Definition
is a widely used platform for server programming in the Java programming language. |
|
|
Term
|
Definition
use of computer technology for the process of design and design-documentation |
|
|
Term
Voice over Internet Protocol or Internet Telephony |
|
Definition
The transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. |
|
|
Term
|
Definition
the process of using a high performance computer or computing grid to run a simulation thousands or millions of times across a large parameter and value space |
|
|
Term
|
Definition
duplicate writes to two disk systems
(the action of) is an exact copy of a data set |
|
|
Term
|
Definition
Online area where users discuss a particular subject |
|
|
Term
|
Definition
-Grouping of 8 bits -If you have a single byte of information, you can represent 2^8 (mathematical calculation from book) |
|
|
Term
RAID (redundant array of independent disks) |
|
Definition
duplicates data and implements duplication in different ways
-Group of two or more integrated hard disks -Main benefit: availability of storage -also gives improved performance |
|
|
Term
Extensible Markup Language
XML |
|
Definition
a set of rules for encoding documents in machine-readable form
It's design goals emphasize simplicity, generality, and usability over the Internet.
It is a textual data format with strong support via Unicode for the languages of the world. |
|
|
Term
MRP
Material Requirements Planning |
|
Definition
uses software to help monitor and control processes related to production |
|
|
Term
MRP II
Manufacturing Resource Planning II |
|
Definition
is an extension of MRP and also includes software that helps in scheduling |
|
|
Term
Customer interaction management (CIM) |
|
Definition
software manages the day-to-day interactions with customers |
|
|
Term
Computer-aided manufacturing (CAM) |
|
Definition
is the use of computers to control production equipment |
|
|
Term
Computer-integrated manufacturing (CIM) |
|
Definition
uses computers to integrate the many different operations of the manufacturing process |
|
|
Term
transaction processing system (TPS) |
|
Definition
Captures and processes data from day-to-day transactions |
|
|
Term
management information system (MIS) |
|
Definition
Generates accurate, timely, and organized information so managers can track progress and make decisions
Tend to be layered on TPS data...aka reports are made from TPS data
always a standardized report...same info, with some different data |
|
|
Term
decision support system (DSS) |
|
Definition
Helps users analyze data and make decisions
Uses data from internal and external sources, as needed
Semi- Structured |
|
|
Term
Executive information system (EIS) |
|
Definition
supports needs of executive management
Goes back to executive evel; used by single person |
|
|
Term
enterprise resource planning (ERP) |
|
Definition
Provides software applications to coordinate activities of functional units
The main idea is integration |
|
|
Term
content management system (CMS) |
|
Definition
Combination of databases, software, and procedures
Organizes and allows access to documents and other files |
|
|
Term
document management system (DMS) |
|
Definition
allows for storage and management of a company’s documents
Stored in a repository |
|
|
Term
|
Definition
is a defined process that identifies the specific set of steps involved in completing a particular project or business process |
|
|
Term
|
Definition
an Internet service that provides computing needs to computer users |
|
|
Term
|
Definition
combines many servers and/or personal computers on a network to act as one large computer |
|
|
Term
|
Definition
allows large organizations to manage and store information and data using devices geared for
-Heavy use -Maximum availability -Maximum efficiency |
|
|
Term
|
Definition
|
|
Term
|
Definition
a file is broken into either bytes (512 byte sectors) or varying strip size or block size pieces and read/written across many disks simultaneously |
|
|
Term
|
Definition
|
|
Term
|
Definition
Stripping without Parity
-No Fault Tolerance -High Performance -Extremely difficult recovery in case of disk failure |
|
|
Term
|
Definition
Mirroring or Duplexing
-complete redundancy -hurts write performance -improves some read performance |
|
|
Term
|
Definition
Block level Stripping with Distributed Parity
-good performance -good fault tolerance -high capacity storage efficiency -best suited for TPS and ERP systems -performance degrades in high write situations |
|
|
Term
|
Definition
consists of the programs that control or maintain the operations of the computer and its devices |
|
|
Term
|
Definition
a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources |
|
|
Term
|
Definition
the process of starting or restarting a computer; cold boot= turning on a computer that has been powered off; warm boot= using the OS to start a computer |
|
|
Term
|
Definition
uses buffers and printed documents; the process sends documents to be printed to a buffer instead of sending them immediately to the printer |
|
|
Term
|
Definition
is a small program that tells the operating system how to communicate with a specific device |
|
|
Term
|
Definition
type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer and its devices |
|
|
Term
|
Definition
reorganizing the disk so the files are stored in contiguous sectors |
|
|
Term
|
Definition
an unsolicited email message or newsgroup posting sent to many people at once |
|
|
Term
graphical user interface (GUI) |
|
Definition
interact with menus and visual images (buttons/other graphics) EX=Windows Aero |
|
|
Term
|
Definition
user types commands or presses special keys to enter data/instructions |
|
|
Term
|
Definition
saves any open documents/programs to RAM, places computer in low-power state |
|
|
Term
|
Definition
saves any open documents/programs to a hard disk before turning power off |
|
|
Term
|
Definition
controls how you enter data and its display on screen |
|
|
Term
|
Definition
OS enables 2 or more users to simultaneously run programs |
|
|
Term
|
Definition
to optimize use of random access memory (RAM) |
|
|
Term
|
Definition
OS allocates a portion of a storage medium to function as additional RAM |
|
|
Term
|
Definition
segment of memory in which items are placed while waiting to be transfered |
|
|
Term
|
Definition
where multiple print jobs line up; in the buffer |
|
|
Term
|
Definition
OS automatically configures new devices |
|
|
Term
|
Definition
program that assesses and reports info about various computer resources |
|
|
Term
|
Definition
automatically provides updates |
|
|
Term
|
Definition
free downloadable updates for registered users |
|
|
Term
|
Definition
OS that organizes and coordinates how multiple users access and share resources |
|
|
Term
stand-alone operating system |
|
Definition
complete OS that works on a desktop computer, notebook comp, or mobile device |
|
|
Term
|
Definition
|
|
Term
|
Definition
Multitasking UNIX-type OS |
|
|
Term
|
Definition
EX of OS on most mobile devices |
|
|
Term
|
Definition
utility that performs file management functions |
|
|
Term
|
Definition
specific named location on storage medium with related documents |
|
|
Term
|
Definition
program that attempts to locate a file on computer based on specific criteria |
|
|
Term
|
Definition
utility that removes a program |
|
|
Term
|
Definition
utility that allows users to display/copy/print a graphic file |
|
|
Term
|
Definition
utility searches for/removes unnecessary files |
|
|
Term
|
Definition
utility that reorganizes files and unused space |
|
|
Term
|
Definition
allows users to copy or backup selected files to another medium |
|
|
Term
|
Definition
reverses process and returns backed up files to their original form |
|
|
Term
|
Definition
utility that detects and protects a personal computer from intrusions |
|
|
Term
|
Definition
program placed on a computer without the user's knowledge that secretly collects info from users |
|
|
Term
|
Definition
program that restricts access to certain web material |
|
|
Term
|
Definition
|
|
Term
|
Definition
compressed files (must uncompress these) |
|
|
Term
personal computer maintenance utility |
|
Definition
identifies and fixes OS and disk problems, and includes capability of improving a computer's performance |
|
|
Term
|
Definition
process which 2 or more computers or devices transfer data, intructions, and info |
|
|
Term
|
Definition
initiates an instruction to transmit data/info |
|
|
Term
|
Definition
transmission media on which the data/info travel |
|
|
Term
|
Definition
accepts transmission of data/info |
|
|
Term
|
Definition
time-stamped articles on a network that reflect author's interests/opinions/personality |
|
|
Term
|
Definition
internet standard that permits users to upload and download files to and from FTP servers on the internet |
|
|
Term
|
Definition
worldwide collection of electronic documents on the internet that users access through a we browser |
|
|
Term
|
Definition
web sites that provide a means for users to share personal info, allow users to modify web site content, and have application software built into the site |
|
|
Term
global positioning system GPS |
|
Definition
navigation system that consists of 1 or more earth-based receivers that accept and analyze satellite signals to determine the receiver's location |
|
|
Term
|
Definition
work online with other users on the server |
|
|
Term
document management system |
|
Definition
provides storage and management of a company's documents |
|
|
Term
|
Definition
software that helps groups of people work together on projects and share info over a network |
|
|
Term
|
Definition
standardized software that enables programmers to create applications that communicate with other remote computers over the Internet |
|
|
Term
|
Definition
web app that combines services from 2 or more sources to create a new app |
|
|
Term
value-added network (VAN) |
|
Definition
3rd party business that provides networking services for a fee |
|
|
Term
|
Definition
network that connects computers and its devices in a limited geographical area ( a WLAN has no physical wires) |
|
|
Term
metropolitan area network (MAN) |
|
Definition
high-speed network that connects local area networks in a metropolitan area; includes LAN's, smaller than WAN's |
|
|
Term
|
Definition
network that covers a large geographic area using a communications channel that combines media; usually 2 or more LAN's combined |
|
|
Term
P2P (internet peer-to-peer) |
|
Definition
internet network which users access each others hard disks and exchange files |
|
|
Term
|
Definition
layout of the computers and devices in a communications network |
|
|
Term
|
Definition
all devices on network connect to central device |
|
|
Term
|
Definition
consists of a single central cable to which all other devices connect |
|
|
Term
|
Definition
cable forms a closed loop with devices arranged along the ring |
|
|
Term
|
Definition
internal network that uses internet technologies |
|
|
Term
|
Definition
network standard that specifies no central computer/device on the network should control when data can be transmitted |
|
|
Term
|
Definition
specifies computers/devices on the network share or pass a specific signal (a token) in a unidirectional manner |
|
|
Term
transmission control protocol/internet protocol (TCP/IP) |
|
Definition
protocol that defines how data are routed from one end of the network to the other |
|
|
Term
|
Definition
collaborative web site that allows users to create and edit web site content |
|
|
Term
|
Definition
protocol that defines how 2 bluetooth devices use short-range radio waves to transmit data |
|
|
Term
|
Definition
network standard that specifies how two UWB devices use short-range radio waves to communicate at high speeds with each other |
|
|
Term
|
Definition
used to transmit data wirelessly to each other via infrared light waves |
|
|
Term
radio frequency id (RFID) |
|
Definition
defines how a network uses radio signals to communicate with a tag placed in or attached to an object/anima/person |
|
|
Term
|
Definition
newer network standard from IEEE that specifies how wireless devices communicate over the air in a wide area |
|
|
Term
|
Definition
controls access to the hardware, software, and other resources on a network and provides a centralized storage area for info/data (clients rely on servers) |
|
|
Term
wireless application protocol (WAP) |
|
Definition
specifies how some mobile devices can display content of interned services |
|
|
Term
|
Definition
consists of programs that help users establish connection to another computer/network, manage transmission of data/info/instructions, and provide and interface for users to communicate w/one another |
|
|
Term
|
Definition
always-on connection established between 2 communications devices |
|
|
Term
integrated services digital network (ISDN) |
|
Definition
set of standards for digital transmission of data over standard copper telephone lines |
|
|
Term
digital subscriber line (DSL) |
|
Definition
transmits at fast speeds on existing standard copper telephone wires |
|
|
Term
fiber to the premises (FTTP) |
|
Definition
uses fiber-optic cable to provide extremely high scpped internet access |
|
|
Term
|
Definition
long-distance digital telephone lines carrying multiple signals over a single communications line |
|
|
Term
|
Definition
carries voice, data, video, and multimedia at extremely high speeds |
|
|
Term
|
Definition
hardware capable of transmitting data/instructions/info between a sending device and receiving device |
|
|
Term
|
Definition
enables a computer/device that doesn't have networking capability to access a network |
|
|
Term
|
Definition
communications device that connects multiple computers or other routers together and transmits data to its correct network destination |
|
|
Term
|
Definition
amount of data/instructions/info travel over a communications channel |
|
|
Term
|
Definition
transmit multiple signals simultaneously |
|
|
Term
|
Definition
collection of data organized in a way allowing access and use of data |
|
|
Term
|
Definition
collection of unprocessed items |
|
|
Term
|
Definition
|
|
Term
database management system (DBMS) |
|
Definition
users create a computerized database, edit data in the database, sort and retrieve the data, and create forms and reports from the data; often called database software |
|
|
Term
garbage in, garbage out (GIGO) |
|
Definition
computing phrase pointing out accuracy of a computer's output depends on accuracy of input |
|
|
Term
|
Definition
contains data about each file in database and each field within those files |
|
|
Term
|
Definition
request for specific info from database |
|
|
Term
|
Definition
(data entry form) is a window on screen providing areas for entering or modifying data in database |
|
|
Term
|
Definition
(report writer) allows users to design a report on screen, retrieve data into the report design, and display or print the report |
|
|
Term
principle of least privilege |
|
Definition
users' access privileges are limited to the lowest level necessary to perform required tasks |
|
|
Term
|
Definition
listing of activities that change the contents of the database |
|
|
Term
|
Definition
uses the logs and/or backups to restore a database when it becomes damaged/destroyed |
|
|
Term
|
Definition
backup plan in which all data is backed up whenever a change is made |
|
|
Term
|
Definition
consists of rules and standards that define how the database organizes data |
|
|
Term
|
Definition
database that stores data in tables that consist of rows and columns (file=relation, record=tuple, field=attribute) |
|
|
Term
structured query language (SQL) |
|
Definition
popular query language that allows users to manage, update, and retrieve data |
|
|
Term
object-oriented database (OODB) |
|
Definition
stores data in objects (objects=item that contains data and actions that read and process data) |
|
|
Term
multidimensional database |
|
Definition
stores data in dimensions |
|
|
Term
|
Definition
a huge database that stores and manages the data required to analyze historical and current transactions |
|
|
Term
|
Definition
where users store and share photos, videos, recordings, and other personal media with other registered users |
|
|
Term
|
Definition
decides on the proper placement of fields, defines data relationship, and identifies users' access privileges |
|
|
Term
database administrator (DBA) |
|
Definition
requires a more technical inside view of the data |
|
|
Term
|
Definition
- Set if technologies that allows almost any type of program to run on the internet or an internal business network- Set if technologies that allows almost any type of program to run on the internet or an internal business network |
|
|
Term
Artificial Intelligence (AI) |
|
Definition
The application of human intelligence to computers |
|
|
Term
|
Definition
- Process of ensuring that a program operates on clean, correct and useful data |
|
|
Term
|
Definition
- Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations |
|
|
Term
Sales Force Automation (SFA) |
|
Definition
Software that equips traveling sales people with the electronic tools they need to be more productive. |
|
|
Term
|
Definition
a program or set of instructions in a program that allow users to bypass security controls |
|
|
Term
|
Definition
DBMS feature that has a graphical user interface to assist users with retrieving data |
|
|
Term
|
Definition
The activity of networking through social sites |
|
|
Term
Multimedia Messaging Service MMS |
|
Definition
Messaging system that allows users to send messages including multimedia files |
|
|
Term
|
Definition
Short, usually text-based messages sent by or to a wireless subscriber |
|
|
Term
|
Definition
A firewall mechanism that replaces the IP address of a host on the internal (protected) network with its own IP address for all traffic passing through it |
|
|
Term
|
Definition
A path for the transfer of signals or data within a computer or between a computer and its peripheral equipment |
|
|
Term
|
Definition
- Any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving devices |
|
|
Term
|
Definition
- A type of electronically stored text that allows "click through" access to other texts by way of encoded links |
|
|
Term
|
Definition
Capability of software or hardware to run identically on different platforms |
|
|
Term
|
Definition
The process of analyzing data in order to determine patterns and their relationships |
|
|
Term
|
Definition
Portion of a company's network that allows customers or suppliers of a company to access parts of an enterprise's intranet |
|
|
Term
|
Definition
- Integrated-Case; A collection of products designed to allow the tools contained within them to communicate with each other and to transfer analysis, design and development data between them - Computer aided Software Engineering; collections of software tools assembled by a vendor to help the analyst, designer and developer to produce diagrams and models; analyze component relationships; produce code; manage component and model versions; produce reports; and to document the results of their analysis and design in narrative form. |
|
|
Term
|
Definition
Fiber To The Home; An access network where optical fiber is terminated within a residential or business building. |
|
|
Term
|
Definition
a digital network communications method that groups all transmitted data - irrespective of content, type, or structure into suitably-sized block, called packets |
|
|
Term
|
Definition
A notice that guarantees a user or a Web site is legitimate |
|
|
Term
Office Information System OIS |
|
Definition
Enables employees to perform tasks using computers and other electronic devices instead of |
|
|
Term
|
Definition
A shared or group intelligence that emerges from the collaboration and competition of many individuals |
|
|
Term
|
Definition
The sharing of content among different web sites |
|
|
Term
Application Programming Interface API |
|
Definition
Collection of tools that programmers use to interact with an environment such as a when sore or operating system |
|
|
Term
|
Definition
Specification that enables web content to be distributed to subscribers |
|
|
Term
|
Definition
- A hardware architecture and software framework that allows software to run |
|
|
Term
Basic Input/Output System BIOS |
|
Definition
Built-in software that contains the code required to control the keyboard, monitor, disk drives, communications ports, and other functions independently of the computer operating system. |
|
|
Term
|
Definition
The common term for a computer, router or printer's pre-boot sequence |
|
|
Term
|
Definition
Sharing information with other information system within a enterprise |
|
|
Term
|
Definition
Measure of how well computer hardware software, or an information system can grow to meeting increasing performance demands |
|
|
Term
|
Definition
In reference to operating systems, supports two or more processors running programs at the same time |
|
|
Term
|
Definition
The time it takes a signal to travel from one location to another on a network |
|
|
Term
|
Definition
The science of incorporating comfort, efficiency, and safety into the design of the workplace |
|
|
Term
|
Definition
- A database, or collection of databases, designed to help managers make strategic decisions about their business |
|
|
Term
Hypertext Markup Language HTML |
|
Definition
special formatting language that programmers use to format documents for display on the web |
|
|
Term
|
Definition
protocol the web is based upon |
|
|
Term
|
Definition
American Standard Code of Information Interchange, is the most widely used coding scheme to represent |
|
|
Term
|
Definition
information that has been encrypted into seemingly meaningless code |
|
|
Term
|
Definition
central component of most computer operating systems |
|
|
Term
|
Definition
Design of computers, devices, and media on a network |
|
|
Term
|
Definition
Rules determining the format and transmission of data |
|
|
Term
|
Definition
The way a website organizes its data into categories and subcategories, sometimes displayed in a site map |
|
|
Term
|
Definition
The smallest unit of data a computer can process. Short for Binary digit |
|
|
Term
|
Definition
connects several devices in a network together |
|
|
Term
|
Definition
A statement by an organization participating in a network, as to what kinds of uses are acceptable for traffic over the network that relies on or uses hardware, software, services, or content (file) provided by the organization. |
|
|
Term
|
Definition
A hierarchical data model is a data model in which the data is organized into a tree-like structure. The structure allows repeating information using parent/child relationships: each parent can have many children but each child only has one parent |
|
|
Term
|
Definition
encoding information while reducing the bandwidth or bits required |
|
|
Term
|
Definition
Term used by developers of relational databases for record |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|