Term
|
Definition
IP) is a term referring to a number of distinct types of creations of the mind for which a set of exclusive rights are recognized. |
|
|
Term
|
Definition
refers to a state of affairs where the purported maker of a statement will not be able to successfully challenge the validity of the statement or contract. |
|
|
Term
|
Definition
is a form of net abuse consisting of sending huge volumes of e-mail to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted |
|
|
Term
|
Definition
is to send unsolicited bulk messages indiscriminately |
|
|
Term
|
Definition
is a computer program that can replicate itself[1] and spread from one computer to another |
|
|
Term
|
Definition
is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. |
|
|
Term
|
Definition
is the art of manipulating people into performing actions or divulging confidential information |
|
|
Term
|
Definition
is a technique used to retrieve information that could be used to carry out an attack on a computer network. |
|
|
Term
|
Definition
is a way of attempting to acquire information such as usernames, passwords and credit card details thru deceit. |
|
|
Term
|
Definition
is a hacker's attack aiming to redirect a website's traffic to another, bogus website. |
|
|
Term
|
Definition
is the technique whereby content is blocked or allowed based on analysis of its content |
|
|
Term
|
Definition
is an electronic document which uses a digital signature to bind a public key with an identity |
|
|
Term
|
Definition
is a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts. |
|
|
Term
|
Definition
one of the first database management systems from the 1960s. |
|
|
Term
|
Definition
focuses on the IT or technology systems that support business functions. |
|
|
Term
Business Continuity Planning |
|
Definition
is planning which identifies the organization's exposure to internal and external threats |
|
|
Term
|
Definition
is being able to function at a lower level instead of having a complete failure. |
|
|
Term
|
Definition
is being able to switch to another server in case of a failure of your initial one. |
|
|
Term
Three kinds of Back-up sites for after a disaster: |
|
Definition
Cold site: Minimalist site, has no backup copies of data nor hardware, mot inexpensive Hot site: Basically a duplicate of the original site Warm site: A compromise to some extent between the two sites |
|
|
Term
|
Definition
Making sure your server can accommodate future growth needs |
|
|
Term
|
Definition
Computer speed basically doubles every two years (# of transistors on a CPU) |
|
|
Term
|
Definition
10^6 Hertz -> A hertz is the number of cycles per period |
|
|
Term
|
Definition
10^9 Hertz -> A hertz is the number of cycles per period |
|
|
Term
|
Definition
Linking many computers together to act as one |
|
|
Term
|
Definition
A CPU doing more than one task at once. |
|
|
Term
|
Definition
Having more than one CPU perform a function to increase the speed |
|
|
Term
|
Definition
the ratio of computation to the amount of communication; how often and with how much info |
|
|
Term
|
Definition
Encompasses all organizational information; used for managerial operations |
|
|
Term
Transactional Information: |
|
Definition
Information in a business process; used for day to day operations |
|
|
Term
|
Definition
Duplicating critical components to increase reliability of system |
|
|
Term
|
Definition
Extract, transform, load; taking information, fitting it to your specs, loading it into storage |
|
|
Term
Multi-dimensional Analysis: |
|
Definition
Analysis of data from a variety of angles |
|
|
Term
|
Definition
an error correction technique using codes |
|
|
Term
|
Definition
Discovering new patterns from large data sets |
|
|
Term
|
Definition
Deriving high-quality information from text sets |
|
|
Term
|
Definition
Discovering new patterns from the web |
|
|
Term
|
Definition
Sorting data into clusters of similar characteristics |
|
|
Term
|
Definition
Reveals relationships between variables along with frequency and nature of them |
|
|
Term
|
Definition
When retailers seek to understand the purchase behavior of customers |
|
|
Term
|
Definition
An emergency repair disk used by some Microsoft operating systems |
|
|
Term
|
Definition
|
|
Term
|
Definition
a centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format |
|
|
Term
|
Definition
An interactive website kept constantly updated and relevant due to a database |
|
|
Term
|
Definition
Databases are better for mass storage of high volumes of data. Excel can do this, but retrieving data from anything but the simplest quarries can lead to data validation and data corruption problems. Store data in a database, work on it in a spreadsheet. |
|
|
Term
|
Definition
Means one has a lot of data, but does not understand it or has not analyzed.. basically making the data have little useful value |
|
|