Term
|
Definition
A device that can be used to control access to a network. A relatively cheap device that reads information from a magnetic strip on the back of a card. Can control locks on doors, permitting only authorized personnel into the area. |
|
|
Term
|
Definition
Must be established in a bus topology network to reduce data collisions. Controls which computer is allowed to use the transmission media at a certain time. Comptuers listen to the network and transmit data when no other computer is transmitting data. |
|
|
Term
|
Definition
Nodes participate in moving data through the network. Each node on the network is responsible for retransmitting the token or the data to the next node in the network. Includes ring and star topology. |
|
|
Term
|
Definition
Association rules
A data mining technique. Determining which data goes together. |
|
|
Term
|
Definition
An online business-to-business database. Matches suppliers with buyers for all types of manufactured goods and raw materials. |
|
|
Term
|
Definition
A common validation rule. Confirms that only textual characters are entered in a field. |
|
|
Term
|
Definition
angieslist.com
Similar to Yelp. Focuses primarily on services companies and health care professionals. Members pay a monthly fee. Anonymous reviews are not permitted. |
|
|
Term
|
Definition
Used to program client-side programs. A small application located on the server. When requested, it downloads to the client computer. Can run without additional data transfer between client and server. Java language is commonly used to create applets for browsers. |
|
|
Term
|
Definition
A dedicated server. Serves as a repository for application software. |
|
|
Term
|
Definition
Shows available domain names for applications. |
|
|
Term
|
Definition
arcadepod.com
A game website which may download applets to client computers. |
|
|
Term
Artificial intelligence (AI) |
|
Definition
Computer science attempting to create computers that think like humans. No computers have thus far been constructed that can replicate thinking patterns of a human brain. Include the creation of knowledge-based systems. |
|
|
Term
|
Definition
A layer in the OSI model. Handles interfaces between application software and the network. Translates user information into a format the presentaiton layer can understand. |
|
|
Term
|
Definition
Users prove they have authorization to use a computer network. Can be correctly entering a user ID and password, biometric devices, or possessed objects. |
|
|
Term
|
Definition
A dedicated server. Keeps track of users logged into the network, and which services on the network are available to each user. Manages and coordinates services provided by all other dedicated servers on the network. |
|
|
Term
|
Definition
A factor to consider when choosing network cable. The amount of data transmitted across the medium. Measured in bits per second (BPS). |
|
|
Term
|
Definition
An example of a website which would use encryption to keep ecommerce transactions safe. |
|
|
Term
|
Definition
A heavily secured server located on a special perimeter network between the company's secure internal network and firewall. Appears to be an internal network server. Even if a hacker accesses the bastion host server, the internal network is not vulnerable, because it is not on the internal network. A type of honey pot. A proxy server. |
|
|
Term
|
Definition
May be included in a TPS. Transaction data is accumulated until a certain point is reached, and then several transactions are processed at once. Appropriate for activities that are not time sensitive. |
|
|
Term
Binary large object (BLOB) |
|
Definition
Unstructured data encoded in binary form. |
|
|
Term
Biometric authentication device |
|
Definition
A device that can be used to access a network. Uses a unique characteristic of human biology to identify authorized users. Can read fingerprints, palm prints, retina patterns, or facial recognition. These devices can be fooled by various methods. |
|
|
Term
|
Definition
A device that sends data between different collision domains in a large network. Keeps signals within one domain in that domain. Most home networks do not require bridges. |
|
|
Term
|
Definition
Attempting to access an account by repeatedly trying different passwords. Can use a software program that tries millions of combinations of letters and numbers. Often accounts are configured to disable after a certain number of login attempts, to prevent these attacks. |
|
|
Term
|
Definition
Linear bus topology
A type of network topology. All computers are connected in a sequence on a single cable. Has become legacy technology because it is inefficient on Ethernet networks, and isn't designed to easily support wireless connections. Still found in some manufacturing facilities where groups of computer-controlled machines are connected. Data collisions are more common, and access method must be established. A passive topology. Uses minimal cable; installation is easy, reliable, and inexensive. Breaks in the cable can disable the network, and large numbers of computer can decrease performance due to high volume of data traffic. The cable has terminators at the ends. |
|
|
Term
Business intelligence system |
|
Definition
A type of information system. Used to analyse and interpret data in order to enable managers to make informed decisions about how best to run a business. Includes management information systems, decision support systems, and enterprise resource planning systems. |
|
|
Term
|
Definition
A factor to consider when choosing network cable. Cost is different for each cable type. Budget can limit choice. |
|
|
Term
|
Definition
A common data type in Microsoft Access. Used to store results of a calculation. Often involved numeric and currency or date/time data from other fields in the database. |
|
|
Term
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) |
|
Definition
Prevents data collisions in star topology networks. A node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals. If the node doesn't hear any other signals, it assumes it is safe to transmit data. |
|
|
Term
|
Definition
A list of rules that defines how to display HTML elements. Enable web developers to define a kind of formatting for each HTML element, and apply it to all the elements on a set of web pages. The developer only needs to change style on the style sheet to have a global change of style. There is a hierarchy to which rules are followed, with styles ranked according to assigned weights. |
|
|
Term
|
Definition
The server coordinates data security and file backups. Client/server networks are centralized. |
|
|
Term
|
Definition
Used for telephone communications. A dedicated connection is formed between two points, and the connection remains active for the duration of the transmission. Inefficient for computer connections. |
|
|
Term
|
Definition
A data mining technique. Define data classes to help spot trends, then aplpy class definitions to all unclassified data. Classes are applied to all unclassified data before analysis. |
|
|
Term
|
Definition
Information captured about each click that users make as they navigate through a website. Used to determine which pages users visit most, time spent on each page, and user demographics. |
|
|
Term
|
Definition
Server-based network
Contains severs and client computers, network topologies, transmission media, network adapters, network navigation devices, and a network operating system. Servers store and share resources on a network. Clients request resources from servers. Centralized. Incldues PANs, LANs, WANs, and MANs. The majority of internet communications follow this network style. On the internet, cleints are devices with browsers, such as computers, tablets, and smartphones, and there are various types of servers including web, commerce, and file servers. |
|
|
Term
|
Definition
A program that runs on the client computer, and requires no interaction with a web server. Can make web applications more efficient. Programmed using HTML embedded scripting languages or applets. |
|
|
Term
|
Definition
A dedicated server. Servers maintained by a hosting company such as Rackspace Hosting. Connected to the network through the internet. Can be any server type. Saves on computer professional staffing, saving money for business. |
|
|
Term
|
Definition
A data mining technique. Organizing data into similar clusters, without using predefined classes. |
|
|
Term
|
Definition
Consists of a core, usually copper, that transmits the signal, a solid layer of insulating plastic, a braided metal shielding to reduce interference, and an external jacket of plastic. |
|
|
Term
|
Definition
A type of server used in networks that make up the internet. Hosts software that enables users to buy goods and services over the web. Generally use special security protocols to protect sensitive information, such as credit card numbers, from being intercepted. |
|
|
Term
Common Gateway Interface (CGI) |
|
Definition
Provides a methodology by which browsers can request a program file be executed instead of just delivered to the browser. Enables functionality of webpages beyond simple display of information. |
|
|
Term
|
Definition
A dedicated server. Handles all communications between the network and other networks, including the internet. All requests for internet information pass through the communications server. Often it is the only device connected to the internet. The single point of contact makes the network more secure from hackers. The email and web servers connect to the internet through it. In most organizations, it has a heavy workload. |
|
|
Term
|
Definition
comodo.com
An email service that offers built-in encryption, and free versions of secure email services. |
|
|
Term
|
Definition
A common validation rule. Ensures that all required fields have been completed. |
|
|
Term
Connection-oriented protocol |
|
Definition
Protocols that require handshaking. Includes TCP. |
|
|
Term
|
Definition
Protocols that don't require any type of connection to be established or maintained between the two computers exchanging information. Includes UDP. |
|
|
Term
|
Definition
A common validation rule. Compares the values of data in two or more fields, to see if the values ore reasonable. |
|
|
Term
|
Definition
All the data is maintained together in one file as a database. Becomes a shared source that everyone can access, increasing efficiency. Ensures data integrity. |
|
|
Term
|
Definition
When two comptuers send data at the same time in a network, and the data collides in the transmission media. Data is lost or damaged. A problem on all types of networks. |
|
|
Term
|
Definition
Database schema
A description of the data, contained in the database's files. Like a map of the database, defining features of the fields. Most DBMSs keep it hidden from users to prevent them from accidentally modifying it. Includes information on field name, data type, description of the field, properties of the data, field size, and validation rules. Has metadata. |
|
|
Term
|
Definition
When different versions of the same data appear in different places in a database. |
|
|
Term
|
Definition
Data in a database that is accurate and reliable. Ensured by data centralization. |
|
|
Term
|
Definition
A layer in the OSI model. Assembles data into frames, adddresses them, adn sends them to the physical layer for delivery. |
|
|
Term
|
Definition
Small slices of a data warehouse. Often created so that companies can analyse a related set of data that is grouped together and separated out from the main body of data in the data warehouse. |
|
|
Term
|
Definition
Great amounts of data are analysed and investigated. Searching for significant patterns or trends within the data that would otherwise not be obvious. Techniques include classification, estimation, affinity grouping, clustering, and description and visualization. |
|
|
Term
|
Definition
Unnecessary copies of data in a database. Can be problematic, and increases chances of data entry mistakes. |
|
|
Term
|
Definition
Reformatting data for storage in a data warehouse.
1. Extraction of data from source databases.
2. Transformation of the data
3. Storage of the data in the data warehouse. |
|
|
Term
|
Definition
Field type
Indicates what type of data can be stored in the field, preventing wrong data from being entered into the field. Common data types in Microsoft Access are short text, long text, number and currency, date/time, calculated, OLE object, and hyperlink. |
|
|
Term
|
Definition
A large-scale collection of data that contains and organizes in one place all the data from an organization's multiple databases. |
|
|
Term
|
Definition
A collection of related data that can be stored, sorted, organized, and queried. Many actions we perform generate data which needs to be stored, managed, and used by others. Make data more meaningful and useful. Effectively turn data into information. Includes relational, object-oriented, and multidimensional databases. |
|
|
Term
Database administrator (DBA) |
|
Definition
Database designer
An IT professional who is responsible for designing, constructing, and maintaining large databases. Reviews and manages data on an ongoing basis to ensure data is flowing smoothly into and out of the database. |
|
|
Term
Database management system (DBMS) |
|
Definition
A specially designed application software for creating and managing databases. Interacts with the user, other applications, and the database. Functions in creating data tables, entering data, viewing and sorting data, querying data, and outputting data. |
|
|
Term
|
Definition
A dedicated server. Provides client computers with database access. Allows multiple users to access the database at the same time. |
|
|
Term
|
Definition
A common data type in Microsoft Access. Used to store dates and times in standard notation. Data may be used in calculations. |
|
|
Term
|
Definition
No central server coordinates data security or file backups. P2P networks are decentralized. |
|
|
Term
Decision support system (DSS) |
|
Definition
A type of business intelligence system. Helps managers develop solutions to specific problems. May provide statistical information. Enables users to add their own insights and experiences to apply them to the solution. Model management systems may assist in building management models. Knowledge-based systems may supplement intelligence. |
|
|
Term
|
Definition
Used to fulfil one specific function in a large client/server network. Added whenever new users are added to the network to reduce load on the main server. Includes authentication, file, print, application, database, email, communications, web, and cloud servers. |
|
|
Term
|
Definition
The value the database automatically uses for the field, unless the user enters another value. Useful for data fields that are frequently the same. |
|
|
Term
Description and visualization |
|
Definition
A data mining technique. Describing data so that managers can interpret it in new and different ways. Produces a clear picture of what is going on with the data. |
|
|
Term
|
Definition
A report which may be generated by a MIS. Provides a list of the transactions that occurred during a certain time period. |
|
|
Term
|
Definition
Special communications software installed on all client computers in a client/server network. Enable the network adapter to communicate with the server OS, and with the OS of the computer in which the adapter is installed. |
|
|
Term
Document Object Model (DOM) |
|
Definition
Organizes objects and page elements of JavaScript, including graphids, tables, and headers. Similar to cascading style sheets. |
|
|
Term
Domain Name System server (DNS) |
|
Definition
Converts URLs into IP addresses by consulting a database. The ISP web server has a default DNS server. |
|
|
Term
|
Definition
Dotted quad
An IP address is displayed as four octets separated by periods. |
|
|
Term
|
Definition
dropbox.com
An example of a website. The second-level domain is "dropbox". |
|
|
Term
|
Definition
The computer is assigned a temporary IP address from an available pool of IP addresses, and the address is used only while the computer is logged onto the network. More common than static addressing. The ISP can have fewer IP addresses because not every client will log onto the network at once. More secure from hackers. Handled by DHCP. |
|
|
Term
Dynamic Host Configuration Protocol (DHCP) |
|
Definition
A component of TCP/IP. Takes a pool of IP addresses and shares them with hosts on a network on an as-needed basis, providing dynamic addressing. |
|
|
Term
|
Definition
A combination of HTML, cascading style sheets, and JavaScript. Used to create lively and interactive websites. Allows a webpage to change after it has been loaded, generally in response to user actions. Brings special effects to otherwise static webpages, without requiring to download and install plug-ins or other special software. |
|
|
Term
|
Definition
ecolibris.net/greenapps.asp
A website that has a list of the top 100 green apps, all of which are free or less than $2. |
|
|
Term
Electronic data interchange (EDI) |
|
Definition
Allows exchange of large amounts of business data in a standardized electronic format. |
|
|
Term
|
Definition
Pairs of HTML tags, and the text between them. Interpreted by the browser, and appropriate effects are applied to the text according to HTML tags. |
|
|
Term
|
Definition
A dedicated server. Processes and delivers incoming and outgoing email. Stores, processes, and sends emails. The large volume of email on a large network could overwhelm a server that is handling other functions as well. Runs SMTP. |
|
|
Term
|
Definition
The process of coding email so that only the person with the key code can decipher the message. Includes private-key and public-key encryption. |
|
|
Term
Enterprise resource planning system (ERP) |
|
Definition
A type of business intelligence system. A software system that accumulates in a central location all the information relevant to running a business. Makes information readily available to whoever needs it to make decisions. |
|
|
Term
|
Definition
A data mining technique. Assign a value to data based on some criterion. May help with classification. |
|
|
Term
|
Definition
A report which may be generated by a MIS. Shows conditions that are unusual or need attention by system users. |
|
|
Term
|
Definition
A component of a knowledge-based system. Tries to replicate decision-making processes of human experts, in order to solve specific problems. |
|
|
Term
Extensible Markup Language (XML) |
|
Definition
The current version of HTML. Has muchh more strignent rules than HTML regarding tagging. Describes the content in terms of what data is being described, rather than how it is to be displayed. Users can build their own markup languages to accomodate particular data formats and needs. Used by most web developers. Not a programming language, it is a set of rules for marking up blocks of text so that a web browser knows how to display it. Packages include MathML, X3D, and MusicML. |
|
|
Term
|
Definition
An area of an intranet that only certain corporations or individuals can access. Its owner decides who will be permitted to access it. Useful for enabling EDI. |
|
|
Term
|
Definition
Composed of a glass or plastic fibre or bundle of fibes, through which data is transmitted, a protective layer of glass or plastic coating, and an outer jacket of durable material. Data can be transmitted in only one direction, so at least two fibres are contained in most fibre-optic cables to enable transmission in both directions. |
|
|
Term
|
Definition
A category of information. Displayed as a column. |
|
|
Term
|
Definition
A property that must be satisfied for an entry to be accepted into a field. |
|
|
Term
|
Definition
A way of describing the information in a field. |
|
|
Term
|
Definition
Field name, data type, and other data elements. Can be seen in Design View in Microsoft Access. |
|
|
Term
|
Definition
Defines the maximum number of characters that a field can hold. If data longer than the field size is entered, it may be truncated during data entry. |
|
|
Term
|
Definition
A dedicated server. Stores and manages files for network users. Users may be provided with space on the file server. Used in networks that make up the internet. Developed to provide remote storage space, or act as storehouses for files that users can download. Cloud service providers have huge collections of file servers. |
|
|
Term
File Transfer Protocl (FTP) |
|
Definition
A component of TCP/IP. Enables files to be downloaded to a computer or uploaded to other computers. The client program first establishes a TCP session with a remote comptuer. |
|
|
Term
|
Definition
A method to display only records matching specific criteria. Temporarily displays records that match certain criteria. You cannot save filter results. useful if you don't need to review results at another time. Can only be applied to fields from the same table. |
|
|
Term
|
Definition
Bend radius
A factor to consider when choosing network cable. How much cable can bend before it is damaged. If there are lots of corners, cable needs to bend at a high radius. |
|
|
Term
|
Definition
A common field used to make the link in a relationship. Having relational integrity keeps the data synchronized. |
|
|
Term
|
Definition
A group of data packets sent together in a package. A container that can hold multiple data packets. |
|
|
Term
|
Definition
consumer.ftc.gov/features/feature-0014-identity-theft
A website that provides guidelines on what to do if your identity has been stolen. |
|
|
Term
|
Definition
Enables interjection of experimental learning into the equation by considering probabilities. Enabled by knowledge-based systems. |
|
|
Term
|
Definition
google.com
An example of a website with a domain name. Google also has an IP address of the server where the main website is deployed. |
|
|
Term
|
Definition
developers.google.com/appengine
A website where you can host web applications through a remote server. |
|
|
Term
|
Definition
Used in connection-oriented protocols. Two computers exchange control packets, setting up the parameters of the data exchange session before sending data. Includes three-way handshaking. |
|
|
Term
|
Definition
A base-16 numbering system, using characters 0 - 9 then A - F. |
|
|
Term
|
Definition
A type of LAN installed in a home. Not usually deployed by businesses, except small home businesses. |
|
|
Term
|
Definition
A computer system that is set up to attract unauthorized users by appearing to be a key part of a network or system, containing something of value. |
|
|
Term
HTML embedded scripting language |
|
Definition
Used to program client-side programs. Tucks programming code directly within the HTML of a webpage. Includes JavaScript. |
|
|
Term
|
Definition
Surround and define HTML content. Applies effects to the text between the tags. |
|
|
Term
|
Definition
A component of TCP/IP. Transfers HTML data from servers to browsers. An encrypted protocol for secure transmissions, ensuring that data is sent securely. A combination of SSL and TLS. Provides data integrity and security for transmissions over the internet. Used by commerce servers to protect sensitive information from hackers. |
|
|
Term
|
Definition
hushmail.com
An email service that offers built-in encryption, and free versions of secure email services. |
|
|
Term
|
Definition
Combining multiple topologies into one network to fit different needs. |
|
|
Term
|
Definition
A common data type in Microsoft Access. Used to store alphanumeric data stored as a hyperlink address to a webpage, an email address, or an existing file. |
|
|
Term
Hypertext Transfer Protocol (HTTP) |
|
Definition
A component of TCP/IP. Transfers HTML data from servers to browsers. Created for the transfer of hypertext documents across the internet; documents in which text is linked to other documents or media. |
|
|
Term
|
Definition
Ensuring information systems are adequately secured against tampering. Includes availability, integrity, authentication, confidentiality, and non-reduplication. |
|
|
Term
|
Definition
A software-based solution used to gather and analyse information. Databases, data warehouses, and data marts are integral parts of information systems. Includes business intelligence, office support, and transaction-processing systems. |
|
|
Term
|
Definition
Used to control how new data is entered into a database, and to make changes to existing data in the database. |
|
|
Term
|
Definition
A factor to consider when choosing network cable. Twisted-pair and coaxial cable are inexensive to install. Fibre-optic cable requires special training and equipment to install. |
|
|
Term
|
Definition
A factor to consider when choosing network cable. Twisted-pair is the most susceptible to interference. Fibre-optic is immunie to interference. |
|
|
Term
|
Definition
A network of networks. Owned by individuals, universities, government agencies, and private companies. |
|
|
Term
Internet Architecture Board (IAB) |
|
Definition
iab.org
A major organization in internet governance and development. A technical advisory group to the Internet Society and IETF committee. Provides direction in the maintenance and development of internet protocols. |
|
|
Term
Internet Assigned Numbers Authority |
|
Definition
iana.org
A website where you can find a complete list of country-code top-level domains. |
|
|
Term
|
Definition
Main paths of the internet, along which data travels the fastest. A collection of large national and international networks, mostly owned by commercial, educational, or government organizations. Companies which provide backbones in the US include Verizon, AT&T, and Spring. Typically composed of OC lines. |
|
|
Term
|
Definition
A section of the hard drive that stores information you may need again, such as IP addresses, and frequently accessed web pages. Speeds up internet usage. Limited storage space, so entries are held for a fixed period of time and then deleted. |
|
|
Term
Internet Corporation for Assigned Names and Numebrs (ICANN) |
|
Definition
icann.org
A major organization in internet governance and development. An organization responsible for managing the internet's domain name system and the allocation of IP addresses. Registers all IP addresses, and ensures they are unique and haven't been assigned to other users. Allocates IP addresses to network administraotrs. Assigns companies or organizations to manage domain name registration; names can't be duplciated within a top-level domain. |
|
|
Term
Internet Engineering Task Force (IETF) |
|
Definition
ietf.org
A major organization in internet governance and development. A subgroup of the Internet Society that researches new internet technologies to imrpove its capabilities and keep the infrastructure functioning smoothly. |
|
|
Term
Internet exchange point (IXP) |
|
Definition
Connect ISPs. Made up of one or more network switches to which ISPs connect. Reduce the cost of networks, and improve speed and efficiency of networks by connecting directly to IXPs. |
|
|
Term
|
Definition
Internet-enabled devices such as appliances, switches, light bulbs, and smoke detectors, all sending and receiving messages over the internet. |
|
|
Term
|
Definition
A component of TCP/IP. Sends data between computers on the internet. |
|
|
Term
Internet Protocol version 4 (IPv4) |
|
Definition
Created in 1981, when no-one could foresee the growth of the internet which would occur in the 1990s. Four billion possible IP addresses seemed like more than enough. However, now we are near to running out. |
|
|
Term
Internet Protocol version 6 (IPv6) |
|
Definition
An IP addressing scheme developed by IETF, to produce more possible IP addresses. Uses 128-bit addressing rather than 32-bit addressing. Each digit uses hexadecimal digits, and there are 8 octets rather than 4. Should supply a virtually endless supply of IP addresses. The conversion to IPv6 should accelerate when IPv4 IP addresses run out. |
|
|
Term
|
Definition
internetsociety.org
A major organization in internet governance and development. A professional membership society that provides leadership for the orderly growth and development of the internet. |
|
|
Term
|
Definition
A private network set up by a business or organization, used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters. Can facilitate information sharing, database access, group scheduling, videoconferencing, and other employee collaboration. Not accessible by unauthorized individuals. |
|
|
Term
|
Definition
A unique identification number that defines each computer, service, or other device connected to the internet. Must be registered by ICANN. May be displayed as a dotted decimal number. Provided by static or dynamic addressing. |
|
|
Term
|
Definition
A signal sent to all nodes in a star topology network when two data signals are sent at the same time. Alerts nodes that a collision has occurred, so they will stop transmitting data and wait before retransmitting data signals. Wait time is random, otherwise nodes would restart at the same time, producing another data collision. |
|
|
Term
|
Definition
Not to be confused with Java. A common scripting language for creating DHTML effects. HTML documents can be made responsive to mouse clicks and typing. Often used to validate information you input into a web form. Downloaded to the browser with the HTML document, and all commands are executed on the client computer. Objects and page elements are organized by DOM. |
|
|
Term
JavaScript Object Notation (JSON) |
|
Definition
A data interchange standard that is easy for humans to read and write. Faster and easier to use than XML. Consists of name and value pairs. |
|
|
Term
|
Definition
Links two tables using the common field in both tables, and extracts relevant data from each. |
|
|
Term
|
Definition
The two keys used in public-key encryption. The public key and the private key. They are generated in such a way that they can only work with each other. |
|
|
Term
|
Definition
Provides intelligence that supplements the user's own intellect, making a DSS more effective. Enables fuzzy logic. Includes an expert system and a NLP. |
|
|
Term
|
Definition
A common type of client/server network. A network of nodes covering a small geographic area. Used in small businesses or self-contained units of a large business, such as a floor. Generally a small group of computers and peripherals linked together. Includes HANs. |
|
|
Term
|
Definition
A common data type in Microsoft Access. Used to store long blocks of text, up to 65,535 characters. |
|
|
Term
Management information system (MIS) |
|
Definition
A type of business intelligence system. Provides timely and accurate information that enables mangers to make critical business decisions. Generate detail reports, summary reports, and exception reports. |
|
|
Term
Many-to-many relationship |
|
Definition
A type of relationship. Records in one table may be related to multiple records in a second table, and vice versa. |
|
|
Term
|
Definition
An XML custom pacakge. Includes <times>, <power>, and <divide>. |
|
|
Term
|
Definition
A factor to consider when choosing network cable. How far a cable can run before the data signal degrades. Distance between nodes determines run length needed. |
|
|
Term
Media access control address (MAC) |
|
Definition
A physical addres on each network adapter. Six two-position characters. The first three specify the manufacturer of the network adapter. The last three make up the unique address. All MAC addresses must be unique. Used for identification within a network. Can be used for security; only authorized MAC addresses are permitted to access the network. |
|
|
Term
|
Definition
Data that describes other data. An integral part of a data dictionary. Helps to categorize data and sets parameters for entering valid data into the database. |
|
|
Term
Metropolitan area network (MAN) |
|
Definition
A common type of client/server network. WANs constructed by municipalities to provide connectivity in a specific geographic area. Not deployed by businesses, but often used by employees while travelling. |
|
|
Term
|
Definition
modcloth.com
A company that uses crowdsourcing to have customer-driven merchandise. Founded in 2002 by two 17-year-old students. The website allows customers to deceide what the company should stalk. |
|
|
Term
|
Definition
Software that assists in building management models in a DSS. Provides a view of a particular business situation for the purpose of decision making. |
|
|
Term
Multidimensional database |
|
Definition
Stores data that can be analysed from different perspectives. Organized into a cube. Can be customized to provide information to a variety of users based on their needs. Can process data much faster than a relational database. |
|
|
Term
Multipurpose Internet Mail Extensions (MIME) |
|
Definition
A protocol used to attach files to emails. Handles encoding and decoding for users. |
|
|
Term
Multipurpose Internet Mail Extensions (MIME) |
|
Definition
A protocol used to attach files to emails. Handles encoding and decoding for users. |
|
|
Term
|
Definition
An XML custom package. Includes <score>, <heat>, <measure>, and <clef>. |
|
|
Term
|
Definition
epa.gov/mygreenapps
A website hosted by the U.S. Environmental Protection Agency. Makes it easy to find apps that support green lifestyles. Lists almost 300 existing apps. |
|
|
Term
Natural language processing system (NLP) |
|
Definition
A component of a knowledge-based system. Enables users to communicate with computer systems using a natural spoken or written language, instead of computer programming language. Includes Siri. |
|
|
Term
Negative acknowledgment (NAK) |
|
Definition
A signal sent to inform that a data packet received is unreadable. The sending system will then resend the data packet. |
|
|
Term
Network access point (NAP) |
|
Definition
Points of connection of ISPs. Designed to move large amounts of data quickly between networks. IXPs are more common nowadays. |
|
|
Term
|
Definition
Network interface card (NIC)
Devices that perform specific tasks to enable nodes and peripherals of a network to communicate. Generate a high-powered signal to enable network transmission. Break data into packets and transmit and receive data. Act as gatekeepers for information flow to and from the client computer. Most NICs are Ethernet compliant. |
|
|
Term
|
Definition
Personnel that maintain business networks. Have training in computer and peripheral maintenance and repair, network design, and installation of networking software. |
|
|
Term
|
Definition
A layer in the OSI model. Determines where to send the packets on the network. |
|
|
Term
Network operating system (NOS) |
|
Definition
Special software that needs to be installed on each client and server computer connected to a network. Provides services necessary for them to communicate. Provides a set of common rules, a protocol that controls communications. Most operating systems include NOS software as part of the basic installation. Server NOS include Windows Server, Linux, UNIX, and SUSE Linux. |
|
|
Term
|
Definition
networksolutions.com
A website where you can look up .com or .net domain names to see if they are available, and if not, who owns it. |
|
|
Term
|
Definition
The physical and logical arrangement of computers, transmission media, and other network components. Includes bus, ring, start, and hybrid topology. |
|
|
Term
|
Definition
Ensuring that data is organized most efficiently. Can include removing data redundancy. |
|
|
Term
|
Definition
A common data type in Microsoft Access. Used to store numeric data that can be used in calculations, or that is represented as currency. |
|
|
Term
|
Definition
A common validation rule. Confirms that only numbers are entered in a field. |
|
|
Term
|
Definition
Stores data in objects rather than in tables. Objects contain data and methods for processing or manipulating the data. Stores more types of data than relational databases, and accesses that data faster. Good at handling unstructured data. Needs to use a query language. |
|
|
Term
|
Definition
Each of the four numbers in a dotted decimal. Has 8 positions when displayed in binary form. |
|
|
Term
Object Query Language (OQL) |
|
Definition
A common query language. Similar to SQL. |
|
|
Term
Office support system (OSS) |
|
Definition
A type of information system. Improves communications and assists employees in accomplishing daily tasks. Includes email, word processing, spreadsheet, database, and presentation programs. |
|
|
Term
|
Definition
A common data type in Microsoft Access. Used to store pictures, charts, or files from other Windows-based applications. |
|
|
Term
|
Definition
A type of relationship. The most common type of relationship. A record appears only once in one table, while having the capability to appear in many times in a related table. |
|
|
Term
|
Definition
A type of relationship. For each record in a table there is one corresponding record in a related table. |
|
|
Term
Online analytical processing (OLAP) |
|
Definition
Software that provides standardized tools for viewing and manipulating data in a data warehouse. Enables flexible views of the data. |
|
|
Term
Online transaction processing (OLTP) |
|
Definition
May be included in a TPS. Real-time processing of transactions over the internet. Ensures that data in the TPS is current. |
|
|
Term
Open Security Foundation's Dataloss Database |
|
Definition
datalossdb.org
A website that tracks data breaches. The fastest way to find out if your information has been compromised. |
|
|
Term
|
Definition
Design is made public for access by any interested party. Internet protocols are open systems. |
|
|
Term
Open Systems Interconnection (OSI) |
|
Definition
A standard of communications adopted throughout the world. Provides the protocol guidelines for all modern networks. All modern NOSs are designed to interact in accordance with the standards set in the OSI model. Has seven layers, each with a specific function, which communicate with the layers above and below it. Layers are application, presentation, session, transport, network, data link, and physical layers. |
|
|
Term
Optical carrier line (OC) |
|
Definition
A high-speed fibre-optic line. Has a range of speeds from 0.053 Gbps to 40 Gbps. Internet backbones are typically made of OC lines. |
|
|
Term
|
Definition
Data packet
Small chunks of data which are sent in packet switching. Contents vary, depending on the protocol. All packets must contain an address to which it is sent, an address from which it originates, reassembly instructions, and the data that is being transmitted. |
|
|
Term
|
Definition
Having an external screening router examine incoming data packets to ensure they originated from or are authorized by valid users on the network. Unauthorized or suspect packets are discarded before reaching the network. Can be configured for outgoing data to ensure requests to the internet are from legitimate users. |
|
|
Term
|
Definition
Used for computer communications. Doesn't require a dedicated communications circuit to be maintained. Data is broken into packets, which are sent over various routes at the same time. Packets are reassembled at the receiving computer. |
|
|
Term
|
Definition
pandora.com
A website that plays randomly selected songs with attributes similar to the seeds that you provide. |
|
|
Term
|
Definition
A website that has a searchable database of 10 million companies and 35 million products. Gather information that indicates the reliability of suppliers from sources such as government agencies, independent certification companies, non-profit organizations, and customers. Creates ratings on companies on a scale from 1 to 100. |
|
|
Term
|
Definition
www.pearsonhighered.com
A website to which you could add a hyperlink in HTML. |
|
|
Term
Personal area network (PAN) |
|
Definition
A common type of client/server network. Devices used by one person connected by wireless media. Used by employees travelling on business. |
|
|
Term
|
Definition
Devices attached to the network do nothing to move data along the network. Data travels the entire length of the medium and is received by all network devices. Includes bus topology. |
|
|
Term
|
Definition
A layer in the OSI model. Transmits data on the network so it can reach its intended address. |
|
|
Term
|
Definition
Where individual internet users connect to an ISP. A bank of modems, servers, routers, and switches through which many users can connect to an ISP simultaneously. There are many POPs throughout geographic areas. |
|
|
Term
Positive acknowledgment (ACK) |
|
Definition
A signal sent to confirm that a data packet has been received. |
|
|
Term
|
Definition
Any object that a user carries to identify themselves, and grants them access to a computer sytem or facility. Can be a badge, key card, or smart key. |
|
|
Term
|
Definition
A layer in the OSI model. Reformats data so that the session layer can understand it. Compresses and encrypts data. |
|
|
Term
Pretty Good Privacy (PGP) |
|
Definition
download.cnet.com
A free public-key encryption package available to download. |
|
|
Term
|
Definition
A unique field that must be present in every record. Ensures that each entry is impossible to duplicate in the records. Could be a unique identification number that has no meaning outside of the database system. |
|
|
Term
|
Definition
Print spooler
A software holding area for print jobs. Printing requests from clients are put into the print queue. Makes printing on a shared printer more efficient. Print servers have them. |
|
|
Term
|
Definition
A dedicated server. Manages printing jobs for client computers. Frees the client computer CPU to do other jobs. Has a print queue. |
|
|
Term
Privacy Rights Clearninghouse |
|
Definition
privacyrights.org/data-breach
A website that tracks data breaches. The fastest way to find out if your information has been compromised. |
|
|
Term
|
Definition
One of the keys in the key pair of public-key encryption. Used for decoding. The user is the only one who ever possesses this key. It is produced first. |
|
|
Term
|
Definition
Encryption where only the two parties involved in sending the message have the code. Could be a simple shift code, or a more complex code. If someone steals a copy of the code, or can figure out how to decode it, the code is broken. |
|
|
Term
|
Definition
Private system
Design is not public. |
|
|
Term
|
Definition
A set of rules for exchanging electronic information. Allows any computer to be able to communicate with any other computer. Choice of protocol is made by developers of comptuer programs. |
|
|
Term
|
Definition
A go-between that connects computers on an internal network with those on an external network. All requests from the internal network for internet data are directed through a proxy server. |
|
|
Term
|
Definition
One of the keys in the key pair of public-key encryption. Used for coding. Generally distributed. May be placed on a website. |
|
|
Term
|
Definition
Encryption where there are two keys: the key pair. Computations for producing keys are so complex, they are considered unbreakable. Commonly used over the internet. Includes PGP. |
|
|
Term
|
Definition
A method to display only records matching specific criteria. A way of retrieving a particular subset of data that matches certain criteria. Can be used to extract data from one or multiple tables, and can be saved and run again whenever necessary, to obtain updated results. |
|
|
Term
|
Definition
A specially designed computer language used to manipulate data in or extract data from a database. Object-oriented databases need to use a query language. Constists of its own vocabulary and sentence structure used to frame requests. Includes OQL and SQL. |
|
|
Term
|
Definition
railsforzombies.org
codeschool.com
A free interactive tutorial that teaches the programming system Ruby on Rails. Offered from the Code School. Teaches you to organize a Zombie Walk, where people gather, dressed as zombies. |
|
|
Term
|
Definition
A website which provides true random numbers for web applications, including generating encryption algorithms. The numbers are produced based on atmospheric radio static, which is truly random. |
|
|
Term
|
Definition
A common validation rule. Ensures that the data is within a certain range of values. |
|
|
Term
|
Definition
A computer engineer who worked on ARPANET, the precursor of the internet. In 1971, invented email. Initially it was a program that enabled users to leave text messages for each other on a single computer. By 1973, email accounted for 75% of ARPANET data traffic. |
|
|
Term
|
Definition
May be included in a TPS. The database is updated while the transaction is taking place. |
|
|
Term
|
Definition
A group of related fields. |
|
|
Term
|
Definition
For each value in the foreign key table, there is a corresponding value in the primary key table. |
|
|
Term
|
Definition
The use of English-like expressions that have variables and operations, much like algebraic equations. Variables include table names, field names, or selection criteria. Operations include directions such as select, from, and where. |
|
|
Term
|
Definition
The most common type of database. Operates by organizing data into various tables based on logical groupings. Good for data that can fit into tables and be organized into fields and records. Good at handling structured data. |
|
|
Term
|
Definition
A link between tables that defines how the data is related. The foreign key makes the link. Includes one-to-many, one-to-one, and many-to-many relationships. |
|
|
Term
|
Definition
Loop topology
A network topology. Computers and peripherals are laid out in a configuration resembling a circle. Data flows around the circle from device to device in one direction. Data collisions are prevented with token method. An active topology. All nodes on the network have equal chance to send data. Performance is acceptable even with large numbers of users. Breaking the ring causes the entire network to fail. Adding or removing nodes disables the network, and failure of one node can bring down the network. Problems in data transmission can be difficult to locate. |
|
|
Term
|
Definition
Knows the location of all DNS servers that contain master listings for entire top-level domains. There are 13 maintained throughout the entire internet. If the DNS server doesn't know the IP address of a URL, it is redirected to a root DNS server. |
|
|
Term
|
Definition
Sends information between two networks. Looks at higher-level network addresses such as IP addresses instead of MAC addresses. Sends/receives data to/from other networks, including the internet. |
|
|
Term
|
Definition
More users can be added easily without affecting the performance of other nodes. Client/server networks are scalable. |
|
|
Term
|
Definition
A domain that is directly below a top-level domain. The characters which appear before the period in the domain name. Needs to be unique within its top-level domain, but not necessarily unique to the entire internet. |
|
|
Term
Secure Sockets Layer (SSL) |
|
Definition
A component of HTTPS. A network security protocol. All major web browsers support SSL. |
|
|
Term
|
Definition
A common query used to extract data using relational algebra. Displays a subset of data from a table based on the criteria you specify. |
|
|
Term
|
Definition
Programs that run on a web server, rather than on your computer. Execution can require many communication sessions between client and server to achieve the goal. Can perform very complex operations. Created with PHP, Perl, and Python. |
|
|
Term
|
Definition
A layer in the OSI model. Sets up a virtual connection between the sending and receiving devices. Manages communications sessions. |
|
|
Term
|
Definition
An app that wakes you up gradually, and then you type, speak, or answer questions to record what you dreamed before you forget the dream. It then posts to a larger database of many people's dreams, and discovers patterns. |
|
|
Term
Shielded twisted-pair (STP) |
|
Definition
Twisted-pair cable with a layer of foil shieldign to reduce interference. |
|
|
Term
|
Definition
A common data type in Microsoft Access. Used to store letters, symbols, or numbers that aren't used in calculations (such as phone numbers), or a combination. Up to 255 characters. |
|
|
Term
Simple Mail Transfer Protocol (SMTP) |
|
Definition
A component of TCP/IP. Used for transmission of email messages across the internet. Responsible for sending emails to destinations, through email servers. Designed to handle text messages. |
|
|
Term
|
Definition
spotify.com
A website where you can search to find songs or artists you want to listen to. Incorporates social networking by informing you what songs your friends are listening to, and sharing playlists. |
|
|
Term
|
Definition
The most widely used topology for client/server networks. Offers the most flexibility for a low price. Nodes are connected to a central communications device, the switch. The switch receives signals from the sending node and retransmits it to the receiving node. An active topology. Uses CSMA/SC to prevent data collision. Jam signals are sent when two data signals are sent at the same time. Failure of one computer doesn't affect the rest of the network; good for large networks. The switch is a single point of failure; if it fails, all nodes are affected. Expensive to install and maintain; requires a lot of cable. Centralization design simplifies troubleshooting and repairs. Scalability is high; easy to add nodes. |
|
|
Term
|
Definition
The IP address never changes for a computer, most likely assigned manually by a network administrator or ISP. |
|
|
Term
|
Definition
Analytical data
Includes short words or numbers. Relational databases are best for structured data. |
|
|
Term
Structured Query Language (SQL) |
|
Definition
A common query language. The most common query language. A standard language used to conduct queries to extract data from relational databases. |
|
|
Term
|
Definition
A report which may be generated by a MIS. Provides a consolidated picture of detailed data. Usually includes some calculation or visual display of information. |
|
|
Term
|
Definition
Used to send data on a specific route through a network. Makes decisions base don the MAC address of the data as to where the data is to be sent and rebroadcasts it to the appropriate node. Improves network efficiency. Needed on all Ethernet networks. |
|
|
Term
|
Definition
Carry digital data over twisted-pair wires. Connect to ISP backbones. Mostly high-speed fibre-optic communications, designed to provide higher throughput than conventional telephone lines and DSL lines. Come in a variety of speeds. |
|
|
Term
|
Definition
File
A group of related records. Usually oragnized by a common subject. |
|
|
Term
|
Definition
The main suite of protocols used on the internet. Named after the original two protocols that were developed, TCP and IP, but also includes UDP, FTP, telnet, HTTP, HTTPS, SMTP, and DHCP. |
|
|
Term
|
Definition
A component of TCP/IP. Enables users to log into a remote computer and work on it as if sitting in front of it. |
|
|
Term
|
Definition
A device at the ends of the cable in bus topology. Absorbs signals so that they are not reflected back to other parts of the network that have already received it. |
|
|
Term
|
Definition
A handshake where the computer establishes a connection to the ISP and announces it has email to send, then the ISP server responds that it is ready to receive the email. The first computer then acknowledges the ready state of the server and beings to transmit email. Used in TCP. |
|
|
Term
|
Definition
Doesn't pertain to one period in time. The data warehouse will contain current historical data. |
|
|
Term
|
Definition
Token-ring topology
A special data packet that is passed from computer to computer in the token method. Large ring topology networks may have more than one token. |
|
|
Term
|
Definition
Prevents data collisions in ring topology. The token circles the ring until it is grabbed by a computer that needs to transmit data. The computer "holds" the token until it has finished transmitting data. The token is re-released only when the receiving computer sends an acknowledgment that it has received the data. This way only one computer on the ring can transmit at a tim. |
|
|
Term
Transaction-processing systems (TPS) |
|
Definition
A type of information system. Keeps track of everyday business activities such as transactions, registrations, or printing. May have batch processing, real-time processing and/or OLTP. |
|
|
Term
Transmission Control Protocol (TCP) |
|
Definition
A component of TCP/IP. Prepares data for transmission and provides error checking and resending of lost data. A connection-oriented protocol. Uses a three-way handshake. Provides reliable data transfer, ensuring all data packets are delivered free of errors. |
|
|
Term
|
Definition
The physical system that data takes to flower between devices on a network. Wired or wireless. Many corporate networks ahve a combination of wired and wireless. |
|
|
Term
|
Definition
A layer in the OSI model. Creates packets and handles packet acknowledgement. |
|
|
Term
Transport Layer Security (TLS) |
|
Definition
A component of HTTPS. An updated extension of SSL. |
|
|
Term
|
Definition
The main technology for achieving VPNs. Data packets are placed inside other data packets. The format is encrypted, and can only be understood by the receiving hardware. Hardware is optimized to seek efficient routes through the internet. |
|
|
Term
|
Definition
Consists of pairs of copper wires twisted around each other and covered by a protective sheath. Twists cause magnetic fields to form around the copper, amking them less susceptible to outside interference, and reduces the amount of crosstalk between wires. |
|
|
Term
|
Definition
Includes audio clips, video clips, pictures, and large documents. Object-oriented databases are best for unstructured data. |
|
|
Term
User Datagram Protocol (UDP) |
|
Definition
A component of TCP/IP. Prepares data for transmission, and lacks resending capabilities. A connectionless protocol. |
|
|
Term
|
Definition
Ensuring that data entered into a field meets specific guidelines. |
|
|
Term
|
Definition
A part of the data dictionary. Specified field properties. Voilation results in an error message. Includes range, completeness, consistency, alphabetic, and numeric checks. |
|
|
Term
Virtual private network (VPN) |
|
Definition
Uses the public internet communications infrastructure to create a secure, private network among various locations. Uses special security technologies and protocols, including tunneling. Requires special hardware including routers and firewalls, and VPN software. |
|
|
Term
|
Definition
Using specialized software to make individual physical servers behave as though they are more than one physical device. Each virtual server operates as a separate device, and can run its own operating system. The physical server is called the "host", and the virtual servers are "guest servers". |
|
|
Term
|
Definition
A dedicated server. Hosts websites to make them available through the internet. Runs specialized software enabling it to host web pages and other information, and to provide requested information to clients. Not every large network has a web server; many businesses use a third party web-hosting company. Used in networks that make up the internet. |
|
|
Term
|
Definition
Tells you the geographic location, or telephone area codes of IP addresses. |
|
|
Term
|
Definition
A common type of client/server network. Two or more LANs connected together, often over long distances. Connects business LANs over distances such as between branches in two cities. Comprises large numbers of usrs over a wide physical area, or separate LANs miles apart. |
|
|
Term
Wireless access point (WAP) |
|
Definition
Gives a wireless device a sending and receiving connection to point to the network, allowing for wireless connections. Establishes a connection using radio waves. Many devices can communicate with the network through a single wireless access point. |
|
|
Term
Wireless network interface card |
|
Definition
Wireless NAC
A network adapter installed in nodes in a wireless network. Laptops and other portable devices contain wireless NICs. |
|
|
Term
World Wide Web Consortium (W3C) |
|
Definition
w3.org
A major organization in internet governance and development. A consortium of organizations that set standards and develop protocols for the web. |
|
|
Term
|
Definition
An XML custom package. Includes <viewpoint>, <shape>, and <scene>. |
|
|
Term
|
Definition
yelp.com
A free online "yellow pages". Free to use, and anyone can write a review of a business and post it. Users can search the site to find services, and see ratings by other consumers. |
|
|
Term
|
Definition
zixcorp.com
A company that provides higher levels of encryption services, including confirmation of message delivery, message tracking, and overwriting of emails. |
|
|