Term
|
Definition
■ Implement the “User” features that we established in the scope. ■ be designed to run on a pre-determined platform (Mac, Windows, iPhone) ■ =be planned as a Thick or Thin client. (whats the difference?) ● thick= itunes (has to download/update for constant use) ● thin= facebook (for everyday use, run off a browser, no updates necessary) ■ Designed first, Developed Later |
|
|
Term
|
Definition
A tool used to establish guidelines for the developers to use while they create the interface. It is really an idea for a screen. Before you develop it, you need to identify what it is and what it will do. |
|
|
Term
|
Definition
■ Banner, Menu, Left Column, Right Column, Middle Work Area |
|
|
Term
|
Definition
○ System Design ○ Architecture of IS ○ Testing ○ Training ○ Documentation |
|
|
Term
|
Definition
- Allows you to have all of your visual information in front of you before you start building. 1.Collect the info you need 2.Group into pages 3.Plan the structure 4.Design the template 5.Test the template, structure, and pages |
|
|
Term
Types of screens created in a Storyboard |
|
Definition
+ Add/ Edit Screen + View Detail Screen + List Screen + Portal Screen + Display Screen |
|
|
Term
purpose of defining wireframes and storyboards |
|
Definition
By defining wireframes and storyboards, the scope of the project can be understood by all the parties involved with the creation of the material. The Wireframe allows the designers to understand their direct tasks, while the Storyboard help the testing groups ensure the optimal functionality of the IS. |
|
|
Term
How are wireframes and wireframe specifications created and used in the development of an IS |
|
Definition
A graphic designer designs the webpage, generally associated with a wireframe and designates what said webpage will look and feel like. Wireframe is essentially the aesthetics of an IS. But it’s only a rough skeleton as shown below. |
|
|
Term
What are the components of wireframes diagrams? |
|
Definition
Wireframe diagrams are composed of a skeleton map of the desired location of each functionality group. Each box within the map represents the placement of a certain function. For example, a thin box running across the top of the page with the word “menu” within it is explaining that this is where the functioning menu will be placed. |
|
|
Term
|
Definition
A structured collection of records or data that is stored in a computer system |
|
|
Term
|
Definition
Structure is achieved by organizing the data according to a |
|
|
Term
|
Definition
Most common database model is the -consists of tables (files) |
|
|
Term
Developers rely on Users to |
|
Definition
■ Tell them what they need to include in the Database ■ Check the Data Model ■ Verify the completeness and correctness of the final Data Model. |
|
|
Term
|
Definition
The smallest unit single students name, homework document or identification number. This usually consists of items referring to a single primary key. Made up of bytes/characters |
|
|
Term
|
Definition
This is the first grouping that takes place |
|
|
Term
|
Definition
This is the second organizational binding |
|
|
Term
|
Definition
Refers to the primary identification that uniquely identifies each record within a Record/ Row. There is only one per Field/ Column. |
|
|
Term
|
Definition
analyze existing reports; user activities |
|
|
Term
|
Definition
a summary of the requirements for the database; a representation of the structure of the data to be incorporated into the database (like a blueprint). |
|
|
Term
|
Definition
The definition of the number of instances that can be associated for each side of the relationship |
|
|
Term
|
Definition
portrays an optional relationship |
|
|
Term
|
Definition
portrays a mandatory one relationship |
|
|
Term
|
Definition
refers to a mandatory many relationship |
|
|
Term
Database Management System (DBMS) |
|
Definition
Software used to create Databases. Ex. Access, MySQL, Oracle |
|
|
Term
|
Definition
The rules defining how two tables interact or are connected with each other |
|
|
Term
|
Definition
the primary key of connecting table |
|
|
Term
Structured Query Language (SQL) |
|
Definition
- international standard language for processing a database. This is the language that is used between a DBMS and a database |
|
|
Term
|
Definition
a request for data from the database |
|
|
Term
|
Definition
are the pieces of a larger file broken into smaller forms to ensure quality and timely transfer. |
|
|
Term
|
Definition
Media Access Control Address. These are unique identifiers assigned to Network Cards (within the computer) that enable communication on the physical network segment. They are permanent, physical address given to each Network Interface Card (NIC) at the factory. |
|
|
Term
|
Definition
used in private networks controlled by company that operates the network |
|
|
Term
|
Definition
used on the internet by ICANN; each IP is unique across all computers |
|
|
Term
|
Definition
A device that forwards Data Packets along the Internet. They understand where a request is coming from, and direct it to the next location. Traffic between networks. |
|
|
Term
|
Definition
Transmitter Control Protocol/ Internet Protocol. These are rules and protocols that computers use to communicate with one another without encountering problems. This Protocol was originally used when the WWW first started. |
|
|
Term
|
Definition
series of steps: HTTP, PoP, PTP,FTP (shared language) The instructions to let me communicate. The steps taken to talk to other networks. -HTTP - websites -SMTP, PoP - email -FTP - file transfer protocol (downloading/uploading) |
|
|
Term
|
Definition
A set of numbers that identify a certain location of data. |
|
|
Term
|
Definition
are typicaly private addresses. These are usually not permanent. Generaly private. (Ex. Logging in through the restricted.utexas network) |
|
|
Term
|
Definition
want to be known, public and shared. Any website usually has a permanent static webpage. Generaly Public. (ex. Utexas.edu) |
|
|
Term
|
Definition
a digital networking communications method that groups all transmitted data into suitably-sized blocks |
|
|
Term
|
Definition
○ SSID broadcasting- disabling it makes access point to network connection invisible ○ User accounts ○ Encryption ○ MAC address filtering |
|
|
Term
What are the three main pieces of Internet technology |
|
Definition
routers, protocols, packets |
|
|
Term
|
Definition
for smaller areas. Local area network, in a small place. connects computers and devices in a limited geographical area |
|
|
Term
Network Interface Card (NIC) |
|
Definition
a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the use of MAC addresses. -Each has its unique id. This is written on a chip which is mounted on the card. |
|
|
Term
|
Definition
It receives requests and remembers where to direct the responses back to the Clients. directs traffic within a network. |
|
|
Term
Wireless Network Interface Card (WNIC) |
|
Definition
allowing a computer to access wireless internet |
|
|
Term
|
Definition
similar to LAN but covers wider area |
|
|
Term
Virtual Private Network (VPN) |
|
Definition
is a computer network which some of the links between nodes are carried by open connections or virtual circuits in some larger network( e.g., the Internet) instead of physical wires. Recreates privacy of computers connected by a cable. |
|
|
Term
|
Definition
client=computer that makes a request. server=computer that responds to request |
|
|
Term
|
Definition
This software is accessed through a web browser and does not require any maintenance form the user. Ex. Facebook. -less functionality available to the user |
|
|
Term
|
Definition
This software requires an effort from the user to download, install and update the software on the computer. Ex. iTunes. |
|
|
Term
|
Definition
coded traffic. A scrambled message that is sent to keep the information safe. The only way to understand the message is if you know the code to break it.The message is understood by the use of a key that is understood to break the code. |
|
|
Term
|
Definition
the most important aspect of a network with respect to security. It does not need every interaction or data transfer monitored by humans, as automated processes can be set up to assist in rejecting access request from unsafe sources, and allowing actions from recognized ones |
|
|
Term
|
Definition
■ Affected 11 million Americans in 2009 ■ Total damage in 2009 : $54 Billion ■ Total costs associated: $139 Billion |
|
|
Term
Sources of Security Breaches |
|
Definition
○ Human error and mistakes (accidental) ○ Malicious human activity (intentional) ○ Natural events and disasters |
|
|
Term
Unauthorized Data Disclosure |
|
Definition
Can occur by human error when someone inadvertently releases data in violation of policy |
|
|
Term
|
Definition
Understanding the chances that the information you provide may be stolen. |
|
|
Term
Types of Security Threats |
|
Definition
○ Unauthorized data disclosure ○ Incorrect data modification ○ Faulty service ○ Loss of infrastructure |
|
|
Term
|
Definition
occurs when a person gains unauthorized access to a computer system, to obtain critical data or to manipulate the system for financial gain. |
|
|
Term
|
Definition
A hidden software within a network that collects all the information you request or send on entering the network. Usually a free Internet source, unguarded and easy to publicly access. |
|
|
Term
|
Definition
an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. |
|
|
Term
|
Definition
setting up a fake website that either looks like a legitimate online shopping website or masquerades as an existing, legitimate website |
|
|
Term
|
Definition
recording traffic/intercepting computer communications, example in class was the email packets that could easily be read |
|
|
Term
|
Definition
In which phase of the SDLC are wireframes typically created? |
|
|
Term
|
Definition
A ________ physically connects computers at a single location |
|
|
Term
|
Definition
piece of hardware processes a shared service, like sending a web page |
|
|