Term
|
Definition
American Standard Code for Information Interchange. Code that represents characters as 8-bit codes and allows binary computer to work with letters, digits, and special characters.
This code is used to create up to 256 characters that a computer can recognize and is used by most American computers.
Ex. American Computers, binary code computers
|
|
|
Term
|
Definition
The ability of a software program to run on a specific computer system.
Compatibility whether a software or hardware works with other software or hardware. A type of software must be compatible with one's computer for it to operate on the computer
Ex. iPad linking to a Mac, Printer linking to a computer |
|
|
Term
|
Definition
Locating and identifying printed characters embedded in an image, allowing the text to be stored as an editable document.
This is used when a printed document is scanned by either a wand, pen scanner, or software to store and upload text onto a computer.
Ex. Pen Scanner, Wand, OCR Software |
|
|
Term
|
Definition
A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms.
This is used mainly in schools and for testing with a bubble sheet because the OMR can read the filled in bubbles and score the examination.
Ex. Standard Scantron Machine |
|
|
Term
|
Definition
A various width of bars read by a scanner to give information about product codes or inventory codes.
This is used in many locations such as grocery stores to scan products and instantly access the prices of each product.
Ex. Grocery store bar code scanner, Bar code on a box of cereal. |
|
|
Term
|
Definition
The number of distinct symbol changes made to the transmission medium per second in a digitally modulated signal or a line of code.
This is used to monitor, in symbols per second, how fast something such as a modem is transmitting information.
Ex. Modem working at 1000 Bd |
|
|
Term
Verification & Validation |
|
Definition
The process of checking that a product, service, or system meets specifications and that it fulfills its intended purpose.
Companies use this to run checks on their software to make sure it is meeting its intended needs for the company. If it is not, the verification and discover this and make a change.
Ex. Checking speed of server, checking reliability of modem |
|
|
Term
|
Definition
Protects transmitted information by scrambling the transmissions. Then decodes encryption with matching key to access information.
This is often used transferring data incase information is intercepted. It will be intercepted in a random assortment of symbols that has no coherence to the actual data to prevent eavesdroppers.
Ex. Encrypting secret CIA files so terroists can't read them.
|
|
|
Term
|
Definition
A software or hardware "gate" that protects internal networks from unauthorized access.
This is used to prevent viruses or spyware from entering a computer system to prevent the computer from malfunctioning.
Ex. Barracuda Firewall Software, Comodo Firwall Software
|
|
|
Term
|
Definition
Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.
This is used by hackers to infect host computers and can crash computers. It can be done out of spite or to obtain information.
Ex. Rick Rolled, swine flu
|
|
|
Term
|
Definition
A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.
This is used by hackers to sneak into host computers to cause ruckus even though the host doesn't expect it. It is very very sneaky.
Ex. Placing virus in a windows upgrade secretly |
|
|
Term
|
Definition
Programs that use computer hosts to reproduce themselves.
These are used by hackers to make a virus on a computer reproduce many times so that it can be sent out to other computers to infect a wide range of computers.
Ex. Developing a virus on one computer that then distributes itself to multiple computers over a network. |
|
|
Term
|
Definition
A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.
This is used to hack computers when the harmful software is stored in a computer to go off only when a specific function such as opening a document is performed.
Ex. Storing a virus on Itunes so the computer explodes when one song is played.
|
|
|