Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
532 Cards in this Set
- Front
- Back
3-D graphics
|
A type of digital
graphics format that displays a three-dimensional image on a two-dimensional space. 449 |
|
3-D graphics software
|
The
software used to create threedimensional wireframe objects, then render them into images. 124 |
|
Access control
|
Security
measures that limit access to systems, such as databases. 655 |
|
Accounting software
|
A category
of software that includes accounting, money management, and tax preparation software. 126 |
|
Ad hoc report
|
A customized
report (also called a demand report) generated as needed. 561 |
|
Ad-serving cookie
|
A cookie
installed by a marketing firm to track user activities on Web sites containing its ads. 400 |
|
Adaptive utilities
|
Utility software
that alters a device’s user interface to create an accessible environment for individuals with disabilities. 130 |
|
ALU (Arithmetic Logic Unit)
|
The
part of the CPU that performs arithmetic and logical operations on the numbers stored in its registers. 31 |
|
Always-on connection
|
In the
context of Internet access, a permanent connection, as opposed to a connection that is established and dropped as needed. 307 |
|
Analog data
|
Data that is measured
or represented on a continuously varying scale, such as a dimmer switch or a watch with a sweep second hand. 22 |
|
Analysis phase
|
Tasks performed
by the project team whose goal is to produce a list of requirements for a new or revised information system. 571 |
|
Android
|
An open source operating
system used primarily for handheld devices. 201 |
|
Anonymous proxy service
|
A server on the Internet that can be
used to forward Web requests after cloaking the originating address for users who want to surf anonymously. 403 |
|
Antispyware
|
Software that
blocks spyware from entering a computer. 403 |
|
Antivirus software
|
A computer
program used to scan a computer’s memory and disks to identify, isolate, and eliminate viruses. 167 |
|
Application development tool
|
Software, such as 4GLs, expert
system shells, and component objects, that can be assembled into the application software for an information system. 578 |
|
Application software
|
Computer
programs that help you perform a specific task such as word processing. Also called application programs, applications, or programs. 16 |
|
Application testing
|
The process
of testing newly developed application software by running unit tests, integration tests, and system tests. 584 |
|
Apps
|
Short for applications;
popularly used to refer to applications available for the iPhone, iPad, and other mobile devices. 16 |
|
Assembly language
|
A low-level
computer programming language that uses simple commands and is translated into machine language by an assembler. 677 |
|
Audio compression
|
Techniques
used to reduce the size of files that contain audio data. 424 |
|
Audio editing software
|
A
program that enables users to create and edit digital voice and music recordings. 121 |
|
Authentication protocol
|
Passwords, user IDs, and biometric
measures used to verify a person’s identity. 34 |
|
AVI (Audio Video Interleave)
|
A video file format, developed
by Microsoft, that was once the most common format for desktop video on the PC. 458 |
|
Backup
|
A duplicate copy of a
file, disk, or tape. Also refers to a Windows utility that allows you to create and restore backups. 222 |
|
Backup software
|
A set of utility
programs that performs a variety of backup-related tasks, such as helping users select files for backup, copying, and restoring. 228 |
|
Bandwidth
|
The data
transmission capacity of a communications channel. Digital signals are measured in bits per second; analog signals in Hertz. 251 |
|
Binary number system
|
A
method for representing numbers using only two digits: 0 and 1. Contrast to the decimal number system, which uses ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. 23 |
|
Bitmap graphic
|
An image, such
as a digital photo, that is stored as a grid work of colored dots. 430 |
|
Bitrate
|
A ratio such as 5:1 that
indicates the ratio of compression that has been applied to a file. High compression ratios such as 35:1 indicate more compression so data can be contained in smaller files. 457 |
|
BlackBerry OS
|
The operating
system software designed for handheld BlackBerry devices. 203 |
|
Blu-ray
|
A high-capacity storage
technology that stores up to 25 GB per layer on Blu-ray discs (BDs). 81 |
|
Bluetooth
|
A wireless technology
used in conjunction with standard Ethernet networks that allows data transfer rates between 200 and 700 Kbps up to a maximum range of 35 feet. 261 BMP The native bitmap graphic file format of the Microsoft Windows OS. 431 |
|
Boot disk
|
A floppy disk or CD
that contains the files needed for the boot process. 226 |
|
Boot process
|
The sequence of
events that occurs within a computer system between the time the user starts the computer and the time it is ready to process commands. 188 |
|
Bootstrap program
|
A program
stored in ROM that loads and initializes the operating system on a computer. 192 |
|
Broadband
|
A term used to refer
to communications channels that have high bandwidth. 251 |
|
Broadcast flag
|
A status flag
inserted into the data stream of digital television to indicate whether it can be copied. 467 |
|
Brute force attack
|
A method of
breaking encryption code by trying all possible encryption keys. 37 |
|
Byte
|
An 8-bit unit of data that
represents a single character. 26 |
|
CAD software (computer-aided
design software) |
A program
designed to draw 3-D graphics for architecture and engineering tasks. 124 |
|
Card reader
|
A device that can
be used to read and record data on solid state storage devices, such as flash memory cards. 84 |
|
CD (compact disc)
|
An optical
storage medium used to store digital information. CD-ROMs are read only. CD-Rs and CD-RWs can be used to record data. 81 |
|
Cell
|
In spreadsheet terminology,
the intersection of a column and a row. In cellular communications, a limited geographical area surrounding a cellular phone tower. 136 |
|
Centralized processing
|
An
information system design in which data is processed on a centrally located computer, usually a mainframe. 577 |
|
Ciphertext
|
An encrypted message.
285 |
|
Client
|
A computer or software
that requests information from another computer or server. 18 |
|
Client-side
|
Scripts and other
activities that are executed by a client’s browser, as opposed to being executed by the server. 372 |
|
Cloud computing
|
A type of
computing in which local devices access applications that run on an Internet-based server, where data can also be stored. 9 |
|
Code
|
In the context of computer
programming, code can be used as a noun to refer to the set of instructions that form a program, or as a verb that refers to the process of writing a program. 674 |
|
Codec
|
Short for compressor/
decompressor; a hardware or software routine that compresses and decompresses digital graphics, sound, and video files. 457 |
|
Command-line interface
|
A style
of user interface that requires users to type commands, rather than use a mouse to manipulate on-screen controls. 190 |
|
Commercial software
|
Copyrighted computer applications
sold to consumers for profit. 159 |
|
Communications channel
|
Any
pathway between the sender and receiver; channel may refer to a physical medium or a frequency. 251 |
|
Communications port
|
In the
context of computer networking, a virtual location for data that arrives or leaves the device; common ports include 21 for FTP, 110 for e-mail, and 80 for Web data. 340 |
|
Communications protocol
|
A set of rules that ensures the
orderly and accurate transmission and reception of data. 252 |
|
Compiler
|
Software that translates
a program written in a high-level language into low-level instructions before the program is executed. 30 |
|
Compression ratio
|
A ratio such
as 5:1 that indicates the ratio of compression that has been applied to a file. High compression ratios such as 35:1 indicate more compression so data can be contained in smaller files. 457 |
|
Computer
|
A device that accepts
input, processes data, stores data, and produces output according to a stored program. 14 |
|
Computer network
|
A collection
of computers and related devices connected in a way that allows them to share data, hardware, and software. 8 |
|
Computer program
|
A detailed
set of instructions that tells a computer how to solve a problem or carry out a task. 15 |
|
Computer programming
|
The
process of designing, coding, and testing computer programs. 675 |
|
Computer virus
|
A program
designed to attach itself to a file, reproduce, and spread from one file to another, destroying data, displaying an irritating message, or otherwise disrupting computer operations. 163 |
|
Computer worm
|
A software
program designed to enter a computer system, usually a network, through security “holes” and then replicate itself. 163 |
|
Convergence
|
In the context of
technology, the melding of digital devices into a single platform that handles a diverse array of digital content, such as cell phones that also play digital music and display digital video. 9 |
|
Copyright
|
A form of legal
protection that grants certain exclusive rights to the author of a program or the owner of the copyright. 156 |
|
Copyright notice
|
A line such as
“Copyright 2014 by ACME CO” that identifies a copyright holder. 156 |
|
CPU (central processing unit)
|
The main processing circuitry
within a computer or chip that contains the ALU, control unit, and registers. 15 |
|
Cropping
|
The process of selecting
and removing part of an image. 436 |
|
Data
|
In the context of computing
and data management, data refers to the symbols that a computer uses to represent facts and ideas. 15 |
|
Data center
|
A specialized facility
designed to house and protect computer systems and data. 592 |
|
Data mining
|
Analyzing data
to discover patterns and relationships that are important to decision making. 612 |
|
Data processing
|
An inputprocessing-
output cycle that converts data into information. 6 |
|
Data redundancy
|
Repetition of
data within a database. 637 |
|
Data representation
|
The use
of electronic signals, marks, or binary digits to represent character, numeric, visual, or audio data. 22 |
|
Data type
|
The characteristics
of data that can be entered into a field in a data file; data types include character, numeric, date, logical, and memo. 634 |
|
Data view
|
A mechanism typically
applied to databases in which different forms or reports are displayed depending on a query, and can be customized for different categories of users. 656 |
|
Data warehouse
|
A collection of
information organized for analysis. 612 |
|
Database
|
A collection of information
that might be stored in more than one file or in more than one record type. 139, 610 |
|
Database audit
|
A procedure that
monitors or records user activity within a database, often for security purposes. 655 |
|
Database index
|
A file of keys
and pointers used to display a list of database records organized according to the data in one or more fields. 639 |
|
Database model
|
The underlying
structure or category of a database, such as relational, hierarchical, network, or object. 614 |
|
Database server software
|
Software that is designed to
manage a large number of records and perform many simultaneous transactions. 626 |
|
Database software
|
Software
designed for entering, finding, organizing, updating, and reporting information stored in a database. 139 |
|
Database structure
|
The
arrangement of the fields, tables, and relationships in a database. 633 |
|
Debugger
|
A programming utility
that helps programmers test and correct a computer program. 685 |
|
Decision support system
|
(DSS) A computer system that
allows decision makers to manipulate data directly, to incorporate data from external sources, and to create data models or “what-if” scenarios. 562 |
|
Decryption
|
The process of converting
ciphertext into plaintext. 285 |
|
Defragmentation utility
|
A software
tool used to rearrange the files on a disk so that they are stored in contiguous clusters. 221 |
|
Design phase
|
The process a
project team uses for figuring out how to implement a new system. This phase is undertaken after the analysis phase is complete. 576 |
|
Desktop
|
A term used to refer
to the main screen of a graphical user interface that can hold objects such as folders and widgets. 191 |
|
Desktop computer
|
A computer
that is small enough to fit on a desk and built around a single microprocessor chip. 58 |
|
Desktop operating system
|
An
operating system specifically designed for use on personal computers, such as Microsoft Windows or Mac OS X. 188 |
|
Desktop publishing software
|
(DTP) Software used to create
high-quality output suitable for commercial printing. DTP software provides precise control over layout. 127 |
|
Desktop video
|
Videos stored in
digital format on a PC’s hard disk or CD. 452 |
|
Device driver
|
A type of system
software that provides the computer with the means to control a peripheral device. 131 |
|
Dialog box
|
An element of graphical
user interfaces that appears in a window and requests information, such as command parameters, from a user. 193 |
|
Dictionary attack
|
A method of
discovering a password by trying every word in an electronic dictionary. 36 |
|
Differential backup
|
A copy of all
the files that changed since the last full backup of a disk. 228 has been digitized into files using sampling techniques; sometimes referred to as waveform audio. 422 |
|
Digital audio extraction
|
The
process of copying files from an audio CD and converting them into a format that can be stored and accessed from a computer storage device, such as a hard disk; sometimes referred to as ripping. 426 |
|
Digital camera
|
A camera that
takes and stores a digital image instead of recording onto film. 432 |
|
Digital content
|
Media content
that is stored in digital format. 464 |
|
Digital data
|
Text, numbers,
graphics, or sound represented by discrete digits, such as 1s and 0s. 22 |
|
Digital divide
|
A gap between
those who have access to digital technologies and those who do not. 13 |
|
Digital revolution
|
A set of significant
changes brought about by computers and other digital devices during the second half of the 20th century. 4 |
|
Digital rights management
|
(DRM) A set of techniques
and technologies designed to discourage and prevent unauthorized duplication of digital content. 466 |
|
Digital video
|
A series of still
frames stored sequentially in digital format by assigning values to each pixel in a frame. 452 |
|
Digital watermark
|
A digital
rights management technology that inserts a hidden signal into multimedia content as an identifying marker that can be tracked or verified. 467 |
|
Digitization
|
To convert nondigital
information or media to a digital format through the use of a scanner, sampler, or other input device. 5 |
|
Digitizing tablet
|
A device that
provides a flat surface for a paper-based drawing and a “pen” used to create hand-drawn vector drawings. 446 |
|
Direct conversion
|
The simultaneous
deactivation of an old computer system and activation of a new one. 586 |
|
Directory
|
In the context of computer
file management, a list of files contained on a computer storage device. 206 |
|
Disaster recovery plan
|
A stepby-
step plan that describes the methods used to secure equipment and data against disasters, and how to recover from disasters. 594 |
|
Discovery mode
|
The status of a
Bluetooth device that is open for pairing. 261 |
|
Disk image
|
A bit-by-bit copy of
the contents of a disk created for backup, archiving, or duplication of data. 229 |
|
Disk partition
|
An area of a hard
disk created by dividing a large hard disk into several smaller virtual ones, such as when using two operating systems on a single computer. 206 |
|
Distributed database
|
A database
that is stored on different computers, on different networks, or in different locations. 626 |
|
Distributed processing
|
An
information system design in which data is processed on multiple workstations or servers. 577 |
|
Domain name
|
Short for fully
qualified domain name; an identifying name by which host computers on the Internet are familiarly known (for example, nike.com). 307 |
|
Domain name server
|
A computer
that hosts the Domain Name System database. 308 |
|
Domain Name System (DNS)
|
A large database of unique IP
addresses that correspond with domain names. 308 |
|
DOS (Disk Operating System)
|
The operating system software
shipped with the first IBM PCs, then used on millions of computers until the introduction of Microsoft Windows. 194 |
|
Dot matrix printer
|
A printer that
creates characters and graphics by striking an inked ribbon with small wires called pins, generating a fine pattern of dots. 93 |
|
Download
|
The process of transferring
a copy of a file from a remote computer to a local computer’s storage device. 18 |
|
Downstream speed
|
The
rate at which transmitted data flows from a host or server to a local computer (contrast with upstream speed). 310 |
|
Drawing software
|
Programs
that are used to create vector graphics with lines, shapes, and colors, such as logos or diagrams. 123, 446 |
|
Dual boot
|
A computer that contains
more than one operating system and can boot into either one. 198 |
|
Duplex printer
|
A printer that
prints on both sides of the paper in a single pass. 94 |
|
DVD (digital video disc or digital
versatile disc) |
An optical storage
medium similar in appearance and technology to a CD but with higher storage capacity. 81 |
|
DVD authoring software
|
Computer programs that offer
tools for creating DVD menus and transferring digital video onto DVDs that can be played in a computer or standalone DVD player. 122 |
|
DVI
|
(Digital Visual Interface) A
standard type of plug and connector for computer display devices. 96 |
|
Dynamic IP address
|
A temporarily
assigned IP address usually provided by an ISP. 306 |
|
Dynamic RAM (DRAM)
|
Random
access memory that requires a power source to hold data; used as main memory on most computers. 72 |
|
Dynamic Web publishing
|
A
way of displaying data from a database as customized Web pages, which are generated as the page is sent to the browser. 628 |
|
EDI (Electronic Data
Interchange) |
The ability to
transfer data between different companies using networks that enable companies to buy, sell, and trade information. 569 |
|
EEPROM (electrically erasable
programmable read-only memory) |
A type of non-volatile storage
typically used in personal computers to store boot and BIOS data. 74 |
|
Encryption
|
The process of
scrambling or hiding information so that it cannot be understood without the key necessary to change it back into its original form. 285 |
|
Enhanced media player
|
Handheld devices designed to
play music, but with enhanced features, such as a browser and apps. 65 |
|
Exception report
|
A report
generated by a management information system, listing information that is outside normal or acceptable ranges, such as a reorder report showing low-stock inventory items. 561 |
|
Executable file
|
A file, usually
with an .exe extension, containing instructions that tell a computer how to perform a specific task. 146 |
|
Field
|
The smallest meaningful
unit of information contained in a data file. 139, 615 |
|
Field format
|
A specification for
the way that data is displayed on the screen and printouts, usually using a series of Xs to indicate characters and 9s to indicate numbers. 636 |
|
Field validation rule
|
A specification
that a database designer sets up to filter the data entered into a particular field. 636 |
|
Fifth-generation languages
|
Either declarative languages,
such as Prolog, or programming languages that allow programmers to use graphical or visual tools to construct programs. 678 |
|
File
|
A named collection of data
(such as a computer program, document, or graphic) that exists on a storage medium, such as a hard disk or CD. 15 |
|
File compression utility
|
A type
of data compression software that shrinks one or more files into a single file occupying less storage space than the files did separately. 442 |
|
File format
|
The method of organization
used to encode and store data in a computer. Text formats include DOCX and TXT. Graphics formats include BMP, TIFF, GIF, and PNG. 207 |
|
File header
|
Hidden information
inserted at the beginning of a file to identify its properties, such as the software that can open it. 207 |
|
File management utility
|
Software, such as Finder and
File Explorer, that help users locate, rename, move, copy, and delete files. 214 |
|
File server
|
A network computer
that is dedicated to storing and distributing files to network clients. 278 |
|
File sharing
|
The process of
allowing access to document, photo, video, and other files from a computer other than the one on which they are stored. 274 |
|
File specification
|
A combination
of the drive letter, subdirectory, file name, and extension that identifies a file (such as C:\ Pictures\Photo.jpg); also called a path. 206 |
|
File system
|
A method that is
used by an operating system to keep files organized. 219 |
|
File tag
|
In the context of
Windows, a piece of information that describes a file. Tags, such as Owner, Rating, and Date Taken, can be added by users. 212 **set of rules, established by the operating system, that must be followed to create a valid file name. 204 |
|
Firewall
|
Software or hardware
designed to analyze and control incoming and outgoing packets on a network; used to enhance security by filtering out potential intrusion attempts. 341 |
|
FireWire
|
A standard for fairly
high-speed ports, plugs, and connectors typically used to connect external storage devices, and for transferring data from cameras to computers. 96 |
|
First-generation languages
|
Machine languages that were
available for programming the earliest computers. 677 |
|
First-party cookie
|
A cookie that
is generated by the Web page that is shown in the browser. 401 |
|
Fixed Internet access
|
Any
Internet access service designed to be used from a fixed, non-portable location (i.e., dial-up, DSL, and cable Internet service). 311 |
|
Flash
|
A file format developed by
Macromedia and marketed by Adobe that has become popular for animations on Web pages. |
|
Flash cookie
|
A cookie-like
object that is created and used by Adobe Flash Player; also referred to as a local shared object. 402 |
|
Flash video
|
A popular video
file format developed by Adobe Systems and used for Webbased video at sites such as YouTube. 458 |
|
Flat file
|
A single file that is the
electronic version of a box of index cards, in which all records use the same record format. 614 |
|
Floppy disk
|
A removable magnetic
storage medium, typically 3.5" in size, with a capacity of 1.44 MB. 80 |
|
Folder
|
The subdirectories, or
subdivisions of a directory, that can contain files or other folders. 206 |
|
Format shifting
|
The process of
converting media into a different file format to use it on a device other than the original one. 465 |
|
Formatting
|
The process of dividing
a disk into sectors so that it can be used to store information. 219 |
|
Fourth-generation languages
|
Programming and query languages,
such as SQL and RPG, that more closely resemble human languages than did thirdgeneration languages. 678 |
|
Fragmented files
|
Files stored in
scattered, noncontiguous clusters on a disk. 221 |
|
Full system backup
|
A copy of
all the application, system, and data files that exist on a computer’s hard disk. 226 |
|
Game controllers
|
Devices
such as joysticks, wands, and steering wheels; used to control on-screen action in computer games. 88 |
|
GIF
|
(Graphics Interchange
Format) A bitmap graphics file format, popularized by CompuServe, for use on the Web. 431 |
|
Gigabyte (GB)
|
Approximately 1
billion bytes; exactly 1,024 megabytes (1,073,741,824 bytes). 26 |
|
Gigahertz (GHz)
|
A measure of
frequency equivalent to 1 billion cycles per second. 67 |
|
Globalization
|
A group of social,
economic, political, and technological interdependencies linking people and institutions from all areas of the world. 12 |
|
Gradient
|
A smooth blending of
shades of different colors, from light to dark. 447 |
|
Graphical user interface (GUI)
|
A type of user interface that features
on-screen objects, such as menus and icons, manipulated by a mouse. 190 |
|
Graphics processing unit
(GPU) |
A microprocessor dedicated
to rendering and displaying graphics on personal computers, workstations, and videogame consoles. 91 |
|
Graphics software
|
Computer
programs for creating, editing, and manipulating images; types include paint software and drawing software. 123 |
|
Handshaking
|
A process where
a protocol helps two network devices communicate. 252 |
|
Hard disk drive
|
A computer
storage device that contains a large-capacity rigid storage surface sealed inside a drive case. Typically used as the primary storage device in desktop and laptop computers. 78 |
|
Hard disk platter
|
The component
of a hard disk drive on which data is stored. It is a flat, rigid disk made of aluminum or glass and coated with a magnetic oxide. 78 |
|
HDMI
|
(High-Definition
Multimedia Interface) A standard type of plug and connector for computer display devices. 96 |
|
High-level language
|
A programming
language that allows a programmer to write instructions using human-like language. 676 |
|
Horizontal market software
|
Any computer program that can
be used by many different kinds of businesses (for example, an accounting program). 126 |
|
HTML
|
(Hypertext Markup
Language) A standardized format used to specify the layout for Web pages. 362 |
|
HTML document
|
A plain text or
ASCII document with embedded HTML tags that dictate formatting and are interpreted by a browser. 362 |
|
HTML tags
|
A set of instructions,
such as <B>, inserted into an HTML document to provide formatting and display information to a Web browser. 362 |
|
HTML5
|
The version of HTML
that was in the final stages of the approval process as of 2012. 362 |
|
HTTP
|
(Hypertext Transfer
Protocol) The communications protocol used to transmit Web pages. HTTP:// is an identifier that appears at the beginning of Web URLs (for example, http:// www.fooyong.com). 364 |
|
Hypertext
|
A way of organizing
a collection of documents by assigning an address to each and providing a way to link from one address to another. 360 |
|
Hypertext link
|
Also referred to
simply as a link; an underlined word or phrase on a Web page that, when clicked, takes you to a designated URL. 361 |
|
ICANN
|
(Internet Corporation for
Assigned Names and Numbers) A global organization that coordinates the management of the Internet’s domain name system, IP addresses, and protocol parameters. 309 |
|
IDE
|
(integrated development
environment) A set of programming tools, typically including editor, compiler, and debugger, packaged into an application for creating programs. 686 |
|
Identity theft
|
An illegal practice
in which a criminal obtains enough information to masquerade as someone. 36 |
|
Implementation phase
|
A set of
tasks performed with the supervision of a system development project team in which a new information system is constructed. 583 |
|
Incremental backup
|
A backup
that contains files that changed since the last backup. 228 |
|
Information engineering methodology
|
A method of developing
an information system that focuses on data the information system collects before finding ways to process that data. 570 |
|
Information system
|
A computer
system that collects, stores, and processes information, usually within the context of an organization. 556 |
|
Infrared light
|
A transmission
technology that uses a frequency range just below the visible light spectrum to transport data. 259 |
|
Ink jet printer
|
A non-impact
printer that creates characters or graphics by spraying liquid ink onto paper or other media. 92 |
|
Input
|
As a noun, the information
that is conveyed to a computer. As a verb, to enter data into a computer. 15 |
|
Instruction cycle
|
The steps followed
by a computer to process a single instruction: fetch, interpret, execute, then increment the instruction pointer. 32 |
|
Instruction set
|
The collection
of instructions that a CPU is designed to process. 30 |
|
Integrated circuit (IC)
|
A thin
slice of silicon crystal containing microscopic circuit elements such as transistors, wires, capacitors, and resistors; also called chips and microchips. 27 |
|
Integration testing
|
The testing
of completed modules of an application to ensure that they operate together correctly. 584 |
|
Intellectual property
|
A legal
concept that refers to ownership of intangible information, such as ideas. 12 |
|
Internet
|
The worldwide communication
infrastructure that links computer networks using the TCP/IP protocol. 8 |
|
Internet backbone
|
The major
communications links that form the core of the Internet. 303 |
|
Internet service provider (ISP)
|
A company that provides Internet
access to businesses, organizations, and individuals. 303 |
|
Intrusion
|
In the context of computer
security, the unauthorized access to a computer system. 339 |
|
iOS
|
The operating system used
for iPhones, iPods, and iPads. 200 |
|
IP (Internet Protocol)
|
One of
the main protocols of TCP/IP; responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses. 305 |
|
Java
|
A platform-independent,
object-oriented, high-level programming language based on C++, typically used to produce interactive Web applications. 679 |
|
JIT
|
(Just In Time) A manufacturing
system in which the parts needed to construct a product are received at the assembly site only as needed. 569 |
|
JPEG
|
(Joint Photographic
Experts Group) A format that uses lossy compression to store bitmap images. JPEG (pronounced “JAY-peg”) files have a .jpg extension. 431 |
|
Kernel
|
The core module of an
operating system that typically manages memory, processes, tasks, and storage devices. 188 |
|
Keylogger
|
A program, sometimes
part of a Trojan horse, that records a person’s keystrokes, saves them, and then sends them to a system administrator or remote hacker. 37 |
|
Keyword stuffing
|
The practice
of including a huge variety of keywords in the header of an HTML document in the hopes that a search engine will display it even when the content of the page is not relevant to the search. 377 |
|
Kilobyte
|
(KB) Approximately
1,000 bytes; exactly 1,024 bytes. 26 |
|
LAN
|
(local area network) An
interconnected group of computers and peripherals located within a relatively limited area, such as a building or campus. 247 |
|
Lands
|
Non-pitted surface areas
on a CD that represent digital data. (See also pits.) 81 |
|
Laser printer
|
A printer that uses
laser-based technology, similar to that used by photocopiers, to produce text and graphics. 92 |
|
LCD
|
(liquid crystal display)
Technology used for flat panel computer screens typically found on laptop computers. 90 |
|
LED
|
(light-emitting diode) Either
a display technology that uses LEDs to produce an image on the screen, or one that uses LEDs as backlighting. 90 |
|
Library
|
In the context of
Microsoft Windows, a superfolder that contains pointers to various folders and files; examples include Documents, Pictures, and Videos. 217 |
|
Link popularity
|
A metric used
by some search engines to rank the sites that are relevant to a query. 377 |
|
Linux
|
An operating system that
is a derivative of UNIX, available as freeware, and widely used for servers though it is also used on personal computers and workstations. 202 |
|
Megapixel
|
1 million pixels;
expresses the resolution and quality of an image; usually used in reference to digital cameras. 434 |
|
Optical fiber cable
|
A highbandwidth
communications cable |
|
PIECES framework
|
A concept
developed by James Wetherbe to help identify problems in an information system. Each letter of PIECES stands for a potential problem (Performance, Information, Economics, Control, Efficiency, and Service). 569 |
|
Presentation software
|
Software
that provides tools to combine text, graphics, graphs, animation, and sound into a series of electronic “slides” that can be output on a projector, or as overhead transparencies, paper copies, or 35-millimeter slides. 142 |
|
Upstream speed
|
The rate at
which data is transmitted from your home computer to the Internet. 310 |
|
USB
|
(universal serial bus) A
high-speed bus commonly used for connecting peripheral devices to computers. 96 |
|
Web cache
|
A collection of Web
pages and associated graphics that have been accessed and are temporarily stored locally to speed up subsequent access to them. 365 |
|
Database client software
|
Software that allows any remote
computer or network workstation to access data in a database. 626 |
|
Ethernet
|
A popular network
technology in which network nodes are connected by coaxial cable or twisted-pair wire. 257 |
|
Graphics card
|
A circuit board
inserted into a computer to handle the display of text, graphics, animation, and videos. Also called a video card or graphics board. 91 |
|
Hierarchical database
|
A database
model in which record types are arranged as a hierarchy, or tree, of child nodes that can have only one parent node. 617 |
|
Image compression
|
Any technique
that is used to reduce the size of a file that holds a graphic. 440 |
|
Linux
|
An operating system that
is a derivative of UNIX, available as freeware, and widely used for servers though it is also used on personal computers and workstations. 202 |
|
Linux platform
|
A computer that
is running the Linux operating system. 64 |
|
Local software
|
Computer applications
that are installed on and run from a local device, usually a computer hard drive. 7 |
|
Location-based software
|
Applications that are able to
access your current location using, for example, a smartphone’s GPS or nearby LAN signals. 125 |
|
Logic error
|
A run-time error in
the logic or design of a computer program. 685 |
|
Logical storage models
|
Any
visual or conceptual aid that helps a computer user visualize a file storage system. Also called a storage metaphor. 215 |
|
Lookup routine
|
A validation
process used by database designers to prevent data entry errors by searching for an entry such as a state abbreviation in a file or database table. 637 |
|
Lossless compression
|
A compression
technique that is able to reconstitute all of the data in the original file; hence lossless means that this compression technique does not lose data. 440 |
|
Lossy compression
|
Any data
compression technique in which some of the data is sacrificed to obtain more compression. 440 |
|
Low-level language
|
A programming
language that requires a programmer to write instructions for specific hardware elements such as the computer processor, registers, and RAM locations. 676 |
|
Mac OS
|
The operating system
software designed for use on Apple Macintosh computers. 197 |
|
Mac platform
|
A family or category
of Macintosh-compatible personal computers designed and manufactured by Apple Computer. 64 |
|
Machine code
|
Program instructions
written in binary code that the computer can execute directly. 30 |
|
Machine language
|
A low-level
language written in binary code that the computer can execute directly. 30 |
|
Magnetic storage
|
A technology
for recording data onto disks or tape by magnetizing particles of an oxide-based surface coating. 78 |
|
Mainframe computer
|
A large,
fast, and expensive computer generally used by businesses or government agencies to provide centralized storage, processing, and management for large amounts of data. 18 |
|
Maintenance phase The day-today
operation of an information |
n
system, including making modifications and correcting problems to insure correct operation. 587 |
|
Malicious software Any
program or set of program |
m
instructions, such as a virus, worm, or Trojan horse, designed to surreptitiously enter a computer and disrupt its normal operations. 162 |
|
Malware Programs such as
viruses, w |
orms, and bots
designed to disrupt computer operations. 162 |
|
MAN (metropolitan area network)
A publ |
ic, high-speed network
that can transmit voice and data within a range of 50 miles. 247 |
|
Management information system
(MIS) A type of information |
system that manipulates the
data collected by a transaction processing system to generate reports that managers can use to make business decisions. 561 |
|
Managers People who make
decisions ab |
out how an organization
carries out its activities. 557 |
|
Mapping application
|
An application
that displays satellite, aerial, or street maps that can be used to locate places and get directions. 125 |
|
Markup language
|
A language
that provides text and graphics formatting through the use of tags. Examples of markup languages include HTML, XML, and SGML. 362 |
|
Mass-mailing worm
|
A worm
that sends itself to every e-mail address in the address book of an infected computer. 163 |
|
Mathematical modeling software
|
Software for visualizing and
solving a wide range of math, science, and engineering problems. 126 |
|
Media content
|
A term popularized
in the context of multimedia that refers to music, movies, television shows, and books. 464 |
|
Megabyte (MB)
|
Approximately 1
million bytes; exactly 1,048,576 bytes. 26 |
|
Megahertz (MHz)
|
A measure of
frequency equivalent to 1 million cycles per second. 68 |
|
Memory
|
The computer circuitry
that holds data waiting to be processed. 15 |
|
Memory card
|
A small, flat, solid
state storage medium, frequently used to store data on cameras and handheld devices. 84 |
|
Meta keyword
|
A word that is
included in the header of an HTML document in order to describe the document’s contents. 377 |
|
Metafile
|
In the context of graphics,
a file that contains both vector and bitmap data. 447 |
|
Microprocessor
|
An integrated
circuit that contains the circuitry for processing data. It is a single-chip version of the central processing unit (CPU) found in all computers. 15 |
|
Microprocessor clock
|
A timing
signal that sets the pace for executing instructions in a microprocessor. 67 |
|
Microsoft Windows
|
An operating
system, developed by Microsoft Corporation, that provides a graphical interface. Versions include Windows 3.1, 95, 98, Me, NT, 2000, XP, Vista, 7, and 8. 194 |
|
Microwaves
|
Electromagnetic
waves with a frequency of at least 1 gigahertz; one type of channel for transmitting data over communications networks. 259 |
|
MIDI (Musical Instrument Digital
Interface) |
A standardized way
in which sound and music are encoded and transmitted between digital devices that play music. 427 |
|
Mission
|
An organization’s goal
or plan, which is reflected by the organization’s activities. 557 |
|
Mission statement
|
The written
expression of an organization’s goals and how those goals will be accomplished. 557 |
|
Mobile app
|
An application
designed to be downloaded to a handheld device, such as a smartphone or tablet computer. 145 |
|
Mobile broadband
|
Highbandwidth
wireless technology that was developed for sending digital data over cell phone systems. 326 |
|
Mobile Internet access
|
Any
service that allows subscribers to access the Internet while on the go. 311 |
|
Modem
|
A device that modulates
and demodulates a signal; typically used to send data from a computer to the Internet over telephone, cable television, or satellite networks. 304 |
|
Module
|
A component or part of
a software program or an office suite (e.g., a word processing module). 132 |
|
Money management software
|
Software used to track monetary
transactions and investments. 128 |
|
Monochrome bitmap
|
A bitmap
image that contains only the colors black and white. 437 |
|
Mouse
|
An input device that
allows the user to manipulate objects on the screen by clicking, dragging, and dropping. 88 |
|
MOV
|
A multimedia file format,
popular for digital videos, that works with QuickTime software. 458 |
|
MP3
|
A file format that provides
highly compressed audio files with very little loss of sound quality. 425 |
|
MPEG (Moving Picture Experts
Group) |
A family of highly compressed
container file formats and codecs for digital multimedia; MPEG-1, MPEG-2, and MPEG-4. 458 |
|
Multi-core processor
|
A microprocessor
that contains circuitry for more than one processing unit. 68 |
|
Multiprocessing
|
The ability of a
computer or an operating system to support dual-core processors or multiple processors. 186 |
|
Multitasking
|
The ability of a
computer, a processor, or an operating system to run more than one program, job, or task at the same time. 186 |
|
Multithreading
|
A technology
that allows multiple parts or threads from a program to run simultaneously. 186 |
|
Music software
|
A broad category
of software that can be used to play, record, compose, or manipulate sound files. 121 |
|
Narrowband
|
A term that refers
to communications channels that have low bandwidth. 251 |
|
Native file forma
|
t A file format
that is unique to a program or group of programs and has a unique file extension. 209 |
|
Natural language query
|
A
query formulated in human language as opposed to an artificially constructed language such as machine language. 141 |
|
Network address translation
|
(NAT) A security technique that
allows a LAN to use one type of IP address for intra-network data and another type of address for data traveling to and from the Internet. 343 |
|
Network attached storage
|
(NAS) Storage devices that are
designed to be attached directly to a network, rather than to a workstation or server. 248 |
|
Network database
|
A collection
of physically linked records in a one-to-many relationship in which a member (child) can have more than one owner (parent). 617 |
|
Network device
|
Any device,
such as a gateway, hub, or router, that is used to broadcast network data, boost signals, or route data to its destination. 250 |
|
Network discovery
|
A setting
that when turned on allows a computer to see other computers on a network and to be seen by those other computers. 275 |
|
Network interface card
|
Circuitry, often on an expansion
card mounted inside a computer, that transmits and receives data on a local area network. Also called a NIC, network card, or network adapter. 250 |
|
Network service providers
|
(NSPs) Companies that maintain
a series of nationwide Internet links. 303 |
|
Networked peripheral
|
A peripheral
device that contains circuitry that allows it to be directly connected to a network, rather than connecting to a computer that transfers data to a network. 250 |
|
Node
|
In a network, a connection
point; in a hierarchical database, a segment or record type. 250 |
|
Nonprofit organization
|
Organizations with political,
social, or charitable goals that are not intended to generate a profit. 556 |
|
Normalization
|
The process of
analyzing data to create the most efficient database structure. 637 |
|
Numeric data
|
Numbers that
represent quantities and can be used in arithmetic operations. 23 |
|
Object
|
In an object database or
OO programming language, a discrete piece of code describing a person, place, thing, event, or type of information. 702 |
|
Object code
|
The low-level
instructions that result from compiling source code. 30 |
|
Object-oriented methodology
|
An approach to system development
that regards the elements of a system as a collection of objects that interact with each other to accomplish tasks. 570 |
|
Office suite
|
A collection of
productivity programs, typically word processing, spreadsheet, presentation, and database modules. 132 |
|
Online backup services
|
Space
for backup data provided through a Web site. 223 |
|
Open source
|
An approach
to developing and licensing software in which source code remains public so it can be improved and freely distributed. 12 |
|
Operating system
|
The software
that controls the computer’s use of its hardware resources, such as memory and disk storage space. Also called an OS. 16 |
|
Operational planning
|
The
scheduling and monitoring of workers and processes. 558 |
|
Optical storage
|
A technology
that records data as light and dark spots on a CD, DVD, or other optical media. 81 |
|
Organization
|
A group of people
working together to accomplish a goal. 556 |
|
Organizational chart
|
A diagram
showing the hierarchy of workers in an organization. 557 |
|
Output
|
The results produced by
a computer (for example, reports, graphs, and music). 15 |
|
Packet
|
A small unit of data transmitted
over a network. 253 |
|
Paint software
|
Software that
creates and manipulates bitmap graphics. 123, 430 |
|
Pairing
|
The process of establishing
a link between two Bluetooth devices, usually through the exchange of passkeys. 261 |
|
PAN (personal area network)
|
An
interconnected group of personal digital devices located within a range of about 30 feet. 247 |
|
Parallel conversion
|
A type of
system conversion in which the old computer system remains in service while some or all of the new system is activated. 586 |
|
Payroll software
|
Horizontal
market business software used to track employee hours, calculate pay, and print pay checks. 126 |
|
PC platform
|
A family of personal
computers that use Windows software and contain Intelcompatible microprocessors. 64 |
|
PDF (Portable Document
Format) |
A standard format for
exchanging files that can be viewed using Adobe Reader software. 129 |
|
Peripheral device
|
A component
or equipment, such as a printer, that expands a computer’s input, output, or storage capabilities. 56 |
|
Personal computer
|
A microcomputer
designed for use by an individual user for applications such as Web browsing and word processing. 17 |
|
Personal computing
|
A type of
computing characterized by the use of standalone computers designed for single users. 7 |
|
Personal finance software
|
Software geared toward individual
finances that helps track bank account balances, credit card payments, investments, and bills. 128 |
|
Pharming
|
An exploit that redirects
users to fake Web sites. 406 |
|
Phased conversion
|
A type of
information system conversion in which one module of a new information system is activated at a time. 586 |
|
Phishing
|
An e-mail based scam
that’s designed to fool users into revealing confidential information. 37, 405 |
|
Photo editing software The
software used to edit, enhan |
ce,
retouch, and manipulate digital photographs. 123 |
|
Physical storage model A
representation of data as it is |
physically stored. 218
|
|
Pilot conversion A type of
system conversion in |
which a
new information system is first activated at one branch of a multi-branch company. 586 |
|
Pirated software Software that
is copied, sold, or dis |
tributed
without permission from the copyright holder. 156 |
|
Pits Spots on a CD that are
“burn |
ed” onto an optical storage
medium to represent digital data. 81 |
|
Pixelated Describes the effect
of increasing |
the size and thus
decreasing the quality of an image. 436 |
|
Pixels Short for picture elements;
the sma |
llest unit in a
graphic image. Computer display devices use a matrix of pixels to display text and graphics. 90 |
|
Place shifting The practice of
accessing media |
from a remote
location, such as over a network. 465 |
|
Plaintext An original, unencrypted
message. 2 |
85
|
|
Planning phase The first phase
of an information sy |
stem development
project with the goal of creating a Project Development Plan. 567 |
|
Plug-in
|
A software module that
adds a specific feature to a system. In the context of browsers, a plug-in adds the ability to display or play various additional file formats. 367 |
|
PNG (Portable Network
Graphics) |
A type of graphics file
format similar to but newer than GIF or JPEG. 431 |
|
Pointing device
|
An input device,
such as a mouse, trackball, pointing stick, or trackpad, that allows users to manipulate an on-screen pointer and other screen-based graphical controls. 88 |
|
Port probe
|
An exploit used by
hackers to locate computer ports that can be used for surreptitious access; also called a port scan. 340 |
|
Portable computer
|
Any type of
computer, such as a laptop computer, that runs on batteries and is designed to be carried from one location to another; also called a mobile computer. 59 |
|
Portable Internet access
|
Any
type of Internet service, such as portable satellite, that can be moved from one place to another. 311 |
|
Portable software
|
Software
designed to be stored on a flash drive or CD, and that does not require installation before it is used. 151 |
|
Primary key
|
A field in a database
that contains data, such as a Social Security number, that is unique to a record. 634 |
|
IP address
|
An IP
address that cannot be routed over the Internet. 343 |
|
Procedure handbook
|
Step-bystep
instructions for performing a specific job or task. 585 |
|
Product activation
|
The process
of becoming a registered user of a software product; the process might include entering a validation code to unlock the software. 161 |
|
Productivity software
|
Software
that helps people work more efficiently; traditionally word processing, spreadsheet, presentation, e-mail, and database software. 132 |
|
Program editor
|
A programming
tool, similar to a word processor, that provides specialized editing and formatting features |
|
Programming language
|
A set
of keywords and grammar (syntax) that allows a programmer to write instructions that a computer can execute. 29, 676 |
|
Project management software
|
Software specifically designed as
a tool for planning, scheduling, and tracking projects and their costs. 126, 571 |
|
Protocol suite
|
A group of protocols,
such as TCP and IP, that work together. 305 |
|
Public folder
|
A predefined folder
designed to hold files that can be shared over a network. 276 |
|
RAM (random access memory)
|
Computer memory circuitry that
holds data, program instructions, and the operating system while the computer is on. 72 |
|
Rasterization
|
The process of
superimposing a grid over a vector image and determining the color depth for each pixel. 447 |
|
Ray tracing
|
A technique by
which light and shadows are added to a 3-D image. 449 |
|
Read-only technology
|
Storage
media that can only be read from, but not recorded on. 82 |
|
Record In the context of database
Manage |
ment, a record is
the fields of data that pertain to a single entity in a database. 139, 615 |
|
Record occurrence
|
A record
that has been filled with data for a particular entity. 615 |
|
Record type
|
The structure of
a record, including the names, length, and data types for each field. 615 |
|
Recordable technology
|
The
devices and standards that allow computers to write data permanently on CDs and DVDs, but do not allow that data to be changed once it has been recorded. 82 |
|
Recovery disk
|
A CD that contains
all the operating system files and application software files necessary to restore a computer to its original state. 226 |
|
Recovery partition
|
A section of
a hard disk that contains the files necessary to restore a computer’s hard disk contents to factory condition. 227 |
|
Relationship
|
In the context
of databases, an association between entities that can be used to link records in more than one file. 616 |
|
Remarks
|
Explanatory comments
inserted into lines of code in a computer program. 686 |
|
Rendering
|
In graphics software,
the process of creating a 3-D solid image by covering a wireframe drawing and applying computer-generated highlights and shadows. 449 |
|
Report generator
|
The component
of a data management environment that provides a user with the ability to design reports. 642 |
|
Report template
|
A predesigned
pattern that provides the outline or general specifications for a report. 642 |
|
Request for proposal (RFP)
|
A document sent by an organization
to vendors to solicit proposals; it specifies the problem that needs to be solved and the requirements that must be met. 580 |
|
Request for quotation (RFQ)
|
A document sent by an organization
to vendors requesting a formal price quotation on a list of hardware and/or software. 580 |
|
Reserved words
|
Special words
used as commands in some operating systems that may not be used in file names. 205 |
|
Resolution dependent
|
Graphics, such as bitmaps, in
which the quality of the image is dependent on the number of pixels constituting the image. 436 |
|
Restore
|
The process of copying
files from a backup back to a computer’s hard disk. 222 |
|
Restore point
|
Data stored about
the state of files and the operating system at a given point in time, then used to roll back the computer system to that state. 227 |
|
Rewritable technology
|
The
devices and standards that allow users to write data on a storage medium and then change that data. 82 |
|
RF signals (radio frequency signals)
|
Data that is broadcast and
received via radio waves with a transceiver. 259 |
|
ROM (read-only memory)
|
Refers
to one or more integrated circuits that contain permanent instructions that the computer uses during the boot process. 74 |
|
Root directory
|
The main directory
of a disk. 206 |
|
Routable IP address
|
A network
address that can be routed over the Internet; contrast to private IP address. 343 |
|
Router
|
A device used to make
wired or wireless connections and route data to its destination on a network. 250 |
|
Runtime error
|
An error that
occurs when a computer program is run. 685 |
|
Sampling rate
|
The number of
times per second a sound is measured during the recording process. 423 |
|
Scanner
|
A device that converts
a printed image into a bitmap graphic. 432 |
|
Scheduled reports
|
Reports
such as monthly sales summaries that follow a fixed format and are produced according to a preset timetable. 561 |
|
Screen resolution
|
The density
of the grid used to display text or graphics on a display device; the greater the horizontal and vertical density, the higher the resolution. 91 |
|
SDK (software development kit)
|
A collection of language-specific
programming tools. 686 |
|
Second-generation languages
|
Assembly languages that followed
machine languages. 677 |
|
Security software
|
Any software
package that is designed to protect computers from destructive software and unauthorized intrusions. 162 |
|
Security suite
|
A software suite
containing modules to protect computers against viruses, worms, intrusions, spyware, and other threats. 166 |
|
Semi-structured problem
|
A
problem for which a general procedure has been established, but that requires some degree of discretionary judgment to arrive at a solution. 558 |
|
Server
|
A computer or software
on a network that supplies the network with data and storage. 18 |
|
Server-side
|
Scripts and other
activities that are executed by a Web server in response to client data. 372 |
|
Server-side program
|
A program
or scripting statement that resides on a Web server and acts as an intermediary between a user’s browser and a DBMS. 628 |
|
Service pack
|
A collection of
patches designed to correct bugs and/or add features to an existing software program. 152 |
|
Setup program
|
A program
module supplied with a software package for the purpose of installing the software. 148 |
|
Shared resources
|
Hardware,
software, and data that is available over a network to authorized users. 248 |
|
Smartphone
|
A cellular phone
that has a high-resolution color screen, a browser, and the ability to run apps. 65 |
|
Sniffing
|
In the context of computer
hacking, a technique that uses packet sniffer software to capture packets as they are sent over a network. 37 Social media Online Web sites and services, such as Facebook, Twitter, and LinkedIn, that help users create content and share it with others. 10 |
|
Software
|
The instructions that
direct a computer to perform a task, interact with a user, or process data. 15 |
|
Software customization
|
The
process of modifying a commercially available software application to meet the needs of a specific user or organization. 584 |
|
Software installation
|
The process
by which programs and data are copied to the hard disk of a computer system and otherwise prepared for access and use. 143 |
|
Software license
|
A legal contract
that defines the ways in which a user may use a computer program. 157 |
|
Software update
|
A section
of code or a program module designed to correct errors or enhance security on an already installed software product. 152 |
|
Software upgrade
|
A new version
of a software product containing new features and designed to replace the entire earlier version of the product. 152 |
|
Solid state drive
|
A data storage
device that utilizes erasable, rewritable circuitry. 85 |
|
Solid state storage
|
A technology
that records data and stores it in a microscopic grid of cells on a non-volatile, erasable, lowpower chip. 84 |
|
Sort key
|
A field used to arrange
records in order. 639 |
|
Sort order
|
In a database table,
the order in which records are stored on disk. 639 |
|
Source code
|
Computer instructions
written in a high-level language. 29 |
|
Spam
|
Unsolicited e-mail typically
sent as a bulk or mass-mailing and often used for fraudulent or deceptive marketing. 404 |
|
Speech recognition
|
The
process by which computers recognize voice patterns and words, and then convert them to digital data. 428 |
|
Speech synthesis
|
The process
by which computers produce sound that resembles spoken words. 428 |
|
Spreadsheet
|
A numerical model
or representation of a real situation, presented in the form of a table. 136 |
|
Spreadsheet software
|
Software
for creating electronic worksheets that hold data in cells and perform calculations based on that data. 136 |
|
Spyware
|
Any software that
covertly gathers user information without the user’s knowledge, usually for advertising purposes. 164 |
|
SSID (service set identifier)
|
A
code that identifies a network containing wireless connections and is attached to every packet that travels on that network. 268 |
|
Static IP address
|
A permanently
assigned and unique IP address, used by hosts or servers. 306 |
|
Static Web publishing
|
A simple
way to display the data in a database by converting a database report into an HTML document. 627 |
|
Statistical software
|
Software
for analyzing large sets of data to discover patterns and relationships within them. 126 |
|
Storage
|
The area in a computer
where data is retained on a permanent basis. 15 |
|
Storage device
|
A mechanical
apparatus that records data to and retrieves data from a storage medium. 76 |
|
Storage medium
|
The physical
material, such as a hard disk or CD, on which data is stored. 76 |
|
Strategic planning
|
The process
of developing long-range goals and plans for an organization. 557 |
|
Streaming audio
|
An audio file
format that allows the audio clip to begin before the file is entirely downloaded. 426 |
|
Streaming video
|
An Internet
video technology that sends a small segment of a video file to a user’s computer and begins to play it while the next segment is being sent. 459 |
|
Strong encryption
|
Encryption
that is difficult to decrypt or “break” without the encryption key. 285 |
|
Structured file
|
A file that consists
of a collection of data organized as a set of similarly structured records. 614 |
|
Structured methodology
|
A
method of developing an information system that focuses on the processes that take place within the information system. 570 |
|
Structured problem
|
A problem
for which there exists a well-established procedure for obtaining the best solution. 558 |
|
Subdirectory
|
A directory found
under the root directory. 206 |
|
Success factors
|
System
requirements that also serve as an evaluation checklist at the end of a development project. 571 Summary report A report generated by a management information system that combines or groups data and usually provides totals, such as a report of total annual sales for the past five years. 561 Supercomputer The fastest and most expensive type of computer, capable of processing trillions of instructions per second. 19 SVG (Scalable Vector Graphics) A graphics format designed specifically for Web display that automatically resizes when displayed on different screens. 448 Synchronization The process of updating files so they are the same on two devices; can be used for backup or to update addresses, etc. 225 |
|
Syntax error
|
An error that
results when an instruction does not follow the syntax rules, or grammar, of the programming language. 685 |
|
Synthesized sound
|
Artificially
created sound, usually found in MIDI music or synthesized speech. 427 |
|
System board
|
The main circuit
board in a computer that houses chips and other electronic components. 28 |
|
System conversion
|
The process
of deactivating an old information system and activating a new one. 586 |
|
System development life cycle
|
(SDLC) The series of phases
that outlines the development process of an information system. 566 |
|
System documentation
|
Descriptions of the features,
hardware architecture, and programming of an information system written for programmers, designers, and analysts who maintain the system. 585 |
|
System requirements
|
(1)
The minimum hardware and operating system specifications required for a software application to operate correctly. (2) Criteria for developing a successful information system, which are typically compiled into a System Requirements Report at the conclusion of the analysis phase of the SDLC. 155, 571 |
|
System Requirements Report
|
A report generated at the conclusion
of the analysis phase of the SDLC by a project team that has studied a system and determined |
|
System software
|
Computer
programs, such as an operating system or utility software, that help the computer carry out essential operating tasks. 16 |
|
System testing
|
The process of
testing an information system to ensure that all of the hardware and software components work together. 584 |
|
System unit
|
The case or box
that contains the computer’s power supply, storage devices, main circuit board, processor, and memory. 57 |
|
System utilities
|
Utility software
that diagnoses and repairs disk errors, corrupted files, and other software or hardware problems. 130 |
|
Systems analysis and design
|
The process of planning and
building an information system. 566 |
|
Tablet computer
|
A small,
portable computer with a touchsensitive screen that can be used as a writing or drawing pad. 65 |
|
Tactical planning
|
Short- or
near-term decisions and goals that deploy the human, financial, and natural resources necessary to meet strategic goals. 558 |
|
Tax preparation software
|
Software used to help individuals
or businesses calculate annual state and federal taxes. 128 |
|
TCP (Transmission Control
Protocol) |
The protocol within
TCP/IP that is responsible for establishing a data connection between two hosts and breaking data into packets. 305 |
|
TCP/IP (Transmission Control
Protocol/Internet Protocol) |
The primary protocol suite for
transmitting messages over the Internet. 305 |
|
Test area
|
A portion of a computer
system where software testing can occur without disrupting an organization’s regular information system. 584 |
|
Text-to-speech software
|
Software that generates speech
based on written text that is played back through a computer’s sound card. 428 |
|
Third-generation languages
|
Programming languages, such
as FORTRAN, BASIC, and COBOL, that followed assembly languages and provided Englishlike keywords. 677 |
|
Third-party cookie
|
A cookie that
is generated by an ad or an entity other than the Web page that is shown in the browser. 401 |
|
Time shifting
|
The practice of
recording digital content for later playback. 465 |
|
Top-level domain
|
A major
domain category into which groups of computers on the Internet are divided, such as com, edu, gov, int, mil, net, and org. 307 |
|
Touchscreen
|
A display device
that accepts input from being touched with a stylus or fingertip. 89 |
|
Tracing software
|
Software that
locates the edges of objects in a bitmap graphic and converts the resulting shape into a vector graphic. 447 |
|
Trackpad
|
A touch-sensitive
surface on which you slide your fingers to move the on-screen pointer. 89 |
|
Transaction
|
An exchange
between two parties that can be recorded and stored in a computer system. 559 |
|
Transaction processing system
|
(TPS) A system that keeps
track of transactions for an organization by providing ways to collect, display, modify, and cancel transactions. 559 |
|
Trojan horse
|
A computer program
that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password. 163 |
|
True Color bitmap
|
A color
image with a color depth of 24 bits or 32 bits. Each pixel in a True Color image can be displayed using any of 16.7 million different colors. 439 |
|
Turnkey system
|
A complete
information system that consists of both hardware and commercial software. 578 |
|
Unit testing
|
The process of
testing a completed application module to make sure that it operates reliably and correctly. 584 |
|
UNIX
|
A multiuser, multitasking
server operating system developed by AT&T Bell Laboratories in 1969. 202 |
|
Unstructured file
|
A file that
contains data, but that is not in a structured format of fields and records. 614 |
|
Unstructured problem
|
A
problem for which there is no established procedure for arriving at a solution. 558 |
|
Unzipped
|
Refers to files that
have been uncompressed. 150 |
|
Upload
|
The process of transferring
a file from a local computer to a remote computer over a LAN or the Internet. 18 |
|
URL (Uniform Resource Locator)
|
The address of a Web page. 361
|
|
USB flash drive
|
A portable solid
state storage device nicknamed “pen drive” or “keychain drive” that plugs directly into a computer’s USB port. 85 |
|
User documentation
|
Descriptions of how to interact
with an information system or a program, including instructions on use, features, and troubleshooting. 585 |
|
User ID
|
A combination of letters
and numbers that serves as a user’s “call sign” or identification. Also referred to as a user name. 34 |
|
User interface
|
The software and
hardware that enable people to interact with computers. 190 |
|
User privileges
|
A set of
assigned rights that specify what data is accessible to a particular user on a network or on a database. 655 |
|
Utility software
|
A type of system
software provided by the operating system vendor or third-party vendors that specializes in tasks such as system maintenance, security, or file management. 129 |
|
VDE (visual development environment)
|
Programming tools
that allow programmers to build substantial parts of computer programs by pointing and clicking, rather than entering code. 683 |
|
Vector graphic
|
An image generated
from descriptions that specify the position, length, and direction in which lines and shapes are drawn. 444 |
|
Vertical market software
|
Computer programs designed to
meet the needs of a specific market segment or industry, such as medical record-keeping software for use in hospitals. 126 |
|
VGA (Video Graphics Array)
|
A
screen resolution of 640 x 480. 96 |
|
Video capture
|
The process of
converting analog video signals into digital data stored on a hard drive. 455 |
|
Video editing software
|
Software that provides tools for
capturing and editing video from a camcorder. 122 |
|
Videogame console
|
A computer
specifically designed for playing games using a television screen and game controllers. 17 |
|
Virtual keyboard
|
A keyboard
that is displayed on a touchscreen and used for input on smartphones and tablet computers. 89 |
|
Virtual machine
|
Software that
creates an operating environment that emulates another computer platform; as an example, Parallels Desktop creates a virtual PC on an Intel Macintosh computer. 198 |
|
Virtual memory
|
A computer’s
use of hard disk storage to simulate RAM. 73 |
|
Virtual private network (VPN)
|
A network connection that typically
carries encrypted data over the Internet to and from a remote access server. 345 |
|
Virus hoax
|
A message, usually
e-mail, that makes claims about a virus problem that doesn’t actually exist. 166 |
|
Volatile
|
A term that describes
data (usually in RAM) that can exist only with a constant supply of power. 72 |
|
WAN (wide area network)
|
An
interconnected group of computers and peripherals that covers a large geographical area, such as multiple branches of a corporation. 247 |
|
WAP (Wireless Access Protocol)
|
A communications protocol that
provides Internet access for handheld devices. 325 |
|
WAV
|
An audio file format with
a .wav extension that was Windows’ original “native” sound format. 425 |
|
Weak encryption
|
Encryption
that is relatively easy or simple to decrypt without the encryption key. 285 |
|
Web
|
Short for World Wide Web;
an Internet service that links documents and information from computers located worldwide, using the HTTP protocol. 8 |
|
Web 2.0
|
A group of new and
innovative ways to use the Web, such as for social networking, blogging, and wikis. 361 |
|
Web 3.0
|
A group of technologies
including cloud computing that extend the ways in which the Internet and Web can be used. 361 |
|
Web application
|
Application
software that is accessed and used from within a browser. 143 |
|
Web browser
|
A program that
communicates with a Web server and displays Web pages. 361 |
|
Web bug
|
A small graphic on a
Web page that installs cookies designed to track your online activities. Also known as a clear GIF or pixel tag. 403 |
|
Web crawler
|
The component
of a search engine that autonomously visits Web sites collecting Web page data that will be indexed and available for searching. 375 |
|
Web page
|
Information displayed
by a Web browser that’s produced from an HTML document or generated on the fly from data in a database. 361 |
|
Web search engine
|
A program
that uses keywords to find information on the Internet and returns a list of links to relevant documents. 374 |
|
Web server
|
A computer that
listens for queries from Web browsers and transmits HTML documents over the Internet. 361 |
|
Web site
|
A Web address that
holds a collection of information identified by a common domain name, such as www.cnn.com. 361 |
|
Webcam
|
An inexpensive digital
camera that attaches directly to a computer and creates a video by capturing a series of still images. 454 |
|
What-if analysis
|
The process of
setting up a model in a spreadsheet and experimenting to see what happens when different values are entered. 136 |
|
Wi-Fi
|
An Ethernet-compatible
wireless connection that uses 802.11a, b, g, and n standards. 262 |
|
Wi-Fi hotspot
|
The geographical
area in which you can connect to a Wi-Fi signal, such as a Wi-Fi equipped campus or coffeehouse. 322 |
|
Windows Registry
|
A group of
files on Windows computers that is used by the operating system to store configuration information about hardware and software. 227 |
|
Wireframe
|
A representation of a
3-D object using separate lines, which resemble wire, to create a model. 449 |
|
Wireless encryption
|
A security
measure for networks containing wireless connections that scrambles data transmitted between network devices. 269 |
|
Wireless encryption key
|
The basis for scrambling and
unscrambling the data that travels over a wireless connection; sometimes called a network security key. 270 |
|
WMA (Windows Media Audio)
|
A
file format with a .wma extension that is promoted by Microsoft and provides highly compressed audio files with very little loss of sound quality. 425 |
|
Word processing software
|
Computer programs that assist
the user in producing documents, such as reports, letters, papers, and manuscripts. 133 |
|
Workers
|
People who perform
the tasks necessary to carry out an organization’s mission. 557 |
|
Worksheet
|
A computerized, or
electronic, spreadsheet. 136 |
|
Workstation
|
(1) A computer
connected to a local area network. (2) A powerful desktop computer designed for specific tasks. 17 |
|
XHTML
|
A markup language very
similar to HTML, but more customizable. 362 |
|
XML (eXtensible Markup
Language) |
A document format
similar to HTML, but that allows the Web page developer to define customized tags, generally for the purpose of creating more interactivity. 630 |
|
Zipped
|
Refers to one or more
files that have been compressed. 150 |