Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
316 Cards in this Set
- Front
- Back
access time
|
Measurement of the amount of time it takes the process to read data, instructions, and information from memory
|
|
archive disc
|
CD that stores photos from an online photo center in jpg file format, usually at a maximum resolution of 7200 pixels per photo.
|
|
BD-RE
|
High-capacity rewritable DVD format.
|
|
capacity
|
Number of bytes a storage medium can hold.
|
|
card reader/ writer
|
Device that reads and writes data, instructions, and information stored on PC Cards or flash memory cards and transmits that data to a computer or printer through a connection to a port.
|
|
CD-R
|
Multisession optical disc on which users can write, but not erase, their own items such as text, graphics, and audio. See also compact disc-recordable.
|
|
CD-ROM
|
Type of optical disc that uses laser technology to store data, instructions, and information that users can read but not write on or erase. See also compact disc read-only memory.
|
|
CD-RW
|
Clocan write data, instructions, and information multiple times. See also compact disc-rewriteable.
|
|
Cloud storage
|
Internet service that provides storage to computer users.
|
|
Compact flash
|
Type of miniature mobile storage medium that is a flash memory card capable of storing between 512 MB and 100 GB of data.
|
|
Disc controller
|
Special-purpose chip and electronic circuits that control the transfer of data, instructions, and information between a disk and the system bus and other components in a computer.
|
|
DVD+RAM
|
Type of optical disc that can be erased and written on, or recorded on, more than 100,000 times. DVD+RAM discs can be read by DVD+RAM drives and some DVD-ROM drives and players.
|
|
DVD+RW
|
Rewritable DVD format with capacities up to 4.7 GB per side
|
|
Expresscard module
|
Removable flash memory device that adds memory, communications, multimedia, and security capabilities to mobile computers.
|
|
external hard disc
|
Separate freestanding hard disk that connects with a cable to a USB port or FireWire port on the system unit.
|
|
hard disk
|
Type of storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information.
|
|
HD VMD
|
Versatile Multilayer Disc; high-density format that potentially will contain up to 20 layers, each with a capacity of 5 GB.
|
|
LightScribe Technology
|
Technology used by some optical drives that can etch labels directly on a specially coated optical disc, as opposed to placing an adhesive label on the disc.
|
|
Longitudinal recording
|
Storage technique in which magnetic particles are aligned horizontally around the surface of the disk.
|
|
Memory stick
|
Type of miniature mobile storage medium that is a flash memory card capable of storing between 1 and 16 GB of data.
|
|
Memory stick micro
|
Memory card capable of storing between 1 and 16 GB of data.
|
|
microfiche
|
A small sheet of film, usually about 4 inches by 6 inches in size, on which microscopic images of documents are stored.
|
|
microfilm
|
A roll of film, usually 100 to 215 feet long, on which microscopic images of documents are stored.
|
|
microSD
|
Type of miniature mobile storage medium that is a flash memory card capable of storing between 1 and 2 GB of data.
|
|
microSDHC
|
Memory card capable of storing between 4 and 16 GB of data.
|
|
network attached storage
|
Server connected to a network with the sole purpose of providing storage.
|
|
optical disk
|
Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written on and read by a laser.
|
|
perpendicular recording
|
Storage technique in which magnetic particles are aligned vertically, or perpedicular to the disk's surface, making much greater storage capacities possible.
|
|
Picture CD
|
Single-session CD-ROM that stores digital versions of film using a jpg file format at a lower resolution, typically 1024 x 1536 pixels.
|
|
pocket hard drive
|
Term that refers to smaller external hard disks because they enable users easily to transport photos and other files from one computer to another.
|
|
RAID
|
Redundant array of independent disks; group of two or more integrated hard disks.
|
|
Reading
|
Process of transferring data, instructions, and information from a storage medium into memory.
|
|
removable hard disc
|
Hard disk that can be inserted and removed from either a dock or drive.
|
|
ripping
|
Process of copying audio and/or video data from a purchased disc and saving it on digital media.
|
|
secondary storage
|
The physical material on which a computer keeps data, instructions, and information.
|
|
Secure Digital
|
Memory card that is capable of storing between 512 MB and 8 GB of data.
|
|
Secure Digital High Capacity
|
Memory card capable of storing between 4 and 32 GB of data.
|
|
smart card
|
Card, similar in size to a credit card or ATM card, that stores data on a thin microprocessor embedded in the card.
|
|
solid state drive
|
Storage device that typically uses flash memory to store data, instructions, and information.
|
|
solid state media
|
Term used to refer to components that consist entirely of electronic components, such as integrated circuits, and contain no moving parts.
|
|
storage device
|
Hardware used to record (write and/or read) items to and from storage media.
|
|
storage medium
|
The physical material on which a computer keeps data, instructions, and information.
|
|
tape
|
Magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost.
|
|
tape drive
|
Device used to read and write data and information on tape.
|
|
UMD
|
Universal Media Disc. Mini-DVD used specifically with the PlayStation Portable handheld game console.
|
|
writing
|
Process of transferring data, instructions, and information from memory to a storage medium.
|
|
xD picture card
|
Type of miniature mobile storage media that is a flash memory card capable of storing between 256 MB and 2 GB of data.
|
|
administrator account
|
Computer account held by computer and network administrators that enables them to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer or network.
|
|
buffer
|
Segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.
|
|
cold boot
|
Process of turning on a computer that has been powered off completely.
|
|
command line interface
|
Type of user interface in which a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions.
|
|
disk cleanup
|
Utility that searches for and removes unnecessary files.
|
|
disk defragmenter
|
Utility that reorganizes the files and unused space on a computer's hard disk so the operating system accesses data more quickly and programs run faster.
|
|
driver
|
Small program that tells an operating system how to communicate with a specific device.
|
|
embedded operating system
|
The operating system that resides on a ROM chip inside most PDAs and small devices
|
|
file manager
|
Utility that performs functions related to file and disk management.
|
|
folder
|
Specific named location on a storage medium that contains related documents.
|
|
graphical user interface GUI
|
Type of user interface that allows a user to interact with software using text, graphics, and visual images, such as icons.
|
|
hibernate
|
Operating system function that saves any open documents and programs to a hard disk before removing power from the computer.
|
|
image viewer
|
Utility program that allows users to display, copy, and print the contents of a graphics file.
|
|
Linux
|
Popular, multitasking UNIX-type operating system.
|
|
MAC OS X
|
Multitasking operating system that is the latest version of the Macintosh operating system.
|
|
media player
|
Utility program that allows you to view images and animation, listen to audio, and watch video files.
|
|
memory management
|
Operating system activity that optimizes the use of random access memory (RAM).
|
|
multiprocessing
|
In reference to operating systems, supports two or more processors running programs at the same time.
|
|
multiuser
|
In reference to operating systems, enables two or more users to run programs simultaneously.
|
|
operating system OS
|
Set of programs that work together to coordinate all the activities among computer hardware resources.
|
|
performance monitor
|
Operating system program that assesses and reports information about various computer resources and devices.
|
|
personal computer maintenance utility
|
Utility program that identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer's performance.
|
|
phishing
|
Scam in which a perpetrator attempts to obtain your personal and/or financial information.
|
|
plug and play
|
Technology that gives a computer the capability to configure adapter cards and other peripherals automatically as a user installs them.
|
|
queue
|
Lineup of multiple print jobs within a buffer.
|
|
restore utility
|
Program that reverses the backup process and returns backed up files to their original form.
|
|
search utility
|
Program that attempts to locate a file on your computer based on criteria you specify.
|
|
server operating system
|
Operating system that organizes and coordinates how multiple users access and share resources on a network.
|
|
service pack
|
Free downloadable software updates provided by the software manufacturer to users who have registered and/or activated their software.
|
|
spooling
|
Operating system process that sends documents to be printed to a buffer, which holds the information while the printer prints at its own rate, instead of sending them immediately to the printer.
|
|
stand alone operating system
|
Complete operating system that works on a desktop computer, notebook computer, or mobile computing device and that also works in conjunction with a network operating system.
|
|
system software
|
Software that serves as the interface between the user, the application software, and the computer's hardware.
|
|
UNIX
|
Multitasking operating system that now is available for most computers of all sizes.
|
|
user interface
|
The portion of software that defines how a user interacts with a computer, including how the user enters data and instructions and how information is displayed on the screen.
|
|
utility
|
Type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.
|
|
virtual memory
|
A portion of a storage medium, usually the hard disk, that the operating system allocates to function as additional RAM.
|
|
warm boot
|
Process of using the operating system to restart a computer.
|
|
802.11
|
Series of network standards developed by IEEE that specifies how two wireless devices communicate over the air with each other.
|
|
802.16
|
Worldwide Interoperability for Microwave Access. Newer network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area.
|
|
ATM
|
Short for Asynchronous Transfer Mode; service that carries voice, data, video, and multimedia at very high speeds.
|
|
broadband
|
Type of media that transmits multiple signals simultaneously.
|
|
bus network
|
Type of network topology in which a single central cable connects all computers and other devices.
|
|
cable modem
|
Digital modem that sends and receives digital data over the cable television (CATV) network. Also called a broadband modem
|
|
cellular radio
|
Form of broadcast radio that is used widely for mobile communications, specifically wireless modems and cellular telephones.
|
|
client/server network
|
Network in which one or more computers act as a server, and the other computers on the network request services from the server.
|
|
clients
|
Other computers and mobile devices on a network that rely on a server for its resources.
|
|
collaborative software
|
Software that includes tools that enable users to share documents via online meetings and communicate with other connected users.
|
|
communications channel
|
Transmission media on which data, instructions, or information travel.
|
|
communications device
|
Hardware component that enables a computer to send (transmit) and receive data, instructions, and information to and from one or more computers.
|
|
communications software
|
Programs that (1) help users establish a connection to another computer or network; (2) manage the transmission of data, instructions, and information; and (3) provide an interface for users to communicate with one another.
|
|
dedicated line
|
Type of always-on connection that is established between two communications devices (unlike a dial-up line where the connection is reestablished each time it is used).
|
|
digital modem
|
Communications device that sends and receives data and information to and from a digital line.
|
|
ethernet
|
Network standard that specifies no central computer or device on the network should control when data can be transmitted.
|
|
fiber optic cable
|
Dozens or hundreds of thin strands of glass or plastic that use light to transmit signals.
|
|
FTTP fiber to the premises
|
Dedicated line that uses fiber-optic cable to provide extremely high-speed Internet access to a user's physical permanent location.
|
|
groupware
|
Software that helps groups of people work together on projects and share information over a network.
|
|
intranet
|
An internal network that uses Internet technologies.
|
|
IrDA
|
Network standard used to transmit data wirelessly via infrared (IR) light waves.
|
|
ISDN
|
Set of standards for digital transmission of data over standard copper telephone lines.
|
|
LAN local area network
|
Network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building, or closely positioned group of buildings.
|
|
mashup
|
Web application that combines services from two or more sources, creating a new application.
|
|
MAN metropolitan area network
|
High-speed network that connects local area networks in a metropolitan area such as a city or town and handles the bulk of communications activity across that region.
|
|
microwaves
|
Radio waves that provide a high-speed signal transmission.
|
|
network standard
|
Guidelines that specify the way computers access the medium to which they are attached, the type(s) of medium used, the speeds used on different types of networks, and the type(s) of physical cable and/or the wireless technology used.
|
|
network topology
|
Layout of computers and devices in a communications network.
|
|
noise
|
Electrical disturbance that can degrade communications.
|
|
peer to peer network
|
Simple, inexpensive network that typically connects fewer than 10 computers.
|
|
RFID
|
Short for radio frequency identification; standard, specifically a protocol, that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
|
|
server
|
Computer that controls access to the hardware, software, and other resources on a network and provides a centralized storage area for programs, data, and information
|
|
star network
|
Type of network topology in which all computers and devices on the network connect to a central device, thus forming a star.
|
|
T carrier line
|
Any of several types of long-distance digital telephone lines that carry multiple signals over a single communications line.
|
|
T1 line
|
The most popular T-carrier line.
|
|
TCP/IP
|
Short for Transmission Control Protocol/Internet Protocol; network standard, specifically a protocol, that defines how messages (data) are routed from one end of a network to the other, ensuring the data arrives correctly.
|
|
transmission media
|
Materials or substances capable of carrying one or more signals in a communications channel.
|
|
twisted pair cable
|
Transmission media that consists of one or more twisted-pair wires bundled together.
|
|
UWB
|
Network standard that specifies how two UWB devices use short-range radio waves to communicate at high speeds with each other.
|
|
value added network VAN
|
Third-party business that provides networking services such as secure data and information transfer, storage, e-mail, and management reports.
|
|
web services
|
Set of software technologies that allows businesses to create products and B2B (business-to-business) interactions over the Internet.
|
|
Wi-Fi
|
Term for any network based on the 802.11 series of standards.
|
|
Wide area network WAN
|
Network that covers a large geographic area (such as a city, country, or the world) using a communications channel that combines many types of media such as telephone lines, cables, and radio waves.
|
|
WiMAX
|
Worldwide Interoperability for Microwave Access. Newer network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area.
|
|
wireless access point
|
Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
|
|
attribute
|
Each data element in an object. Also called a property.
|
|
check digit
|
Validity check consisting of a number(s) or character(s) that is appended to or inserted in a primary key value.
|
|
collaborative databases
|
Web database where users store and share photos, videos, recordings, and other personal media with other registered users
|
|
column
|
Term used by users of relational databases for field.
|
|
composite key
|
Primary key that consists of multiple fields.
|
|
consistency check
|
Validity check that tests the data in two or more associated field to ensure that the relationship is logical and their data is in the correct format.
|
|
data
|
Collection of unprocessed items, which can include text, numbers, images, audio, and video.
|
|
data dictionary
|
A DBMS element that contains data about each file in a database and each field in those files. Also called a repository.
|
|
data file
|
Collection of related records stored on a storage medium such as a hard disk or optical disc.
|
|
data model
|
Rules and standards that define how a database organizes data.
|
|
data type
|
Specifies the kind of data a field in a database can contain and how the field can be used.
|
|
data warehouse
|
Huge database that stores and manages the data required to analyze historical and current transactions.
|
|
database
|
Collection of data organized in a manner that allows access retrieval, and use of that data.
|
|
database administrators
|
Person who creates and maintains the data dictionary, manages security of a database, monitors the performance of a database, and checks backup and recovery procedures.
|
|
database analyst
|
Person who focuses on the meaning and usage of data, including proper placement of fields, defining the relationships among data, and identifying users' access privileges. Also called a data modeler.
|
|
database approach
|
System used to store and manage data in which many programs and users share the data in a database.
|
|
database management system
|
Program that allows user to create a computerized database; add, change, and delete data in the database, sort and retrieve data from the database; and create forms and reports from the data in the database.
|
|
database software
|
Application software used to create, access, and manage a database; add, change, and delete data in the database; sort and retrieve data from the database; and create forms and reports using the data in the database.
|
|
field
|
A combination of one or more related characters or bytes, a field is the smallest unit of data a user accesses.
|
|
file maintenance
|
Procedures that keep data current.
|
|
file processing system
|
System used to store and manage data in which each department or area within an organization has its own set of files.
|
|
form
|
Window on the screen that provides areas for entering or modifying data in a database.
|
|
garbage in, garbage out GIGO
|
Computing phrase that points out the accuracy of a computer's output depends on the accuracy of the input.
|
|
object
|
Database item that contains data, as well as the actions that read or process the data.
|
|
object-oriented database
|
Database that stores data in objects.
|
|
primary key
|
Field in a database that uniquely identifies each record in a file.
|
|
principle of least privilege
|
Policy adopted by some organizations, where users' access privileges are limited to the lowest level necessary to perform required tasks.
|
|
query
|
Request for specific data from a database.
|
|
query by example
|
DBMS feature that has a graphical user interface to assist users with retrieving data.
|
|
query language
|
Language used with databases that consists of simple, English-like statements that allows users to specify the data to display, print, or store.
|
|
record
|
Group of related fields in a database.
|
|
recovery utility
|
DBMS feature that uses logs and/or backups to restore a database when it becomes damaged or destroyed.
|
|
relation
|
Term used by developers of relational databases for file.
|
|
relational database
|
Database that stores data in tables that consist of rows and columns, with each row having a primary key and each column having a unique name.
|
|
relationship
|
Link within data in a database.
|
|
report generator
|
DBMS feature that allows users to design a report on the screen, retrieve data into the report design, and then display or print the report.
|
|
row
|
Term used by users of relational databases for record.
|
|
Structured language query
|
Query language used with databases that allows users to manage, update, and retrieve data.
|
|
table
|
Term used by users of relational databases for file.
|
|
tuple
|
Term used by developers of relational databases for record.
|
|
validation
|
Process of comparing data with a set of rules or values to find out if the data is correct.
|
|
access control
|
Security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.
|
|
802.11i
|
Network standard that conforms to government's security standards and uses more sophisticated encryption techniques than WPA. Sometimes called WPA2.
|
|
audit trail
|
Computer file that records both successful and unsuccessful access attempts.
|
|
back door
|
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
|
|
biometric device
|
Device that authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
|
|
botnet
|
Group of compromised computers connected to a network such as the internet that is being used as part of a network that attacks other networks, usually for nefarious purposes. See also zombie army.
|
|
certificate authority
|
Authorized person or company that issues and verifies digital certificates.
|
|
clickjacking
|
Scam in which an object that can be clicked on a Web site, such as a button, image, or link, contains a malicious program.
|
|
computer addiction
|
Growing health problem that occurs when the computer consumes someone's entire social life.
|
|
computer security risk
|
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
|
|
cracker
|
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
|
|
decrypt
|
Process of deciphering encrypted data into a readable form.
|
|
digital rights management
|
Stragegy designed to prevent illegal distribution of movies, music, and other digital content.
|
|
encryption
|
Process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
encryption algorithm
|
Set of steps that can convert readable plaintext into unreadable ciphertext.
|
|
encryption key
|
Set of characters that the originator of the encrypted data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
|
|
information privacy
|
Right of individuals and companies to deny or restrict the collection and use of information about them.
|
|
intellectual property rights
|
Rights to which creators are entitled for their work.
|
|
payload
|
Destructive event or prank a malicious-logic program is intended to deliver.
|
|
pharming
|
Scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
|
|
phishing
|
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information
|
|
possessed object
|
Any item that a user must carry to gain access to a computer or computer facility.
|
|
real time location system
|
Safeguard used by some businesses to track and identify the location of high-risk or high-value items.
|
|
rootkit
|
Program that hides in a computer and allows someone from a remote location to take full control of the computer.
|
|
social engineering
|
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
|
|
Spoofing
|
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
|
|
unauthorized use
|
Use of a computer or its data for unapproved or possibly illegal activities.
|
|
war driving
|
Intrusion technique in which an individual attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
|
|
zombie
|
A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider.
|
|
.net
|
Microsoft's set of technologies that allows almost any type of program to run on the Internet or an internal business network, as well as stand-alone computers and mobile devices.
|
|
4GL
|
Fourth-generation language. Nonprocedural language that enables users and programmers to access data in a database.
|
|
Ajax
|
Asynchronous JavaScript and XML. Method of creating interactive Web applications designed to provide immediate response to user requests.
|
|
analysis phase
|
Step in system development that consists of two major activities: (1) conduct a preliminary investigation, and (2) perform detailed analysis.
|
|
API application programming interface
|
collection of tools that programmers use to interact with an environment such as a Web site or operating system.
|
|
application generator
|
Program that creates source code or machine code from a specification of the required functionality.
|
|
assembly language
|
Programming language in which a programmer writes instructions using symbolic instruction codes
|
|
ATOM
|
XML application that content aggregators use to distribute content to subscribers.
|
|
benchmark test
|
Test that measures the performance of hardware or software.
|
|
C
|
Programming language developed in the early 1970s at Bell Laboratories used for business and scientific applications.
|
|
C#
|
Object-oriented programming language based on C++ developed primarily by Anders Hejlsberg at Microsoft.
|
|
C++
|
Object-oriented programming language developed at Bell Laboratories that is an extension of the C programming language.
|
|
case control structure
|
Type of selection control structure that can yield one of three or more possibilities.
|
|
chief security officer
|
Employee responsible for physical security of a company's property and people; in charge of security computing resources.
|
|
COBOL COmmon Business-Oriented Language
|
Programming language designed for business applications, which evolved out of a joint effort between the United States government, businesses, and major universities in the early 1960s.
|
|
code snippets
|
Prewritten code and templates associated with common programming tasks.
|
|
compiler
|
Separate program that converts an entire source program into machine language before executing it.
|
|
computer program
|
Series of instructions that directs a computer to perform tasks
|
|
computer security plan
|
Written summary of all the safeguards that are in place to protect an organization's information assets.
|
|
computer-aided software engineering (CASE)
|
Software tools designed to support one or more activities of system development, typically including diagrams to support both process and object modeling.
|
|
control structure
|
Used during program design, a depiction of the logical order of program instructions. Also called a construct.
|
|
custom software
|
Software that performs functions specific to a business or industry, developed by a user or at a user's request.
|
|
Delphi
|
Powerful visual programming tool that is ideal for large-scale enterprise and Web application development.
|
|
design phase
|
Phase of the system development cycle that consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all of the details of the new or modified information system.
|
|
developer
|
Person who writes and modifies computer programs. See also programmer.
|
|
direct conversion
|
Conversion strategy where the user stops using an old system and begins using a new system on a certain date. Also called abrupt cutover.
|
|
documentation
|
Collection and summarization of data and information.
|
|
dreamweaver
|
Web page authoring program by Adobe Systems that allows Web developers to create, maintain, and manage professional Web sites.
|
|
dynamic HTML
|
Type of HTML that allows Web developers to include more graphical interest and interactivity in a Web page.
|
|
expression web
|
Microsoft's Web page authoring program that enables Web developers to create professional, dynamic, interactive Web sites.
|
|
F#
|
Programming language included with Visual Studio 2010 that combines the benefits of an object-oriented language with the benefits of a functional language.
|
|
feasibility
|
Measure of how suitable the development of a system will be to the organization.
|
|
focus group
|
Lengthy, structured, group meetings in which users and IT professionals work together to design or develop an application.
|
|
HTML
|
Special formatting language that programmers use to format documents for display on the Web.
|
|
IDE (integrated development environment)
|
Includes program development tools for building graphical user interfaces, an editor for entering program code, a compiler and/or interpreter, and a debugger.
|
|
implementation phase
|
Phase of system development during which the new or modified system is constructed, or built, and then delivered to the users. Four major activities performed include: (1) develop programs, (2) install and test the new system, (3) train users, and (4) convert to the new system.
|
|
information system
|
Collection of hardware, software, data, people, and procedures that work together to produce quality information.
|
|
interpreter
|
Program used to convert a source program into machine language and then executes the machine language instructions.
|
|
IT consultant
|
Employee, typically hired based on computer expertise, who provides computer services to his or her clients.
|
|
javascript
|
Interpreted language that allows a programmer to add dynamic content and interactive elements to a Web page.
|
|
machine language
|
The only language a computer directly recognizes, using a series of binary digits or a combination of numbers and letters that represent binary digits.
|
|
macro
|
Series of statements that instructs an application how to complete a task.
|
|
maintaining
|
Act of correct errors or adding enhancements to an existing program.
|
|
multimedia authoring software
|
Software that allows users to combine text, graphics, audio, video, and animation in an interactive application and that often is used for computer-based training and Web-based presentations.
|
|
nonprocedural language
|
Type of programming language in which a programmer writes English-like instructions or interacts with a graphical environment to retrieve data from files or a database.
|
|
object-oriented programming (OOP) language
|
Programming language used to implement an object-oriented design.
|
|
operation, support, and security phase
|
Phase of system development that consists of three major activities: (1) perform maintenance activities, (2) monitor system performance, and (3) assess system security.
|
|
outsource
|
Having a source outside a company develop software for the company. Some companies outsource just the software development aspect of their IT operation, while others outsource more or all of their IT operation.
|
|
PERL
|
Practical Extraction and Report Language. Scripting language developed at NASA's Jet Propulsion Laboratory as a procedural language similar to C and C++.
|
|
phased conversion
|
Conversion strategy used by larger systems with multiple sites where each location converts at a separate time.
|
|
planning phase
|
Step in system development that begins when a steering committee receives a project request.
|
|
phases
|
Categories into which system development activities are grouped: (1) planning phase, (2) analysis phase, (3) design phase, (4) implementation phase, and (5) support phase.
|
|
PHP
|
Hypertext Preprocessor. Free, open source scripting language.
|
|
pilot conversion
|
Conversion strategy where only one location in a company uses a new system - so it can be tested.
|
|
planning phase
|
Step in system development that begins when a steering committee receives a project request.
|
|
powerbuilder
|
Powerful program development tool developed by Sybase that is best suited for Web-based, .NET, and large-scale enterprise object-oriented applications.
|
|
preliminary investigation
|
Investigation that determines the exact nature of a problem or improvement and decides whether it is worth pursuing. Also called feasibility study.
|
|
procedural language
|
Type of programming language in which a programmer writes instructions that tell the computer what to accomplish and how to do it using a series of English-like words to write instructions.
|
|
program development life cycle
|
Part of the implementation phase of the system development cycle that follows six steps: (1) analyze the requirements, (2) design the solution, (3) validate the design, (4) implement the design, (5) test the solution, and (6) document the solution.
|
|
RAD rapid application development
|
Method of developing software in which a programmer writes and implements a program in segments instead of waiting until an entire program is completed.
|
|
repetition control structure
|
Type of control structure that enables a program to perform one or more actions repeatedly as long as a certain condition is met. Also called a loop.
|
|
REXX
|
Restructured Extended Executor. Procedural interpreted scripting language for both professional programmers and nontechnical users.
|
|
RSS 2.0
|
Really Simple Syndication; specification that content aggregators use to distribute content to subscribers.
|
|
ruby on rails
|
Open source framework that provides technologies for developing object-oriented, database-driven Web sites.
|
|
scope
|
The goal, required activities, time estimates for each activity, cost estimates for each activity, order of activities, and activities that can take place at the same time during system development.
|
|
scripting language
|
Interpreted language that typically is easy to learn and use.
|
|
selection control structure
|
Type of control structure that tells the program which action to take, based on a certain condition.
|
|
sequence control structure
|
Type of control structure that shows one or more actions following each other in order.
|
|
share point designer
|
Web page authoring program that is part of the Microsoft Office and SharePoint families of products.
|
|
source program
|
Program that contains the language instructions, or code, to be converted to machine language.
|
|
SQL
|
Query language used with databases that allows users to manage, update, and retrieve data.
|
|
steering comittee
|
Decision-making body in a company.
|
|
system proposal
|
Document that assesses the feasibility of each alternative solution and then recommends the most feasible solution for a project.
|
|
tcl
|
Tool Command Language; interpreted scripting language maintained by Sun Microsystems Laboratories.
|
|
third generation language
|
Type of programming language in which a programmer writes instructions that tell the computer what to accomplish and how to do it using a series of English-like words to write instructions. Also called a procedural language
|
|
VB script
|
Visual Basic, Scripting Edition. Subset of the Visual Basic language that allows programmers to add intelligence and interactivity to Web pages.
|
|
visual programming environment
|
Graphical interface in a visual programming language that allows programmers to drag and drop objects to develop programs.
|
|
Visual studio
|
Suite of program development tools from Microsoft that assists programmers in building programs for Windows, Windows Mobile, or operating systems that support Microsoft's .NET framework.
|
|
web page authoring software
|
Software used to create Web pages that include graphical images, video, audio, animation, and other special effects with interactive content.
|
|
WML wireless markup language
|
Subset of XML that allows Web page authors to design pages specifically for microbrowsers.
|
|
XHTML
|
Markup language that enables Web sites to be displayed more easily on microbrowsers in smart phones and other personal mobile devices.
|
|
XML
|
Extensible Markup Language; format for sharing data that allows Web developers to create customized tags, used for developing a single Web site whose content can be formatted to display appropriately on various devices.
|
|
blade server
|
Complete computer server, such as a Web server or network server, packed on a single card.
|
|
business intelligence
|
Several types of applications and technologies for acquiring, storing, analyzing, and providing access to information to help users make more sound business decisions.
|
|
business process management
|
Set of activities that enterprises perform to optimize their business processes, such as accounting and finance, hiring employees, and purchasing goods and services.
|
|
chief information officer
|
IT executive position that reports to the CEO.
|
|
cloud computing
|
internet service that provides computing needs to computer users.
|
|
computer aided engineering
|
Use of computers to test product designs.
|
|
content management system
|
An information system that is a combination of databases, software, and procedures that organizes and allows access to various forms of documents and other files, including images and multimedia content.
|
|
data center
|
Centralized location for managing and housing hardware and software.
|
|
data warehouse
|
Huge database that stores and manages the data required to analyze historical and current transactions.
|
|
distribution systems
|
Provides forecasting for inventory control, manages and tracks shipping of products, and provides information and analysis on inventory in warehouses.
|
|
EDI electronic data interchange
|
Set of standards that controls the transfer of business data and information among computers both within and among enterprises.
|
|
enterprise computing
|
Term large companies use to refer to the use of a huge network of computers that meets their diverse computing needs.
|
|
enterprise hardware
|
Devices geared for heavy use, maximum availability, and maximum efficiency that large organizations use to manage and store information and data.
|
|
enterprise resource planning
|
Provides centralized, integrated software to help manage and coordinate the ongoing activities of the enterprise.
|
|
extranet
|
Portion of a company's network that allows customers or suppliers of a company to access parts of an enterprise's intranet.
|
|
failover
|
The process of one system automatically taking the place of a failed system.
|
|
Fibre channel
|
Technology used to connect to storage systems at data rates up to 4 Gbps.
|
|
grid computing
|
Technology that combines many servers and/or personal computers on a network to act as one large computer.
|
|
high availability systems
|
Systems that continue running and performing tasks for at least 99 percent of the time.
|
|
interoperability
|
Sharing information with other information systems within an enterprise.
|
|
legacy system
|
Information system that has existed within an organization for an extended length of time and is relied upon heavily.
|
|
materials requirement planning
|
Approach to information management in a manufacturing environment that uses software to help monitor and control processes related to production.
|
|
network attached storage
|
Server that is placed on a network with the sole purpose of providing storage to users and information systems attached to the network.
|
|
office information system
|
Server that is placed on a network with the sole purpose of providing storage to users and information systems attached to the network.
|
|
portal
|
Web site that offers a variety of Internet services from a single, convenient location.
|
|
RAID
|
Redundant array of independent disks. Group of two or more integrated hard disks that acts like a single large hard disk.
|
|
redundant components
|
Components used so that a functioning computer can take over automatically the tasks of a similar component that fails.
|
|
sales force automation
|
Software that equips traveling salespeople with the electronic tools they need to be more productive.
|
|
scalability
|
Measure of how well computer hardware, software, or an information system can grow to meet increasing performance demands.
|
|
small and medium sized businesses
|
Business that is smaller in size than an enterprise and typically does not have an international presence.
|
|
storage area networks
|
High-speed network with the sole purpose of providing storage to other servers to which it is attached.
|
|
transaction processing system
|
Information system that captures and processes data from day-to-day business activities.
|
|
virtual private network
|
Network that provides a mobile user with a secure connection to a company network server, as if the user has a private line.
|
|
web services
|
Set of software technologies that allows businesses to create products and B2B (business-to-business) interactions over the Internet.
|
|
workflow
|
Defined process that identifies the specific set of steps involved in completing a particular project or business process.
|