• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/316

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

316 Cards in this Set

  • Front
  • Back
access time
Measurement of the amount of time it takes the process to read data, instructions, and information from memory
archive disc
CD that stores photos from an online photo center in jpg file format, usually at a maximum resolution of 7200 pixels per photo.
BD-RE
High-capacity rewritable DVD format.
capacity
Number of bytes a storage medium can hold.
card reader/ writer
Device that reads and writes data, instructions, and information stored on PC Cards or flash memory cards and transmits that data to a computer or printer through a connection to a port.
CD-R
Multisession optical disc on which users can write, but not erase, their own items such as text, graphics, and audio. See also compact disc-recordable.
CD-ROM
Type of optical disc that uses laser technology to store data, instructions, and information that users can read but not write on or erase. See also compact disc read-only memory.
CD-RW
Clocan write data, instructions, and information multiple times. See also compact disc-rewriteable.
Cloud storage
Internet service that provides storage to computer users.
Compact flash
Type of miniature mobile storage medium that is a flash memory card capable of storing between 512 MB and 100 GB of data.
Disc controller
Special-purpose chip and electronic circuits that control the transfer of data, instructions, and information between a disk and the system bus and other components in a computer.
DVD+RAM
Type of optical disc that can be erased and written on, or recorded on, more than 100,000 times. DVD+RAM discs can be read by DVD+RAM drives and some DVD-ROM drives and players.
DVD+RW
Rewritable DVD format with capacities up to 4.7 GB per side
Expresscard module
Removable flash memory device that adds memory, communications, multimedia, and security capabilities to mobile computers.
external hard disc
Separate freestanding hard disk that connects with a cable to a USB port or FireWire port on the system unit.
hard disk
Type of storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information.
HD VMD
Versatile Multilayer Disc; high-density format that potentially will contain up to 20 layers, each with a capacity of 5 GB.
LightScribe Technology
Technology used by some optical drives that can etch labels directly on a specially coated optical disc, as opposed to placing an adhesive label on the disc.
Longitudinal recording
Storage technique in which magnetic particles are aligned horizontally around the surface of the disk.
Memory stick
Type of miniature mobile storage medium that is a flash memory card capable of storing between 1 and 16 GB of data.
Memory stick micro
Memory card capable of storing between 1 and 16 GB of data.
microfiche
A small sheet of film, usually about 4 inches by 6 inches in size, on which microscopic images of documents are stored.
microfilm
A roll of film, usually 100 to 215 feet long, on which microscopic images of documents are stored.
microSD
Type of miniature mobile storage medium that is a flash memory card capable of storing between 1 and 2 GB of data.
microSDHC
Memory card capable of storing between 4 and 16 GB of data.
network attached storage
Server connected to a network with the sole purpose of providing storage.
optical disk
Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written on and read by a laser.
perpendicular recording
Storage technique in which magnetic particles are aligned vertically, or perpedicular to the disk's surface, making much greater storage capacities possible.
Picture CD
Single-session CD-ROM that stores digital versions of film using a jpg file format at a lower resolution, typically 1024 x 1536 pixels.
pocket hard drive
Term that refers to smaller external hard disks because they enable users easily to transport photos and other files from one computer to another.
RAID
Redundant array of independent disks; group of two or more integrated hard disks.
Reading
Process of transferring data, instructions, and information from a storage medium into memory.
removable hard disc
Hard disk that can be inserted and removed from either a dock or drive.
ripping
Process of copying audio and/or video data from a purchased disc and saving it on digital media.
secondary storage
The physical material on which a computer keeps data, instructions, and information.
Secure Digital
Memory card that is capable of storing between 512 MB and 8 GB of data.
Secure Digital High Capacity
Memory card capable of storing between 4 and 32 GB of data.
smart card
Card, similar in size to a credit card or ATM card, that stores data on a thin microprocessor embedded in the card.
solid state drive
Storage device that typically uses flash memory to store data, instructions, and information.
solid state media
Term used to refer to components that consist entirely of electronic components, such as integrated circuits, and contain no moving parts.
storage device
Hardware used to record (write and/or read) items to and from storage media.
storage medium
The physical material on which a computer keeps data, instructions, and information.
tape
Magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost.
tape drive
Device used to read and write data and information on tape.
UMD
Universal Media Disc. Mini-DVD used specifically with the PlayStation Portable handheld game console.
writing
Process of transferring data, instructions, and information from memory to a storage medium.
xD picture card
Type of miniature mobile storage media that is a flash memory card capable of storing between 256 MB and 2 GB of data.
administrator account
Computer account held by computer and network administrators that enables them to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer or network.
buffer
Segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.
cold boot
Process of turning on a computer that has been powered off completely.
command line interface
Type of user interface in which a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions.
disk cleanup
Utility that searches for and removes unnecessary files.
disk defragmenter
Utility that reorganizes the files and unused space on a computer's hard disk so the operating system accesses data more quickly and programs run faster.
driver
Small program that tells an operating system how to communicate with a specific device.
embedded operating system
The operating system that resides on a ROM chip inside most PDAs and small devices
file manager
Utility that performs functions related to file and disk management.
folder
Specific named location on a storage medium that contains related documents.
graphical user interface GUI
Type of user interface that allows a user to interact with software using text, graphics, and visual images, such as icons.
hibernate
Operating system function that saves any open documents and programs to a hard disk before removing power from the computer.
image viewer
Utility program that allows users to display, copy, and print the contents of a graphics file.
Linux
Popular, multitasking UNIX-type operating system.
MAC OS X
Multitasking operating system that is the latest version of the Macintosh operating system.
media player
Utility program that allows you to view images and animation, listen to audio, and watch video files.
memory management
Operating system activity that optimizes the use of random access memory (RAM).
multiprocessing
In reference to operating systems, supports two or more processors running programs at the same time.
multiuser
In reference to operating systems, enables two or more users to run programs simultaneously.
operating system OS
Set of programs that work together to coordinate all the activities among computer hardware resources.
performance monitor
Operating system program that assesses and reports information about various computer resources and devices.
personal computer maintenance utility
Utility program that identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer's performance.
phishing
Scam in which a perpetrator attempts to obtain your personal and/or financial information.
plug and play
Technology that gives a computer the capability to configure adapter cards and other peripherals automatically as a user installs them.
queue
Lineup of multiple print jobs within a buffer.
restore utility
Program that reverses the backup process and returns backed up files to their original form.
search utility
Program that attempts to locate a file on your computer based on criteria you specify.
server operating system
Operating system that organizes and coordinates how multiple users access and share resources on a network.
service pack
Free downloadable software updates provided by the software manufacturer to users who have registered and/or activated their software.
spooling
Operating system process that sends documents to be printed to a buffer, which holds the information while the printer prints at its own rate, instead of sending them immediately to the printer.
stand alone operating system
Complete operating system that works on a desktop computer, notebook computer, or mobile computing device and that also works in conjunction with a network operating system.
system software
Software that serves as the interface between the user, the application software, and the computer's hardware.
UNIX
Multitasking operating system that now is available for most computers of all sizes.
user interface
The portion of software that defines how a user interacts with a computer, including how the user enters data and instructions and how information is displayed on the screen.
utility
Type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.
virtual memory
A portion of a storage medium, usually the hard disk, that the operating system allocates to function as additional RAM.
warm boot
Process of using the operating system to restart a computer.
802.11
Series of network standards developed by IEEE that specifies how two wireless devices communicate over the air with each other.
802.16
Worldwide Interoperability for Microwave Access. Newer network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area.
ATM
Short for Asynchronous Transfer Mode; service that carries voice, data, video, and multimedia at very high speeds.
broadband
Type of media that transmits multiple signals simultaneously.
bus network
Type of network topology in which a single central cable connects all computers and other devices.
cable modem
Digital modem that sends and receives digital data over the cable television (CATV) network. Also called a broadband modem
cellular radio
Form of broadcast radio that is used widely for mobile communications, specifically wireless modems and cellular telephones.
client/server network
Network in which one or more computers act as a server, and the other computers on the network request services from the server.
clients
Other computers and mobile devices on a network that rely on a server for its resources.
collaborative software
Software that includes tools that enable users to share documents via online meetings and communicate with other connected users.
communications channel
Transmission media on which data, instructions, or information travel.
communications device
Hardware component that enables a computer to send (transmit) and receive data, instructions, and information to and from one or more computers.
communications software
Programs that (1) help users establish a connection to another computer or network; (2) manage the transmission of data, instructions, and information; and (3) provide an interface for users to communicate with one another.
dedicated line
Type of always-on connection that is established between two communications devices (unlike a dial-up line where the connection is reestablished each time it is used).
digital modem
Communications device that sends and receives data and information to and from a digital line.
ethernet
Network standard that specifies no central computer or device on the network should control when data can be transmitted.
fiber optic cable
Dozens or hundreds of thin strands of glass or plastic that use light to transmit signals.
FTTP fiber to the premises
Dedicated line that uses fiber-optic cable to provide extremely high-speed Internet access to a user's physical permanent location.
groupware
Software that helps groups of people work together on projects and share information over a network.
intranet
An internal network that uses Internet technologies.
IrDA
Network standard used to transmit data wirelessly via infrared (IR) light waves.
ISDN
Set of standards for digital transmission of data over standard copper telephone lines.
LAN local area network
Network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building, or closely positioned group of buildings.
mashup
Web application that combines services from two or more sources, creating a new application.
MAN metropolitan area network
High-speed network that connects local area networks in a metropolitan area such as a city or town and handles the bulk of communications activity across that region.
microwaves
Radio waves that provide a high-speed signal transmission.
network standard
Guidelines that specify the way computers access the medium to which they are attached, the type(s) of medium used, the speeds used on different types of networks, and the type(s) of physical cable and/or the wireless technology used.
network topology
Layout of computers and devices in a communications network.
noise
Electrical disturbance that can degrade communications.
peer to peer network
Simple, inexpensive network that typically connects fewer than 10 computers.
RFID
Short for radio frequency identification; standard, specifically a protocol, that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
server
Computer that controls access to the hardware, software, and other resources on a network and provides a centralized storage area for programs, data, and information
star network
Type of network topology in which all computers and devices on the network connect to a central device, thus forming a star.
T carrier line
Any of several types of long-distance digital telephone lines that carry multiple signals over a single communications line.
T1 line
The most popular T-carrier line.
TCP/IP
Short for Transmission Control Protocol/Internet Protocol; network standard, specifically a protocol, that defines how messages (data) are routed from one end of a network to the other, ensuring the data arrives correctly.
transmission media
Materials or substances capable of carrying one or more signals in a communications channel.
twisted pair cable
Transmission media that consists of one or more twisted-pair wires bundled together.
UWB
Network standard that specifies how two UWB devices use short-range radio waves to communicate at high speeds with each other.
value added network VAN
Third-party business that provides networking services such as secure data and information transfer, storage, e-mail, and management reports.
web services
Set of software technologies that allows businesses to create products and B2B (business-to-business) interactions over the Internet.
Wi-Fi
Term for any network based on the 802.11 series of standards.
Wide area network WAN
Network that covers a large geographic area (such as a city, country, or the world) using a communications channel that combines many types of media such as telephone lines, cables, and radio waves.
WiMAX
Worldwide Interoperability for Microwave Access. Newer network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area.
wireless access point
Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
attribute
Each data element in an object. Also called a property.
check digit
Validity check consisting of a number(s) or character(s) that is appended to or inserted in a primary key value.
collaborative databases
Web database where users store and share photos, videos, recordings, and other personal media with other registered users
column
Term used by users of relational databases for field.
composite key
Primary key that consists of multiple fields.
consistency check
Validity check that tests the data in two or more associated field to ensure that the relationship is logical and their data is in the correct format.
data
Collection of unprocessed items, which can include text, numbers, images, audio, and video.
data dictionary
A DBMS element that contains data about each file in a database and each field in those files. Also called a repository.
data file
Collection of related records stored on a storage medium such as a hard disk or optical disc.
data model
Rules and standards that define how a database organizes data.
data type
Specifies the kind of data a field in a database can contain and how the field can be used.
data warehouse
Huge database that stores and manages the data required to analyze historical and current transactions.
database
Collection of data organized in a manner that allows access retrieval, and use of that data.
database administrators
Person who creates and maintains the data dictionary, manages security of a database, monitors the performance of a database, and checks backup and recovery procedures.
database analyst
Person who focuses on the meaning and usage of data, including proper placement of fields, defining the relationships among data, and identifying users' access privileges. Also called a data modeler.
database approach
System used to store and manage data in which many programs and users share the data in a database.
database management system
Program that allows user to create a computerized database; add, change, and delete data in the database, sort and retrieve data from the database; and create forms and reports from the data in the database.
database software
Application software used to create, access, and manage a database; add, change, and delete data in the database; sort and retrieve data from the database; and create forms and reports using the data in the database.
field
A combination of one or more related characters or bytes, a field is the smallest unit of data a user accesses.
file maintenance
Procedures that keep data current.
file processing system
System used to store and manage data in which each department or area within an organization has its own set of files.
form
Window on the screen that provides areas for entering or modifying data in a database.
garbage in, garbage out GIGO
Computing phrase that points out the accuracy of a computer's output depends on the accuracy of the input.
object
Database item that contains data, as well as the actions that read or process the data.
object-oriented database
Database that stores data in objects.
primary key
Field in a database that uniquely identifies each record in a file.
principle of least privilege
Policy adopted by some organizations, where users' access privileges are limited to the lowest level necessary to perform required tasks.
query
Request for specific data from a database.
query by example
DBMS feature that has a graphical user interface to assist users with retrieving data.
query language
Language used with databases that consists of simple, English-like statements that allows users to specify the data to display, print, or store.
record
Group of related fields in a database.
recovery utility
DBMS feature that uses logs and/or backups to restore a database when it becomes damaged or destroyed.
relation
Term used by developers of relational databases for file.
relational database
Database that stores data in tables that consist of rows and columns, with each row having a primary key and each column having a unique name.
relationship
Link within data in a database.
report generator
DBMS feature that allows users to design a report on the screen, retrieve data into the report design, and then display or print the report.
row
Term used by users of relational databases for record.
Structured language query
Query language used with databases that allows users to manage, update, and retrieve data.
table
Term used by users of relational databases for file.
tuple
Term used by developers of relational databases for record.
validation
Process of comparing data with a set of rules or values to find out if the data is correct.
access control
Security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.
802.11i
Network standard that conforms to government's security standards and uses more sophisticated encryption techniques than WPA. Sometimes called WPA2.
audit trail
Computer file that records both successful and unsuccessful access attempts.
back door
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
biometric device
Device that authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
botnet
Group of compromised computers connected to a network such as the internet that is being used as part of a network that attacks other networks, usually for nefarious purposes. See also zombie army.
certificate authority
Authorized person or company that issues and verifies digital certificates.
clickjacking
Scam in which an object that can be clicked on a Web site, such as a button, image, or link, contains a malicious program.
computer addiction
Growing health problem that occurs when the computer consumes someone's entire social life.
computer security risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
cracker
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
decrypt
Process of deciphering encrypted data into a readable form.
digital rights management
Stragegy designed to prevent illegal distribution of movies, music, and other digital content.
encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
encryption algorithm
Set of steps that can convert readable plaintext into unreadable ciphertext.
encryption key
Set of characters that the originator of the encrypted data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
information privacy
Right of individuals and companies to deny or restrict the collection and use of information about them.
intellectual property rights
Rights to which creators are entitled for their work.
payload
Destructive event or prank a malicious-logic program is intended to deliver.
pharming
Scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
phishing
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information
possessed object
Any item that a user must carry to gain access to a computer or computer facility.
real time location system
Safeguard used by some businesses to track and identify the location of high-risk or high-value items.
rootkit
Program that hides in a computer and allows someone from a remote location to take full control of the computer.
social engineering
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
Spoofing
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
unauthorized use
Use of a computer or its data for unapproved or possibly illegal activities.
war driving
Intrusion technique in which an individual attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
zombie
A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider.
.net
Microsoft's set of technologies that allows almost any type of program to run on the Internet or an internal business network, as well as stand-alone computers and mobile devices.
4GL
Fourth-generation language. Nonprocedural language that enables users and programmers to access data in a database.
Ajax
Asynchronous JavaScript and XML. Method of creating interactive Web applications designed to provide immediate response to user requests.
analysis phase
Step in system development that consists of two major activities: (1) conduct a preliminary investigation, and (2) perform detailed analysis.
API application programming interface
collection of tools that programmers use to interact with an environment such as a Web site or operating system.
application generator
Program that creates source code or machine code from a specification of the required functionality.
assembly language
Programming language in which a programmer writes instructions using symbolic instruction codes
ATOM
XML application that content aggregators use to distribute content to subscribers.
benchmark test
Test that measures the performance of hardware or software.
C
Programming language developed in the early 1970s at Bell Laboratories used for business and scientific applications.
C#
Object-oriented programming language based on C++ developed primarily by Anders Hejlsberg at Microsoft.
C++
Object-oriented programming language developed at Bell Laboratories that is an extension of the C programming language.
case control structure
Type of selection control structure that can yield one of three or more possibilities.
chief security officer
Employee responsible for physical security of a company's property and people; in charge of security computing resources.
COBOL COmmon Business-Oriented Language
Programming language designed for business applications, which evolved out of a joint effort between the United States government, businesses, and major universities in the early 1960s.
code snippets
Prewritten code and templates associated with common programming tasks.
compiler
Separate program that converts an entire source program into machine language before executing it.
computer program
Series of instructions that directs a computer to perform tasks
computer security plan
Written summary of all the safeguards that are in place to protect an organization's information assets.
computer-aided software engineering (CASE)
Software tools designed to support one or more activities of system development, typically including diagrams to support both process and object modeling.
control structure
Used during program design, a depiction of the logical order of program instructions. Also called a construct.
custom software
Software that performs functions specific to a business or industry, developed by a user or at a user's request.
Delphi
Powerful visual programming tool that is ideal for large-scale enterprise and Web application development.
design phase
Phase of the system development cycle that consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all of the details of the new or modified information system.
developer
Person who writes and modifies computer programs. See also programmer.
direct conversion
Conversion strategy where the user stops using an old system and begins using a new system on a certain date. Also called abrupt cutover.
documentation
Collection and summarization of data and information.
dreamweaver
Web page authoring program by Adobe Systems that allows Web developers to create, maintain, and manage professional Web sites.
dynamic HTML
Type of HTML that allows Web developers to include more graphical interest and interactivity in a Web page.
expression web
Microsoft's Web page authoring program that enables Web developers to create professional, dynamic, interactive Web sites.
F#
Programming language included with Visual Studio 2010 that combines the benefits of an object-oriented language with the benefits of a functional language.
feasibility
Measure of how suitable the development of a system will be to the organization.
focus group
Lengthy, structured, group meetings in which users and IT professionals work together to design or develop an application.
HTML
Special formatting language that programmers use to format documents for display on the Web.
IDE (integrated development environment)
Includes program development tools for building graphical user interfaces, an editor for entering program code, a compiler and/or interpreter, and a debugger.
implementation phase
Phase of system development during which the new or modified system is constructed, or built, and then delivered to the users. Four major activities performed include: (1) develop programs, (2) install and test the new system, (3) train users, and (4) convert to the new system.
information system
Collection of hardware, software, data, people, and procedures that work together to produce quality information.
interpreter
Program used to convert a source program into machine language and then executes the machine language instructions.
IT consultant
Employee, typically hired based on computer expertise, who provides computer services to his or her clients.
javascript
Interpreted language that allows a programmer to add dynamic content and interactive elements to a Web page.
machine language
The only language a computer directly recognizes, using a series of binary digits or a combination of numbers and letters that represent binary digits.
macro
Series of statements that instructs an application how to complete a task.
maintaining
Act of correct errors or adding enhancements to an existing program.
multimedia authoring software
Software that allows users to combine text, graphics, audio, video, and animation in an interactive application and that often is used for computer-based training and Web-based presentations.
nonprocedural language
Type of programming language in which a programmer writes English-like instructions or interacts with a graphical environment to retrieve data from files or a database.
object-oriented programming (OOP) language
Programming language used to implement an object-oriented design.
operation, support, and security phase
Phase of system development that consists of three major activities: (1) perform maintenance activities, (2) monitor system performance, and (3) assess system security.
outsource
Having a source outside a company develop software for the company. Some companies outsource just the software development aspect of their IT operation, while others outsource more or all of their IT operation.
PERL
Practical Extraction and Report Language. Scripting language developed at NASA's Jet Propulsion Laboratory as a procedural language similar to C and C++.
phased conversion
Conversion strategy used by larger systems with multiple sites where each location converts at a separate time.
planning phase
Step in system development that begins when a steering committee receives a project request.
phases
Categories into which system development activities are grouped: (1) planning phase, (2) analysis phase, (3) design phase, (4) implementation phase, and (5) support phase.
PHP
Hypertext Preprocessor. Free, open source scripting language.
pilot conversion
Conversion strategy where only one location in a company uses a new system - so it can be tested.
planning phase
Step in system development that begins when a steering committee receives a project request.
powerbuilder
Powerful program development tool developed by Sybase that is best suited for Web-based, .NET, and large-scale enterprise object-oriented applications.
preliminary investigation
Investigation that determines the exact nature of a problem or improvement and decides whether it is worth pursuing. Also called feasibility study.
procedural language
Type of programming language in which a programmer writes instructions that tell the computer what to accomplish and how to do it using a series of English-like words to write instructions.
program development life cycle
Part of the implementation phase of the system development cycle that follows six steps: (1) analyze the requirements, (2) design the solution, (3) validate the design, (4) implement the design, (5) test the solution, and (6) document the solution.
RAD rapid application development
Method of developing software in which a programmer writes and implements a program in segments instead of waiting until an entire program is completed.
repetition control structure
Type of control structure that enables a program to perform one or more actions repeatedly as long as a certain condition is met. Also called a loop.
REXX
Restructured Extended Executor. Procedural interpreted scripting language for both professional programmers and nontechnical users.
RSS 2.0
Really Simple Syndication; specification that content aggregators use to distribute content to subscribers.
ruby on rails
Open source framework that provides technologies for developing object-oriented, database-driven Web sites.
scope
The goal, required activities, time estimates for each activity, cost estimates for each activity, order of activities, and activities that can take place at the same time during system development.
scripting language
Interpreted language that typically is easy to learn and use.
selection control structure
Type of control structure that tells the program which action to take, based on a certain condition.
sequence control structure
Type of control structure that shows one or more actions following each other in order.
share point designer
Web page authoring program that is part of the Microsoft Office and SharePoint families of products.
source program
Program that contains the language instructions, or code, to be converted to machine language.
SQL
Query language used with databases that allows users to manage, update, and retrieve data.
steering comittee
Decision-making body in a company.
system proposal
Document that assesses the feasibility of each alternative solution and then recommends the most feasible solution for a project.
tcl
Tool Command Language; interpreted scripting language maintained by Sun Microsystems Laboratories.
third generation language
Type of programming language in which a programmer writes instructions that tell the computer what to accomplish and how to do it using a series of English-like words to write instructions. Also called a procedural language
VB script
Visual Basic, Scripting Edition. Subset of the Visual Basic language that allows programmers to add intelligence and interactivity to Web pages.
visual programming environment
Graphical interface in a visual programming language that allows programmers to drag and drop objects to develop programs.
Visual studio
Suite of program development tools from Microsoft that assists programmers in building programs for Windows, Windows Mobile, or operating systems that support Microsoft's .NET framework.
web page authoring software
Software used to create Web pages that include graphical images, video, audio, animation, and other special effects with interactive content.
WML wireless markup language
Subset of XML that allows Web page authors to design pages specifically for microbrowsers.
XHTML
Markup language that enables Web sites to be displayed more easily on microbrowsers in smart phones and other personal mobile devices.
XML
Extensible Markup Language; format for sharing data that allows Web developers to create customized tags, used for developing a single Web site whose content can be formatted to display appropriately on various devices.
blade server
Complete computer server, such as a Web server or network server, packed on a single card.
business intelligence
Several types of applications and technologies for acquiring, storing, analyzing, and providing access to information to help users make more sound business decisions.
business process management
Set of activities that enterprises perform to optimize their business processes, such as accounting and finance, hiring employees, and purchasing goods and services.
chief information officer
IT executive position that reports to the CEO.
cloud computing
internet service that provides computing needs to computer users.
computer aided engineering
Use of computers to test product designs.
content management system
An information system that is a combination of databases, software, and procedures that organizes and allows access to various forms of documents and other files, including images and multimedia content.
data center
Centralized location for managing and housing hardware and software.
data warehouse
Huge database that stores and manages the data required to analyze historical and current transactions.
distribution systems
Provides forecasting for inventory control, manages and tracks shipping of products, and provides information and analysis on inventory in warehouses.
EDI electronic data interchange
Set of standards that controls the transfer of business data and information among computers both within and among enterprises.
enterprise computing
Term large companies use to refer to the use of a huge network of computers that meets their diverse computing needs.
enterprise hardware
Devices geared for heavy use, maximum availability, and maximum efficiency that large organizations use to manage and store information and data.
enterprise resource planning
Provides centralized, integrated software to help manage and coordinate the ongoing activities of the enterprise.
extranet
Portion of a company's network that allows customers or suppliers of a company to access parts of an enterprise's intranet.
failover
The process of one system automatically taking the place of a failed system.
Fibre channel
Technology used to connect to storage systems at data rates up to 4 Gbps.
grid computing
Technology that combines many servers and/or personal computers on a network to act as one large computer.
high availability systems
Systems that continue running and performing tasks for at least 99 percent of the time.
interoperability
Sharing information with other information systems within an enterprise.
legacy system
Information system that has existed within an organization for an extended length of time and is relied upon heavily.
materials requirement planning
Approach to information management in a manufacturing environment that uses software to help monitor and control processes related to production.
network attached storage
Server that is placed on a network with the sole purpose of providing storage to users and information systems attached to the network.
office information system
Server that is placed on a network with the sole purpose of providing storage to users and information systems attached to the network.
portal
Web site that offers a variety of Internet services from a single, convenient location.
RAID
Redundant array of independent disks. Group of two or more integrated hard disks that acts like a single large hard disk.
redundant components
Components used so that a functioning computer can take over automatically the tasks of a similar component that fails.
sales force automation
Software that equips traveling salespeople with the electronic tools they need to be more productive.
scalability
Measure of how well computer hardware, software, or an information system can grow to meet increasing performance demands.
small and medium sized businesses
Business that is smaller in size than an enterprise and typically does not have an international presence.
storage area networks
High-speed network with the sole purpose of providing storage to other servers to which it is attached.
transaction processing system
Information system that captures and processes data from day-to-day business activities.
virtual private network
Network that provides a mobile user with a secure connection to a company network server, as if the user has a private line.
web services
Set of software technologies that allows businesses to create products and B2B (business-to-business) interactions over the Internet.
workflow
Defined process that identifies the specific set of steps involved in completing a particular project or business process.