|24-bit bitmap|A True Color graphic, which requires 24 bits for each pixel, used for photographic-quality images that can include any of 16.7 million colors.|437|
|3-D graphics|A type of digital graphics format that displays a three-dimensional image on a two-dimensional space.|449|
|3-D graphics software|The software used to create three-dimensional wireframe objects, then render them into images.|137|
|32-bit bitmap|A graphical image which requires 32 bits for each pixel.|437|
|AAC|(Advanced Audio Coding) A file format that provides highly compressed audio files with very little loss of sound quality and is promoted by Apple on its iTunes Web site.|424|
|AACS|(Advanced Access Content System) A digital rights management system that uses encryption to restrict access and copying content from optical media.|469|
|Abacus|A manual calculator that consists of beads mounted on sticks inside a frame with each bead representing a specific quantity.|486|
|Absolute reference|In a worksheet formula, cell references (usually preceded by a $ symbol) that cannot change as a result of a move or copy operation.|132|
|Acceptance testing|The final phase of testing for a new information system, in which the system's new owner determines whether the system performs as required.|586|
|Access control|Security measures that limit access to systems, such as databases.|655|
|Access time|The estimated time for a storage device to locate data on a disk, usually measured in milliseconds.|77|
|Accounting software|A category of software that includes accounting, money management, and tax preparation software.|142|
|ActiveX control|A set of commands and components that can be used by programmers to add interactive features to Web pages.|372|
|Actors|Object-oriented jargon for people who use an information system.|573|
|Ad hoc report|A customized report (also called a demand report) generated according to supplied specific information not available in scheduled reports.|561|
|Ad-blocking software|A type of software that prevents ads from appearing on your computer screen.|385|
|Ad-serving cookie|A cookie installed by a marketing firm to track user activities on Web sites containing their ads.|400|
|Ada|A high-level programming language developed by the U.S. Department of Defense and originally intended for military applications.|679|
|AES|(Advanced Encryption Standard) An encryption standard that uses three separate key sizes and is based on the Rijndael encryption algorithm.|285|
|Agile methodology|An approach to software development that produces programs in an incremental way allowing specification to evolve at each iteration.|681|
|AGP|(Accelerated Graphics Port) A type of interface, or slot, that provides a high-speed pathway for advanced graphics.|96|
|AIFF|(Audio Interchange File Format) An audio file format developed by Apple that is popular for cross-platform use.|424|
|Ajax|An approach to developing interactive Web sites that uses tools such as JavaScript and XML.|362|
|Algorithm|An abstract or general procedure for solving a problem, typically expressed as pseudocode, structured English, or a flowchart.|689|
|Alpha test|One of the first phases of software testing, usually conducted by the software publisher's in-house testing team.|504|
|ALU|(Arithmetic Logic Unit) The part of the CPU that performs arithmetic and logical operations on the numbers stored in its registers.|31|
|Always-on connection|In the context of Internet access, a permanent connection, as opposed to a connection that is established and dropped as needed.|307|
|Analog data|Data that is measured or represented on a continuously varying scale, such as a dimmer switch or a watch with a sweep second hand.|22|
|Analog hole|Any device or technique that allows digital content to be copied legally or illegally from an analog device.|464|
|Analog protection system|(APS) A DVD copy prevention technology developed by Macromedia that scrambles data copied to video tape.|468|
|Analysis phase|Tasks performed by the project team whose goal is to produce a list of requirements for a new or revised information system.|571|
|Analytical Engine|A mechanical calculator designed by Charles Babbage that included memory and a programmable processor, and is widely regarded as the most important ancestor to modern computer design.|488|
|Animated GIF|A type of GIF image that displays a sequence of frames to create the appearance of continuous motion.|448|
|Anonymizer tools|Software and/or hardware that cloaks the origination of an e-mail or Web page request.|10|
|Anonymous FTP|A type of FTP access that requires no account on a server, but rather can be accessed using "anonymous" as the user ID.|337|
|Anonymous proxy service|A server on the Internet that can be used to forward Web requests after cloaking the originating address for users who want to surf anonymously.|403|
|Antispyware|Software that blocks spyware from entering a computer.|402|
|Antivirus software|A computer program used to scan a computer's memory and disks to identify, isolate, and eliminate viruses.|167|
|API|(Application Program[ming] Interface) A set of application programs or operating system functions that can be utilized by a program.|687|
|APL|The acronym for A Programming Language, a high-level scientific programming language used to manipulate tables of numbers.|679|
|Apple I|An unassembled computer kit released in 1976 by Apple Computer Corp. for computer hobbyists.|495|
|Apple II|A complete microcomputer system, developed by Apple Computer Corp., introduced in 1978 that helped broaden the personal computer market beyond hobbyists.|495|
|Apple Lisa|A personal computer system, developed and manufactured by Apple Computer Corp., that featured one of the first graphical user interfaces.|495|
|Apple Macintosh|First released in 1984, it was one of the first commercially successful personal computers sold with graphical user interface software.|496|
|Application development tool|Software, such as 4GLs, expert system shells, and component objects, that can be assembled into the applications software for an information system.|578|
|Application server|A computer on a network that is dedicated to running applications and delivering applications to client computers.|249|
|Application software|Computer programs that help you perform a specific task such as word processing. Also called application programs, applications, or programs.|16|
|Application specifications|A detailed description of the way that the software for an information system should interface with the user, store data, process data, and format reports.|581|
|Application testing|The process of testing newly developed application software by running unit tests, integration tests, and system tests.|584|
|Argument|In the context of Prolog programming, an argument describes a predicate and is enclosed in parentheses in a Prolog fact.|714|
|ASCII|(American Standard Code for Information Interchange) A code that represents characters as a series of 1s and 0s. Most computers use ASCII code to represent text, making it possible to transfer data between computers.|24|
|ASF|(Advanced Systems Format) Microsoft's proprietary container format for streaming digital multimedia; typically holds WMV and WMA files.|457|
|Assembly language|A low-level computer programming language that uses simple commands and is translated into machine language by an assembler.|677|
|Assumption|In the context of programming, a condition that you accept to be true, which often places limits on the scope of the programming problem.|680|
|Asymmetric Internet connection|Any connection to the Internet in which the upstream speed differs from the downstream speed.|311|
|ATA|(Analog Telephone Adapter) A device used with VoIP systems to convert analog voice signals from a standard telephone into digital data.|332|
|Atanasoff-Berry Computer|(ABC) An early electronic computer prototype that incorporated the use of vacuum tubes for data processing instead of mechanical switches.|489|
|Atom|A syndicated data feed technology for the Web similar to RSS.|360|
|Attack tree|A hierarchical diagram of potential threats to a system used as one tool in creating more secure software.|726|
|Audio compression|Techniques used to reduce the size of files that contain audio data.|423|
|Audio editing software|A program that enables users to create and edit digital voice and music recordings.|139|
|Audio encoding software|A computer program designed to convert sound files into a digital sound format, such as MP3 or AAC.|139|
|Authentication protocol|Passwords, user IDs, and biometric measures used to verify a person's identity.|34|
|Authorization and revocation|A component of digital rights management that can be used to disable compromised players.|469|
|Automatic recalculation|A feature found in spreadsheet software that automatically recalculates every formula after a user makes a change to any cell.|132|
|AVI|(Audio Video Interleave) A video file format, developed by Microsoft, that was once the most common format for desktop video on the PC.|457|
|B2B|(Business-to-Business) An e-commerce exchange of products, services, or information between businesses.|384|
|B2C|(Business-to-Consumer) An e-commerce exchange of products, services, or information between businesses and consumers.|384|
|B2G|(Business-to-Government) An e-commerce exchange of products, services, or information between businesses and governments.|384|
|Backup|A duplicate copy of a file, disk, or tape. Also refers to a Windows utility that allows you to create and restore backups.|222|
|Backup software|A set of utility programs that performs a variety of backup related tasks, such as helping users select files for backup, copying, and restoring files.|227|
|Backward compatibility|The ability to work with products designed for prior generations of the product.|198|
|Bandwidth|The data transmission capacity of a communications channel. Digital signals are measured in bits per second, analog signals in Hertz.|251|
|Banner ad|A type of advertisement typically embedded at the top of a Web page.|385|
|Bare-metal restore|A process by which a backup is restored to a hard disk without first reinstalling the operating system and device drivers.|230|
|BASIC|(Beginners All-purpose Symbolic Instruction Code) A simple high-level programming language that was popularized by Microsoft in the 1970s.|679|
|Batch processing|A processing system that involves holding a group of transactions for processing until the end of a specified period of time.|560|
|BD-R|(Blu-ray disc recordable) A Blu-ray disc that can be recorded on one time.|83|
|BD-RE|(Blu-ray disc rerecordable) A Blu-ray disc that can be recorded on multiple times.|83|
|BD-ROM|(Blu-ray Read-Only Memory) A Blu-ray disc that cannot be modified; usually used to distribute movies.|83|
|Benchmarks|A set of tests used to measure computer hardware or software performance.|69|
|Beta test|A testing phase near the end of the software development process in which a software product is tested in real-world computer environments, often by end users.|504|
|BI|(Business Intelligence) An integrated set of technologies and procedures used to collect and analyze data pertaining to sales, production, and other internal operations of a business in order to make better business decisions.|569|
|Binary number system|A method for representing numbers using only two digits: 0 and 1. Contrast to the decimal number system, which uses ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9.|23|
|Biometrics|The use of physical attributes, such as a fingerprint, to verify a person's identity.|34|
|Bit|The smallest unit of information handled by a computer. A bit is one of two values, either a 0 or a 1. Eight bits comprise a byte, which can represent a letter or number.|23|
|Bitmap graphic|An image, such as a digital photo, that is stored as a grid work of colored dots.|430|
|Bitrate|A ratio such as 5:1 that indicates the ratio of compression that has been applied to a file. High compression ratios such as 35:1 indicate more compression so data can be contained in smaller files.|458|
|BitTorrent|A peer-to-peer technology in which pieces of files are distributed to and from a collection of networked computers; used for distributing music and movies over the Internet.|338|
|Black screen of death|An error condition in which a PC "freezes" and displays a black screen (blue screen prior to Windows Vista); usually turning the computer off and turning it on again clears the error.|103|
|Blended threat|A combination of more than one type of malicious program.|162|
|BLOB|(Binary Large OBject) A collection of binary data, such as a graphic or audio clip, that is stored in a single field of a database.|635|
|Blogs|(WeB LOG) A publicly-accessible personal journal posted on the Web. Blogs often reflect the personality of the author and are typically updated daily.|6|
|Blu-ray|A high-capacity storage technology that stores up to 25 GB per layer on Blu-ray discs (BDs).|81|
|Bluetooth|A wireless technology used in conjunction with standard Ethernet networks that allows data transfer rates between 200 and 700 Kbps up to a maximum range of 35 feet.|267|
|BMP|The native bitmap graphic file format of the Microsoft Windows OS.|442|
|Boolean operator|A logical search operator such as AND, OR, and NOT that helps form complex queries.|379|
|Boot disk|A floppy disk or CD that contains the files needed for the boot process.|229|
|Boot process|The sequence of events that occurs within a computer system between the time the user starts the computer and the time it is ready to process commands.|192|
|Bootstrap program|A program stored in ROM that loads and initializes the operating system on a computer.|192|
|Bot|An intelligent agent that autonomously executes commands behind the scenes. Sometimes used to refer to a remote access Trojan horse that infects computers.|164|
|Botnet|A group of bots under the remote control of a botmaster, used to distribute spam and denial of service attacks.|164|
|BPR|(Business Process Redesign) A technique for improving a business by making radical changes to existing business procedures or organizational structure.|569|
|Break reminder software|Software designed to signal users when it is time to take a break in order to avoid various repetitive-use and stress injuries.|541|
|Bridge|A device that connects two similar networks by simply transferring data without regard to the network format.|250|
|Broadband|A term used to refer to communications channels that have high bandwidth.|251|
|Broadcast flag|A status flag inserted into the data stream of digital television to indicate whether it can be copied.|465|
|Brute force attack|A method of breaking encryption code by trying all possible encryption keys.|37|
|BSD license|(Berkeley Software Distribution) An open source software license patterned on a license originally used by the University of California.|150|
|Buffer overflow|A condition that can be exploited by hackers in which data overflows its intended memory space to affect other variables.|723|
|Bulletin boards|One of the original communications and social network technologies used on the Internet.|6|
|Bus topology|A network arranged on a common backbone that connects all the network devices. If the backbone fails the network becomes unusable.|250|
|Business|An organization that seeks profit by providing goods and services.|556|
|Button|An on-screen graphical control that can be clicked to initiate an action or command.|190|
|Byte|An 8-bit unit of data that represents a single character.|26|
|C|A compiled procedural language that provides both high-level commands and low-level access to hardware.|679|
|C#|A derivative of C++ programming language developed by Microsoft.|679|
|C++|An object-oriented version of the C programming language.|679|
|C2C|(Consumer-to-Consumer) An e-commerce exchange of products, services, or information between consumers; for example online auctions.|384|
|Cable Internet service|A type of Internet connection offered to subscribers by cable television companies.|316|
|Cable modem|A communications device that can be used to connect a computer to the Internet via the cable TV infrastructure.|317|
|Cache|Special high-speed memory that gives the CPU rapid access to data that would otherwise be accessed from disk. Also called RAM cache or cache memory.|68|
|CAD software|(Computer-Aided Design software) A program designed to draw 3-D graphics for architecture and engineering tasks.|138|
|Capacitors|Electronic circuit components that store an electrical charge; in RAM, a charged capacitor represents an "on" bit, and a discharged one represents an "off" bit.|72|
|Card reader|A device that can be used to read and record data on solid stage storage devices, such as flash memory cards.|84|
|Cardinality|A description of the numeric relationship (one-to-one, one-to-many, or many-to-many) that exists between two record types.|616|
|Case sensitive|A condition in which uppercase letters are not equivalent to their lowercase counterparts.|35|
|Case sensitive database|A database in which uppercase letters are not equivalent to their lowercase counterparts.|636|
|CASE tool|(Computer-Aided Software Engineering) Software that is used to summarize system requirements, diagram current and proposed information systems, schedule development tasks, prepare documentation, and develop computer programs.|574|
|CD|(Compact Disc) An optical storage medium used to store digital information. CD-ROMs are read only. CD-R and CD-RWs can be used to record data.|81|
|CD ripper software|Software that converts the music on an audio CD to a WAV file.|139|
|CD-DA|(Compact Disc Digital Audio) The format for commercial music CDs, typically recorded by the manufacturer.|82|
|CD-R|(Compact Disc Recordable) CD-R is a type of optical disc technology that allows the user to record data once on a disc.|83|
|CD-ROM|(Compact Disc Read-Only Memory) The read-only data format that is stamped onto a CD, usually by the manufacturer.|83|
|CD-RW|(Compact Disc ReWritable) CD-RW is a type of optical disc technology that allows the user to write data onto a CD, then change that data much like on a floppy or hard disk.|83|
|Cell|In spreadsheet terminology, the intersection of a column and a row. In cellular communications, a limited geographical area surrounding a cellular phone tower.|130|
|Cell references|The column letter and row number that designate the location of a worksheet cell. For example, the cell reference C5 refers to a cell in column C, row 5.|131|
|Central processing unit|(CPU)The main processing circuitry within a computer or chip that contains the ALU, control unit, and registers.|15|
|Centralized processing|An information system design in which data is processed on a centrally located computer, usually a mainframe.|577|
|Certificates of completion|A certification offered to students who successfully complete one or more courses on a specific topic.|515|
|Certification exam|An objective test that verifies your level of knowledge about a particular technology or subject.|516|
|Change requests|A formal, written request to add, delete, or change the features of an information system.|582|
|Channel conflict|A situation in which computer vendors, from retail, wholesale, or mail-order channels, compete for customers.|508|
|Character data|Letters, symbols, or numerals that will not be used in arithmetic operations (name, social security number, etc.).|24|
|Chat|Interactive real-time person-to-person communication over a network.|330|
|Chat groups|A discussion in which a group of people communicates online simultaneously.|6|
|Chief information officer|(CIO) The highest-ranking executive responsible for information systems.|510|
|Chipmakers|Companies that design and manufacture computer chips used in a wide variety of computer related applications.|498|
|Ciphertext|An encrypted message.|285|
|Circuit switching|The method used by the telephone network to temporarily connect one telephone with another for the duration of a call.|253|
|CISC|(Complex Instruction Set Computer) A general-purpose microprocessor chip designed to handle a wider array of instructions than a RISC chip.|69|
|Class|In object-oriented terminology, a group with specific characteristics to which an object belongs.|702|
|Class attribute|In the context of object-oriented programming, a class attribute defines a characteristic for the members of a class. Similar to a field in a database.|703|
|Class diagram|A diagram that provides the name of each object, a list of the object's attributes, a list of methods, and an indication of the cardinality between objects.|573|
|Class hierarchy|Like a hierarchical diagram, a class hierarchy is a set of related superclasses and subclasses defined within the object-oriented paradigm.|704|
|Click-through rate|The number of times Web site visitors click an ad to connect to an advertiser's site.|385|
|Client|A computer or software that requests information from another computer or server.|18|
|Client-side script|Scripting statements embedded in an HTML document that are executed by a client's browser.|372|
|Client/server mode|A network where processing is split between workstations (clients) and the server.|249|
|Clip art|Graphics designed to be inserted into documents, Web pages, and worksheets, usually available in CD-ROM or Web-based collections.|129|
|Cloud computing|A grid of servers and storage devices harnessed together to offer Inernet-accessible computing services.|335|
|Cluster|(1) A group of sectors on a storage medium that, when accessed as a group, speeds up data access. (2) A group of two or more devices connected together to share processing, storage, input, or output tasks.|219|
|COBOL|(COmmon Business-Oriented Language) A high-level programming language used for transaction processing on mainframe computers.|679|
|Code|In the context of computer programming, code can be used as a noun to refer to the set of instructions that form a program, or as a verb that refers to the process of writing a program.|674|
|Code of ethics|A set of guidelines designed to help professionals make on-the-job ethical decisions.|530|
|Codec|Short for COmpressor/DECompressor, a hardware or software routine that compresses and decompresses digital graphics, sound, and video files.|458|
|Color depth|The number of bits that determines the range of possible colors that can be assigned to each pixel. For example, an 8-bit color depth can create 256 colors.|91|
|Color palette|The selection of colors used in a graphic.|437|
|COLOSSUS|An early electronic computer prototype that used binary data representation and was used during WWII to decode messages encrypted by ENIGMA.|490|
|Command-line interface|A style of user interface which requires users to type commands, rather than use a mouse to manipulate on-screen controls.|189|
|Commercial software|Copyrighted computer applications sold to consumers for profit.|149|
|Commit or rollback strategy|A procedure in transaction proceessing systems that will nullify, or rollback, a transaction if all the steps cannot be finalized, or committed to.|560|
|Communications channel|Any pathway between the sender and receiver; channel may refer to a physical medium or a frequency.|251|
|Communications protocol|A set of rules that ensures the orderly and accurate transmission and reception of data.|252|
|Compiler|Software that translates a program written in a high-level language into low-level instructions before the program is executed.|30|
|Component|Prewritten objects or modules that programmers can customize and add to their own programs.|687|
|Compression ratio|A ratio such as 5:1 that indicates the ratio of compression that has been applied to a file. High compression ratios such as 35:1 indicate more compression so data can be contained in smaller files.|458|
|Compute-intensive|Refers to any task, problem, or product that is able to handle massive amounts of data and complex mathematical calculations.|19|
|Computed field|A calculation that a DBMS performs during processing and then temporarily stores in a memory location.|635|
|Computer|A device that accepts input, processes data, stores data, and produces output according to a stored program.|14|
|Computer engineer|A computer professional who focuses on the design and development of computer hardware and peripheral devices.|512|
|Computer engineering|A career that focuses on the design and development of computer hardware and peripheral devices.|514|
|Computer industry|The corporations and individuals that supply computer-related goods and services to individuals and organizations.|497|
|Computer network|A collection of computers and related devices, connected in a way that allows them to share data, hardware, and software.|7|
|Computer operator|A computer professional who works directly with and maintains mainframe computers.|511|
|Computer professional|Any person whose primary occupation involves one or more aspects of computer technology.|510|
|Computer program|A detailed set of instructions that tells a computer how to solve a problem or carry out a task.|15|
|Computer programmer|A person who designs, codes, and tests computer programs.|511|
|Computer programming|The process of designing, coding, and testing computer programs.|675|
|Computer retail store|A store that typically sells several brands of computers from a store-front location, such as a mall or shopping center.|506|
|Computer retailers|Also called resellers, companies that sell computer-related products.|498|
|Computer salesperson|A computer professional who sells computers and computer-related products. Also called a sales rep.|512|
|Computer science|A career field that focuses on developing fast and efficient computers from their construction to their programming and operating systems.|514|
|Computer virus|A program designed to attach itself to a file, reproduce, and spread from one file to another, destroying data, displaying an irritating message, or otherwise disrupting computer operations.|163|
|Computer worm|A software program designed to enter a computer system, usually a network, through security "holes" and then replicate itself.|163|
|Computer-aided music software|Software used to generate unique musical compositions with a simplified set of tools, such as tempo, key, and style.|139|
|Concurrent-use license|Legal permission for an organization to use a certain number of copies of a software program at the same time.|147|
|Confidentiality|The obligation not to disclose willingly any information obtained in confidence.|526|
|Constant|In the context of programming, a constant represents an unchanging value. In contrast, the data held in a variable can change.|680|
|Container formats|File formats, typically for storing sound and video, that contain one or more types of data that is compressed using standard codecs.|457|
|Contract worker|A computer professional who does not work directly for one company and often is paid by the job instead of a salary.|513|
|Control|In the context of graphical user interfaces, a control is a screen-based object whose behavior can be specified by a programmer.|683|
|Control structures|Instructions that specify the sequence in which a program is to be executed: sequence, selection, and repetition controls.|695|
|Control unit|The part of the microprocessor that directs and coordinates processing.|31|
|Convergence|In the context of technology, the melding of digital devices into a single platform that handles a diverse array of digital content, such as cell phones which also play digital music and display digital video.|8|
|Cookie|A message sent from a Web server to a browser and stored on a user's hard disk, usually containing information about the user.|367|
|Copy generation management|A digital rights management technology that controls the number of times that a CD, DVD, or tape can be recopied.|467|
|Copy protection|Any digital rights management technology designed to prevent duplication of digital content; also referred to as copy prevention or copy restriction.|466|
|Copyright|A form of legal protection that grants certain exclusive rights to the author of a program or the owner of the copyright.|146|
|Copyright notice|A line such as "Copyright 2007 by ACME CO" that identifies a copyright holder.|147|
|CPL|(Combined Programming Language) A programming language developed in the 1960s for scientific and commercial applications.|679|
|CPU|(Central Processing Unit) The main processing circuitry within a computer or chip that contains the ALU, control unit, and registers.|15|
|CRM|(Customer Relationship Management) A technique for increasing profitability by improving the relationship between a company and its customers.|569|
|Cropping|The process of selecting and removing part of an image.|435|
|CRT|(Cathode Ray Tube) A display technology that uses a large vacuum tube, similar to that used in television sets.|90|
|Cryptographic algorithm|A specific procedure for encrypting and decrypting data.|285|
|Cryptographic key|A specific word, number, or phrase that must be used to encrypt or decrypt data.|285|
|CSMA/CD|(Carrier Sense Multiple Access with Collision Detection) A method of responding to an attempt by two devices to use a data channel simultaneously. Used by Ethernet networks.|259|
|CSS|(1) (Content Scramble System) A DRM technology designed to prevent unauthorized duplication of DVDs. (2) (Cascading Style Sheets) A Web technology for specifying Web page styles.|468|
|Cyberspace|A term coined by William Gibson and now used to refer to information and other resources offered in virtual "worlds" based on computer networks and the Internet.|7|
|Data|In the context of computing and data management, data refers to the symbols that a computer uses to represent facts and ideas.|15|
|Data bus|An electronic pathway or circuit that connects the electronic components (such as the processor and RAM) on a computer's motherboard.|95|
|Data center|A specialized facility designed to house and protect computer systems and data.|592|
|Data dependence|The undesirable situation in which data and program modules become so interrelated that modifications become difficult.|624|
|Data flow|On a DFD, a line with an arrow on the end, which indicates the direction in which data flows.|572|
|Data flow diagram|(DFD) A diagram that illustrates how data moves through an information system.|572|
|Data fork|An element of the Macintosh file system that comprises the part of the file that contains the text, audio, or video data; contrast with resource fork.|200|
|Data independence|The separation of data from the programs that manipulate the data.|624|
|Data mining|Analyzing data to discover patterns and relationships that are important to decision making.|612|
|Data redundancy|Repetition of data within a database.|637|
|Data representation|The use of electronic signals, marks, or binary digits to represent character, numeric, visual, or audio data.|22|
|Data store|A filing cabinet, disk, or tape that holds data. On a DFD, usually represented by an open-ended rectangle.|572|
|Data transfer rate|The amount of data that a storage device can move from a storage medium to computer memory in one time unit, such as one second.|77|
|Data type|The characteristics of data that can be entered into a field in a data file; data types include character, numeric, date, logical, and memo.|634|
|Data view|A mechanism typically applied to databases in which different forms or reports are displayed depending on a query, and can be customized for different categories of users.|655|
|Data warehouse|A collection of information organized for analysis.|612|
|Database|A collection of information that might be stored in more than one file or in more than one record type.|134, 610|
|Database administrator|A person who supervises database design, development, testing, and maintenance.|511|
|Database audit|A procedure that monitors or records user activity within a database, often for security purposes.|656|
|Database client software|Software that allows any remote computer or network workstation to access data in a database.|626|
|Database index|A file of keys and pointers used to display a list of database records organized according to the data in one or more fields.|639|
|Database model|The underlying structure or category of a database, such as relational, hierarchical, network, or object.|614|
|Database server software|Software that is designed to manage a large number of records and perform many simultaneous transactions.|626|
|Database software|Software designed for entering, finding, organizing, updating, and reporting information stored in a database.|134|
|Database structure|The arrangement of the fields, tables, and relationships in a database.|633|
|Date data type|A data type that indicates that the data in a field represents a date.|634|
|DBMS|(DataBase Management System) Application software that assists the user in manipulating, storing, and maintaining database files.|625|
|Debugger|A programming utility that helps programmers test and correct a computer program.|685|
|DEC PDP-8|Built by Digital Equipment Corp. and introduced in 1965, the PDP-8 is the first commercially successful minicomputer.|493|
|Decision model|A numerical representation of a realistic situation, such as a cash flow model of a business.|562|
|Decision query|A question or set of instructions that describes the data that needs to be gathered to make a decision.|562|
|Decision support system|(DSS) A computer system that allows decision makers to manipulate data directly, to incorporate data from external sources, and to create data models or "what-if" scenarios.|562|
|Decision support worksheet|A comparison table used by a project team to evaluate solutions by assigning a score and a weight to each criterion.|579|
|Decision table|A tabular method for listing rules and specifying the outcomes for various combinations of rules.|714|
|Declarative paradigm|An approach to the programming process in which a programmer writes a program by specifying a set of statements and rules that define the conditions for solving a problem.|713|
|de Colmar's Arithmometer|The first commercially successful, mass-produced mechanical calculator.|487|
|Decryption|The process of converting ciphertext into plaintext.|285|
|DeCSS|A program that defeats the CSS copy protection and allows users to copy DVDs.|468|
|Defensive programming|An approach to programming that attempts to identify possible threats and proactively create code to avoid them.|726|
|Defragmentation utility|A software tool used to rearrange the files on a disk so that they are stored in contiguous clusters.|221|
|DELETE|An SQL keyword that removes a record from a table.|646|
|Demoware|Commercial software that is distributed free, but expires after a certain time limit and then requires users to pay to continue using it.|149|
|Design phase|The process a project team uses for figuring out how to implement a new system. This phase is undertaken after the analysis phase is complete.|576|
|Desktop|A term used to refer to the main screen of a graphical user interface that can hold objects such as folders and widgets.|189|
|Desktop computer|A computer that is small enough to fit on a desk and built around a single microprocessor chip.|58|
|Desktop operating system|An operating system specifically designed for use on personal computers, such as Windows Vista or Mac OS X.|188|
|Desktop publishing software|(DTP) Software used to create high-quality output suitable for commercial printing. DTP software provides precise control over layout.|125|
|Desktop video|Videos stored in digital format on a PC's hard disk or CD.|452|
|Desktop widget|An interactive program that is represented on the desktop by an information-rich graphic, such as a clock or graph.|123|
|Detail reports|Organized lists generated by a management information system (for example, an inventory list).|560|
|Device driver|A type of system software that provides the computer with the means to control a peripheral device.|124|
|DHCP|(Dynamic Host Configuration Protocol) A set of rules that allow network client computers to find and use the Internet address that corresponds to a domain name.|255|
|DHTML|(Dynamic HTML) A collection of technologies such as HTML and JavaScript used to create animated and interactive Web pages.|362|
|Dial-up connection|A connection that uses a phone line to establish a temporary Internet connection.|312|
|Dialog box|An element of graphical user interfaces that appears in a window and requests information, such as command parameters, from a user.|191|
|Dictionary attack|A method of discovering a password by trying every word in an electronic dictionary.|36|
|Difference Engine|A mechanical calculator design created by Charles Babbage that was to use steam power for fully automatic operation. It was never built.|488|
|Differential backup|A copy of all the files that changed since the last full backup of a disk.|227|
|Digital audio|Music or voice that has been digitized into files using sampling techniques; sometimes referred to as waveform audio.|422|
|Digital camera|A camera that takes and stores a digital image instead of recording onto film.|431|
|Digital certificate|A security method that identifies the author of an ActiveX control. A computer programmer can "sign" a digital certificate after being approved.|373|
|Digital content|A term popularized in the content of multimedia that refers to digital music, video, text, and images.|464|
|Digital data|Text, numbers, graphics, or sound represented by discrete digits, such as 1s and 0s.|22|
|Digital divide|A gap between those who have access to digital technologies and those who do not.|12|
|Digital revolution|A set of significant changes brought about by computers and other digital devices during the second half of the 20th Century.|4|
|Digital rights management|(DRM) A set of techniques and technologies designed to discourage and prevent unauthorized duplication of digital content.|464|
|Digital signal processor|Circuitry that is used to process, record, and playback audio files.|424|
|Digital video|A series of still frames stored sequentially in digital format by assigning values to each pixel in a frame.|452|
|Digital video recorder|(DVR) A time-shifting device, such as a TiVo, that captures television and cable TV programs then stores them on a built-in hard disk for later viewing.|455|
|Digital watermark|A digital rights management technology that inserts a hidden signal into multimedia content as an identifying marker that can be tracked or verified.|465|
|Digitization|To convert non-digital information or media to a digital format through the use of a scanner, sampler, or other input device.|7|
|Digitizing tablet|A device that provides a flat surface for a paper-based drawing and a "pen" used to create hand-drawn vector drawings.|446|
|Dimensional database|A database often created for data analysis that has a more complex structure than a simple two-dimensional table.|619|
|Direct conversion|The simultaneous deactivation of an old computer system and activation of a new one.|586|
|Directory|In the context of computer file management, a list of files contained on a computer storage device.|206|
|Disaster recovery plan|A step-by-step plan that describes the methods used to secure equipment and data against disasters, and how to recover from disasters.|593|
|Disk image|A bit-by-bit copy of the contents of a disk created for backup, archiving, or duplication of data.|230|
|Disk mastering|The process of creating a CD or DVD by selecting all the files to be copied and then writing them in a single session. Contrast with packet writing.|219|
|Disk partition|An area of a hard disk created by dividing a large hard disk into several smaller virtual ones, such as when using two operating systems on a single computer.|205|
|Distributed database|A database that is stored on different computers, on different networks, or in different locations.|626|
|Distributed processing|An information system design in which data is processed on multiple workstations or servers.|577|
|Distribution media|One or more floppy disks, CDs, or DVDs that contain programs and data, which can be installed on a hard disk.|146|
|DOCSIS|(Data Over Cable Service Interface Specification) A security technology used for filtering packets and maintaining customer privacy on cable Internet services.|317|
|Document production software|Computer programs that assist the user in composing, editing, designing, and printing documents.|125|
|Domain name|Short for "fully qualified domain name"; an identifying name by which host computers on the Internet are familiarly known (for example, "coca-cola.com").|307|
|Domain name server|A computer that hosts the domain name system database.|308|
|Domain Name System|(DNS) A large database of unique IP addresses that correspond with domain names.|308|
|DOS|(Disk Operating System) The operating system software shipped with the first IBM PCs, then used on millions of computers until the introduction of Microsoft Windows.|202|
|Dot matrix printer|A printer that creates characters and graphics by striking an inked ribbon with small wires called "pins," generating a fine pattern of dots.|92|
|Dot pitch|(dp) The diagonal distance between colored dots on a display screen. Measured in millimeters, dot pitch helps to determine the quality of an image displayed on a monitor.|90|
|Double layer DVD|A DVD that essentially stacks data in two different layers on the disk surface to store 8.5 GB, twice the capacity of a standard DVD.|81|
|Download|The process of transferring a copy of a file from a remote computer to a local computer's storage device.|8|
|Downstream speed|The rate at which transmitted data flows from a host or server to a local computer (contrast with upstream speed).|311|
|Drawing software|Programs that are used to create vector graphics with lines, shapes, and colors, such as logos or diagrams.|137, 446|
|Drive bays|Areas within a computer system unit that can accommodate additional storage devices.|86|
|Drive mapping|A process of assigning a drive letter to a storage device located on a different network workstation.|276|
|DRM individualization|A digital rights management concept that ties access to digital content to individual subscribers, whose access can be tracked, if necessary.|470|
|DSL|(Digital Subscriber Line) A high-speed Internet connection that uses existing telephone lines, requiring close proximity to a switching station.|314|
|DSL filters|Devices that are commonly used to prevent interference from analog devices, such as telephones, that use the same line as DSL devices.|315|
|DSL modem|A device that sends and receives digital data to and from computers over telephone lines.|315|
|Dual boot|A computer that contains more than one operating system and can boot into either one.|199|
|Dual-channel architecture|The use of two channels to quickly transport data between RAM and the processor.|73|
|Duplex printer|A printer that prints on both sides of the paper in a single pass.|93|
|Duty cycle|A measurement of how many pages a printer is able to produce per day or month.|93|
|DVD|(Digital Video Disc or Digital Versatile Disk) An optical storage medium similar in appearance and technology to a CD but with higher storage capacity.|81|
|DVD authoring software|Computer programs that offer tools for creating DVD menus and transferring digital video onto DVDs that can be played in a computer or standalone DVD player.|140|
|DVD image|A series of files containing the data needed for a video DVD. The image is typically stored on a hard disk for testing before the image is transferred or "burned" to the DVD.|462|
|DVD+R|(Digital Versatile Disk Recordable) A DVD data format that, similar to CD-R, allows recording data but not changing data on a DVD.|83|
|DVD+RW|(Digital Versatile Disk ReWritable) A DVD technology that allows recording and changing data on DVDs.|83|
|DVD-R|(Digital Versatile Disk Recordable) A DVD data format that, similar to CD-R, allows writing data but not changing data on a DVD.|83|
|DVD-ROM|A DVD disk that contains data that has been permanently stamped on the disk surface.|83|
|DVD-RW|A DVD technology similar to DVD+RW that allows recording and changing data on DVDs.|83|
|DVD-video|A DVD format used for commercial movies shipped on DVDs.|82, 452|
|Dynamic IP address|A temporarily assigned IP address usually provided by an ISP.|306|
|Dynamic Web publishing|A way of displaying data from a database as customized Web pages, which are generated as the page is sent to the browser.|628|
|E-commerce|Short for electronic commerce, it is the business of buying and selling products online.|384|
|E-mail|Messages that are transmitted between computers over a communications network. Short for electronic mail.|6|
|E-mail account|A service that provides users with an e-mail address and a mailbox.|392|
|E-mail attachment|A separate file that is transmitted along with an e-mail message.|393|
|E-mail authentication|A technology designed to defeat spam by checking to make sure that messages originate from valid addresses.|403|
|E-mail client software|Software that is installed on a client computer and has access to e-mail servers on a network. This software is used to compose, send, and read e-mail messages.|398|
|E-mail message|A computer file containing a letter or memo that is transmitted electronically via a communications network.|392|
|E-mail servers|A computer that uses special software to store and send e-mail messages over the Internet.|397|
|E-mail system|The collection of computers and software that works together to provide e-mail services.|397|
|EAI|(Enterprise Application Integration) The use of networked software and databases for providing unrestricted sharing of data in an organization.|569|
|Ear training software|Software used by musicians to develop tuning skills, recognize keys, and develop musical skills.|139|
|EBCDIC|(Extended Binary-Coded Decimal Interchange Code) A method by which digital computers, usually mainframes, represent character data.|25|
|EDGE|(Enhanced Data Rates for GSM Evolution) A cell phone technology that offers faster data transport than basic GSM service.|327|
|EDI|(Electronic Data Interchange) The ability to transfer data between different companies using networks which enable companies to buy, sell, and trade information.|569|
|Educational software|Software used to develop and practice skills.|140|
|EEPROM|(Electrically Erasable Programmable Read-Only Memory) A type of non-volatile storage typically used in personal computers to store boot and BIOS data.|74|
|Eiffel|An object-oriented programming language with syntax similar to C.|679|
|Electronic wallet|Software that stores personal information used during e-commerce transactions.|390|
|Encapsulation|An object-oriented technique in which the internal details of an object are "hidden" in order to simplify their use and reuse.|712|
|Encryption|The process of scrambling or hiding information so that it cannot be understood without the key necessary to change it back into its original form.|285|
|ENIAC|(Electronic Numerical Integrator and Computer) An early electronic computer prototype that was designed for the U.S. Army for calculating trajectories and was completed in 1945.|490|
|Enterprise information system|The use of one or more information systems that share data and typically provide information to hundreds or thousands of users who may be located in diverse locations.|559|
|Entity-relationship diagram|(ERD) A diagram that graphically depicts relationships between record types.|616|
|Equipment manufacturers|Companies that design and manufacture computer hardware and communication products.|498|
|Ergonomics|The science of designing safe, comfortable, efficient machines and tools for human use.|537|
|ERP|(Enterprise Resource Planning) A system of business management that integrates all resources of a business, including planning, manufacturing, sales, and marketing.|569|
|Ethernet|A type of network in which network nodes are connected by coaxial cable or twisted-pair wire; the most popular network architecture, it typically transmits data at 10 or 100 megabits per second.|258|
|Ethernet adapter|A type of network interface card designed to support Ethernet protocols.|261|
|EULA|(End User License Agreement) A type of software license that appears on the computer screen when software is being installed and prompts the user to accept or decline.|148|
|EV-DO|(Evolution-Data Optimized) A technology used by cell phone companies to offer faster data transport than basic CDMA service.|327|
|Event|In the context of programming, an action or change in state, such as a mouse click, that requires a response from the computer.|684|
|Event-driven paradigm|An approach to programming in which a programmer creates programs that continually check for, and respond to, program events, such as mouse clicks.|685|
|Event-handling code|The program segment that instructs the computer how to react to events, such as mouse clicks.|684|
|Exception report|A report generated by a management information system, listing information that is outside normal or acceptable ranges, such as a reorder report showing low-stock inventory items.|561|
|Executable file|A file, usually with an .exe extension, containing instructions that tell a computer how to perform a specific task.|152|
|Executive dashboard software|Software designed for managers that typically uses widgets to graphically display statistics relevant to business decisions.|613|
|Executive information system|(EIS) A special type of a decision support system that is designed to provide senior managers with information relevant to strategic management activities.|562|
|Expansion bus|The segment of the data bus that transports data between RAM and peripheral devices.|95|
|Expansion card|A circuit board that is plugged into a slot on a computer motherboard to add extra functions, devices, or ports.|95|
|Expansion port|A socket into which the user plugs a cable from a peripheral device, allowing data to pass between the computer and the peripheral device.|96|
|Expansion slot|A socket or "slot" on a PC motherboard designed to hold a circuit board called an expansion card.|95|
|Expert system|A computer system incorporating knowledge from human experts, and designed to analyze data and produce a recommendation or decision (also called knowledge-based system).|564|
|Expert system shell|A software tool used for developing expert system applications.|564|
|Extended ASCII|Similar to ASCII but with 8-bit character representation instead of 7-bit, allowing for an additional 128 characters.|24|
|External entity|A person, organization, or device that exists outside an information system, but provides it with input or receives output. On a DFD, usually represented by a square.|572|
|External information|Information obtained by organizations from outside sources.|559|
|Fact|In the context of Prolog programming, a fact is a statement incorporated into a program that provides basic information for solving a problem.|713|
|FairPlay|A digital rights management technology used to protect content distributed at the iPod store.|470|
|Fast Ethernet|A type of Ethernet that operates at 100 Mbps.|259|
|FAT32|A file system used by Microsoft Windows 95, 98, and Me operating systems to keep track of the name and location of files on a hard disk.|219|
|Feature creep|An undesirable occurrence during information system development when users, customers, or designers attempt to add features after the final specifications have been approved.|582|
|Field|The smallest meaningful unit of information contained in a data file.|134, 615|
|Field format|A specification for the way that data is displayed on the screen and printouts, usually using a series of Xs to indicate characters and 9s to indicate numbers.|636|
|Field name|A name that identifies the contents of a field.|615|
|Field validation rule|A specification that a database designer sets up to filter the data entered into a particular field.|636|
|Fifth-generation languages|Either declarative languages, such as Prolog, or programming languages that allow programmers to use graphical or visual tools to construct programs.|678|
|File|A named collection of data (such as a computer program, document, or graphic) that exists on a storage medium, such as a hard disk or CD.|15|
|File Allocation Table|(FAT) A special file that is used by some operating systems to store the physical location of all the files on a storage medium, such as a hard disk or floppy disk.|219|
|File compression utility|A type of data compression software that shrinks one or more files into a single file occupying less storage space than the files did separately.|440|
|File date|The date that a file was created or last modified.|206|
|File extension|A set of letters and/or numbers added to the end of a file name that helps to identify the file contents or file type.|204|
|File format|The method of organization used to encode and store data in a computer. Text formats include DOC and TXT. Graphics formats include BMP, TIFF, GIF, and PCX.|207|
|File header|Hidden information inserted at the beginning of a file to identify its properties, such as the software that can open it.|207|
|File management utilities|Software, such as Windows Explorer, that helps users locate, rename, move, copy, and delete files.|214|
|File server|A network computer that is dedicated to storing and distributing files to network clients.|249|
|File shredder software|Software designed to overwrite sectors of a disk with a random series of 1s and 0s to ensure deletion of data.|220|
|File size|The physical size of a file on a storage medium, usually measured in kilobytes (KB).|206|
|File specification|A combination of the drive letter, subdirectory, file name, and extension that identifies a file (such as A:\word\filename.doc). Also called a "path."|206|
|File synchronization|The process of keeping two sets of files updated so they are the same; used to synchronize files between a computer and PDA or backup device.|224|
|File system|A method that is used by an operating system to keep files organized.|219|
|File tag|In the context of Windows, a piece of information that describes a file. Tags, such as Owner, Rating, and Date Taken, can be added by users.|212|
|File-naming conventions|A set of rules, established by the operating system, that must be followed to create a valid file name.|204|
|Firewall|Software or hardware designed to analyze and control incoming and outgoing packets on a network, used to enhance security by filtering out potential intrusion attempts.|342|
|First-generation computers|Computers that use vacuum tubes to process and store data such as UNIVAC.|491|
|First-generation languages|Machine languages that were available for programming the earliest computers.|677|
|Fixed Internet access|Any Internet access service designed to be used from a fixed, non-portable location, i.e., dial-up, ISDN, DSL, and cable Internet service.|311|
|Fixed wireless Internet service|High-speed, wide area Internet service alternative to cable and DSL that transmits data wirelessly using RF signals.|320|
|Fixed-length field|A field in a data file that has a predetermined number of characters.|615|
|Flash|A file format developed by Macromedia and marketed by Adobe that has become popular for animations on Web pages.|448|
|Flash cookie|A cookie-like object that is created and used by the Adobe Flash player; also referred to as a local shared object.|402|
|Flash Video|A popular video file format developed by Adobe Systems and used for Web-based video at sites such as YouTube.|457|
|Flat file|A single file that is the electronic version of a box of index cards, in which all records use the same record format.|614|
|Floppy disk|A removable magnetic storage medium, typically 3.5" in size, with a capacity of 1.44 MB.|80|
|Flowchart|In software engineering, a graphical representation of the way a computer should progress from one instruction to the next when it performs a task.|692|
|Folder|The subdirectories, or subdivisions of a directory, that can contain files or other folders.|206|
|Font|A typeface or style of lettering, such as Arial, Times New Roman, and Gothic.|127|
|Footer|Text that appears in the bottom margin of each page of a document.|128|
|Form design grid|A visual programming tool that allows programmers to drag and drop controls to form the user interface for a program.|683|
|Form factor|The configuration of a computer's system unit; examples include tower, mini-tower, pizza box, and cube.|58|
|Formal methods|Mathematically-based techniques for specifying and developing reliable and robust software or hardware.|725|
|Format|(1) Specified properties for setting a document's appearance. (2) File type, i.e., BMP format.|127|
|Format shifting|The process of converting media into a different file format to use it on a device other than the original one.|465|
|Formatting|The process of dividing a disk into sectors so that it can be used to store information.|218|
|Formula|In spreadsheet terminology, a combination of numbers and symbols that tells the computer how to use the contents of cells in calculations.|131|
|Fortran|(FORmula TRANslator) The oldest high-level computer programming language still in use for scientific, mathematical, and engineering programs.|679|
|Fourth-generation computers|Computers, such as today's personal computer, servers, and mainframes, that use a general purpose microprocessor for data processing.|494|
|Fourth-generation languages|Programming and query languages, such as SQL and RPG, that more closely resemble human languages than did third-generation languages.|678|
|Fragmented files|Files stored in scattered, noncontiguous clusters on a disk.|221|
|Frame rate|Refers to the number of frames displayed per second in a video or film.|456|
|Frames|An outline or boundary, frequently defining a box. For document production software, a pre-defined area into which text or graphics may be placed.|129|
|Freeware|Copyrighted software that is given away by the author or copyright owner.|150|
|Front side bus|(FSB) The data bus that carries signals between the CPU and RAM, disks, or expansion slots.|68|
|FTP|(File Transfer Protocol) A set of rules for uploading and downloading files between a client computer and a remote server.|336|
|FTP client|The computer or software that is used to access an FTP server and transfer files to it or from it.|336|
|FTP server|A computer that stores and distributes files to remote client computers.|336|
|Full backup|A copy of all the files for a specified backup job.|227|
|Full system backup|A backup that contains all of the files on the hard disk, including the operating systerm.|226|
|Fully justified|The horizontal alignment of text where the text terminates exactly at both margins of the document.|128|
|Function|In spreadsheet software, a built-in formula for making a calculation. In programming, a section of code that manipulates data, but is not included in the main sequential execution path of a program.|131, 696|
|Functional paradigm|An approach to programming that emphasizes the use of expressions called "functions."|713|
|Fuzzy logic|A technique used by an expert system to deal with imprecise data by incorporating the probability that the input information is correct.|564|
|Gantt chart|A chart that depicts a project schedule by showing each task as a bar on the chart.|570|
|Gateway|A network device that connects two dissimilar networks even if the networks use different protocols.|251|
|GIF|(Graphics Interchange Format) A bitmap graphics file format, popularized by CompuServe, for use on the Web.|442|
|Gigabit|(Gb or Gbit) Approximately one billion bits, exactly 1,024 megabits.|26|
|Gigabit Ethernet|An Ethernet standard that carries data at speeds up to 1 Gbps.|259|
|Gigabyte|(GB or GByte) Approximately one billion bytes; exactly 1,024 megabytes (1,073,741,824 bytes).|26|
|Gigahertz|(GHz) A measure of frequency equivalent to one billion cycles per second.|67|
|Global update|In the context of databases, changing data in more than one record at a time, i.e., changing the due date in all the records.|650|
|Globalization|A group of social, economic, political, and technological interdependencies linking people and institutions from all areas of the world.|12|
|Goal|In the context of Prolog programming, a query that searches for an answer based on a set of Prolog facts and rules.|715|
|GPL|(General Public License) A software license often used for freeware that insures it will be distributed freely whether in its original form or as a derivative work.|151|
|Gradient|A smooth blending of shades of different colors, from light to dark.|447|
|Grammar checker|A feature of word processing software that coaches the user on correct sentence structure and word usage.|127|
|Graphical user interface|(GUI) A type of user interface that features on-screen objects, such as menus and icons, manipulated by a mouse.|189|
|Graphics|Any picture, photograph, or image that can be manipulated or viewed on a computer.|137|
|Graphics card|A circuit board inserted into a computer to handle the display of text, graphics, animation, and videos. Also called a video card or graphics board.|91|
|Graphics processing unit|(GPU) A microprocessor dedicated to rendering and displaying graphics on personal computers, workstations, and videogame consoles.|91|
|Graphics software|Computer programs for creating, editing, and manipulating images; types include paint software and drawing software.|137|
|Grayscale palette|Digital images that are displayed in shades of gray, black, and white.|438|
|Grid computing system|A network of computers harnessed together to perform processing tasks; distributed grids like the SETI project use ad hoc and diverse Internet connected computers; also see cloud computing.|334|
|Groupware|Software that enables multiple users to collaborate on a project, usually through a pool of data that can be shared by members of the workgroup.|121|
|Handheld computer|A small, pocket-sized computer that is designed to run on its own power supply and provide users with basic applications.|19|
|Handshaking|A process where a protocol helps two network devices communicate.|252|
|Hard disk controller|A circuit board in a hard drive that positions the disk and read-write heads to locate data.|79|
|Hard disk drive|A computer storage device that contains a large-capacity rigid storage surface sealed inside a drive case. Typically used as the primary storage device in personal computers.|78|
|Hard disk platter|The component of a hard disk drive on which data is stored. It is a flat, rigid disk made of aluminum or glass and coated with a magnetic oxide.|78|
|Harvard Mark I|An early computer prototype also known as the ASCC (Automatic Sequence Controlled Calculator) developed by IBM that used decimal data representation rather than binary.|490|
|Hash value|A number produced by a hash function to create a unique digital "fingerprint" that can be used to allow or deny access to a software application.|157|
|Haskell|A functional programming language. (See functional paradigm.)|679|
|HDCP|(High-bandwidth Digital Content Protection) A form of copy protection designed to prevent digital content from being transmitted over a DVI interface to a non-complying display device.|466|
|Head crash|A collision between the read-write head and the surface of the hard disk platter, resulting in damage to some of the data on the disk.|80|
|Header|Text that is placed in the top margin of each page of a document.|128|
|Help desk|Part of the Information Systems department designated to assist users experiencing problems with their computers or applications.|588|
|Helper application|An external program that is used to display content retrieved using a Web browser.|367|
|Hierarchical database|A database model in which record types are arranged as a hierarchy, or tree, of child nodes that can have only one parent node.|617|
|High-level language|A programming language that allows a programmer to write instructions using human-like language.|676|
|Hollerith Tabulating Machine|A mechanical calculator first used in 1890 by the U.S. Census Bureau that used punch cards to store data and led to the creation of IBM.|488|
|Home computer system|A personal computer designed for use with mainstream computer applications such as Web browsing, e-mail, music downloads, and productivity software.|60|
|HomePNA|A network technology that uses a building's existing phone lines to connect nodes.|257|
|Horizontal market software|Any computer program that can be used by many different kinds of businesses (for example, an accounting program).|142|
|Hover ad|An advertisement, created using interactive Web tools such as DHTML, that appears on top of Web pages sometimes obscuring parts of them.|385|
|HSUPA|(High Speed Uplink Packet Access) A data transmission standard used by cell phone companies for high-speed data transport.|327|
|HTML|(Hypertext Markup Language) A standardized format used to specify the layout for Web pages.|362|
|HTML conversion utility|Utility software that converts documents, spreadsheets, and databases into HTML files that can be posted on the Web.|369|
|HTML document|A plain text or ASCII document with embedded HTML tags that dictate formatting and are interpreted by a browser.|362|
|HTML forms|An HTML document containing blank boxes that prompt users to enter information that can be sent to a Web server. Commonly used for e-commerce transactions.|371|
|HTML script|A series of instructions embedded directly into the text of an HTML document or a file referenced from an HTML document.|371|
|HTML tags|A set of instructions, such as <B>, inserted into an HTML document to provide formatting and display information to a Web browser.|362|
|HTTP|(Hypertext Transfer Protocol) The communications protocol used to transmit Web pages. HTTP:// is an identifier that appears at the beginning of Web URLs (for example, http://www.fooyong.com).|364|
|HTTP status code|A code used by Web servers to report the status of a browser's request. The HTTP status code 404 means document not found.|365|
|Hyper-Threading technology|A feature of microprocessors that allows a single processor to simulate the operation of two processors.|69|
|Hyperlink data type|A data type assigned to fields that store URLs used to link directly to a Web page.|635|
|Hypertext|A way of organizing a collection of documents by assigning an address to each and providing a way to link from one address to another.|360|
|Hypertext link|Also referred to simply as a "link," an underlined word or phrase on a Web page that, when clicked, takes you to a designated URL.|361|
|HyperTransport|A computer bus technology that increases the speed at which data is transported to a microprocessor.|68|
|IBM 360|An early third generation computer that is widely regarded as the first general purpose mainframe.|493|
|IBM AS/400|IBM's most successful legacy minicomputer.|493|
|IBM PC|An early, commercially successful personal computer system that featured a 4.77 MHz Intel 8088 processor, 64 KB RAM, and a floppy disk drive. Ancestor to today's PCs.|495|
|IBM PC XT|An early, commercially successful personal computer system that included a hard disk drive.|495|
|ICANN|(Internet Corporation for Assigned Names and Numbers) A global organization that coordinates the management of the Internet's domain name system, IP addresses, and protocol parameters.|309|
|Icon|A graphical object, such as those that represent programs or folders on a computer desktop.|189|
|IDE|(Integrated Development Environment) A set of programming tools, typically including editor, compiler, and debugger, packaged into an application for creating programs.|686|
|Identity theft|An illegal practice in which a criminal obtains enough information to masquerade as someone.|36|
|Image compression|Any technique that is used to reduce the size of a file that holds a graphic.|439|
|IMAP|(Internet Messaging Access Protocol) A protocol similar to POP that is used to retrieve e-mail messages from an e-mail server, but offers additional features, such as choosing which e-mails to download from the server.|397|
|Implementation phase|A set of tasks performed with the supervision of a system development project team in which a new information system is constructed.|583|
|Incremental backup|A backup that contains files that changed since the last backup.|228|
|Inference engine|Software that can analyze and manipulate a knowledge base or expert system.|564|
|Information engineering methodology|A method of developing an information system that focuses on data the information system collects before finding ways to process that data.|570|
|Information system|A computer system that collects, stores, and processes information, usually within the context of an organization.|556|
|Information systems|(IS or CIS) The career field or academic major that focuses on developing computer systems and networks for businesses.|514|
|Information technology|(1) A degree program that focuses on the computer equipment and software used by businesses and organizations. (2) The use of computers and software to manipulate data.|514|
|Information technology industry|(IT industry) Companies involved in the development, production, sales, and support of computers and software.|497|
|Infrared light|A transmission technology that uses a frequency range just below the visible light spectrum to transport data.|265|
|Inheritance|In object-oriented terminology, a method for defining new classes of objects based on the characteristics of existing classes.|704|
|Ink jet printer|A non-impact printer that creates characters or graphics by spraying liquid ink onto paper or other media.|92|
|Input|As a noun, the information that is conveyed to a computer. As a verb, to enter data into a computer.|15|
|INSERT|An SQL keyword that adds a record to a table.|647|
|Instant messaging|A private chat in which users can communicate with each other in real time using electronically transmitted text messages.|330|
|Instantiation|A programming term that refers to the process of assigning a value to a variable.|717|
|Instruction cycle|The steps followed by a computer to process a single instruction; fetch, interpret, execute, then increment the instruction pointer.|32|
|Instruction set|The collection of instructions that a CPU is designed to process.|30|
|Integer data type|A numeric data type used for fields that contain whole numbers.|634|
|Integrated circuit|(IC) A thin slice of silicon crystal containing microscopic circuit elements such as transistors, wires, capacitors, and resistors; also called chips and microchips.|27|
|Integration testing|The testing of completed modules of an application to ensure that they operate together correctly.|584|
|Intellectual property|A legal concept that refers to ownership of intangible information, such as ideas.|11|
|Internal information|Information obtained by an organization from its own resources, such as from accounting or personnel systems.|559|
|Internet|The worldwide communication infrastructure that links computer networks using TCP/IP protocol.|6|
|Internet backbone|The major communications links that form the core of the Internet.|303|
|Internet service provider|(ISP) A company that provides Internet access to businesses, organizations, and individuals.|303|
|Interpreter|A program that converts high-level instructions in a computer program into machine language instructions, one instruction at a time.|30|
|Intrusion|In the context of computer security, the unauthorized access to a computer system.|340|
|IP|(Internet Protocol) One of the main protocols of TCP/IP; responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses..|305|
|IP address|Unique identifying numbers assigned to each computer connected to the Internet.|255|
|iPhone OS X|A streamlined version of the Mac OS X operating system, designed for the iPhone.|203|
|ISA|(Industry Standard Architecture) A standard for moving data on the expansion bus. Can refer to a type of slot, a bus, or a peripheral device. An older technology, it is rapidly being replaced by PCI architecture.|96|
|ISDN|(Integrated Services Digital Network) A telephone company service that transports data digitally over dial-up or dedicated lines.|314|
|ISDN terminal adapter|A device that connects a computer to a telephone jack and translates the data into a signal that can travel over an ISDN connection.|314|
|Iteration|In the context of computer programming, a section of code that is repeated; also called a loop.|698|
|Iterative SDLC|A series of phases that outlines the development process of an information system where each phase is allowed to repeat as needed in the development process.|566|
|Java|A platform-independent, object-oriented, high-level programming language based on C++, typically used to produce interactive Web applications.|679|
|Java applet|Small programs that add processing and interactive capabilities to Web pages.|372|
|JIT|(Just In Time) A manufacturing system in which the parts needed to construct a product are received at the assembly site only as needed.|569|
|Job search agent|An automated program that searches one or more databases and notifies you when it finds a lead on a specific job type.|521|
|JOIN|An SQL command that temporarily joins data from more than one table in order to allow simultaneous access to both tables.|651|
|Joining tables|In SQL terminology, the act of creating a relationship between tables.|651|
|Joint application design|(JAD) A widely accepted design technique that is based on the idea that the best information systems are designed when end users and systems analysts work together on a project as equal partners.|567|
|Joystick|An input device that looks like a small version of a car's stick shift. Popular with gamers, moving the stick moves objects on the screen.|89|
|JPEG|(Joint Photographic Experts Group) A format that uses lossy compression to store bitmap images. JPEG (pronounced JAY-peg) files have a .jpg extension.|442|
|Kernel|The core module of an operating system that typically manages memory, processes, tasks, and storage devices.|192|
|Key frame|Frames at intervals in a digital video clip that contain all data for that frame. The rest of the frames in the video contain only the information that is different from the preceding key frame.|458|
|Keylogger|A program, sometimes part of a Trojan horse, that records a person's keystrokes, saves them, and then sends them to a system administrator or remote hacker.|163|
|Keyword|(1) A word or term used as the basis for a Web page search. (2) A command word provided by a programming language.|676|
|Keyword stuffing|An unpopular practice of including a huge variety of keywords in the header of an HTML document in the hopes that a search engine will display it even when the content of the page is not relevant to the search.|378|
|Kilobit|(Kbit or Kb) 1024 bits.|26|
|Kilobyte|(KB) Approximately 1,000 bytes; exactly 1,024 bytes.|26|
|Knowledge base|The collection of facts and rules obtained from experts that are incorporated into an expert system.|564|
|Knowledge engineering|The process of designing, entering rules into, and testing rules in an expert system.|564|
|Known information|In a problem statement, information supplied to the computer to help it solve a problem.|680|
|Label|In the context of spreadsheets, any text used to describe data.|130|
|LAN|(Local Area Network) An interconnected group of computers and peripherals located within a relatively limited area, such as a building or campus.|247|
|LAN jacking|Unauthorized access to a wireless network; also called war driving.|282|
|LAN party|An assembly of computer users and their computers for the purpose of creating a temporary local area network for gaming.|280|
|Lands|Non-pitted surface areas on a CD that represent digital data. (See also pits.)|81|
|Laser printer|A printer that uses laser-based technology, similar to that used by photocopiers, to produce text and graphics.|92|
|Latency|The elapsed time it takes for a packet of data to arrive at its destination.|309|
|LCD|(Liquid Crystal Display) Technology used for flat panel computer screens typically found on notebook computers.|90|
|Leading|Also called line spacing, the vertical spacing between lines of text.|128|
|Leibniz Calculator|A mechanical calculator capable of performing the four arithmetic functions that helped develop the technology for the first commercially successful calculator.|487|
|Level 1 cache|(L1 cache) Cache memory built into a microprocessor chip. L1 cache typically can be read in one clock cycle.|68|
|Level 2 cache|(L2 cache) Cache memory that is located in a chip separate from the microprocessor chip.|68|
|Line spacing|Also called leading, the vertical spacing between lines of text. (See leading.)|128|
|Linear editing|A video editing technique involving recording segments of video from one tape to another.|456|
|Link popularity|A metric used by some search engines to rank the sites that are relevant to a query.|377|
|Linux|An operating system that is a derivative of UNIX, available as freeware, and widely used for servers though it is also used on personal computers and workstations.|201|
|Linux distribution|Usually a download that includes the Linux operating system, a Linux desktop, and other Linux utilities.|201|
|Linux platform|A computer that is running the Linux operating system.|64|
|LISP|(LISt Processor) A declarative programming language that excels at handling complex data structures, artificial intelligence projects, and very complex programs.|679|
|Local application|Software designed to be installed on and run from a hard disk.|154|
|Logic error|A run-time error in the logic or design of a computer program.|685|
|Logical data type|A data type specifying that a field in a data file is used to store true/false or yes/no data.|634|
|Logical storage models|Any visual or conceptual aid that helps a computer user visualize a file storage system. Also called a storage metaphor.|215|
|Lookup routine|A validation process used by database designers to prevent data entry errors by searching for an entry such as a state abbreviation in a file or database table.|637|
|Loop|The section of program code that is repeated because of a repetition control structure.|698|
|Lossless compression|A compression technique that is able to reconstitute all of the data in the original file; hence "lossless" means that this compression technique does not lose data.|439|
|Lossy compression|Any data compression technique in which some of the data is sacrificed to obtain more compression.|439|
|Low-level language|A programming language that requires a programmer to write instructions for specific hardware elements such as the computer processor, registers, and RAM locations.|676|
|MAC address|(Media Access Control) A unique identifier similar to a serial number assigned to networking equipment at time of manufacture.|254|
|Mac OS|The operating system software designed for use on Apple Macintosh computers.|197|
|Mac platform|A family or category of Macintosh-compatible personal computers designed and manufactured by Apple Computer.|64|
|Machine code|Program instructions written in binary code that the computer can execute directly.|30|
|Machine language|A low-level language written in binary code that the computer can execute directly.|30|
|Magnetic storage|A technology for recording data onto disks or tape by magnetizing particles of an oxide-based surface coating.|78|
|Mail merge|A feature of document production software that automates the process of producing customized documents, such as letters and advertising flyers.|129|
|Mail order|A type of retailing in which a merchant takes orders by telephone or from an Internet site, then ships orders by mail or other courier service.|507|
|Mainframe computer|A large, fast, and expensive computer generally used by businesses or government agencies to provide centralized storage, processing, and management for large amounts of data.|18|
|Maintenance phase|The day-to-day operation of an information system, including making modifications and correcting problems to insure correct operation.|587|
|Malicious software|(malware) Any program or set of program instructions, such as a virus, worm, or Trojan horse, designed to surreptitiously enter a computer and disrupt its normal operations.|162|
|Malware|(Malicious software) Programs such as viruses, worms, and bots designed to disrupt computer operations.|162|
|MAN|(Metropolitan Area Network) A public, high-speed network that can transmit voice and data within a range of 50 miles.|247|
|Management information system|(MIS) A type of information system that manipulates the data collected by a transaction processing system to generate reports that managers can use to make business decisions.|561|
|Managers|People who make decisions about how an organization carries out its activities.|557|
|Manual calculator|A device that helps solve mathematical calculations, but does not contain sophisticated built-in algorithms.|486|
|Manufacturer direct|The selling of products by hardware manufacturers directly to consumers by means of a sales force or mail order.|507|
|Manufacturing technician|A computer professional who participates in the fabrication of computer chips, systems, and devices.|512|
|Many-to-many relationship|A relationship in which one record in a particular record type can be related to more than one record in another record type, and vice versa.|616|
|Mark-8|A microprocessor based computer system, developed by Jonathan A. Titus in 1974, that helped lead to the development of personal computers.|494|
|Market share|A company's share, or percentage, of the total market.|504|
|Market tiers|Categories of computer companies based on size, longevity, and market share.|505|
|Marketing channels|Marketing outlets such as retail stores or mail order for computer-related products.|506|
|Markup language|A language that provides text and graphics formatting through the use of tags. Examples of markup languages include HTML, XML, SGML.|362|
|Mass-mailing worm|A worm that sends itself to every e-mail address in the address book of an infected computer.|163|
|Master File Table|An index file used in NTFS storage systems to maintain a list of clusters and keep track of their contents.|219|
|Mathematical modeling software|Software for visualizing and solving a wide range of math, science, and engineering problems.|133|
|Mathematical operators|Symbols such as + - / * that represent specific mathematical functions in a formula.|131|
|Mechanical calculator|A machine capable of implementing algorithms used to solve mathematical calculations.|487|
|Media center PC|A personal computer system designed to be a home entertainment hub; a computer system that includes Microsoft Windows Media Center operating system.|60|
|Megabit|(Mb or Mbit) 1,048,576 bits.|26|
|Megabyte|(MB) Approximately one million bytes; exactly 1,048,576 bytes.|26|
|Megahertz|(MHz) A measure of frequency equivalent to 1 million cycles per second.|67|
|Megapixel|One million pixels; expresses the resolution and quality of an image; usually used in reference to digital cameras.|433|
|Memo data type|A data type that specifies that a field in a data file can contain variable-length text comments (also called memo field).|634|
|Memory|The computer circuitry that holds data waiting to be processed.|15|
|Memory leak|An undesirable state in which an operating system does not correctly allocate memory for programs causing parts of one program to overwrite parts of others and malfunction.|187|
|Menu|In the context of user interfaces, a list of commands or options often displayed as a list.|190|
|Menu bar|A standard component of most graphical user interfaces that is displayed as a strip of clickable options, that in turn display a list of commands.|190|
|Mesh topology|A network arranged in such a way that each device is connected to many other devices. Data traveling on a mesh network can take any of several possible paths.|250|
|Message|In the context of object-oriented programming, input that is collected and sent to an object.|706|
|Message header|The section of an e-mail file that contains address, subject, and file attachment information.|392|
|Meta keyword|A word that is included in the header of an HTML document in order to describe the document's contents.|378|
|Metafile|In the context of graphics, a file that contains both vector and bitmap data.|447|
|Metasearch engine|A search engine that searches other search engines.|380|
|Metasearch tool|A program that performs broad-based Web searches, such as searching more than one job database at a time.|521|
|Method|In the context of object-oriented programming, any action that an object can perform.|705|
|Microcontroller|A special purpose microprocessor that is built into the device it controls.|20|
|Microprocessor|An integrated circuit that contains the circuitry for processing data. It is a single-chip version of the central processing unit (CPU) found in all computers.|15|
|Microprocessor clock|A timing signal that sets the pace for executing instructions in a microprocessor.|67|
|Microsoft Windows|An operating system, developed by Microsoft Corporation, that provides a graphical interface. Versions include Windows 3.1, 95, 98, Me, NT, 2000, XP, and Vista.|194|
|Microwaves|Electromagnetic waves with a frequency of at least 1 gigahertz; one type of channel for transmitting data over communications networks.|265|
|MIDI|(Musical Instrument Digital Interface) A standardized way in which sound and music are encoded and transmitted between digital devices that play music.|426|
|MIDI sequence|Digitally encoded MIDI music stored on a digital device, such as a computer or MIDI instrument.|426|
|MIDI sequencing software|Software that uses a standardized way of transmitting encoded music or sounds for controlling musical devices, such as a keyboard or sound card.|139|
|MIME|(Multi-purpose Internet Mail Extensions) A standard for formatting non-ASCII messages so that they can be sent over the Internet, typically as e-mail messages.|393|
|MIMO|(Multiple Input Multiple Output) A wireless communications device that uses an array of antennas to transmit data over more than one channel.|268|
|Minilaptop|A type of subnotebook portable computer similar to a clamshell-style notebook computer, but smaller.|59|
|Mission|An organization's goal or plan, which is reflected by the organization's activities.|556|
|Mission statement|The written expression of an organization's goals and how those goals will be accomplished.|556|
|MITS Altair|The first commercial microcomputer. It was based on the Intel 8080 processor and sold primarily to computer hobbyists.|494|
|Mobile broadband|High bandwidth wireless technology that was developed for sending digital data over cell phone systems.|327|
|Mobile Internet access|Any service that allows subscribers to access the Internet while on the go.|311|
|Mod|In the context of personal computers, a customized or "modified" system unit typically jazzed up with lights, chrome, and decals.|65|
|Modem|A device that modulates and demodulates a signal, typically used to send data from a computer to the Internet over telephone, cable television, or satellite networks.|304|
|Modified waterfall SDLC|A series of phases that outlines the development process of an information system where each phase can overlap and be repeated as necessary in the development process.|566|
|Money management software|Software used to track monetary transactions and investments.|133|
|Monochrome bitmap|A bitmap image that contains only the colors black and white.|436|
|Mouse|An input device that allows the user to manipulate objects on the screen by clicking, dragging, and dropping.|88|
|MP3|A file format that provides highly compressed audio files with very little loss of sound quality.|424|
|MPEG|(Moving Picture Experts Group) A family of highly compressed container file formats and codecs for digital multimedia; MPEG-1, MPEG-2, and MPEG-4.|457|
|MRP|(Manufacturing Resource Planning) A business management technique in which an optimum manufacturing plan is generated based on a wide variety of data.|569|
|MSRP|(Manufacturer's suggested retail price) The suggested price of a product that is set by the manufacturers, usually higher than the street price.|503|
|Multi-core processor|A microprocessor that contains circuitry for more than one processing unit.|69|
|Multiparadigm languages|A programming language that supports more than one paradigm, such as object-oriented and procedural paradigms.|679|
|Multiple-user license|Legal permission for more than one person to use a particular software package.|147|
|Multiprocessing|The ability of a computer or operating system to support dual core processors or multiple processors.|186|
|Multitasking|The ability of a computer, processor, or operating system to run more than one program, job, or task at the same time.|186|
|Multithreading|A technology that allows multiple parts or threads from a program to run simultaneously.|186|
|Multiuser operating system|An operating system that allows a single computer to deal with simultaneous processing requests from multiple users.|187|
|NAN|(Neighborhood Area Network) A network with a range of a few blocks, such as a Wi-Fi hotspot offered by a coffee shop or neighborhood free Wi-Fi organization.|246|
|Nanosecond|A unit of time representing one billionth of a second.|73|
|Napier's Bones|A manual calculator created by John Napier that could be used to perform mathematical calculations by manipulating numbered rods.|487|
|Narrowband|A term that refers to communications channels that have low bandwidth.|251|
|Native file format|A file format that is unique to a program or group of programs and has a unique file extension.|209|
|Native resolution|The dimensions of the grid that holds LEDs in a flat screen, LCD display device; the resolution at which an LCD offers the clearest display.|539|
|Natural language query|A query formulated in human language, as opposed to an artificially constructed language such as machine language.|136|
|Netiquette|(Internet etiquette) A set of guidelines for posting messages and e-mails in a civil, concise way.|396|
|Network access points|(NAP) An Internet node that links together different network service providers so that data can be transferred from one service provider to the other.|303|
|Network address translation|(NAT) A security technique that allows a LAN to use one type of IP address for intra-network data and another type of address for data traveling to and from the Internet.|344|
|Network attached storage|(NAS) Storage devices that are designed to be attached directly to a network, rather than to a workstation or server.|248|
|Network database|A collection of physically linked records in a one-to-many relationship in which a member (child) can have more than one owner (parent).|617|
|Network device|Any device, such as a gateway, hub, or router, that is used to broadcast network data, boost signals, or route data to its destination.|248|
|Network hub|A network device that connects several nodes of a local area network.|261|
|Network interface card|Circuitry, often on an expansion card mounted inside a computer, that transmits and receives data on a local area network. Also called a NIC, network card, or network adapter.|248|
|Network router|A device found at each intersection on the Internet backbone that examines the IP address of incoming data, and forwards the data towards its destination.|261|
|Network service providers|(NSP) A company that maintains a series of nationwide Internet links.|303|
|Network specialist/administrator|A computer professional who plans, installs, and maintains one or more local area networks.|511|
|Network switch|A network device that sends data to a specific address instead of broadcasting it over an entire network.|261|
|Networked peripheral|A peripheral device that contains circuitry that allows it to be directly connected to a network, rather than connecting to a computer that transfers data to a network.|248|
|Neural network|A type of expert system that uses computer circuitry to simulate the way in which the brain processes information, learns, and remembers.|565|
|Node|In a network, a connection point; in a hierarchical database, a segment or record type.|248|
|Non-executing zip file|A type of compressed file that has to be unzipped manually to extract the file or files contained within it.|157|
|Non-volatile|Any electronic component that does not require a constant supply of power to hold data.|84|
|Nonlinear editing|A digital video editing technique that requires a personal computer and video editing software.|456|
|Nonprofit organization|Organizations with political, social, or charitable goals that are not intended to generate a profit.|556|
|Normalization|The process of analyzing data to create the most efficient database structure.|637|
|Notation software|Software used to help musicians compose, edit, and print their compositions.|139|
|Notebook computer|A small, lightweight, portable computer that usually runs on batteries. Sometimes called a laptop.|59|
|NTFS|(New Technology File System) A file system used by Microsoft Windows NT, 2000, XP, and Vista operating systems to keep track of the name and location of files on a hard disk.|219|
|Numeric data|Numbers that represent quantities and can be used in arithmetic operations.|23|
|Object|In an object database or OO programming language, a discrete piece of code describing a person, place, thing, event, or type of information.|702|
|Object code|The low-level instructions that result from compiling source code.|30|
|Object database|A database model that organizes data into classes of objects that can be manipulated by programmer-defined methods; also referred to as object-oriented database.|620|
|Object-oriented methodology|An approach to system development that regards the elements of a system as a collection of objects that interact with each other to accomplish tasks.|570|
|Object-oriented paradigm|An approach to programming that focuses on the manipulation of objects rather than on the generation of procedure-based code.|702|
|Object-relational database|A database that uses object-oriented and relational concepts.|621|
|Octet|One of four sections of an IP address.|255|
|ODBMS|(Object Database Management System) Database management software used to construct an object-oriented database.|625|
|Offshoring|The corporate practice of relocating production, manufacturing, or customer service to lower-cost overseas locations.|500|
|OLAP|(Online Analytical Processing) A system that consists of computer hardware, database software, and analytical tools that are optimized for analyzing and manipulating data.|613|
|OLTP system|(Online Transaction Processing System) Interactive online transaction processing methods that use a "commit or rollback" strategy to ensure accurate transaction processing.|560|
|One-to-many relationship|A relationship in which one record in a particular type may be related to more than one record of another record type.|616|
|One-to-one relationship|An association between database entities in which one record type is related to one record of another type.|616|
|Online auction|A consumer-to-consumer form of e-commerce in which merchandise and services are sold to the highest bidder. eBay is a popular example.|388|
|Online job bank|An online database of job opening announcements that spans many industries or just one specific industry.|520|
|Online processing|An interactive method of processing transactions in which each transaction is processed as it is entered.|560|
|Online shopping cart|A feature of e-commerce sites that stores information about items selected for purchase often by creating a cookie on a shopper's computer.|386|
|Online social networks|Web sites that provide ways for people to communicate and socialize. MySpace is a popular example.|6|
|Op code|(Short for operation code) An assembly language command word that designates an operation, such as add (ADD), compare (CMP), or jump (JMP).|31|
|Open source|An approach to developing and licensing software in which source code remains public so it can be improved and freely distributed.|12|
|Open source software|Software that includes its source code, allowing programmers to modify and improve it.|150|
|Operand|The part of an instruction that specifies the data, or the address of the data, on which the operation is to be performed.|31|
|Operating system|The software that controls the computer's use of its hardware resources, such as memory and disk storage space. Also called OS.|16, 184|
|Operational planning|The scheduling and monitoring of workers and processes.|557|
|Optical storage|A technology that records data as light and dark spots on a CD, DVD, or other optical media.|81|
|Organization|A group of people working together to accomplish a goal.|556|
|Organizational chart|A diagram showing the hierarchy of workers in an organization.|557|
|Output|The results produced by a computer (for example, reports, graphs, and music).|15|
|Outsourcing|The corporate practice of using third-party contractors to supply raw goods, manufacturing, or services.|499|
|Overclocking|Forcing a computer component, such as a microprocessor, to run at a higher speed than intended by the manufacturer.|70|
|P2P file sharing|A practice in which individuals can obtain music, video, and other types of files from other users on a network; sometimes the files are shared without authorization from the copyright holder.|337|
|Packet|A small unit of data transmitted over a network.|253|
|Packet switching|A technology used by data communications networks, such as the Internet, where a message is divided into smaller units called "packets" for transmission.|253|
|Packet writing|The process of recording data to a CD or DVD in multiple sessions. Contrast with disk mastering.|219|
|Page layout|The physical positions of elements on a document page such as headers, footers, page numbering, and graphics.|128|
|Paint software|Software that creates and manipulates bitmap graphics.|137, 430|
|Palm OS|A popular type of operating system produced by ACCESS specifically for handheld computers.|202|
|PAN|(Personal Area Network) An interconnected group of personal digital devices located within a range of about 30 feet.|246|
|Paragraph alignment|The horizontal position (left, right, justified, centered, for example) of the text in a document.|128|
|Paragraph style|A specification for the format of a paragraph, which includes the alignment of text within the margins and line spacing.|128|
|Parallel conversion|A type of system conversion in which the old computer system remains in service while some or all of the new system is activated.|586|
|Parallel processing|The simultaneous use of more than one processor to execute a program.|69|
|Parameters|A delimiting variable used to modify a command, e.g., /ON modifies the DIR command so it displays files in order by name.|647, 676|
|Particle renderer|Graphics software that generates special effects for explosions, flares, fog, and smoke.|687|
|Pascal|A high-level, procedural programming language developed to help computer programming students learn the structured approach to programming.|679|
|Pascaline|An early mechanical calculator capable of performing addition, subtraction, division, and multiplication.|487|
|Password|A special set of symbols used to restrict access to a user's computer or network.|35|
|Password manager|Software that keeps track of sites at which a user has registered and the password that corresponds to each site.|40|
|Path|A file's location specified by the drive on which it is stored and the hierarchy of folders in which it is stored. (See file specification.)|206|
|Pathfinder algorithms|Program code used to control the routes characters take as they move through the virtual world of a computer game.|687|
|Payroll software|A type of horizontal market software used to maintain payroll records.|142|
|PC platform|A family of personal computers that use Windows software and contain Intel-compatible microprocessors.|64|
|PCI|(Peripheral Component Interconnect) A method for transporting data on the expansion bus. Can refer to a type of data bus, expansion slot, or transport method used by a peripheral device.|96|
|PCX|The PC Paintbrush file format that incorporates a compression algorithm.|442|
|PDA|(Personal Digital Assistant) A shirt-pocket sized computer originally designed to keep track of appointments (also called a palm-top).|19|
|PDA video|Digital video formatted for viewing on a PDA or other handheld device.|452|
|Peer-to-peer mode|A method of using a network in which workstations act as both file servers and clients.|249|
|Peripheral device|A component or equipment, such as a printer, that expands a computer's input, output, or storage capabilities.|56|
|Person-to-person payment|A method of e-commerce payment that uses an intermediary or third party such as PayPal to handle payment between a buyer and seller.|390|
|Personal computer|A microcomputer designed for use by an individual user for applications such as Web browsing and word processing.|17|
|Personal finance software|Software geared toward individual finances that helps track bank account balances, credit card payments, investments, and bills.|133|
|PERT|(Program Evaluation and Review Technique) A technique for project management by displaying interconnected events and task milestones on a timeline.|570|
|PGP|(Pretty Good Privacy) A popular program used to encrypt and decrypt files and e-mail messages.|287|
|Pharming|An exploit that redirects users to fake Web sites.|405|
|Phased conversion|A type of information system conversion in which one module of a new information system is activated at a time.|586|
|Phishing|An e-mail based scam that's designed to fool users into revealing confidential information.|405|
|Phoneme|A unit of sound that is a basic component of words and is produced by speech synthesizers.|428|
|Photo editing software|The software used to edit, enhance, retouch, and manipulate digital photographs.|137|
|Physical storage model|A representation of data as it is physically stored.|218|
|Physical topology|The actual layout of network devices, wires, and cables.|250|
|Piconet|A network formed by Bluetooth devices.|267|
|PIECES framework|A concept developed by James Wetherbe to help identify problems in an information system. Each letter of PIECES stands for a potential problem (Performance, Information, Economics, Control, Efficiency, and Service).|569|
|Pilot conversion|A type of system conversion in which a new information system is first activated at one branch of a multi-branch company.|586|
|Ping|(Packet INternet Groper) A command on a TCP/IP network that sends a test packet to a specified IP address and waits for a reply.|310|
|Pipelining|A technology that allows a processor to begin executing an instruction before completing the previous instruction.|69|
|Pits|Spots on a CD that are "burned" onto an optical storage medium to represent digital data.|81|
|Pixel interpolation|A process that is used by graphics software to average the color of adjacent pixels in an image, usually when the image is enlarged.|435|
|Pixelated|Describes the effect of increasing the size and thus decreasing the quality of an image.|435|
|Pixels|(Short for picture element) The smallest unit in a graphic image. Computer display devices use a matrix of pixels to display text and graphics.|90|
|PL/1|(Programming Language 1) A business and scientific programming language developed by IBM in 1964.|679|
|Place shifting|The practice of accessing media from a remote location, such as over a network.|465|
|Planning phase|The first phase of an information system development project with the goal of creating a Project Development Plan.|567|
|Plasma screen|A compact, lightweight, flat panel computer display that uses a technology similar to that of neon lights.|90|
|Plug and play|The ability of a computer to automatically recognize and adjust the system configuration for a newly added device.|96|
|Plug-in|A software module that adds a specific feature to a system. In the context of browsers, a plug-in adds the ability to play files referenced from the EMBED tag.|367|
|PNG|(Portable Network Graphics) A type of graphics file format similar to but newer than GIF or JPEG.|443|
|Podcast|An audio file that is distributed over the Internet through downloads or the use of an RSS feed or Atom.|360|
|Point size|A unit of measure (1/72 of an inch) used to specify the height of characters in a font.|127|
|Pointing device|An input device, such as a mouse, trackball, pointing stick, or trackpad, that allows users to manipulate an on-screen pointer and other screen-based graphical controls.|88|
|Pointing stick|A mouse-substitute input device that looks like the tip of an eraser embedded in the keyboard of a notebook computer.|89|
|Polymorphism|In the context of object-oriented programming, the ability to redefine a method for a subclass. Also called overloading.|707|
|POP|(Post Office Protocol) A standard for retrieving e-mail messages from an e-mail server.|397|
|POP server|A computer that receives and stores e-mail data until retrieved by the e-mail account holder.|398|
|Pop-up ad|A type of advertisement that usually appears in a separate window when you enter a Web site.|385|
|Port|In the context of computer networks, a virtual device that sets up one or more connections over which data can flow.|308|
|Port probe|An exploit used by hackers to locate computer ports that can be used for surreptitious access.|341|
|Portable audio player|A digital device designed to store and play digital music; also called MP3 player.|425|
|Portable computer|Any type of computer, such as a notebook computer, that runs on batteries and is designed to be carried from one location to another.|59|
|Portable Internet access|Any type of Internet service, such as portable satellite, that can be moved from one place to another.|311|
|Portable media players|Small, lightweight, battery-powered devices designed to store and play audio, video, or image files stored in such formats as MP3 and AAC.|20|
|Portable software|Software designed to be stored on a flash drive or CD, and that does not require installation before it is used.|158|
|PostScript|A printer language, developed by Adobe Systems, which uses a special set of commands to control page layout, fonts, and graphics.|94|
|Power surge|A spike in electrical voltage that has the potential to damage electronic equipment such as computers.|99|
|Powerline network|A network that uses a building's existing powerline cables to connect nodes; also called HomePlug, HPLC, or HomePLC.|258|
|Predicate|In a Prolog fact, such as likes(John, Mary), the predicate "likes" describes the relationship between the arguments in parentheses, such as (John, Mary).|714|
|Predictive analytics|A branch of data mining that focuses on predicting future probabilities and trends using statistical algorithms, neural networks, and optimization research.|613|
|Predictive methodology|The traditional approach to software development in which detailed specifications are created before coding begins.|681|
|Presentation software|Software that provides tools to combine text, graphics, graphs, animation, and sound into a series of electronic "slides" that can be output on a projector, or as overhead transparencies, paper copies, or 35-millimeter slides.|138|
|Primary key|A field in a database that contains data, such as a Social Security number, that is unique to a record.|634|
|Print server|A device that controls a cluster of printers by distributing jobs that arrive in its print queue--a list of documents that require printing.|249|
|Printer Control Language|(PCL) A standard for formatting codes embedded within a document that specify how a printer should format each page.|94|
|Private attribute|An attribute for an object, class, or record that can be accessed only from the program routine in which it is defined.|703|
|Private IP address|An IP address that cannot be routed over the Internet.|344|
|Problem statement|In software engineering, a concise summary of elements that must be manipulated in order to achieve a result or goal.|680|
|Procedural language|Any programming language used to create programs composed of a series of statements that tell the computer how to perform a specific task.|689|
|Procedural paradigm|An approach to programming in which a programmer defines the steps for solving a problem.|689|
|Procedure|In the context of computer programming, a section of code that performs activities but is not included in the main sequential execution path of a program.|696|
|Procedure handbook|Step-by-step instructions for performing a specific job or task.|585|
|Process|A systematic series of actions that a computer performs to manipulate data; typically represented on a DFD by a rounded rectangle.|572|
|Processing|The manipulation of data by a computer's microprocessor or central processing unit.|15|
|Product activation|The process of becoming a registered user of a software product; the process might include entering a validation code to unlock the software.|157|
|Productivity software|Software that helps people work more efficiently; traditionally word processing, spreadsheet, presentation, e-mail, and database software.|121|
|Professional ethics|On-the-job actions and choices that reflect a person's values.|523|
|Program editor|A programming tool, similar to a word processor, but that provides specialized editing and formatting features to streamline the programming process.|682|
|Programming language|A set of keywords and grammar (syntax) that allows a programmer to write instructions that a computer can execute.|29, 676|
|Programming paradigm|A programming methodology or approach, as in the object-oriented paradigm.|679|
|Project Development Plan|A planning document that is the final result of a planning phase and is reviewed and approved by management.|567|
|Project management software|Software specifically designed as a tool for planning, scheduling, and tracking projects and their costs.|142, 571|
|Prolog|A declarative programming language used to develop expert systems modeled after human thinking.|679|
|Properties|The characteristics of an object in a program.|683|
|Proprietary information|Financial and product data, procedures, or concepts created by an individual or organization that are not made public because they would aid the competition.|526|
|Proprietary software|Software that carries restrictions on its use that are delineated by copyright, patents, or license agreements.|149|
|Protocol suite|A group of protocols, such as TCP and IP, that work together.|305|
|Prototype|An experimental or trial version of a device or system.|489|
|Pseudocode|A notational system for algorithms that combines English and a programming language.|692|
|PSK|(Pre-shared key) a variation of WPA encryption protocol for wireless networks in which the encryption key ued by the router is the same for all client computers that connect to the network.|283|
|Public attribute|An attribute for an object, class, or record that can be accessed from any routine in a program.|703|
|Public domain software|Software that is available for public use without restriction except that it cannot be copyrighted.|149|
|Public key encryption|(PKE) An encryption method that uses a pair of keys, a public key (known to everyone) that encrypts the message, and a private key (known only to the recipient) that decrypts it.|286|
|Quality assurance specialist|A computer professional who participates in alpha and beta test cycles of software. Also refers to a person who examines and tests computer chips and devices.|512|
|Quality of service|(QoS) The level of performance that is provided by a computer system and measured by factors such as response time, downtime, and capacity.|587|
|Quality-of-service metric|A technique for measuring a particular quality-of-service characteristic, such as response time.|587|
|Quarantined file|A file suspected to be infected with a virus that antivirus software moves to a special folder to prevent accidental access to it.|169|
|Query|A search specification that prompts the computer to look for particular records in a file.|136|
|Query by example|(QBE) A type of database interface in which the user fills in a field with an example of the type of information that being sought.|136|
|Query language|A set of command words that can be used to direct the computer to create databases, locate information, sort records, and change the data in those records.|136|
|Query processor|The component of a search engine that examines keywords entered by users and fetches results that match the query.|377|
|QuickTime Movie|A video and animation file format developed by Apple Computer that can also be run on PCs. QuickTime files have a .mov extension.|457|
|RAM|(Random Access Memory) Computer memory circuitry that holds data, program instructions, and the operating system while the computer is on.|71|
|Random access|The ability of a storage device (such as a disk drive) to go directly to a specific storage location without having to search sequentially from a beginning location.|77|
|Rasterization|The process of superimposing a grid over a vector image and determining the color depth for each pixel.|447|
|RAW|In the context of digital graphics, a file that contains unprocessed image data directly from a digital camera's sensors.|442|
|Ray tracing|A technique by which light and shadows are added to a 3-D image.|449|
|RCA Spectra 70|An early third generation computer that was among the first to use integrated circuits for data processing.|493|
|RDBMS|(Relational Database Management System) Database management software used to create, update, and administer a relational database.|625|
|Read-only technology|Storage media that can only be read from, but not recorded on.|82|
|Read-write head|The mechanism in a disk drive that magnetizes particles on the storage disk surface to write data, or senses the bits that are present to read data.|78|
|Readability formula|A feature found in some word processing software that can estimate the reading level of a written document.|127|
|Real data type|A numeric data type used for fields that contain numbers with decimal places.|634|
|Real-time messaging system|Technologies, such as instant messaging and chat, that allow people to exchange messages when they are online.|330|
|RealAudio|An audio file format developed by RealNetworks especially for streaming audio data over the Web.|424|
|REALbasic|A modern OO version of the BASIC programming language that works cross platform on Windows, Macs, and Linux.|679|
|RealMedia|A video file format developed by RealNetworks that is popular for streaming Web videos.|457|
|Record|In the context of database management, a record is the fields of data that pertain to a single entity in a database.|134, 615|
|Record occurrence|A record that has been filled with data for a particular entity.|615|
|Record type|The structure of a record, including the names, length, and data types for each field.|615|
|Recordable technology|The devices and standards that allow computers to write data permanently on CDs and DVDs, but does not allow that data to be changed once it has been recorded.|82|
|Recovery disk|A CD that contains all the operating system files and application software files necessary to restore a computer to its original state.|229|
|Reference software|Software that contains a large database of information with tools for sorting, viewing, and accessing specific topics.|141|
|Refresh rate|The speed at which a computer monitor is rewritten, measured in hertz. Faster refresh rates reduce flickering.|90|
|Region code|A signal added to commercial DVDs that limits playback to devices that have a corresponding region code.|468|
|Registers|A sort of "scratch pad" area of the microprocessor into which data or instructions are moved so that they can be processed.|31|
|Relational database|A database structure that incorporates the use of tables that can establish relationships with other, similar tables.|618|
|Relationship|In the context of databases, an association between entities that can be used to link records in more than one file.|616|
|Relative reference|In a worksheet, a cell reference that can change if cells change position as a result of a move or copy operation.|132|
|Remarks|Explanatory comments inserted into lines of code in a computer program.|686|
|Remote Access Trojan|(RAT) A type of Trojan horse malware that allows remote hackers to transmit files to victims' computers.|163|
|Rendering|In graphics software, the process of creating a 3-D solid image by covering a wireframe drawing and applying computer-generated highlights and shadows.|449|
|Repetition control structure|A component of a computer program that repeats one or more instructions until a certain condition is met (also called loop or iteration).|698|
|Repetitive stress injury|An injury that occurs from overuse over a period of time.|536|
|Report generator|The component of a data management environment that provides a user with the ability to design reports.|642|
|Report template|A predesigned pattern that provides the outline or general specifications for a report.|642|
|Request for proposal|(RFP) A document sent by an organization to vendors to solicit proposals; it specifies the problem that needs to be solved and the requirements that must be met.|580|
|Request for quotation|(RFQ) A document sent by an organization to vendors requesting a formal price quotation on a list of hardware and/or software.|580|
|Reserved words|Special words used as commands in some operating systems that may not be used in file names.|205|
|Resolution|The density of the grid used to display or print text and graphics; the greater the horizontal and vertical density, the higher the resolution.|91|
|Resolution dependent|Graphics, such as bitmaps, in which the quality of the image is dependent on the number of pixels comprising the image.|435|
|Resource|A component, either hardware or software, that is available for use by a computer's processor.|185|
|Resource fork|A storage characteristic of Mac OS that creates a file containing a description of the data stored in an accompanying raw data file.|200|
|Restore point|Data stored about the state of files and the operating system at a given point in time, then used to roll back the computer system to that state.|230|
|Rewritable technology|The devices and standards that allow users to write data on a storage medium and then change that data.|82|
|RF signals|(Radio Frequency Signals) Data that is broadcast and received via radio waves with a transceiver.|265|
|Ribbon|An element of the user interface popularized by Microsoft Office 2007 that presents users with multiple tabs instead of menus at the top of the application window.|190|
|Ring topology|A network in which all devices are connected in a circle with each device having exactly two neighbors.|250|
|RISC|(Reduced Instruction Set Computer) A microprocessor designed for rapid and efficient processing of a small set of simple instructions.|69|
|RJ45 connector|A square plastic cable connector that resembles an oversized telephone connector, and is used to connect Ethernet devices.|262|
|ROM|(Read-Only Memory) Refers to one or more integrated circuits that contain permanent instructions that the computer uses during the boot process.|73|
|ROM BIOS|A small set of basic input/output system instructions stored in ROM.|73|
|Root directory|The main directory of a disk.|206|
|Rootkit|Software that conceals running processes; used by hackers to disguise security breaches and breakins.|165|
|Routable IP address|A network address that can be routed over the Internet; contrast to private IP address.|344|
|RPG|(Report Program Generator) A programming language used to generate business reports.|679|
|RSS|(Really Simple Syndication) Delivers files called "feeds" from Web sites to subscribers.|360|
|Rule|In the context of Prolog programming, a rule is a general statement about the relationship between facts.|713|
|Run-length encoding|A graphics file compression technique that looks for patterns of bytes and replaces them with messages that describe the patterns.|439|
|Runtime error|An error that occurs when a computer program is run.|685|
|S-HTTP|(Secure HTTP) A method of encrypting data transmitted between a computer and a Web server by encrypting individual packets of data as they are transmitted.|389|
|Safe Mode|A menu option that appears when Windows is unable to complete the boot sequence. By entering Safe Mode, a user can gracefully shut down the computer, then try to reboot it.|105|
|Sampling rate|The number of times per second a sound is measured during the recording process.|423|
|Satellite Internet service|A high-speed Internet service that uses a geosynchronous or low-earth orbit satellite to send data directly to satellite dishes owned by individuals.|318|
|Satellite modem|A device that connects a computer to a satellite for purposes of accessing the Internet.|319|
|Scanner|A device that converts a printed image into a bitmap graphic.|431|
|Scheduled reports|Reports such as monthly sales summaries that follow a fixed format and are produced according to a preset time table.|561|
|Scheme|A dialect of LISP, used for computer research and teaching.|679|
|Schickard's Calculator|An early mechanical calculator consisting of a series of gears and spokes representing numerical values.|487|
|Scratch|A simple-to-use visual programming language based on Smalltalk/Squeak and used to teach programming.|679|
|SDK|(Software Development Kit) A collection of language-specific programming tools.|686|
|SDLC|(System Development Life Cycle) The series of phases that outlines the development process of an information system.|566|
|Search and Replace|A feature of document production software that allows the user to automatically locate all instances of a particular word or phrase and substitute another word or phrase.|127|
|Search engine indexer|The component of a search engine that reviews the Web pages brought back by a crawler and creates pointers to them so that they can be quickly accessed.|376|
|Search terms|The words entered into a search engine or database to form a query.|378|
|Second-generation computers|Computers that use transistors for data processing and storage instead of vacuum tubes.|492|
|Second-generation languages|Assembly languages that followed machine languages.|677|
|Sectors|Subdivisions of the tracks on a storage medium that provide storage areas for data.|218|
|Secure connection|An internet connection that encrypts data transmitted between your computer and a Web site.|389|
|Security software|Any software package that is designed to protect computers from destructive software and unauthorized intrusions.|162|
|Security specialist|A computer professional who analyzes security threats, implements solutions, and develops policies and procedures to protect computer equipment and data.|511|
|Security suite|A software suite containing modules to protect computers against viruses, worms, intrusions, spyware, and other threats.|166|
|SELECT|An SQL keyword that queries for a particular record or group of records from a table.|648|
|Selection control structure|A component of a computer program that tells a computer what to do, depending on whether a condition is true or false (also called decision structure or branch).|697|
|Self-executing zip file|A type of compressed file that can be run to unzip the file or files contained within it.|157|
|Self-installing executable file|A program that automatically unzips and then initiates its setup program.|157|
|Semi-structured problem|A problem for which a general procedure has been established, but which requires some degree of discretionary judgment to arrive at a solution.|558|
|Semiconducting materials|(Semiconductors) Substances, such as silicon or germanium, that can act either as a conductor or insulator. Used in the manufacture of computer chips.|27|
|Sequence control structure|A programming construct that alters the order in which instructions are executed.|695|
|Sequence diagram|A tool used by a project team that depicts the detailed interactions that take place within an information system.|574|
|Sequential access|A characteristic of data storage, usually on computer tape, that requires a device to read or write data one record after another, starting at the beginning of the medium.|77|
|Sequential execution|The computer execution of program instructions performed in the sequence established by a programmer.|695|
|Serial processing|Processing of data one instruction at a time, completing one instruction before beginning another.|69|
|Server|A computer or software on a network that supplies the network with data and storage.|18|
|Server operating system|A type of operating system, sometimes called a network operating system, that provides management tools for distributed networks, e-mail servers, and Web hosting sites.|187|
|Server-side program|A program or scripting statement that resides on a Web server and acts as an intermediary between a user's browser and a DBMS.|628|
|Server-side script|Scripting statements that are executed by a Web server in response to client data.|372|
|Service companies|Companies that provide computer-related services such as consulting or support.|498|
|Service pack|A collection of patches designed to correct bugs and/or add features to an existing software program.|159|
|Setup program|A program module supplied with a software package for the purpose of installing the software.|154|
|Shared resources|On a network, resources such as hardware, software, and data, made available for authorized users to share.|274|
|Shareware|Copyrighted software marketed under a license that allows users to use the software for a trial period and then send in a registration fee if they wish to continue to use it.|149|
|Shrink-wrap license|A legal agreement printed on computer software packaging, which becomes binding when the package is opened.|147|
|Signal scrambling|A technique that encrypts or otherwise disrupts broadcast signals so that they have to be unscrambled before they are sensible.|465|
|Signed code|Program code that has an associated digital certificate identifying the programmer; used to reduce susceptibility to malware.|727|
|SIMULA|(SIMUlation LAnguage) Believed to be the first object-oriented programming language.|679|
|Single-user license|Legal permission for one person to use a particular software package.|147|
|Single-user operating system|A type of operating system that is designed for one user at a time using one set of input devices.|187|
|Site license|Legal permission for software to be used on any and all computers at a specific location (for example, within a corporate building or on a university campus).|147|
|Slide rule|A manual calculator invented by William Oughtred that uses John Napier's logarithms to perform complex engineering and scientific calculations.|487|
|Smart phone|A handheld device that integrates the functions of a mobile phone, PDA, portable music player, or other digital device.|20|
|Smileys|Text-based symbols used to express emotion.|396|
|SMTP server|(Simple Mail Transfer Protocol Server) A computer used to send e-mail across a network or the Internet.|398|
|Sniffing|In the context of computer hacking, a technique that uses packet sniffer software to capture packets as they are sent over a network.|37|
|Socket|A communication path between two remote programs.|364|
|Software|The instructions that direct a computer to perform a task, interact with a user, or process data.|15|
|Software customization|The process of modifying a commercially available software application to meet the needs of a specific user or organization.|583|
|Software engineering|The process of developing software using systematic mathematical, engineering, and management techniques.|515|
|Software installation|The process by which programs and data are copied to the hard disk of a computer system and otherwise prepared for access and use.|153|
|Software license|A legal contract that defines the ways in which a user may use a computer program.|147|
|Software patch|A section of software code designed to modify an existing program to fix a specific error or add a feature.|159|
|Software publishers|Companies that produce computer software.|498|
|Software suite|A collection of individual applications sold as one package.|144|
|Solid state storage|A technology that records data and stores it in a microscopic grid of cells on a non-volatile, erasable, low-power chip.|84|
|Sort key|A field used to arrange records in order.|639|
|Sort order|In a database table, the order in which records are stored on disk.|639|
|Sound card|A circuit board that gives the computer the ability to accept audio input from a microphone, play sound files, and produce audio output through speakers or headphones.|423|
|Source code|Computer instructions written in a high-level language.|29|
|Spam|Unsolicited e-mail typically sent as a bulk or mass-mailing and often used for fraudulent or deceptive marketing.|403|
|Spam filter|Software that identifies unsolicited and unwanted e-mail messages and blocks them from the recipient's Inbox.|404|
|Speech recognition|The process by which computers recognize voice patterns and words, then convert them to digital data.|428|
|Speech synthesis|The process by which computers produce sound that resembles spoken words.|428|
|Spelling checker|A feature of document production software that checks each word in a document against an electronic dictionary of correctly spelled words, then presents a list of alternatives for possible misspellings.|126|
|Spelling dictionary|A data module that is used by a spelling checker as a list of correctly spelled words.|126|
|Spreadsheet|A numerical model or representation of a real situation, presented in the form of a table.|130|
|Spreadsheet software|Software for creating electronic worksheets that hold data in cells and perform calculations based on that data.|130|
|Spyware|Any software that covertly gathers user information without the user's knowledge, usually for advertising purposes.|164|
|SQL|A popular query language used by mainframes and microcomputers.|645|
|SQL keywords|A collection of command words that issue instructions to an SQL database.|646|
|SQL query|A command created using SQL database client software that operates directly on the record in a database.|645|
|SSID|(Service Set IDentifier) A code that identifies a wireless network and is attached to every packet that travels on that network.|272|
|SSL|(Secure Sockets Layer) A security protocol that uses encryption to establish a secure connection between a computer and a Web server.|389|
|Star topology|A network configured with a central connection point or hub for all workstations and peripherals.|250|
|Stateless protocol|A protocol, such as HTTP, that allows one request and response per session.|365|
|Static IP address|A permanently assigned and unique IP address, used by hosts or servers.|306|
|Static Web publishing|A simple way to display the data in a database by converting a database report into an HTML document.|627|
|Statistical software|Software for analyzing large sets of data to discover patterns and relationships within them.|133|
|Storage|The area in a computer where data is retained on a permanent basis.|15|
|Storage density|The closeness of the particles on a disk surface. As density increases, the particles are packed more tightly together and are usually smaller.|77|
|Storage device|A mechanical apparatus that records data to and retrieves data from a storage medium.|76|
|Storage medium|The physical material used to store computer data, such as a floppy disk, a hard disk, or a CD-ROM.|76|
|Store-and-forward|A technology used by communications networks in which an e-mail message is temporarily held in storage on a server until it is requested by a client computer.|397|
|Stored program|A set of instructions that resides on a storage device, such as a hard drive, and can be loaded into computer memory and executed.|16|
|Strategic planning|The process of developing long-range goals and plans for an organization.|557|
|Streaming audio|An audio file format that allows the audio clip to begin before the file is entirely downloaded.|425|
|Streaming video|An Internet video technology that sends a small segment of a video file to a user's computer and begins to play it while the next segment is being sent.|459|
|Street price|The average discounted price of a product.|503|
|Strong encryption|Encryption that is difficult to decrypt or "break" without the encryption key.|285|
|Structured English|Vocabulary and syntax used by systems analysts to concisely and unambiguously explain the logic of a process. It is limited to words defined in a data dictionary and to specific logical terms such as "if...then".|692|
|Structured file|A file that consists of a collection of data organized as a set of similarly structured records.|614|
|Structured methodology|A method of developing an information system that focuses on the processes that take place within the information system.|570|
|Structured problem|A problem for which there exists a well-established procedure for obtaining the best solution.|558|
|Style|A feature in many desktop publishing and word processing programs that allows the user to apply numerous format settings with a single command.|128|
|Subclass|In object-oriented programming, a subclass is derived from a superclass and inherits its attributes and methods.|704|
|Subdirectory|A directory found under the root directory.|206|
|Submenu|A user interface element that emerges after a menu is selected to offer additional options.|191|
|Subroutine|A section of code that performs activities or manipulates data but is not included in the main sequential execution path of a program.|696|
|Success factors|System requirements that also serve as an evaluation checklist at the end of a development project.|571|
|Summary report|A report generated by a management information system that combines or groups data and usually provides totals, such as a report of total annual sales for the past five years.|561|
|Super distribution|A concept incorporated into Microsoft DRM that allows users to share protected media with others who can access it after they obtain their own license for it.|471|
|Superclass|In object-oriented programming, a superclass can provide attributes and methods for subclasses.|704|
|Supercomputer|The fastest and most expensive type of computer, capable of processing trillions of instructions per second.|18|
|Surge strip|A device that filters out electrical spikes that could damage computer equipment.|100|
|SVG|(Scalable Vector Graphics) A graphics format designed specifically for Web display that automatically re-sizes when displayed on different screens.|448|
|SVGA|(Super Video Graphics Array) Typically refers to 800 x 600 resolution.|91|
|SXGA|(Super eXtended Graphics Array) A screen resolution of 1280 x 1024.|91|
|Symbian OS|An operating system typically used on mobile phones and open to programming by third-party developers.|203|
|Symmetric Internet connection|Any connection to the Internet in which the upstream speed is the same as the downstream speed.|311|
|Symmetric key encryption|An encryption key that is used for both encryption and decryption of messages.|286|
|Syntax|In the context of programming languages, syntax refers to the grammar rules that create valid program statements.|676|
|Syntax error|An error that results when an instruction does not follow the syntax rules, or grammar, of the programming language.|685|
|Synthesized sound|Artificially created sound, usually found in MIDI music or synthesized speech.|426|
|System board|The main circuit board in a computer which houses chips and other electronic components.|28|
|System conversion|The process of deactivating an old information system and activating a new one.|586|
|System development life cycle|(SDLC) The series of phases that outlines the development process of an information system.|566|
|System documentation|Descriptions of the features, hardware architecture, and programming of an information system written for programmers, designers, and analysts who maintain the system.|585|
|System operator|The person responsible for the day-to-day operation of a computer--usually a mainframe or supercomputer.|588|
|System palette|A selection of colors that are used by an operating system to display graphic elements.|438|
|System requirements|The criteria for developing a successful information system; compiled into a System Requirements Report at the conclusion of the analysis phase.|145, 571|
|System Requirements Report|A report generated at the conclusion of the analysis phase by a project team that has studied a system and determined the system requirements.|572|
|System software|Computer programs, such as an operating system or utility software, that help the computer carry out essential operating tasks.|16|
|System testing|The process of testing an information system to ensure that all the hardware and software components work together.|584|
|System unit|The case or box that contains the computer's power supply, storage devices, main circuit board, processor, and memory.|57|
|Systems analysis and design|The process of planning and building an information system.|566|
|Systems analyst|A computer professional responsible for analyzing requirements, designing information systems, and supervising the implementation of new information systems.|510|
|Systems programmer|The person responsible for installing, modifying, and troubleshooting the operating system of a mainframe or supercomputer.|588|
|Table|(1) An arrangement of data in a grid of rows and columns. (2) In a relational database, a collection of record types with their data.|129, 618|
|Tablet computer|A small, portable computer with a touch-sensitive screen that can be used as a writing or drawing pad.|59|
|Tactical planning|Short- or near-term decisions and goals that deploy the human, financial, and natural resources necessary to meet strategic goals.|557|
|Tape drive|A device that stores data on magnetic tape.|80|
|Taskbar|A graphical user interface element usually displayed near the bottom of the screen to help users launch and monitor applications.|190|
|Tax preparation software|Personal finance software that is specifically designed to assist with tax preparation.|133|
|TCP|(Transmission Control Protocol) The protocol within TCP/IP that is responsible for establishing a data connection between two hosts and breaking data into packets.|305|
|TCP/IP|(Transmission Control Protocol/Internet Protocol) The primary protocol suite for transmitting messages over the Internet.|305|
|Technical support specialist|A computer professional who provides phone or online help to customers of computer companies and software publishers.|511|
|Technical writer|A person who specializes in writing explanations of technical concepts and procedures.|512|
|Telecommuting|The act of using available technologies, such as computers, telephones, and the Internet, to work from home or another off-site location.|513|
|Temporal compression|A data compression scheme that, when applied to video or audio data, eliminates unnecessary data between video frames or audio samples.|458|
|Test area|A portion of a computer system where software testing can occur without disrupting an organization's regular information system.|584|
|Text data type|A data type used for fixed-length fields that hold character data such as people's names or CD titles.|634|
|Text-to-speech software|Software that generates speech based on written text that is played back through a computer's sound card.|428|
|Thesaurus|A feature of documentation software that provides synonyms.|127|
|Third-generation computers|Computers characterized by using integrated circuits instead of transistors or vacuum tubes for data processing.|493|
|Third-generation languages|Programming languages, such as FORTRAN, BASIC, and COBOL, that followed assembly languages and provided English-like keywords.|677|
|Threat modeling|A component of defensive programming that helps programmers identify ways in which their programs might be compromised.|725|
|TIFF|(Tag Image File Format) A bitmap image file format with a .tif extension that automatically compresses the file data.|442|
|Time shifting|The practice of recording digital content for later playback.|465|
|TLS|(Transport Layer Security) An update of the Secure Sockets Layer (SSL) protocol for encrypting data before it is transmitted over a network.|389|
|Toolbar|A component of graphical user interfaces that displays icons representing tools, commands, and other options.|190|
|Top-level domain|A major domain category into which groups of computers on the Internet are divided, such as com, edu, gov, int, mil, net, and org.|307|
|Touch screen|A display device that accepts input from being touched with a stylus or fingertip.|89|
|TQM|(Total Quality Management) The process by which an organization analyzes and implements ways to improve the quality of its products and/or services.|569|
|Traceroute|A network utility that records a packet's path, the number of hops, and the time it takes for the packet to make each hop.|310|
|Tracing software|Software that locates the edges of objects in a bitmap graphic and converts the resulting shape into a vector graphic.|447|
|Trackball|An input device that looks like an upside down mouse. The user rolls the ball to move the on-screen pointer.|89|
|Trackpad|A touch-sensitive surface on which you slide your fingers to move the on-screen pointer.|89|
|Tracks|A series of concentric or spiral storage areas created on a storage medium during the formatting process.|218|
|Transaction|An exchange between two parties that can be recorded and stored in a computer system.|559|
|Transaction processing system|(TPS) A system that keeps track of transactions for an organization by providing ways to collect, display, modify, and cancel transactions.|559|
|Transceiver|A combination of a transmitter and a receiver used to send and receive data in the form of radio frequencies.|265|
|Transistors|A computer processing technology created by Bell Laboratories in 1947, characterizing second generation computers, which replaced vacuum tubes for data processing.|492|
|Tree topology|Multiple star networks connected into a bus configuration by a backbone.|250|
|Trojan horse|A computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password.|163|
|True Color bitmap|A color image with a color depth of 24 bits or 32 bits. Each pixel in a True Color image can be displayed using any of 16.7 million different colors.|437|
|Turnkey system|A complete information system that consists of both hardware and commercial software.|578|
|U3 drive|A specially formatted USB flash drive that autoplays when inserted and requires special U3 versions of application software.|85|
|Ultra-mobile PC|(UMPC) A small form-factor PC with a touch-sensitive screen.|59|
|UML|(Unified Modeling Language) A tool for diagramming a set of object classes.|573|
|Unicode|A 16-bit character-representation code that can represent more than 65,000 characters.|25|
|Uninstall routine|A program that removes software files, references, and registry entries from a computer's hard disk.|160|
|Unit testing|The process of testing a completed application module to make sure that it operates reliably and correctly.|584|
|UNIVAC|The first commercially successful digital computer.|491|
|UNIX|A multiuser, multitasking server operating system developed by AT&T Bell Laboratories in 1969.|201|
|Unstructured file|A file that contains data, but that is not in a structured format of fields and records.|614|
|Unstructured problem|A problem for which there is no established procedure for arriving at a solution.|558|
|Unzipped|Refers to files that have been uncompressed.|156|
|UPDATE|An SQL keyword used to alter the values in a database record.|650|
|UPS|(Uninterruptible Power Supply) A battery-backed device designed to provide power to a computer during blackouts, brownouts, or other electrical disruptions.|100|
|Upstream speed|The rate at which data is transmitted from your home computer to the Internet.|311|
|URL|(Uniform Resource Locator) The address of a Web page.|361|
|USB|(Universal Serial Bus) A high-speed bus commonly used for connecting peripheral devices to computers.|94|
|USB flash drive|A portable solid state storage device nicknamed "pen drive" or "keychain drive" that plugs directly into a computer's USB port.|85|
|Use case|Tasks performed by an actor in an information system.|573|
|Use case diagram|Documentation of the users of an information system and their functions.|573|
|User documentation|Descriptions of how to interact with an information system or program, including instructions on use, features, and troubleshooting.|585|
|User ID|A combination of letters and numbers that serves as a user's "call sign" or identification. Also referred to as a username.|34|
|User interface|The software and hardware that enable people to interact with computers.|189|
|User privileges|A set of assigned rights that specify what data is accessible to a particular user on a network or on a database.|655|
|Utility software|A type of system software provided by the operating system or third-party vendors that specializes in tasks such as system maintenance, security, or file management.|122|
|UXGA|(Ultra eXtended Graphics Array) A screen resolution of 1600 x 1200.|91|
|Vacuum tube|An electronic device that controls the flow of electrons in a vacuum and represents binary data; used in the construction of first generation computers.|491|
|Value|A number used in a calculation.|130|
|Vaporware|Software or other products that are announced, but never produced.|503|
|VAR|(Value-Added Reseller) A company that combines one product with additional hardware, software, and/or services to create a system designed to meet the needs of specific customers or industries.|508|
|Variable|A named storage location that is capable of holding data, which can be modified during program execution.|680|
|Variable-length field|A field in a data file that can expand to accept any number of characters up to a maximum limit.|615|
|VDE|(Visual Development Environment) Programming tools that allow programmers to build substantial parts of computer programs by pointing and clicking, rather than entering code.|683|
|Vector graphic|An image generated from descriptions that specify the position, length, and direction in which lines and shapes are drawn.|444|
|Vertical market software|Computer programs designed to meet the needs of a specific market segment or industry, such as medical record-keeping software for use in hospitals.|142|
|VGA|(Video Graphics Array) A screen resolution of 640 x 480.|91|
|Video capture|The process of converting analog video signals into digital data stored on a hard drive.|454|
|Video editing software|Software that provides tools for capturing and editing video from a camcorder.|140|
|Videocasting|Online delivery of a video clip as an Atom or RSS feed; also referred to as video podcasting or vodcasting.|361|
|Videoconferencing camera|(Also called a Web camera.) An inexpensive digital camera that attaches directly to a computer and creates a video by capturing a series of still images.|453|
|Videogame console|A computer specifically designed for playing games using a television screen and game controllers.|17|
|Viewable image size|(vis) A measurement of the maximum image size that can be displayed on a monitor screen.|90|
|Viewing angle width|The angle at which you can clearly see the screen image from the side.|90|
|Virtual machine|Software that creates an operating environment that emulates another computer platform; as an example, Parallels Desktop creates a virtual PC on an Intel Macintosh computer.|199|
|Virtual memory|A computer's use of hard disk storage to simulate RAM.|72|
|Virtual private network|(VPN) A network connection that typically carries encrypted data over the Internet to and from a remote access server.|345|
|Virus definitions|A group of virus signatures used by antivirus software to identify and block viruses and other malware.|168|
|Virus hoax|A message, usually e-mail, that makes claims about a virus problem that doesn't actually exist.|166|
|Virus signature|The unique computer code contained in a virus that security software uses to identify it.|167|
|VisiCalc|First released on the Apple II, VisiCalc was the first electronic spreadsheet.|495|
|Visual Basic|An event-driven programming environment where the programmer designs forms graphically and codes procedures in BASIC which responds to all form options.|679|
|VOB|(Video OBject) An industry-standard video format for standalone DVD players.|457|
|Voiceband modem|The type of modem typically used to connect a computer to a telephone line.|312|
|VoIP|(Voice over Internet Protocol) Hardware, software, and protocols used to make telephone-style calls over the Internet. Also referred to as Internet telephony.|332|
|Volatile|A term that describes data (usually in RAM), which can exist only with a constant supply of power.|72|
|Walkthrough|In the context of programming, a method of verifying that an algorithm functions properly when using realistic test data.|694|
|WAN|(Wide Area Network) An interconnected group of computers and peripherals that covers a large geographical area, such as multiple branches of a corporation.|247|
|WAP|(Wireless Access Protocol) A communications protocol that provides Internet access for handheld devices.|327|
|Waterfall SDLC|A series of phases that outlines the development process of an information system where each phase is a discrete step in the development process.|566|
|Wave|An audio file format with .wav extension that was Windows' original "native" sound format.|424|
|Wavetable|A set of pre-recorded musical instrument sounds in MIDI format.|426|
|WBS|(Work Breakdown Structure) A project management tool based on a hierarchical structure of tasks and deliverables.|570|
|Weak encryption|Encryption that is relatively easy or simple to decrypt without the encryption key.|285|
|Web|Short for World Wide Web. An Internet service that links documents and information from computers located worldwide, using the HTTP protocol.|7,|
|Web 2.0|A group of new and innovative ways to use the Web, such as for social networking, blogging, and wikis.|361|
|Web application|(Web app) Application software that is accessed and used from within a browser.|158|
|Web authoring software|Computer programs for designing and developing customized Web pages that can be published electronically on the Internet.|125|
|Web browser|A program that communicates with a Web server and displays Web pages.|361|
|Web bug|A small graphic on a Web page that installs cookies designed to track your online activities. Also known as a Clear GIF.|402|
|Web cache|A collection of Web pages and associated graphics that have been accessed and are temporarily stored locally to speed up subsequent access to them.|367|
|Web crawler|The component of a search engine that autonomously visits Web sites collecting Web page data that will be indexed and available for searching.|375|
|Web page|Information displayed by a Web browser that's produced from an HTML document or generated on the fly from data in a database.|361|
|Web palette|A standard selection of colors that all Internet browsers can display.|438|
|Web portfolio|A hypertext version of a resume containing links to Web sites of former employers or schools.|519|
|Web search engine|A program that uses keywords to find information on the Internet and returns a list of links to relevant documents.|374|
|Web server|A computer that listens for queries from Web browsers and transmits HTML documents over the Internet.|361|
|Web site|A Web address that holds a collection of information identified by a common domain name, such as www.cnn.com.|360|
|Web site designer|A computer professional who creates, tests, posts, and modifies HTML documents and other data for a Web site.|511|
|Web-based e-mail|An e-mail system that allows users to access e-mail messages using a browser.|397|
|Web-based video|Digital video designed to be accessed using a browser and played on a computer.|452|
|WEP|(Wired Equivalent Privacy) An encryption algorithm used to protect data on Wi-Fi networks.|283|
|What-if analysis|The process of setting up a model in a spreadsheet and experimenting to see what happens when different values are entered.|130|
|Whistleblowing|The disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace.|532|
|Wi-Fi|An Ethernet-compatible wireless network that uses 802.11a, b, g, and n standards.|268|
|Wi-Fi adapter|A type of network interface card that includes a transmitter and a receiver using Wi-Fi protocols.|269|
|Wi-Fi hotspot|The geographical area in which you can connect to a Wi-Fi signal, such as a Wi-Fi equipped campus or coffeehouse.|323|
|Wiki|Software that allows users to collaborate to create, change, and link Web pages. Used for applications such as Wikipedia and open source project management.|361|
|WiMAX|Fixed wireless Internet service based on Ethernet protocols with range of 30 miles and transmission speed of 70 Mbps.|320|
|Window|An element of graphical user interfaces that is rectangular in shape and displays the controls for a program or a dialog box.|189|
|Windows Explorer|A file management utility included with most Windows operating systems that helps users manage their files.|216|
|Windows Media DRM|Microsoft's digital rights management technology.|470|
|Windows Mobile OS|An operating system designed by Microsoft for handheld computers.|203|
|Windows Registry|A crucial set of data files maintained by the operating system that contains the settings needed by a computer to correctly use any hardware and software that has been installed.|154|
|Wired network|A network that uses cables or wires to transmit data from one network device to another.|256|
|Wireframe|A representation of a 3-D object using separate lines, which resemble wire, to create a model.|449|
|Wireless access point|A network device that connects several devices of a local area network by broadcasting signals to any device with compatible Wi-Fi cards.|270|
|Wireless ad-hoc network|A wireless network in which devices broadcast directly to each other instead of to a central access point.|270|
|Wireless encryption|A security measure for wireless networks that scrambles data transmitted between network devices.|283|
|Wireless infrastructure network|A wireless network in which devices communicate through a central access point.|270|
|Wireless network|Networks that use radio or infrared signals (instead of cables) to transmit data from one network device to another.|265|
|Wireless network key|The encryption key used to encrypt and decrypt data that travels over a wireless network protected by WEP, WPA, or WPA2.|284|
|Wireless router|A network device that contains circuitry for a wireless access point and routing data to the Internet.|270|
|WMA|(Windows Media Audio) A file format with a .wma extension that is promoted by Microsoft and provides highly compressed audio files with very little loss of sound quality.|424|
|Word processing software|Computer programs that assist the user in producing documents, such as reports, letters, papers, and manuscripts.|125|
|Word size|The number of bits that a CPU can manipulate at one time, which is dependent on the size of the registers in the CPU, and the number of data lines in the bus.|68|
|Workers|People who perform the tasks necessary to carry out an organization's mission.|557|
|Worksheet|A computerized, or electronic, spreadsheet.|130|
|Workstation|(1) A computer connected to a local area network. (2) A powerful desktop computer designed for specific tasks.|17|
|WPA|(Wi-Fi Protected Access) A method for encrypting data transmitted over wireless networks.|283|
|WQXGA|(Wide Quad eXtended Graphics Array) 2560 x 1600 resolution.|91|
|WUXGA|(Widescreen Ultra eXtended Graphics Array) A display resolution of 1920 X 1200 pixels.|91|
|Xerox Alto|An early personal computer prototype, developed by Xerox Corp. that featured, among other things, a graphical user interface that became influential in the development of the Apple Macintosh.|495|
|XForms|A database technology that provides an alternative to HTML forms by providing more flexibility and an interface to XML documents.|629|
|XGA|(Extended Graphics Array) Usually refers to 1024 x 768 resolution.|91|
|XHTML|A markup language very similar to HTML, but more customizable.|362|
|XML|(eXtensible Markup Language) A document format similar to HTML, but that allows the Web page developer to define customized tags, generally for the purpose of creating more interactivity.|630|
|XML DBMS|A database management system that provides authoring and query tools for designing and managing collections of XML documents.|625|
|Z3|An early electronic computer prototype designed by Konrad Zuse that was the first to incorporate the use of binary numbers for data representation.|489|
|Zipped|Refers to one or more files that have been compressed.|156|
|Zombie|A computer that has been compromised by malware that allows it to be controlled by a remote user.|164|