The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by psskvpjb, 2021-03-30 02:40:49

RU2 - Vermaat,_Sebok,_Freund,_Campbell

RU2 - Vermaat,_Sebok,_Freund,_Campbell

IND 12 Index

decoding: Processor operation in the machine cycle that Java, C#, and Objective C, and toolkits for various
translates the instruction into signals the computer can platforms. See also Desktop or mobile application
execute., 281 developer, 570

decrypt: The process of decoding encrypted data., 229 desktop publishing software: An application that ena-
bles designers to create sophisticated publications that
dedicated line: A type of always-on physical connection that contain text, graphics, and many colors. DTP for
is established between two communications devices., 466 short., 180

dedicated servers (table), 116 detailed analysis: Activity during system development
that involves three major activities: (1) study how the
defragmenting: Reorganizing the contents of a hard disk current system works, (2) determine the users’ wants,
so that the files are stored in contiguous sectors., 197 needs, and requirements, and (3) recommend a solu-
tion., 522. See also logical design
hard disks, 197
detailed report: Report generated by a management
deliverable: Any tangible item, such as a chart, diagram, information system that usually lists just transactions.,
report, or program file., 518 558

denial of service attack (DoS attack): An assault whose developing programs, applications, 29
purpose is to disrupt computer access to an Internet
service such as the web or email., 251 device-dependent: A program is one that runs only
on a specific type or make of computer or mobile
density: The number of bits in an area on a storage device., 425
medium., 374
device driver: A small program that tells the operating
design phase: Step in the system development life cycle system how to communicate with a specific device.,
that consists of two major activities: (1) if necessary, 419. See also driver
acquire hardware and software and (2) develop all of the
details of the new or modified information system., 523 device-independent: Operating systems that run on
computers and mobile devices provided by a variety of
desktop: A personal computer designed to be in a sta- manufacturers., 425
tionary location, where all of its components fit on or
under a desk or table. Also called a desktop computer., devices
6, 114, 428
game, 10, 131–132
buyer’s guide for, 115
recycling, refurbishing, 242
components in, 278
dial-up access: Internet connection that takes place
motherboard of, 279 when a modem in a computer connects to the Internet
via a standard telephone line that transmits data and
desktop app: Applications stored on a computer., 28 informa- tion using an analog (continuous wave
p­ attern) signal., 60
desktop as a service, 287
dial-up modem: A communications device that converts
desktop case, fans, 301 digital signals to analog signals and analog signals to
digital signals, so that data can travel along an analog
desktop computers, 114–115 phone line., 469

desktop monitors, 325 differential backup: Backup method that copies only the
files that have changed since the last full backup. (or)
desktop operating system: A complete operating system Fast backup method that requires minimal storage
that works on desktops, laptops, and some tablets., space to back up., 234, 396
426–428. See also stand-alone operating system
digital camera: A mobile device that allows users to take
Macintosh operating system (Mac OS), 427–428 pictures and store the photographed images digitally.,
8, 125–127, 325
vs. mobile, 435–436
vs. smartphones and tablets, 8
Windows, 426–427
digital certificate: A notice that guarantees a user or a
desktop or mobile application developer: Employee website is legitimate., 231
who converts the system design into the appropriate
application development language, such as Visual Basic, verifying authenticity with, 231
Java, C#, and Objective C, and toolkits for various
platforms. See also Desktop or mobile application digital communications, 450–451
p­ rogrammer, 570

desktop or mobile application programmer: Employee
who converts the system design into the appropriate
application development language, such as Visual Basic,

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 13

digital device convergence, 10 digital video (DV) camera: Camera that records video
as digital signals, which you can transfer directly to a
digital forensics: The discovery, collection, and analysis computer or mobile device with the appropriate
of evidence found on computers and networks., 227. c­ onnection., 330
See also cyberforensics
Digital Video Interface port: Port that enables digital
digital forensics analyst: Employee who inspects signals to transmit directly to a monitor., 343. See also
­electronic data to recover documents and files from DVI port
data storage devices that may have been damaged or
deleted, in order to use them as evidence in a crime digital video security, 333
investigation., 570
digitizer: An electronic plastic board that detects and
digital forensics examiner: Employee who collects and converts movements of a stylus or digital pen into digi-
analyzes evidence found on computers, networks, tal signals that are sent to the computer., 328. See also
mobile devices, and databases., 569 graphics tablet

digital light processing projector: Data projector that uses direct access: Access method where a device can locate a
tiny mirrors to reflect light, which produces crisp, bright, particular data item or file immediately, without having
colorful images that remain in focus and can be seen clearly, to move consecutively through items stored in front of
even in a well-lit room., 352. See also DLP projector the desired data item or file., 392. See also random
access
digital literacy: Having a current knowledge and under-
standing of computers, mobile devices, the web, and direct conversion: Conversion strategy where the user
related technologies., 2, 561 stops using the old system and begins using the new
system on a certain date., 526
digital media: Music, photos, and videos., 8
disaster recovery plan: A written plan that describes the
digital media player, 9 steps an organization would take to restore its com-
puter operations in the event of a disaster., 234
digital modem: A communications device that sends and
receives data and information to and from a digital disc burning software: Software that writes text, graph-
line., 468. See also broadband modem ics, audio, and video files on a recordable or rewritable
disc., 185
digital pen: An input device, slightly larger than a stylus,
that captures and converts a user’s handwriting or discoverable mode: State of a Bluetooth device when it
drawings into a digital format, which users can upload is waiting for another Bluetooth device to locate its
(transfer) to a computer or mobile device., 327 signal., 137

digital photo printer: Printer that uses heat to transfer Discovering Computers Twitter feed, 78
colored dye to specially coated paper., 349. See also
dye-sublimation printer discussion forum: An online area in which users have
written discussions about a particular subject., 91.
digital: Representation of data using only two discrete
states: on (1) and off (0)., 288 disc vs. disk, 17

digital rights management (DRM): A strategy designed disk cleanup: Tool that searches for and removes
to prevent illegal distribution of movies, music, and u­ nnecessary files., 196, 422
other digital content. DRM for short., 240, 574
disk defragmenter: A tool that reorganizes the files and
digital school, 35–36 unused space on a computer’s hard disk so that the
operating system accesses data more quickly and
digital security and privacy, 24–26 ­programs and apps run faster., 197, 422

digital security risk: Any event or action that could disk vs. disc, 17
cause a loss of or damage to computer or mobile
device hardware, software, data, information, or pro- display: An output device that visually conveys text, graphics,
cessing capability., 212 and video information., 340–344. See also display device

digital signature: An encrypted code that a person, measuring, 341
website, or organization attaches to an electronic
message to verify the identity of the message sender., 231 quality of, 342–343

digital subscriber line: Broadband Internet connection technologies, 341–342
provided through the telephone network via a DSL
modem., 59, 467. See also DSL display device: An output device that visually conveys
text, graphics, and video information., 340. See also
digital television (DTV), 343–344 display

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 14 Index

DisplayPort: Port that is an alternative to DVI and also double-click, 13
supports high-definition audio and video., 343
double-tap: Touch gesture in which a user quickly
displays, 15 touches and releases one finger two times., 5

distributed database: Database in which the data exists downlink: Transmission from a satellite to an earth-based
in many separate locations throughout a network or station, 482
the Internet., 508
downloading: The process of transferring content from
distributed DoS attack (DDoS attack): Type of DoS the Internet to a computer or mobile device., 21
attack in which a zombie army is used to attack
­computers or computer networks., 217. See also applications, 29
DDoS attack
digital media from online services, 87
distribution software, 177
software safely, 162
DLP projector: Data projector that uses tiny mirrors to
reflect light, which produces crisp, bright, colorful downstream rate: The transfer rate that is achieved
images that remain in focus and can be seen clearly, when data is being sent over a communications
even in a well-lit room., 352. See also digital light pro- c­ hannel., 462
cessing projector
dpi: One measurement of ink-jet printer resolution., 346.
DMS: System that allows for storage and management of See also dots per inch
a company’s documents, such as word processing docu-
ments, presentations, and spreadsheets., 556. See also drag: Touch gesture in which a user presses and holds
document management system one finger on an object and then moves the finger to
the new location., 5, 13. See also Slide
DNS server: A server on the Internet that usually is asso-
ciated with an ISP. Short for domain name system., 64 DRAM: RAM chips that must be reenergized constantly
or they lose their contents., 292. See also dynamic
Dock, 428 RAM

docking station: An external device that attaches to a driver: A small program that tells the operating system
mobile computer or device and contains a power how to communicate with a specific device., 419. See
­connection and provides connections to peripheral also device driver
devices., 136
DSL: Broadband Internet connection provided through
documentation: The collection and summarization of the telephone network via a DSL modem., 59, 467. See
data, information, and deliverables., 519 also digital subscriber line

document management software: An application that DSL modem: A broadband modem that sends digital
provides a means for sharing, distributing, and search- data and information from a computer to a DSL line
ing through documents by converting them into a for- and receives digital data and information from a DSL
mat that can be viewed by any user., 176 line., 469

document management system: System that allows for DTP software, 180
storage and management of a company’s documents,
such as word processing documents, presentations, and DVD kiosk: A self-service DVD rental machine
spreadsheets., 556. See also DMS that connects to a host computer through a network.,
120
domain name: A text-based name that corresponds to
the IP address of a server that hosts a website., 63 DVD+RAM: DVD-rewritable formats that users can
write on multiple times., 388
domain name server, 116
DVD+R: DVD-recordable WORM formats, on
domain name system (DNS): The method that the which users can write once but not erase their own
Internet uses to store domain names and their corre- items, including video, audio, photos, graphics, and
sponding IP addresses., 64 text., 388

dongle: Small device that connects to a computer and DVD-R: DVD-recordable WORM formats, on
acts as a modem., 58 which users can write once but not erase their own
items, including video, audio, photos, graphics, and
dot pitch: The distance in millimeters between pixels on text., 388
a display., 342. See also pixel pitch
DVD-ROM: DVD-read-only memory; a high-capacity
dots per inch: One measurement of ink-jet printer optical disc that users can read but not write on or
r­ esolution., 346. See also dpi erase., 388

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 15

DVD+RW: DVD-rewritable formats that users can write photos, 181
on multiple times., 388
edit: Process in project development during which you
DVD-RW: DVD-rewritable formats that users can write make changes to a project’s existing content., 165
on multiple times., 388
education
DVDs as optical discs, 18
applications, 186
DVI port: Port that enables digital signals to transmit
directly to a monitor., 343. See also Digital Video cyberbullying in schools, 94
Interface port
Internet plagiarism, 165
DV technology: Technology used with DV (digital
video) cameras that allows you to input, edit, manage, technology in, 35
publish, and share your videos., 330, 331
wikis in, 40
dye-sublimation printer: Printer that uses heat to trans-
fer colored dye to specially coated paper., 349. See also educational websites, 77
digital photo printer
education web database services, 507
Dynamic RAM: RAM chips that must be reenergized
constantly or they lose their contents., 292. See also e-filing: The process of filing your tax forms electroni-
DRAM cally., 176

dynamic webpage: A webpage on which visitors can e-form: Short for electronic form; a form that sends
­customize some or all of the viewed content., 65 entered data across a network or the Internet., 512

E EFT: Service in which users connected to a network can
exchange money from one account to another via trans-
earbuds: Small speakers that rest inside each ear canal., mission media., 453. See also electronic funds transfer
8, 9, 16, 128, 352
EIDE: Enhanced Integrated Drive Electronics; interface
EarPods: Term used by Apple to refer to earbuds that uses parallel signals to transfer data, instructions,
they designed to match the shape of the human and information., 380
ear., 128
Electronic Communications Privacy Act (ECPA), 474
easier access, database approach, 506
electronic data interchange: Standard that defines how
eavesdropping, 395 business documents transmit across transmission
media., 453. See also EDI
e-book: An electronic version of a printed book, readable
on computers and other digital devices. Also called a electronic funds transfer: Service in which users connected
digital book., 9, 129 to a network can exchange money from one account to
another via transmission media., 453. See also EFT
e-book reader: A mobile device that is used primarily for
reading e-books and other digital publications. Short electronic profiles, 242–243
for electronic book reader., 129. See also e-reader
electronics recycling, 122
vs. smartphones and tablets, 9
electronic storefront: In e-commerce applications, web-
e-commerce: A business transaction that occurs over an page that contains product descriptions, images, and a
electronic network such as the Internet. Short for shopping cart., 81
­electronic commerce., 82
email: The transmission of messages and files via a com-
economic feasibility: Test that measures whether the puter network. Short for electronic mail., 24, 31, 88
lifetime benefits of the proposed information system
will be greater than its lifetime costs., 519. See also address book, 74
cost/benefit feasibility
avoiding malware infections, 110
EDI: Standard that defines how business documents
transmit across transmission media., 453. See also communications applications, 188
e­ lectronic data interchange
employers monitoring of, 247
editing
scams, 245
audio, 183
suspicious attachments, 25

viruses, how they spread via, 215

email address, 88

email list: A group of email addresses used for mass
­distribution of a message. Short for electronic
mailing list., 90

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 16 Index

email messages, sending, 103 enterprise computing, 177

email program: Program used to create, send, receive, Enterprise Resource Planning: Information system that
forward, store, print, and delete email messages., 88 integrates MRP II with the information flow across an
organization to manage and coordinate the ongoing
email spoofing: Spoofing that occurs when the sender’s activities of the enterprise, including product planning,
address or other components of an email header are manufacturing and distribution, accounting and
altered so that it appears that the email message origi- finance, sales, human resources, and customer
nated from a different sender., 217 support., 555

email: The transmission of messages and files via a com- enterprise storage, 389–392
puter network. Short for electronic mail.
network attached storage, 390–392
sending messages, 103
storage area network, 391–392
embedded computer: A special-purpose computer that
functions as a component in a larger product., 132 enterprise user: Each employee or customer who uses
computers, mobile devices, and other technology in an
emergency plans, 235 enterprise., 41, 42

emoticons: Symbols used in online communications that entertainment
express emotion., 94
applications, 186
employee monitoring: The use of computers, mobile
devices, or cameras to observe, record, and review an motion input in, 329
employee’s use of a technology, including communica-
tions such as email messages, keyboard activity (used to technology in, 38, 199
measure productivity), and websites visited., 247
web database services, 507
employment websites, 82
websites, 79, 199
encryption: The process of converting data that is reada-
ble by humans into encoded characters to prevent environmental issues of computer use, 26
unauthorized access., 229
e-reader: A mobile device that is used primarily for
encryption algorithm: A set of steps that can convert reading e-books and other digital publications. short
readable plaintext into unreadable ciphertext., 230. See for electronic book reader., 9, 129. See also e-book
also cypher reader

encryption key: A set of characters that the originator of e-retail: Process of purchasing products or services on
the data uses to encrypt the plaintext and the recipient the web. Short for electronic retail., 81
of the data uses to decrypt the ciphertext., 230
ergonomic keyboard: Keyboard design that reduces the
encryption: The process of converting data that is reada- chance of repetitive strain injuries (RSIs) of wrist and
ble by humans into encoded characters to prevent hand., 322
unauthorized access., 424
ergonomics: An applied science devoted to incorporating
end-user license agreement (EULA): License agree- comfort, efficiency, and safety into the design of items
ment included with software purchased by individual in the workplace., 144
users., 163, 228. See also single-user license
a­ greement ERP: Information system that integrates MRP II with
the information flow across an organization to manage
ENERGY STAR program: Program developed by the and coordinate the ongoing activities of the enterprise,
United States Department of Energy (DOE) and the including product planning, manufacturing and distri-
United States Environmental Protection Agency (EPA) bution, accounting and finance, sales, human resources,
to help reduce the amount of electricity used by com- and customer support., 555. See also Enterprise
puters and related devices., 241 Resource Planning

enhanced resolution: Digital camera resolution that eSATA: External SATA; interface used with external
uses a special formula to add pixels between those gen- drives and that is much faster than USB., 380
erated by the optical resolution., 127
Ethernet: A network standard that specifies no central
enterprise computer or device on the network (nodes) should
control when data can be transmitted., 460
content management systems, 557
ethics
document management systems, 556
of altering digital, 182
functional units of, 554–555
punishment for webcam spying, 111

and society, 238–242

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 17

EULA: License agreement included with software Fair Labor Association (FLA), 295
purchased by individual users., 163, 228.
See also end-user license agreement; single-user fair trade practices, 295
license agreement
fake cell towers, device tracking, 480
e-waste: Discarded computers and mobile devices., 26,
122 FAQ, 94

exabyte (EB), 370 fault-tolerant computer: Computer that has duplicate
exception criteria: Out-of-the-ordinary conditions that components so that it can continue to operate when
one of its main components fails., 141
define the normal activity or status range in an excep-
tion report., 558 favorites: Links to preferred websites., 67. See also
exception report: Report generated by a management bookmark
information system that identifies data outside of a
normal condition., 558 fax, 31
executing: Processor operation in the machine cycle that
carries out the commands., 281 FBI’s National Crime Information Center (NCIC), 36
expansion bus: Bus that allows the processor to
c­ ommunicate with peripheral devices., 300 FC: Interface often used in enterprise storage because it
expansion card: A circuit board that enhances the has much faster transmissions rates than SCSI and
­functions of a component of a desktop or server other interfaces., 390. See also Fibre Channel
system unit and/or provides connections to
peripheral devices., 297. See also adapter board; feasibility: A measure of how suitable the development
adapter card of a system will be to the organization., 519
expansion slot: A socket on a desktop or server mother-
board that can hold an adapter card., 297 feasibility study: Investigation performed in system devel-
expert system: An information system that captures and opment that determines the exact nature of the problem
stores the knowledge of human experts and then imi- or improvement and decide whether it is worth pursu-
tates human reasoning and decision making., 560 ing., 521. See also preliminary investigation
extended contacts, 73
extended warranty options, 567 feature creep: Problem that occurs when one activity
Extensible Markup Language: Popular format for shar- has led to another that was not planned originally;
ing data that allows web developers to create tags that thus, the scope of the project now has grown., 519. See
describe the structure of information., 536. See also also Scope creep
XML
external displays, connecting laptop, 341 Federal Communications Commission (FCC), 477, 480
external hard drive: A separate freestanding storage
device that connects with a cable to a USB port or other Federal Trade Commission (FTC), 214
port on a computer or mobile device., 17, 378–379
extranet: Portion of a company’s network that allows cus- fetching: Processor operation in the machine cycle that
tomers or suppliers to access part of its intranet., 453 obtains a program or an application instruction or data
eyestrain, easing while using computers, 16, 143 item from memory., 281

F fiber-optic cable: Physical transmission media that con-
sists of dozens or hundreds of thin strands of glass or
Facebook, 23, 24, 73, 77, 258 plastic that use light to transmit signals., 478
face recognition system: Biometric device that captures
Fiber to the Building: Dedicated line used by small
a live face image and compares it with a stored image businesses to access the Internet via fiber-optic cables.,
to determine if the person is a l­egitimate user., 225 467. See also FTTB
failure of hardware, 139–140, 233
Fair Information Practices (FIP), 502 Fiber to the Home: Dedicated line that provides home
users with Internet access via fiber-optic cable., 467.
See also FTTH

Fiber to the Premises: Broadband Internet connection
that uses fiber-optic cable to provide high-speed
Internet access via a modem. FTTP for short., 59

Fiber to the Premises: Dedicated line that uses fiber-
optic cable to provide extremely high-speed Internet
access to a user’s physical permanent location., 467. See
also FTTP

Fibre Channel: Interface often used in enterprise stor-
age because it has much faster transmissions rates than
SCSI and other interfaces., 390. See also FC

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 18 Index

field: A combination of one or more related characters or firewall: Hardware and/or software that protects a
bytes and is the smallest unit of data a user accesses., 500 n­ etwork’s resources from intrusion by users on
another network, such as the Internet., 25, 189, 219–
field name: Name that uniquely identifies each field in a 220, 423
database., 500
firmware: ROM chips that contain permanently written
file, disk, and system management tools, 194–198 data, instructions, or information., 294, 410

file: A named collection of stored data, instructions, or First Amendment, and content filtering, 248
information that can contain text, images, audio, and
video., 18 fitness and health apps, 187

file compression: Shrink the size of a file(s)., 422 fixed wireless: Broadband Internet connection that uses
a dish-shaped antenna on a building, such as a house
file compression tool: Tool that shrinks the size of a or business, to communicate with a tower location via
file(s)., 198 radio signals., 59, 482

file maintenance: Procedures that keep data current., flagged records, 502
502
flames: Abusive or insulting messages., 94
file manager: A tool that performs functions related to
displaying files in folders; and copying, renaming, flame wars: Exchanges of flames., 94
deleting, moving, and sorting files. (or) A tool that
p­ erforms functions related to file management., flash memory storage, avoiding malware infections, 110
194, 422
flash memory: Type of nonvolatile memory that can be
caution about deleting program files, 194 erased electronically and rewritten., 295

file processing system: System used to store and man- flat-panel display: Display device that has a shallow
age data in which each department or area within an depth and a flat screen., 340
organization has its own set of files., 504
flat-panel monitors, 332–343
isolated data, 504
focus group: A series of lengthy, structured group
redundant data, 504 meetings in which users and IT professionals work
together to design or develop an application., 520. See
files also Joint-application design (JAD) session

audio, 86–87 folder: A specific named location on a storage medium
that contains related documents., 194
compressed, 86
compressing, uncompressing, 198
compressing, uncompressing, 198
font: A name assigned to a specific set of
deleting to uninstall programs, 195 characters., 166

file server, 116 font size: The size of the characters in a particular font,
measured in points., 166
file sharing network: P2P network configuration on
which users access each other’s hard drives and font style: Formatting task that adds emphasis to a font,
exchange files directly via a file sharing program., 457 such as bold, italic, underline, and color., 166

file viruses, 190 force feedback: Technology that sends resistance to the
device in response to actions of the user., 353
filters, Internet, 193
foreground: Program with which the user currently is
finance websites, 36 interacting., 415

financial apps, 178 format: Process in project development during which
change a project’s appearance., 166
financial information, entering online, 82
graphics, used on the web (table), 86
financial websites, 79
formatting: The process of dividing the disk into tracks
fingerprint reader: Biometric device that captures and sectors so that the operating system can store and
curves and indentations of a fingerprint. Also called a locate data and information on the disk., 374
fingerprint scanner., 139, 224
form: A window on the screen that provides areas for
Firefox: Mozilla Corporation’s browser., 67 entering or modifying data in a database., 512. See also
data entry form
Firefox OS: Linux-based operating system for Amazon
Kindle tablets and Amazon Fire phones., 434 formulas in worksheet cells, 169

Fire OS: Linux-based operating system for Amazon
Kindle tablets and Amazon Fire phones., 434

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 19

forward recovery: Recovery technique where the function creep: Problem that occurs when a company
DBMS uses the log to reenter changes made to the uses the technology intended for one purpose for an
database since the last save or backup., 515. See also entirely different purpose., 502
rollforward
function keys: Special keyboard keys, labeled with the
fourth-generation language: A nonprocedural language letter F followed by a number, programmed to issue
that enables users and programmers to access data in a commands to a computer., 320
database., 532. See also 4G
G
FoxNews.com, 90
game console: A mobile computing device designed for
fractional T1: T-carrier line that home and small busi- single-player or multiplayer video games., 10, 131, 276
ness users purchase, in which they share a connection
to a T1 line with other users., 468 game devices, 131–132

frame rate: The number of frames per second (fps) in a gamepad: Game controller, held with both hands, that
video, 331 controls the movement and actions of players or
objects in video games or computer games., 131
freeware: Copyrighted software provided at no cost by
an individual or a company that retains all rights to the game server, 116
software., 161
game web and mobile apps, 187
friends, 73, 74
games designer: Employee who designs games and
front end: A program that generally has a more translates designs into a program or app using an
­user-friendly interface than a DBMS., 505 appropriate application development language. See also
Games programmer, 570
front side bus: Bus that is part of the motherboard and
connects the processor to main memory., 300. See also games programmer: Employee who designs games and
FSB translates designs into a program or app using an
appropriate application development language. See also
FSB: Bus that is part of the motherboard and connects Games designer, 570
the processor to main memory., 300. See also front side
bus gaming

FTP: An Internet standard that permits file uploading accessories and input techniques, 11
and downloading to and from other computers on
the Internet. Short for File Transfer Protocol., 24, 31, in home, 11
92, 188
online, avoiding risks, 216
FTP server: A computer that allows users to upload and/
or download files using FTP., 92, 116 gaming desktop: Desktop that offers high-quality audio,
video, and graphics with optimal performance for
FTTB: Dedicated line used by small businesses to access sophisticated single-user and networked or Internet
the Internet via fiber-optic cables., 467. See also Fiber multiplayer games., 114
to the Building
gaming keyboard: A keyboard designed specifically for
FTTH: Dedicated line that provides home users with users who enjoy playing games on the computer., 322
Internet access via fiber-optic cable., 467. See also Fiber
to the Home Gantt chart: Bar chart developed by Henry L. Gantt
that uses horizontal bars to show project phases or
FTTP: Dedicated line that uses fiber-optic cable to pro- activities., 518
vide extremely high-speed Internet access to a user’s
physical permanent location., 467. See also Fiber to Gates, Bill, 26
the Premises
GBps: Gigabytes per second., 371, 460
full backup: Backup method that provides the best
p­ rotection against data loss because it copies all pro- geofence: Virtual perimeter or boundary to disable
gram and data files. (or) Fastest recovery method in ­certain apps or cameras in secure areas, such as labs
which all files are saved., 234, 396. See also archival or meeting rooms., 389
backup
geolocation: Determining a user’s location based on a
function: A predefined formula that performs common device’s GPS or connection to a cell tower., 537
calculations such as adding the values in a group of cells
or generating a value such as the time or date., 169 geotag, 372

gesture: A motion you make on a touch screen with the
tip of one or more fingers or your hand., 5, 324

touch screen (table), 5

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 20 Index

gesture recognition: Computer capability that allows graphics card: Adapter card that converts computer
users to guide on-screen elements using air gestures., o­ utput into a video signal that travels through a cable
328. See also motion input to the monitor, which displays an image on the screen.,
298. See also video card
ghosting, 197
graphics formats used on the web (table), 86
GIF graphics format, 86
graphics processing unit (GPU): Chip that controls the
gigabyte (GB): One billion characters., 61, 290, 370 manipulation and display of graphics on a display
device. Also called GPU., 342
gigahertz (GHz): One billion ticks of the system clock
per second., 283 graphics tablet: An electronic plastic board that detects
and converts movements of a stylus or digital pen into
global positioning system: A navigation system that digital signals that are sent to the computer., 328. See
consists of one or more earth-based receivers that also digitizer
accept and analyze signals sent by satellites in order
to determine the receiver’s geographic location., 483. graphic: Visual representation of nontext information
See also GPS such as a drawing, chart, or photo., 85

Google, 63 green computing: Practices that involve reducing the
electricity and environmental waste while using a
Google Apps Certified Specialist: Programmer/­ computers, mobile devices, and related technologies.,
developer certification that tests a user’s skills of 26, 241
a­ dministering, selling, and deploying Google Apps., 574
GSM: Global System for Mobile Communications; a 2G
Google Drive: Drive that provides access to email, standard for cellular transmissions., 481
­contacts, calendar, photos, files, and more., 434
GUI (graphical user interface): User interface with
Google Maps, 81 which you interact with menus and visual images by
touching, pointing, tapping, or clicking buttons and
Google Play: Google’s app store that provides access to other objects to issue commands., 414
apps, songs, books, and movies., 434
H
Google’s Android, 27
hacker: Someone who accesses a computer or network
Google Street View feature, 111 illegally., 193, 214

governmental websites, 77 punishment for cybercrime, 214

government web database services, 507 hacking, 528

GPRS: General Packet Radio Service; a 2G standard for hand geometry system: Biometric device that measures
cellular transmissions., 481 the shape and size of a person’s hand., 225

GPS: A navigation system that consists of one or more handheld computer: A computer small enough to fit in
earth-based receivers that accept and analyze signals one hand., 112
sent by satellites in order to determine the receiver’s
geographic location., 31, 39, 69, 132, 178, 187, 483. See handheld game device: A small mobile device that con-
also global positioning system tains a screen, speakers, controls, and game console all
in one unit., 131
GPS receiver: A handheld, mountable, or embedded
device that contains an antenna, a radio receiver, and a hands-free device, 8
processor., 69
handwriting recognition software: Software that trans-
GPS tracking, disabling, 237 lates the handwritten letters and symbols created on
the screen into typed text or objects that the computer
grandparent: Term used in three-generation backups to or mobile device can process., 327
refer to the oldest copy of the file., 234
hard copy: Information that exists on a physical medium,
graphical user interface (GUI): User interface with such as paper., 14, 166. See also hyperlink
which you interact with menus and visual images by
touching, pointing, tapping, or clicking buttons and hard disk drive: Storage device that includes one or
other objects to issue commands., 414. See also video more inflexible, circular platters that use magnetic
card p­ articles to store data, instructions, and information.,
373. See also hard disk; HDD
graphics

applications, 27

and media applications, 164

output, 340

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 21

hard disk: Storage device that includes one or more help desk technician: Employee who answers
inflexible, circular platters that use magnetic particles technology-related questions in person, on the phone,
to store data, instructions, and information., 17, or via email or an online chat room. See also Help desk
373–376. See also hard disk drive; HDD specialist, 569

access time on, 376 help systems, 205

defragmenting, 197, 376 hertz: One clock cycle per second, 283

hard drive: Term used to refer collectively to hard disks hibernate mode: Computer power option that saves any
and SSDs., 17, 373–380 open documents and running programs or apps to an
internal hard drive before removing power from the
data and files, encryption, 379 computer or device., 413

transfer files, internal, 377 High-Definition Media Interface port: Port that com-
bines DVI with high-definition (HD) television and
hardware: Electric, electronic, and mechanical video., 343. See also HDMI port
c­ omponents contained in a computer., 4
high-definition television: The most advanced form of
and operating system, 158 digital television, working with digital broadcast s­ignals,
transmitting digital sound, supporting wide screens,
protecting, 139–141 and providing high resolutions., 343. See also HDTV

hardware firewall: Device intended to stop network highest priority projects, 521
intrusions before they attenpt to affect your computer
or network malicious., 190, 472 hits: Webpage names displayed by a search engine that
contain the search text specified by a user., 71
hardware radiation, 344
home automation, 11
hashtag: A number sign (#) followed by a keyword that
describes and categorizes a Tweet., 73 devices, 132

HDD: Storage device that includes one or more inflexi- home design/landscaping software, 180
ble, circular platters that use magnetic particles to
store data, instructions, and information., 373. See also home network: Multiple computers and devices
hard disk; hard disk drive c­ onnected together by home users., 33, 473

HDMI port: Port that combines DVI with high- creating, 475
definition (HD) television and video., 343. See also
High-Definition Media Interface port planning and designing, 474–475

HDTV: The most advanced form of digital television, home page: The first page that is displayed on a
working with digital broadcast signals, transmitting dig- w­ ebsite., 66
ital sound, supporting wide screens, and providing high
resolutions., 343. See also high-definition t­ elevision home server, 116

head crash: Type of hard disk failure that occurs when a home user: Any person who spends time using
read/write head touches the surface of a p­ latter., 375 ­technology at home., 41, 42, 236

headphones: Audio output device that cover or are host: Any computer that provides services and connec-
placed outside the ear., 16, 352 tions to other computers on a network. Also called a
server., 56
headset: Input device that you can speak into that
c­ ontains both a microphone and a speaker., 14, 352 host computer: Computer that controls access to the
hardware, software, and other resources on the net-
health and fitness apps, 187 work and provides a centralized storage area for
p­ rograms, data, and information., 456. See also
health care, technology in, 38 server

health concerns of using technology, 26, 142–144 hot plugging: Feature that allows you to insert or
remove a removable flash memory device and other
health websites, 79 devices while the computer is running., 298

heat sink: Small ceramic or metal component with fins hot spot: A wireless network that provides Internet
on its surface that absorbs and disperses heat produced ­connections to mobile computers and devices., 32, 59
by electrical components, such as a processor., 284
HTML5: Technology used for web apps that specifies
help desk specialist: Employee who answers the structure of content displayed on a webpage.,
technology-related questions in person, on the phone, 537–538
or via email or an online chat room. See also Help desk
technician, 569

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 22 Index

HTML: A special formatting language that software implementation phase, 525
developers use to format documents for display on the
web., 535, 536. See also Hypertext Markup improved data integrity, 506
Language
inattentional blindness: Problem that occurs when a
hub: A device that provides a central point for cables in a person’s attention is diverted while performing a
network., 473. See also switch n­ atural activity, such as walking., 125

human resources information system (HRIS): incremental backup: Fastest backup method that
Information system that manages one or more admin- requires minimal storage space to back up because only
istrative human resources functions, such as maintain- most recent changes are saved. (or) Backup method
ing and managing employee benefits, schedules, and that copies only the files that have changed since the
payroll., 555 last full or incremental backup., 234, 396

human resources software, 177 index: Feature of a search tool that stores a variety of
hybrid app: App that combines features of native and information about a file, including its name,
date created, date modified, author name, and
mobile web apps., 571 so on., 195
hyperlink: A built-in connection to other documents,
inference rules: A set of logical judgments that are
graphics, audio files, videos, other webpages, or web- applied to the knowledge base each time a user
sites., 21 describes a situation to the expert system., 560
Hypertext Markup Language: A special formatting lan-
guage that software developers use to format docu- infographic: A visual representation of data or
ments for display on the web., 535, 536. See also information, designed to communicate quickly,
HTML simplify complex concepts, or present patterns or
Hypertext Transfer Protocol (http), 69 trends. Short for information graphic., 86

I informational websites, 74

IaaS (infrastructure as a service): Cloud computing information literacy: Skill set that prepares people to
service that uses software to emulate hardware manage information so that they can be knowledgeable
capabilities, enabling companies to scale, or adjust up decision makers., 560–561
or down, storage, processing power, or bandwidth as
needed., 287 components, 561

ICANN: Organization that approves and controls TLDs. defining, 561
Short for Internet Corporation for Assigned Names
and Numbers., 63 research and composition, steps in, 561

iCloud: Apple’s cloud server., 427 information privacy: The right of individuals and com-
icons, 426 panies to deny or restrict the collection, use, and dis-
identity theft semination of information about them., 242

protecting yourself from, 80 information: Processed data that conveys meaning to
recovering from, 514 users., 12
illustration software: An application that allows users
accuracy, 239–240
to draw pictures, shapes, and other graphics with
various on-screen tools such as a pen, brush, described, 12
eyedropper, and paint bucket., 181. See also paint
software how travels on Internet, 62
image editing software: An application that provides the
capabilities of paint software and also includes the information system: A set of hardware, software, data,
capability to enhance and modify existing photos and people, and procedures that work together to produce
image., 181 information., 515, 554
image viewer: A tool that allows users to display, copy,
and print the contents of a graphics file, such as a information theft: Illegal act that occurs when someone
photo., 195, 422 steals person or confidential information., 229
impact printer, 351
infrared (IR), 479

infrastructure as a service (IaaS): Cloud computing
service that uses software to emulate hardware
­capabilities, enabling companies to scale, or adjust up
or down, storage, processing power, or bandwidth as
needed., 287

ink cartridges, 346

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 23

ink-jet printer: A type of nonimpact printer that forms Internet: A worldwide collection of computer networks
characters and graphics by spraying tiny drops of that connects millions of businesses, government
l­iquid ink onto a piece of paper., 345–346 agencies, educational institutions, and individuals., 20, 56

input devices: Any hardware component that allows you addresses, 62–64
to enter data and instructions into a computer or
mobile device., 12 communications, 24

input: Term used to refer to data., 4, 318–319 connecting to the, 58–64

data, 12 evolution of the, 56

with input devices, 12 filters, 193

techniques for gaming, 12 how data, information travels on, 62

video and voice, 14 and network attacks, 215–220

insertion point: A symbol on the screen, usually a blink- plagiarism, schools dealing with, 165
ing vertical bar, that indicates where the next character
you type will appear., 320. See also cursor popular broadband service technologies (table), 59

Instagram, 182 using in daily activities (fig.), 57

installing applications, mobile apps, 29 World Wide Web Consortium (W3C), 58

instant messaging (IM): A real-time Internet communi- Internet backbone: Major carriers of network
cations service that notifies you when one or more of traffic., 62
your established contacts are online and then allows
you to exchange messages or files or join a private chat internet communications, 24
room with them., 31, 178
Internet Explorer: Microsoft’s browser., 67, 426
instructors, 567
internet marketing specialist: Employee who directs
integrated circuit: Circuit that contains many and implements an organization’s use of Internet and
microscopic pathways capable of carrying electrical social media marketing, including Facebook pages,
current., 278 Twitter feeds, blogs, and online advertisements. See also
Social media marketing specialist, 569
integrated development environment (IDE): Object-
oriented application development tool that contains internet messaging, 90
tools for building graphical interfaces, an editor for
entering program code, a compiler and/or interpreter, internet messaging services, 458
and a debugger (to remove errors)., 530
Internet of things (IoT): Term that describes an
integration test, 525 environment where processors are embedded in every
product imaginable (things), and those ‘things’
intel-compatible processors: Processors manufactured communicate with each other via the Internet., 133
by AMD that have an internal design similar to Intel
processors, perform the same functions, and can be as Internet of things (IoT): Term that describes an
powerful, but often are less expensive., 283 environment where processors are embedded in every
product imaginable (things), and those ‘things’
intellectual property rights: The rights to which crea- communicate with each other via the Internet., 284–285
tors are entitled for their work., 240
discrimination of, 286
intellectual property (IP): Unique and original works
such as ideas, inventions, art, writings, processes, com- privacy and security concerns, 286
pany and product names, and logos., 240
Internet service providers (ISPs): A business that pro-
interactive whiteboard: A touch-sensitive device, resem- vides individuals and organizations access to the
bling a dry-erase board, that displays the image on a Internet free or for a fee. Sometimes called an Internet
connected computer screen, usually via a projector., 353 access provider., 20, 61

interactive whiteboards, 35 internet usage, ISPs controlling, 477

International Electronics Commission (IEC), 299 interpreter: Program used to convert a source program
into machine language by translating and then
International Mobile Subscriber Identity (IMSI): e­ xecuting the machine language instructions one
Unique identity of every mobile device that allows it to instruction at a time., 529
communicate with a cell tower., 480
interview, 520

intranet: An internal network that uses Internet technol-
ogies, 453

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 24 Index

iOS: Proprietary mobile operating system specifically JavaScript: A scripting language that users to interact
made for Apple’s mobile devices., 434 with a webpage’s content., 538

IP address: A sequence of numbers that uniquely jewel case: Protective case for storing optical
identifies the location of each computer or device discs., 387
connected to the Internet. Short for Internet Protocol.,
62, 462 Jobs, Steve, 26

IP hijacking: Internet security threat that occurs when job searching, 576
cyberthieves tap into home routers or cable modems
or other Internet access points to intercept a paid job search websites, 82
Internet service., 474
joint-application design (JAD) session: A series of
iPods with earbuds, 9 lengthy, structured group meetings in which users and
IP spoofing: Spoofing that occurs when an intruder IT professionals work together to design or develop an
application., 520. See also focus group
computer fools a network into believing its IP address
is associated with a trusted source., 217 joystick: A handheld vertical lever, mounted on a base,
IP: Unique and original works such as ideas, inventions, that you move in different directions to control the
art, writings, processes, company and product names, actions of the simulated vehicle or player., 131
and logos., 240
IrDA: Infrared Data Association; standard for devices to JPEG: Compressed graphics format that attempts to
transmit data wirelessly to each other via infrared (IR) reach a balance between image quality and file size.
light waves., 465 Short for Joint Photographic Experts Group., 86
iris recognition system: Biometric device that uses iris
recognition technology to read patterns in the iris of juice jacking, 136
the eye., 226
IRS website, 77 Jumpstart Our Business Startup (JOBS) Act, 396
ISDN modem: A broadband modem that sends digital
data and information from a computer to an ISDN JustCloud.com, 19
line and receives digital data and information from an
ISDN line., 469 K
ISDN (Integrated Services Digital Network): Short
for Integrated Services Digital Network; a set of KBps: Kilobytes per second., 371
standards for digital transmission of data over standard
copper phone lines., 467 kernel: The core of an operating system that manages
IT consultant: A professional, typically hired based on memory and devices, maintains the internal clock, runs
technical expertise, who provides technology services programs, and assigns the resources, such as devices,
to his or her clients., 523, 568 programs, apps, data, and information., 412–413
iTunes, 38, 87
iTunes Store: Store that provides access to music, books, keyboard: Input device that contains keys you press to
podcasts, ringtones, and movies., 434 enter data and information into a computer or mobile
iTunes U, 35, 199 device., 13, 320–322

J types of, 321

jack: Term sometimes used to identify audio and video keyboard monitoring software: Software that runs
ports., 134 undetected and stores every keystroke in a file for later
retrieval., 321. See also keylogging software
jailbreaking: Process of making unauthorized
­modifications to operating systems and bypassing keyboard shortcut: One or more keyboard keys that you
the DRM restrictions on Apple iPhones and iPads press to perform an operating system or application-
in order to run unapproved apps., 574 related task., 320

Java: An object-oriented programming language keygen: Program that creates software registration
­developed by Sun Microsystems., 531 n­ umbers and sometimes activation codes. Short for key
generator., 228

keyloggers: Program often found on public computers
that records keystrokes in a hidden file., 80

keylogging software: Software that runs undetected and
stores every keystroke in a file for later retrieval., 321.
See also keyboard monitoring software

kill switch, smartphone, 295

kilobyte (KB), 370

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 25

kiosk: A freestanding terminal that usually has a touch LED (light-emitting diode): Light-emitting diode
screen for user interaction., 119, 325 t­echnology used in monitors., 341–342

knowledge base: The combined subject knowledge and legal software: An application that assists in the
experiences of the human experts used in an expert ­prepa-ration of legal documents and provides legal
system., 560 informa- tion to individuals, families, and small
­businesses, 175
L
level 1: RAID storage design that writes data on two
L1 cache: Cache built directly on the processor disks at the same time to duplicate the data., 390.
chip., 294 See also mirroring

L2 cache: Cache that is slightly slower than L1 cache libraries
but has a much larger capacity., 294
and content filtering, 247
L3 cache: Cache on the motherboard that is separate
from the processor chip., 294 library instruction, 561

label printer: A small printer that prints on an adhesive- license agreement: The right to use a program or app,
type material that can be placed on a variety of items which provides specific conditions for use of the soft-
such as envelopes, packages, optical discs, photos, and ware and that a user typically must accept before using
file folders., 350 the software., 163, 228

landscape orientation: A project that is wider than it is lifestyle applications, 185
tall, with information printed across the widest part of
the document., 344 like: Terminology used on social networking sites to
­recommend content., 73
laptop: Thin, lightweight mobile computer with a screen
in its lid and a keyboard in its base, designed to fit on line-of-sight transmission: Requirements that the
your lap., 4, 111, 276. See also notebook computer ­sending device and the receiving device must be in
line with each other so that nothing obstructs the
components in, 278 path of the infrared light wave., 465
keyboard, 13
motherboard of, 279 link: A built-in connection to other documents, graphics,
vs. tablets, desktops, 6 audio files, videos, other webpages, or websites., 21. See
large-format printer: Printer that uses ink-jet also hyperlink

­technology, but on a much larger scale, to create avoiding clicking unsafe, 238
photo-­realistic-quality color prints., 350
laser mouse: Mouse that uses laser sensors that emit and LinkedIn, 23, 24, 82, 578
sense light to detect the mouse’s movement., 322
laser printer: Type of high-speed, high-quality Linux: A popular, multitasking UNIX-based operating
­nonimpact printer that creates images using a system that runs on a variety of personal computers,
laser beam and powdered ink called toner., 348 servers, and devices., 429–430
latency: The time it takes a signal to travel from one
location to another on a network., 476 liquid cooling technology: Processor cooling method that
latest drivers, finding, 419 uses a continuous flow of fluid(s), such as water and glycol,
laws, privacy, 246 in a process that transfers the heated fluid away from the
LCD: Display technology that sandwiches a liquid processor to a radiator-type grill, which cools the liquid,
­compound between two sheets of material that p­ resents and then returns the cooled fluid to the processor., 284
sharp, flicker-free images on a screen when illumi-
nated., 341–342. See also liquid crystal d­ isplay liquid crystal display: Display technology that sand-
LCD projector: Data projector, which uses liquid crystal wiches a liquid compound between two sheets of mate-
display technology, that attaches directly to a computer rial that presents sharp, flicker-free images on a screen
or mobile device and uses its own light source to display when illuminated., 341–342. See also LCD
the information shown on the computer screen., 352
LED display: A display that uses LED for the backlight. LISTSERV, 90
Also called an LED LCD display., 342
list server, 116

literacy, digital, 2

Live CD: CD that can be used to start the computer., 413

Live USB: USB flash drive that can be used to start the
computer, 413

loads: The process of copying software from storage to
memory., 28

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 26 Index

local area network (LAN): A network that connects magnetic tape, 392
computers and devices in a limited geographical area magstripe reader: Reading device that reads the magnetic
such as a home, school, office building., 453
stripe on the back of credit cards, entertainment cards,
location sharing: Browsing option that gives websites bank cards, identification cards, and other similar cards.,
access to your current location., 66 337–338. See also Magnetic stripe card reader
mail server, 116
log: A listing of activities that modify the contents of the mainframe: A large, expensive, powerful server that can
database, 515 handle hundreds or thousands of connected servers
simultaneously., 117
logical design: Activity during system development that main memory: Memory chips that can be read from and
involves three major activities: (1) study how the cur- written to by the processor and other devices., 290. See
rent system works, (2) determine the users’ wants, also RAM; Random access memory
needs, and requirements, and (3) recommend a solu- malicious software: Programs that act without a user’s
tion., 522. See also detailed analysis knowledge and deliberately alter the operations of
computers and mobile devices. Short for malicious
logic bombs, 199 software., 215. See also malware
longitudinal recording: Storage technique in which malware: Programs that act without a user’s knowledge
and deliberately alter the operations of computers
magnetic particles are aligned horizontally around the and mobile devices. Short for malicious software.,
surface of the disk., 374 24, 215
LTE (Long Term Evolution): Short for Long Term avoiding infections, 110
Evolution; a network standard that defines how common types of (table), 215
high-speed cellular transmissions use broadcast radio if you can’t remove, 216
to transmit data for mobile communications., and viruses, 190–191
462–463 management information system (MIS): information
system that generates accurate, timely, and organized
M information, so that managers and other users can
make decisions, solve problems, supervise activities,
M2 (Memory Stick Micro): A type of memory card., 381 and track progress., 558
MAC address: A unique hardware identifier for a com- manufacturing, technology in, 40–41
Manufacturing Resource Planning II (MRP II):
puter or device. Short for Media Access Control Information system that is an extension of MRP that
address., 236 also includes product packaging and shipping, machine
machine cycle: Set of four basic operations that a scheduling, financial planning, demand forecasting,
­processor repeats for every instruction: (1) fetching, tracking labor productivity, and monitoring product
(2) decoding, (3) executing, and, if necessary, quality., 555
(4) ­storing., 281–282 manufacturing software, 177
machine language: The only language the computer mapping apps, 187
directly recognizes., 529 mapping websites, 80–81
mashups: Applications that incorporate data from multi-
machine-to-machine (M2M) communications, 133 ple providers into a new application., 288
Macintosh operating system (Mac OS): Apple’s mass media websites, 76
Material Requirements Planning (MRP): Information
­operating system., 427–428 system that monitors and controls inventory, material
macro: A series of statements that instructs a program or purchases, and other processes related to manufactur-
ing operations., 555
app how to complete a task., 532 MBps: Megabytes per second., 371, 460
macro recorder: A program used with macros that m-commerce: E-commerce that takes place using
mobile devices. Short for mobile commerce., 82
records all actions until turned off., 533

macro viruses, 190
madware: Adware on mobile phones. Short for mobile

adware., 245
magnetic stripe card: A credit card, entertainment card,

bank card, or other similar card with a stripe that con-
tains information identifying you and the card., 393
magnetic stripe card reader: Reading device that reads
the magnetic stripe on the back of credit cards, enter-
tainment cards, bank cards, identification cards, and
other similar cards., 337. See also Magstripe reader

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 27

media RAM (random access memory), 290–292
read-only memory (ROM), 294
applications, 27 requirements, determining, 292
types of, 290
downloading digital, from online services, 87 memory modules, 293
memory resident: Instructions that remain in memory
on the web, 76
while the computer or mobile device is running., 413
media and graphics applications, 179–185 Memory Stick PRO Duo: A type of memory card., 381
metadata: Details about data., 510
media library: A collection of stored digital meteorology, computers and, 437
media., 128 metropolitan area network (MAN): A high-speed

media literacy, 561 network that connects local area networks in a
metropolitan area, such as a city or town, and handles
media player: Special A program that allows you the bulk of communications activity across that
to view images and animations, listen to audio, region., 455
and watch video files on your computer or mobile MICR devices: Magnetic-ink character recognition;
device., 87, 185 reading devices that read text printed with magnetized
ink., 338
buyer’s guide for, 129 microblog: Blog that allows users to publish short
­messages, usually between 100 and 200 characters,
media sharing, 371–372 for others to read., 78
microchip, 280
media sharing mobile apps, 187 microphones: Input device that enables you to speak
into a computer or mobile device., 14
media sharing site: A website that enables members to microprocessor: Term used by some computer and chip
manage and share media such as photos, videos, and manufacturers to refer to a personal computer proces-
music., 75 sor chip., 280
microSDHC: A type of memory card., 381
medical applications, 185 microSDXC: A type of memory card., 381
Microsoft, 27
Medical field, motion input in, 329 Microsoft Office Specialist: Application software certi-
fication that tests a user’s skills of Microsoft Office
megabyte (MB): One million characters., 61, 370 programs., 572
Microsoft’s Windows, 27
megahertz, 296 microwaves: Radio waves that provide a high-speed
­signal transmission., 482
Megan’s Law, 505 microwave station: An earth-based reflective dish that
contains the antenna, transceivers, and other equipment
megapixel (MP), 127 necessary for microwave communications., 482
Military, motion input in, 329
memory: Electronic components that store instructions mini disc: Optical disc used in some game consoles and
waiting to be executed and the data needed by those mobile devices that has a diameter of 3 inches
instructions., 16, 110 of less., 386
mini keyboards, 13
memory cache: Cache that helps speed the processes of miniSD, 381
a computer by storing frequently used instructions and mirroring: RAID storage design that writes data on two
data., 294 disks at the same time to duplicate the data., 390. See
also level 1
memory card: Removable flash memory, usually no
bigger than 1.5 inches in height or width, that you
insert and remove from a slot in a computer, mobile
device, or card/reader writer., 18, 381–382

life span of, 382

slots, in computer, 381

working of, 382

memory: Electronic components that store instructions
waiting to be executed and the data needed by those
instructions., 290

access times, 296

bytes and addressable, 290

cache, 294

CMOS, 296

flash memory, 295

modules, 293

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 28 Index

MMS (multimedia message service): Smartphone and entering data and instructions in, 319
mobile device service that allows you to send picture/
video messages., 124 ports for, 297

mobile app: An application you download from a mobile securing, 279
device’s application store or other location on the
Internet to a smartphone or other mobile device., 28, mobile hot spot: Smartphones that can function as a
69, 161 wireless modem when tethered to a personal computer
or movile device., 469, 470
locating, installing, running, 29
mobile operating system: The operating system on
for personal, business productivity, 177 mobile devices and many consumer electronics., 186,
433–436
mobile app development, 570–571
vs. desktop, 435–436
mobile broadband: Broadband Internet connection that
uses the cellular radio network to connect computers mobile payments, 36
and devices with built-in compatible technology (such
as 3G, 4G, or 5G) or a wireless modem or other com- mobile phone memory, wiping of, 295
munications device., 59
mobile phone usage, ethics and issues, 302
mobile broadband wireless router, 472
mobile printer: A small, lightweight, battery-powered
mobile browser: A special type of browser designed for printer that allows a mobile user to print from a
the smaller screens and limited computing power of ­laptop, smartphone, or other mobile device while
Internet-capable mobile devices such as smartphones., traveling., 350
65, 67
mobile security, 237
mobile communications, 457–458
mobile security specialist: Employee who is responsible
mobile computer: A portable personal computer for the security of data and information stored on
designed so that a user easily can carry it from place to computers and mobile devices within an organization.
place., 4, 108 See also Computer security specialist, 570

mobile device mobile service provider: An ISP that offers wireless
Internet access to computers and mobile devices with the
removing programs and apps, 416 necessary built-in wireless capability, wireless modems, or
other communications devices that enable wireless con-
mobile device: A computing device small enough to hold nectivity. Sometimes called a wireless data provider., 61
in your hand., 108–145
mobile strategist: Employee who integrates and expands
backing up, 19 the company’s initiatives for mobile users., 570

buyer’s guide for, 128–129 mobile technology expert: Employee who develops and
directs an organization’s mobile strategy, including
categories of (table), 134 marketing and app development., 570

computers and, 7, 108 mobile user: Any person who works with computers or
mobile devices while away from a main office, home,
connecting peripheral devices, accessories to, 136 or school., 41, 42

described, 7 mobile web app: A web app that is optimized for display
in a browser on a mobile device, regardless of screen
malware risks to, 193 size or orientation., 161, 571

security in public places, 125 mock-up: A sample of the input or output that contains
actual data., 524
transferring photos to computers, 153
modems, 31, 58
transportation and, 95
monitor: A display that is packaged as a separate periph-
mobile device cooling, 284 eral device., 340

mobile device input, in vehicle, 326 morphing: Video editing technique that transforms one
video image into another image over the course of
mobile device management (MDM): Company policy s­everal frames of video., 331
that outlines and educates employees about safe mobile
device use., 433 motherboard: The main circuit board of the personal
computer. Also called a system board., 110, 278, 472
mobile devices: A computing device small enough to
hold in your hand.

care for, 302–303

cases for, 276–278

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 29

motion input: Computer capability that allows users to N
guide on-screen elements using air gestures., 328–329.
See also gesture recognition nanosecond (ns): One billionth of a second., 296

motion-sensing controllers, 131, 132 National Park Service home page, 68

motion-sensing devices, 329 native apps: Apps written for mobile devices running a
particular mobile phone operating system., 571
motion-sensing game controllers: Game controllers
that allow the user to guide on-screen elements with native resolution: The specific resolution for which
air gestures, that is, by moving their body or handheld d­ isplays are optimized., 342
input device through the air., 132
natural user interface (NUI): User interface with which
mouse: A pointing device that fits under the palm of users interact with the software through ordinary, intu-
your hand comfortably., 13, 322 itive behavior., 414

operations (table), 13 navigation systems, 325

MP3: Audio format that reduces an audio file to about near field communications: Type of wireless connection
one-tenth its original size, while reserving much of the that uses close-range radio signals to transmit data
original quality of the sound., 87 between two NFC-enabled devices., 138, 466. See also
NFC
MSN portal, 83
.NET: A set of technologies that allows almost any type
multi-core processor: A single chip with two or more of program to run on the Internet or an internal busi-
separate processor cores., 280 ness network, as well as stand-alone computers and
mobile devices., 532
multidimensional database: A database that stores data
in dimensions., 508 netiquette: The code of acceptable behaviors users
should follow while on the Internet. Short for Internet
multifunction printer (MFP): A single device that etiquette., 94
looks like a printer or a copy machine but provides
the functionality of a printer, scanner, copy machine, net neutrality, 477
and perhaps a fax machine., 349. See also all-in-one
printer network: A collection of computers and mobile
devices connected together, often wirelessly, via com-
multimedia: Any application that combines text with munications devices and transmission media., 32,
media., 85 ­452–453

multimedia authoring software: Software that allows architectures, 456–457
users to combine text, graphics, audio, video, and
animation in an interactive application., 184 to facilitate communications, 452

multiple desktop operating systems, 431 home, business, 33

multiplexing: ISDN line technique of carrying three or local area network, 453
more signals at once through the same line., 467
metropolitan area network, 455
multipurpose operating systems: Operating systems
that can function as both desktop and server operating personal area network, 455–456
systems., 432
securing wireless, 236
multisession: Optical disc that can be written on more
than once, allowing users to save additional data on the to share data and information, 453
disc at a later time., 388
to share hardware, 452
multitasking: An operating system that allows two or
more programs or apps to reside in memory at the to share software, 453
same time., 415
to transfer funds, 453
multi-touch: Capability of touch screens that
recognize multiple points of contact at the same time., unauthorized access and use, 221–227
324
wide area network, 455
multiuser: Operating system that enables two or more
users to run programs simultaneously., 416 wireless LAN, 454

music sharing sites, 75 network administrator: The person overseeing network
operations., 423, 569

network and Internet attacks, 215–220

network architecture: The configuration of computers,
devices, and media in a network., 456–457

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 30 Index

network attached storage (NAS): A server that is placed NFC transactions, security of, 395
on a network with the sole purpose of providing stor- NFC: Type of wireless connection that uses close-range
age to users, computers, and devices attached to the
network., 390–392. See also storage appliance radio signals to transmit data between two NFC-
enabled devices., 138, 466. See also near field
network card: A communications device that enables a communication
computer or device that does not have built-in net- NIC (network interface card): A communications
working capability to access a network., 472. See also device that enables a computer or device that does not
Network interface card (NIC); NIC (network have built-in networking capability to access a net-
interface card) work., 472. See also network card
Nintendo, 131
network engineer: Employee who installs, configures, nit: A unit of visible light intensity equal to one candela
and maintains LANs, WANs, wireless networks, (formerly called candlepower) per square meter., 342
intranets, Internet systems, and network software; node, 453
identifies and resolves connectivity issues. See also No Fly List, 249
Network administrator, 569 noise: An electrical disturbance that can degrade commu-
nications., 477
networking, defined, 426 noise cancelling, 143
nonimpact printer: A printer that forms characters and
network interface card (NIC): A communications graphics on a piece of paper without actually contact-
device that enables a computer or device that does not ing the paper., 345
have built-in networking capability to access a net- nonprocedural language: A programming language
work., 472. See also network card in which thesoftware developer writes English-like
instructions or interacts with a graphical environment
network license: A legal agreement that allows multiple to retrieve data from files or a database., 532
users to access software on the server simultaneously., nonresident: Instructions that remain on a storage
229 medium until they are needed, at which time they
transfer into memory (RAM)., 413
network monitoring software: Software the constantly nonvolatile memory: Memory that does not lose its con-
assesses the status of a network and sends an email or tents when power is removed from the computer., 290
text message, usually to the network administrator, notebook computer: Thin, lightweight mobile com-
when it detects a problem., 462 puter with a screen in its lid and a keyboard in its base,
designed to fit on your lap., 4, 111. See also laptop
network security administrator: Employee who computer
c­ onfigures routers and firewalls; specifies web notes taking, hand and digital device, 327
­protocols and enterprise technologies., 570 note taking software: An application that enables users
to enter typed text, handwritten comments, drawings,
network server, 116 sketches, photos, and links anywhere on a page and
then save the page as part of a notebook., 171
network standard: Guidelines that specify the way numerical literacy, 561
computers access the medium to which they are numeric check: Validity check that ensures that users
connected, the type(s) of medium used, the speeds used enter only numeric data into a field., 503
on different types of networks, and the type(s) of
physical cable and/or the wireless technology O
used., 459
object: An item that can contain both data and the pro-
neural network: A system that attempts to imitate the cedures that read or manipulate that data., 508
behavior of the human brain., 39
object code: The machine language version of a pro-
news feed: Terminology used on social networking sites gram that results from compiling the procedural lan-
to refer to activity updates from your friends that guage., 529. See also Object program
appear on a separate page associated with your
account., 73

newsgroups, 31

news mobile apps, 187

news websites, 76

NFC chips: Chip in a smartphone or mobile device that
enables communication with other devices simply by
being in proximity., 394–395

NFC tags: Tag that contains a chip and an antenna that
contains information to be transmitted., 394–395

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 31

object-oriented database (OODB): A database that on-screen keyboard: Smartphone feature where you
stores data in objects., 508 press keys on the screen using a fingertip or a stylus.,
5, 12, 13, 123
object-oriented programming (OOP) language:
Programming language used to implement objects in a The Open Group: Industry standards organization that
program., 530 now owns UNIX as a trademark., 429

object program: The machine language version of a open source software: Software provided for use,
­program that results from compiling the procedural m­ odification, and redistribution and has no restrictions
language., 529. See also object code from the copyright holder regarding modification of
the software’s internal instructions and its redistribu-
observing people, system analysts, 520 tion., 161, 429

OCR devices: Devices that usually include a small opti- security of, 430
cal scanner for reading characters and sophisticated
software to analyze what is read., 335 Opera: Browser used on both computers and mobile
devices., 67
OCR software: Optical character recognition; software
that can read and convert text documents into operating system (OS): A set of programs that coordi-
­electronic files., 334 nates all the activities among computer or mobile
device hardware., 27, 158, 410–412
office network, wireless printer addition, 479
functions of, 411, 412–424
off-site: A location separate from the computer or
mobile device site., 233 types of, 425

OLED: Organic LED; display technology that uses operating system functions, 411, 412–424
organic molecules that are self-illuminating and, thus,
do not require a backlight., 342 administering security, 423–424

OMR devices: Devices that read hand-drawn marks, built-in security tools, using and evaluating, 423
such as small circles or rectangles., 335
configuring devices, 419
onboard navigation systems, 39
coordinating tasks, 418–419
OneDrive: Microsoft’s cloud server., 426
establishing Internet connections, 420–421
online analytical processing (OLAP): Programs that ana-
lyze data, such as those in a decision support system., 559 managing memory, 416–418

online auction: Auction in which users bid on an item managing programs, 415–416
being sold by someone else on the web., 82
network, controlling, 423
online gaming, avoiding risks, 216
performance monitor, 420
online help, 205
product liability laws, security flaws, 424
online photo storage, 182
shutting down, computers and mobile devices, 413
online security service: A web app that evaluates our
computer or mobile device to check for Internet and starting, computers and mobile devices, 412–413
email vulnerabilities., 219
updating operating system software, 421–422
online services, downloading digital media from, 87
user interface, providing, 414–415
online social network: A website that encourages its mem-
bers in its online community to share their interests, operational feasibility: Test that measures how well the
ideas, stories, photos, music, and videos with other regis- proposed information system will work., 519
tered users., 23, 72, 73. See also social networking site
operators, search engine (table), 72
privacy, 74
optical disc: Type of storage medium that consists of a
security, 74 flat, round, portable disc made of metal, plastic, and
lacquer that is written and read by a laser., 18, 386–389
uses of, 73
characteristics of, 386–387
online: Term used to refer to a the state of a computer or
device being connected to a network., 6 cleaning and fixing scratches on, 387

online transaction processing (OLTP): Processing life span of, 387
technique in which the computer processes each
t­ransaction as it is entered., 558 optical fiber: Each strand of a fiber-optic cable., 478

optical mouse: Mouse that uses optical sensors that
emit and sense light to detect the mouse’s movement.,
322

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 32 Index

optical readers, 335 parentheses (()), search engine operator, 72

optical resolution: The actual photographed resolution parent: Term used in three-generation backups to refer
of a photo taken with a digital camera., 127 to the second oldest copy of the file., 234

OR (search engine operator), 72 partial backup: Backup method that allows the user to
choose specific files to back up, regardless of whether
organizational websites, 77 or not the files have changed since the last incremental
backup., 396. See also selective backup
OS X: Latest version of Apple’s operating system., 427
partitioning: Dividing a hard drive in separate logical
output: Data that has been processed into a useful form., storage areas (partitions) that appear as distinct
4, 339–340 drives., 431

information as, 12 passkeys, 137

on output devices, 14 passphrase: Similar to a password; several words
­separated by spaces., 25, 223
output device: Any hardware component that conveys
information from a computer or mobile device to one password: A private combination of characters associ-
or more people., 14 ated with the user name that allows access to certain
computer, mobile device, or network resources.,
outsourcing: The practice of off-loading some or all 222, 424
storage management to an outside organization or a
cloud storage provider., 390 creating strong, 25

jobs, 568 default, 223

security issues and, 522 payload: The destructive event or prank a virus was
­created to deliver., 190, 215
overvoltage: Electrical disturbance that occurs when the
incoming electrical supply or voltage increases above payment apps, 179
the normal volts., 140. See also power surge
PC: Computer that can perform all of its input,
P p­ rocessing, output, and storage activities by itself and
is intended to be used by one person at a time., 426
PaaS (platform as a service): Cloud computing service
that allows developers to create, test, and run their PC maintenance, 422
solutions on a cloud platform without having to purchase
or configure the underlying hardware and software., 288 PC maintenance tool: A program that identifies and
fixes operating system problems, detects and repairs
packet sniffer software: Software that monitors and logs disk problems, and includes the capability of improving
packet traffic for later analysis., 462 a computer’s performance., 198

packets: Small pieces into which messages are divided by PDF: An electronic image file format by Adobe
TCP/IP., 461 Systems that mirrors the appearance of an original
document. Short for Portable Document Format.,
packet switching: Technique of breaking a message into 86, 176
individual packets, sending the packets along the best
route available, and then reassembling the data., 461 peer: Each computer on a peer-to-peer network., 457

page: The amount of data and program instructions that peer-to-peer (P2P) network: A simple, inexpensive
can swap at a given time., 418 ­network architecture that typically connects fewer than
10 computers., 457
paging: Technique of swapping items between memory
and storage., 418 pen input: Touching a stylus or digital pen on a flat
­surface to writem draw, or make selections.,
paint software: An application that allows users to draw 326–328
pictures, shapes, and other graphics with various on-
screen tools such as a pen, brush, eyedropper, and paint performance monitor: A program that assesses and
bucket., 181. See also illustration software reports information about various computer resources
and devices., 420
pairing: The process of initiating contact between two
Bluetooth devices and allowing them to communicate peripheral device: A device you connect to a
with each other., 137 computer or mobile device to expand its
capabilities., 108
parallel conversion: Conversion strategy that consists of
running the old system alongside the new system for a connecting to computer, mobile device, 136
specified time., 526

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 33

permissions: Settings used to define who can access phishing websites, 245
­certain resources and when they can access those
resources., 423 phones

perpendicular recording: Storage technique in which connecting to Wi-Fi networks, 138
magnetic particles are aligned vertically, or perpendic-
ular to the disk’s surface, making much greater storage typing text messages without numeric keypad, 123
capacities possible., 374
phone scams, 245
personal area network (PAN): A network that connects
computers and devices in an individual’s workspace photo CD: CDs that contain only photos., 388
using wired and wireless technology., 455–456
photo editing software: A type of image editing soft-
personal cloud: Networked hard drive connected directly ware that allows users to edit and customize digital
to a router, allowing access to files over the Internet., 384 photos., 181

personal computer: Computer that can perform all of photographs
its input, processing, output, and storage activities by
itself and is intended to be used by one person at a editing, 181
time., 4, 108, 426. See also PC
transferring from mobile devices to computers, 153
personal finance software: A simplified accounting
application that helps home users and small office/ photo management software: Software that allows you
home office users balance their checkbooks, pay bills, to view, organize, sort, catalog, print, and share digital
track personal income and expenses, verify account photos., 182
balances, transfer funds, track investments, and evalu-
ate financial plans., 174 photo printer: A color printer that produces lab-quality
photos., 347
personal firewall: A security tool that detects and
p­ rotects a personal computer and its data from photo sharing sites, 75
­unauthorized intrusions., 189, 220
physical transmission media
setting up, 220, 221
coaxial cable, 478
personal interest applications, 27, 185–187
fiber-optic cables, 478
personal safes, 279
twisted-pair cable, 477
personal VoIP call, making, 92
PictBridge: A standard technology that allows you to
PERT charts: Short for Program Evaluation and Review print photos directly from a digital camera by connect-
Technique chart; chart developed by the U.S. ing a cable from the digital camera to a USB port on
Department of Defense that analyzes the time required the printer., 347
to complete a task and identifies the minimum time
required for an entire project., 518 picture message: A photo or other image, sometimes
along with sound and text, sent to or from a smart-
petabyte (PB), 370 phone or other mobile device., 7

phablet: A device that combines the features of a picture/video message services, 124
­smartphone with a tablet., 7, 112
pilot conversion: Conversion strategy where only one
phased conversion: Conversion strategy where each location in the organization uses the new system — so
location converts at a separate time., 526 that it can be tested., 526

phases: Larger categories of system development PIN: A numeric password, either assigned by a company
a­ ctivities., 515 or selected by a user., 118, 223. See also personal
i­ dentification number
phishing: A scam in which a perpetrator sends an
official looking email message that attempts to pinch: Touch gesture in which a user moves two fingers
obtain your personal and/or financial information., together., 5
66, 193, 244
piracy: The unauthorized and illegal duplication
phishing filter: A program that warns or blocks you of copyrighted software., 228. See also software
from potentially fraudulent or suspicious websites., piracy
66, 193, 244
pixel pitch: The distance in millimeters between pixels
on a display., 342. See also dot pitch

pixel: The smallest element in an electronic image. Short
for picture element., 127, 342

plaintext: Unencrypted, readable data., 230

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 34 Index

planning phase: Step in the system development life pointing stick, 323
cycle during which four major activities are performed:
(1) review and approve the project requests, (2) prior- point of sale (POS), 118
itize the project requests, (3) allocate resources such as
money, people, and equipment to approved projects, points (font size), 166
and (4) form a project development team for each
approved project., 521 polymorphic viruses, 190

plasma display: Display that uses gas plasma technology pop-under ad, 66
to sandwich a layer of gas between two glass plates.,
344 pop-under blocker, 66

platform as a service (PaaS): Cloud computing service pop-up ad: An Internet advertisement that suddenly
that allows developers to create, test, and run their appears in a new window on top of a webpage dis-
solutions on a cloud platform without having to pur- played in a browser., 66, 194
chase or configure the underlying hardware and
s­ oftware., 288 pop-up blocker: A filtering program that stops pop-up
ads from displaying on webpages., 66, 194
platform: Term used to refer to the operating system
that a computer uses, because applications are said to pop-up windows, avoiding malware infections, 110
run “on top of” it, or because the it supports the appli-
cations., 412 Portable Document Format (PDF), 86

platter: Component of a hard disk that is made of alu- portable keyboard: A full-sized keyboard that communi-
minum, glass, or ceramic and is coated with an alloy cates with a smartphone., 124
material that allows items to be recorded magnetically
on its surface., 374 portable media player: A mobile device on which you
can store, organize, and play or view digital media.,
plotters: Sophisticated printers used to produce high- 8, 10, 127, 325.
quality drawings such as blueprints, maps, and circuit
diagrams., 350 portal: A website that offers a variety of Internet services
from a single, convenient location., 82
plug and play: Technology that gives a computer the
capability to recognize peripheral devices as you install portrait orientation: A project that is taller than it is
them., 298, 419 wide, with information printed across the shorter
width of the document., 344
plug-in: A program that extends the capability of a
browser. Also called an add-on., 88 port replicator: An external device that provides connec-
tions to peripheral devices through ports built into the
PNG: Patent-free compressed graphics format that device., 136
restores all image details when the file is viewed. Short
for Portable Network Graphics., 86 port: The point at which a peripheral device attaches to
or communicates with a computer or mobile device so
podcast: Recorded media that users can download or that the peripheral device can send data to or receive
stream to a computer or portable media player., 40, information from the computer., 134
187
and connections, 134–138
point, 13
popular (table), 135
point-and-shoot camera: An affordable and lightweight
digital camera with lenses built into it and a screen that POS terminal: Terminal used by most retail stores to
displays an approximation of the image to be photo- record purchases, process credit or debit cards, and
graphed., 125 update inventory. Short for point of sale., 118

pointer: A small symbol on the screen whose location post-implementation system review, 526
and shape change as a user moves a pointing device.,
322 power supply: Component of the system unit that con-
verts wall outlet AC power to the DC power that is
pointing devices, 13 used by a computer., 301–304

mouse, 322–323 power surge: Electrical disturbance that occurs when the
incoming electrical supply or voltage increases above
touchpad, 323 the normal volts., 140. See also overvoltage

trackball, 324 power usage effectiveness (PUE): A ratio that measures
how much power enters the computer facility or data
center against the amount of power required to run
the computers and devices., 241

power user: User who requires the capabilities of a pow-
erful computer., 41, 42

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 35

predictive text input: Phone technology that allows you arithmetic logic unit (ALU) of, 281
to press one key on the keyboard or keypad for each
letter in a word, and software on the phone predicts control unit of, 281
the word you want., 123
cooling of, 284
preliminary investigation: Investigation performed in
system development that determines the exact nature machine cycle, 281–282
of the problem or improvement and decide whether it
is worth pursuing., 521. See also feasibility study mobile device, 283–284

presentation software: An application that allows users personal computer, 283–284
to create visual aids for presentations to communicate
ideas, messages, and other information to a group., 168 registers in, 282

press and hold: Touch gesture in which a user presses selection, 283
and holds one finger until an action occurs., 5
system clock in, 282–283
primary key: A field that uniquely identifies each record
in a file., 501 product activation: Process in which users, either online
or on the phone, provide the software product’s
principle of least privilege policy: Policy adopted by i­dentification number to associate the software with
some organizations, where users’ access privileges are the computer or mobile device on which the software
limited to the lowest level necessary to perform is installed., 162, 228
required tasks to prevent accidental or intentional mis-
use of the data., 513 product development software, 177

printer: An output device that produces text and graphic productivity applications: Software that can assist you
on a physical medium such as paper or other material., in becoming more effective and efficient while
14, 344–351 p­ erforming daily activities at work, school, and home.,
27, 165
printer resolution, 346
types of, 165–179
printout: Information that exists on a physical medium,
such as paper., 14, 344. See also hard copy professional online presence, 577

print server, 116 profiles, electronic, 242–243

print spooler, 418 program: A series of related instructions, organized for a
common purpose, that tells the computer what tasks to
print: To generate a hard copy of a project., 166 perform and how to perform them., 26, 158. See also
software
privacy, 24–25
antivirus, 191–192
described, 24
and apps, 26–30
digital security and, 24–26
categories of (table), 164
information, 242–248
developing, 29
laws, 246
generally, 163
and online social networks, 74
specifications, 29
private clouds, 122
uninstalling, 196
private key encryption: Encryption method where both
the originator and the recipient use the same secret program and app developer: Employee who specifies,
key to encrypt and decrypt the data., 230. See also designs, implements, tests, and documents programs
s­ ymmetric key encryption and apps in a variety of fields, including robotics, oper-
ating systems, animation, and applications., 568
procedural language: Programming language in which
the software developer writes using English-like words program development life cycle: An organized set of
that tell the computer what to accomplish and how to activities performed during program development., 525
do it., 528
programming language: Set of words, abbreviations,
processor cooling, 284 and symbols that enables a software developer to
­communicate instructions to a computer or mobile
processor: The electronic component of a computer that device., 527
interprets and carries out the basic instructions that
operate a computer., 111, 280–286. See also CPU program specification package: Item prepared during
program design that identifies the required programs
and the relationship among each program, as well as
the input, output, and database specifications., 524

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 36 Index

project leader: Person who manages and controls the pull notification, 124
budget and schedule of a system development project.,
517 pull: Request information from a web server., 69

Project Management Professional (PMP): Broad push notification, 124
development certification that tests knowledge of
tasks required during system development; PMP for Q
short., 574
QR code reader: App that scans a QR code and then
project management software: An application that displays the corresponding webpage in a browser., 178
allows a user to plan, schedule, track, and analyze the
events, resources, and costs of a project., 172, 518 QR code (quick response code): Square-shaped graphic
that corresponds to a web address or other informa-
project management: The process of planning, schedul- tion. Short for quick response code., 178, 335, 336
ing, and then controlling the activities during system
development., 517 quarantine: A separate area of the hard disk that holds
infected files until the infection can be removed., 191
project manager: Person who controls the activities
d­ uring system development., 517 query: A request for specific data from a database., 511

project request: A formal, written request for a new or query by example (QBE): DBMS feature that has a
modified information system., 521. See also request for graphical user interface to assist users with retrieving
system service data., 512

projects, saving regularly, 166 query language: Language used with databases that con-
project team: Group formed for each system develop- sists of simple, English-like statements that allows
users to specify the data they want to display, print,
ment project, usually consisting of users, the sytstems store, update, or delete., 512
analyst, and other IT professionals., 517
proof of concept: A working model of the proposed sys- queue: Group of files waiting in the buffer to be printed.,
tem’s essential functionality., 525. See also prototype 418
proprietary connector, 299
proprietary software: Software that is privately owned quotation marks (“), search engine operator, 72
and limited to a specific vendor or computer or device
model., 425 QWERTY keyboard, 321
protecting
hardware, 139–141 R
against unauthorized access and use, 221–227
protocol: A standard that outlines characteristics of how rack server: A server that is house in a slot (bay) on a metal
two devices communicate on a network., 460 frame (rack). Also called a rack-mounted server., 116
prototype: A working model of the proposed system’s
essential functionality., 525. See also proof of concept RAD (rapid application development): A method of
proxy server: A server outside the organization’s network developing software in which the software developer
that controls which communications pass into the writes and implements a program in segments instead
organization’s network., 66, 219 of waiting until the entire program is completed., 530
public clouds, 122
public-domain software: Software that has been radio frequency identification: Technology that uses radio
donated for public use and has no copyright restric- signals to communicate with a tag placed in or attached to
tions., 161 an object, an animal, or a person., 336, 465. See also RFID
public key encryption: Encryption method that uses
two encryption keys: a public key and a private key., radiology, technology in, 43
230. See also asymmetric key encryption
publishing, technology in, 39–40 RAID: Redundant array of independent disks; a group of
PUE: A ratio that measures how much power enters the two or more integrated hard drives., 380, 390
computer facility or data center against the amount of
power required to run the computers and devices., 241 RAM (random access memory): Memory chips that can
be read from and written to by the processor and other
devices., 290–293. See also main memory

types of, 292

random access: Access method where a device can locate
a particular data item or file immediately, without hav-
ing to move consecutively through items stored in
front of the desired data item or file., 392. See also
direct acces

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 37

random access memory (RAM): Memory chips that can relational database: A database that stores data in tables
be read from and written to by the processor and other that consist of rows and columns., 508
devices., 290-293. See also main memory
remote controls for home systems, 11
range check: Validity check that determines whether a
number is within a specified range., 503 removing apps, 196

rapid application development (RAD) : A method of repetitive strain injury (RSI): An injury or disorder of
developing software in which the software developer the muscles, nerves, tendons, ligaments, and joints., 142
writes and implements a program in segments instead
of waiting until the entire program is completed., 530 report generator: DBMS feature that allows users to
design a report on the screen, retrieve data into the
reading: The process of transferring these items from a report design, and then display or print the report.,
storage medium into memory., 368 513. See also report writer

read-only memory (ROM): Memory chips that store report writer: DBMS feature that allows users to design
permanent data and instructions., 294 a report on the screen, retrieve data into the report
design, and then display or print the report., 513. See
read/write head: The mechanism that reads items and also report generator
writes items in the drive as it barely touches the disk’s
recording surface., 375 repository: A DBMS element that contains data about
each file in a database and each field in those files.,
real-time clock: A separate battery-backed chip that 510. See also data dictionary
keeps track of the date and time in a computer., 283
request for information (RFI): A less formal document
real-time operating system (RTOS): Operating system that uses a standard form to request information about
used by an embedded computer., 436 a product or service., 523

real time: Term used with online communications that request for proposal (RFP): Document sent to a vendor
means you and the people with whom you are convers- during the system development cycle where the vendor
ing are online at the same time., 90 selects the product(s) that meets specified requirements
and then quotes the price(s)., 523
receiving device: Device that accepts the transmission of
data, instructions, or information., 450 request for quotation (RFQ): Document sent to a ven-
dor during the system development cycle that identi-
rechargeable batteries, 302 fies required products., 523

record: A group of related fields., 501 request for system services: A formal, written request
for a new or modified information system., 521. See
recovery media: Tool that uses logs and/or backups, and also project request
either a rollforward or a rollback technique, to restore
a database when it becomes damaged or destroyed., research, web database services, 507
413
research websites, 74
recovery plan, 235
resize: To change the physical dimensions of a photo., 182
recovery utility, 515
resolution: The number of horizontal and vertical pixels
Recycle Bin, 427 in a display device., 127, 342

recycling resources: Hardware, software, data, and information., 32

of electronics, 122 in the cloud, 121

of old computers, devices, 242 response time: The time in milliseconds (ms) that it
takes to turn a pixel on or off., 342
red-eye: The appearance of red eyes caused by a camera’s
flash., 182 restore: Copying backed up files to their original loca-
tion on a computer or mobile device., 233, 422
reduced data redundancy, 505, 506
restore tool: Program that reverses the backup process
reduced development time, database approach, 506 and returns backed up files to their original form., 198

redundancy: Built-in levels of duplicate components retail, 36
used in enterprise hardware that ensures that if one
component fails or malfunctions, another can assume retail apps, 179
its tasks., 389
retail software: Mass-produced, copyrighted software
reference apps, 178 that meets the needs of a wide variety of users, not just
a single user or company., 161
registers: Small, high-speed storage locations that
t­emporarily hold data and instructions., 282

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 38 Index

retail websites, 81–82 router: A communications device that connects multiple
computers or other routers together and transmits data
Retina Display: LCD technology developed by Apple to its correct destination on a network., 471
that produces vibrant colors and supports viewing from
all angles because the LCD technology is built into the routers, 31, 190, 220, 236, 237
screen instead of behind it and contains more pixels
per inch of display., 342 rpm (revolutions per minute): The number of times
per minute that a hard disk platter rotates., 375
review documentation, 520
RSS 2.0: Short for Really Simple Syndication; specifica-
revolutions per minute (rpm): The number of times tion that content aggregators use to distribute content
per minute that a hard disk platter rotates., 375 to subscribers., 536

RFI (request for information) : A less formal document RSS: A popular specification used to distribute content to
that uses a standard form to request information about subscribers. Short for Really Simple Syndication., 31
a product or service., 523
running applications, mobile apps, 29
RFID: Radio frequency identification; technology that
uses radio signals to communicate with a tag placed in S
or attached to an object, an animal, or a person., 336,
465. See also radio frequency identification SaaS (software as a service): Computing environment
where an Internet server hosts and deploys applica-
RFID reader: Reading device that reads information on tions., 287–288
an RFID tag via radio waves., 336
Safari: Apple’s browser., 67, 427
RFID tag: Tag that includes an antenna and a memory
chip that contains the information to be transmitted salesforce automation (SFA): Information system that
via radio waves., 394 helps salespeople manage customer contacts, schedule
customer meetings, log customer interactions, manage
RFP (request for proposal): Document sent to a vendor product information, and place customer orders., 555
during the system development cycle where the vendor
selects the product(s) that meets specified requirements sales software, 177
and then quotes the price(s)., 523
Samsung, 111
RFQ (request for quotation): Document sent to a ven-
dor during the system development cycle that identi- SAN (storage area network):A high-speed network with
fies required products., 523 the sole purpose of providing storage to other attached
servers., 391–392
ribbon, 427
sandbox: An environment that allows software develop-
right-click, 13 ers to test their programs with fictitious data without
adversely affecting other programs, information sys-
ripping: The process of copying audio and/or video data tems, or data., 525
from a purchased disc and saving it on your own
media., 388 San Diego Zoo webpage, 85

rollback: Recovery technique where the DBMS uses the Sarbanes-Oxley (SOX) Act: Law that provides financial
log to undo any changes made to the database during a reporting requirements and guidelines for public com-
certain period., 515. See also backward recovery panies’ retention of business records., 390, 396

rollforward: Recovery technique where the DBMS uses SAS (serial-attached SCSI): A type of SCSI that uses
the log to reenter changes made to the database since serial signals to transfer data, instructions, and
the last save or backup., 515. See also forward recovery ­information., 380

ROM (read-only memory): Memory chips that store SATA (Serial Advanced Technology Attachment):
permanent data and instructions., 294 Serial Advanced Technology Attachment; interface that
uses serial signals to transfer data, instructions, and
rooting: Process of making unauthorized modifications information., 380
to operating systems and bypassing the DRM restric-
tions on devices running Android (or other operating satellite Internet service: Broadband technology that
systems) in order to run unapproved apps., 574 provides Internet connections via satellite to a satellite
dish that communicates with a satellite modem., 59
rootkit: A program that hides in a computer or mobile
device and allows someone from a remote location to satellite speakers: Speakers in a surround sound system
take full control of the computer or device, often for that are positioned so that sound emits from all
nefarious purposes., 190, 215 d­ irections., 351

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 39

save: Process of the computer transferring a project from search engine optimization expert: Employee who
memory to a local storage medium or cloud storage., writes and develops web content and website layouts
165 so that they will appear at the beginning of search
results when users search for content. See also SEO
scams, avoiding, 245 expert, 569

scanner: A light-sensing input device that reads printed searching
text and graphics and then translates the results into a
form the computer can process., 14, 178, 334 with search engines, 71–72

schedule feasibility: Test that measures whether the web, 22
established deadlines for the project are reasonable.,
519 search text: Word or phrase entered in a search engine
to describe the word you want to find., 71
science, technology in, 38–39
search tool: A program, usually included with an operat-
science websites, 79 ing system, that attempts to locate a file on your com-
puter or mobile device based on criteria you specify.,
scope, 517 195

scope creep: Problem that occurs when one activity has secondary storage: The physical material on which a
led to another that was not planned originally; thus, computer keeps data, information, programs, and
the scope of the project now has grown., 519. See also applications., 368
feature creep
sectors: The small arcs into which tracks on a disk are
screen protector, 304 divided., 374

screen saver: A tool that causes a display device’s screen Secure Digital Expanded Capacity (SDXC): A type of
to show a moving image or blank screen if no memory card., 381
k­ eyboard or mouse activity occurs for a specified time.,
197, 422 Secure Digital High Capacity (SDHC): A type of
memory card., 381
scribe: Member of a joint-application design session who
records facts and action items assigned during the secure site: A website that uses encryption techniques to
s­ ession., 520 secure its data., 231

scripting language: An interpreted language that security
­typically is easy to learn and use., 536
applications, 28
script kiddie: Cybercriminal who has the same intent as
a cracker but does not have the technical skills and ATM, 118
knowledge., 214
avoiding malware infections, 110
scroll bars, 427
digital security risks, 212–214
SCSI (Small Computer System Interface): Small
Computer System Interface; interface that uses parallel Internet and network attacks, 215–220
signals and can support up to 8 or 15 peripheral
devices., 380 in-vehicle technology, 133

SDHC (Secure Digital High Capacity): A type of mobile, 237
memory card., 381
mobile devices in public areas, 125
SDLC (system development life cycle): Collection of
phases in system development., 515 and online social networks, 74

SDXC (Secure Digital Expanded Capacity): A type of payment apps, 179
memory card., 381
protecting against scams, 245
search: A tool, usually included with an operating system,
that attempts to locate a file on your computer or protecting yourself from identify theft, 80
mobile device based on criteria you specify., 422
safe browsing techniques, 66
search engine operators (table), 72
safeguarding against Internet and network
search engine: Software that finds websites, webpages, attacks, 218
images, videos, news, maps, and other information
related to a specific topic., 22, 71 systems in the home, 11

technology in national and local, 249

tools, 189–194

wireless, 236–237

of wireless networks, 236

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 40 Index

security analyst: Employee who implements security service pack: Free downloadable updates provided by
procedures and methods, looks for flaws in security of software makers for users who have registered and/or
a company’s devices and networks, works with and activated their software., 422
trains employees at all levels, and assigns permissions
and network settings., 570 session cookie: A file used by online shopping sites to
keep track of items in a user’s shopping cart., 243
security suite: A collection of individual security tools
available together as a unit. These programs often are SFA (salesforce automation): Information system that
called Internet security programs., 189 helps salespeople manage customer contacts, schedule
customer meetings, log customer interactions,
security system project manager: Employee who m­ anage product information, and place customer
develops and maintains programs and tools designed to orders., 555
provide security to a network., 570
shared data, 506
selective backup: Backup method that allows the user to
choose specific files to back up, regardless of whether shareware: Copyrighted software that is distributed at no
or not the files have changed since the last incremental cost for a trial period., 161
backup., 396. See also partial backup
downloading safely, 161
selective backup: Fast backup method that provides
great flexibility., 234 sharpness: Term used to refer to the crispness of objects
in photos., 182
self-service kiosks, 119
shopping cart: Component of an electronic storefront
sending device: Device that initiates an instruction to that allows the customer to collect purchases., 81
transmit data, instructions, or information., 450
shopping web database services, 507
sending email messages, 103
shopping websites, 82
SEO expert: Employee who writes and develops web
content and website layouts so that they will appear at signature capture pad: Pen input device that captures
the beginning of search results when users search for handwritten signatures with a stylus that is attached to
content. See also Search engine optimization the device., 326
expert, 569
signature verification system: Biometric device that
sequential access: Access method where data is read or recognizes the shape of your handwritten signature, as
written consecutively., 392 well as measures the pressure exerted and the motion
used to write the signature., 225
serial-attached SCSI (SAS): A type of SCSI that uses
serial signals to transfer data, instructions, and sign in: To access resources on a network or computer., 423
i­ nformation., 380
simulation, gaming category, 35
server: A computer dedicated to providing one or more
services to other computers or devices on a network. single-core processors, 280
(or) Computer that controls access to the hardware,
software, and other resources on the network and single-session disc: CD-ROM on which manufacturers
provides a centralized storage area for programs, write all items at one time., 388
data, and information., 6, 116, 456. See also host
computer single-user license agreement: License agreement
included with software purchased by individual users.,
dedicated (table), 116 228. See also end-user license agreement

and networks, 32 Siri: iOS voice recognition app that enables you to speak
instructions or questions to which it takes actions or
server farm: A network of several servers together in responds with speech output., 434
s­ingle location., 117
site license: A legal agreement that permits users to
server operating system: A multiuser operating install software on multiple computers-usually at a vol-
system that organizes and coordinates how multiple ume discount., 229
users access and share resources on a network.,
432–433 skimmer: Virtually undetectable, a device that is placed
directly on top of an ATM face and captures credit
server virtualization: Technique that uses software to card numbers and pins., 119
divide a physical server logically into many virtual
server., 117 skimming: Crime in which thieves use a handheld device
to swipe someone’s credit or smart card and then
obtain and store account details., 394

slate computers, 5

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 41

slate tablet: A type of tablet that does not contain a social engineering: Scam in which perpetrators gain
physical keyboard., 112, 276 unauthorized access to or obtain confidential informa-
tion by taking advantage of the trusting human nature
sleep mode: Computer power option that saves any open of some victims and the naivety of others., 245
documents and running programs or apps to RAM,
turns off all unneeded functions, and then places the social media, 76, 110
computer in a low-power state., 413
social media, in job search, 578
slide show: Presentations that are viewed as slides,
usually on a large monitor or projection social media marketing specialist: Employee who
screen., 168 directs and implements an organization’s use of
Internet and social media marketing, including
slide: Touch gesture in which a user presses and holds Facebook pages, Twitter feeds, blogs, and online
one finger on an object and then moves the finger to ­advertisements. See also Internet marketing
the new location., 5. See also Drag ­specialist, 569

SLR camera: A high-end digital camera that has social networking apps, 178
interchangeable lenses and uses a mirror to display on
its screen an exact replica of the image to be social networking sites: A website that encourages
photographed. Short for single-lens reflex members in its online community to share their inter-
camera., 125 ests, ideas, stories, photos, music, and videos with other
registered users., 23, 72. See also online
small/home office user: Employees of companies with
fewer than 50 employees and the self-employed who soft copy: Information on a display that exists electroni-
work from home., 41, 42 cally and appears for a temporary period., 340

smart card: An alternative to a magnetic stripe card, software and apps field: Specialty area consisting of
stores data on an integrated circuit embedded in the organizatons and individuals who develop,
card., 338, 393. See also chip card manufacture, and support a wide range of software
and apps for computers, the web, and mobile
smart digital camera, 125 devices., 564

smart eyewear, 130 software as a service (SaaS): Computing environment
where an Internet server hosts and deploys applica-
smartglasses, 130 tions., 287–288

smartphone: An Internet-capable phone that usually also software: A series of related instructions, organized for a
includes a calendar, an appointment book, an address common purpose, that tells the computer what tasks to
book, a calculator, a notepad, games, browser, and perform and how to perform them., 26, 158, 318. See
numerous other apps., 7, 123, 325 also program

buyer’s guide for, 128 availability, 161

with digital cameras, 125 avoiding malware infections, 110

guarding your, 174 bundled, 115

low memory of, 418 in enterprise computing, 177

mobile security, 237 license agreement, 163

payment apps, 179 theft, 228

phablets, 112 software developer: Someone who develops programs
and apps or writes the instructions that direct the com-
printing from, 347 puter or mobile device to process data into informa-
tion; sometimes called an application developer or
typing options on, 123 computer programmer., 29

Smart TV: Television containing an embedded computer software piracy: The unauthorized and illegal
that enables you to browse the web, stream video from d­ uplication of copyrighted software., 228. See also
online media services, listen to Internet radio, commu- piracy
nicate with others on social media sites, play online
games, and more - all while watching a television software registration: Optional process that usually
show., 15, 133, 343 involves submitting your name and other personal
information to the software manufacturer or developer
smartwatch, 130 in order to receive product support., 162

SMS (short message service): Short text messages,
­typically fewer than 300 characters., 124

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 42 Index

software suite: A collection of individual applications sports websites, 76
available together as a unit., 172
spreadsheet data, import/export of, 511
software theft: Illegal act that occurs when occurs when
someone steals software media, intentionally erases spreadsheet software: An application that allows users
programs, illegally registers and/or activates a program to organize data in rows and columns and perform
or illegally copies a program., 228 c­ alculations on the data., 168

solid-state drive (SSD): A storage device that typically spyware and malware detection software, 423
uses flash memory to store data, instructions, and
information, and that contains no moving parts. (or) spyware: A program placed on a computer or mobile
Flash memory storage device that contains its own device without the user’s knowledge that secretly col-
processor to manage its storage., 17, 376–378 lects information about the user and then communi-
cates the information it collects to some outside source
solid-state media: Media that consist entirely of elec- while the user is online., 192, 215
tronic components, such as integrated circuits, and
contain no moving parts., 376 spyware remover: A program that detects and deletes
spyware and similar programs., 192
sound card: Adapter card that enhances the sound-
generating capabilities of a personal computer by spyware windows, 25
allowing sound to be input through a microphone
and output through external speakers or SQL (Structured Query Language): A popular query
headphones., 297 language that allows users to manage, update, and
retrieve data., 512
sound configurations, numbers in, 351
SRAM: RAM chips that are faster and more reliable than
source document: Document that contains the original and do not have to be reenergized as often as DRAM
form of data to be processed., 334 chips., 292. See also Static RAM

source: Original location on a storage device., 34 SSD (solid-state drive): A storage device that typically
uses flash memory to store data, instructions, and
source program: The program that contains the information, and that contains no moving parts. (or)
­language instructions, or code, to be converted to Flash memory storage device that contains its own
machine language., 529 processor to manage its storage., 376–378

space (search engine operator), 72 SSID: A network name. Short for service set identifier., 236

spam: An unsolicited email message or posting sent to stand-alone operating system: A complete operating
many recipients or forums at once., 193 system that works on desktops, laptops, and some tab-
lets., 426. See also desktop operating system
speakers, 16
standards: Sets of rules and procedures an organization
speakers: Audio output devices that generate sound., 351 expects employees to accept and follow., 517

speech recognition: A computer or mobile device’s Static RAM: RAM chips that are faster and more reliable
capability of distinguishing spoken words., 330. See also than and do not have to be reenergized as often as
voice recognition DRAM chips., 292. See also SRAM

speech-to-text: Feature that recognizes a user’s spoken static webpage: A fixed webpage where all visitors see
words and enters them into email messages, text mes- the same content., 65
sages, or other applications that support typed text
entry., 330 status bar, 427

spelling checkers, 168 status update: Terminology used on social networking
sites to inform friends about your activities., 73
spike: Electrical disturbance that occurs when the
increase in power lasts for less than one millisecond steering committee: Decision-making body in an
(thousandth of a second)., 140 organization., 517

spoofing: A technique intruders use to make their net- storage
work or Internet transmission appear legitimate to a
victim computer or network., 217 access time, 371

spooling: The process of sending documents to be capacity, 370
printed to a buffer instead of sending them immedi-
ately to the printer., 418 enterprise, 389–392

sports mobile apps, 187 vs. memory, 370

options of, 369

processor speed of, computer and, 368

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 43

storage and processes of data, 12 subwoofer: Audio output device that boosts low bass
sounds in a surround sound speaker system., 351
storage appliance: A server that is placed on a network
with the sole purpose of providing storage to users, summary report: Report generated by a management
computers, and devices attached to the network., 390. information system that consolidates data usually with
See also network attached storage (NAS) totals, tables, or graphs, so that managers can review it
quickly and easily., 558
storage area network (SAN): A high-speed network
with the sole purpose of providing storage to other supercomputer: The fastest, most powerful computer
attached servers., 391–392 and the most expensive., 120

storage as a service, 287 superscalar: Processors that can execute more than one
instruction per clock cycle., 283
storage device: Device that records (writes) and/or
retrieves (reads) items to and from storage media., 17, support and security phase: Step in the system develop-
340, 368 ment life cycle whose purpose is to provide ongoing
assistance for an information system and its users after
storage media: Media, such as hard disks, solid-state the system is implemented, and consists of three major
drives, USB flash drives, memory cards, and optical activities: (1) perform maintenance activities,
discs, on which a computer keeps data, instructions, (2) monitor system performance, and (3) assess
and information., 17 system security., 526

storage server, 116 surfing the web: Term used to refer to the activity of
using links to explore the web., 21
stored program concept: Concept of using memory to
store both data and programs., 290 surge protector: Device that uses electrical components
to provide a stable current flow and minimize the
storing: Processor operation in the machine cycle that chances of an overvoltage reaching the computer and
writes the result to memory (not to a storage other electronic equipment., 140
medium)., 281
surge suppressor: Device that uses electrical compo-
streaming: The process of transferring data in a continu- nents to provide a stable current flow and minimize
ous and even flow, which allows users to access and use the chances of an overvoltage reaching the computer
a file while it is transmitting., 38, 79 and other electronic equipment., 140

audio and video, 187 survey distribution, system analysts, 520

streaming cam: Camera that has the illusion of moving swap file: Area of the hard drive used for virtual
images because it sends a continual stream of still ­memory., 418
images., 333
swipe keyboard app, 123
streaming media player: Device, typically used in a
home, that streams digital media from a computer swipe: Touch gesture in which a user presses and holds
or network to a television, projector, or some other one finger and then moves the finger horizontally or
entertainment device., 9, 128. See also digital media vertically on the screen., 5
player
switch: A device that provides a central point for cables
stretch: Touch gesture in which a user moves two fingers in a network., 473. See also hub
apart., 5
symmetric key encryption: Encryption method where
striping, 390 both the originator and the recipient use the same
secret key to encrypt and decrypt the data., 230. See
strong passwords, 25 also private key encryption

Structured Query Language (SQL): A popular query synchronize: Process of matching the files on computers
language that allows users to manage, update, and or mobile devices in two or more locations with each
retrieve data., 512 other., 34. See also sync

stylus: Input device that looks like a small ink pen that sync: Process of matching the files on computers or
you can use instead of a fingertip to enter data, make mobile devices in two or more locations with each
selections, or draw on a touch screen., 112, 326 other ; short for synchronize., 34. See also synchronize

subject directory: Search tool that classifies webpages in syntax, 528
an organized set of categories and related
s­ ubcategories., 72 system board, 278

subscribe: Adding your email address to a mailing system bus, 300
list., 90

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 44 Index

system clock: Small quartz crystal circuit that controls printing from, 347
the timing of all computer operations., 282–283
tactile output: Feature included with some input devices
system development: A set of activities used to build an that provides the user with a physical response from
information system., 515 the device., 353

analysis phase, 521–522 tag: A short descriptive label that you assign to webpages,
photos, videos, blog posts, email messages, and other dig-
circumstances initiating, 521 ital content so that it is easier locate at a later time., 75

data and information gathering techniques, 520 tape: A magnetically coated ribbon of plastic that is capa-
ble of storing large amounts of data and information at
design phase, 523–525 a low cost., 392

documentation, 519 tape cartridge: A small, rectangular, plastic housing for
tape., 392
feasibility assessment in, 519
tape drive: Drive that reads from and writes on a
general guidelines of, 517 ­magnetic tape., 392

implementation phase, 525–526 tape library: Facility where individual tape cartridges are
mounted in a separate cabinet., 392
participation in, 517
tap: Touch gesture in which a user quickly touches and
planning phase, 521 releases one finger one time., 5

support and security phase, 526–527 target: Destination location on a storage device., 34

system development life cycle (SDLC): Collection of taskbar, 427
phases in system development., 515
tax preparation software: An application that can guide
system proposal, 522 individuals, families, or small businesses through the
process of filing federal taxes., 176
systems analyst: Person responsible for designing and
developing an information system., 517, 568 TB (terabyte): 1 trillion bytes, 290, 370

systems programmer: Employee who installs and Tbps (terabits per second), 479
m­ aintains operating system software and provides
technical support to the programming staff., 568 T-carrier line: Any of several types of long-distance digi-
tal phone lines that carry multiple signals over a single
system software: Term used to refer to the operating communications line., 468
system and other tools that consist of the programs
that control or maintain the operations of the com- TCP/IP: Network protocol that defines how messages
puter and its devices., 158 (data) are routed from one end of a network to the
other, ensuring the data arrives correctly. Short for
systems test: Test performed during the program Transmission Control Protocol/Internet Protocol., 461
­development life cycle that verifies all programs in
an application work together properly., 525 technical feasibility: Test that measures whether the
organization has or can obtain the computing
system unit: The case that contains and protects the resources, software services, and qualified people
motherboard, hard disk drive, memory, and other needed to develop, deliver, and then support the pro-
­electronic components of the computer from damage., posed information system., 519
114, 276. See also chassis
technical specifications, identification, 523
T
technical project manager: Employee who guides
T1 line: The most popular T-carrier line., 468 design, development, and maintenance tasks; serves as
interface between programmers/developers and
T3 line: T-carrier line that is equal in speed to 28 T1 m­ anagement., 569
lines., 468
technology
tabbed browsing: Browsing technique where the top of
the browser shows a tab (similar to a file folder tab) for in entertainments, 199
each webpage you display., 66
health concerns of using, 142–144
tables, 500
national and local security, 249
tablet: Thin, lighter weight mobile computer that has a
touch screen, usually smaller than a laptop but larger technology addiction: Behavioral health risk that occurs
than a phone., 4, 112 when the technology consumes someone’s entire social
life., 144
vs. laptops, desktops, 6

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 45

technology careers, 562–571 tethering: Technique used to configure a smartphone or
Internet-capable tablet to act as a portable communi-
app development and mobile technologies, 570 cations device that shares its Internet access with other
computers and devices wirelessly., 60
business and government organizations, 562–564
text, output, 340
information and systems security, 570
text message: A short note, typically fewer than 300
IT consulting, 568 characters, sent to or from a smartphone or other
mobile device., 7
software and apps field, 564
text message services, 124
system development, 568
text/picture/video messaging services, 458
technology education, training, and support, 567
text-to-speech feature, 129
technology equipment field, 564
TFT: Thin-film transistor. LCD display technology that
technology operations, 569 uses a separate transistor to apply charges to each liq-
uid crystal cell and, thus, displays high-quality color
technology sales, 566 that is viewable from all angles., 342

technology service and repair field, 565 theft

technology certificatons of hardware, 139, 233

application software certifications, 572–573 of information, 229–233

data analysis and database certifications, 573 of software, 228–229

hardware certifications, 573 thermal printer: Printer that generates images by push-
ing electrically heated pins against heat-sensitive
networking certifications, 573 paper., 349

operating system certifications, 574 thermostats, programmable, 11

programmer/developer certifications, 574–575 thin client: A terminal that looks like a desktop but has
limited capabilities and components., 117
security certifications, 575
thrashing: Occurs when an operating system spends
technology equipment field: Specialty area consisting much of its time paging, instead of executing applica-
of manufacturers and distributors of computers, mobile tion software., 418
devices, and other hardware, such as magnetic and
optical drives, monitors, printers, and communications thread: In discussion forums, consists of the original
and networking devices., 564 a­ rticle and all subsequent related replies. Also called a
threaded discussion., 91
technology industry, 552–553
throttling: ISP practice of reducing upload and down-
technology overload: Behavioral health risk that occurs load speeds of certain high-data users at peak times in
when people feel distressed when deprived of technol- order not to tie up network resources for a small pool
ogy, even for a short length of time, or feel over- of users., 477
whelmed with the amount of technology they are
required to manage., 144 thumb drive: A portable flash memory storage device
that you plug in a USB port., 382. See also USB flash
technology-related tendonitis, 142 drive

technology security plan components, 527 thumbnail: A small version of a larger object that you
usually can tap or click to display a larger image or
technology service and repair field: Specialty area object., 85
that focuses on providing preventive maintenance,
component installation, and repair services to cus- Thunderbolt ports, 135
tomers., 565
TIFF graphics format, 86
telecommuting, home office for, 563
tiles, 426
telematics, 133
time bombs, 190
telemedicine: The use of communications and information
technology to provide and assist with medical care., 459 toggle key: A key that switches between two states each
time a user presses the key., 320
tendonitis, 142
token: A special series of bits that functions like a ticket.,
terabyte (TB): 1 trillion bytes, 290, 370 460

terminal: A computer, usually with limited processing
power, that enables users to send data to and/or receive
information from a server, or host computer., 117

test plan, 235

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 46 Index

token ring: Standard that specifies that computers and transaction processing system (TPS): An information
devices on the network share or pass a special signal, system that captures and processes data from day-to-
called a token, in a unidirectional manner and in a day business activities; TPS for short., 557
p­ reset order., 460
transactions, verifying, 174
toll fraud, 238
toll fraud malware: Malicious mobile app that uses a transfer rate: The speed with which data, instructions,
and information transfer to and from a device., 371
variety of fraudulent schemes to charge unsuspecting
users for premium messaging services., 193 transferring media from mobile devices to computers, 153
toner: Type of powdered ink that is used by some
laser printers and copy machines to produce output., transistor: Element of an integrated circuit that can act
348 as an electronic switch that opens or closes the circuit
tools: Programs that enable you to perform mainte- for electrical charges., 278
nance-type tasks usually related to managing devices,
media, and programs used by computers and mobile transmission media: Materials or substances capable of
devices., 158. See also utilities carrying one or more communications signals., 450,
top-level domain: The suffix of the domain name in a 476–477
web address., 63
original (table), 63 transportation, and computers, mobile devices, 95
touch input, 324–325
touch mouse: Touch-sensitive mouse that recognizes touch travel, technology in, 39
gestures, in addition to detecting movement of the mouse
and traditional click and scroll operations., 323 travel apps, 178
touchpad: A small, flat, rectangular pointing device that
is sensitive to pressure and motion., 13, 323 travel web database services, 507
touch screen: A touch-sensitive display device., 324–326
gestures (table), 5 travel websites, 80
on smartphones, 7
touch-sensitive pad: An input device that contains but- trial version: An application you can use at no
tons and/or wheels you operate with a thumb or fin- charge for a limited time, to see if it meets your
ger., 128, 326 needs., 161
touch user interface, 414
tourism websites, 80 trojan horse: A destructive program that hides within or
tower: A frame made of metal or plastic that houses the looks like a legitimate program., 190, 215
system unit on a desktop., 114
tower server: A server built into an upright cabinet twisted-pair cable: Physical transmission media that
(tower) that stands alone., 116 consists of one or more twisted-pair wires bundled
Toys “R” Us, 243 together., 477
trackball: A stationary pointing device with a ball on its
top or side., 324 twisted-pair wire: Two separate insulated copper wires
tracking software, 279 that are twisted together., 477
track: Narrow recording band that forms a full circle on
the surface of the disk., 374 Twitter, 23, 24, 78
trackpad: Term used by Apple to refer to the touchpad
on its laptops., 323 two-step verification process, 226–227
traditional literacy, 561
traffic: Communications activity on the Internet., 62 typing on phone with numeric keypad, 123
training: Showing users exactly how they will use the
new hardware and software in the system., 526 U

UI (user interface): Portion of software that controls
how you enter data and instructions and how informa-
tion is displayed on the screen., 414

ultrabook, 111

ultrasonic sensors, 279

ultra-wideband (UWB): A network standard that
s­pecifies how two UWB devices use short-range radio
waves to communicate at high speeds with each
other., 464

UMB (Ultra Mobile Broadband): Ultra Mobile
Broadband; a 4G standard for cellular transmissions, 481

UMTS (Universal Mobile Telecommunications
System): Universal Mobile Telecommunications
System; a 3G standard for cellular transmissions, 481

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 47

unauthorized access and use, 221 USB cable, transferring photos to computers
using, 153
unauthorized access: The use of a computer or network
without permission., 221 USB flash drive: A portable flash memory storage device
that you plug in a USB port., 18, 382–383. See also
unauthorized use: The use of a computer or its data for thumb drive
unapproved or possibly illegal activities., 221
safely removing, 383
uncompress: To unzip or expand a zipped (compressed) USB hub, 136
file, which restores it to its original form., 198 USB port: Port that can connect up to 127 different

undervoltage: Electrical disturbance that occurs when peripheral devices together with a single connector.
the electrical supply or voltage drops below the normal Short for universal serial bus port., 136
volts., 140 U.S. Department of Homeland Security, 36
user: Anyone who interacts with a computer or
uninstaller: A tool that removes a program, as well as mobile device, or utilizes the information it
any associated entries in the system files., 195, 422 generates., 4
categories of (table), 41, 42
uninstalling programs, 195 user buy-in: A measure of how likely users are to accept
and use a new system., 524
uninterruptible power supply (UPS): A device that user experience designer: Employee who plans and
contains surge protection circuits and one or more bat- designs software and apps that consider a user’s reac-
teries that can provide power during a temporary or tion to a program and its interface, including its effi-
permanent loss of power., 141 ciency, its effectiveness, and its ease of use. See also UX
designer, 569
United States Computer Emergency Readiness Team user ID: A unique combination of characters, such as let-
(US-CERT), 557 ters of the alphabet or numbers, that identifies one
specific user. Short for user identification., 222. See also
unit test: Test performed during the program develop- user name
ment life cycle that verifies each individual program or user interface (UI): Portion of software that controls
object works by itself., 525 how you enter data and instructions and how informa-
tion is displayed on the screen., 29, 414
Universal Product Code (UPC): Bar code used by user name: A unique combination of characters, such as
retail and grocery stores., 335 letters of the alphabet or numbers, that identifies one
specific user. Also called log on name or sign on name.,
UNIX: A multitasking operating system developed in the 88, 242, 423. See also user ID
early 1970s by scientists at Bell Laboratories., 429 user response: An instruction a user issues by
r­ esponding to a message displayed by a program or
unlicensed software, 565 app., 318
U.S. Securities and Exchange Committee (SEC), 295
unsubscribe: Removing your email address from a utilities: Programs that enable you to perform mainte-
­mailing list., 90 nance-type tasks usually related to managing devices,
media, and programs used by computers and mobile
UPC (Universal Product Code): Bar code used by devices., 158. See also tools
retail and grocery stores., 335 UWB (ultra-wideband): A network standard that
specifies how two UWB devices use short-range
updates for desktop and mobile apps, 157 radio waves to communicate at high speeds with each
other., 464
uplink: Transmission from an earth-based station to a UX designer: Employee who plans and designs software
satellite., 482 and apps that consider a user’s reaction to a program
and its interface, including its efficiency, its effective-
uploading: The process of transferring files from your ness, and its ease of use. See also user experience
computer or mobile device to a server on the designer, 569
Internet., 92

upstream rate: The transfer rate that is achieved
when data is being received on a communications
c­ hannel., 463

upward compatible: Applications that may not run on
new versions of an operating system., 425

URL: Unique address of a webpage. Short for Uniform
Resource Locator., 68. See also web address

USA TODAY website, 76

USB adapters: A dongle that plugs into a USB port,
enhances functions of a mobile computer and/or pro-
vides connections to peripheral devices., 298–299

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 48 Index

V virtual keyboard: Phone technology that projects an
image of a keyboard on a flat surface., 124
validation: The process of comparing data with a set of
rules or values to determine if the data meets certain virtual keyboards, 13
criteria., 503
virtual machine (VM): Environment on a computer in
value-added network (VAN): A third-party business which you can install and run an operating system and
that provides networking services, such as EDI ser- programs., 431
vices, secure data and information transfer, storage, or
email., 453 virtual memory: A portion of a storage medium, such as
a hard drive or USB flash drive, that the o­ perating
value-added reseller (VAR): An organization that pur- system allocates to function as additional RAM., 417
chases products from manufacturers and then resells
these products to the public — offering additional virtual private network (VPN): Network that
s­ervices with the product., 523 provides a mobile user with a secure connection
to a company network server, as if the user has a
VAN (value-added network): A third-party business that private line., 230
provides networking services, such as EDI services, secure
data and information transfer, storage, or email., 453 virtual reality (VR): The use of computers to simulate a
real or imagined environment that appears as a three-
vandalism of hardware, 139, 233 dimensional (3-D) space., 87
VAR (value-added reseller): An organization that pur-
virus: A potentially damaging computer program that
chases products from manufacturers and then resells affects, or infects, a computer negatively by altering
these products to the public — offering additional the way the computer works without the user’s knowl-
­services with the product., 523 edge or permission., 190, 215
vendor proposals, 523
verification process, two-step, 226–227 detecting, 192
video, output, 340
video blog (vlog), 78 hoaxes, recognizing, 192
video call: Call in which all parties see one another as
they communicate over the Internet., 332 how they spread via email, 215
video card: Adapter card that converts computer output
into a video signal that travels through a cable to the and malware, 190
monitor, which displays an image on the screen., 298.
See also graphics card protection from, 25
videoconference: A meeting between two or more
geographically separated people who use a network or signs of infection, 191
the Internet to transmit audio and video data., 31,
188, 333 virus signature: A known specific pattern of virus code.,
video editing software: An application that allows 192
professionals to modify a segment of a video, called
a clip., 183 Visual Basic, 29, 532
video games, 132
video: Images displayed in motion and voice input., 14, 87 visual programming environment (VPE): A graphical
streaming, 187 interface in a visual programming language that allows
video message: A short video clip, usually about system developers to drag and drop objects to build
30 seconds, sent to or from a smartphone or other programs and apps., 532
mobile device., 7
video projectors, 113 visual programming language: A language that uses a
video sharing sites, 75 visual or graphical interface for creating all source
virtualization: The practice of sharing or pooling com- code., 532
puting resources, such as servers and storage devices.,
117, 432 Visual Studio: A suite of object-oriented application
development tools that assists software developers in
building programs and apps for Windows or any oper-
ating system that supports the Microsoft. NET
Framework., 531

visual voice mail: A voice mail feature that allows you to
view message details such as the length of calls and, in
some cases, read message contents instead of listening
to them., 125

VM (virtual machine): Environment on a computer in
which you can install and run an operating system and
programs., 431

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 49

voice commands warm boot: The process of restarting a computer
or mobile device while it remains powered on., 413
gaming, 11
wearable device: Small mobile computing consumer
and video input, 11 device designed to be worn and that often communi-
cate with a mobile device or printer., 9, 130, 325. See
voice input: The process of entering input by speaking also wearable
into a microphone., 330
wearable: Small mobile computing consumer device
voice mail, 31, 125 designed to be worn and that often communicate
with a mobile device or printer, 9. See also wearable
voice mail message: Short audio recording sent to or device
from a smartphone or other mobile device., 7
wearable technology, 285
voice recognition: A computer or mobile device’s capa-
bility of distinguishing spoken words., 330. See also weather forecasts, 124
speech recognition
weather websites, 76
voice recognition application: Application that allows
users to dictate text and enter instructions by speaking Web 2.0: Term to refer to websites that provide a means
into a microphone., 330 for users to share personal information, allow users to
modify website content, and provide applications
voice verification system: Biometric device that compares through a browser., 65
a person’s live speech with their stored voice pattern., 225
web address: Unique address of a webpage., 68. See also
VoIP: Technology that uses the Internet (instead of the URL
public switched telephone network) to connect a call-
ing party to one or more local or long-distance called web anaytics expert: Employee who collects and
parties and and enables users to speak to other users ­measures Internet data, such as website traffic patterns
via their Internet connection. Short for Voice over IP and advertising, and develops reports that recommend
(Internet Protocol)., 24, 31, 92, 188 strategies to maximize an organization’s web presence.,
569
volatile memory: Memory that loses its contents when
the computer’s power is turned off., 290 web app: An application stored on a web server that you
access through a browser., 28, 69, 161
volatility, illustration of, 371
email, 103
VPE (visual programming environment): A graphical
interface in a visual programming language that allows for personal, business productivity, 178
system developers to drag and drop objects to build
programs and apps., 532 web: A worldwide collection of electronic documents;
short for World Wide Web., 21, 65
VPN: Network that provides a mobile user with a secure
connection to a company network server, as if the user graphics formats used on (table), 86
has a private line., 230
media on the, 76
VR world: Three-dimensional (3-D) environment that
contains infinite space and depth., 88 searching the, 22

W web-based training (WBT): A type of computer-based
training that uses Internet technology to deliver the
W3C: Group that oversees research and sets standards training., 184
and guidelines for many areas of the Internet whose
mission is to ensure the continued growth of the webcam: A digital video camera that allows you to cap-
web., 58 ture video and usually audio input for your computer
or mobile device., 14, 332
Wallet: Windows app that provides a centralized
location for coupons, credit cards, loyalty cards, spying, punishment for, 111
and memberships in a single, easily accessible
location., 435 web conference: A meeting that takes place on the web.,
520
WAN (wide area network): A network that covers a
large geographic area (such as a city, country, or the web creation and management, 84
world) using a variety of wired and wireless transmis-
sion media., 455 web designer: Employee who designs the layout, naviga-
tion, and overall appearance of a website with a focus
on user experience; specifies a website’s appearance
using HTML5, JavaScript, CSS, media, and other web
design technologies., 568

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 50 Index

web databases, 170, 506–507 Wi-Fi (wireless fidelity): Broadband Internet
web developers: Designers of webpages., 534, 568 connection that uses radio signals to provide
web development, 534–538 connections to computers and devices with built-in
web feed: Content that has changed on a website that Wi-Fi capability or a communications device that
enables Wi-Fi connectivity., 31, 59, 138, 462
you can display in your browser., 69, 188
web filtering software: A program that restricts access Wi-Fi network
adding computer or mobile device to, 455
to certain material on the web., 193, 248
web hosting service: Service on the web that provides a wiki: A collaborative website that allows users to create,
add to, modify, or delete the content via their browser.,
program that assists you with creating, editing, and 40, 78
hosting content on a website., 64
web maps, 81 Wikipedia, 40, 78
WebMD, 74 Windows Media Player, 87
webpage: Each electronic document on the web; can Windows Phone: A proprietary mobile operating system
contain text, graphics, audio, and video., 21, 65
web publishing: The development and maintenance of that runs on some smartphones., 435
websites., 84 Windows Phone Store: Store that provides access to
web server: A computer that delivers requested
webpages to your computer or mobile device., 21, additional Windows apps and software updates, 435
65, 116 wireless
website: A collection of related webpages and associated
items stored on a web server., 21, 65 device connections, 137
website authoring software: Software that helps users Internet access points, 31
of all skill levels create webpages that include graphics, messaging services, 31
video, audio, animation, and special effects with inter- security, 236–237
active content., 184 wireless access point (WAP): A central communications
websites
avoiding malware infections, 110 device that allows computers and devices to transfer
and cookies, 244 data wirelessly among themselves or to a wired network
copying media from, 38 using wireless technologies, such as Wi-Fi., 236, 470
displaying CAPTCHA, 224 wireless Ethernet: Term sometimes used to refer to
downloading software safely, 162 Wi-Fi because it uses techniques similar to the
finance, 36 Ethernet standard to specify how physically to config-
government, 36 ure a wireless network., 462
portals, 82 wireless keyboard: A battery-powered device that
types of, 71–85 transmits data to the computer or mobile device using
verifying safety of, 66 wireless technology., 322
whether correct or accurate, 85 wireless LAN (WLAN): A LAN that uses no physical
website scams, 245 wires., 454
wheel: A steering-wheel-type input device that users wireless markup language (WML): Subset of XML
turn to simulate driving a car, truck, or other that allows web developers to design pages specifically
vehicle., 131 for microbrowsers., 536
wide area network (WAN): A network that covers a wireless modem: Modem that uses a wireless
large geographic area (such as a city, country, or the ­communications technology (such as cellular radio,
world) using a variety of wired and wireless transmis- satellite, or Wi-Fi network) to connect to the
sion media., 455 Internet., 58, 469
widescreen monitor: Monitor that is wider than it is wireless mouse: A battery-powered device that transmits
tall., 343 data using wireless technology., 323
wireless router: A device that performs the functions of
a router and also a wireless access point., 471
wireless signal, strengthening, 471
wireless transmission media, 478–479
broadcast radio, 479

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 51

cellular radio, 480–481 WORM: Write once, read many, 388
communications satellite, 482–483 Wozniak, Steve, 26
GPS (global positioning system), 483–484 writing: The process of transferring data, instructions, and
infrared (IR), 479
microwaves, 482 information from memory to a storage medium., 368
WLAN (wireless LAN): A LAN that uses no physical
X
wires., 454
WML (wireless markup language): Subset of XML xD Picture Card: A type of memory card., 381
XML: Popular format for sharing data that allows web
that allows web developers to design pages specifically
for microbrowsers., 536 developers to create tags that describe the structure of
word processing software: An application that allows information., 536
users to create and manipulate documents containing
mostly text and sometimes graphics. Sometimes called Y
a word processor., 167
word size: The number of bits the processor can inter- yottabyte (YB), 370
pret and execute at a given time., 300 YouTube, 75
wordwrap feature, 167
worksheet: Rows and columns used to organize data in a Z
spreadsheet., 168
creating, 168–169 zettabyte (ZB), 370
workstation: High-end desktop that is designed to han- zipped files: Name sometimes used to refer to
dle intense calculations and sophisticated graphics., 114
World Wide Web (WWW): A worldwide collection of c­ ompressed files., 198
electronic documents., 20, 21, 65 zombie: A compromised computer or device whose
worm: Malware that resides in active memory and repli-
cates itself over a network to infect machines, using up owner is unaware the computer or device is being
the system resources and possibly shutting down the controlled remotely by an outsider., 216
system., 190, 215 zombie army: A group of compromised computers or
mobile devices connected to a network such as the
Internet that are used to attack other networks, usually
for nefarious purposes., 216. See also botnet
Zuckerberg, Mark, 23

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.


Click to View FlipBook Version