C6192_CH12 pp3.qxd 2/3/07 12:47 PM Page 474
474 CHAPTER 12 ENTERPRISE COMPUTING
ENTERPRISE HARDWARE
Enterprise hardware allows large organizations to manage and store information and data using
devices geared for heavy use, maximum availability, and maximum efficiency.
One of the goals of an enterprise’s hardware is to maintain a high level of availability to end
users. The availability of hardware to users is a measure of how often it is online. Highly available
hardware is accessible 24 hours a day, 365 days a year.
The following sections discuss a variety of enterprise hardware solutions.
FAQ 12-3
What types of information do Web site management programs track?
Web site management programs, which are free or may be purchased for a fee, collect data designed to help
companies make informed decisions regarding their Web presence. This data might include the locations of their
Web site visitors, what Web browser they use, the days and times they visit the Web site, and what keywords
they entered into a search engine to locate the site. For more information, visit scsite.com/dcf4e/ch12/faq and
then click Web Site Management Programs.
RAID
For applications that depend on reliable data access, users must have the data available when
they attempt to access it. Some manufacturers provide a type of hard disk system that connects
several smaller disks into a single unit that acts like a single large hard disk. As you learned in
Chapter 6, a group of two or more integrated hard disks is called a RAID (redundant array of
independent disks). Although quite expensive
for large computers, RAID is more reliable than
traditional hard disks (Figure 12-22). Networks
and Internet servers often use RAID.
A RAID system duplicates data, instructions,
WEB LINK 12-6 and information to improve data reliability. The
RAID simplest RAID storage design, called mirroring,
For more information, writes data on two disks at the same time to dupli-
visit scsite.com/dcf4e/
ch12/weblink and then cate the data. This configuration enhances storage FIGURE 12-22 A group of two or more
click RAID. reliability because, if a drive should fail, a duplicate integrated hard disks, called a RAID (redundant
of the requested item is available elsewhere within array of independent disks), often is used with
the array of disks. network servers. Shown here is a rack-mounted
RAID chassis including the hard disks.
Network Attached Storage and Storage Area Networks
Network attached storage (NAS) is a server that is placed on a network with the sole purpose
of providing storage to users and information systems attached to the network (Figure 12-23a). A
network attached storage server often is called a storage appliance because it is a piece of equip-
ment with only one function — to provide additional storage. Administrators quickly add storage
to an existing network simply by attaching a new network attached storage server to the network.
C6192_CH12 pp3.qxd 2/3/07 12:47 PM Page 475
ENTERPRISE HARDWARE 475
A storage area network (SAN) is a high-speed network with the sole purpose of providing
storage to other servers to which it is attached (Figure 12-23b). A storage area network is a
network that includes only storage devices. High-speed fiber-optic cable connects other networks
and servers to the storage area network, so the networks and servers have fast access to large
storage capacities.
FIGURE 12-23a (network attached storage on a LAN)
server
client
NAS
client
LAN NAS
server
server
FIGURE 12-23b (a SAN provides centralized storage for servers and networks) server
disk RAID
client
server
SAN tape
server LAN
client client
disk
CD-ROM
FIGURE 12-23 Network attached storage (NAS) and a storage area network (SAN) connect to existing servers and
networks in different ways.
C6192_CH12 pp3.qxd 2/3/07 12:47 PM Page 476
476 CHAPTER 12 ENTERPRISE COMPUTING
WEB LINK 12-7 Enterprise Storage Systems
Fibre Channel Many companies use networks. Data, information, and instructions stored on the network must
be easily accessible to all authorized users. The data, information, and instructions also must be
For more information, secure, so unauthorized users cannot access the network. An enterprise storage system is a strategy
visit scsite.com/dcf4e/ that focuses on the availability, protection, organization, and backup of storage in a company.
ch12/weblink and
then click Fibre The goal of an enterprise storage system is to consolidate storage so operations run as effi-
Channel. ciently as possible. Most enterprise storage systems manage extraordinary amounts of data. For
example, one large retailer manages a several-hundred terabyte (over 100,000,000,000,000 bytes)
storage system to store sales data. Read Ethics & Issues 12-3 for a related discussion.
To implement an enterprise storage system, a company uses a combination of techniques. As
shown in Figure 12-24, an enterprise storage system may use servers, RAID, a tape library, CD-ROM
and DVD-ROM jukeboxes, Internet backup, network attached storage devices, and/or a storage area
network. Enterprises often use Fibre Channel technology to connect to storage systems at data rates
up to 4 Gbps.
RAID tape libraries
servers Fibre CD-ROM and DVD-ROM jukeboxes
Channel
SAN
FIGURE 12-24 An enterprise storage system NAS device Internet backup
uses many types of storage.
ETHICS & ISSUES 12-3
How Much Data Should Companies Be Required to Keep?
In 2002, the Sarbanes-Oxley Act was signed into law, providing a myriad of financial reporting requirements and guidelines for public
companies. A main focus of the law is the retention of business records. As provisions of the law slowly have come into effect, companies have
been faced with massive new data storage requirements for these records. For example, all e-mail messages within a company are considered
to be business records and must be retained. Deleting stored e-mail messages constitutes a destruction of evidence infraction. Penalties include
20 years in prison for any employee who alters or destroys records or documents. IT departments are faced not only with understanding this
complex law, but also with ensuring accuracy of financial data, determining policies for record retention, and building storage capacity to hold
all of the data. Supporters of the law cite its need due to the recent wave of corporate scandals. Opponents say that the law is overreaching and
costs too much for the added benefits. Is the Sarbanes-Oxley Act an unfair burden on companies? Why or why not? Should companies be able
to engage in internal communications without the fear that those communications could be used against them later? Why or why not? How
should companies go about reacting to the law? Are such laws necessary in order to protect the public? Why or why not?
C6192_CH12 pp3.qxd 2/3/07 12:47 PM Page 477
ENTERPRISE HARDWARE 477
Some companies manage an enterprise storage system in-house. Other enterprises elect
to offload all (or at least the backup) storage management to an outside organization or online
Web service. This practice is known as outsourcing. Some vendors focus on providing enterprise
storage systems to clients. A data warehouse might seek this type of outside service.
Blade Servers FIGURE 12-25 A blade server contains
several very small servers, each on its own
Blade servers, sometimes called ultradense servers, pack a blade within the server.
complete computer server, such as a Web server or network server, on a
single card, or blade, rather than a system unit. Each blade server
includes a processor, memory, hard disk, network card, and ports on
the card. The individual blades insert in a blade server chassis that
can hold many blades. Using blade servers allows an organization to
fit 16 or more blades in the physical space occupied by a single server.
Figure 12-25 shows a blade and a chassis that holds many blades.
Besides the savings in space offered by blade servers, blade servers
require less maintenance, use less energy, generate less heat, and
easily are replaced or upgraded.
High-Availability Systems
High-availability systems continue running and performing tasks for at least 99 percent of
the time. Some users demand that high-availability systems be available for 99.99 percent of the
time. A system that has uptime of 99.99 percent is nonfunctional for less than one hour per year.
That one hour, called downtime, includes any time that the computer crashes, needs repairs, or
requires installation of replacement or upgrade parts. A system with 99.9 percent availability is
said to have three nines of availability, and a system with 99.99 percent availability is said to have
four nines of availability.
Telecommunications companies, such as local telephone companies, rely on high-availability
systems to deliver telephone service. Emergency 911 communications centers require almost 100
percent uptime for their hardware and software applications as mandated by law. Centralized
accounting or financial systems must be available to gather sales and other accounting informa-
tion from locations scattered around the globe.
High-availability systems often include a feature called hot-swapping. Hot-swapping allows
components, such as a RAID hard disk or power supplies, to be replaced while the rest of the sys-
tem continues to perform its tasks. A high-availability system also may include redundant com-
ponents. Redundant components, such as redundant power supplies, allow for a functioning
component to take over automatically the tasks of a similar component that fails. When a compo-
nent fails, the system administrator is notified, but the computer continues to perform its tasks
because a redundant component has taken its place automatically in the system.
Scalability
As an enterprise grows, its information systems either must grow with it or must be replaced.
Scalability is a measure of how well a computer hardware system, software application, or infor-
mation system can grow to meet increasing performance demands. A system that is designed,
built, or purchased when the company is small may be inadequate when the company doubles
in size. When making decisions for computing solutions, managers must be careful to consider
the growth plans of the company.
A company may find that its Web site is becoming overwhelmed by customers and prospective
customers. If the Web site is scalable, then the Web administrator can add more Web servers to
handle the additional visitors to the Web site. Similarly, an enterprise’s storage needs usually
grow daily, meaning that storage systems should be scalable to store the ever-growing data
generated by users.
Adding additional hardware often is the easiest method to grow, or scale, an information
system. Often, at some point, a system no longer scales and must be replaced with a new system.
C6192_CH12 pp3.qxd 2/3/07 12:47 PM Page 478
478 CHAPTER 12 ENTERPRISE COMPUTING
Utility and Grid Computing
As the need for scalability increases, companies often find that using outside computing
resources is more economical than building new computing capacity internally. Utility and grid
computing are two new technologies that provide flexible and massive online computing power.
Utility computing, or on demand computing, allows companies to use the processing power sit-
ting idle in a network located somewhere else in the world. When the company uses the comput-
ing resources, they pay a fee based on the amount of computing time and other resources that
they consume.
Grid computing combines many servers and/or personal computers on a network, such as the
Internet, to act as one large computer. As with utility computing, a company may pay for the use
of a grid based on the amount of processing time that it needs. Grid computing often is used in
research environments, such as climate research and life science problems.
Interoperability
Enterprises typically build and buy a diverse set of information systems. An information system
often must share information, or have interoperability, with other information systems within the
enterprise. Information systems that more easily share information with other information systems
are said to be open. Information systems that are more difficult to interoperate with other infor-
mation systems are said to be closed, or proprietary. Recent open systems employ XML and Web
services to allow a greater level of interoperability.
BACKUP PROCEDURES
Business and home users can perform four types of backup: full, differential, incremental, or
selective. A fifth type, continuous data protection, is used by large enterprises. A full backup,
sometimes called an archival backup, copies all of the files in the computer. A full backup pro-
vides the best protection against data loss because it copies all program and data files. Performing
a full backup can be time-consuming. A differential backup copies only the files that have
changed since the last full backup. An incremental backup copies only the files that have changed
since the last full or last incremental backup. A selective backup, sometimes called a partial
backup, allows the user to choose specific files to back up, regardless of whether or not the files
have changed since the last incremental backup. Continuous data protection (CDP), or continu-
ous backup, is a system in which all data is backed up whenever a change is made. A continuous
data protection plan keeps a journal of every transaction — reads, writes, and deletes — made to
a server or servers.
Whatever backup procedures a company adopts, they should be stated clearly, documented in
writing, and followed consistently. Read Looking Ahead 12-2 for a look at the next generation of
backup systems.
LOOKING AHEAD 12-2
Internet Systems Provide Backup Solutions
An online backup service could improve worker productivity as broadband access becomes more
prevalent and computer storage costs continue to fall. Mobile workers use the same files at work,
home, and remote locations, and a Web-based backup service would allow them to access their current
documents at all times.
Various online backup services are starting to emerge. Google and Microsoft are among the developers
that are experimenting with services that automatically would synchronize photographs, Office files, and
other documents with any computer, so a user always would be working with the most current file version.
These virtual backup systems would store the files in a database and charge users for the number of
gigabytes stored or the number of times files are accessed per month.
Some corporations have expressed security concerns with remote storage and synchronization services,
so the backup developers are taking extra precautions to secure the file databases. For more information,
visit scsite.com/dcf4e/ch12/looking and then click Backup Future.
C6192_CH12 pp3.qxd 2/3/07 12:47 PM Page 479 479
BACKUP PROCEDURES
Disaster Recovery Plan
A disaster recovery plan is a written plan describing the steps a company would take to
restore computer operations in the event of a disaster. A disaster recovery plan contains four
major components: the emergency plan, the backup plan, the recovery plan, and the test plan.
THE EMERGENCY PLAN An emergency plan specifies the steps to be taken immediately after a
disaster strikes. All emergency plans should contain the following information:
1. Names and telephone numbers of people and organizations to notify (e.g., management, fire
department, police department)
2. Procedures to follow with the computer equipment (e.g., equipment shutdown, power shutoff,
file removal)
3. Employee evacuation procedures
4. Return procedures; that is, who can reenter the facility and what actions they are to perform
THE BACKUP PLAN Once the procedures in the emergency plan have been executed, the next
step is to follow the backup plan. The backup plan specifies how a company uses backup files
and equipment to resume information processing. The backup plan should specify the location
of an alternate computer facility in the event the company’s normal location is destroyed or
unusable.
When operations are so important that a company cannot afford to lose the operations to a
disaster, the company often maintains a hot site, which is a separate facility that mirrors the
systems and operations of the critical site. The hot site always operates concurrently with the
main site, so that if either site becomes unavailable, the other site continues to meet the com-
pany’s needs. The process of one system automatically taking the place of a failed system is called
failover.
The backup plan identifies these items:
1. The location of backup data, supplies, and equipment
2. The personnel responsible for gathering backup resources and transporting them to the
alternate computer facility
3. A schedule indicating the order in which, and approximate time by which, each application
should be up and running
For a backup plan to be successful, the company must back up all critical resources. Also,
additional people, including possibly nonemployees, must be trained in the backup and
recovery procedures because company personnel could be injured in a disaster.
FAQ 12-4
Should I have a backup plan?
Yes! Even home computers need a backup plan. You probably know someone who lost valuable personal
information due to a hard disk crash or other problem. Most modern operating systems include backup
software. You should familiarize yourself with the software, develop a plan, and test both backing up and
recovering data. For more information, visit scsite.com/dcf4e/ch12/faq and then click Backup Software.
THE RECOVERY PLAN The recovery plan specifies the actions to be taken to restore full information
processing operations. To prepare for disaster recovery, a company should establish planning com-
mittees, with each one responsible for different forms of recovery. For example, one committee is in
charge of hardware replacement. Another is responsible for software replacement.
THE TEST PLAN To provide assurance that the disaster plan is complete, it should be tested. A
disaster recovery test plan contains information for simulating various levels of disasters and
recording an organization’s ability to recover. In a simulation, all personnel follow the steps in
the disaster recovery plan.
C6192_CH12 pp3.qxd 2/3/07 12:47 PM Page 480
480 CHAPTER 12 ENTERPRISE COMPUTING
Test your knowledge of pages 474 through 479 in Quiz Yourself 12-3.
QUIZ YOURSELF 12-3
Instructions: Find the true statement below. Then, rewrite the remaining false statements so they are true.
1. Network attached storage is a high-speed network with the sole purpose of providing storage to other
servers to which it is attached.
2. Scalability refers to the ability of an information system to share information with other information
systems.
3. A differential backup copies only the files that have changed since the last full or last incremental backup.
4. A full backup is the fastest backup method, requiring only minimal storage.
5. An emergency plan specifies how a company uses backup files and equipment to resume information
processing.
6. The recovery plan specifies the actions to be taken to restore full information processing operations.
Quiz Yourself Online: To further check your knowledge of enterprise hardware, backup procedures, and a
disaster recovery plan, visit scsite.com/dcf4e/ch12/quiz and then click Objectives 6 – 8.
CHAPTER SUMMARY
This chapter reviewed the special computing requirements present in an enterprise-sized
organization. Various types of users within an organization require different types of information
systems. Large information systems become more valuable when they communicate with each
other and offer users a great deal of flexibility in interacting with the information system and
other users. The chapter discussed e-retailing and the types of businesses that use e-commerce.
Enterprises manage complex hardware, including storage area networks, RAID, and blade
servers. Requirements for this enterprise hardware often include high-availability, scalability,
and interoperability which they meet with technologies such as grid and utility computing. The
chapter also discussed the backup procedures present in a large organization.
CIO
CIO (chief information officer) is the highest-ranking position in an information
technology (IT) department. The CIO manages all of a company’s information
systems and computer resources. In large organizations, the CIO typically is a
vice president and reports directly to the organization’s CEO.
Depending on the organization, a CIO can be called an MIS (management
information systems) manager, an IS (information systems) manager, or an IT
(information technology) manager. Regardless of the title, the CIO determines an organization’s information
needs and provides the systems to meet those needs. The CIO sets an IT department’s goals, policies, and
procedures. In addition, the CIO evaluates technology, hires and supervises staff, oversees the network,
directs user services, develops backup and disaster recovery plans, and manages the department budget.
Perhaps most important, the CIO provides leadership, creating a vision for an IT department and helping
the department deliver that vision.
Some CIOs work as consultants, providing corporate IT departments with short-term or long-term
guidance. Most CIOs rise through the ranks of an organization’s IT department. Generally, CIOs have a
bachelor’s degree or higher in computer science and at least ten years’ experience in an IT department.
Today, many CIOs also have an MBA. Pay reflects the importance of the CIO, with average salaries in
excess of $200,000. For more information, visit scsite.com/dcf4e/ch12/careers and then click CIO.
C6192_CH12 pp3.qxd 2/3/07 12:47 PM Page 481
481
COMPANIES ON THE CUTTING EDGE
EMC
Information Management and Storage Provider
Information lives at EMC Corporation, a world leader in information management and
storage products, services, and solutions. The company helps organizations manage their
increasing volumes of data. Customers include health-care organizations, airlines and
transportation companies, educational institutions, and financial services firms, including
Harvard University, Discover Financial Services, and MasterCard International.
EMC has become the leader in the external storage systems and storage management
software markets. Its RAID systems, networked storage systems, and storage management
software are ranked at the top of the industry revenue shares. The largest commercial
database ever identified is stored on an EMC system: a 100.4 TB Oracle database.
The Massachusetts-based business was established in 1979 and employs 26,000
people worldwide. Its VMWare Workstation won a PC Magazine Editors’ Choice Award
and was named eWeek’s Top Product of 2005. For more information, visit
scsite.com/dcf4e/ch12/companies and then click EMC.
IBM
World’s Largest Information Technology Company
Nearly one-half of the world’s supercomputer total processing power is supplied by IBM
systems, according to the 2006 TOP 500 Supercomputer Sites List. But the company’s
products reach more than power users; IBM is the world’s largest information technology
corporation and works with consumers of all sizes.
IBM has a reputation for pioneering products. In 1911, three companies merged to sell
a variety of business-related gadgets, including a machine that used punched cards to
catalog data. Nine years later, the company changed its name to International Business
Machines (IBM). In its history of computer innovation, the company has developed the first
family of computers with interchangeable software and peripherals, the personal computer
with 16 KB of memory and a floppy disk drive, and the ThinkPad notebook computer. For
more information, visit scsite.com/dcf4e/ch12/companies and then click IBM.
TECHNOLOGY TRAILBLAZERS
John Chambers
Cisco Chairman and CEO
Investors and employees give John Chambers standing ovations at business meetings for his enthusiasm, excellent listening
skills, and quick decisions. But the Cisco chairman and CEO did not always enjoy such sweet success. As a youth, he struggled
from dyslexia. During the dotcom crash of 2001, Cisco’s growth dropped from 70 percent to negative 30 percent in 45 days as
inventories rose. But Chambers overcame these obstacles and has turned his life and his company into success stories.
Institutional Investor magazine named him the “Best CEO in America” in the “Telecommunications, Data Networking” category
in 2006, and Telecom Magazine awarded him with “The Most Influential Person in Communications” honors.
Chambers earned a law degree from West Virginia University and an MBA degree from Indiana University. He worked at IBM
and Wang Laboratories for 14 years before joining Cisco in 1991 as head of sales and operations. For more information, visit
scsite.com/dcf4e/ch12/people and then click John Chambers.
Jim Clark
Technology Innovator
When Jim Clark has an idea, people listen. As a professor at Stanford University, he developed a computer chip that processed
3-D images in real time. The high-powered chip formed the basis of Clark’s first company, Silicon Graphics, and was used to
create everything from suspension bridges to scenes in Hollywood movies.
Seeking more innovation opportunities, Clark contacted Marc Andreessen, creator of the Web browser, Mosaic. Together, they
launched Netscape Communications Corporation, the source of one of the world’s more successful Web browsers, Netscape
Navigator.
Since then, Clark has started other computer-related companies: Healtheon, which links doctors, patients, and health insurance
providers; MyCFO, a Web-based financial advisory firm; and Shutterfly, an online digital photo printing service. For more information,
visit scsite.com/dcf4e/ch12/people and then click Jim Clark.
C6192_CH12EOC pp2.qxd 2/3/07 1:04 PM Page 482
482
CHAPTER 12
Chapter Review
The Chapter Review section summarizes the concepts presented in this chapter. To obtain help from other students regarding
any subject in this chapter, visit scsite.com/dcf4e/ch12/forum and post your thoughts or questions.
What Are the Special Information Requirements of an Enterprise-Sized Corporation?
A large organization, or enterprise, requires special computing solutions because of its size and geographical extent.
Enterprise computing uses computers in networks or series of interconnected networks to satisfy the information
needs of an enterprise. The types of information employees require depend on their level in the company. Managers
utilize tools and techniques such as business intelligence, business process management, and business process
automation to focus on information that is important to the decision-making process.
What Information Systems Are Used in the Functional Units of an Enterprise?
An information system is a set of hardware, software, data, people, and procedures that works together to produce
information. In an enterprise, each type of functional unit has specialized requirements for their information systems.
Accounting and financial systems manage everyday transactions and help budget. A human resources information
system (HRIS) manages one or more human resources functions. Engineers use computer-aided design (CAD) and
computer-aided engineering (CAE). Computer-aided manufacturing (CAM) and computer-integrated manufacturing
(CIM) speed manufacturing. A marketing information system serves as a central repository for marketing tasks.
Sales force automation (SFA) software equips salespeople with the tools they need. Distribution systems control
inventory and manage shipping. Customer interaction management (CIM) software manages interactions with
customers. The information technology (IT) department makes technology decisions for an enterprise.
What Information Systems Are Used throughout an Enterprise?
Some general purpose information systems, or enterprise-wide systems, are used throughout an enterprise. A transaction
processing system (TPS) captures and processes data from day-to-day business activities. A management information
system (MIS) generates accurate, timely, and organized information, so users can make decisions, solve problems, and
track progress. A decision support system (DSS) helps users analyze data and make decisions. Enterprise resource
planning (ERP) provides applications to help manage and coordinate ongoing activities. Customer relationship
management (CRM) systems manage information about customers. A content management system (CMS) organizes
and allows access to various forms of documents and files.
Visit scsite.com/dcf4e/ch12/quiz or click the Quiz Yourself button. Click Objectives 1 – 3.
What Are Types of Technologies Used throughout an Enterprise?
Technologies used throughout an enterprise include portals, electronic data interchange, data warehouses, extranets, Web
services, workflow, and virtual private networks. A portal is a collection of links, content, and services on a Web page
designed to guide users to information related to their jobs. EDI (electronic data interchange) controls the transfer of data
and information among computers. A data warehouse stores and manages the data required to analyze transactions. An
extranet allows customers or suppliers to access part of an enterprise’s intranet. Web services allow businesses to create
products and B2B interactions. A workflow application assists in the management and tracking of the activities in a business
process. A virtual private network (VPN) provides users with a secure connection to a company’s network server.
What Are the Major Types of E-Commerce?
E-retail occurs when retailers use the Web to sell their products or services. Online banking allows users to pay bills
from their computers, and online trading lets users invest without using a broker. Entertainment and media on the Web
include music, videos, news, sporting events, and 3-D multiplayer games. Travel-related services on the Web include
directions; airline, hotel, or car reservations; and a shopping bot that searches for the best price on a product or service.
Visit scsite.com/dcf4e/ch12/quiz or click the Quiz Yourself button. Click Objectives 4 – 5.
C6192_CH12EOC pp2.qxd 2/3/07 1:04 PM Page 483
483
Chapter Review
What Are the Computer Hardware Needs and Solutions for an Enterprise?
Enterprise hardware allows large organizations to manage and share information and data using devices geared for
maximum availability and efficiency. A RAID (redundant array of independent disks) is a group of integrated disks that
duplicates data, instructions, and information to improve data reliability. Network attached storage (NAS) is a server that
provides storage for users and information systems. A storage area network (SAN) provides storage to other servers. An
enterprise storage system consolidates storage so operations run efficiently. Blade servers pack a complete computer server
on a single card. High-availability systems continue running and performing tasks for at least 99 percent of the time. Utility
computing allows companies to use the processing power sitting idle in a network located elsewhere. Grid computing
combines many servers and/or personal computers to act as one large computer.
Why Is Computer Backup Important, and How Is It Accomplished?
A backup duplicates a file or program to protect an enterprise if the original is lost or damaged. A full backup copies all of
the files in a computer. A differential backup copies only files that have changed since the last full backup. An incremental
backup copies only files that have changed since the last full or incremental backup. A selective backup allows users to
back up specific files. With continuous data protection (CDP), all data is backed up whenever a change is made.
What Are the Steps in a Disaster Recovery Plan?
A disaster recovery plan describes the steps a company would take to restore computer operations in the event of a disaster. A
disaster recovery plan contains four components. The emergency plan specifies the steps to be taken immediately after a dis-
aster strikes. The backup plan stipulates how a company uses backup files and equipment to resume information processing.
The recovery plan identifies the actions to be taken to restore full information processing operations. The test plan contains
information for simulating disasters and recording an organization’s ability to recover.
Visit scsite.com/dcf4e/ch12/quiz or click the Quiz Yourself button. Click Objectives 6 – 8.
Key Terms
You should know the Key Terms. Use the list below to help focus your study. To further enhance your understanding of the
Key Terms in this chapter, visit scsite.com/dcf4e/ch12/terms. See an example of and a definition for each term, and access
current and additional information about the term from the Web.
artificial intelligence (AI) (465) customer relationship failover (479) online banking (472)
blade servers (477) management (CRM) (466) Fibre Channel (476) online trading (472)
business intelligence (BI) (456) grid computing (478) portal (467)
business process automation data center (467) high-availability systems RAID (redundant array of
data warehouse (468)
(BPA) (456) decision support system (DSS) (477) independent disks) (474)
business process management human resources information redundant components (477)
(463) sales force automation (SFA)
(BPM) (456) disaster recovery plan (479) system (HRIS) (458)
CIO (chief information officer) distribution systems (460) information system (456) (460)
EDI (electronic data interoperability (478) scalability (477)
(480) management information shopping bot (473)
computer-aided design (CAD) interchange) (468) storage area network (SAN)
enterprise computing (452) system (MIS) (462)
(459) enterprise hardware (474) managers (456) (475)
computer-aided engineering enterprise information (456) marketing information system transaction processing system
enterprise resource planning
(CAE) (459) (460) (TPS) (461)
computer-aided manufacturing (ERP) (465) Material Requirements utility computing (478)
enterprise search (467) virtual private network (VPN)
(CAM) (459) enterprise storage system Planning (MRP) (459)
computer-integrated network attached storage (470)
(476) Web services (469)
manufacturing (CIM) (459) e-retail (470) (NAS) (474) workflow (469)
content management system expert system (464) office information system workflow application (469)
extranet (469)
(CMS) (466) (OIS) (461)
customer interaction
management (CIM) (460)
C6192_CH12EOC pp2.qxd 2/3/07 1:04 PM Page 484
484
CHAPTER 12
Checkpoint
Use the Checkpoint exercises to check your knowledge level of the chapter. To complete the Checkpoint exercises
interactively, visit scsite.com/dcf4e/ch12/check.
True/False Mark T for True and F for False. (See page numbers in parentheses.)
_____ 1. The term, enterprise, commonly describes a business or venture of any size. (452)
_____ 2. The Chief Operations Officer (COO) manages core activities. (455)
_____ 3. Business process management rarely is aided by specialized software designed to assist in these activities. (456)
_____ 4. An information system is a set of hardware, software, data, people, and procedures that works together to produce
information. (456)
_____ 5. Computer-aided design uses computers to integrate the many different operations of the manufacturing process. (459)
_____ 6. Artificial intelligence is the application of human intelligence to computers. (465)
_____ 7. Customer relationship management software tracks leads and inquiries from customers, stores a history of all
correspondence and sales to a customer, and allows for tracking of outstanding issues with customers. (466)
_____ 8. A data center is a collection of links, content, and services presented on a Web page and designed to guide users to
information they likely are to find interesting for their particular job function. (467)
_____ 9. A storage area network is a high-speed network with the sole purpose of providing storage to other servers to which it
is attached. (475)
_____10. Blade servers pack a complete computer server on a single card rather than a system unit. (477)
Multiple Choice Select the best answer. (See page numbers in parentheses.)
1. _____ provides easy exchange of information 4. Most _____ include one or more databases and one or
among business applications, reduces the need
for human intervention in processes, and utilizes more information systems storing data in the data
software to automate processes wherever possible.
(456) warehouse. (468)
a. Business process management
b. Business intelligence a. storage area networks b. data warehouses
c. Business process automation
d. None of the above c. network attached d. expert systems
2. Many companies elevate the importance of storage units
information technology by including a _____
executive position that reports to the CEO. (461) 5. _____ allows users to pay bills from their computer, that is,
a. chief operations officer (COO)
b. chief financial officer (CFO) transfer money electronically from their account to a
c. chief security officer (CSO)
d. chief information officer (CIO) payee’s account such as the electric company or telephone
3. An advantage of ERP is _____. (466) company. (472)
a. complete integration of information
systems across departments a. Online trading b. Online banking
b. better project management
c. better customer service c. E-retail d. A shopping bot
d. all of the above
6. The _____ of hardware to users is a measure of how often
it is online. (474)
a. redundancy b. availability
c. scalability d. interoperability
7. _____ continue running and performing tasks for at least
99 percent of the time. (477)
a. Distribution systems b. High-availability systems
c. Blade servers d. Virtual private networks
8. A(n) _____ can be time-consuming but provides the best
protection against data loss. (478)
a. differential backup b. incremental backup
c. full backup d. selective backup
Matching Match the terms with their definitions. (See page numbers in parentheses.)
_______ 1. computer-aided a. collection of links, content, and services presented on a Web page and designed to guide
engineering (459) users to information they likely are to find interesting for their particular job function
_______ 2. MRP (459) b. monitors and controls processes related to production
_______ 3. expert system (464)
_______ 4. portal (467) c. allow business to create products and B2B interactions
_______ 5. grid computing (478)
d. combines many servers and/or personal computers on a network, such as the Internet,
to act as one large computer
e. uses computers to test product designs
f. captures and stores the knowledge of human experts and then imitates human
reasoning and decision making
C6192_CH12EOC pp2.qxd 2/3/07 1:04 PM Page 485
485
Checkpoint
Short Answer Write a brief answer to each of the following questions.
1. What are managers? ____________ What four activities do managers perform to coordinate resources? ____________
2. What is an extranet, and how might users use an extranet? ____________ What are two platforms for building and running
Web services? ____________
3. What is RAID? ____________ What is mirroring? ____________
4. What are scalability and interoperability? ____________ How is an open information system different from a closed
system? ____________
5. What does a backup plan identify? ____________ What factors contribute to the success of a backup plan? ____________
Working Together Working in a group of your classmates, complete the following team exercise.
1. The type of information system employed and the purpose for which it is used depend on an individual’s place in an
organization. Have each member of your team interview a manager and a nonmanagement employee at a local company.
What type of information systems do they use? Why? How do the information systems influence their work? How were
their jobs different before the information systems were introduced? Meet with the members of your team to discuss your
findings. Then, create a PowerPoint presentation and share with the class how different managers and nonmanagement
employees use information systems.
Web Research
Use the Internet-based Web Research exercises to broaden your understanding of the concepts presented in this chapter.
Visit scsite.com/dcf4e/ch12/research to obtain more information pertaining to each exercise. To discuss any of the Web
Research exercises in this chapter with other students, post your thoughts or questions at scsite.com/dcf4e/ch12/forum.
Journaling
Respond to your readings in this chapter by writing at least one page about your reactions, evaluations, and reflections on
enterprise computing. For example, have you worked with sales force automation or customer interaction management soft-
ware? Would you consider using RAID in your personal computer? What experiences have you had using e-commerce market
sectors, such as making travel plans or paying bills online? You also can write about the new terms you learned by reading this
chapter. If required, submit your journal to your instructor.
Scavenger Hunt
Use one of the search engines listed in Figure 2-8 in Chapter 2 on page 58 or your own favorite search engine to find the
answers to the questions below. Copy and paste the Web address from the Web page where you found the answer. Some ques-
tions may have more than one answer. If required, submit your answers to your instructor. (1) How does a company obtain a
VeriSign Secured Seal for its Web site? (2) What are the names of two e-commerce enterprises where you can obtain free fitness
information? What services do these organizations provide? (3) Compare the services offered by two online news and entertain-
ment services such as ABC News and CNN. Which of the two would you prefer to use? Why? (4) Describe three of the twelve
common “Spam Scams” listed on the Federal Trade Commission (FTC) Web site. If consumers are victimized by such scams,
how can they file a complaint with the FTC?
Search Sleuth
One of the newer online academic research tools is Google Scholar (scholar.google.com). It uses newly developed algorithms to
provide search results composed of books, technical reports, abstracts, peer-reviewed articles, and theses. Visit this Web site and
then use your word processing program to answer the following questions. Then, if required, submit your answers to your
instructor. (1) Type “Enterprise Resource Planning” in the Search box and then click the Search button. How many
results were found? (2) Choose one of the recently published articles and note the number of times it has been cited by other
authors. Click the link to the article. What is the article’s title, and who is the author? What journal published the article? When?
How many works cite this article? (3) Click your browser’s Back button or press the BACKSPACE key twice to return to the Google
Scholar home page. Delete the text in the Search box, type “grid computing” in the Search box, and then click the Search but-
ton. Click the Recent Articles link and then find two articles published within the past three years that have been cited by more
than 100 other works. Write a 50-word summary of these two articles.
C6192_CH12EOC pp2.qxd 2/3/07 1:04 PM Page 486
486
CHAPTER 12
Learn How To
Use the Learn How To activities to learn fundamental skills when using a computer and accompanying technology.
Complete the exercises and submit them to your instructor.
LEARN HOW TO 1: Use Internet Telephony — Voice over Internet Protocol (VoIP)
Every enterprise organization depends on reliable communications. An important means of communication is voice,
or telephone, communications. In most organizations today, a telephone company is the primary vendor for providing
telephone communications. In the near future, however, the Internet might be the largest provider of telephone
communications.
You learned in a previous chapter about Voice over Internet Protocol (VoIP), sometimes called Internet telephony,
which provides for voice communications using the Internet instead of standard telephone connections. Two advantages
claimed for VoIP are improved reliability and much lower costs. Both of these advantages are attractive to businesses, and
VoIP is forecasted to become the standard voice communications method within the next 5–10 years.
VoIP also is available to individual users. One primary means to use VoIP is through the service offered by Skype, a
company that offers free, unlimited calls through an Internet connection. The Skype software also is free. Using Skype,
you can talk to another Skype user via the Internet anywhere in the world for no cost whatsoever. If the person you
call is not a Skype user, you can use Skype to call their ordinary landline or mobile telephone quite inexpensively. For
example, to call someone on a landline telephone in the United Kingdom from anywhere in the world, the cost is
approximately 2 cents per minute.
The following quote indicates the potential future of VoIP and services like Skype:
“I knew it was over when I downloaded Skype,” Michael Powell, chairman of the Federal Communications
Commission, explained. “When the inventors of KaZaA are distributing for free a little program that you can
use to talk to anybody else, and the quality is fantastic, and it’s free — it’s over. The world will change now inevitably.”
Fortune Magazine, February 16, 2004
To download Skype, complete the following steps:
1. Start your Internet browser, type www.skype.com in the Address bar, and then press the ENTER key.
2. When the Skype home page is displayed, explore the Web site for information about using Skype. When you are
ready, click the Download now button.
3. In the next window, the version of Skype required for your operating system is identified, along with the hardware
requirements. Notice that in order to use Skype, you need, at a minimum, a sound card, speakers, and a microphone.
A headset or a USB telephone provide better service. After reading the information on the screen, click the Download
button to display the Downloading Skype Web page.
4. Click the Download button on the Downloading Skype Web page. When the File Download — Security Warning
dialog box is displayed, click the Save button.
5. In the Save As dialog box, select the Desktop for the location of the saved file. Then, click the Save button. The Skype
Setup file will download. This may take a few minutes, depending on the speed of your Internet connection, because
of the large file size.
6. When the Download complete window is displayed, click the Close button. The SkypeSetup icon is displayed on the
desktop.
7. Double-click the SkypeSetup icon on the desktop. If any warning dialog boxes appear, click the Run button. If the
User Account Control dialog box appears, click the Continue button.
8. In the Skype Install window, select the language you would like to use, click the check box to agree to the Skype End
User License Agreement and the Skype Privacy Statement, and then click the Install button.
9. Remove the checkmark from the check box prompting you to install the free Google Toolbar, and then click the Next
button.
C6192_CH12EOC pp2.qxd 2/3/07 1:04 PM Page 487
487
Learn How To
Skype now is installed on your computer. The
Skype icon should appear on your desktop. To start
and use Skype, complete the following steps:
1. Double-click the Skype icon on your desktop.
The first time you start Skype, the Create a new
Skype Account dialog box is displayed (Figure
12-26). In this dialog box, you enter your
full name, Skype name, and password. The required
Skype name is the name you will use to fields
start Skype each time, together with the
password. You can use any name and pass-
word that has not already been used on Skype.
Also, be sure to check the Skype End User
License Agreement check box, and then click
the Next button to display the next dialog box FIGURE 12-26
requesting your E-mail address, Country/Region,
and City (Figure 12-27).
2. Enter your E-mail address, Country/Region, and City,
and then click the Sign In button.
3. If your Skype name and password have not been used, Skype
automatically will sign into your account and display the
Skype window (Figure 12-28). If your Skype name or password
already have been used by another user, you must select another
Skype name or password. Skype window Tools menu
4. Once you are logged into Skype, if the Skype - Getting Started
dialog box is displayed, click the Close button.
5. After installing Skype, you can make calls to other Skype users FIGURE 12-27
anywhere in the world for no cost. If you want to dial a telephone
number for a regular landline telephone, you must subscribe to Help command
SkypeOut. This service, which costs .017 euros (about two cents in
U.S. currency) to call many places in the world, can be obtained by
selecting SkypeOut from the Tools menu in the Skype window.
6. To learn the techniques for calling another Skype user and for using SkypeOut, click
Help on the menu bar in the Skype window, click Help on the Help menu, and then
select the subject about which you want to learn.
Exercise
1. Visit the Skype Web site. Examine the various screens and examples shown on the
Web site. Do you think this type of service can be useful to you? Why? What are the
advantages and disadvantages of using Skype? If you were calling a friend in Australia FIGURE 12-28
on a regular telephone, how much per minute would you have to pay? Submit your
answers to your instructor.
2. Optional: Perform this exercise only on your own computer. Do not perform this exercise on a school computer.
Establish an account on Skype. Call another member of your class who also has established a Skype account. What do
you like about Skype? What do you not like? If you know someone in Europe or Asia who is a Skype user, call him or
her. Do you like the fact the call is free anywhere in the world? As an option, subscribe to SkypeOut and then call
someone somewhere else in the world on his or her regular telephone. Is the quality of the call good? What did you
like or not like about the call? Submit your answers to your instructor.
C6192_CH12EOC pp2.qxd 2/3/07 1:04 PM Page 488
488
CHAPTER 12
Learn It Online
Use the Learn It Online exercises to reinforce your understanding of the chapter concepts. To access the Learn It Online
exercises, visit scsite.com/dcf4e/ch12/learn.
At the Movies — Surf the Web or Maui with World Wikia
To view the Surf the Web or Maui with World Wikia movie, click the number 1 button. Locate your video and click the corresponding
High-Speed or Dial-Up link, depending on your Internet connection. Watch the movie and then complete the exercise by answering
the question that follows. When planning a vacation, most people obtain information from a hotel’s Web site or a city’s Web site.
These sites, naturally, are going to paint a favorable picture in hopes of you choosing them as your vacation destination. World Wikia
provides unbiased reviews from individuals who previously have traveled to these locations. Explain the purpose and function of
World Wikia.
Student Edition Labs — E-Commerce
Click the number 2 button. A new browser window will open, displaying the Student Edition Labs. Follow the on-screen
instructions to complete the E-Commerce Lab. When finished, click the Exit button. If required, print a copy of your results to
submit to your instructor.
Practice Test
Click the number 3 button. Answer each question. When completed, enter your name and click the Grade Test button to submit
the quiz for grading. Make a note of any missed questions. If required, submit your results to your instructor.
Who Wants To Be a Computer Genius2?
Click the number 4 button to find out if you are a computer genius. Directions about how to play the game will be displayed.
When you are ready to play, click the Play button. Submit your score to your instructor.
Online Automobile Shopping
Click the number 5 button to learn how to use the Internet to price an automobile online. Follow the instructions to use Ford.com
to research and price an automobile. Use the Vehicle Showroom Tool to select an SUV in the $30,000 to $51,000 price range. Choose
from any of the brands listed (Ford, Lincoln, Mazda, etc.). Once you have selected your vehicle, click the More Information button
to proceed with customizing your vehicle. When you have completed pricing your vehicle, print the specifications and price and
submit them to your instructor. If available, use the payment calculator to calculate your monthly payments.
Student Edition Labs — Backing Up Your Computer
Click the number 6 button. A new browser window will open, displaying the Student Edition Labs. Follow the on-screen
instructions to complete the Backing Up Your Computer Lab. When finished, click the Exit button. If required, print a copy of
your results to submit to your instructor.
Crossword Puzzle Challenge
Click the number 7 button, then click the Crossword Puzzle Challenge link. Directions about how to play the game will be displayed.
Complete the puzzle to reinforce skills you learned in this chapter. When you are ready to play, click the Continue button. Submit the
completed puzzle to your instructor.
Vista Exercises
Click the number 8 button. When the Vista Exercises menu appears, click the exercise assigned by your instructor. A new browser
window will open. Follow the on-screen instructions to complete the exercise. When finished, click the Exit button. If required,
submit your results to your instructor.
Chapter Discussion Forum
Select an objective from this chapter on page 451 about which you would like more information. Click the number 9 button and
post a short message listing a meaningful message title accompanied by one or more questions concerning the selected objective.
In two days, return to the threaded discussion by clicking the number 9 button. Submit to your instructor your original message
and at least one response to your message.
C6194_APP A_pp3.qxd 2/3/07 1:48 PM Page 1
QUIZ YOURSELF ANSWERS APP 1
APPENDIX A
Quiz Yourself Answers
Following are possible answers to the Quiz Yourself boxes throughout the book.
Quiz Yourself 1-1
1. A computer is a motorizedan electronic device that processes output input into inputoutput.
2. A storage device records (readswrites) and/or retrieves (writesreads) items to and from storage
media.
3. An output input device is any hardware component that allows you to enter data and
instructions in a computer.
4. True Statement
5. Four commonly used input output devices are a printer, a monitor, speakers, and a portable
media player.
Quiz Yourself 1-2
1. A resource network is a collection of computers and devices connected together via
communications devices and transmission media.
2. True Statement
3. Popular system application software includes Web browsers, word processing software,
spreadsheet software, database software, and presentation graphics software.
4. The Internet Web is one of the more popular services on the WebInternet.
5. Two types of application system software are the operating system and utility programs.
Quiz Yourself 1-3
1. A desktop computer notebook computer (or laptop computer) is a portable, personal computer
designed to fit on your lap.
2. True Statement
3. Each large businesshome user spends time on the computer for different reasons that include
budgeting and personal financial management, Web access, communications, and entertainment.
4. A home power user requires the capabilities of a workstation or other powerful computer.
5. Mainframes Supercomputers are the fastest, most powerful computers — and the most expensive.
6. With embedded computersonline banking, users access account balances, pay bills, and copy
monthly transactions from the bank’s computer right into their personal computers.
Quiz Yourself 2-1
1. True Statement
2. A WISPAn IP address (or Internet Protocol address) is a number that uniquely identifies each
computer or device connected to the Internet.
3. An IP addressA domain name, such as www.google.com, is the text version of a domain name
an IP address.
4. Dial-up access takes place when the modem in your computer uses the cable television network
a standard telephone line to connect to the Internet.
Quiz Yourself 2-2
1. True Statement
2. A Web browsersubject directory classifies Web pages in an organized set of categories and related
subcategories.
3. BusinessConsumer-to-consumer e-commerce occurs when one consumer sells directly to another,
such as in an online auction.
4. The more widely used search enginesWeb browsers for personal computers are Internet Explorer,
Netscape, Firefox, Opera, and Safari.
5. To develop a Web page, you do not have to be a computer programmer.
C6194_APP A_pp3.qxd 2/3/07 1:48 PM Page 2
APP 2 APPENDIX A QUIZ YOURSELF ANSWERS
Quiz Yourself 2-3
1. True Statement
2. An e-mail address is a combination of a user name and an e-mail programa domain name that
identifies a user so he or she can receive Internet e-mail.
3. FTP Internet telephony uses the Internet (instead of the public switched telephone network) to
connect a calling party to one or more called parties.
4. Netiquette is the code of unacceptable behaviors while on the Internet.
5. On a newsgroup, a subscription thread (or threaded discussion) consists of the original article
and all subsequent related replies.
Quiz Yourself 3-1
1. True Statement
2. Public-domainPackaged software is mass produced, copyrighted retail software that meets the
needs of a wide variety of users, not just a single user or company.
3. To use system application software, your computer must be running application system
software.
4. When a program is started, its instructions load from memory a storage medium into a
storage mediummemory.
Quiz Yourself 3-2
1. Enterprise computingImage editing software provides the capabilities of paint software and
also includes the ability to modify existing images.
2. Millions of people use spreadsheet word processing software every day to develop documents
such as letters, memos, reports, fax cover sheets, mailing labels, newsletters, and Web pages.
3. Professional accounting DTP (or desktop publishing) software is ideal for the production of
high-quality color documents such as textbooks, corporate newsletters, marketing literature,
product catalogs, and annual reports.
4. Spreadsheet Presentation graphics software is application software that allows users to create
visual aids for presentations to communicate ideas, messages, and other information to a
group.
5. Two of the more widely used CAD programssoftware suites are Microsoft Office 2007 and Sun
StarOffice.
6. True Statement
Quiz Yourself 3-3
1. An anti-spamantivirus program protects a computer against viruses by identifying and
removing any computer viruses found in memory, on storage media, or in incoming files.
2. ComputerWeb-based training is a type of Webcomputer-based training that uses Internet
technology and consists of application software on the Web.
3. True Statement
4. Legal Personal finance software is a simplified accounting program that helps home users and
small office/home office users balance their checkbooks, pay bills, track investments, and
evaluate financial plans.
5. Personal DTPPhoto editing software is a popular type of image editing software that allows
users to edit digital photographs.
Quiz Yourself 4-1
1. True Statement
2. Four basic operations in a machine cycle are: (1) comparingfetching, (2) decoding, (3)
executing, and, if necessary, (4) pipeliningstoring.
3. Processors contain a motherboard control unit and an arithmetic logic unit (ALU).
4. The central processing unitmotherboard, sometimes called a system board, is the main circuit
board of the system unit.
C6194_APP A_pp3.qxd 2/3/07 1:48 PM Page 3 APP 3
QUIZ YOURSELF ANSWERS
5. The leading processor chip manufacturers for personal computers are MicrosoftIntel, AMD,
IBM, Motorola, and Transmeta.
6. The system unit is a case that contains mechanical electronic components of the computer
used to process data.
Quiz Yourself 4-2
1. True Statement
2. A gigabyte (GB) equals approximately 1 trillion billion bytes.
3. Memory cache helps speed the processes of the computer because it stores seldom frequently
used instructions and data.
4. Most computers are analogdigital, which means they recognize only two discrete states: on
and off.
5. Most RAM retains loses its contents when the power is removed from the computer.
6. Read-only memory (ROM) refers to memory chips storing temporary permanent data and
instructions.
Quiz Yourself 4-3
1. A bus port is the point at which a peripheral attaches to or communicates with a system unit
so the peripheral can send data to or receive information from the computer.
2. An AC adapterexpansion slot is a socket on the motherboard that can hold an adapter card.
3. Serial USB ports can connect up to 127 different peripherals together with a single connector
type.
4. The higher the bus clock speed, the slower faster the transmission of data.
5. True Statement
Quiz Yourself 5-1
1. A keyboard is an output input device that contains keys users press to enter data into a
computer.
2. A trackball touch pad is a small, flat, rectangular pointing device commonly found on
notebook computers.
3. True Statement
4. An optical mouse has no moving mechanical parts inside.
5. PDAs Tablet PCs use a pressure-sensitive digital pen and Tablet PCsPDAs use a stylus.
Quiz Yourself 5-2
1. True Statement
2. A fingerprint scanner captures curves and indentations of a signaturefingerprint.
3. After swiping a credit card through an MICRa magnetic stripe card reader, it reads the
information stored on the magnetic stripe on the card.
4. Instant messagingVoice recognition (or speech recognition) is the computer’s capability of
distinguishing spoken words.
5. Many smart phones today have POS PDA capabilities.
6. RFID is a technology that uses laser radio signals to communicate with a tag placed in an
object, an animal, or a person.
Quiz Yourself 5-3
1. A lower higher resolution uses a greater number of pixels and thus provides a smoother
image.
2. An output device is any type of software hardware component that conveys information to
one or more people.
3. LCD monitors have a larger smaller footprint than CRT monitors.
4. True Statement
C6194_APP A_pp3.qxd 2/3/07 1:48 PM Page 4
APP 4 APPENDIX A QUIZ YOURSELF ANSWERS
Quiz Yourself 5-4
1. A laser thermal printer generates images by pushing electrically heated pins against
heat-sensitive paper.
2. A photo laser printer creates images using a laser beam and powdered ink, called toner.
3. An ink-jet printer is a type of impact printer that forms characters and graphics by spraying
tiny drops of liquid nitrogen ink onto a piece of paper.
4. Many personal computer users add surround sound printer systemsspeakers to their
computers to generate a higher-quality sound.
5. Multifunction peripherals require more less space than having a separate printer, scanner,
copy machine, and fax machine.
6. True Statement
Quiz Yourself 6-1
1. True Statement
2. SATA is a hard disk interface that uses parallel serial signals to transfer data, instructions, and
information.
3. Storage mediaA storage device is the computer hardware that records and/or retrieves items
to and from a storage devicemedia.
4. Two types of manual magnetic disks are hard disks and floppy disks.
Quiz Yourself 6-2
1. A CD-RWCD-ROM is a type of optical disc on which users can read but not write (record) or
erase.
2. A DVD-RAMPicture CD is a single-session disc that stores digital versions of film using a jpg
file format.
3. DVDs have the samemuch greater storage capacities as than CDs.
4. Optical discs are written and read by mirrorslaser light.
5. True Statement
Quiz Yourself 6-3
1. A USB flash drive is a flash memory storage device that plugs in a parallel USB port on a
computer or mobile device.
2. True Statement
3. Microfilm and microfiche have the shortest longest life of any storage media.
4. Tape storage requires direct sequential access, which refers to reading or writing data
consecutively.
Quiz Yourself 7-1
1. A buffer driver is a small program that tells the operating system how to communicate with a
specific device.
2. True Statement
3. A password is a public private combination of characters associated with the user name that
allows access to certain computer resources.
4. The program you currently are using is in the backgroundforeground, and the other programs
running but not in use are in the foregroundbackground.
5. Two types of system software are operating systems and application utility programs.
Quiz Yourself 7-2
1. A file managerpersonal firewall is a utility that detects and protects a personal computer from
unauthorized intrusions.
2. Fragmenting Defragmenting a disk is the process of reorganizing it so the files are stored in
contiguous sectors.
3. Windows Vista Home Basic uses the Windows AeroVista Basic interface.
C6194_APP A_pp3.qxd 2/3/07 1:48 PM Page 5 APP 5
QUIZ YOURSELF ANSWERS
4. True Statement
5. Flip 3DLinux is a UNIX-type operating system that is open source software.
Quiz Yourself 7-3
1. A pop-up blockerfile compression utility shrinks the size of a file(s).
2. An anti-spamantivirus program protects a computer against viruses.
3. True Statement
4. Pocket PCs use Palm OSWindows Mobile as their operating system.
5. Web filteringCD/DVD burning software writes text, graphics, audio, and video files to a
recordable or rewritable CD or DVD.
Quiz Yourself 8-1
1. A cybercafé hot spot is a wireless network that provides Internet connections to mobile
computers and devices.
2. True Statement
3. Receiving Sending devices initiate an instruction to transmit data, instructions, or information.
4. Users can send pictures, and sound files, as well as short text messages, with text picture
messaging.
Quiz Yourself 8-2
1. A wireless LAN is a LAN that uses no physical wires.
2. An intranet is an internal network that uses video conferencingInternet technologies.
3. Five types of digital dial-updedicated lines are ISDN lines, DSL, FTTH/FTTB, T-carrier lines,
and ATM.
4. In a client/server network, servers clients on the network access resources on the clientserver.
5. True Statement
Quiz Yourself 8-3
1. A cable dial-up modem converts a computer’s digital signals to analog signals before they are
transmitted over standard telephone lines.
2. True Statement
3. Analog Digital signals consist of individual electrical pulses that represent bits grouped
together into bytes.
4. Physical Wireless transmission media send communications signals through the air or space
using radio, microwave, and infrared signals.
5. Two types of wireless home networks are HomeRF and powerline cableWi-Fi.
Quiz Yourself 9-1
1. A database field is a combination of one or more related characters or bytes and is the smallest
unit of data a user accesses.
2. A record database is a collection of data organized in a manner that allows access, retrieval, and
use of that data.
3. Data Information is processed informationdata.
4. Hierarchy of dataFile maintenance procedures include adding records to, changing records in,
and deleting records from a file.
5. True Statement
Quiz Yourself 9-2
1. A DBMS is hardware software that allows you to create, access, and manage an operating
systema database.
2. A query data dictionary contains data about each file in the database and each field in those files.
3. True Statement
4. Strengths of the database approach include increased reduced data redundancy, reduced
improved data integrity, shared data, easier access, and increased reduced development time.
C6194_APP A_pp3.qxd 2/3/07 1:48 PM Page 6
APP 6 APPENDIX A QUIZ YOURSELF ANSWERS
Quiz Yourself 9-3
1. Object-orientedRelational databases store data in tables.
2. True Statement
3. SQL is a data modeling query language that allows users to manage, update, and retrieve data.
4. The database analyst administrator requires a more technical inside view of the data than does
the database administratordata analyst.
Quiz Yourself 10-1
1. A back doordenial of service attack is an assault whose purpose is to disrupt computer access
to an Internet service such as the Web or e-mail.
2. True Statement
3. Computer viruses, worms, and Trojan horses are malware that acts without a user’s
knowledge.
4. Shorter Longer passwords provide greater security than longer shorter ones.
5. Updating an antivirus program’s quarantine signature file protects a computer against viruses
written since the antivirus program was released.
Quiz Yourself 10-2
1. An end-user license agreement (EULA) permits does not permit users to give copies to friends
and colleagues, while continuing to use the software.
2. Encryption is a process of converting ciphertext plaintext into plaintext ciphertext to prevent
authorized access.
3. Mobile users are not susceptible to hardware theft.
4. True Statement
5. To prevent against data loss caused by a system failure, computer users should restore back
up files regularly.
Quiz Yourself 10-3
1. Factors that cause CVS tendonitis and CTS (carpal tunnel syndrome) include prolonged
typing, prolonged mouse usage, or continual shifting between the mouse and the keyboard.
2. Phishing Computer forensics is the discovery, collection, and analysis of evidence found on
computers and networks.
3. True Statement
4. Web sites use electronic profilescookies to track user preferences, store users’ passwords, keep
track of items in a user’s shopping cart, and track Web site browsing habits.
5. You cannot assume that information on the Web is correct.
Quiz Yourself 11-1
1. True Statement
2. Feasibility Project management is the process of planning, scheduling, and then controlling the
activities during the system development cycle.
3. The five phases in most system development cycles are programmingplanning; analysis;
design; samplingimplementation; and recordingoperation, support, and security.
4. The purpose of the designoperation, support, and security phase is to provide ongoing
assistance for an information system and its users after the system is implemented.
5. Upon completion of the preliminary investigation, the systems analyst writes the system
proposalfeasibility report.
6. Users should not be involved throughout the system development process.
Quiz Yourself 11-2
1. COBOL and C are examples of assembly procedural languages.
2. Delphi Java is an object-oriented programming language developed by Sun Microsystems.
3. Popular first generationscripting languages include JavaScript, Perl, PHP, Rexx, Tcl, and
VBScript.
C6194_APP A_pp3.qxd 2/3/07 1:48 PM Page 7 APP 7
QUIZ YOURSELF ANSWERS
4. Three popular markup languagesWeb page authoring programs are Dreamweaver, Expression
Web, and Flash.
5. Two types of low-level languages are machine languages and source assembly languages.
6. True Statement
Quiz Yourself 11-3
1. True Statement
2. The program development cycle consists of these six steps: analyze requirements, design
solution, validate design, implement design, test solution, and hardcode document solution.
3. Three basic control structures are sequence, selection, and maintenancerepetition.
Quiz Yourself 12-1
1. The main task of executive managers is to make shortlong-term, tactical strategic decisions.
2. An information system is a set of hardware, software, data, procedures, and people that works
together to produce information.
3. A human resourcesmarketing information system serves as a central repository for the tasks of
the marketing functional unit.
4. True Statement
5. Decision support systems capture and store the knowledge of human experts and then imitate
human reasoning and decision makinghelp users analyze data and make decisions.
6. Enterprise resource planning provides centralized integrated software to help manage and
coordinate the ongoing activities of the functional units of an enterprise, including
manufacturing and distribution, accounting, finance, sales, product planning, and human
resourcesis a combination of databases, software, and procedures that organizes and allows
access to various forms of documents and files.
Quiz Yourself 12-2
1. A portalAn extranet is the portion of a company’s network that allows customers or suppliers
of a company to access parts of an enterprise’s intranet.
2. True Statement
3. A VPN provides mobile users, remote offices, vendors, or customers a secure connection to the
company network server, as if they had a private lineis a server that is placed on a network
with the sole purpose of providing storage to users and information systems attached to the
network.
4. A workflow application is a program that assists in the management and tracking of all the
activities in a business process from start to finishhelps an enterprise collect, archive, index,
and retrieve its resources.
Quiz Yourself 12-3
1. Network attached storageA storage area network is a high-speed network with the sole
purpose of providing storage to other servers to which it is attached.
2. Scalability is a measure of how well computer hardware, software, or an information system
can grow to meet increasing performance demandsrefers to the ability of an information
system to share information with other information systems.
3. A differential backup copies only the files that have changed since the last full or last
incremental backup.
4. A fullAn incremental backup is the fastest backup method, requiring only minimal storage.
5. An emergencyA backup plan specifies how a company’s users back up files and equipment to
resume information processing.
6. True Statement
C6194_APP A_pp3.qxd 2/3/07 1:48 PM Page 8
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 1
IND 1
INDEX Accessible information, 334 ALGOL, 431 operating system, 101. See
Accounting departments, 458 Algorithm, 426 also MacOSX
3-D search engines, 61 Accounting software: Alphabetic check: Validity
3G network: Network that Applet, 434
Software that helps compa- check that ensures users Application generator:
uses cellular radio technol- nies record and report their enter only alphabetic data
ogy to provide users with financial transactions. 111, in a field. 339 Program that creates source
high-speed wireless Internet 458 Alphanumeric, 335 code or machine code from
connections, as long as they Accurate information, 334, AltaVista, 61 a specification of the
are in the network’s range. 377–78 ALU, 137. See also Arithmetic required functionality. 431
300 ActiveX, 434 logic unit Application software:
3GL (third-generation lan- ActiveX control, 434 AMD, 157. See also Advanced Program designed to make
guage), 425. See also ADA, 197. See also Americans Micro Devices users more productive
Procedural language with Disabilities Act America Online (AOL), 52 and/or assist them with
4GL (fourth-generation Ada, 431 American Standard Code for personal tasks. 11, 100–125
language): Fourth-genera- Adapter card: Circuit board Information Interchange business software, 104–11
tion language. that enhances functions of a (ASCII), 140, 141, 335 communications, 120–21
Nonprocedural language component of a system unit Americans with Disabilities educational use, 119
that enables users and pro- and/or provides connec- Act (ADA): Federal law graphics and, 112–14
grammers to access data in tions to peripherals. 135, that requires any company home use, 115–20
a database. 430 147. See also Expansion card with 15 or more employees learning aids, 122–24
802.11: Series of network stan- Addiction, computer, 387 to make reasonable memory and, 142, 144–45
dards developed by IEEE Address attempts to accommodate multimedia and, 112–14
that specifies how two wire- e-mail, 70 the needs of physically PDA, 110
less devices communicate Internet Protocol, 53 challenged workers. 197 personal use, 115–20
over the air with each other. mailing lists, 71 Analog formats, 214 purchasing desktop com-
Also called wireless Web, 56, 57 Analysis phase: Step in the puter and, 281
Ethernet standard. 308. See Address (memory), 142 system development cycle RAM and, 144–45
also Wi-Fi (wireless Address (memory cell), 142 that consists of two major support tools, 122–24
fidelity) Address book (e-mail): List of activities: (1) conduct a pre- system software and, 101
802.11i: Network standard names and e-mail liminary investigation, and uninstalling, 260
developed by IEEE with addresses, created and (2) perform detailed analy- Web browser as, 54
enhanced security for wire- stored by a user. 70 sis. 406, 413–15 Appointment calendar, in per-
less communications. 376 Address bus, 151 Analyzing requirements, dur- sonal information manager,
802.16: Newer network stan- Adobe Acrobat Reader, 113 ing program development, 110
dard developed by IEEE Adobe PDF format, 113 439 Archival backup, 478. See also
that specifies how wireless Adobe Systems, 125 Andreessen, Marc, 41 Full backup
devices communicate over ADSL (asymmetric digital sub- Animation: Appearance of Arithmetic logic unit (ALU):
the air in a wide area. 309. scriber line), 312 motion created by display- Component of a processor
See also WiMAX Advanced Micro Devices ing a series of still images in that performs arithmetic,
(AMD), 139, 157 sequence. 64 comparison, and other
A+ certification, 240 Advanced transfer cache: L2 multimedia and, 64 operations. 137
AC adapter: External power cache built directly on the Anonymous FTP, 71 Arithmetic operations, 137
processor chip. 145 Anonymous Web surfing, 379 ARPANET, 37, 50
supply, used by some exter- Advocacy Web site, 62 Anti-spam program: Program Arrow keys, on keyboard, 168
nal peripherals, that con- Adware: Program that dis- that attempts to remove Artificial intelligence (AI):
verts AC power into DC plays an online advertise- spam before it reaches a The application of human
power that the peripheral ment in a banner or pop-up user’s inbox. 122, 268, 382 intelligence to computers.
requires. 152 window on Web pages, Anti-Virus Emergency 465
Acceptable use policy (AUP), e-mail, or other Internet Response Team (AVERT), Arts and literatures, Web site
368 services. 268, 381 389 and, 98
Acceptance test, 420 AI, 465. See also Artificial Antivirus program: Program ASCII, 140, 141, 335. See also
Access, unauthorized, 368–70 intelligence (AI) that protects a computer American Standard Code
Access control: Security meas- Air mouse: Newer type of against viruses by identify- for Information Interchange
ure that defines who can motion-sensing mouse that, ing and removing any com- Assembler, 425
access a computer, when in addition to the typical puter viruses found in Assembly language:
they can access it, and what buttons, allows you to con- memory, on storage media, Programming language in
actions they can take while trol objects, media players, or on incoming files. which a programmer
accessing the computer. and slide shows by moving 267–268, 365–66, 389 writes instructions using
368–69 the mouse in predetermined Antivirus protection, built into symbolic instruction codes.
Access privileges, 341, 342, 346 directions through the air. router, 316 424–25
Access provider: Business that 169 AOL, 52. See also America Asymmetric digital subscriber
provides individuals and Ajax: Asynchronous JavaScript Online line, 312. See ADSL (asym-
companies access to the and XML. Method of creat- Apache, 43 metric digital subscriber line)
Internet free or for a fee. 52 ing interactive Web applica- APL, 431 Asynchronous Transfer Mode,
Access time: Measurement of tions designed to provide Apple Computer, 14, 27, 38, 39, 312. See also ATM
the amount of time it takes immediate response to user 42, 47 Attacks
the process to read data, requests. 436 Macintosh processor, 139 Internet, 364–68
instructions, and informa- network, 364–68
tion from memory. 146, 222
hard disk, 226
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 2
IND 2 INDEX
AT&T WorldNet, 52 security controls when Batch processing, 462 defines how two Bluetooth
Atanasoff, John, 35 accessing a program, com- Battery devices use short-range
Atanasoff-Berry Computer, 35 puter, or network. 367 radio waves to transmit
ATM: Short for Asynchronous safeguards against, 367–68 CMOS and, 146 data. 46, 150, 309, 319
Back pain, 386 notebook computers, 152, 288 popularity of, 150
Transfer Mode; service that Back up: To make a copy of a PDAs, 293 Blu-ray Disc (BD): Newer,
carries voice, data, video, file. 261, 375 Bay: Opening inside the sys- expensive type of DVD
and multimedia at very Background, 254, 255 with storage capacities of
high speeds. 312. See also Backup: Duplicate or copy of a tem unit in which addi- 100 GB, and expectations of
Asynchronous Transfer file, program, or disk placed tional equipment can be exceeding 200 GB in the
Mode on a separate storage installed. 135, 151 future. 233
ATM (banking), 180. See also medium that can be used if BD-RE: High-capacity Booting: Process of starting
Automated teller machine the original is lost, dam- rewritable DVD format. 234 or restarting a computer.
Attribute (database): Each aged, or destroyed. 225, 346, Beginner’s All-purpose 252
data element in an object. 375 Symbolic Instruction Code, cold, 252
Also called a property. 347 CD-RW used for, 232 431. See also BASIC warm, 252
Audio: Music, speech, or any disaster recovery and, 479 Benchmark test: Test that Borland, 429
other sound. 64 enterprise storage system measures the performance Botnet: Group of compro-
MIDI port and, 150 and, 476 of hardware or software. 417 mised computers connected
multimedia and, 64 full, 375, 478 Berners-Lee, Tim, 75, 40 to a network such as the
output, 182 incremental, 478 Berry, Clifford, 35 Internet that are being used
recording, 399 Internet, 228, 476 Binary digit, 140, 424 as part of a network that
streaming, 64 plan, 479 Binary system: Number sys- attacks other networks,
on Web page, 54 procedures, 478–79 tem used by computers that usually for nefarious pur-
Audio CD, 18 selective, 375, 478 has just two unique digits, 0 poses. 367
copying from, 232 Backup (database), 346 and 1, called bits. 140 Braille printer, 197
using CD-ROM drive to Backup plan, 479 Biometric device: Device that Brain fingerprinting, 384
listen to, 231 Backup procedures, 478–79 authenticates a person’s Brattain, Walter, 35
Audio editing software: Backup utility: Utility pro- identity by translating a Bricklin, Dan, 38, 125
Application software that gram that allows users to personal characteristic, such Broadband: Type of media
allows a user to modify copy, or back up, selected as a finger print, into a digi- that transmits multiple sig-
audio clips, produce studio- files or an entire hard disk tal code that then is com- nals simultaneously. 318,
quality soundtracks, and to another storage medium, pared with a digital code 319
add audio to video clips. which can be used if the stored in a computer verify- hackers and, 260
114 original is lost, damaged, or ing a physical or behavioral portals and, 319
Audio input: Process of enter- destroyed. 261 characteristic. 181, 370, 371 Broadcast radio: Wireless
ing any sound, such as Backus, John, 36 Biometric payment: Payment transmission medium that
speech, music, and sound Bandwidth: The amount of method where a customer’s distributes radio signals
effects, into the computer. data, instructions, and fingerprint is read by a fin- through the air over long
173 information that can travel gerprint scanner that is distances such as between
Audio output device: over a communications linked to a payment cities, regions, and coun-
Component of a computer channel. 317 method such as a checking tries and short distances
that produces music, Banking account or credit card. 370 such as within an office or
speech, or other sounds, e-commerce used for, 470 Biometrics: Technology of home. 321
such as beeps. 193 e-retail and, 470 authenticating a person’s Browser: Application software
Audit trail: Computer file that MICR used by, 179 identity by verifying a per- that allows users to access
records both successful and online. See Online banking sonal characteristic. 181 and view Web pages. Also
unsuccessful access Bar chart. 108. See also Column Bit: The smallest unit of data a called a Web browser. 54, 55
attempts. 368. See also Log chart computer can process. Bit is Buffer: Segment of memory or
AUP, 368. See also Acceptable Bar code: Identification code short for binary digit. 140, storage in which items are
use policy (AUP) consisting either of vertical 141, 335 placed while waiting to be
Authentication, 368–69 lines and spaces of different bus width and, 151 transferred from an input
Authorware, 437 widths or a two-dimensional Blade, 477 device or to an output
Automated teller machine pattern of dots, squares, and Blade server chassis, 477 device. 255
(ATM): Special-purpose ter- other images that represent Blade servers: Complete com- Bugs, 439
minal, connected to a host a manufacturer and an item. puter server, such as a Web Bundled software, 281
computer through a net- 178 server or network server, Burning: Process of writing on
work that functions as a Bar code reader: Optical packed on a single card. an optical disc. 232
self-service banking reader that uses laser beams Also called ultradense Bus (computer): The physical
machine. 180 to read bar codes by using servers. 477. See also cable that connects the
AutoNumber data type, 335 light patterns that pass Ultradense servers computers and other
Availability, 474, 477 through the bar code lines. Blog: Informal Web site con- devices in a bus network.
Also called a barcode scan- sisting of time-stamped arti- 151
B2B, 68, 469. See also Business- ner. 178 cles, or posts, in a diary or Bus (network), 306
to-business (B2B) e-com- Bar code scanner, 178. See Bar journal format, usually Bus network: Type of network
merce code reader listed in reverse chronologi- topology in which a single
Bardeen, John, 35 cal order. Blog is short for central cable connects all
B2C, 67. See also Business-to- BASIC, 37, 431. See also Weblog. 10, 62 computers and other
consumer (B2C) e-commerce Beginner’s All-purpose Blogosphere: Worldwide col- devices. 306, 308
Symbolic Instruction Code lection of blogs. 62 Bus width, 151
Back door: Program or set of Bluetooth: Network standard,
instructions in a program specifically a protocol, that
that allows users to bypass
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 3
INDEX IND 3
Business intelligence (BI): C2C, 68. See also Consumer- Career times. See also compact
Several types of applica- to-consumer (C2C) as chief information officer, disc-rewritable. 45, 230, 232.
tions and technologies for e-commerce 454, 461, 480 See also Compact disc-
acquiring, storing, analyz- as computer engineer, 156 rewritable
ing, and providing access to CA, 374. See also Certificate as computer forensics spe- backup using, 375
information to help users authority (CA) cialist, 388 CD-RW drive: Drive that can
make more sound business as computer technician, 240 read audio CDs, standard
decisions. 456 Cable as database administrator, CD-ROMs, CD-Rs, CD-
coaxial, 319 351, 352 RWs, and can write on, or
Business process automation fiber-optic, 320 as database analyst, 351 record, CD-RWs. 232
(BPA): Automation that twisted-pair, 320 as graphic designer/illustra- Celeron, 139
provides easy exchange of tor, 198 Cell, 107
information among busi- Cable modem: Digital modem as Help Desk specialist and, Cellular radio: Form of broad-
ness applications, reduces that sends and receives dig- 124 cast radio that is used
the need for human inter- ital data over the cable tele- as network specialist, 322 widely for mobile commu-
vention in processes, and vision (CATV) network. 52, as personal computer sales- nications, specifically wire-
utilizes software to auto- 314 person, 26 less modems and cellular
mate processes wherever as programmer, 442 telephones. 321
possible. 456 purchasing desktop computer searching for, 97 Cellular telephone, 321
and, 284 as systems programmer, banning of, 299
Business process management 270 camera in, 320
(BPM): Set of activities that surge protection and, as Web developer, 74 data transmission using, 314
enterprises perform to 374–75 sending text messages using,
optimize their business Carpal tunnel syndrome (CTS), 175
processes, such as account- Cable television 385 smart. See Smart phones
ing and finance, hiring coaxial cable, 320 Central processing unit
employees, and purchasing Internet access using, 314 CASE, 419. See also Computer- (CPU): Electronic compo-
goods and services. 456 aided software engineering nent on a computer’s moth-
Cache: Area of memory that (CASE) erboard that interprets and
Business services, other, 473 stores the contents of fre- carries out the basic instruc-
Business software: quently used data or Case control structure, 440 tions that operate the com-
instructions. 144–45 Cathode-ray tube (CRT), 186 puter. Also called a
Application software that CBT. See Computer-based processor. 7, 137–39
assists people in becoming CAD, 459. See also Computer- comparison of, 139
more effective and efficient aided design (CAD) training components of, 137
while performing their CD. See Compact disc machine cycle and, 138
daily business activities. CAD software. See Computer- CD creation software, 218 purchasing, 139
104–11 aided design (CAD) CD/DVD burner, 122 RAM and, 143–45
Business/marketing Web site, software CD/DVD burning software: role of, 135
62 system clock and, 138
Business-to-business (B2B) CAE, 459. See also Computer- Stand-alone utility program Certificate authority (CA):
e-commerce, 67, 68 aided engineering (CAE) that writes text, graphics, Authorized person or com-
Business-to-consumer (B2C) audio, and video files to a pany that issues and veri-
e-commerce, 67 CAI (computer-aided instruc- recordable or rewritable CD fies digital certificates. 374
Button: Graphical element that tion). See Computer-based or DVD. 269 CF, 236. See also CompactFlash
is activated to cause a spe- training CD recorder, 232. See also CD-R (CF)
cific action to take place. drive Chambers, John, 481
102–3 Caller ID, 379 CD-R: Multisession optical Change management: Skill
Buying personal computers, CAM, 25, 459. See also disc on which users can required for project leaders
144 write, but not erase, their so they can recognize when
Buyer’s guide, 279–94 Computer-aided manufac- own items such as text, a change in a project has
Byte: Eight bits that are turing graphics, and audio. 230, occurred, take actions to
grouped together as a unit. Camera 232. See also Compact disc- react to the change, and
A byte provides enough dif- digital. See Digital camera recordable plan for opportunities
ferent combinations of 0s digital video (DV), 176 CD-R drive: Device that can because of the change. 409
and 1s to represent 256 indi- PC video. See PC video read both audio CDs and Changing records, in database,
vidual characters. 140, 141, camera standard CD-ROM. 232. See 338
142, 335 video, 176 also CD recorder Character: A number, letter,
Web, 176 CD-ROM: Type of optical disc punctuation mark, or other
C: Programming language Canter, Marc, 443 that uses laser technology symbol that is represented
developed in the early Capacity: The number of bytes to store data, instructions, by a single byte in the
1970s at Bell Laboratories (characters) a storage and information that users ASCII and EBCDIC coding
used for business and scien- medium can hold. 222 can read but not write on or schemes. 335
tific applications. 427, 428 CD-ROM, 231 erase. 230, 231. See also Chart, 64
DVD-ROM, 233 Compact disc read-only Charting, 108
C#: Object-oriented program- external hard disk, 227 memory Chat: Real-time typed conver-
ming language based on floppy disk, 222 CD-ROM drive: Drive that sation that takes place on a
C++ developed primarily hard disk, 224, 225 can read CD-ROM discs computer. 71
by Anders Hejlsberg at removable hard disk, 227 and sometimes audio CDs. Chat client, 72
Microsoft. 427, 428 Zip disk, 223 231 Chat client software, 121
Car computers CD-ROM jukebox, 476
C++: Object-oriented program- cyber cars, 121 CD-RW: Erasable multisession
ming language developed at Card reader/writer: Device optical disc on which users
Bell Laboratories that is an that reads and writes data, can write data, instructions,
extension of the C program- instructions, and informa- and information multiple
ming language. 427, 428 tion stored on PC Cards or
flash memory cards and
transmits that data to a
computer or printer
through a connection to a
port. 236
purchasing desktop com-
puter and, 282
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 4
IND 4 INDEX
Chat room: Location on an Client operating systems, 262. Code snippets: Prewritten wireless transmission media,
Internet server that permits See also Stand-alone operat- code and templates associ- 320–22
users to chat with each ing system ated with common pro-
other. 71–72 gramming tasks. 428 Communications channel:
Client/server network: Transmission media on
software, 121 Network in which one or Codec, 216 which data, instructions, or
Check digit: Validity check more computers act as a Coding schemes, 140–41, 335 information travel. 296,
server, and the other com- Cold boot: Process of turning 317–19
consisting of a number(s) or puters on the network
character(s) that is appended request services from the on a computer that has Communications device: Any
to or inserted in a primary server. 305 been powered off com- type of hardware capable of
key value. 340 pletely. 252 transmitting data, instruc-
Checks, MICR characters on, operating system for, 266 Collaborate: Work online with tions, and information
179–80 Clip art: Collection of draw- other users connected to a between a sending device
Chief executive officer (CEO), server. 302 and a receiving device. 8,
454 ings, photographs, and Collaborative databases: Type 312–16
future of, 455 other images that a user can of Web database where
Chief information officer insert in documents. 105 users store and share pho- purchasing desktop com-
(CIO): IT executive position presentation graphics soft- tos, videos, recordings, and puter and, 281
that reports to the CEO. ware, 109 other personal media with
454, 461, 480 Clip art/image gallery: other registered users. 350 Communications satellite:
Chief operations officer Collection of clip art and Collaborative software: Space station that receives
(COO), 454 photographs that often is Software that includes tools microwave signals from an
Chief security officer (CSO): included in application soft- that enable users to share earth-based station, ampli-
Employee responsible for ware. 118 documents via online meet- fies (strengthens) the sig-
physical security of a com- Clipboard, 106 ings and communicate with nals, and broadcasts the
pany’s property and people; Clock other connected users. 302 signals back over a wide
in charge of security com- kernel maintaining, 252 Color, 184 area to any number of
puting resources. 422 system. See System clock ink-jet printers, 189 earth-based stations.
Child, 375 Clock cycle, 138 laser printers, 190 321–22
Children, Internet access for, Clock speed: Pace of the sys- video card and, 186
384 tem clock, measured by the Color correction tools, 217 Communications software:
Chip: Small piece of number of ticks per second. Colossus, 35 Programs that (1) help users
semiconducting material, 138 Column: Term used by users establish a connection to
usually silicon, on which bus, 151 of relational databases for another computer or net-
integrated circuits are needs, 139 field. 108, 347 work; (2) manage the trans-
etched. 136 Closed, 478. See also Column chart, 108. See also Bar mission of data, instructions,
memory, 142–46 Proprietary chart and information; and (3)
RAM. See RAM CMOS, 146. See also COM port, 149 provide an interface for
ROM. See Read-only memory Complementary metal- Command: Instruction on a users to communicate with
CIM, 459. See also Computer- oxide semiconductor menu that causes a program one another. 310
integrated manufacturing CMOS battery, 203 to perform a specific action.
(CIM) CMS, 466. See also Content 103, 168 Compact disc (CD), 7
CIM, 460. See also Customer management system (CMS) function keys for, 168 audio. See Audio CD
interaction management Coax, 320. See also Coaxial cable Command-line interface: burning, 232
(CIM) Coaxial cable: A single copper Type of user interface in care of, 231
CIO, 461, 480. See also Chief wire surrounded by at least which a user types com- direct access and, 235
information officer (CIO) three layers: (1) an insulat- mands or presses special USB 2.0 ports and, 149
Ciphertext, 373 ing material, (2) a woven or keys on the keyboard (such
Cisco Systems, 323 braided metal, and (3) a as function keys or key Compact disc (CD) drive, 7
Clark, Jim, 41, 481 plastic outer coating. 320. combinations) to enter data bays and, 151
Cleaning the computer, 155 See also Coax and instructions. 253, 262,
ClearType, 291 COBOL: COmmon Business- 264, 265 Compact disc read-only
Click: To move the mouse Oriented Language. COmmon Business-Oriented memory, 231. See also
pointer to a button or link Programming language Language, 426. See also CD-ROM
on the computer screen, designed for business appli- COBOL
and then to press and cations, which evolved out Communication, and com- Compact disc-recordable, 232.
release the left mouse but- of a joint effort between the puters, 5 See also CD-R
ton. 57, 103 United States government, Communications: Process in
Click stream, 468 businesses, and major uni- which two or more comput- Compact disc-rewritable, 232.
Click Wheel: Touch-sensitive versities in the early 1960s. ers or devices transfer data, See also CD-RW
pad on a portable media 36, 426. See also COmmon instructions, and informa-
player that users can rotate Business-Oriented tion. 296–323 CompactFlash (CF): Type of
to browse through the song, Language channel, 296, 317–19 miniature mobile storage
picture, or movie lists, or Codd, E. F., 353 devices, 312–16 medium that is a flash
press buttons to play or Code, 423 home networks, 316–17 memory card capable of
pause media, display a assembly language, 424–25 network. See Network storing between 32 MB and
menu, and other actions. 172 HTML, 433 physical transmission media, 4 GB of data. 236
Clients: Other computers and JavaScript, 434 319–20
mobile devices on a net- machine language, 424 software, 120–21, 310 Company information, system
work that rely on a server object, 425 telephone network and, development and, 409
for its resources. 305 symbolic instruction, 424 310—12
VBScript, 435 Compaq, Inc., 39
Comparison operations, 137
Compiler: Separate program
that converts an entire
source program into
machine language before
executing it. 425–26, 427
just-in-time (JIT), 427
Complementary metal-oxide
semiconductor (CMOS):
Technology used by some
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 5
INDEX IND 5
RAM chips, flash memory Computer industry ties of the system develop- Contracts, legal software and,
chips, and other types of career in. See Career ment cycle, typically includ- 117
memory chips that provides ing diagrams to support
high speeds and consumes Computer literacy: The knowl- both process and object Control structure: Used dur-
little power by using battery edge and understanding of modeling. 419 ing program design, a
power to retain information computers and their uses. 3, Computer-based training depiction of the logical
even when the power to a 432 (CBT): Type of education in order of program instruc-
computer is off. 146 which students learn by tions. Also called a con-
battery, 203 Computer Matching and using and completing exer- struct. 440. See also
Completeness check: Validity Privacy Protection Act, 383 cises with instructional Construct
check that verifies that a software. Also called com-
required field contains data. Computer output microfilm puter-aided instruction Control unit: Component of a
340 recorder, 238 (CAI). 119 processor that directs and
Compress, 261 multimedia authoring soft- coordinates most of the
Compression, 210 Computer program: Series of ware for, 437 operations in the computer.
Computer: Electronic device, instructions that directs a Computer-integrated manu- 137
operating under the control computer to perform tasks. facturing (CIM): Use of
of instructions stored in its 423. See also Application computers to integrate the Convertible Tablet PCs, 290
own memory, that can software; Software many different operations COO. See Chief operations
accept data, process the data of the manufacturing
according to specified rules, Computer Sciences process. 459 officer (COO)
produce results, and store Corporation (CSC), 443 Conditions Cookie: Small text file that a
the results for future use. 3 data outside of, 463
advantages of, 4–5 Computer security plan: selection control structure Web server stores on a com-
applications in society, 22–26 Written summary of all the and, 440 puter. 380–81
buyer’s guide, 279–94 safeguards that are in place Configuration information filtering, 379
categories of, 13–18 to protect a company’s flash memory and, 145 Copying
cleaning of, 155 information assets. 422 Connecting to Internet, 51–52 files for backup, 375
components of, 6–8 Connector: Device that joins a items in document, 106
disadvantages of, 4–5 Computer security risk: Any cable to a peripheral. 136, optical discs, 233
disposing of used, 387 event or action that could 149 software, 372–73, 378
examples of usage, 18–22 cause a loss of or damage to Consistency, and computers, 5 Copyright: Exclusive rights
fastest, 139 computer hardware, soft- Consistency check: Validity given to authors and artists
fault-tolerant, 255 ware, data, information, or check that tests the data in to duplicate, publish, and
personal. See Personal processing capability. 362–76 two or more associated sell their materials. 372, 378
computer fields to ensure that the Music and video and, 114
purchasing, 279–94 Computer service technician, relationship is logical. 340 Copyrighted software, 64
refurbishment of, 139 240 Construct, 440. See also Control freeware, 101
starting. See Booting structure packaged, 101
system failure and, 374–75 Computer technician: Consultant. See Computer con- shareware, 101
waste of, 139 Employee who installs, sultant Cordless keyboard, 168
wearable, 173 maintains, and repairs Consumer devices Cordless mouse, 169
Computer addiction: Growing hardware; installs, flash memory cards and, Corrupt files, 260
health problem that occurs upgrades, and configures 148 Cost/benefit feasibility, 409.
when the computer con- software; and troubleshoots Consumer-to-consumer (C2C) See also Economic feasibility
sumes someone’s entire hardware problems. 240 e-commerce, 68 Cost-effective information, 334
social life. 387 Content aggregator: Business Costs, for Internet access, 52
Computer crime: Any illegal Computer vision syndrome: that gathers and organizes Cowlishaw, Mike, 435
act involving a computer. Eyestrain due to prolonged Web content and then dis- CPU, 7, 137–39. See also
362 computer usage. 386. See tributes, or feeds, the con- Central processing unit
copying software, 124 also CVS tent to subscribers for free Cracker: Someone who
Computer engineer, 156 or a fee. 63 accesses a computer or net-
Computer ethics: Moral guide- Computer-aided design Content filtering: Process of work illegally with the
lines that govern the use of (CAD): Software that aids restricting access to certain intent of destroying data,
computers and information in engineering, drafting, material on the Web. 384 stealing information, or
systems. 376–78 and design. 459 Content management system other malicious action. 362
Computer forensics: The dis- (CMS): An information sys- Create: To enter text or num-
covery, collection, and Computer-aided design tem that is a combination of bers, insert images, and per-
analysis of evidence found (CAD) software: databases, software, and form other tasks with a
on computers and net- Sophisticated type of appli- procedures that organizes document using an input
works. Also called digital cation software that assists a and allows access to various device such as a keyboard,
forensics, network forensics, professional user in creating forms of documents and mouse, or digital pen. 106
or cyberforensics. 385 engineering, architectural, other files, including images Credit cards
Computer forensics specialist: and scientific designs. 112 and multimedia content. POS terminals processing, 180
Employee who collects and 466 protecting, 379
analyzes evidence found on graphic designer/illustrator Continuous backup: Backup purchasing computers using,
computers and networks. using, 198 plan in which all data is 286, 287
388 backed up whenever a smart cards, 237
Computer Fraud and Abuse Computer-aided engineering change is made. 346 theft of, 373
Acts, 383 (CAE): Use of computers to Continuous-form paper, 193 Credit report
test product designs. 459 reviewing, 379
CRM, 466. See also Customer
Computer-aided instruction relationship management
(CAI). See Computer-based (CRM)
training Crop, 217
Computer-aided manufactur-
ing (CAM): Use of comput-
ers to assist with
manufacturing processes
such as fabrication and
assembly. 25, 459
Computer-aided software
engineering (CASE):
Software tools designed to
support one or more activi-
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 6
IND 6 INDEX
Cross-platform, 252 DA, 351. See also Database Data projector: Output device retrieve data from the
CRT, 186. See also Cathode-ray analyst (DA) that takes the text and database; and create forms
images displaying on a and reports from the data in
tube (CRT) Dance pad: Flat electronic computer screen and proj- the database. Also called
CRT monitor: Type of desktop device divided into panels ects them on a larger screen database management soft-
that users press with their so an audience can see the ware. 332. See also Database
monitor that contains a feet in response to instruc- image clearly. 195, 289 software
cathode-ray tube. 186 tions from a music video backup and recovery, 346
quality of, 186 game. 172 Data type: Specifies the kind data dictionary, 343
video cards and, 186 of data a field in a database data model, 347–49
CSO, 422. See Chief security Data: Collection of can contain and how the data security and, 346
officer (CSO) unprocessed items, which field can be used. 335 file retrieval and mainte-
CTS, 385. See Carpal tunnel can include text, numbers, nance, 344–46
syndrome (CTS) images, audio, and video. 3, Data warehouse: Huge data- functions of, 343–46
Currency data type, 335 166, 332 base that stores and man- log, 346
Custom software: Software ages the data required to popular, 343, 347
that performs functions spe- accuracy of, 338 analyze historical and cur- security, 341, 342, 346, 351
cific to a business or indus- backup. See Backup rent transactions. 349, Database server, 305, 350
try, developed by a user or correct, 333, 339–40 468–69 Database software:
at a user’s request. 101, 415 correcting inaccurate, 338 Application software used
Customer interaction manage- decryption of, 373 Database: Collection of data to create, access, and man-
ment (CIM): Software that encryption of, 258, 373 organized in a manner that age a database; add,
manages the day-to-day hierarchy of, 334–36 allows access retrieval, change, and delete data in
interactions with customers, input of. See Input; Input and use of that data. 108, the database; sort and
such as telephone calls, e- 332 retrieve data from the data-
mail interactions, Web inter- device base; and create forms and
actions, and instant maintaining, 336–40, 344–46, administration, 351, 352 reports using the data in the
messaging sessions. 460 data model, 347–49 database. 108, 332.
Customer relationship 351 data warehouse and, 349, Date data type, 335
management (CRM): organized in database, 108–9, DBA, 351, 352. See also
System that manages infor- 468–69 Database administrator
mation about customers, 347 design, 351, 418–19 (DBA)
interactions with customers, organized in worksheet, 107–8 file processing system versus, DBMS, 332. See also Database
past purchases, and interest. output of. See Output device management system
466, 481 privacy laws, 382–83 340–42 (DBMS)
Customer service department, quality of, 334 Internet, 345 Dean, Mark, 241
466 redundant, 341, 342 information privacy and, 379, Decision making
Customers relationships, 348 data warehouse and, 468
click streams and, 468 representation in computer, 380 expert systems and, 464–65
e-mail from, 460 multidimensional, 347, 349 by management, 462
extranet use by, 469 140–41 object-oriented, 347, 349 management information
instant messaging (IM) with, retrieval, 344–46 object-relational, 347 system (MIS) and, 462–63
460 security, 341, 342, 346, 351 programming language for, Decision support system
managing interactions with, sharing, 8, 303, 342 (DSS): Information system
460 storage of. See Storage; 430 that helps users analyze data
managing relationships with, querying, 344–45, 348, 349 and make decisions. 463
21, 466, 481 Storage medium recovery of, 346 Decoding, 138
virtual private network use, traveling on Internet, 52 relational, 347–48, 353 Decrypt: Process of decipher-
470 updating, 338 transaction process systems, ing encrypted data into a
Web services and, 469 validating, 339–40 readable form. 373
Customer support, 353 Data analysis, using decision 461–62 Dedicated line: Type of
CVS, 386. See also Computer Database administrator always-on connection that
vision syndrome support system (DSS), 463 is established between two
Cybercafé: Coffeehouse, Data center: Centralized (DBA): Person who creates communications devices
restaurant, or other location and maintains the data dic- (unlike a dial-up line where
that provides personal com- location for managing tionary, manages security of the connection is reestab-
puters with Internet access and housing hardware a database, monitors the lished each time it is used).
to its customers. 301 and software. 467 performance of a database, 311–12
Cybercrime: Online or Data bus, 151 and checks backup and Dedicated servers, 305
Internet-based illegal acts. Data dictionary (database): A recovery procedures. 351, Default value, 343
362–70, 389 DBMS element that con- 352 Defragmenting: Reorganizing
Cyberextortionist: Someone tains data about each file in Database analyst (DA): Person a disk so the files are stored
who uses e-mail as a vehicle a database and each field in who focuses on the mean- in contiguous sectors, thus
for extortion. 363 those files. Also called a ing and usage of data, speeding up disk access
Cyberforensics, 385. See repository. 343 including proper placement and the performance of the
Computer forensics Data entry validation, 419 of fields, defining the rela- entire computer. 261
Cyberterrorism, 363 Data entry form, 345. See also tionships among data, and Deleting programs, 260
Cyberterrorist: Someone who Form identifying users’ access Deleting records, from data-
uses the Internet or network Data file: Collection of related privileges. Also called a base, 338–39
to destroy or damage com- records stored on a storage data modeler. 351 Delphi: Powerful visual pro-
puters for political reasons. medium such as a hard Database approach: System gramming tool that is ideal
363 disk, CD, or DVD. 336 used to store and manage
Cylinder, 226 Data integrity, 333, 342 data in which many pro-
Data mart, 349 grams and users share the
Data model: Rules and stan- data in a database. 341–42
dards that define how a Database management system
database organizes data. (DBMS): Program that
347–49 allows user to create a com-
Data processing, 461. See also puterized database; add,
Transaction processing change, and delete data in
system the database; sort and
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 7
INDEX IND 7
for large-scale enterprise Diagnostic utility: Utility pro- Digital photo printer, 191. See data more quickly and pro-
and Web application devel- gram that compiles techni- also Dye-sublimation printer grams run faster. 261
opment. 429 cal information about a Disk Operating System, 262.
Dell, Michael, 27 computer’s hardware and Digital rights management See also DOS
Dell Computer Corporation, 27 certain system software pro- (DRM): Strategy designed Disk scanner: Utility that
Demodulate/demodulation, grams and then prepares a to prevent illegal distribu- searches for and removes
313 report outlining any identi- tion of music and other unnecessary files. 260
Denial of service attack: fied problems. 261 digital content. 64, 378 Diskette: Portable, inexpen-
Assault on a computer or sive storage medium that
network whose purpose is Diagrams, clip art, 105 Digital signature: Encrypted consists of a thin, circular,
to disrupt computer access Dialog box, 103 code that a person, Web flexible plastic Mylar film
to an Internet service such Dial-up access: Method of site, or company attaches to with a magnetic coating,
as the Web or e-mail. Also an electronic message to enclosed in a square shaped
called DoS attack. 367. See connecting to the Internet verify the identity of the plastic shell. 228. See also
also DoS attack using a modem in a com- message sender. 374 Floppy disk
Design phase: Phase of the puter and a standard tele- Display device: Output device
system development cycle phone line. 51 Digital Subscriber Line, 52, that visually conveys text,
that consists of two major Dial-up line: Temporary con- 311–12. See also DSL graphics, and video infor-
activities: (1) if necessary, nection that uses one or mation. 183–86
acquire hardware and soft- more analog telephone lines Digital versatile disc-ROM, . CRT monitors, 186
ware and (2) develop all of for communications. 311 See also Digital video ergonomics and, 386
the details of the new or Dial-up modem, 313–14. See disc-ROM; DVD-ROM eye problems and, 386
modified information sys- also Modem flat-panel display, 184
tem. 406, 416–19 Differential backup, 478 Digital video (DV) camera: video cards and, 186
acquiring hardware and soft- Digital: Representation of data Video camera that records video content and, 187
ware, 416 using only two discrete video as digital signals Distribution systems:
detailed design, 418–19 states: on (1) and off (0). 140 instead of as analog signals. Provides forecasting for
prototyping, 419 Digital camera: Camera that 176 inventory control, manages
quality review techniques, 419 stores its photographed and tracks shipping of
soliciting vendor proposals, images digitally, instead of storage media for, 236 products, and provides
417 on traditional film. 6, Digital video capture device, information and analysis on
technical requirement, 416 175–76, 210 inventory in warehouses.
testing and evaluating ven- attaching to PDA, 174 purchasing desktop com- 460
dor proposals, 417 flash memory cards and, 148 puter and, 282 DNA computer, 153
Desktop: On-screen work area in PDA, 174 Digital video disc-ROM, 233. Docking station, 175
that has a graphical user purchasing desktop com- See also Digital versatile Tablet PC, 175, 291
interface. 102 puter and, 282 disc-ROM; DVD-ROM Document management soft-
Desktop computer: Computer quality, 175 Digital Video Interface port, ware: Software that pro-
designed so the system storage media, 7 185. See also DVI. vides a means for sharing,
unit, input devices, output transferring pictures into Digital video technology, distributing, and searching
devices, and any other computer from, 7, 118 214–18 through documents by con-
devices fit entirely on or Digital certificate: A notice Digital works, preserving, 352 verting them into a format
under a desk or table. 14 that guarantees a user or a Digital-to-analog converter that can be viewed by any
display devices, 186, 184 Web site is legitimate. 374 (DAC), 218 user. 111
flat panel monitors, 184 Digital cinema, 195 Dijsktra, Edsger, 37 Document management sys-
floppy disk drive in, 223 projectors and, 195 Dimensions, data stored in, 349 tem: System that allows
hard disk in, 224, 225 Digital entertainment, 397–403 Direct access, 235 for storage and manage-
keyboards, 167, 168, Digital Equipment Direct conversion: Conversion ment of a company’s docu-
motherboard, 136 Corporation (DEC), 37 strategy where the user ments, such as word
purchasing, 279–80, 281–87 Digital forensics, 384. See stops using an old system processing documents, pre-
system unit, 134, 135 Computer forensics and begins using a new sys- sentations, and spread-
See also Personal computer Digital formats, 214 tem on a certain date. Also sheets. 302
Desktop publishing (DTP) Digital image called abrupt cutover. 421 Documentation (system
software: Application soft- converting paper documents Director MX, 437 development): Collection
ware used by professional into, 177 Disaster recovery plan: and summarization of data
designers to create sophisti- quality of, 175 Written plan describing the and information. 409
cated documents that can storing, 232 steps a company would Documents
contain text, graphics, and See also Digital camera take to restore computer desktop publishing, 113
many colors. 113 Digital imaging technology, operations in the event of a scanning, 177
Detailed analysis, 415. See also 210–13 disaster. Contains four source, 177
Logical design Digital modem, 314 major components: emer- word processing, 105–6
Detailed design, 418–19 Digital movies, 195 gency plan, backup plan, Domain name: Text version of
Detailed report, 462 Digital music players recovery plan, and test an IP address. 53, 54, 56
Developer: Person who writes flash memory cards and, 148 plan. 479 DoS attack: Assault on a com-
and modifies computer pro- purchasing notebook com- Disk. See Hard disk puter or network whose
grams. Also called a pro- puter and, 288 Disk controller: Special-pur- purpose is to disrupt com-
grammer. 12, 423 Digital pen: Input device that pose chip and electronic cir- puter access to an Internet
Devices allows users to write or cuits that control the service such as the Web or
kernel managing, 252 draw on the screen by transfer of data, instruc- e-mail. Also called denial of
DHTML, 435. See also pressing the pen and issue tions, and information service attack. 367. See also
Dynamic HTML instructions to a Tablet PC between a disk and the sys- Denial of service attack
by tapping on the screen. tem bus and other compo-
15, 172, 291. See also Stylus nents in a computer. 226
Disk defragmenter: Utility
that reorganizes the files
and unused space on a
computer’s hard disk so the
operating system accesses
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 8
IND 8 INDEX
safeguards against, 367–68 Dubinsky, Donna, 199 canal. Also called ear- tion via some electronic
Dot pitch, 185, 186 DV camera, 176. See also phones. 194 method such as the Internet,
Dot-com, 43 Earphones: Audio output networks, or CDs/DVDs. 123
Dot-matrix printer: Type of Digital video (DV) camera device that rests inside the Electrical adapters, purchasing
DVD (digital versatile disc or ear canal. Also called ear- notebook computer and, 289
impact printer that pro- buds. 194 Electrical lines, home network
duces printed images when digital video disc), 7, 42, 233 EarthLink, 52 using, 316
tiny wire pins on a print care of, 231 eBay, 75 Electromagnetic radiation
head mechanism strike an direct access and, 235 EBCDIC, 140, 335. See also (EMR), 186
inked ribbon. 192 DVD and CD mastering soft- Extended Binary Coded Electronic Arts (EA), 443
Do-until control structure, Decimal Interchange Electronic commerce. See
441–43 ware, 213 e-book, 44 E-commerce
Do-while control structure, 441 DVD creation software, 218 Eckert, J. Presper, 35 Electronic Communications
Downlink, 321 DVD drive, 7 E-commerce: Short for Privacy Act, 383. See also
Download (camera), 175 electronic commerce, a busi- ECPA
Downloading: Process of a bays and, 151 ness transaction that occurs Electronic data interchange,
computer receiving infor- DVD recorder, 234. See also over an electronic network 468. See also EDI (electronic
mation, such as a Web page, such as the Internet. 21, 42, data interchange)
from a server on the DVD+RW drive 43, 67–68, 470 Electronic form, 350. See also
Internet. 55 DVD/CD-RW drive, 234 cookies and, 381 E-form
Downstream rate, 312 DVD+R (DVD-recordable): digital certificates and, 374 Electronic magazine, 416. See
Downtime, 477 e-retail and, 470 also E-zine
Downward compatible, 262 230, 234 finance and, 472 Electronic mail. See E-mail
Dpi (dots per inch), 189 DVD-R (DVD-recordable), 230, types of, 67–68 Electronic money, 237
DRAM, 144. See also Dynamic Economic feasibility: Measure Electronic Numerical
RAM 234 of whether the lifetime ben- Integrator And Computer
Drawing, 64 DVD+RAM: Rewritable DVD efits of a proposed informa- (ENIAC), 35
Drawings, clip art, 105 tion system will be greater Electronic profiles, 380
Dreamweaver: Web page format. 234 than its lifetime costs. 409. Electronic storefront: Online
authoring program that DVD+random access memory, See also Cost/benefit business a customer visits
allows Web developers feasibility that contains product
to create, maintain, and 234. See also DVD+RAM ECPA, 383. See also Electronic descriptions, graphics, and
manage professional Web DVD-recordable, 234. See also Communications Privacy a shopping cart. 68
sites. 437 Act Ellison, Larry, 353
Drive DVD-R; DVD+R EDI (electronic data inter- E-mail: Short for electronic
CD-ROM. See CD-ROM DVD-RW: Rewritable DVD change): Electronic data mail, the transmission of
drive interchange. Set of stan- messages and files via a
DVD. See DVD drive format. 234 dards that controls the computer network. 10, 50,
floppy. See Floppy disk drive DVD-ROM: High-capacity transfer of business data 69–70, 74
hard. See Hard disk drive and information among collaborating via, 302
Drive bays: Rectangular open- optical disc on which users computers both within and communications uses and,
ings inside the system unit can read, but not write or among enterprises. 468 298
that typically hold disk erase, that is capable of stor- Edit: To make changes to the companies monitoring, 120
drives. 135, 151 ing 4.7 GB to 17 GB of data. existing content of a docu- impact on communications,
Driver: Small program that 7, 230, 233. See also Digital ment. 106 411
tells an operating system versatile disc-ROM; Digital Editing monitoring, 384
how to communicate with a video disc-ROM audio, 114 PDAs using, 293
specific device. 256 DVD-ROM drive: Device that digital images, 175 phishing, 381–82
operating system and, 256 can read a DVD-ROM. Most document, 106 privacy and, 379
Driving directions, GPS and, DVD-ROM drives also can images, 113, 118 sending digital images via,
301 read audio CDs, CD-ROMs, photographs, 118 175, 176
DRM. See also Digital Rights CD-Rs, and CD-RWs. 233 video, 114 spam, 379, 382
Management (DRM) DVD-ROM jukebox, 476. See Education viruses spread through, 70,
DSL: Type of digital technol- also DVD-ROM server computers used in, 22–23 268, 365, 366
ogy that provides high- DVD+RW: Rewritable DVD Web site and, 92 E-mail address: Combination
speed Internet connections format. 234. See also DVD- Educational software: of a user name and a
using regular copper tele- rewritable Application software that domain name that identifies
phone lines. 52, 311–12 DVD-RW: Rewritable DVD teaches a particular skill. a user so he or she can
DSL modem: Modem that format with capacities up to 119 receive Internet e-mail. 70
sends digital data and infor- 4.7 GB per side that can be Educational use, application E-mail filtering: Service that
mation from a computer to erased and written on, or software for, 119 blocks e-mail messages
a DSL line and receives dig- recorded on, more than Educational Web site, 62 from designated sources.
ital data and information 1,000 times. 230, 234. See E-form, 350. See also Electronic 382
from a DSL line. 314 also DVD-rewritable form E-mail program: Software
DSS, 463. See also Decision backup using, 375 EIDE (Enhanced Integrated used to create, send,
support system (DSS) DVD+RW drive, 234. See also Drive Electronics), 228 receive, forward, store,
DTP software. See Desktop DVD writer EIS, 463. See also Executive print, and delete e-mail
publishing (DTP) software DVD writers, 45 information system (EIS) messages. 69, 121
Dual-core processor: A single DVI port, 185. See also Digital E-learning: Short for electronic Embedded computer: Special-
chip that contains two sepa- Video Interface port learning. Delivery of educa- purpose computer that
rate processors. 139 Dye-sublimation printer, 191.
See also Digital photo printer
Dynamic HTML (DHTML):
Newer type of HTML that
allows Web developers to
include more graphical
interest and interactivity in
a Web page. 435
Dynamic RAM (DRAM), 144
Earbuds: Audio output device
that rests inside the ear
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 9
INDEX IND 9
functions as a component in Enterprise computing: The ERP, 465. See also Enterprise Expression Web: Microsoft
a larger product. 17–18 use of computers in net- resource planning (ERP) Web page authoring pro-
Embedded Linux, 267 works, such as LANs and gram that enables Web
Embedded operating system: WANs, or a series of inter- Errors developers to create profes-
The operating system that connected networks that compiler checking for, 425 sional, dynamic, interactive
resides on a ROM chip encompass a variety of dif- interpreter checking for, 426 Web sites. 437
inside most PDAs and ferent operating systems,
small devices. 266–67 protocols, and network E-tail, 470. See also E-retail Extended Binary Coded
EMC, 481 architectures. 21, 452–81 eSATA port: Short for external Decimal Interchange
Emergency plan, 479 (EBCDIC), 140, 335
Emoticons: Symbols used on hardware, 474–78 SATA. Port that allows you
the Internet to express emo- software applications, 111, to connect a high-speed Extensible HTML, 436. See also
tion. 73 external SATA hard disk to XHTML
Employee monitoring: The 456–66 a computer. 150
use of computers to Enterprise computing soft- Ethernet: Network standard eXtensible Markup Language,
observe, record, and review that specifies no central 436. See also XML
an employee’s use of a ware, 111 computer or device on the
computer, including com- Enterprise hardware: Devices network should control External drive bay, 151
munications such as e-mail when data can be transmit- External floppy disk drive, 223
messages, keyboard geared for heavy use, maxi- ted. 308 External hard disk: Separate
activity (used to measure mum availability, and maxi- development of, 38
productivity), and Web mum efficiency that large home network and, 316 freestanding hard disk that
sites visited. 120, 381, 384, organizations use to man- inventor of, 323 connects with a cable to a
456 age and store information Ethical issues, 376–78 USB port or FireWire port
Employee relationship man- and data. 474–78 copying optical discs and, 233 on the system unit. 226
agement (ERM) system, 459 Enterprise information: EULA, 372. See also End-user External sources, 463, 468
EMR, 186. See also Information gathered in the license agreement (EULA) Extranet: Portion of a com-
Electromagnetic radiation ongoing operations of an Ewing, Marc, 271 pany’s network that allows
Encryption: Process of con- enterprise-sized organiza- Exception criteria, 462 customers or suppliers of a
verting readable data into tion. 456 Exception report, 462–63 company to access parts of
unreadable characters to Enterprise resource planning Execute: Process of a computer an enterprise’s intranet. 308,
prevent unauthorized (ERP): Provides centralized, carrying out the instruc- 469
access. 258, 373 integrated software to help tions in a program. 12, 425 Eyes
digital signature, 374 manage and coordinate the Executing, 138 computer effect on, 386
e-mail, 374 ongoing activities of the RAM and, 143 E-zine: Publication available
Web browsers using, 374 enterprise. 465–66, 476 Executive information system on the Web. Also called elec-
Encryption key, 373 Enterprise software, 456–66 (EIS), 463 tronic magazine. 416. See
End-user license agreement Enterprise storage system: Executive management, 455, also Electronic magazine
(EULA), 372. See also Single- Strategy that focuses on the 461, 463
user license agreement availability, protection, Exercise, preventing repetitive Face recognition system, 181,
Energy, conserving, 186, organization, and backup of strain injuries using, 385 370
387 storage in a company. 238, Expansion bus: Bus that
ENERGY STAR program: 476 allows the processor to Facial recognition software,
Program, developed by the Enterprise-wide systems, 461 communicate with periph- 370
U.S. Department of Energy Enterprise-wide technologies, erals. 151
and the U.S. Environmental 467–70 Expansion card: Circuit board Facsimile machine, 194. See
Protection Agency, that Entertainment, Web and, 472 that enhances functions of a also Fax machine
encourages manufacturers Entertainment software: component of a system unit
of computer components to Application software, such and/or provides connec- Fair Credit Reporting Act, 383
create energy-efficient as interactive games, tions to peripherals. 147. See False condition, selection con-
devices requiring little videos, and other programs also Adapter card
power when they are not in designed to support a Expansion slot: Socket on a trol structure and, 440
use. 186, 387Engelbart, hobby or provide amuse- motherboard that can hold Fanning, Shawn, 43
Douglas, 199 ment and enjoyment. 120 an adapter card. 147 FAQ (frequently asked
Engineering department, infor- Entertainment Web site, 62, 84 Expert system: Information
mation systems used by, 459 Environment, and computers, system that captures and questions): List that helps
Enhanced Integrated Drive 5, 139 stores the knowledge of a user find answers to com-
Electronics, 228. See also Environmental Web site, 84 human experts and then monly asked questions. 4, 73
EIDE E-retail: Business transaction imitates human reasoning Fault-tolerant computer:
Enhanced keyboard, 168 that occurs when retailers and decision making. 464–65 Computer that has dupli-
ENIAC, 35. See Electronic use the Web to sell their ExpressCard module: cate components so it can
Numerical Integrator And products and services. Also Removable device that can continue to operate when
Computer called e-tail. 470. See also be used to add memory, one of its main components
Enterprise, 238, 452–81 E-tail communications, multime- fail. 255
information systems in, Ergonomic keyboard, 168 dia, and security capabili- Fax, 194
456–66 Ergonomics: The science of ties to mobile computers. communications uses and,
levels of users in, 455 incorporating comfort, effi- 148 298
organizational structure of, ciency, and safety into the ExpressCard slot: Special type sending digital images, 175
454–56 design of the workplace. of expansion slot in desk- Fax machine: Output device
technology strategy, 461 168, 386 top, notebook, or other that codes and encodes doc-
PDAs and, 294 mobile computers that uments so they can be
ERM system, 458. See also holds an ExpressCard transmitted over telephone
Employee relationship man- module. 148 lines. 194. See also Facsimile
agement (ERM) system machine
Fax modem, 194
Feasibility: Measure of how
suitable the development of
a system will be to the com-
pany. 409
Feasibility report, 414
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 10
IND 10 INDEX
Feasibility study, 413. See also File retrieval, methods of, Flash memory: Type of non- Fragmented, 261
Preliminary investigation 344–46 volatile memory that can be Frame rate, 217
erased electronically and Frankston, 38
Fetching, 138 File server, 305 rewritten. 145 Freedom WebSecure, 379
Fiber-optic cable: Dozens or File sharing, Internet connec- Freeware: Copyrighted soft-
Flash memory card:
hundreds of thin strands of tion and, 379 Removable flash memory ware provided at no cost to
glass or plastic that use File sharing network, 306. See device, usually no bigger a user by an individual or a
light to transmit signals. than 1.5" in height or width, company that retains all
320 also P2P that you insert and remove rights to the software. 101
Field: A combination of one or File Transfer Protocol, 71. See from a slot in a computer, Frequently asked questions.
more related characters or mobile device, or card See FAQ
bytes, a field is the smallest also FTP reader/writer. 145, 148 FTP (File Transfer Protocol):
unit of data a user accesses. Filtering software, 310 Internet standard that per-
108, 335 Finance, computers used in, digital cameras using, 175 mits file uploading and
type of data in, 335 types of, 236, downloading with other
Field name: Name that 23, 454, 458 Flatbed scanner: Type of light- computers on the Internet.
uniquely identifies each Finance, Web sites and, 86 71
field in a database. 335 Financial departments, 454, 458 sensing input device that software, 121
Field size: Defines the maxi- Financial planning, with per- scans a document and cre- FTP server, 71
mum number of characters ates a file of the document FTTH (Fiber to the Home):
a field can contain. 335 sonal finance software, 116 in memory instead of a Dedicated line that uses
File: Named collection of Financial transactions paper copy. 177 fiber-optic cable to provide
stored data, instructions, or Flat-panel display, 184–85 extremely high-speed
information. 103 accounting software tracking, Floppy disk: Portable, inex- Internet access to home or
adding records to, 336 111 pensive storage medium small business users. 312
backup of, 223, 227, 261, 268, that consists of a thin, circu- Full backup, 375, 478. See also
372, 375 personal finance software lar, flexible plastic Mylar Archival backup
changing records in, 338 and, 116 film with a magnetic coat- Function, 107
compressing, 261, 269 ing, enclosed in a square Function keys, 168
conversion, 269 Fingerprint scanner: Biometric shaped plastic shell. 7, 228 Functional units, 457–61
corrupt, 260 device that captures curves characteristics of, 223
deleting records from, 338–39 and indentations of a fin- direct access and, 235 Game console: Mobile com-
fragmented, 261 gerprint and compares formatting, 259 puting device designed for
graphics, 64 them with those of a stored viruses and, 268, single-player or multiplayer
quarantining, 366 image. 181, 289, 370, 371 See also Diskette video games. 16
restoring, 261, 375 Floppy disk drive: Device that
uncompressing, 269 Fingerprinting, brain. See Brain reads from and writes on a Game controller: Video game
virus-infected, 364, 365–66 fingerprinting floppy disk. 228 and computer game input
zipped, 269 bays and, 151 device that directs move-
File compression utility: Firewall: Hardware and/or purchasing desktop com- ments and actions of on-
Utility program that shrinks software that protects a net- puter and, 282 screen objects. 172
the size of a file(s), so the work’s resources from Folder: Specific named loca-
file takes up less storage intrusion by users on tion on a storage medium Gamepad: Pointing device that
space than the original file. another network such as the that contains related docu- controls the movement and
122, 269 Internet. 367–68 ments. 259 actions of players or objects
File conversion utility: Font: Name assigned to a spe- in video games or computer
Program that transforms a built into router, 316 cific design of characters. games. 171
file from one format to personal, 368, 379 106
another, eliminating the wireless security and, 376 Font size: Size of the charac- Games, 402
need to reenter data in a FireWire hub: Device that ters in a particular font. interactive, 120
new program. 122, 269 106 pointing devices for, 171
File format, 216 plugs in a FireWire port on Font style: Font design, such
File maintenance: Procedures the system unit and con- as bold, italic, and under- Gantt, Henry L., 409
that keep data current. tains multiple FireWire line, that can add emphasis Gantt chart, 409
336–40, 344–46 ports in which you can to a font. 106 Garbage in, garbage out
File management, operating plug cables from FireWire Footprint, 184
system and, 257, 259 devices. 150 Foreground, 254, 255 (GIGO): Computing phrase
File manager: Utility that per- FireWire port: Port that can Form: Window on the screen that points out the accuracy
forms functions related to connect multiple types of that provides areas for of a computer’s output
file and disk management. devices that require faster entering or changing data depends on the accuracy of
259 data transmission speeds. in a database. Also called the input. 333
File name: Unique combina- 150 data entry form. 108, 345, Gates, Bill, 27, 38
tion of letters of the alpha- purchasing notebook 432. See also Data entry GB, 142. See also Gigabyte
bet, numbers, or other computer and, 288 form General purpose information
characters that identifies a Firmware: ROM chips that Format: To change a docu- system, 461–65
file. 103 contain permanently writ- ment’s appearance. 106 Ghosting, 261
File processing system: ten data, instructions, or Formatting, 259 GHz, 138. See also Gigahertz
System used to store and information, recorded on Formula, 107 GIF, 64
manage data in which each the chips when they were Forth, 431 Gigabyte (GB):
department or area within manufactured. 145 Fortran, 36, 431 Approximately 1 billion
an organization has its own Fixed disk, 224 Fourth-generation language, bytes. 142
set of files. 341, 347 Fixed wireless: Microwave 430. See also 4GL Gigahertz (GHz): One billion
transmissions that send sig- Fractional T1, 312 ticks of the system clock per
nals from one microwave second. 138
station to another. 52 GIGO, 333. See also Garbage
Flame wars, 73 in, garbage out (GIGO)
Flames, 73
Flash: Web page authoring
program that enables Web
developers to combine
interactive content with
text, graphics, audio, and
video. 437
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 11
INDEX IND 11
Global positioning system Green computing: Computer operating system on, 251 Health Web sites, 95, 473
(GPS): Navigation system usage that reduces the elec- portable, 226 Hearing impaired users, out-
that consists of one or more tricity and environmental problems on, 260
earth-based receivers that waste involved in using a purchasing desktop com- put devices for, 197
accept and analyze signals computer. 387 Help
sent by satellites in order to puter and, 282
determine the receiver’s Grid computing: Technology purchasing notebook com- application software and,
geographic location. 301, that combines many servers 122–23
320 and/or personal computers puter and, 288
on a network to act as one removable, 226 Online. See Online Help
Gnutella, 306 large computer. 478 used for virtual memory, 255 Web-based, 122–23
Google, 58, 75, 96, 467 Hard drive, Internet. See Help desk specialist:
Gosling, James, 443 Groupware: Software that
Government helps groups of people Internet hard drive Employee who answers
work together on projects Hardware: Electric, electronic, hardware, software, or
computers used in, 23 and share information over networking questions in
Internet structure and, 50 a network. 302 and mechanical compo- person, over the telephone,
personal data and, 350 nents contained in a com- and/or in a chat room. 124
privacy laws and, 382–83 GUI. See Graphical user puter. 6–8 Hertz, 138
Web site, 89 interface acquiring in design phase, Hewlett-Packard (HP), 27, 39,
GPS, 301, 320. See also Global 416 199
Hacker: Someone who communications, 312–16 Hibernate, 252
positioning system (GPS) accesses a computer or net- diagnostic utility, 261 High-availability systems:
GPS receiver, 301, 320 work illegally. 260, 362 disposing of used, 387 Systems that continue run-
Grandparent, 375 drivers, 256 ning and performing tasks
Graphic: Digital representa- passwords and, 369 electrical problems, 374–75 for at least 99 percent of the
Hand geometry system, 181, enterprise, 474–78 time. 477
tion of nontext information identifying requirements, 416 High-level language, 424
such as a drawing, chart, or 370 input device. See Input device History file, clearing, 379
photograph. 64. See also Handheld computer: operating system coordinat- Hits, 60
Graphical image ing, 251 Hoff, Ted, 38
Graphic designer/illustrator: Computer small enough to output device. See Output Home design/landscaping
Employee who creates fit in one hand. 15, 271, 319. device software: Application
visual impressions of prod- See also Handtop computer, performance monitoring, 257 software that assists users
ucts and advertisements in ultra personal computer purchasing notebook com- with the design, remodeling,
the fields of graphics, the- (uPC) puter and, 288 or improvement of a home,
ater, and fashion. 198 keyboards, 168 scalability, 477 deck, or landscape. 119
Graphic illustrator. See operating systems for, 252, storage. See Storage; Storage Home network: Network
Graphic designer/ 266 media consisting of multiple
illustrator See also Mobile computer; system failure and, 374 devices and computers
Graphical image, 64. See also Mobile device system unit. See System unit connected together in a
Graphic Handhelds: Computers small theft, 371 home. 316–17
Graphical user interface enough to fit in one hand. vandalism, 371 wireless, 316–17, 317
(GUI): Type of user inter- See also handtop computer; vendors, 417 Home page: First page that a
face that allows a user to handheld computer. 16 Hardware theft: The act of Web site displays. 55
interact with software using games, 402 stealing computer equip- Home user: User who spends
text, graphics, and visual Hands, carpal tunnel syn- ment. 371 time on a computer at
images, such as icons. 10, drome and, 385 Hardware vandalism: The act home. 18–19
253, 264, 265 Handspring, 45, 199 of defacing or destroying application software for,
visual programming lan- Handtop computer: Computer computer equipment. 371 115–20
guages and, 428 small enough to fit in one Hawthorne Effect, 410 backup and, 375, 479
Graphics, 64 hand. 15. See also Handheld Hayes, 39 input devices, 196
application software and, computer, ultra personal HD DVD disc: High-density- output devices, 190, 196
112–14 computer (uPC) DVD. Storage media with printers, 190
business software and, Handwriting recognition, 106, capacities up to 60 GB with processor selection, 139, 154
104–11 174 expectations of 90 GB in the RAM needs, 144
ethical issues in altering, 378 Handwriting recognition soft- future. 233 storage and, 220, 221, 239
multimedia and, 64 ware, 74 HD DVD-RW: High-capacity Web cams, 176
output, 182 Hard disk: Type of storage rewritable DVD format. 234 wireless security and, 375
on Web page, 54. See also Clip device that contains one or Head crash, 226 HomeRF (radio frequency)
art more inflexible, circular Head-mounted pointer, 197 network, 316–17
Graphics card: Adapter card platters that store data, Headphone port, on CD Hopper, Grace, 36, 426, 443
that converts computer out- instructions, and informa- drives, 229 Horizontal market software,
put into a video signal that tion. 7, 223–27. Headphones: Audio output 415
travels through a cable to backing up, 261, 375 device that covers or is Host: Any computer that pro-
the monitor, which displays booting and, 252 placed outside the ear. 194 vides services and connec-
an image on the screen. 147. bus connection for, 151 Health care, computers used tions to other computers on
See also Video card characteristics of, 224–25 in, 23–24 a network. 50
Graphics chip, 186 controller, 226–27 Health information, storing on Hot site, 479
Graphics file, viewing, 259 defragmenting, 261 smart cards, 237 Hot spots: Public locations
Graphics tablet: Flat, rectan- direct access and, 235 Health issues, 385–87 that provide Wi-Fi Internet
gular, electronic, plastic disk capacity, 224 CRT monitors, 186 connections to users with
board that is used to create downloading from digital disadvantage in computers, 5 mobile computers or
drawings and sketches. camera to, 175 keyboards, 168 devices. 52, 300
172 external, 226 radiation, 186 number of, 309
formatting, 259
miniature, 226
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 12
IND 12 INDEX
Hot-swapping, 477 professional, 113 procedures that work Installing
HRIS, 458. See also Human Image viewer: Utility program together to produce quality new information system, 420
information. 406, 456–66
Resources Information that allows users to display, closed, 478 Installing (software): Process
Systems copy, and print the contents converting to new, 421 of setting up software to
HTML: Hypertext Markup of a graphics file. 259 development of. See System work with the computer,
Language. Special format- Images, 64, 65 development; System printer, and other hardware
ting language that program- as links, 57 development cycle components. 12, 252
mers use to format personal DTP software, 118 enterprise-wide, 467–71
documents for display on See also Graphics; Video executive, 463 Instant messaging (IM): Real-
the Web. 433–34. See also Impact printer: Type of printer expert, 464–65 time Internet communica-
Hypertext Markup that forms characters and functional units using, tions service that notifies a
Language graphics on a piece of paper 457–61 user when one or more peo-
Dynamic, 435 by striking a mechanism general purpose, 461–65 ple are online and then
Extensible, 436 against an inked ribbon that installing and testing, 420 allows the user to exchange
http: A set of rules that defines physically contacts the integrated, 465–66 messages or files or join a
how pages transfer on the paper. 192–93 management, 462–63 private chat room with
Internet. See also Hypertext Implementation phase: Phase open, 478 those people. 72–73
Transfer Protocol. 56. See of the system development prototype of, 419
also Hypertext Transfer cycle during which the new security, 422 customer support using, 460
Protocol or modified system is con- Information technology (IT) live images added to, 176
Human experts, expert sys- structed, or built, and then department, 454 software for, 73, 121
tems and, 464–65 delivered to the users. Four outsourcing functions of, 415 wireless, 298
Human Resources major activities performed Information theft: Computer Instant messenger, 73, 121
Information Systems include: (1) develop pro- security risk that occurs Instructions, 4, 166
(HRIS): Information system grams, (2) install and test when someone steals per- cache and, 144
that manages one or more the new system, (3) train sonal or confidential infor- input of, 166
human resources users, and (4) convert to the mation. 373–74 memory processing, 142, 145,
function(s). 458 new system. 406, 420–21 Informational Web site, 62
Hyperlink: Built-in connection Import: To bring graphics into Infrared (IR), 150, 309, 321 255
to another related Web page a document. 117 cordless keyboards using, 168 operating system allocating
or part of a Web page. 57. Incremental backup, 478 See also IrDA
See also Link Industry, computers used in, Ink-jet printer: Type of nonim- to memory, 255
Hyperlink data type, in data- 25 pact printer that forms char- reading. See Reading
base, 335 Inference rules, 464 acters and graphics by ROM and, 145
HyperTalk, 431 Information: Processed data spraying tiny drops of liq- storage of. See Storage;
Hypertext Markup Language, that conveys meaning and uid ink on a piece of paper.
433. See also HTML is useful to people. 3, 332 189–90 Storage media
Hypertext Transfer Protocol, accuracy of, 5, 377–78 cost of cartridges, 190 writing. See Writing
56. See also http downloading, 55 refilling cartridges, 190 Integrated circuit, 136
enterprise, 456 Input: Any data and instruc- invention of, 36, 157
IBM (International Business gathering for system devel- tions entered into the mem- Integrated Services Digital
Machines), 36, 37, 38, 481 opment, 410 ory of a computer. 166–81
memory processing, 142 accuracy of, 377–78 Network, 311. See also
Eclipse, 420 personal, 379–82 audio, 173 ISDN
grid computing, RAM and, 144 biometric, 181 Integration test, 420
Millipede storage device, reading. See Reading designing, 418–19 Intel, 40, 42, 44, 45, 157
Slam, 420 ROM and, 145 device. See also Input device processors, 139
Icon: Small image displayed searching for on the Web, digital cameras, 175 Intel-compatible processors, 139
57–61 storage devices as source of, Intellectual property (IP), 378
on a computer screen that sharing, 8, 303 222 Intellectual property rights:
represents a program, an storage of. See Storage; terminals, 180 Rights to which creators are
instruction, a document, or Storage media video, 176 entitled for their work. 378
some other object. 10, 102 theft of, 373–74 voice, 173 Intelligent agents, 57
Identification, 369, 373 valuable, 334 Input device: Any hardware Intelligent home network, 316
Identity theft, 379–82 writing. See Writing component that allows Interactive applications, creat-
IEEE 1394 port, 150. See also Information privacy: Right of users to enter data and ing using multimedia
FireWire port individuals and companies instructions into a com- authoring software, 114
If-then-else control structure, to deny or restrict the col- puter. 6, 166–81 Interface
440 lection and use of informa- biometric, 181 disk controller as, 227
Illustration software, 113. See tion about them. 379–85 keyboard, 167–68, 180, 197 EIDE, 228
also Paint software encryption and, 373 mobile computers and SCSI, 228
IM, 72–73. See also Instant laws, 382–83 devices, 172, 174–75 Internal drive bay, 151
messaging Information processing cycle: pointing. See also Pointing Internal sources, 463, 468
iMac, 42 Series of input, process, device International Business
Image editing software: output, and storage purchasing desktop Machines, 481. See also IBM
Application software that activities performed by a computer and, 281 (International Business
provides the capabilities of computer. 5 scanners, 177–80 Machines)
paint software and also Information system (IS): video, 176 International Information
includes the capability to Collection of hardware, voice, 173 Integrity Institute (I-4), 389
enhance and modify existing software, data, people, and Internet: Worldwide collection
images and pictures. 113, 212 of networks that connects
personal, 118 millions of businesses,
government agencies,
educational institutions,
and individuals. 8–10,
50–75. See also Net
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 13
INDEX IND 13
backup using, 476 users over the Internet IS, 406. See also Information K, 142. See also Kilobyte
broadcasting images over, 176 (instead of the public system Kay, Alan, 271
chat rooms on, 71–72 switched telephone net- Kazaa, 306
content filtering, 384 work). Also called Voice ISDN (Integrated Services KB, 142. See also Kilobyte
control of, 51 over IP. 73, 194 Digital Network): Short for Kemeny, John, 37
cybercafé connection, 300 Internet-enabled: Technology Integrated Services Digital Kernel, 252
data traveling on, 52 that allows mobile devices Network; Set of standards Key field: Field in a database
e-form and, 350 to connect to the Internet for digital transmission of
e-mail using, 69–70 wirelessly. 15, 21 data over standard copper that uniquely identifies
file and printer sharing and, Internet-enabled devices, 52 telephone lines. 311 each record in a file. Also
Internet2, 57 called primary key. 336. See
379 Interoperability: Sharing ISDN modem: Modem that also Primary key
high-speed access, 52 information with other sends digital data and infor- Keyboard: Input device that
history of, 50 information systems within mation from a computer to contains keys users press to
how it works, 51–54 an enterprise. 478 an ISDN line and receives enter data and instructions
information accuracy and, Interpreter: Program used to digital data and information into a computer. 6, 168
convert a source program from an ISDN line. 314 connections, 168
377–78 into machine language and ergonomics, 168, 386
instant messaging on, 121 then executes the machine ISP (Internet service health issues, 168, 385
mailing lists and, 71 language instructions. 426 provider): Regional or on-screen, 174, 197
Netiquette and, 73 Interview national Internet access PDAs, 293
newsgroups on, 71 for system development, 410 provider. 52 purchasing desktop com-
objectionable material on, 384 Intranet: An internal network puter and, 282, 284
pirated software on, 373, 378 that uses Internet technolo- e-mail filtering and, 382 purchasing notebook com-
public Internet access point, gies. 307–8 subscribing to, 285 puter and, 288
Intrusion detection software: IT consultant: Employee, typi- terminal, 180
300 Program that automatically Keyboard monitoring soft-
search engines, 57, 58, 60–61 analyzes all network traffic, cally hired based on com- ware, 384
security and, 389 assesses system vulnerabili- puter expertise, who Keywords, 60–61,
spyware and, 381 ties, identifies any unautho- provides computer services Kilby, Jack, 36, 157
surge protector and, 374–75 rized intrusions, and to his or her clients. 417 Kilobyte (KB or K): Exactly
telephone calls over, 73, 176 notifies network adminis- IT department. See 1,024 bytes. 142
video conference using, 176 trators of suspicious behav- Information technology Kiosk, 171
virtual private network and, ior patterns or system (IT) department Knowledge base, 464
breaches. 368 Itanium, 139 Kodak, Picture CD and, 232
470 Inventory iTunes, 401
Web farming and, 468 distribution systems, 460 L1 cache: A type of memory
World Wide Web and. See e-retail and, 470 J2EE, 469 cache that is built directly
extranet and, 469 Jack: Term sometimes used to into the processor chip,
World Wide Web scheduling and managing, with a capacity of 8 KB to
Internet access, 50, 51–52 459 identify an audio or video 16 KB. 145
Investing port. 148
car, 121 online. See Online investing JAD session, 410. See also L2 cache: A type of memory
PDAs, 293 Iomega Corporation, 223 Joint-application design cache that is slightly slower
purchasing desktop com- IP, 378. See also Intellectual (JAD) session than L1 cache, but has a
property Java: Object-oriented program- much larger capacity, rang-
puter and, 284, 285 IP address: A number that ming language developed by ing from 64 KB to 16 MB.
Tablet PCs, 292 uniquely identifies each Sun Microsystems. 427, 443 145
Internet access provider. See computer or device con- creation of, 41
nected to the Internet. 53 JavaScript: Interpreted lan- Label, 107
Access provider See also Internet Protocol guage that allows a pro- Labor force, in computers, 5
Internet attacks, 364–68 address grammer to add dynamic LAN, 303. See also Local area
Internet backbone: Major car- iPod music player, purchasing content and interactive ele-
notebook computer and, 288 ments to a Web page. 434 network
riers of network traffic on IR, 321. See also Infrared (IR) Jewel box, 230 Laptop computer, 14. See also
the Internet. 52 IrDA: Network standard used JIT compiler, 428. See also Just-
Internet connection, 51–52 to transmit data wirelessly in-time (JIT) compiler Notebook computer
cable television network and, via infrared (IR) light Job: Operation that the proces- Large business user:
314 waves. 309 sor manages. 255–56
dedicated lines and, 311–12 IrDA port: Port that uses Joint-application design Computer user working for
dial-up line and, 311 infrared light waves to (JAD): Lengthy, structured, a business that has hun-
wireless, 300 transmit signals between a group meetings in which dreds or thousands of
Internet backup, 476 wireless device and a com- users and IT professionals employees in offices across
Internet databases, 345 puter. 150 work together to design or a region, the country, or the
Internet etiquette, 73. See also Iris recognition system: develop an application. 410 world. 18, 21–22
Netiquette Biometric device that uses Joystick: Pointing device used input devices, 196
Internet Explorer. See Microsoft iris recognition technology for games or flight and operating systems for, 266
Internet Explorer to read patterns in the iris driving simulations that is a output devices, 190, 196
Internet filters, 268 of the eye. 181 vertical lever mounted on a printers, 190
anti-spam programs, 268 Iris scanner, 370 base. 172 processor selection and, 154
pop-up blockers, 269 purchasing desktop com- storage and, 220, 221, 239
Web filters, 268 puter and, 282 Large-format printer: Printer
Internet Protocol address, 53. JPEG, 64, 211 that creates photo-realistic
See also IP address Picture CD using, 232 quality color prints, used
Internet service provider. See JPEG 2000, 195 mainly by graphic artists.
ISP Just-in-time (JIT) compiler, 428 192
Internet telephony:
Technology that allows
users to speak to other
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 14
IND 14 INDEX
Large-scale integration (LSI), Line printer: Type of high- series of binary digits or a and deliberately alter a
37 speed impact printer that combination of numbers computer’s operations. 364
prints an entire line at a and letters that represent MAN, 304. See also Metro-
Laser mouse: Optical mouse time. 193 binary digits. 424, 426 politan area network
that uses a laser sensor. 169 Machine-dependent language, (MAN)
Line-of-sight transmission, 309, 424 Management information
Laser printer: Type of high- 321 Machine-independent lan- system (MIS): Information
speed, high-quality nonim- guage, 424 system that generates accu-
pact printer that creates Link: Built-in connection to Macintosh, purchasing, 280–81 rate, timely, and organized
images using a laser beam another related Web page or Macintosh operating system: information, so managers
and powdered ink called part of a Web page. Short Operating system for and other users can make
toner. 190–91 for hyperlink. 57 Apple’s Macintosh com- decisions, solve problems,
puter. 14, 39, 101, 264 supervise activities, and
Layers, 218 animation, 64 Macro (application program): track progress. 462–63
Layout chart, 418–19 portal providing, 467 Series of statements that Management information
LCD, 185. See also Liquid search engine and, 60, 96 instructs an application how systems (MIS) manager,
subject directories and, 58 to complete a task. 365, 432 480
crystal display Linux: Popular, multitasking Macro recorder, 432 Managers: Employees respon-
LCD monitor: Desktop moni- Magazines sible for coordinating and
UNIX-type operating sys- online, 25 controlling an organiza-
tor that uses a liquid crystal tem. 41, 43, 47, 265, 266, 271 Magnetic disks: Storage tion’s resources. 456
display instead of a cathode- future of, 265 medium that uses magnetic decision making by, 456,
ray tube to produce images Liquid crystal display (LCD): particles to store items such 462–63
on a screen, resulting in a Type of display that uses a as data, instructions, and levels of, 454
sharp, flicker-free display. liquid compound to present information on a disk’s sur- Manufacturers
Also called flat-panel moni- information on a display face. 222–28 processors, 139
tor. 47, 184 device. 185 hard disk, 224–28 ROM chips, 145
ports and, 185 for Tablet PCs, 291 floppy disk, 223 Manufacturing enterprise
quality of, 185 LISP, 431 types of, 222 functional units in, 457
on mobile computers and Lithium-ion batteries, 288 Zip disk, 223 information systems used by,
devices, 184 Loads, 12, 101, 103 Magnetic-ink character 459
Leading, 456 Local area network (LAN): recognition. See MICR Manufacturing information
Learning Network that connects com- Magnetic stripe card reader: systems, 459
computer-based training and, puters and devices in a Reading device that reads Maps
119 limited geographical area the magnetic stripe on the clip art, 105
computers used in, 22–23 such as a home, school com- back of credit, entertain- GPS and, 301
educational software for, 119 puter laboratory, office build- ment, bank, and other simi- Margins, 105
Legal issues ing, or closely positioned lar cards. See also magstripe Market research system, 460
copyright. See Copyright group of buildings. 303 reader. 179. See also Marketing information
employee monitoring, 384 bus network, 306 Magstripe reader system: Information system
intellectual property, 378 Ethernet, 308 Magnetic Tape/Selectric that serves as a central
Internet access, 384 first, 38 Typewriter (MT/ST), 37 repository for the tasks of
privacy, 382–83 ring network, 307 Magnetoresistive RAM the marketing functional
software theft, 372–73, 378 Log (database): Listing of (MRAM), 144 unit. 460
Legal software: Application activities that change the Magstripe reader, 179, 180 See Massively multiplayer online
software that assists in the contents of a database. 346 also Magnetic stripe card games (MMOGs), 402
preparation of legal docu- Log on: To access a computer reader Master, 218
ments and provides legal or network as a user. 257 Mailing list: Group of e-mail Material Requirements
information to individuals, Logical design, 415. See also names and addresses given Planning (MRP): Approach
families, and small busi- Detailed analysis a single name. 71 to information management
nesses. 117 Logitech, 199 Main memory, 143. See also in a manufacturing environ-
Libraries Logo, 431 RAM ment that uses software to
content filtering used by, 384 Longitudinal recording: Data Mainframe: Large, expensive, help monitor and control
Internet access from, 310 storage technique that powerful computer that can processes related to produc-
License agreement: An agree- aligns the magnetic parti- handle hundreds or thou- tion. 459
ment issued by a software cles horizontally around the sands of connected users Mauchley, John, 35
manufacturer that gives the surface of a hard disk. 223 simultaneously, storing MB, 142. See also Megabyte
user the right to use the LookSmart, 57 tremendous amounts of McAfee VirusScan, 268
software. 372–73 Loop, 441 data, instructions, and Media, Web and, 472
Light gun: Game controller Lotus, 39 information. 17 Media card, printing photos
used to shoot targets and Lotus 1–2-3, 39 Maintaining using, 190
moving objects after you Low-level language, 424–25 data, 336–40, 344–46, 351 Media player: Program that
pull the trigger on the LSI. See Large-scale integration database, 344–46, 351 allows you to view images
weapon. 172 Lycos, 57 Maintaining (program): Act of and animation, listen to
Light pen: Handheld input correct errors or adding audio, and watch video files
device that can detect the Mac OS, 14 enhancements to an existing on your computer. 269
presence of light. 170 Mac OS X: Multitasking oper- program. 438 Media sharing Web site:
LightScribe technology: Malware: Short for malicious Specific type of online
Technology used with spe- ating system that is the lat- software; programs that act social network that enables
cially coated optical discs to est version of the Macintosh without a user’s knowledge members to share media
etch labels directly on the operating system. 101, 264
disc (as opposed to placing Machine cycle, 138
an adhesive label on the Machine language: The only
disc). 229 language a computer
Line chart, 108 directly recognizes, using a
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 15
INDEX IND 15
such as photos, music, and Memory Stick: Type of minia- invention of, 38 purchasing, 292–94
videos. 63 ture mobile storage Microsoft, 27, 38, 39, 40, 41, 42, storage media for, 235–37,
Medical Information Bureau, medium that is a flash
medical records from, 239, memory card capable of 44, 46, 47, 48, 125 239
379 storing between 256 MB ActiveX, 434 system unit, 135
Meeting and 2 GB of data. 236 ClearType technologies, 291 theft of, 371
online, 302 legal problems, 43, 45 touch screens, 172
using video conference, 176 digital cameras using, 175 MS-DOS, 38, 262 Internet access and, 52,
Megabyte (MB): Approxi- Menu: Item on the computer .NET architecture, 428
mately 1 million bytes. 142 operating system, 11, 101. See 436
Megahertz, access time stated screen that contains a list of Mobile printer: Small, light-
in, 146 commands from which a also Windows XP
Megapixels (MP), 210 user can make selections. Prefix, 420 weight, battery-powered
Memo data type, 335 103, 168 Microsoft Media Center, 398 printer used by a mobile
Memory: Electronic compo- sub-, 103 Microsoft Network (MSN), 52 user to print from a note-
nents in a computer that Menu generator, 432 online meetings using, 302 book computer, Tablet PC,
store instructions waiting to Menu-driven interface, 262 Microsoft Word, 104 PDA, or smart phone while
be executed and data Menu-driven tools, application Microwave station: Earth- traveling. 192
needed by those instruc- generator and, 431 Mobile users: Users who work
tions. 7, 142–46 Message board: Popular Web- based reflective dish that on a computer while away
access times, 146, 222 based type of discussion contains the antenna, trans- from a main office or
address, 142 group that does not require ceivers, and other equip- school. 18, 20
address bus, 151 a newsreader. 71, 121 ment necessary for input devices, 196
application software in, 103 Messaging microwave communica- Internet access by, 52
buffer, 255 instant. See Instant tions. 321 output devices, 183, 184, 192,
cache, 144–45 messaging Microwaves: Radio waves that 196
CMOS, 146 short. See Short message can provide a high-speed processor selection, 154
creating document and, 106 service (SMS) signal transmission. 321 sales force, 460
flash, 145 Metcalfe, Robert M., 38, 323 Middle management, 455 storage and, 235–37, 239
nonvolatile, 142, 145 Metropolitan area network MIDI, 150, 173. See also system unit, 152–53
operating system files loaded (MAN): High-speed net- Musical Instrument Digital virtual private network use,
into, 101 work that connects local Interface 470
operating system managing, area networks in a metro- MIDI port: Special type of wireless security and, 375
255 politan area such as a city serial port that connects the Moblogs, 63
PDAs, 293 or town and handles the system unit to a musical Mockup, 418–19
program loading into, 12, bulk of communications instrument, such as an elec- Models, decision support sys-
101, 103 activity across that region. tronic keyboard. 150 tem (DSS) using, 463
purchasing desktop com- 304 Millipede, 224 Modem: Communications
puter and, 281–82 MICR (magnetic-ink character Miniature hard disk, 227 device that converts a com-
purchasing notebook com- recognition): Technology Miniature mobile storage puter’s digital signals to
puter and, 288 that reads text printed with media, 235–37 analog signals. Also called a
RAM. See RAM magnetized ink. 179. See Mini disc, digital cameras dial-up modem. 8, 297,
read-only. See Read-only also Magnetic-ink character using, 175 313–16
memory recognition Mirroring, 474 cable, 52, 314
role of, 135 MICR reader: Reading device MIS, 462. See also dial-up, 313–14
ROM. See Read-only memory that converts MICR charac- Management information digital, 312, 314
sizes, 142 ters into a form that a com- system (MIS) DSL, 311–12, 314
types of, 142 puter can process. 179, 180 MIS (management information fax, 194
virtual, 255 Microfiche: A small sheet of system) manager, 480 Internet access using,
volatile, 142, 144 film, usually about 4 inches MITS, Inc., 38 51, 53
Memory cache: Cache that by 6 inches in size, on which MMOG. See Massively multi- ISDN, 311, 314
helps speed the processes of microscopic images of docu- player online game PC Card, 314
a computer by storing fre- ments are stored. 238 MMS, 298. See also Multimedia port, 149
quently used instructions Microfilm: A roll of film, usu- message service purchasing desktop com-
and data. 144–45 ally 100 to 215 feet long, on Mobile computer: Personal puter and, 282
Memory cards, 7 which microscopic images computer that a user can surge protection and, 375
Memory management: of documents are stored. carry from place to place. wireless, 52, 314
Operating system activity 238 14–15 Modula-2, 431
that optimizes the use of Microphone, 6 purchasing, 279–80, 292–93 Modulate/modulation, 313
random access memory input using, 173 Mobile device: Computing Monitor: Display device that is
(RAM). 255 purchasing desktop com- device small enough for a packaged as a separate
Memory module: Small circuit puter and, 282, 284 user to hold in his or her peripheral. 7, 183–86
board that houses RAM purchasing Tablet PC and, hand. 14, 15–16, 152–53 CRT. See CRT monitor
chips and is held in a mem- 291 display device, 183 flat-panel, 184
ory slot on the mother- sound card and, 147 flash memory and, 145, 148 gas plasma, 185
board. 144 video conference using, 176 GPS capability, 301 purchasing desktop com-
Memory resident, 252, 253 Microprocessor: Term used by input devices, 172, 174–75 puter and, 282, 284
Memory slots: Slots on the some computer and chip Internet access, 309 purchasing notebook com-
motherboard that hold manufacturers to refer to a LCD screens, 184 puter and, 287
memory modules.144 processor chip for a per- operating system, 251 Monochrome, 184
sonal computer. 137. See also PC Card modem, 314 Moore, Gordon, 157
Processor PDA. See PDA (personal Moore’s Law, 157
digital assistant) Morphing, 217
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 16
IND 16 INDEX
Motherboard: Main circuit like a copy machine but Net: Short for Internet. security and, 258, 368,
board of the system unit, provides the functionality Worldwide collection of Network architecture, 305–6
which has some electronic of a printer, scanner, copy networks that connects mil- Network attached storage
components attached to it machine, and perhaps a fax lions of businesses, govern-
and others built into it. See machine. Also called an all- ment agencies, educational (NAS): Server that is placed
also system board. 7, 135, in-one device. 194 institutions, and individu- on a network with the sole
136. See also System board Multimedia: Any application als. 50. See also Internet. purpose of providing stor-
that combines text, graph- age to users and informa-
memory slots on, 144 ics, animation, audio, video, .NET, 45, 428, 469 tion systems attached to the
Motorola processor, 139 and/or virtual reality. 21, Netiquette: Short for Internet network. 474, 476
Mouse: Pointing device that 64–66 Network attacks, 364–68
adding to Web pages, 434 etiquette, the code of Network card: Adapter card,
fits comfortably under the application software and, acceptable behaviors users PC Card, ExpressCard
palm of a user’s hand.6, 169 112–14 should follow while on the module, USB network
connections, 169 RAM needs, 144 Internet. 73 adapter, or flash card that
creator of, 199 Multimedia authoring Netscape Navigator, 41 enables the computer or
manufacturer, 199 software: Software that Netscape Communications device that does not have
operations, 240 allows users to combine text, Corporation, 41, 57 networking capability to
purchasing desktop com- graphics, audio, video, and NetWare, 266 access a network. Also
puter and, 283, 284 animation in an interactive Network: Collection of com- called a network interface
repetitive strain injuries and, application and that often is puters and devices con- card (NIC). 315
385 used for computer-based nected together, often purchasing desktop com-
types, 169 training and Web-based pre- wirelessly, via communica- puter and, 283
using, 103, 169 sentations. 114, 437 tions devices and transmis- purchasing notebook com-
Mouse operations, 240 Multimedia message service sion media, allowing puter and, 288
Mouse pad: Rectangular rub- (MMS), 298. See also Picture computers to share Network forensics, 385. See also
ber or foam pad that pro- messaging resources. 8–10, 303–9 Computer forensics
vides traction for a Multiprocessing, 255 access control, 371 Network operating system
mechanical mouse. 169 Multipurpose operating sys- attacks, 364–68 (NOS): Operating system
Mouse pointer, 169 tem, 266 bus, 306 that organizes and coordi-
Movies, digital, 195 Music, 64 business, 8 nates how multiple users
Moving Pictures Experts computers and, 400 cable television, 314 access and share resources
Group (MPEG), 65 downloading, 64, 400 cellular telephone, 321 on a network. 257, 266. See
Mozilla, 48 input, 173 client/server, 305 also Network OS
MP, 175 MIDI port and, 150 communications standards, Network OS: 257. See also
MP3: Format that reduces an See also Audio; MIDI; MP3 308–9 Network operating system
audio file to about one-tenth Multisession disc, 232 cyberterrorism and, 363 peer-to-peer network, 305
of its original size, while Multitasking operating system, data accessibility on, 476 user access and, 369
preserving much of the 253, 264, 267 extranet and, 469 Network server, 305
original quality of the Multiuser, 255 file sharing, 306 Network specialist: Person
sound. 64 Muscle fatigue, 386 firewalls, 367–68 who installs, configures,
downloading files, 472 Music groupware and, 302 and troubleshoots network
swapping files via the Web downloading from Web, 472 home, 316–17, systems; manages system
and, 306 purchasing online, 472 host, 50 and client software, Web
MP3 players swapping, 306, 378 Internet. See Internet page integration and cre-
flash memory and, 145 Music players, storage media intranet, 307 ation, network security
storage capacity, 145 for, 236 local area. See Local area measures, and user
USB 2.0 ports and, 149 Musical Instrument Digital network (LAN) accounting; and monitors
See also Digital music players Interface (MIDI), 150, 173 metropolitan area (MAN), 304 network event logs for
MPEG, 65. See also Moving .NET architecture and. See problem resolution. 322
Pictures Experts Group Name .NET Network standard: Guidelines
MP4: Popular video compres- file. See File name peer-to-peer, 305–6 that specify the way com-
sion standard. 65 field. See Field name purchasing notebook com- puters access the medium
MRAM, 144. See also puter and, 288 to which they are attached,
Magnetoresistive RAM Names ring, 307 the type(s) of medium used,
MRP, 459. See also Material mailing lists, 71 security, 258 the speeds used on different
Requirements Planning user, 70 star, 307 types of networks, and the
(MRP) storage area (SAN), 475, 476 type(s) of physical cable
MS-DOS, 262 Nanosecond (ns): One bil- telephone, 310–12 and/or the wireless technol-
MSN. See Microsoft Network, lionth of a second. 146 topologies, 306–7 ogy used. 308
The value-added (VAN), 303 Network topology: Layout of
MSBlast worm, 46 Napster, 43 virtual private (VPN), 470 computers and devices in a
MT/ST. See Magnetic NAS, 474. See also Network wide area (WAN), 304 communications network.
Tape/Selectric Typewriter wireless LAN, 303 306–7
Multi-core processor: Chip attached storage (NAS) Network administrator: News, Web and, 472
with two or more separate National Digital Information Employee who installs, con- News Web site, 61, 91
processors. 139 figures, and maintains Newsgroup: Online area in
Multidimensional database: Infrastructure & LANs, WANs, intranets, which users have written
Database that stores data in Preservation Program, 352 and Internet systems; iden- discussions about a particu-
dimensions. 347, 349 National ISP, 52 tifies and resolves connec- lar subject. 71, 121
Multifunction peripheral: National Press Photographers tivity issues. 257 communications uses and, 298
Output device that looks Association, 378 intrusion detection and, 368
Navigation, using GPS. See
Global positioning system
(GPS)
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 17
INDEX IND 17
spam and, 382 only numeric data in a field. Online banking: Online con- tor system performance,
Newspapers, online, 25 339 nection to a bank’s com- and 3) assess system secu-
Newsreaders, 71, 121 Numeric data type, 335 puter to access account rity. 422
Nit, 185 Numeric keypad, 168 balances, pay bills, and Operating system (OS): Set of
Node, 303, 307 copy monthly transactions programs that coordinates
Noise: Electrical disturbance Object, 427 to a user’s computer. 23, all the activities among
possessed, 370, 371 116, 472 computer hardware
that can degrade communi- devices. 11, 251–71
cations. 319 Object (database): Database Online dating, 19 application software and,
Nonimpact printer: Type of item that contains data, as Online Help: Electronic equiv- 101, 252
printer that forms charac- well as the actions that read booting and, 252
ters and graphics on a piece or process the data. 349 alent of a user manual that client, 262
of paper without actually usually is integrated in a device configuration, 256
striking the paper. 189–92 Object code: See Object program. 122–23 embedded, 266
Nonmanagement employees, program Online investing: Use of a file management, 257, 259
455 computer to buy and sell functions of, 251, 252–58
Nonprocedural language: Object data type, 335 stocks and bonds online, handheld computers, 252, 266
Type of programming lan- Object program, 425 without using a broker. 23, Internet connection and, 256
guage in which a program- Object query language (OQL), 472 job scheduling, 255–56
mer writes English-like Online meeting, 302 managing programs, 253–55
instructions or interacts 384 Online service provider: memory and, 142, 143
with a graphical environ- Object-oriented database Company that provides multiprocessing, 255
ment to retrieve data from Internet access as well as multipurpose, 266
files or a database. 430 (OODB): Database that many members-only fea- multitasking, 253, 264, 265, 266
Nonresident, 252 stores data in objects. 347, tures. 52 multiuser, 255
Nonvolatile memory: Type of 349 subscribing to, 285 network, 257, 266, 305
memory that does not lose its Object-oriented programming Online shopping, 90, 381, 470 PDAs, 266, 292
contents when a computer’s (OOP) language: Online social network: Web performance monitoring, 257
power is turned off. 142, 145 Programming language sites that encourage mem- personal firewall and, 260, 368
Norton AntiVirus, 268 used to implement an bers to share their interests, purchasing desktop com-
Norton SystemWorks, 270 object-oriented design. ideas, stories, and videos puter and, 281
Notebook computer: Portable, 427–29 with other registered users. RAM and, 143
personal computer Object-relational databases, 347 63. See also social network- security and, 257, 258
designed to fit on a user’s Obscenity, Internet and, 384 ing Web site stand-alone, 262–65
lap. 14–15, 21 Observation, system develop- Online storage: Service on the types of, 14, 262–65
converting to Tablet PC, 288 ment and, 410 Web that provides hard user interface and, 253
display device, 184 OCR, 177. See also Optical disk storage to computer utility programs, 250, 259–61
floppy disk drive in, 223 character recognition users, for free or for a mini- See also Platform
hard disk in, 224 OCR devices: Optical charac- mal monthly fee. 226, 261, Operational feasibility, 409
keyboards, 168 ter recognition devices that 375. See also Internet hard Operational management, 455
PC Cards, 235 include small optical scan- drive Optical character recognition
pointing stick, 170 ners for reading characters Online trading: Online con- (OCR): Optical reader
power supply, 152 and sophisticated software nection that allows users to technology that involves
printing from, 192 to analyze what is read. 177 invest in stocks, options, reading typewritten,
processors, 139 Office automation. See Office bonds, treasuries, certifi- computer-printed, or hand-
purchasing, 279–80, 287–89 information system (OIS) cates of deposit, money printed characters from
sales force using, 460 Office information system markets, annuities, mutual ordinary documents and
storage media, 223, 236 (OIS): Information system fund, and so on — without translating the images to a
system unit, 134 that enables employees to using a broker. 472 form that a computer can
theft of, 371 perform tasks using com- Online transaction processing process. 177
touchpads, 170 puters and other electronic (OLTP), 461 Optical discs: Type of storage
Notepad, in personal informa- devices, instead of manu- On-screen keyboard, 174, 197 medium that consists of a
tion manager, 110 ally. Also called office OODB, 349. See also Object- flat, round, portable disc
Note taking software: automation. 461 oriented database (OODB) made of metal, plastic, and
Application software that Offsite, 375 OOP language, 427. See also lacquer that is written on
enables users to enter typed OIS, 461. See also Office Object-oriented program- and read by a laser. 229–34
text, handwritten com- information system (OIS) ming (OOP) language characteristics of, 229
ments, drawings, or OLTP, 462. See also Online Open (Information Systems), cleaning, 231
sketches anywhere on a transaction processing 478 paper disks, 233
page. 110 (OLTP) Open Source Code software, Optical fiber, 320
Noyce, Robert, 157 OMR, 177. See also Optical 43 Optical mark recognition
NS, 146. See also Nanosecond mark recognition Open source software: (OMR): Optical reader
Number systems, coding sys- Online: Describes the state of Software provided for use, technology that reads hand-
tems and, 140–41 a computer when it is con- modification, and redistrib- drawn marks such as small
Numbers nected to a network. 8 ution. 101, 265, 267, 271 circles or rectangles. 177
check digit, 340 Online auction: E-commerce Opening Adobe PDF files, 113 Optical mouse: Mouse that
input of, 168 method that allows con- Operation, support, and secu- uses devices, such as optical
range check, 340 sumers to bid on an item rity phase: Phase of system sensors or lasers, that emit
used in worksheets, 107 being sold by someone else. development cycle that and sense light to detect the
Numeric check: Validity check 68, 88 consists of three major mouse’s movement. 169
that ensures users enter Online backup service: Web activities: 1) perform main-
site that automatically tenance activities, 2) moni-
backs up files to its online
location, usually charging a
monthly or annual fee. 375
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 18
IND 18 INDEX
Optical reader, 177 and other graphical images attachments, add live controlled by the processor
Optical scanner, 177. See also with various onscreen tools. images to instant messages, in the computer. 147
113. See also Illustration broadcast live images over Perl: Practical Extraction and
Scanner software the Internet, and make Report Language. Scripting
Optical storage medium. See personal, 118 video telephone calls. language developed at
professional, 113 6, 176 NASA’s Jet Propulsion
CD (compact disc); DVD starting, 102, 103 purchasing desktop com- Laboratory as a procedural
(digital versatile disc or dig- Palm, 199 puter and, 283 language similar to C and
ital video disc) palmOne, 199 purchasing Tablet PC and, C++. 435
OQO handlheld computer, 48 PalmPilot, 41 291 Perpendicular recording: Data
Oracle Corporation, 353 Palm OS, 266, 292, 293 PC-compatible, 14 storage technique in which
Organizational structure, of an Paper PC-DOS, 262 hard disks align magnetic
enterprise, 454–56 ink-jet printer, 189 PCMCIA, 147. See also Personal particles vertically, making
Organized information, 334 laser printer, 190 Computer Memory Card much greater storage capac-
Organizing, 456 wasting, 387 International Association ities possible. 223
OS, 251. See also Operating Parallel conversion: PCS, 321. See also Personal Personal Communications
system (OS) Conversion strategy where Communications Services Services (PCS): Term used
OSP. See Online service the old system runs along- (PCS) by the U.S. Federal
provider side the new system for a PC-to-TV port, 288 Communications
Ousterhout, John, 435 specified time. 421 PDA (personal digital assis- Commission (FCC) to iden-
Outlook, 69 Parallel port: Type of interface tant): One of the more pop- tify all wireless digital com-
Outlook Express, 69 that connects devices to the ular lightweight mobile munications. 321
Output: Data that has been system unit by transferring devices in use today, pro- Personal computer: Computer
processed into a useful more than one bit at a time. viding personal organizer that can perform all of its
form. 182, 183–99 149 functions such as a calen- input, processing, output,
design, 418–19 Parent, 375 dar, appointment book, and storage activities by
ethics of altering, 378 Parents, content filtering by, address book, calculator, itself and contains a proces-
voice, 194 384 and notepad. 15, 41. See also sor, memory, one or more
See also Output device Parker, Donn, 389 Personal digital assistant input and output devices,
Output device: Any hardware Partial backup, 478. See also flash memory cards, 148 and storage devices. 14
component that conveys Selective backup input, 172, 174 buying, 144
information to one or more Pascal, 431 Internet access, 52, 436 cache, 144–45
people. 7, 182–96 Password: Private combination operating system, 266, 292 desktop. See Desktop
audio, 193 of characters associated Palm devices, 199 computer
data projector, 195, 289 with a user name that picture messaging using, 298 entertainment and, 398
display. See Display device allows access to certain printing from, 192 notebook. See Notebook
fax machine, 194 computer resources. 258, purchasing, 279–80, 292–94 computer
headsets, 194 369 sales force using, 460 price of, 144
multifunction peripheral, 194 cookies and, 381 screens, 184 processor, 139
physically challenged users, encrypted data and, 373 software for, 110 purchasing, 144, 279–81
197 guidelines, 258 storage media for, 236 transferring information
printers, 187–93 hackers and, 369 stylus, 172, 174 between PDA and, 110
purchasing desktop com- notebook computers and, 371 system unit, 135 transferring pictures from
puter and, 281 Pasting, 106 text messaging using, 298 digital camera into, 118
speakers, 193 Payload: Destructive event or PDF: Portable Document Personal computer mainte-
Outsource (software develop- prank a malicious-logic pro- Format. A popular file for- nance utility: Utility pro-
ment): Having a source gram is intended to deliver. mat used by document man- gram that identifies and
outside a company develop 364 agement software to save fixes operating system
software for the company. Payments converted documents. 111 problems, detects and
Some companies outsource online banking used to make, Peer, 305 repairs disk problems, and
just the software develop- 472 Peer-to-peer network: Simple, includes the capability of
ment aspect of their IT PC camera, 176. See also PC inexpensive network that improving a computer’s
operation, while others out- video camera typically connects fewer performance. 122, 270
source more or all of their PC Card: Thin, credit-card- than 10 computers. 305–6 Personal Computer Memory
IT operation. 415 sized removable flash mem- Pen drive, 236. See also USB Card International
Outsourcing (storage), 477 ory device used primarily flash drive Association (PCMCIA), 147
today to enable notebook Pen input: Input device used Personal computer
P2P: Type of peer-to-peer net- computers to access the by mobile users to write, salesperson, 26
work on which users access Internet wirelessly. 148, 235 draw, and tap on a flat sur- Personal digital assistant, 15.
each other’s hard disks and PC Card modem, 314 face to enter input. 172 See also PDA
exchange files directly over PC Card slot: Special type of Pentium, 40, 42, 44, 45, 139 Personal DTP (desktop
the Internet. 306. See also expansion slot in desktop, Performance monitor (operat- publishing) software:
File sharing network notebook, and other mobile ing system): Operating sys- Application software that
computers that can hold a tem program that assesses helps home and small
Packaged software: Mass- PC Card. 148 and reports information office/ home office users
produced, copyrighted, PC video camera: Type of digi- about various computer create newsletters,
prewritten software avail- tal video camera that resources and devices. 257 brochures, advertisements,
able for purchase. 101, 415 enables a home or small Performance monitoring (sys- postcards, greeting cards,
business user to capture tem development), 422 letterhead, business cards,
Packets, 308 video and still images, send Peripheral: Device that con- banners, calendars, logos,
Paging, 255 e-mail messages with video nects to a system unit and is and Web pages. 117
Paint program, starting, 102, 103
Paint software: Application
software that allows users
to draw pictures, shapes,
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 19
INDEX IND 19
Personal finance software: looking e-mail that attempts Pixilated, 212 mouse, 169
Simplified accounting pro- to obtain your personal and PKZIP, 269 physically-challenged users,
gram that helps home users financial information. 48, Plaintext, 373
or small office/home office 381–82 Planning, 456 197
users manage finances. 116 Phoneline network, 316 pointing stick, 170
Photo community, 175, 177 project management and, purchasing notebook com-
Personal firewall: Utility that Photo printer: Type of nonim- 408–9
detects and protects a per- pact color printer that pro- puter and, 288
sonal computer and its data duces photo-lab-quality Planning phase: Step in the stylus, 172, 174
from unauthorized intru- pictures. 190 system development cycle touch screen, 171
sions. 260, 368, 379 storage media for, 236 that begins when a steering touchpad, 170
Photographs, 64 committee receives a project trackball, 170
Personal identification number altering, 378 request. 406, 411, 412–13, wheel, 171
(PIN), ATM, 180 clip art, 105 422 Pointing stick: Pressure-
editing, 118
Personal identification personal DTP software, 117 Plasma monitor: Display sensitive pointing device
number (PIN), user: Picture CDs and, 232 device that uses gas plasma shaped like a pencil eraser
Numeric password, either PHP: PHP: Hypertext technology, which sand- that is positioned between
assigned by a company or Preprocessor. Free, open wiches a layer of gas keys on a keyboard and
selected by a user. 370 source scripting language. between two glass plates. moved by pushing the
435 185 pointing stick with a finger.
Personal identity, theft of, Physical transmission media, 170
379–82 319–20 Platform, 252 Policy
Physically challenged users Platter, 224, 225, 226 acceptable use. See
Personal information, safe- input devices for, 197 Player: Software used by a Acceptable use policy
guarding, 379 output devices for, 197 (AUP)
PictBridge: Standard technol- person to listen to an audio employee monitoring, 384
Personal information ogy that allows you to print file on a computer. 64 software installation and use,
manager (PIM): pictures directly from a dig- PL/1, 431 372
Application software that ital camera by connecting a Plotters: Sophisticated printers Pop-up blocker: Filtering pro-
includes features to help cable from the digital cam- that produce high-quality gram that stops pop-up ads
users organize personal era to a USB port on the drawings such as blue- from displaying on Web
information. 110 printer. 190 prints, maps, and circuit pages. 122, 269
Picture CD: Single-session CD- diagrams using a row of Port: Point at which a periph-
Personal paint/image editing ROM that stores digital ver- charged wires (called styli) eral attaches to or commu-
software: Application soft- sions of film using a jpg file to draw an electrostatic pat- nicates with a system unit
ware that provides an easy- format. 232 tern on specially coated so it can send data to or
to-use interface, usually Picture messaging: Wireless paper and then fuse toner receive information from
with more simplified capa- messaging service that to the pattern. 192 the computer. 136, 148–50
bilities that allows users to allows users to send graph- Plug and Play: Technology Bluetooth, 150
draw pictures, shapes, and ics, pictures, and sound that gives a computer the COM, 149
other images. 118 files, as well as short text capability to configure FireWire, 150
messages to a phone, PDA, adapter cards and other IrDA, 150
Personal photo editing soft- or computer. 299. See also peripherals automatically as LCD monitor, 185
ware: Application software Multimedia message serv- a user installs them. 256 MIDI, 150
that allows users to edit dig- ice (MMS). Plug-in: Program that extends parallel, 149, 150
ital photographs by remov- Pictures the capability of a browser; purchasing desktop com-
ing red-eye, erasing scanning, 177 often used to enhance mul- puter and, 281
blemishes, restoring aged Pie chart, 108 timedia. 66 purchasing notebook com-
photos, creating special PILOT, 431 Pocket hard drive: Self- puter and, 288
effects, or creating electronic Pilot conversion: Conversion contained unit that you SCSI, 150
photo albums. 118, 175 strategy where only one insert in and remove from serial, 149, 150
location in a company uses a slot or USB port in a USB, 149–50
Personal use, software for, a new system — so it can be device or computer. 226 Portable (storage medium),
115–20 tested. 421 Pocket PC, 266 222
PIM. See Personal information Podcast: Recorded audio, usu- Portable computer. See
Personal Web site, 63 manager ally an MP3 file, stored on a Notebook computer
PGP, 374. See also Pretty Good PIN, 180, 370. See also Personal Web site that can be down- Portal: Web site that offers a
identification number loaded to a computer or a variety of Internet services
Privacy (PGP) (PIN) portable media player such from a single, convenient
Pharmacies, online, 472 Piracy: Unauthorized and ille- as an iPod. 10, 64 location. 61, 467
Pharming: Scam where a per- gal duplication of copy- Point, 106 broadband and, 319
righted material. 372 Point of sale (POS), 180 POS, 180. See also Point of sale
petrator attempts to obtain software, 372, 378 Pointer: Small symbol dis- POS terminal: Terminal used
a user’s personal and finan- Pixel: The smallest element in played on a computer by retail stores to record
cial information via spoof- an electronic image. Short screen whose location and purchases, process credit or
ing. 382 for picture element. 176, 185 shape changes as a user debit cards, and update
Phased conversion: CRT monitor, 186 moves a pointing device. inventory. 180
Conversion strategy used digital camera and, 175 103, 167, 197 Possessed object, 370, 371
by larger systems with mul- distance between, 185 Pointing device: Input device Post-implementation system
tiple sites where each loca- Pixel pitch, 185 that allows a user to control review, 422
tion converts at a separate a pointer on the screen. Posture, 386
time. 421 167–72 Power
Phases: Categories into which digital pen, 172, 175 flat-panel monitor use of, 185
system development activi- joystick, 171
ties are grouped: (1) plan- light pen, 171
ning phase, (2) analysis
phase, (3) design phase,
(4) implementation phase,
and (5) support phase.
406–22
Phishing: Scam in which a
perpetrator sends an official
C6194_Index_pp2.qxd 2/2/07 4:47 PM Page 20
IND 20 INDEX
problems with, 374–75 Print: Placing the copy of a puter. Also called CPU or low-level, 424–25
saving, 387 document on paper or some central processing unit. 7, machine-dependent, 424
PowerBuilder: Powerful pro- other medium. 106 137–39. See also Central object-oriented, 427–29
processing unit (CPU) other, 430–31
gram development tool Print server, 305 purchasing desktop com- procedural, 425–26
developed by Sybase that is Print spooler, 256 puter and, 281, 283 visual, 428–29
best suited for Web-based Printer: Output device that purchasing notebook com- Programming team: A group
and large-scale enterprise puter and, 288
object-oriented applications. produces text and graphics Product activation: Process of programmers that may
429 on a physical medium such that attempts to prevent develop programs during
Power Macintosh, processor as paper or transparency software piracy by requir- the program development
in, 139 film. 7, 187–93 ing users to provide a soft- cycle. 439
Power supply: Component of dot-matrix, 192 ware product’s 25-character Project leader: Member of a
the system unit that converts impact, 192–93 identification number project team who manages
wall outlet AC power to the ink-jet, 189–90 in order to receive an and controls the budget and
DC power that is used by a large-format, 192 installation identification schedule of the project. 408
computer. 136, 152 laser, 190–91 number. 373 Project management: Process
CMOS, 146 line, 193 Product design, software for, of planning, scheduling,
notebook computers, 152 mobile, 192 459 and then controlling the
RAM and, 143, 144 nonimpact, 189–92 Production, manufacturing activities during the system
Power user: User who requires parallel ports, 149 enterprise and, 459 development cycle. 408–9
the capabilities of a work- photo, 190 Professional photo editing Project management software
station or other powerful plotters, 192 software: Image editing (users): Application software
computer, typically work- purchasing desktop com- software that allows pho- that allows a user to plan,
ing with multimedia appli- puter and, 283, 284 tographers, videographers, schedule, track, and analyze
cations and using storage media for, 236 engineers, scientists, and the events, resources, and
industry-specific software. thermal, 191 other high-volume digital costs of a project. 111
18, 21 Printer sharing, Internet con- photo users to edit and cus- Project plan, 409
input devices for, 196 nection and, 379 tomize digital photos. 113 Project request: Written, for-
output devices, 192, 196 Printing Profile, electronic, 380 mal request for a new or
printers, 192 database report, 346 Program: Series of instructions modified system. Also
processor selection, 154 digital images, 175 that tells a computer what called a request for system
storage and, 220–21, 239 pictures from Picture CD, 232 to do and how to do it. Also services. 411. See also
UNIX and, 264 process of, 106 called software. 10 Request for system services
Powerline cable network, 316 screen display and, 103 background, 254, 255 Project team: Group of people
PowerPC G4, 139 spooling and, 256 backup of, 223, 374–75 that consists of users, the
PowerPC G5, 139 Privacy designing, 419 systems analyst, and other
Practical Extraction and brain fingerprinting and, 385 development tools, 431–32 IT professionals. 408
Report Language, 435. See disadvantage in computers, 5 foreground, 254–255 preliminary investigation
also Perl consumer, 461 kernel managing, 252 and, 414
Preliminary investigation: employee monitoring and, Program development cycle: Projector, data, 195, 289
Investigation that deter- 120, 384 Series of steps programmers Prolog, 431
mines the exact nature of a information, 379–85 use to build computer pro- Proprietary (Information sys-
problem or improvement laws, 382–83 grams, consisting of six tems), 478. See also Closed
and decides whether it is medical records and, 239 steps: (1) analyze require- (Information systems)
worth pursuing. Also called Procedural language: Type of ments, (2) design solution, Protocol, Internet address, 53,
feasibility study. 413–14. See programming language in (3) validate design, (4) 54
also Feasibility study which a programmer writes implement design, (5) test Prototype: Working model of a
Presentation graphics soft- instructions that tell the solution, and (6) document proposed system. 419
ware: Application software computer what to accom- solution. 420, 438–42 Proxy server, 368
that allows a user to create plish and how to do it using Program development tools: Pruning, 217
visual aids for presentations a series of English-like Program that provides a PSTN, 310. See also Public
to communicate ideas, mes- words to write instructions. VPE or user-friendly envi- switched telephone net-
sages, and other informa- Often called a third-genera- ronment for building pro- work (PSTN)
tion to a group. 11, 109 tion language (3GL). grams. 427–32 Public switched telephone net-
Presentations 425–26. See also Third- Program specification package, work (PSTN), 310
developing using presenta- generation language (3GL) 419 Public-domain software: Free
tion graphics software, 109 Procedure, 456 Programmer: Person who software that has been
multimedia, 114 backup, 478 writes and modifies com- donated for public use and
Pretty Good Privacy (PGP): Process (enterprise), workflow puter programs. Also called has no copyright restric-
Popular e-mail encryption and, 469 a developer. 12, 423, 442 tions. 101
program that is free for per- Processing career as, 442 Publishing entities, content
sonal, noncommercial use. batch, 461 layout chart for, 419 management systems and,
374 electronic data interchange program development cycle 466
Price (EDI) and, 468 and, 438–39Programming Publishing, computers used in,
of personal computers, 144 grid computing and, 478 learning, 432 25
scanned items and, 178 multi-, 255 Programming language: Set of Publish, 10
Primary key: Field in a data- online transaction (OLTP), 462 words, symbols, and codes Purchasing
base that uniquely identifies Processor: Electronic compo- that enables a programmer desktop computer, 281–87
each record in a file. Also nent on a computer’s moth- to communicate instruc- mobile device, 292–94
called key field. 336. See also erboard that interprets and tions to a computer. 423–37 notebook computer, 287–89
Key field carries out the basic instruc- personal computer, 279–81
tions that operate the com-
C6194_Index_pp2.qxd 2/2/07 4:48 PM Page 21
INDEX IND 21
processors, 139 143–45. See also Main Redundant array of Report writer, 346, 432. See also
tablet PC, 290–91 memory; Primary storage independent disks, 474. See Report generator
Pure Tablet PCs, 290 access times, 146 also RAID (redundant array
booting computer and, 252 of independent disks) Request for information (RFI),
QBE, 345. See also Query by operating system managing, 416, 417
example 255 Redundant components:
purchasing desktop com- Components used so that a Request for proposal (RFP),
QUALCOMM, 323 puter and, 281, 283 functioning computer can 416, 417
Quality review, 419 system files loaded into, 252 take over automatically the
Quarantine: Separate area of a types of, 144 tasks of a similar compo- Request for quotation (RFQ),
Random access memory nent that fails. 477 416, 417
hard disk that holds the (RAM), 143–45. See also
infected file until a virus RAM Redundant data, 341, 342 Request for system services,
can be removed. 366 Range check: Validity check Reference software: 411. See also Project request
Queue: Lineup of multiple that determines whether a
print jobs within a buffer. number is within a speci- Application software that Requirements analysis, during
256 fied range. 340 provides valuable and program development, 439
Query: Request for specific Rapid application thorough information for all
data from a database. 109, development, 428. See also individuals. 119 Research
344, 348, 349 RAD Refresh rate, 186 in design phase, 416
Query by example (QBE): Reading: Process of transfer- CRT monitor, 186 market, 460
DBMS feature that has a ring data, instructions, and Regional ISP, 52 for system development, 410
graphical user interface to information from a storage Relation: Term used by devel- Web site, 96
assist users with retrieving medium into memory. 222 opers of relational data-
data. 345 CD-R, 232 bases for file. 347 Research in Motion (RIM), 271
Query language: Language CD-ROM, 231 Relational database: Database Reset button, restarting com-
used with databases that CD-RW, 232 that stores data in tables
consists of simple, English- direct access and, 235 that consist of rows and puter using, 252
like statements that allows floppy disk, 223, columns, with each row Resolution: The number of
users to specify the data to hard disk, 224 having a primary key and
display, print, or store. 344, Read-only memory (ROM): each column having a horizontal and vertical pix-
348, 349, 430 Type of nonvolatile memory unique name. 347–48, 353 els in a display device. 176
Questionnaire, for system that is used to store perma- Relationship: Connection CRT monitor, 186
development, 410 nent data and instructions. within data in a database. ink-jet printers, 189
145 348 LCD displays, 185
RAD: Rapid application devel- access times, 146 logical, 340 Resources, 8
opment. Method of devel- Read/write head, 224, 225, 226 Reliability of computers, 5 Web site, 87
oping software in which a hard disk, 224, 225, 226 Removable disk drives, Resources (enterprise)
programmer writes and Real time: Describes users and backup using, 375 coordinating and controlling,
implements a program in the people with whom they Removable hard disk: Hard 456
segments instead of waiting are conversing being online disk that can be inserted Response time, 185
until an entire program is at the same time. 71 and removed from a drive. Restarting a computer, 252
completed. 427, 429. See also RealOne Player, 64 226 Restore: To copy backed up
Rapid application Recalculation, in spreadsheets, Repetition control structure: files by copying them to
development 108 Type of control structure their original location on
Receiving device: Device that that enables a program to the computer. 375
Radiation, display devices and, accepts the transmission of perform one or more Restore program: Program
186 data, instructions, or infor- actions repeatedly as long that reverses the backup
mation. 296, 306 as a certain condition is process and returns backed
Radio, broadcast, 321 Record: Group of related fields met. See also loop. 441–42 up files to their original
Radio frequency in a database . 108, 336 Repetitive strain injury (RSI): form. 261
adding, 336 Injury or disorder of the REstructured eXtended
identification, 178–79, 309. changing, 338 muscles, nerves, tendons, lig- eXecutor, 435. See Rexx
See also RFID deleting, 338–9 aments, and joints. 168, 385 Retailers
Radio waves Recording, audio and video, government standards and, See E-tail
Bluetooth and, 309 399 169 Review, post-implementation
microwave, 321 Recording Industry Association Replace, 105 system, 422
RAID (redundant array of of America (RIAA), 46 Report Revolutions per minute (rpm),
independent disks): Recovery disk (boot), 268. See database, 108, 346 226
Redundant array of inde- also Boot disk decision support system and, Rexx: REstructured eXtended
pendent disks. Group of Recovery plan, 479 463 eXecutor. Procedural inter-
two or more integrated Recovery utility: DBMS fea- feasibility, 414 preted scripting language
hard disks that acts like a ture that uses logs and/or management information for both professional pro-
single large hard disk. 226, backups to restore a data- system and, 462–63 grammers and nontechnical
474 base when it becomes dam- Report generator: DBMS fea- users. 435. See also
RAM (random access aged or destroyed. 346 ture that allows users to REstructured eXtended
memory): Type of memory Recycling design a report on the eXecutor
that can be read from and computer equipment, 387 screen, retrieve data into the RFI, 416, 417. See also Request
written to by the processor toner cartridges, 191 report design, and then dis- for information (RFI)
and other devices. Red Hat, 271 play or print the report. RFID: Short for radio fre-
Programs and data are Redundancy, 477 Also called a report writer. quency identification; stan-
loaded into RAM from stor- 346. See also Report writer dard, specifically a
age devices such as a hard Report Program Generator, protocol, that defines how a
disk and remain in RAM as 430. See also RPG network uses radio signals
long as the computer has to communicate with a tag
continuous power. 142, placed in or attached to
an object, an animal, or a
person. 178–79, 309. See
also Radio frequency iden-
tification
C6194_Index_pp2.qxd 2/2/07 4:48 PM Page 22
IND 22 INDEX
RFID reader: Reading device Satellite peripherals, such as disk Selection control structure:
that reads information on communications, 321–22 drives and printers, can be Type of control structure
an RFID tag via radio GPS and, 301 attached. 150 that tells the program
waves. 178 microwave and, 321 SD, 236. See also Secure which action to take, based
Digital on a certain condition. 440
RFID tags, 47 Satellite companies Seagate Technology, 241
RFP, 416, 417. See also Request Internet structure and, 51 Search engine: Program that Selective backup, 375, 478. See
wireless Internet access, 52 finds Web sites, Web pages, also Partial backup
for proposal (RFP) images, videos, news, and
RFQ, 416, 417. See also Request Satellite modem: Internet con- other information. 57, 58, Sending device: Device that
nection that communicates 60–61 initiates instructions to
for quotation (RFQ) with a satellite dish to 3-D, 61 transmit data, instructions,
RIAA. See Recording Industry provide high-speed Internet databases and, 350 or information. 296, 297, 306
connections via satellite. 52 popular search sites and, 58
Association of America portal link to, 467 Sequence control structure:
Ring network: Type of net- Save: To transfer a document using, 57, 58, 60–61, 96 Type of control structure
from a computer’s memory Search sites, popular, 58 that shows one or more
work topology in which a to a storage medium. 106 Search text: Word or phrase actions following each other
cable forms a closed loop entered in a search engine’s in order. 440
(ring) with all computers Scalability: Measure of how text box to find information
and devices arranged along well computer hardware, on a Web page. 60–61. See Sequential access, 235
the ring. 307 software, or an information also Keywords Serial Advanced Technology
Ripping, 232 system can grow to meeting Search tools, 96
Ritchie, Dennis, 427 increasing performance Search utility: Program that Attachment, 228. See SATA
Robots, 22 demands. 477 attempts to locate a file on Serial port: Type of interface
ROM, 145. See also Read-only your computer based on
memory Scanner: Light-sending input criteria you specify. 259 that connects a device to the
Router: Communications device that reads printed Secondary storage, 221. See system unit by transmitting
device that connects multi- text and graphics and then also Storage medium data one bit at a time. 149,
ple computers or other translates the results into a Sectors, 222 150
routers together and trans- form the computer can floppy disk, 223 Server: Computer that controls
mits data to its correct desti- process. 6, 177–80. See also storing data and, 261 access to the hardware,
nation on a network. 315–16 Optical scanner Secure Digital (SD): Type of software, and other
Routing slip, collaboration miniature mobile storage resources on a network and
and, 302 bar code, 178 medium that is a flash provides a centralized stor-
Row (database): Term used by fingerprint, 181 memory card capable of age area for programs, data,
users of relational databases flatbed, 177 storing between 16 MB and and information. 50, 305.
for record. 108, 347 optical, 177 1 GB of data. 236 See also Host
Row (spreadsheet), 107 purchasing desktop com- Secure site: Web site that uses blade, 477
RPG: Report Program encryption techniques to database, 305, 350
Generator. Developed by puter and, 283 secure its data. 374 dedicated, 305
IBM in the early 1960s to Scanner fraud, 178 Security, 362–76, 389 file, 305
assist businesses in generat- Scenes, 217 backup and, 375, 478 FTP, 71
ing reports. 430. See also Schedule feasibility, 409 biometric devices and, 181 midrange, 16
Report Program Generator School database, 341, 342, 346, 351 network, 305
Rpm, 226. See also Revolutions developing plan, 479 network attached storage,
per minute (rpm) connecting to Internet disaster recovery plan and, 474
RSI, 385. See also Repetitive through, 51 479 network operating system
strain injury (RSI) enterprise storage system on, 266
RSS 2.0: Really Simple content filtering used by, 384 and, 476 print, 305
Syndication. Specification Science, enterprise-wide, 479 processors, 139
that content aggregators use ethics and, 376–78 proxy, 368
to distribute content to sub- computers used in, 24 financial Web sites, 472 Web, 54
scribers. 63, 436 Web site, 93 hardware vandalism and Service plan, purchasing com-
Ruby on Rails: Open source Screen, 186 theft, 371 puter and, 287
framework that provides Screen saver: Utility program information privacy, 379–85 Servlet, 434
technologies for developing information system, 422 Session cookie, 381
object-oriented, database- that causes a display information theft, 373–74 SFA, 460. See also Sales force
driven Web sites. 436 device’s screen to show a Internet and, 389 automation (SFA)
Run: Process of using software. moving image or blank online shopping, 471 Shareware: Copyrighted soft-
12 screen if no mouse activity operating system and, 258 ware that is distributed at no
Russo, Patricia, 323 occurs for a specified time. passwords and, 258 cost for a trial period. 101
261 personal data and, 350 Sharing
Safeguards, 363 Scope, 408 screen savers for, 261 copyrighted music, 114
Sales force automation (SFA): Script, 434 software theft, 372–73, 378 copyrighted videos, 114
Script kiddie: Someone who system failure, 374–75 resources, 8
Software that equips travel- accesses a computer or net- unauthorized access, 368–70 Shipping, distribution systems
ing salespeople with the work illegally with the unauthorized use, 368–70 and, 460
electronic tools they need to intent of destroying data, virtual private network and, Shockley, William, 35
be more productive. 460 stealing information, or 470 Shockwave, 443
SAN, 475. See also Storage area other malicious action but Shopping
network (SAN) does not have the technical e-commerce used for, 68
SanDisk Corporation, 241 skills and knowledge. 362 Shopping bot: Web site that
SATA, 228. See also Serial Scripting language, 434–35 searches the Internet for the
Advanced Technology Scrolling: Process of moving best price on a product or
Attachment different portions of a docu- service. 473
ment on the computer’s
screen into view. 105
SCSI interface, 228
SCSI port: Special high-speed
parallel port to which
C6194_Index_pp2.qxd 2/2/07 4:48 PM Page 23
INDEX IND 23
Shopping cart: Element of an interests, ideas, stories, and Source document, 177 SQL: Query language that
electronic storefront that videos with other registered Source program: Program that allows users to manage,
allows a customer to collect users. 10, 63. See also online update, and retrieve data in
purchases. 68, 470 social network contains the language a relational DBMS. 348, 430.
Social security number, pro- instructions, or code, to be See also Structured Query
cookies and, 381 tecting, 379 converted to machine lan- Language
Short message service (SMS), Society guage. 425–26
computer applications in, Spam: Unsolicited e-mail mes- SRAM, 144. See also Static
298 22–26 sage or newsgroups posting RAM
Shugart, Al, 37, 38, 241 ethics and, 376–78 sent to many recipients or
Signature verification system, Software: Series of instructions newsgroups at once. 48, 73, Stand By, 252
that tells a computer what 268, 379, 382 Stand-alone operating system:
181, 370 to do and how to do it. Also Speakers: Audio output
Single user/multitasking, 253 called a program. 10–13 devices that generate Complete operating system
Single user/single tasking, 253 acquiring in design phase, sound. 7, 193 that works on a desktop
Single-session disc, 231 416 purchasing desktop com- computer, notebook com-
bundled, 281 puter and, 283, 284 puter, or mobile computing
Picture CD, 232 communications, 310 purchasing Tablet PC and, 291 device and that also works
Single-user license agreement, compatibility, 280 Special-purpose terminal, 180 in conjunction with a net-
copyrighted, 378 Speech, 64 work operating system.
372. See also End-user custom, 101, 415 Speech recognition: 262–65. See also Client
license agreement (EULA) development of, 12 Computer’s capability of operating system
Slide show, 109 enterprise, 456–66 distinguishing spoken Stand-alone utility programs,
Small office/home office filtering, 310 words. See also voice 122, 259, 267–70
(SOHO): Describes any illegal copying of, 124 recognition. 173 Standards: Sets of rules and
company with fewer than installing new, 252 Speed procedures a company
50 employees, as well as the license agreement, 372–73 advantage in computers, 5 expects employees to accept
self-employed who work open source, 265, 267, 271 access times, 146 and follow. 407
from home. 18, 20 packaged, 101, 415 bus, 151 Star network: Type of network
input devices, 196 purchasing desktop com- bus width, 151 topology in which all com-
output devices, 190, 196 puter and, 281 cache, 144–45 puters and devices on the
printer, 190 suite, 116 processor, 139 network connect to a central
processor selection, 154 system, 10–11 RAM, 144–45 device, thus forming a star.
storage and, 239 system failure and, 374–75 of storage devices and mem- 307
Web cam, 176 testing, 417 ory, 222 Start button (Windows XP),
Smalltalk, 431 vendors, 417 system clock influence on, 139 starting application using,
Smart card: Card, similar in Software piracy, 372, 378 Spelling checker, 106 103
size to a credit card or Software suite: Collection of Splitting, 217 Starting
ATM card, that stores data individual programs sold as Spoiler, 73 application software, 102,
on a thin microprocessor a single package. Business Spoofing: Technique intruders 103
embedded in the card. 181, software suites typically use to make their network See also Booting
237 include word processing, or Internet transmission Startup instructions, flash
Smart card (biometric): Card spreadsheet, e-mail, and appear legitimate to a victim memory holding, 145
that stores personal biomet- presentation graphics soft- computer or network. 367 Static RAM (SRAM), 144
ric data on a thin micro- ware. 110, 116, 281 safeguards against, 367–68 Steering committee: Decision-
processor embedded in the Software theft: Computer Spooling: Operating system making body in a company.
card. 181 security risk that occurs process that sends print jobs 408
Smart dust, 179 when someone (1) steals to a buffer instead of send- approval by, and, 418
Smart phone: Internet-enabled software media, (2) inten- ing them immediately to implementation phase and,
telephone that usually also tionally erases programs, or the printer. The buffer then 419
provides PDA capabilities. (3) illegally copies a pro- holds the information wait- planning phase and, 412
16, 48 gram. 372–73, 378 ing to print while the preliminary investigation
flash memory and, 145, 148 SOHO, 20. See also Small printer prints from the and, 414
mobile users, 21 office/home office buffer at its own rate of system proposal and, 415
operating system for, 266 Solaris, 266 speed. 256 Stock trading, online, 472
picture messaging and, 298 Son, Masayoshi, 125 Sports, Web site and, 91 Stoll, Clifford, 389
screen on, 184 Sound, 64, 173. See also Audio; Spreadsheet software: Storage, 142, 220–41
storage media for, 225 Microphone; Music; Sound Application software that advantage in computers, 5
text messaging and, 298 card; Speakers allows a user to organize back up and, 261
Web access and, 436 Sound card: Adapter card that data in rows and columns buffer, 255
wireless service provider enhances the sound gener- and to perform calculations clipboard used for, 106
and, 52 ating capabilities of a per- on the data. 11, 107–8 compressed files, 261
SMS (short message service). sonal computer by allowing Spyware: Program placed on a digital cameras using, 175
298. See also Text messaging sound to be input through a computer without the file manager functions, 259
SoBig virus, 46 microphone and output user’s knowledge that grid computing and, 478
Social engineering: Act of gain- through external speakers secretly collects information network attached (NAS),
ing unauthorized access or or headset. 135, 147 about the user. 48, 268, 381 474–476
obtaining confidential infor- MIDI standard, 150 Spyware remover: Program online, 375
mation by taking advantage purchasing desktop com- that detects and deletes RAID and, 474
of the trusting human nature puter and, 283 spyware on a user’s com- saving document and, 106
of some victims and the puter. 122, 268 scalability, 477
naivety of others. 384 storage area network (SAN),
Social networking Web site: 475, 476
Web site that encourages
members to share their
C6194_Index_pp2.qxd 2/2/07 4:48 PM Page 24
IND 24 INDEX
swapping data between Sun, 266 project management, 408–9 a tab (similar to a file folder
memory and, 255 J2EE platform, 469 support phase, 406, 422 tab) for each Web page you
Java and, 41, 443 System failure: Prolonged open. 55
terms, 222 JavaScript, 434 Table: Term used by users of
Storage appliance, 474 malfunction of a computer. relational databases for file.
Storage area network (SAN): Sun StarOffice, 110 374–75 347
Supercomputer: Fastest, most System files Tablet PC: Special type of
High-speed network with uninstalling programs and, 260 notebook computer that
the sole purpose of provid- powerful, and most expen- System proposal: Document resembles a letter-sized
ing storage to other servers sive computer, capable of that assesses the feasibility slate, which allows a user to
to which it is attached. 475, processing more than 100 of each alternative solution write on the screen using a
476 trillion instructions in a sin- and then recommends the digital pen. 15, 135, 153
Storage device: Hardware gle second. 17 most feasible solution for a Tags, 433
used to record (write and/or Support tools, for application project. 415 XML, 436
read) items to and from software, 122–24 System software: Programs Tape: Magnetic Magnetically
storage media. 7, 222 Surfing the Web: Activity of that control or maintain the coated ribbon of plastic
size of, 142 using links to explore the operations of a computer capable of storing large
Storage media: The physical Web. 57 and its devices. 10–11, 101, amounts of data and infor-
material on which a anonymously, 379 250–71 mation at a low cost.
computer keeps data, Surge protector: Device that memory and, 142 234–35, 375
instructions, and uses special electrical com- role of, 101 Tape cartridge, 234
information. 7, 221 ponents to smooth out System unit: Case that contains Tape drive: Device used to
access times, 222 minor noise, provide a sta- the electronic components of read and write data and
capacity, 222 ble current flow, and keep a computer that are used to information on tape. 234
CD, 232 an overvoltage from reach- process data. 7, 134–36 bays and, 151
CD-ROM, 231 ing the computer and other adapter cards, 147–48 Tape library, 234, 476
CD-RW, 232 electronic equipment. Also bays, 151 Tax preparation software:
DVD, 233 called a surge suppressor. buses, 151 Application software that is
DVD+RW, 234 374–75 cleaning, 155 used to guide individuals,
DVD-RW, 234 S-video, 215 connectors, 148–50 families, or small businesses
DVD-ROM, 233 Sybase, 353, 429 data representation and, through the process of filing
floppy disk, 222, 223 Symantec, 389 140–41 federal taxes. 117
hard disk, 224–28 Symbian OS, 267 expansion slots, 147 TB, 142. See also Terabyte.
microfiche, 238 Symbolic address, 425 hard disk in, 224 T-carrier line: Any of several
microfilm, 238 Symbolic instruction codes, memory and, 142–46 types of long-distance digital
miniature mobile, 235–37 424 mobile computers and telephone lines that carry
online storage, 228 Synthesizer, 150 devices, 152–53 multiple signals over a single
optical discs, 229–34 System: Set of components motherboard, 136 communications line. 312
PC Card, 235 that interact to achieve a ports, 148–50 Tcl: Tool Command Language.
Picture CD, 232 common goal. 406 power supply, 152 Interpreted scripting lan-
tape, 235–35 System board, 136. See also processor. See Processor guage maintained by Sun
Zip disk, 223 Motherboard Systems analysis Microsystems Laboratories.
Stored program concept, 142 System bus: Bus that is part of preliminary investigation 435. See also Tool Command
Storing, 138. See also Storage the motherboard and con- and, 413–14 Language
Strategic decisions, 463 nects the processor to main Systems analyst: Person TCP/IP: Short for Transmission
Streaming: Process of transfer- memory. 151 responsible for designing Control Protocol/Internet
ring data in a continuous System clock: Small quartz and developing an informa- Protocol; network standard,
and even flow. 64, 472 crystal circuit that is used tion system. Also called a specifically a protocol, that
Streaming audio, 64 by the processor to control system developer. 407 defines how messages
Streaming video, 65 the timing of all computer need for, 408 (data) are routed from one
Structured Query Language operations. 138 preliminary investigation end of a network to the
(SQL): Query language System developer: Person and, 413–14 other, ensuring the data
used with databases that responsible for designing program development and, arrives correctly. 308
allows users to manage, and developing an informa- 439 Technical feasibility, 409
update, and retrieve data. tion system. Also called a role of, 407–8 Technical support, 353
348, 430 systems analyst. 408 system proposal and, 415 Technology
Stylus: Small metal or plastic System development testing software, 417 access to, 22
device that looks like a ball- guidelines, 407 user and, 407 enterprise strategy, 461
point pen, but uses pressure project team, 408 Systems programmer: Person Telecommuting: Work
instead of ink to write, System development cycle: Set who evaluates, installs, and arrangement in which
draw, or make selections. of activities used to build an maintains system software employees work away from
15, 172, 174, 293. See also information system, includ- and provides technical sup- a company’s standard work-
Digital pen ing planning, analysis, port to the programming place and often communi-
Subject directory: Search tool design, implementation, staff. 270 cate with the office through
that classifies Web pages in and support. 406–22, 438–39 Systems test, 420 the computer. 22, 42
an organized set of cate- analysis phase, 406, 413–15 Telemedicine: Form of long-
gories and subcategories. design phase, 406, 416–19 T1 line: The most popular distance health care where
57, 58, 96 feasibility assessment, 409 T-carrier line. 312 health-care professionals in
popular search sites and, 96 implementation phase, 406, separate locations conduct
using, 96 420–21 T3 line, 312 live conferences on the
Submenu, 103 loop, 406 Tabbed browsing: Web computer. 24, 44
Subwoofer, 193 planning phase, 406, 412–13,
Summary report, 462 422 browser feature where the
top of the browser displays
C6194_Index_pp2.qxd 2/2/07 4:48 PM Page 25
INDEX IND 25
Telephone Third-generation language Traffic, 52 UMD: Universal Media Disc.
cellular. See Cellular telephone (3GL): Type of program- Training Storage media with capaci-
smart. See Smart phone ming language in which a ties up to 1.8 GB of games,
twisted-pair cable, 319 programmer writes instruc- computer-based. See movies, or music. 233
tions that tell the computer Computer-based training
Telephone adapters, purchasing what to accomplish and Unauthorized access: Use of a
notebook computer and, 289 how to do it using a series Web-based, 123 computer or network with-
of English-like words to Training (system develop- out permission. 368–70
Telephone companies, Internet write instructions. Also
structure and, 51 called a procedural lan- ment): Showing users Unauthorized use: Use of a
guage. 425. See also exactly how they will use computer or its data for
Telephone line Procedural language new hardware and software unapproved or possibly ille-
connecting to Internet in a system. 420 gal activities. 368–70
through, 51–52 Thrashing, 255 Transaction, 461
home network using, 316 Three-generation backup pol- Transaction processing system Uncompress: To restore a com-
surge protection and, 375 (TPS): Information system pressed, or zipped, file to its
icy, 375 that captures and processes original form. 269. See also
Telephone network, communi- Thumb drive: Flash memory data from day-to-day busi- Unzip
cations over, 310–12 ness activities. 461–62 See
storage device that plugs in also Data processing Uniform Resource Locator, 56.
Telephone number, unlisted, a USB port on a computer Transfer rate See also URL; Web address
379 or mobile device. 236. See telephone line, 312
also USB flash drive Transistor, 136, 157 Uninstaller: Utility program
Television Thumbnail: Small version of a history of, 35 that removes a program, as
connecting computer to, 288 larger graphic. 64 Transitions, 218 well as any associated entries
entertainment and, 398 image viewer and, 259 Transmission Control in the system files. 260
Time schedules, for system Protocol/Internet Protocol,
Template, 118 development, 408–9 308. See also TCP/IP Uninstalling programs, 260
Tendonitis: Inflammation of a TIFF, 211 Transmission media: Materials Uninterruptible power supply
Timely information, 334 or substances capable of
tendon due to some Title bar: Horizontal space, carrying one or more sig- (UPS): Device that contains
repeated motion or stress located at the top of a win- nals in a communications surge protection circuits
on that tendon. 385 dow, that contains the win- channel. 318 and one or more batteries
Terabyte (TB): Approximately dow’s name. 103 Travel, computers used in, 25 that can provide power dur-
one trillion bytes. 142 T-Mobile, 52 Travel Web sites, 85, 473 ing a temporary or perma-
Terminal: Device that consists Token, 308 Trojan horse: Program named nent loss of power. 286, 375
of a keyboard, a monitor, a Token ring: Network standard after the Greek myth that Unit test, 420
video card, and memory, in which computers and hides within or looks like a UNIVAC 1, 35. See also
which often all are housed devices on the network legitimate program. 267, Universal Automatic
in a single unit. 17, 180 share or pass a special sig- 364–66 Computer
Test nal, called a token, in a uni- safeguards against, 365–66 Universal Automatic
benchmark, 417 directional manner and in a True condition, selection con- Computer (UNIVAC 1), 35
disaster recovery plan, 479 preset order. 308 trol structure and, 440 Universal serial bus port: Port
feasibility, 409 Toner, 191 Trusted source, 365 that can connect up to 127
new information system, 420 disposing of, 191 Tuple: Term used by develop- different peripherals with a
product designs, 459 Tool Command Language, ers of relational databases single connector type.
software and hardware, 417 435. See also Tcl for record. 347 149–50. See also USB port
Test plan, 479 ToolBook, 437 Turing, Alan, 35 UNIX: Multitasking operating
Text Top-level domain (TLD): Turnaround document: system that now is available
editing in word processing Identifies the type of organ- Document that a user for most computers of all
document, 106 ization associated with the returns to the company that sizes. 264, 265, 266, 427
input, 177 domain. 54 has created and sent it. 177 Unsubscribe: Process of a user
links, 57 Topology. See Network topol- Twisted-pair cable: removing his or her e-mail
optical character recognition ogy Transmission media that name and address from a
and, 177 Torvalds, Linus, 41, 271 consists of one or more mailing list. 71
output, 182 Touch screen: Touch-sensitive twisted-pair wires bundled Unzip, 269. See also
search, 60–61 display device with which together. 319 Uncompress
Web page, 53, 57 users interact by touching Twisted-pair wire, 319 Updating
worksheet, 107 areas of the screen. 171 Typing, repetitive strain antivirus programs, 365
Text data type, 335 Touchpad: Small, flat, rectan- injuries and, 385 data, 338
Text messaging: Service that gular pointing device that is Upgrade, 262
allows users to send and sensitive to pressure and U3 smart drive: Special type Uplink, 321
receive short text messages motion. 170 of USB flash drive that Uploading: Process of transfer-
on a smart phone or PDA. Tower, 14 includes preinstalled soft- ring documents, graphics,
298 See also Short message TPS, 461–62. See also ware accessed through a and other objects from a
service (SMS) Transaction processing sys- Windows-type interface. computer to a server on the
Theft tem (TPS) 148 Internet. 71
hardware. See Hardware Track, 222 compressed files, 269
theft floppy disk, 223 Ultra personal computer UPS, 375. See also
identity. See Identity theft hard disk, 225, 226 (uPC): Computer small Uninterruptible power
information. See Information Trackball: Stationary pointing enough to fit in one hand. supply (UPS)
theft device with a ball on its top See also handheld computer; Upstream rate, 312
software. See Software theft or side. 170 handtop computer. 15 Upward compatible, 262
Thermal printer: Type of Tracking, GPS used for, 301 URL (Uniform Resource
nonimpact printer that Ultradense servers, 477. See Locator): Unique address
generates images by push- also Blade servers for a Web page. See also
ing electrically heated pins Web address. 56
against heat-sensitive paper. U.S. Robotics, 41
191
C6194_Index_pp2.qxd 2/2/07 4:48 PM Page 26
IND 26 INDEX
USB 2.0, 149 Utility: Type of system soft- products to the public – on a computer’s storage
USB flash drive: Flash mem- ware that allows a user to offering additional services medium. 176
perform maintenance-type with the product. 417 Video messaging: Wireless
ory storage device that tasks, usually related to VAN, 303. See also Value- messaging service that
plugs in a USB port on a managing a computer, its added network (VAN) enables users to send
computer or portable device. devices, or its programs. Vandalism, hardware, 371 short video clips. 299
7, 47, 148, 236. See also Pen 259–61. See also Utility VAR, 417. See also Value- Video projector
drive; Thumb drive program added reseller (VAR) connecting notebook com-
USB hub: Device that plugs in VBA, 432. See also Visual Basic puter to, 289
a USB port on the system Utility computing: Technology for Applications (VBA) Video telephone call:
unit and contains multiple that allows companies to VBScript: Visual Basic, Telephone call made using
USB ports in which cables use the processing power Scripting Edition. Subset of a PC video camera that
from USB devices can be sitting idle in a network the Visual Basic language allows both parties to see
plugged. 149–50 located somewhere else in that allows programmers each other as they commu-
USB port: Port that can con- the world. Also called on to add intelligence and nicate over the Internet. 176
nect up to 127 different demand computing. 478 interactivity to Web pages. Viewable size, 186
peripherals with a single 435. See also Visual Basic, Virtual memory: A portion of
connector type. 149–50 Utility program: Type of sys- Scripting Edition a storage medium, usually
keyboards with, 168 tem software that allows a Vendors the hard disk, that the
Use, unauthorized, 368–70 user to perform mainte- packaged software, 415 operating system allocates
Useful information, 334 nance-type tasks usually purchasing computers from, to function as additional
User: Anyone who communi- related to managing a com- 286, 287 RAM. 255
cates with a computer or puter, its devices, or its pro- soliciting proposals from, 417 Virtual private network
utilizes the information it grams. 11, 250, 259–61. See testing and evaluating pro- (VPN): Network that pro-
generates. 4 also Utility posals of, 417 vides a mobile user with a
User ID: Unique combination virtual private network use, secure connection to a com-
of characters, such as letters anti-spam, 122 470 pany network server, as if
of the alphabet or numbers, antivirus, 122, 267–68 See also Manufacturers the user has a private line.
that identifies one specific backup, 261, 375 Verifiable information, 334 470
user. Also called user name. CD/DVD burning, 122, 269 Vertical market software, 415 Virtual reality (VR):
257, 369. See also User name diagnostic, 261 Video: Full-motion images Computers used to simulate
User interface: The portion of disk defragmenter, 261 that are played back at vari- a real or imagined environ-
software that defines how a disk scanner, 260 ous speeds. 65 ment that appears as a three
user interacts with a com- file compression, 122, 269 entertainment software and, dimensional (3-D) space. 65
puter, including how the file conversion, 122, 269 120 multimedia and, 64
user enters data and file manager, 259 multimedia and, 64 Virus: Potentially damaging
instructions and how infor- image viewer, 259 output, 182 computer program that
mation is displayed on the Internet filters, 268–69 processors and, 139 affects, or infects, a com-
screen. 10, 253 operating system, 251, 259–61 recording, 399 puter negatively by altering
command-line, 253, 262, 264, personal computer mainte- on Web page, 54 the way the computer
265 Video blog: Blog that contains works without a user’s
graphical. See Graphical user nance, 122, 270 video clips. 62 knowledge or permission.
interface (GUI) personal firewall, 260 Video camera. See PC video 70, 122, 267–68, 364–66
menu-driven, 262 pop-up blocker, 122 camera first, 38
User name: Unique combina- screen saver, 261 Video card: Adapter card that payload, 364
tion of characters, such as stand-alone, 259, 267–70 converts computer output to protection from, 267–68
letters of the alphabet spyware remover, 122 a video signal that travels safeguards against, 365–66
and/or numbers, that iden- uninstaller, 260 through a cable to a moni- spyware as, 381
tifies a specific user. 70, 257, Web filter, 122 tor, which displays an image types of, 364–66
369. See also User ID See also Utility on the screen. 135, 147, 186. Virus author, 267
Users UWB (ultra-wideband): See also Graphics card Virus definition: Known spe-
access controls, 368–69, 373 purchasing desktop com- cific pattern of virus code.
authenticating using biomet- Network standard that puter and, 283 Also called virus signature.
ric devices, 181 specifies how two USB terminal and, 180 366. See also Virus signature
authorized, 341, 346 devices use short-range Video CD, 218 Virus hoax: E-mail message
commands issued by, 167 radio waves to communi- Video chats, 72 that warns users of a nonex-
employee as, 351 cate at high speeds with Video conference: Meeting istent virus, worm, or
hardware availability for, 474, each other. 309 between two or more geo- Trojan horse. 366
477 graphically separated peo- Virus signature: Known spe-
health concerns, 385–87 Validation: Process of compar- ple who use a network or cific pattern of virus code.
interacting with DBMS, ing data with a set of rules the Internet to transmit Also called virus definition.
341–42 or values to find out if the audio and video data. 176 366. See also Virus defini-
levels of, in enterprise, 455 data is correct. 339–40 software for, 121 tion
names, 70 Video editing software: VisiCalc, 38
number on Internet, 50 Validity check, 339–40. Value, Application software that Visual Basic for Applications
passwords, 369 107 allows a user to modify a (VBA), 432
spyware collecting informa- segment of video, called a Visual Basic, 428
tion about, 381 Value-added network (VAN): clip. 114 Visual Basic, Scripting
types of, 18–22 Third-party business that Video input: Process of Edition, 435. See also
Web services and, 469 provides networking serv- capturing full-motion VBScript
Users (system development): ices such as secure data and images and storing them Visual C#, 428
407 information transfer, stor-
age, e-mail, and manage-
ment reports. 303
Value-added reseller (VAR):
Company that purchases
products from manufactur-
ers and then resells these
C6194_Index_pp2.qxd 2/2/07 4:48 PM Page 27
INDEX IND 27
Visual C++, 428 VPN tunnel, 470 a URL (Uniform Resource click stream and, 468
Visual J#, 428 VR. See Virtual reality Locator). 56 creating, 66, 67
Visual programming environ- Web application: Programs deploying, 66, 67
W3C, 51. See also World Wide hosted by a Web site. 122. See directories, 59
ment (VPE), 428 Web Consortium also Web-based software. entertainment, 84, 472
Visual programming Web browser: Application evaluating, 63, 377
Wall, Larry, 435 software that allows users environment, 94
language: Programming lan- WAN, 304. See also Wide area to access and view Web finance, 86
guage that provides a visual pages. Also called a government, 89
or graphical interface for network (WAN) browser. 54 guide to, 83–98
creating all source code. WAP, 309, 376. See also cookies and, 380, 381 health, 95, 473
429. encryption used by, 374 home page, 55
Visual Studio: Suite of pro- Wireless Application home page, 55, learning, 92
gram development tools Protocol (WAP) online service provider, 52 maintaining, 66, 67
from Microsoft that assists War driving: Intrusion tech- software, 11, 121 news, 91
programmers in building nique in which an individ- Web cam: Video camera that planning, 66, 67
programs for Windows, ual attempts to detect displays its output on a posting photographs on, 175
Windows Mobile, or operat- wireless networks via their Web page. 176 research and, 96
ing systems that support notebook computer while Web database, 350 resources and, 87
Microsoft’s .NET driving a vehicle through Web developer: Designer scalability, 477
Framework. 48, 428–29 areas they suspect have a of Web pages. 74, 433 science and, 93
Visually impaired users, out- wireless network. 376 Web farming, 468 shopping, 90
put devices for, 197 Warm boot: Process of using Web filtering software: sports, 91
Vlog: Video blog. 62 the operating system to Program that restricts travel, 85, 472
Vlogosphere: Collection of restart a computer. 252 access to certain material on types of, 61–63, 83–98
vlogs worldwide. 62 Warranty, purchasing com- the Web. 268, 384 weather, 91
Voice chats, 72 puter and, 287 Web filter, 122 Web-based Help, 122–23
Voice commands, querying WBT, 123. See also Web-based Web folders, communications Web-based software: Programs
database using, 345 training uses and, 298
Voice input: Process of enter- Weather, Web site and, 91 Web log, 63. See also blog hosted by a Web site. 101.
ing data by speaking into a Web: Worldwide collection of mobile, 63 See also Web application.
microphone. 173 electronic documents called Web page: Electronic document Web-based training (WBT):
Voice mail: Service that func- Web pages, the Web is one on the Web, which can con- Computer-based training
tions much like an answer- of the more popular serv- tain text, graphics, audio, that uses Internet technol-
ing machine, allowing a ices on the Internet. Also and video and often has ogy and consists of applica-
user to leave a voice mes- called the World Wide Web. built-in connections to other tion software on the Web.
sage for one or more peo- 10, 50, 54–68 documents, graphics, Web 123
ple. 302 addresses, 56 pages, or Web sites. 10, 54 WEP, 376. See also Wired
Voice mailbox, 302 browsing. See Web browser downloading, 55 Equivalent Privacy
Voice output: Audio output communications uses and, multimedia on, 64 Wheel: Steering-wheel-type
that occurs when a user 298 number of visits per month, input device that is used to
hears a person’s voice or cookies and, 380–81 56 simulate driving a vehicle.
when a computer talks to creator of, 75 portal, 467 172
the user through the speak- denial of service attacks and, searching for, 57–61 Wheel, purchasing a computer
ers on the computer. 194 367 Web page authoring software: and, 282
Voice over IP: Technology that e-commerce on, 67–68 Software used to create Web White House, Web site, 40
allows users to speak to freeware on, 101 pages that include graphical Whitman, Meg, 75
other users over the information privacy and, images, video, audio, ani- Wide area network (WAN):
Internet using their desktop 379–82 mation, and other special Network that covers a large
computer, mobile computer, multimedia on, 64–66 effects with interactive con- geographic area (such as a
or mobile device. 73. See navigating, 57 tent. 114, 436 city, country, or the world)
also Internet telephony. processors and, 139 Web publishing: Development using a communications
Voice recognition: Computer’s public-domain software on, and maintenance of Web channel that combines
capability of distinguishing 101 pages. 66–67 many types of media such
spoken words. See also publishing Web pages on. See Web server: Computer that as telephone lines, cables,
speech recognition. 106, 173 Web publishing delivers requested Web and radio waves. 304
RAM needed for, 144 searching for information on, pages to a computer. 54 Wi-Fi (wireless fidelity): Short
See also Speech recognition 57–61 Web services: Web applica- for wireless fidelity; wire-
Voice verification system, 181, shareware on, 101 tions created with any pro- less network that uses radio
370 surfing, 57 gramming language or with signals to provide Internet
VoiceXML (eXtensible Markup surfing anonymously, any operating system to connections to wireless
Language), 345 379 communicate and share computers and devices. 46,
Volatile memory: Type of types of Web sites, 61–63 data seamlessly. 302, 469 52, 308. See also 802.11
memory that loses its con- See also Internet Web site: Collection of related Wi-Fi Protected Access (WEP):
tents when a computer’s Web 2.0: Term used to refer to Web pages and associated Security standard that
power is turned off. 142, 144 Web sites that allow users to items, such as documents improves on WEP by
Volume control, for optical modify Web site content, and pictures, stored on a authenticating network
disc drives, 229 provide a means for users to Web server. 10, 21, 54 users and providing more
von Neumann, John, 35 share personal information, arts and literature, 98 advanced encryption tech-
VPE, 428. See also Visual pro- and have application soft- auctions, 88 niques. 376
gramming environment ware built into the site for careers, 97 Wii Remote: Motion-sensing
VPN, 470. See also Virtual pri- visitors to use. 54 input device that uses
vate network (VPN) Web address: Unique address
for a Web page. Also called