Artificial intelligence (AI): A field of computer science that BD (Blu-ray disc): A type of high-definition disc with a capac-
attempts to develop computer systems that can mimic or simu- ity of 25 to 50 gigabytes.
late human thought processes and actions.
Beta testing: Testing by a select group of potential users in the
Artificial reality: See Virtual reality. final stage of testing a program.
ASCII (American Standard Code for Information Inter- Big data: Term given to describe the ever-growing volume of
change): Binary coding scheme widely used on all computers, data currently being collected.
including personal computers. Eight bits form each byte, and
each byte represents one character. Binary system: Numbering system in which all numbers con-
sist of only two digits: 0 and 1.
Aspect ratio: The width of a monitor divided by its height.
Common aspect ratios for monitors are 4:3 (standard) and 16:9 Biometric scanning: Devices that check fingerprints or retinal
(wide screen). scans.
Assembly language: A step up from machine language, using BIOS (basic input/output system): Information including the
names instead of numbers. These languages use abbreviations specifics concerning the amount of RAM and the type of key-
or mnemonics, such as ADD, that are automatically converted board, mouse, and secondary storage devices connected to the
to the appropriate sequence of 1s and 0s. system unit.
Asymmetric digital subscriber line (ADSL): One of the Bit (binary digit): Each 1 or 0 is a bit; short for binary digit.
most widely used types of telephone high-speed connections
(DSL). Bitmap image: Graphic file in which an image is made up of
thousands of dots (pixels).
Attachment: A file, such as a document or worksheet, that is
attached to an e-mail message. BitTorrent: A peer-to-peer file-sharing protocol used for dis-
tributing large amounts of data over the Internet.
Attribute: A data field represents an attribute (description or
characteristic) of some entity (person, place, thing, or object). Blog: See Web log.
For example, an employee is an entity with many attributes,
including his or her last name, address, phone, etc. Bluetooth: A wireless technology that allows nearby devices
to communicate without the connection of cables or telephone
Automated design tool: Software package that evaluates hard- systems.
ware and software alternatives according to requirements given
by the systems analyst. Also called computer-aided software Booting: Starting or restarting your computer.
engineering (CASE) tools.
Botnet: A collection of zombie computers.
b
Broadband: Bandwidth that includes microwave, satellite,
Backbone: See Bus. coaxial cable, and fiber-optic channels. It is used for very-high-
speed computers.
Background: Other programs running simultaneously
with the program being used in an operating system. See also Browser: Special Internet software connecting you to remote
Foreground. computers; opens and transfers files, displays text and images,
and provides an uncomplicated interface to the Internet and
Backup: A Windows utility program. See Backup program. web documents. Examples of browsers are Internet Explorer,
Mozilla Firefox, and Google Chrome.
Backup program: A utility program that helps protect you
from the effects of a disk failure by making a copy of selected or Browser cache: A collection of temporary Internet files that
all files that have been saved onto a disk. contain web page content and instructions for displaying this
content.
Balance sheet: Lists the overall financial condition of an
organization. Bus: All communication travels along a common connecting
cable called a bus or a backbone. As information passes along
Bandwidth: Bandwidth determines how much information the bus, it is examined by each device on the system board to
can be transmitted at one time. It is a measurement of the com- see if the information is intended for that device. See also Bus
munication channel’s capacity. There are three bandwidths: line and Ethernet.
voice band, medium band, and broadband.
Bus line: Electronic data roadway, along which bits travel;
Bar code: Code consisting of vertical zebra-striped marks connects the parts of the CPU to each other and links the CPU
printed on product containers, read with a bar code reader. with other important hardware. The common connecting cable
in a bus network.
Bar code reader: Photoelectric scanner that reads bar codes
for processing. Bus network: Each device is connected to a common cable called
a bus or backbone, and all communications travel along this bus.
Bar code scanner: See Bar code reader.
Bus width: The number of bits traveling simultaneously down
Base station: See Wireless access point. a bus is the bus width.
Baseband: Bandwidth used to connect individual comput- Business suite: See Productivity suites.
ers that are located close to one another. Though it supports
high-speed transmission, it can only carry a single signal at a Business-to-business (B2B): A type of electronic commerce
time. that involves the sale of a product or service from one busi-
ness to another. This is typically a manufacturer-supplier
Batch processing: Processing performed all at once on data relationship.
that has been collected over time.
Business-to-consumer (B2C): A type of electronic commerce
that involves the sale of a product or service to the general pub-
lic or end users.
376 GLOSSARY
Button: A special area you can click to make links that “navi- Character: A single letter, number, or special character, such
gate” through a presentation. as a punctuation mark or $.
Byte: Unit consisting of eight bits. There are 256 possible Character encoding standards: Assign unique sequence of bits
bit combinations in a byte, and each byte represents one to each character.
character.
Child node: A node one level below the node being consid-
c ered in a hierarchical database or network. See also Parent node.
Cable: Cords used to connect input and output devices to the Chip: A tiny circuit board etched on a small square of sand-
system unit. like material called silicon. A chip is also called a silicon chip,
semiconductor, or integrated circuit.
Cable modem: Type of modem that uses coaxial cable to cre-
ate high-speed computer connections. Chip carrier: The device onto which chips are mounted and
plugged into the system board.
Cable service: Service provided by cable television companies
using existing television cables. Chrome OS: An operating system designed by Google for
netbook computers and Internet connectivity through cloud
Cache memory: Area of random-access memory (RAM) set computing.
aside to store the most frequently accessed information. Cache
memory improves processing by acting as a temporary high- Circles: A service offered through Google Plus, for grouping
speed holding area between memory and the CPU, allowing individuals according to common interests or other criteria.
the computer to detect which information in RAM is most fre-
quently used. Clarity: Indicated by the resolution, or number of pixels, on a
monitor. The greater the resolution, the better the clarity.
Capacity: Capacity is how much data a particular storage
medium can hold and is another characteristic of secondary Class: In an object-oriented database, classes are similar
storage. objects grouped together.
Card reader: A device that interprets the encoded information Client: A node that requests and uses resources available from
contained on credit, debit, access, and identification cards. other nodes. Typically, a client is a user’s personal computer.
Carpal tunnel syndrome: A repetitive strain injury consisting Client-based e-mail system: A system that requires a special
of damage to the nerves and tendons in the hands. program known as an e-mail client to be installed on your
computer.
Cascading style sheets (CSS): Files inserted into an HTML
document that control the appearance of web pages including Client/server network: Network in which one powerful com-
layout, colors, and fonts. puter coordinates and supplies services to all other nodes on
the network. Server nodes coordinate and supply specialized
CD: See Compact disc. services, and client nodes request the services.
CD-R: Stands for CD-recordable. This optical disc can be writ- Clock speed: Also called clock rate. It is measured in
ten to only once. After that it can be read many times without gigahertz, or billions of beats per second. The faster the clock
deterioration but cannot be written on or erased. Used to create speed, the faster the computer can process information and
custom music CDs and to archive data. execute instructions.
CD-ROM (compact disc–read-only memory): CD format Cloud computing: Data stored at a server on the Internet and
that allows data to be read but not recorded. Used to dis- available anywhere the Internet can be accessed.
tribute large databases, references, and software application
packages. Cloud printer: A printer connected to the Internet that pro-
vides printing services to others on the Internet.
CD-RW (compact disc rewritable): A reusable, optical disc
that is not permanently altered when data is recorded. Used to Cloud storage: Also known as online storage. An Internet-
create and edit large multimedia presentations. based space for storing data and files.
Cell: The space created by the intersection of a vertical Cloud suite: Suite stored at a server on the Internet and
column and a horizontal row within a worksheet in a program a vailable anywhere from the Internet.
like Microsoft Excel. A cell can contain text or numeric
entries. Coaxial cable: High-frequency transmission cable that
replaces the multiple wires of telephone lines with a single
Cell tower: Antennae that support cellular communication. solid-copper core. It is used to deliver television signals as well
as to connect computers in a network.
Cellular: Type of wireless connection that uses multiple anten-
nae (cell towers) to send and receive data within relatively small Code: Writing a program using the appropriate computer
geographic regions (cells). language.
Cellular service provider: Supports voice and data transmission Code review: See Desk checking.
to wireless devices.
Coding: Actual writing of a computer program, using a pro-
Central processing unit (CPU): The part of the computer that gramming language.
holds data and program instructions for processing the data.
The CPU consists of the control unit and the arithmetic-logic Cold boot: Starting the computer after it has been turned off.
unit. In a personal computer, the CPU is on a single electronic
component called a microprocessor chip. Combination key: Keys such as the Ctrl key that perform an
action when held down in combination with another key.
Commercial database: Enormous database an organization
develops to cover certain particular subjects. Access to this type
of database is usually offered for a fee or subscription. Also
known as data bank and informational utility.
GLOSSARY 377
Common data item: In a relational database, all related tables Contrast ratio: Indicates a monitor’s ability to display colors.
must have a common data item or key field. It compares the light intensity of the brightest white to the
darkest black.
Communication channel: The actual connecting medium
that carries the message between sending and receiving Control unit: Section of the CPU that tells the rest of the
devices. This medium can be a physical wire, cable, or wireless computer how to carry out program instructions.
connection.
Conversion: Also known as systems implementation; four
Communication device: Computer systems that communicate approaches to conversion: direct, parallel, pilot, and phased. See
with other computer systems using modems. For example, it also Systems implementation.
modifies computer output into a form that can be transmitted
across standard telephone lines. Cookies: Small data files that are deposited on your hard disk
from websites you have visited.
Communication system: Electronic system that transmits data
over communication lines from one location to another. Coprocessor: Specialized processing chip designed to improve
specific computer operations, such as the graphics coprocessor.
Compact disc (CD): Widely used optical disc format. It holds
650 MB (megabytes) to 1 GB (gigabyte) of data on one side of Copyright: A legal concept that gives content creators the
the CD. right to control use and distribution of their work.
Compact disc–read-only memory: See CD-ROM. Cordless mouse: A battery-powered mouse that typically uses
radio waves or infrared light waves to communicate with the
Compact disc rewritable: See CD-RW. system unit. Also known as wireless mouse.
Company database: Also called shared database. Stored on a Cortana: A digital assistant that accepts commands through
mainframe, users throughout the company have access to the text or speech. Introduced in 2015 as a part of Windows 10.
database through their personal computers linked by a network.
Cracker: One who gains unauthorized access to a computer
Compiler: Software that converts the programmer’s proce- system for malicious purposes.
dural language program (source code) into machine language
(object code). This object code can then be saved and run later. Curved monitor: Uses similar technology as flat panel moni-
tors except it has a concave screen that provides better viewing
Computer-aided design/computer-aided manufacturing (CAD/ angles near the edges of the screen.
CAM) system: Knowledge work systems that run programs to
integrate the design and manufacturing activities. CAD/CAM is Cyberbullying: The use of the Internet, a cell phone, or other
widely used in manufacturing automobiles. device to deliver content intended to hurt or embarrass another
person.
Computer-aided software engineering (CASE) tool: A type of
software development tool that helps provide some automation Cybercash: See Digital cash.
and assistance in program design, coding, and testing. See also
Automated design tool. Cybercrime: Any criminal offense that involves a computer
and a network. Criminals may be employees, outside users,
Computer crime: See Cybercrime. hackers and crackers, or organized crime members.
Computer ethics: Guidelines for the morally acceptable use of Cylinder: Hard disks store and organize files using tracks,
computers in our society. sectors, and cylinders. A cylinder runs through each track of a
stack of platters. Cylinders differentiate files stored on the same
Computer Fraud and Abuse Act: Law allowing prosecution of track and sector of different platters.
unauthorized access to computers and databases.
d
Computer monitoring software: The most invasive and dan-
gerous type of spyware. These programs record every activity Data: Raw, unprocessed facts that are input to a computer
made on your computer, including credit card numbers, bank system that will give compiled information when the computer
account numbers, and e-mail messages. processes those facts. Data is also defined as facts or observa-
tions about people, places, things, and events.
Computer network: Communications system connecting two
or more computers and their peripheral devices to exchange Data administration subsystem: Helps manage the overall
information and share resources. database, including maintaining security, providing disaster
recovery support, and monitoring the overall performance of
Computer support specialist: Specialists include technical database operations.
writers, computer trainers, computer technicians, and help-desk
specialists who provide technical support to customers and Data bank: See Commercial database.
other users.
Data cube: A multidimensional data model. See also Multi
Computer technician: Specialist who installs hardware and dimensional database.
software and troubleshoots problems for users.
Data definition subsystem: This system defines the logical
Connectivity: Capability of the personal computer to use infor- structure of the database by using a data dictionary.
mation from the world beyond one’s desk. Data and information
can be sent over telephone or cable lines and through the air so Data dictionary: Dictionary containing a description of the
that computers can talk to each other and share information. structure of data in a database.
Consumer-to-consumer (C2C): A type of electronic commerce Data flow diagram: Diagram showing data or information
that involves individuals selling to individuals. flow within an information system.
Contextual tab: A type of tab found in Microsoft Word that Data integrity: Database characteristics relating to the consis-
appears only when needed and anticipates the next operations tency and accuracy of data.
to be performed by the user.
378 GLOSSARY
Data maintenance: Maintaining data includes adding new Denial of service (DoS) attack: A variant virus in which web-
data, deleting old data, and editing existing data. sites are overwhelmed with data and users are unable to access
the website. Unlike a worm that self-replicates, a DoS attack
Data manipulation subsystem: Provides tools to maintain and floods a computer or network with requests for information
analyze data. and data.
Data mining: Technique of searching data warehouses for Density: Refers to how tightly the bits (electromagnetic
related information and patterns. charges) can be packed next to one another on a disk.
Data processing system (DPS): Transaction processing system Desk checking: Process of checking out a computer program
that keeps track of routine operations and records these events by studying a printout of the program line by line, looking for
in a database. Also called transaction processing system (TPS). syntax and logic errors.
Data redundancy: A common database problem in which data Desktop: (1) The screen that is displayed on the monitor
is duplicated and stored in different files. when the computer starts up. All items and icons on the
screen are considered to be on your desktop and are used to
Data security: Protection of software and data from unauthor- interact with the computer. (2) A system unit that typically
ized tampering or damage. contains the system’s electronic components and selected
secondary storage devices. Input and output devices, such as
Data warehouse: Data collected from a variety of internal and the mouse, keyboard, and monitor, are located outside the
external databases and stored in a database called a data ware- system unit.
house. Data mining is then used to search these databases.
Desktop computer: Computer small enough to fit on top of or
Data worker: Person involved with the distribution and com- along the side of a desk and yet too big to carry around.
munication of information, such as administrative assistants
and clerks. Desktop operating system: See Stand-alone operating system.
Database: A collection of related information, like employee Desktop publisher: One who creates and formats publication-
names, addresses, and phone numbers. It is organized so that ready material.
a computer program can quickly select the desired pieces of
information and display them for you. Desktop publishing program: Program that allows you
to mix text and graphics to create publications of professional
Database administrator (DBA): Uses database management quality.
software to determine the most efficient way to organize and
access data. Device driver: Every device that is connected to the computer
has a special program associated with it called a device driver
Database file: File containing highly structured and organized that allows communication between the operating system and
data created by database management programs. the device.
Database management system (DBMS): To organize, man- Diagnostic program: See Troubleshooting program.
age, and retrieve data. DBMS programs have five subsystems:
DBMS engine, data definition, data manipulation, applica- Dial-up service: Antiquated method of connecting to the
tions generation, and data administration. An example of a Internet using telephones and telephone modems, which has
database management system is Microsoft Access. See also been replaced with higher-speed connection services.
Database manager.
Dialog box: Provides additional information and requests user
Database manager: Software package used to set up, or struc- input.
ture, a database such as an inventory list of supplies. It also pro-
vides tools to edit, enter, and retrieve data from the database. Dictionary attack: Uses software to try thousands of common
words sequentially in an attempt to gain unauthorized access to
Database model: Defines rules and standards for all data in a a user’s account.
database. There are five database models: hierarchical, network,
relational, multidimensional, and object-oriented. For example, Digital: Computers are digital machines because they can
Access uses the relational data model. only understand 1s and 0s. For example, a digital watch states
the exact time on the face, whereas an analog watch has the
DBMS engine: Provides a bridge between the logical view of second hand moving in constant motion as it tells the time.
data and the physical view of data.
Digital camera: Similar to a traditional camera except that
Debugging: Programmer’s word for testing and then eliminat- images are recorded digitally in the camera’s memory rather
ing errors in a program. Programming errors are of two types: than on film.
syntax and logic errors.
Digital cash: Currency for Internet purchases. Buyers
Decision model: The decision model gives the decision sup- p urchase digital cash from a third party (a bank that special
port system its analytical capabilities. There are three types of izes in electronic currency) by transferring funds from their
models included in the decision model: tactical, operational, banks.
and strategic.
Digital Millennium Copyright Act: Law that makes it legal for
Decision support system (DSS): Flexible analysis tool that a program owner to make only his or her own backup copies of
helps managers make decisions about unstructured problems, a software program. However, it is illegal for those copies to be
such as effects of events and trends outside the organization. resold or given away.
Demand report: A demand report is produced on request. An Digital projector: A type of monitor that projects images from
example is a report on the numbers and types of jobs held by a traditional monitor onto a screen or wall.
women and minorities done at the request of the government.
Digital rights management (DRM): Encompasses various
Demodulation: Process performed by a modem in converting technologies that control access to electronic media and files.
analog signals to digital signals.
GLOSSARY 379
Digital signal: Computers can only understand digital signals. Domain name server (DNS): Internet addressing method
Before processing can occur within the system unit, a conver- that assigns names and numbers to people and computers.
sion must occur from what we understand (analog) to what the Because the numeric IP addresses are difficult to remember, the
system unit can electronically process (digital). See also Analog DNS server was developed to automatically convert text-based
signals. addresses to numeric IP addresses.
Digital subscriber line (DSL): Provides high-speed connection Dot pitch: Distance between each pixel. The lower the dot
using existing telephone lines. pitch, the shorter the distance between pixels, and the higher
the clarity of images produced.
Digital subscriber line (DSL) service: Service provided by
telephone companies using existing telephone lines to provide Dots per inch (dpi): Printer resolution is measured in dpi. The
high-speed connections. higher the dpi, the better the quality of images produced.
Digital versatile disc (DVD): A type of optical disc similar to Downlink: To receive data from a satellite.
CD-ROMs except that more data can be packed into the same
amount of space. See also DVD (digital versatile disc). Downloading: Process of transferring information from a
remote computer to the computer one is using.
Digital video disc: See DVD (digital versatile disc).
Drawing program: Program used to help create artwork for
Digital wallet: Information to make online shopping more publications. See also Illustration program.
convenient. A digital wallet typically resides on a user’s smart-
phone and contains an individual’s mailing address, credit card, Driver: See Device driver.
and other information typically required to make an online
purchase. Drones: Unmanned aerial vehicles (UAV) that act as an output
device, sending back video and sound to the user.
Digital whiteboard: A specialized device with a large display
connected to a computer or projector. DS3: Provides support for very high speed, all-digital trans-
mission for large corporations.
DIMM (dual in-line memory module): An expansion module
used to add memory to the system board. DSL: See Digital subscriber line.
Direct approach: Approach for systems implementation Duplex printing: Allows automatic printing on both sides of a
whereby the old system is simply abandoned for the new sheet of paper.
system.
DVD (digital versatile disc or digital video disc): Similar to
Directory server: A specialized server that manages resources CD-ROMs except that more data can be packed into the same
such as user accounts for an entire network. amount of space. DVD drives can store a typical capacity of
4.7 GB on one side.
Disaster recovery plan: Plan used by large organizations
describing ways to continue operations following a disaster DVI (Digital Video Interface) port: A type of port that
until normal computer operations can be restored. p rovides a connection to a digital monitor.
Disaster recovery specialist: Worker responsible for recover- e
ing systems and data after a disaster strikes an organization.
E-book: See E-book reader.
Disk caching: Method of improving hard-disk performance
by anticipating data needs. Frequently used data is read from E-book reader: Handheld, book-sized device that displays
the hard disk into memory (cache). When needed, data is then text and graphics. Using content downloaded from the web or
accessed directly from memory, which has a much faster trans- special cartridges, these devices are used to read newspapers,
fer rate than from the hard disk. Increases performance by as magazines, and books.
much as 30 percent.
E-commerce: Buying and selling goods over the Internet.
Disk Cleanup: A Windows troubleshooting utility that elimi-
nates nonessential files. E-ink: A black-and-white output from some e-book readers
producing images that reflect light like ordinary paper.
Display: Output device like a television screen that displays
data processed by the computer. E-learning: A web application that allows one to take educa-
tional courses online.
Display screen: See Display.
E-mail: Allows you to communicate with anyone in the world
Distributed database: Database that can be made accessible who has an Internet address or e-mail account with a system
through a variety of communications networks, which allow connected to the Internet. You can include a text message,
portions of the database to be located in different places. graphics, photos, and file attachments.
Document: Any kind of text material. E-mail client: A special program that communicates with
the e-mail service provider and must be installed on the com-
Document file: File created by a word processor to save docu- puter first.
ments such as letters, research papers, and memos.
E-reader: Dedicated mobile devices for storing and displaying
Document scanner: Similar to a flatbed scanner except that e-books and other electronic media including electronic news-
it can quickly scan multipage documents. It automatically feeds papers and magazines.
one page of a document at a time through a scanning surface.
EBCDIC (Extended Binary Coded Decimal Interchange Code):
Documentation: Written descriptions and procedures about a Binary coding scheme that is a standard for minicomputers and
program and how to use it. See also Program documentation. mainframe computers.
Domain name: The second part of the URL; it is the name of the Economic feasibility: Comparing the costs of a new system to
server where the resource is located. For example, www.mtv.com. the benefits it promises.
380 GLOSSARY
Electronic books: Traditional printed books in electronic Expansion slots: Openings on a system board. Users can
format. insert optional devices, known as expansion cards, into these
slots, allowing users to expand their systems. See also Expansion
Electronic commerce (e-commerce): Buying and selling goods card.
over the Internet.
Expert system: Computer program that provides advice to
Electronic mail: Transmission of electronic messages over the decision makers who would otherwise rely on human experts.
Internet. Also known as e-mail. It’s a type of artificial intelligence that uses a database to pro-
vide assistance to users.
Electronic profile: Using publicly and privately available data-
bases, information resellers create electronic profiles, which are External data: Data gathered from outside an organization.
highly detailed and personalized descriptions of individuals. Examples are data provided by market research firms.
Embedded operating system: An operating system that is External hard drive: Uses the same technology as an internal
completely stored within the ROM (read-only memory) of the hard disk but is used primarily to complement an internal hard
device that it is in; used for handheld computers and smaller disk by providing additional storage. It is typically connected
devices like PDAs. Also known as a real- time operating system to a USB or FireWire port on the system unit and is easily
(RTOS). removed.
Employee-monitoring software: Programs that record External Serial Advanced Technology Attachment (eSATA) port:
virtually every activity on a computer system. A port that provides high speed connections for external hard-
disk drives, optical discs, and other large secondary storage
Encryption: Coding information so that only the user can devices.
read or otherwise use it.
Extranet: Private network that connects more than one
Encryption key: A number used to gain access to encrypted organization.
information.
f
End user: Person who uses personal computers or has access
to larger computers. Facebook: One of the best-known social networking sites.
Enterprise storage system: Using mass storage devices, a Facebook groups: Communities of individuals who share
strategy designed for organizations to promote efficient and common interest on Facebook.
safe use of data across the networks within their organizations.
Facebook Pages: Often used by businesses and public figures
Entity: In an object-oriented database, a person, place, thing, to promote ideas, products, and services.
or event that is to be described.
Facebook Profile: An individual’s Facebook page, which may
Ergonomics: The study of human factors related to things include photos, lists of personal interests, contact information,
people use. and other personal information.
Ethernet: Otherwise known as Ethernet bus or Ethernet Family Educational Rights and Privacy Act (FERPA): A federal
LAN. The Ethernet bus is the pathway or arterial to which law that restricts disclosure of educational records.
all nodes (PCs, file servers, print servers, web servers, etc.)
are connected. All of this is connected to a local area network Fiber-optic cable: Special transmission cable made of glass
(LAN) or a wide area network (WAN). See also Bus network. tubes that are immune to electronic interference. Data is
transmitted through fiber-optic cables in the form of pulses
Ethernet cable: Twisted-pair cable commonly used in of light.
networks and to connect a variety of components to the
system unit. Fiber-optic service (FiOS): An Internet connection service
that is not yet widely available. Current providers of FiOS
Ethernet port: A high-speed networking port that allows include Google and Verizon with speeds faster than cable or
multiple computers to be connected for sharing files or for DSL connections.
high-speed Internet access.
Field: Each column of information within a record is called a
Ethics: Standards of moral conduct. field. A field contains related information on a specific item like
employee names within a company department.
Exception report: Report that calls attention to unusual
events. Fifth-generation language (5GL): Computer language that
incorporates the concept of artificial intelligence to allow direct
Executive information system (EIS): Sophisticated software human communication.
that can draw together data from an organization’s databases in
meaningful patterns and highly summarized forms. File: A collection of related records that can store data and
programs. For example, the payroll file would include payroll
Executive support system (ESS): See Executive information information (records) for all of the employees (entities).
system.
File compression: Process of reducing the storage requirements
Expansion bus: Connects the CPU to slots on the system for a file.
board. There are different types of expansion buses such as
industry standard architecture (ISA), peripheral component File compression program: Utility program that reduces the
interconnect (PCI), accelerated graphics port (AGP), universal size of files so they require less storage on the computer and
serial bus (USB), and FireWire buses. See also System bus. can be sent more efficiently over the Internet. Examples of such
programs are WinZip and Wizard.
Expansion card: Optional device that plugs into a slot inside
the system unit to expand the computer’s abilities. Ports on the File decompression: Process of expanding a compressed file.
system board allow cables to be connected from the expansion
board to devices outside the system unit.
GLOSSARY 381
File History: A utility program included with many versions Gamepad: An input device designed to be held by two hands
of Windows that makes a copy of all files or selected files that and provide a wide array of inputs including motion, turning,
have been saved onto a disk. stopping, and firing.
File server: Dedicated computer with large storage capac- Gaming laptop: A laptop with high-end graphics hardware
ity providing users access to shared folders or fast storage and and a very fast processor specifically designed to play computer
retrieval of information used in that business. games.
File transfer protocol (FTP): Internet service for uploading Gaming mice: A game controller that provides greater preci-
and downloading files. sion, faster response, programming buttons, and better ergonom-
ics than a traditional mouse.
Filter: (1) A filter blocks access to selected websites. (2) A
filter will locate or display records from a table that fit a set of General ledger: Activity that produces income statements and
conditions or criteria when using programs like Excel. balance sheets based on all transactions of a company.
Firewall: Security hardware and software. All communica- General-purpose application: Application used for doing
tions into and out of an organization pass through a special common tasks, such as browsers and word processors, spread-
security computer, called a proxy server, to protect all systems sheets, databases, management systems, and presentation
against external threats. graphics. Also known as productivity applications.
FireWire bus: Operates much like USB buses on the system Generations (of programming languages): The five genera-
board but at higher speeds. tions are machine languages, assembly languages, procedural
languages, problem-oriented languages, and natural languages.
FireWire port: Used to connect high-speed printers, and even See also Levels.
video cameras, to system unit.
Gesture control: The ability to control operations with finger
First-party cookie: A cookie that is generated and then read movements, such as swiping, sliding, and pinching.
only by the website you are currently visiting.
Gestures: A feature of Mac OS 10.7 that allows the use of
Flash drive: See USB drive. fingers to run programs and to control the content of a display
screen.
Flash memory: RAM chips that retain data even when power
is disrupted. Flash memory is an example of solid-state storage Global positioning system (GPS): Devices that use location
and is typically used to store digitized images and record information to determine the geographic location of your car,
MP3 files. for example.
Flash memory card: A solid-state storage device widely used Gloves: Interactive sensory equipment that collects data from
in notebook computers. Flash memory also is used in a variety your hand movements.
of specialized input devices to capture and transfer data to
desktop computers. Google+: See Google Plus.
Flat-panel monitor: Or liquid crystal display (LCD) monitor. Google Cloud Print: A Google service that supports cloud
These monitors are much thinner than CRTs and can be used printing.
for desktop systems as well.
Google Plus: A combination of some of Google’s previously
Flatbed scanner: An input device similar to a copying machine. existing services with some new services, many of which are
similar to Facebook’s services.
Folder: A named area on a disk that is used to store related
subfolders and files. GPU (graphics processing unit): See Graphics coprocessor.
Foreground: The current program when multitasking or run- Gramm-Leach-Bliley Act: A law that protects personal
ning multiple programs at once. financial information.
Fourth-generation language (4GL): Task-oriented language Graphical user interface (GUI): Special screen that allows
designed to solve a specific problem and requiring little special software commands to be issued through the use of graphic
training on the part of the end user. symbols (icons) or pull-down menus.
Fragmented: Storage technique that breaks up large files and Graphics card: Device that provides high-quality 3D graphics
stores the parts wherever space is available. and animation for games and simulations.
Freedom of Information Act of 1970: Law giving citizens the Graphics coprocessor: Designed to handle requirements
right to examine data about them in federal government files, related to displaying and manipulating 2D and 3D graphic
except for information restricted for national security reasons. images.
Friend: An individual on a list of contacts for an instant mes- Grayscale: The most common black ink selection in which
saging server. images are displayed using many shades of gray.
g Grid chart: Chart that shows the relationship between input
and output documents.
Galleries: Feature of Microsoft Office 2007, 2010, and 2013
that simplifies the process of making selections from a list of Group decision support system (GDSS): System used
alternatives by replacing dialog boxes with visual presentations to support the collective work of a team addressing large
of results. problems.
Game controller: A device that provides input to computer Groups: In Microsoft Word, each tab is organized into groups
games. that contain related items.
Guest operating system: Operating system that operates on
virtual machines.
382 GLOSSARY
h Host: Also called a server or provider, is a large centralized
computer.
Hacker: Person who gains unauthorized access to a computer
system for the fun and challenge of it. Host operating system: Operating system that runs on the
physical machine.
Handwriting recognition software: Translates handwritten
notes into a form that the system unit can process. Hotspot: Wireless access points that provide Internet access
and are often available in public places such as coffee shops,
Hangouts: A service offered through Google Plus, for commu- libraries, bookstores, colleges, and universities.
nicating with up to 10 people at a time.
HTML: See Hypertext Markup Language.
Hard copy: Information presented on paper; also referred to
as printer output. HTML editor: See Web authoring program.
Hard disk: Enclosed disk drive containing one or more metal- Hub: The center or central node for other nodes. This device
lic disks. Hard disks use magnetic charges to record data and can be a server or a connection point for cables from other nodes.
have large storage capacities and fast retrieval times.
Human resources: The organizational department that
Hardware: Equipment that includes a keyboard, monitor, focuses on the hiring, training, and promoting of people, as
printer, the computer itself, and other devices that are con- well as any number of human-centered activities within the
trolled by software programming. organization.
Head crash: When a read-write head makes contact with the Hyperlink: Connection or link to other documents or web
hard disk’s surface or particles on its surface, the disk surface pages that contain related information.
becomes scratched and some or all data is destroyed.
Hypertext Markup Language (HTML): Programming
Header: A typical e-mail has three elements: header, message, language that creates document files used to display web pages.
and signature. The header appears first and includes addresses,
subject, and attachments. Hypertext transfer protocol secure (https): A widely used
protocol for web traffic and to protect the transfer of sensitive
Headgear: Interactive sensory equipment that collects data information.
from embedded earphones and three-dimensional stereoscopic
screens. i
Headphones: Typically worn around the head providing audio Icons: Graphic objects on the desktop used to represent pro-
output. grams and other files.
Headsets: Audio-output devices connected to a sound card Identity theft: The illegal assumption of someone’s identity
in the system unit. The sound card is used to capture as well as for the purpose of economic gain.
play back recorded sound.
IF-THEN-ELSE structure: Logical selection structure whereby
Health Insurance Portability and Accountability Act (HIPAA): one of two paths is followed according to IF, THEN, and ELSE
A federal law that protects medical records. statements in a program. See also Selection structure.
Help: A feature in most application software providing options IFPS (interactive financial planning system): A 4GL language
that typically include an index, a glossary, and a search feature used for developing financial models.
to locate reference information about specific commands.
Illusion of anonymity: The misconception that being selective
Hexadecimal system (hex): Uses 16 digits to represent binary about disclosing personal information on the Internet can pre-
numbers. vent an invasion of personal privacy.
Hi def (high definition): The next generation of optical disc, Illustration program: Also known as drawing programs; used
with increased storage capacity. See also BD (Blu-ray disc). to create digital illustrations and modify vector images and thus
create line art, 3D models, and virtual reality.
Hierarchical database: Database in which fields or records are
structured in nodes. Organized in the shape of a pyramid, and Image editor: An application for modifying bitmap images.
each node is linked directly to the nodes beneath it. Also called
one-to-many relationship. Immersive experience: Allows the user to walk into a virtual
reality room or view simulations on a virtual reality wall.
Hierarchical network: See Tree network.
Incognito mode: A privacy mode available from the Google
High Definition Multimedia Interface (HDMI) port: Port that Chrome browser.
provides high-definition video and audio, making it possible to
use a computer as a video jukebox or an HD video recorder. Income statement: A statement that shows a company’s
financial performance, income, expenses, and the difference
Higher level: Programming languages that are closer to the between them for a specific time period.
language humans use.
Individual database: Collection of integrated records used mainly
History file: Created by the browser to store information on by just one person. Also called personal computer database.
websites visited by your computer system.
Information: Data that has been processed by a computer
Hits: The sites that a search engine returns after running a system.
keyword search, ordered from most likely to least likely to con-
tain the information requested. Information broker: See Information reseller.
Home network: LAN network for homes allowing different Information reseller: Also known as information broker. It
computers to share resources, including a common Internet gathers personal data on people and sells it to direct marketers,
connection. fund-raisers, and others, usually for a fee.
GLOSSARY 383
Information system: Collection of hardware, software, people, Intrusion detection system (IDS): Using sophisticated statisti-
data, and procedures that work together to provide information cal techniques to analyze all incoming and outgoing network
essential to running an organization. traffic, this system works with firewalls to protect an organiza-
tion’s network.
Information systems manager: Oversees the work of pro-
grammers, computer specialists, systems analysts, and other Inventory: Material or products that a company has in stock.
computer professionals.
Inventory control system: A system that keeps records of the
Information technology (IT): Computer and communication number of each kind of part or finished good in the warehouse.
technologies, such as communication links to the Internet, that
provide help and understanding to the end user. iOS: Previously known as iPhone OS, mobile operating sys-
tem developed for Apple’s iPhone, iPod Touch, and iPad.
Information utility: See Commercial database.
IP address (Internet Protocol address): The unique numeric
Information worker: Employee who creates, distributes, and address of a computer on the Internet that facilitates the deliv-
communicates information. ery of e-mail.
Infrared: Uses infrared light waves to communicate over short IP telephony: See Telephony.
distances. Sometimes referred to as line-of-sight communication
because light waves can only travel in a straight line. iPhone OS: See iOS.
Inkjet printer: Printer that sprays small droplets of ink at high IT security analyst: Person responsible for maintaining the
speed onto the surface of the paper, producing letter-quality security of a company’s network, systems, and data. Employ-
images, and can print in color. ers look for candidates with a bachelor’s or associate’s degree
in information systems or computer science and network
Input: Any data or instructions used by a computer. experience.
Input device: Piece of equipment that translates data into a j
form a computer can process. The most common input devices
are the keyboard and the mouse. JavaScript: A scripting language that adds basic interactivity
to web pages.
Instant messaging (IM): A program allowing communication
and collaboration for direct, “live” connections over the Internet Joystick: Popular input device for computer games. You con-
between two or more people. trol game actions by varying the pressure, speed, and direction
of the joystick.
Integrated circuit: See Silicon chip.
k
Interactive whiteboard: See Digital whiteboard.
Key: Another term for encryption key.
Internal data: Data from within an organization consisting
principally of transactions from the transaction processing Key field: The common field by which tables in a database are
system. related to each other. This field uniquely identifies the record.
For example, in university databases, a key field is the Social
Internal hard disk: Storage device consisting of one or more Security number. Also known as primary key.
metallic platters sealed inside a container. Internal hard disks
are installed inside the system cabinet of a personal computer. Keyboard: Input device that looks like a typewriter keyboard
It stores the operating system and major applications like Word. but has additional keys.
Internet: A huge computer network available to everyone Keystroke logger: Also known as computer monitoring soft-
with a personal computer and a means to connect to it. It is the ware and sniffer programs. They can be loaded onto your com-
actual physical network made up of wires, cables, and satellites puter without your knowledge.
as opposed to the web, which is the multimedia interface to
resources available on the Internet. Knowledge base: A system that uses a database containing
specific facts, rules to relate these facts, and user input to for-
Internet of Things (IoT): Continuing development of the mulate recommendations and decisions.
Internet that allows everyday objects embedded with electronic
devices to send and receive data over the Internet. Knowledge-based systems: Programs duplicating human
knowledge. A type of artificial intelligence that uses a database
Internet scam: Using the Internet, a fraudulent act or opera- to provide assistance to users.
tion designed to trick individuals into spending their time and
money for little or no return. Knowledge work system (KWS): Specialized information sys-
tem used to create information in a specific area of expertise.
Internet security suite: Collection of utility programs
designed to make using the Internet easier and safer. Knowledge worker: Person involved in the creation of infor-
mation, such as an engineer or a scientist.
Internet service provider (ISP): Provides access to the Internet.
l
Internet telephony: See Telephony.
Land: See Lands and pits.
Interpreter: Software that converts a procedural language one
statement at a time into machine language just before the state- Lands and pits: Flat and bumpy areas, respectively, that repre-
ment is executed. No object code is saved. sent 1s and 0s on the optical disc surface to be read by a laser.
Intranet: Like the Internet, it typically provides e-mail, mail-
ing lists, newsgroups, and FTP services, but it is accessible only
to those within the organization. Organizations use intranets to
provide information to their employees.
384 GLOSSARY
Language translator: Converts programming instructions into m
a machine language that can be processed by a computer.
Mac OS: Operating system designed for Macintosh
Laptop: A small, portable system unit that contains electronic computers.
components, selected secondary storage devices, and input
devices. Mac OS X: Macintosh operating system featuring a user
interface called Aqua.
Laptop computer: Portable computer, also known as a note-
book computer, weighing between 4 and 10 pounds. Machine language: Language in which data is represented in
1s and 0s. Most languages have to be translated into machine
Laptop keyboard: Almost all laptops have attached keyboards language for the computer to process the data. Either a com-
and screens. piler or an interpreter performs this translation.
Laser printer: Printer that creates dotlike images on a drum, Magnetic card reader: A card reader that reads encoded
using a laser beam light source. information from a magnetic strip on the back of a card.
Levels: Generations or levels of programming languages rang- Magnetic-ink character recognition (MICR): Direct-entry
ing from “low” to “high.” See also Generations (of programming scanning devices used in banks. This technology is used to
languages). automatically read the numbers on the bottom of checks.
Light-emitting diode (LED): A technology for flat-panel Mainboard: See Motherboard or System board.
monitors that have a more advanced backlighting technology.
They produce better-quality images, are slimmer, and are more Mainframe computer: This computer can process several
environmentally friendly as they require less power and use m illion program instructions per second. Sizable organizations
fewer toxic chemicals to manufacture. Most new monitors rely on these room-size systems to handle large programs and a
are LED. great deal of data.
Link: A connection to related information. Maintenance programmer: Programmer who maintains
software by updating programs to protect them from errors,
LinkedIn: The premier business-oriented social networking improve usability, standardize, and adjust to organizational
site. changes.
Linux: Type of UNIX operating system initially developed by Malware: Short for malicious software.
Linus Torvalds, it is one of the most popular and powerful alter-
natives to the Windows operating system. MAN: See Metropolitan area network.
Liquid crystal display (LCD): A technology used for flat-panel Management information system (MIS): Computer-based
monitors. information system that produces standardized reports in a
summarized and structured form. Generally used to support
Local area network (LAN): Network consisting of computers middle managers.
and other devices that are physically near each other, such as
within the same building. Many-to-many relationship: In a network database, each child
node may have more than one parent node and vice versa.
Location: For browsers to connect to resources, locations or
addresses must be specified. Also known as uniform resource Marketing: The organizational department that plans, prices,
locators or URLs. promotes, sells, and distributes an organization’s goods and
services.
Logic error: Error that occurs when a programmer has used
an incorrect calculation or left out a programming procedure. Mass storage: Refers to the tremendous amount of secondary
storage required by large organizations.
Logic structure: Programming statements or structures called
sequence, selection, or loop that control the logical sequence in Mass storage devices: Devices such as file servers, RAID sys-
which computer program instructions are executed. tems, tape libraries, optical jukeboxes, and more.
Logical operation: Comparing two pieces of data to see MaxiCode: A code widely used by the United Parcel Service
whether one is equal to (=), less than (<), or greater than (>) (UPS) and others to automate the process of routing packages,
the other. tracking in-transit packages, and locating lost packages.
Logical view: Focuses on the meaning and content of the Media: Media are the actual physical material that holds the
data. End users and computer professionals are concerned with data, such as a hard disk, which is one of the important charac-
this view as opposed to the physical view, with which only spe- teristics of secondary storage. Singular of media is medium.
cialized computer professionals are concerned.
Medium: See Media.
Loop structure: Logic structure in which a process may be
repeated as long as a certain condition remains true. This struc- Medium band: Bandwidth of special leased lines, used mainly
ture is called a “loop” because the program loops around or with minicomputers and mainframe computers.
repeats again and again.
Megabits per second (Mbps): The transfer rate of millions of
Low bandwidth: See Voiceband. bits per second.
Lower level: Programming language closer to the language Memory: Memory is contained on chips connected to the
the computer itself uses. The computer understands the 0s and system board and is a holding area for data instructions and
1s that make up bits and bytes. information (processed data waiting to be output to secondary
storage). RAM, ROM, and CMOS are three types of memory
LTE (Long Term Evolution): A wireless standard, comparable chips.
to WiMax.
Menu: List of commands.
GLOSSARY 385
Menu bar: Menus are displayed in a menu bar at the top of Mouse: Device that typically is moved across the desktop and
the screen. directs the cursor on the display screen.
Mesh network: A topology requiring each node to have Mouse pointer: Typically in the shape of an arrow.
more than one connection to the other nodes so that if a path
between two nodes is disrupted, data can be automatically Multicore processor: A new type of chip that provides two or
rerouted around the failure using another path. more separate and independent CPUs.
Message: The content portion of e-mail correspondence. Multidimensional database: Data can be viewed as a cube
having three or more sides consisting of cells. Each side of the
Methods: Instructions for retrieving or manipulating attribute cube is considered a dimension of the data; thus, complex rela-
values in an object-oriented database. tionships between data can be represented and efficiently ana-
lyzed. Sometimes called a data cube and designed for analyzing
Metropolitan area network (MAN): These networks are used large groups of records.
as links between office buildings in a city.
Multifunctional devices (MFD): Devices that typically com-
Microblog: Publishes short sentences that only take a few sec- bine the capabilities of a scanner, printer, fax, and copying
onds to write, rather than long stories or posts like a traditional machine.
blog.
Multimedia messaging service (MMS): Supports the sending
Microprocessor: The central processing unit (CPU) of a per- of images, video, and sound using text messaging.
sonal computer controls and manipulates data to produce infor-
mation. The microprocessor is contained on a single integrated Multitasking: Operating system that allows a single user to
circuit chip and is the brains of the system. Also known as a run several application programs at the same time.
processor.
Multitouch screen: Can be touched with more than one fin-
Microwave: Communication using high-frequency radio ger, which allows for interactions such as rotating graphical
waves that travel in straight lines through the air. objects on the screen with your hand or zooming in and out by
pinching and stretching your fingers.
Middle management: Middle-level managers deal with con-
trol and planning. They implement the long-term goals of the Musical instrument digital interface (MIDI): A standard
organization. that allows musical instruments to connect to the system using
MIDI ports.
MIDI: See Musical instrument digital interface.
n
Midrange computer: Refrigerator-sized machines falling in
between personal computers and mainframes in processing Natural language: A fifth-generation computer language
speed and data-storing capacity. Medium-sized companies or (5GL) that allows a person to describe a problem and some con-
departments of large companies use midrange computers. straints, and then request a solution using a common language
like English.
Mini DisplayPort (MiniDP or mDP) port: A port that an
audiovisual device typically uses to connect large monitors. Network: The arrangement in which various communications
These ports are used with many Apple Macintosh computers. channels are connected through two or more computers. The
largest network in the world is the Internet.
Mini notebook: A type of very portable laptop. They are
lighter and thinner and have a longer battery life than other lap- Network adapter card: Connects the system unit to a cable
tops. Also known as ultrabooks or ultraportables. that connects to other devices on the network.
Mini tablets: A type of tablet with a smaller screen. Network administrator: Also known as network manager.
Computer professional who ensures that existing information
Mistaken identity: Occurs when the electronic profile of one and communication systems are operating effectively and that
person is switched with another. new ones are implemented as needed. Also responsible for
meeting security and privacy requirements.
Mobile apps (applications): Add-on features for a variety
of mobile devices, including smartphones, netbooks, and Network architecture: Describes how networks are config-
tablets. ured and how the resources are shared.
Mobile browser: Special browsers designed to run on por- Network attached storage (NAS): Similar to a file server
table devices. except simpler and less expensive. Widely used for home and
small business storage needs.
Mobile operating system: Embedded operating system that
controls a smartphone. Network database: Database with a hierarchical arrangement
of nodes, except that each child node may have more than one
Mobile OS: See Mobile operating system. parent node. Also called many-to-many relationship.
Modem: Short for modulator-demodulator. It is a communica- Network gateway: Connection by which a local area net-
tion device that translates the electronic signals from a com- work may be linked to other local area networks or to larger
puter into electronic signals that can travel over telephone lines. networks.
Modulation: Process of converting digital signals to analog Network interface card (NIC): Also known as a network
signals. adapter card. Used to connect a computer to one or more com-
puters forming a communication network whereby users can
Module: See Program module. share data, programs, and hardware.
Monitor: See Display.
Motherboard: Also called a system board; the communica-
tions medium for the entire system.
Motion-sensing device: An input device that controls games
with user movements.
386 GLOSSARY
Network operating system (NOS): Interactive software Open source: A free and openly distributed software program
between applications and computers coordinating and directing intended to allow users to improve upon and further develop
activities between computers on a network. This operating sys- the program.
tem is located on one of the connected computers’ hard disks,
making that system the network server. Operating system (OS): Software that interacts between appli-
cation software and the computer, handling such details as run-
Network server: This computer coordinates all communica- ning programs, storing and processing data, and coordinating all
tion between the other computers. Popular network operating computer resources, including attached peripheral devices. It is
systems include NetWare and Windows NT Server. See also Net- the most important program on the computer. Windows 7, Win-
work operating system. dows 8, and Mac OS X are examples of operating systems.
Node: Any device connected to a network. For example, a Operational feasibility: Making sure the design of a new sys-
node is a computer, printer, or data storage device and each tem will be able to function within the existing framework of an
device has its own address on the network. Also, within hierar- organization.
chical databases, fields or records are structured in nodes.
Operational model: A decision model that helps lower-level
Notebook computer: See Laptop and Laptop computer. managers accomplish the organization’s day-to-day activities,
such as evaluating and maintaining quality control.
o
Operators: Operators handle correcting operational errors in any
Object: An element, such as a text box, that can be added to a programs. To do that, they need documentation, which lets them
workbook and can be selected, sized, and moved. For example, understand the program, thus enabling them to fix any errors.
if a chart (object) in an Excel workbook file (source file) is
linked to a Word document (destination file), the chart appears Optical carrier (OC): Provides support for very high speed,
in the Word document. In this manner, the object contains both all-digital transmission for large corporations.
data and instructions to manipulate the data.
Optical-character recognition (OCR): Scanning device that
Object code: Machine language code converted by a com- uses special preprinted characters, such as those printed on
piler from source code. Object code can be saved and run utility bills, that can be read by a light source and changed into
later. machine-readable code.
Object-oriented database: A more flexible type of database Optical disc: Storage device that can hold over 17 gigabytes
that stores data as well as instructions to manipulate data and of data, which is the equivalent of several million typewritten
is able to handle unstructured data such as photographs, audio, pages. Lasers are used to record and read data on the disc.
and video. Object-oriented databases organize data using The three basic types of optical discs are compact discs
objects, classes, entities, attributes, and methods. (CDs), digital versatile or video discs (DVDs), and Blu-ray
discs (BDs).
Object-oriented programming (OOP): Methodology in which
a program is organized into self-contained, reusable modules Optical disc drive: A disc is read by an optical disc drive
called objects. Each object contains both the data and process- using a laser that projects a tiny beam of light. The amount
ing operations necessary to perform a task. of reflected light determines whether the area represents a
1 or a 0.
Object-oriented software development: Software develop-
ment approach that focuses less on the tasks and more on Optical-mark recognition (OMR): Device that senses the
defining the relationships between previously defined proce- presence or absence of a mark, such as a pencil mark. As an
dures or objects. example, an OMR device is used to score multiple-choice tests.
Objectives: In programming, it is necessary to make clear Optical mouse: A type of mouse that emits and senses light to
the problems you are trying to solve to create a functional detect mouse movement.
program.
Optical scanner: Device that identifies images or text on a
Office automation system (OAS): System designed primarily page and automatically converts it to electronic signals that can
to support data workers. It focuses on managing documents, be stored in a computer to copy or reproduce.
communicating, and scheduling.
Optimize Drives: A Windows utility that optimizes disk per-
Office software suites: See Productivity suites. formance by eliminating unnecessary fragments and rearrang-
ing files.
Office suites: See Productivity suites.
Organic light-emitting diode (OLED): Replaces LED
One-to-many relationship: In a hierarchical database, each entry monitor’s backlighting technology with a thin layer of organic
has one parent node, and a parent may have several child nodes. compound that produces light.
Online: Being connected to the Internet is described as being Organization chart: Chart showing the levels of management
online. and formal lines of authority in an organization.
Online identity: The information that people voluntarily post Organizational cloud storage: High-speed Internet connection
about themselves online. to a dedicated remote organizational Internet drive site.
Online office suite: Office suite stored online and available OS X Mavericks: Mac operating system announced in 2013
anywhere the Internet can be accessed. that provided better power management and enhanced work-
flow options for multiple monitor setups.
Online processing: See Real-time processing.
OS X Yosemite: Mac operating system released in 2014 that
Online storage: Provides users with storage space that can be provided a new user interface similar to the iOS interface.
accessed from a website.
Output: Processed data or information.
GLOSSARY 387
Output device: Equipment that translates processed informa- Picture element: See Pixel.
tion from the central processing unit into a form that can be
understood by humans. The most common output devices are Pilot approach: Systems implementation in which a new sys-
monitors and printers. tem is tried out in only one part of the organization. Later it is
implemented throughout the rest of the organization.
p
Pit: See Lands and pits.
Packet: Before a message is sent on the Internet, it is broken
down into small parts called packets. Each packet is then sent Pixel (picture element): Smallest unit on the screen that
separately over the Internet. At the receiving end, the packets can be turned on and off or made different shades. Pixels are
are reassembled into the correct order. individual dots that form images on a monitor. The greater the
resolution, the more pixels and the better the clarity.
Page layout program: See Desktop publishing program.
Pixel pitch: The distance between each pixel on a monitor.
Parallel approach: Systems implementation in which old and
new systems are operated side by side until the new one has Plagiarism: Representation of some other person’s work and
shown it is reliable. ideas as your own without giving credit to the original source.
Parallel processing: Used by supercomputers to run large and Plagiarist: Someone who engages in plagiarism.
complex programs.
Platform: The operating system. Application programs are
Parent node: Node one level above the node being considered designed to run with a specific platform. See also Operating system.
in a hierarchical database or network. Each entry has one par-
ent node, although a parent may have several child nodes. Also Platform scanner: Handheld direct-entry device used to read
called one-to-many relationship. special characters on price tags. Also known as wand reader.
Password: Special sequence of numbers or letters that limits Platter: Rigid metallic disk; multiple platters are stacked one
access to information, such as electronic mail. on top of another within a hard-disk drive.
Password managers: Programs that help users create, use, Plotter: Special-purpose output device for producing bar charts,
and recall strong passwords. maps, architectural drawings, and three-dimensional illustrations.
Patches: Programming modifications or corrections. Plug and Play: Set of hardware and software standards devel-
oped to create operating systems, processing units, expansion
Payroll: Activity concerned with calculating employee cards, and other devices that are able to configure themselves.
paychecks. When the computer starts up, it will search for the Plug and
Play device and automatically configure it to the system.
PC: See Personal computer.
Plug-in: Program that is automatically loaded and operates as
PCI Express (PCIe): New type of bus that is 30 times faster part of a browser.
than PCI bus.
Podcast: An Internet-based medium for delivering music and
Peer-to-peer (P2P) network: Network in which nodes can act movie files from the Internet to a computer.
as both servers and clients. For example, one personal com-
puter can obtain files located on another personal computer Pointer: For a monitor, a pointer is typically displayed as an
and also can provide files to other personal computers. arrow and controlled by a mouse. For a database, a pointer is a
connection between a parent node and a child node in a hierar-
People: End users who use computers to make themselves chical database.
more productive.
Pointers: Within a network database, pointers are additional
Periodic report: Reports for a specific time period as to connections between parent nodes and child nodes. Thus, a
the health of the company or a particular department of the node may be reached through more than one path and can be
company. traced down through different branches.
Personal area network (PAN): A type of wireless network that Pointing device: A device that provides an intuitive interface
works within a very small area—your immediate surroundings. with the system unit by accepting pointing gestures and con-
verting them into machine-readable input.
Personal computer: Small, low-cost computer designed for
individual users. These include desktop computers, laptops, Port: Connecting socket on the outside of the system unit.
and mobile devices. Used to connect input and output devices to the system unit.
Personal computer database: See Individual database. Portable language: Language that can be run on more than
one type of computer.
Personal laser printer: Inexpensive laser printer widely used
by single users to produce black-and-white documents. Portable scanner: A handheld device that slides across an
image to be scanned, making direct contact.
Phased approach: Systems implementation whereby a new
system is implemented gradually over a period of time. Power supply unit: Desktop computers have a power supply
unit located within the system unit that plugs into a standard
Phishing: An attempt to trick Internet users into thinking a wall outlet, converting AC to DC, which becomes the power to
fake but official-looking website or e-mail is legitimate. drive all of the system unit components.
Photo editor: See Image editor. Preliminary investigation: First phase of the systems life cycle.
It involves defining the problem, suggesting alternative systems,
Physical security: Activity concerned with protecting hard- and preparing a short report.
ware from possible human and natural disasters.
Presentation file: A file created by presentation graphics pro-
Physical view: This focuses on the actual format and location grams to save presentation materials. For example, a file might
of the data. See also Logical view. contain audience handouts, speaker notes, and electronic slides.
388 GLOSSARY
Presentation graphics: Graphics used to combine a variety of software development, is a six-step procedure for creating that
visual objects to create attractive and interesting presentations. list of instructions. The six steps are program specification, pro-
gram design, program code (or coding), program test, program
Primary key: See Key field. documentation, and program maintenance.
Primary storage: Holds data and program instructions for Programming language: A collection of symbols, words, and
processing data. It also holds processed information before it is phrases that instruct a computer to perform a specific task.
output. See also Memory.
Project manager: Software that enables users to plan, sched-
Printer: Device that produces printed paper output. ule, and control the people, resources, and costs needed to com-
plete a project on time.
Privacy: Computer ethics issue concerning the collection and
use of data about individuals. Property: Computer ethics issue relating to who owns data
and rights to software.
Privacy mode: A browser feature that eliminates history files
and blocks most cookies. Protocol: Rules for exchanging data between computers. The
protocol http:// is the most common.
Private Browsing: A privacy mode provided by Safari. See also
Privacy mode. Prototyping: Building a model or prototype that can be modi-
fied before the actual system is installed.
Procedural language: Programming language designed to
focus on procedures and how a program will accomplish a spe- Proxy server: Computer that acts as a gateway or checkpoint
cific task. Also known as 3GL or third-generation language. in an organization’s firewall. See also Firewall.
Procedures: Rules or guidelines to follow when using hard- Pseudocode: An outline of the logic of the program to be writ-
ware, software, and data. ten. It is the steps or the summary of the program before you
actually write the program for the computer. Consequently, you
Processing rights: Refers to which people have access to what can see beforehand what the program is to accomplish.
kind of data.
Purchase order: A form that shows the name of the company
Processor: See Central processing unit. supplying the material or service and what is being purchased.
Production: The organizational department that actually Purchasing: Buying of raw materials and services.
creates finished goods and services using raw materials and
personnel. q
Productivity suites: Also known as office suites; contain Query-by-example: A specific tool in database management
professional-grade application programs, including word that shows a blank record and lets you specify the information
processing, spreadsheets, and more. A good example is needed, like the fields and values of the topic you are looking to
Microsoft Office. obtain.
Program: Instructions for the computer to follow to process Query language: Easy-to-use language and understandable
data. See also Software. to most users. It is used to search and generate reports from a
database. An example is the language used on an airline reser-
Program analysis: See Program specification. vation system.
Program coder: See Application generator. r
Program definition: See Program specification. RAID system: Several inexpensive hard-disk drives connected
to improve performance and provide reliable storage.
Program design: Creating a solution using programming
techniques, such as top-down program design, pseudocode, RAM: See Random-access memory.
flowcharts, logic structures, object-oriented programming, and
CASE tools. Random-access memory (RAM): Volatile, temporary storage
that holds the program and data the CPU is presently process-
Program documentation: Written description of the purpose ing. It is called temporary storage because its contents will
and process of a program. Documentation is written within the be lost if electrical power to the computer is disrupted or the
program itself and in printed documents. Programmers will c omputer is turned off.
find themselves frustrated without adequate documentation,
especially when it comes time to update or modify the program. Rapid applications development (RAD): Involves the use of
powerful development software and specialized teams as an
Program flowchart: Flowchart graphically presents a detailed alternative to the systems development life cycle approach.
sequence of steps needed to solve a programming problem. Time for development is shorter and quality of the completed
systems development is better, although cost is greater.
Program maintenance: Activity of updating software to cor-
rect errors, improve usability, standardize, and adjust to organi- Raster: See Bitmap image.
zational changes.
Read-only: Optical disc format that does not allow a disc to be
Program module: Each module is made up of logically related written on or erased by the user.
program statements. The program must pass in sequence from
one module to the next until the computer has processed all Read-only memory (ROM): Refers to chips that have pro-
modules. grams built into them at the factory. The user cannot change
the contents of such chips. The CPU can read or retrieve the
Program specification: Programming step in which objectives, programs on the chips but cannot write or change information.
output, input, and processing requirements are determined.
Programmer: Computer professional who creates new soft-
ware or revises existing software.
Programming: A program is a list of instructions a com-
puter will follow to process data. Programming, also known as
GLOSSARY 389
ROM stores programs that boot the computer, for example. s
Also called firmware.
Sales order processing: Activity that records the demands of
Real-time operating system (RTOS): See Embedded operating customers for a company’s products or services.
system.
Satellite: This type of communication uses satellites orbit-
Real-time processing: Or online processing. Occurs when ing about 22,000 miles above the earth as microwave relay
data is processed at the same time a transaction occurs. stations.
Record: Each row of information in a database is a record. Satellite connection services: Connection services that use
Each record contains fields of data about some specific item, satellites and the air to download or send data to users at a rate
like employee name, address, phone, and so forth. A record seven times faster than dial-up connections.
represents a collection of attributes describing an entity.
Scam: A fraudulent or deceptive act or operation designed to
Recordable (R): Optical disc format that allows a disc to be trick individuals into spending their time and money for little
written on once. Also known as write-once disc. or no return.
Redundant arrays of inexpensive disks (RAID): Groups of Scanner: See Optical scanner.
inexpensive hard-disk drives related or grouped together using
networks and special software. They improve performance by Scanning devices: Convert scanned text and images into a
expanding external storage. form that the system unit can process.
Relation: A table in a relational database in which data ele- Schema: See Data dictionary.
ments are stored in rows and columns.
SD Card: Type of expansion card designed for laptops, tab-
Relational database: A widely used database structure in lets, and smartphones.
which data is organized into related tables. Each table is made
up of rows called records and columns called fields. Each record Search engine: Specialized programs assisting in locating
contains fields of data about a specific item. information on the web and the Internet.
Repetition structure: See Loop structure. Search services: Organizations that maintain databases relat-
ing to information provided on the Internet and also provide
Repetitive strain injury (RSI): Any injury that is caused by search engines to locate information.
fast, repetitive work that can generate neck, wrist, hand, and
arm pain. Secondary storage: Permanent storage used to preserve
programs and data that can be retained after the computer is
Research: The organizational department that identifies, turned off. These devices include hard disks, magnetic tape,
investigates, and develops new products and services. CDs, DVDs, and more.
Resolution: A measurement reflecting the quality of an image. Secondary storage device: These devices are used to save,
back up, and transport files from one location or computer to
Rewritable (RW): Optical disc format that allows a disc to be another. See also Secondary storage.
written to multiple times.
Sector: Section shaped like a pie wedge that divides the tracks
RFID (radio-frequency identification) reader: A device used on a disk.
to read radio-frequency identification information.
Secure file transfer protocol (SFTP): See File transfer protocol.
RFID tags: Microchips that contain electronically stored infor-
mation and can be embedded in items such as consumer prod- Security: The protection of information, hardware, and
ucts, driver’s licenses, passports, etc. software.
Ribbon GUI: An interface that uses a system of ribbons, tabs, Security suites: A collection of utility programs designed to
and galleries to make it easier to find and use all the features of protect your privacy and security while you are on the web.
an application.
Selection structure: Logic structure that determines which of
Ribbons: Feature of Microsoft Office 2007, 2010, and 2013 two paths will be followed when a program must make a deci-
that replaces menus and toolbars by organizing commonly used sion. Also called IF-THEN-ELSE structures. IF something is
commands into a set of tabs. true, THEN do option one, or ELSE do option two.
Ring network: Network in which each device is connected to Semiconductor: Silicon chip through which electricity flows
two other devices, forming a ring. There is no host computer, with some resistance.
and messages are passed around the ring until they reach the
correct destination. Sequential structure: Logic structure in which one program
statement follows another.
Robot network: See Botnet.
Server: A host computer with a connection to the Internet
Robots: Typically use cameras, microphones, and other sen- that stores document files used to display web pages. Depend-
sors as inputs. Widely used in factories and other applications ing on the resources shared, it may be called a file server,
involving repetitive actions. printer server, communication server, web server, or database
server.
Rogue Wi-Fi hotspot: Imitation hotspot intended to capture
personal information. Shared laser printer: More expensive laser printer used by a
group of users to produce black-and-white documents. These
Role playing game (RPG): Computer game in which players printers can produce over 30 pages a minute.
assume persona of one of the game’s actors.
Signature: Provides additional information about a sender
ROM: See Read-only memory. of an e-mail message, such as name, address, and telephone
number.
Router: A node that forwards or routes data packets from one
network to their destination in another network.
390 GLOSSARY
Silicon chip: Tiny circuit board etched on a small square Spam filter: See Spam blocker.
of sandlike material called silicon. Chips are mounted on carrier
packages, which then plug into sockets on the system board. Speakers: Audio-output devices connected to a sound card
in the system unit. The sound card is used to capture as well as
Slot: Area on a system board that accepts expansion cards to play back recorded sound.
expand a computer system’s capabilities.
Specialized applications: Programs that are narrowly focused
Smart card: Type of credit card that contains an embedded on specific disciplines and occupations. Some of the best
microchip to provide added security. known are multimedia, web authoring, graphics, virtual reality,
and artificial intelligence.
Smartphone: A type of cell phone that offers a variety of
advanced functionality, including Internet and e-mail. Specialized search engine: Search engine that focuses on
subject-specific websites.
Smartwatch: A wearable computer that acts as a watch,
fitness monitor, and communication device. Specialized suite: Programs that focus on specialized applica-
tions such as graphics or financial planning.
SMS (short messaging service): Texting or process of sending
a short electronic message using a wireless network to another Spider: Special program that continually looks for new infor-
person. mation and updates a search server’s databases.
Social networking: Using the Internet to connect individuals. Spreadsheet: Computer-produced spreadsheet based on the
traditional accounting worksheet that has rows and columns
Socket: Sockets provide connection points on the system used to present and analyze data.
board for holding electronic parts.
Spy removal programs: Programs such as Spybot and
Soft copy: Output from a monitor. Spysweeper, designed to detect web bugs and monitor software.
Software: Computer program consisting of step-by-step Spyware: Wide range of programs designed to secretly record
instructions, directing the computer on each task it will and report an individual’s activities on the Internet.
perform.
Stand-alone operating system: Also called desktop operating
Software development: See Programming. system; a type of operating system that controls a single desk-
top or notebook computer.
Software development life cycle (SDLC): A six-step procedure
for software development. Star network: Network of computers or peripheral devices
linked to a central computer through which all communications
Software engineer: Programming professional or programmer pass. Control is maintained by polling. The configuration of the
who analyzes users’ needs and creates application software. computers looks like a star surrounding and connected to the
central computer in the middle.
Software environment: Operating system, also known as soft-
ware platform, consisting of a collection of programs to handle Start screen: Offered in Windows 8 consisting of tiles to link
technical details depending on the type of operating system. to applications.
For example, software designed to run on an Apple computer is
compatible with the Mac OS environment. Storage area network (SAN): An architecture that links
remote computer storage devices such as enterprise storage
Software piracy: Unauthorized copying of programs for per- systems to computers so that the devices are available as locally
sonal gain. attached drives.
Software platform: See Software environment. Storage device: Hardware that reads data and programs from
storage media. Most also write to storage media.
Software suite: Individual application programs that are sold
together as a group. Strategic model: A decision model that assists top managers
in long-range planning, such as stating company objectives or
Software updates: Patches in which modifications to the soft- planning plant locations.
ware are typically more extensive and significant.
Strategy: A way of coordinating the sharing of information
Solid-state drive (SSD): Designed to be connected inside and resources. The most common network strategies are termi-
a microcomputer system the same way an internal hard disk nal, peer-to-peer, and client/server networks.
would be but contains solid-state memory instead of magnetic
disks to store data. Streaming: See Webcast.
Solid-state storage: A secondary storage device that has no Structured program: Program that uses logic structures
moving parts. Data is stored and retrieved electronically directly according to the program design and the language in which you
from these devices, much as they would be from conventional have chosen to write the program. Each language follows tech-
computer memory. niques like pseudocode, flowcharts, and logic structures.
Sort: Tool that rearranges a table’s records numerically or Structured programming techniques: Techniques consisting
alphabetically according to a selected field. of top-down program design, pseudocode, flowcharts, and logic
structures.
Source code: Occurs when a programmer originally writes
the code for a program in a particular language. This is called Structured query language (SQL): A program control lan-
source code until it is translated by a compiler for the computer guage used to create sophisticated database applications for
to execute the program. It then becomes object code. requesting information from a database.
Spam: Unwelcome and unsolicited e-mail that can carry Stylus: Penlike device used with tablets and PDAs that uses
attached viruses. pressure to draw images on a screen. A stylus interacts with the
computer through handwriting recognition software.
Spam blocker: Also referred to as spam filter. Software that
uses a variety of different approaches to identify and eliminate
spam or junk mail.
GLOSSARY 391
Subject: Located in the header of an e-mail message; a one- Systems design report: Report prepared for higher manage-
line description used to present the topic of the message. ment describing alternative designs, presenting costs versus
benefits, and outlining the effects of alternative designs on the
Supercomputer: Fastest calculating device ever invented, organization.
processing billions of program instructions per second. Used by
very large organizations like NASA. Systems development: Phase four of the systems life cycle,
consisting of developing software, acquiring hardware, and test-
Supervisor: Manager responsible for managing and monitor- ing the new system.
ing workers. Supervisors have responsibility for operational
matters. Systems implementation: Phase five of the systems life cycle
is converting the old system to the new one and training people
Switch: The center or central node for other nodes. This to use the new system. Also known as conversion.
device coordinates the flow of data by sending messages
directly between sender and receiver nodes. Systems life cycle: The six phases of systems analysis and
design are called the systems life cycle. The phases are pre-
Syntax error: Violation of the rules of a language in which liminary investigation, systems analysis, systems design,
the computer program is written. For example, leaving out systems development, systems implementation, and systems
a semicolon would stop the entire program from working maintenance.
because it is not the exact form the computer expects for that
language. Systems maintenance: Phase six of the systems life cycle
consisting of a systems audit and periodic evaluation.
System: Collection of activities and elements designed to
accomplish a goal. t
System board: Flat board that usually contains the CPU T1: High-speed lines that support all digital communications,
and memory chips connecting all system components to one provide very high capacity, and are very expensive.
another.
T3: Copper lines combined to form higher-capacity options.
System bus: There are two categories of buses. One is the
system bus that connects the CPU to the system board. The Tab: Used to divide the ribbon into major activity areas,
other is the expansion bus that connects the CPU to slots on the with each tab being organized into groups that contain related
system board. items.
System chassis: See System unit. Table (in database): The list of records in a database. Tables
make up the basic structure of a database. Their columns dis-
System flowchart: A flowchart that shows the flow of input play field data and their rows display records. See also Field and
data to processing and finally to output, or distribution of Record.
information.
Tablet: A type of personal computer that contains a thin sys-
System software: “Background” software that enables the tem unit, most of which is the monitor. The best-known tablets
application software to interact with the computer. System soft- are Apple’s iPad, Motorola’s Xoom, and HP’s Slate.
ware consists of the operating system, utilities, device drivers,
and language translators. It works with application software to Tablet computer: See Tablet.
handle the majority of technical details.
Tactical model: A decision model that assists middle-level
System unit: Part of a personal computer that contains the managers to control the work of the organization, such as finan-
CPU. Also known as the system cabinet or chassis, it is the con- cial planning and sales promotion planning.
tainer that houses most of the electronic components that make
up the computer system. Task-oriented language: Programming language that is non-
procedural and focuses on specifying what the program is to
Systems analysis: This second phase of the systems life cycle accomplish. Also known as 4GL or very high level language.
determines the requirements for a new system. Data is collected
about the present system and analyzed, and new requirements Technical feasibility: Making sure hardware, software, and
are determined. training will be available to facilitate the design of a new system.
Systems analysis and design: Six phases of problem-solving Technical writer: Prepares instruction manuals, technical
procedures for examining information systems and improving reports, and other scientific or technical documents.
them.
Telephone: An input and output device for receiving and
Systems analysis report: Report prepared for higher man- sending voice communication.
agement describing the current information system, the
requirements for a new system, and a possible development Telephone line: A transmission medium for both voice and
schedule. data.
Systems analyst: Plans and designs information systems. Telephony: Communication that uses the Internet rather than
traditional communication lines to connect two or more people
Systems audit: A systems audit compares the perfor- via telephone.
mance of a new system to the original design specifications
to determine if the new procedures are actually improving Temporary Internet file: File that has web page content and
productivity. instructions for displaying this content.
Systems design: Phase three of the systems life cycle, consist- Text messaging (texting): The process of sending a short
ing of designing alternative systems, selecting the best system, electronic message typically less than 160 characters using a
and writing a systems design report. wireless network to another person who views the message on
a mobile device, such as a smartphone.
392 GLOSSARY
Thermal printer: Printer that uses heat elements to produce receiving devices and (2) reformatting information for transmis-
images on heat-sensitive paper. sion across the Internet.
Third-generation language (3GL): See Procedural language. Tree network: Also known as a hierarchical network. A topol-
ogy in which each device is connected to a central node, either
Third-party cookie: A cookie generated by an advertising directly or through one or more other devices. The central node
company that is affiliated with the website you are currently is then connected to two or more subordinate nodes that in
visiting. Often also referred to as a tracking cookie. turn are connected to other subordinate nodes, and so forth,
forming a treelike structure.
Thumb keyboard: Small thumb-operated keyboard for smart-
phones and other portable devices. Designed primarily for Trojan horse: Program that is not a virus but is a carrier of
texting and connecting to the web. virus(es). The most common Trojan horses appear as free com-
puter games, screen savers, or antivirus programs. Once down-
Thunderbolt port: A specialty port for high-speed connec- loaded they locate and disable existing virus protection and
tions to up to seven separate devices connected one to another. then deposit the virus.
Tile: Part of the Windows 8 start screen that displays active Troubleshooting program: A utility program that recognizes
content. and corrects computer-related problems before they become
serious. Also called diagnostic program.
Toggle key: These keys turn a feature on or off, like the Caps
Lock key. Tweet: A twitter message.
Toolbar: Bar located typically below the menu bar contain- Twisted-pair cable: Cable consisting of pairs of copper wire
ing icons or graphical representations for commonly used that are twisted together.
commands.
Twitter: The most popular microblogging site that enables you
Top-down analysis method: Method used to identify top-level to add new content from your browser, instant messaging appli-
components of a system, then break these components down cation, or even a mobile phone.
into smaller parts for analysis.
Two-in-one laptop: Laptop that includes a touch screen and
Top-down program design: Used to identify the program’s the ability to fold flat like a tablet computer. It offers the advan-
processing steps, called program modules. The program must tages of a laptop with the convenience of a tablet.
pass in sequence from one module to the next until the com-
puter has processed all modules. u
Top-level domain (TLD): Last part of an Internet address; Ultra-high-definition television (UHDTV): Delivers a much
identifies the geographic description or organizational identi- clearer and more detailed wide-screen picture than regular
fication. For example, using www.aol.com, the .com is the top- HDTV.
level domain code and indicates it is a commercial site. See also
Domain name. Ultrabook: A very portable laptop that is lighter and thinner
with a longer battery life than other laptops.
Top management: Top-level managers are concerned
with long-range (strategic) planning. They supervise middle Ultraportable: See Ultrabook.
management.
Unicode: A 16-bit code designed to support international
Topology: The configuration of a network. The five principal languages, like Chinese and Japanese.
network topologies are ring, bus, star, tree, and mesh.
Uniform resource locator (URL): For browsers to connect you
Touch pad: Used to control the pointer by moving and to resources on the web, the location or address of the resources
tapping your finger on the surface of a pad. must be specified. These addresses are called URLs.
Touch screen: Monitor screen allowing actions or commands Universal Product Code (UPC): A bar code system that identi-
to be entered by the touch of a finger. fies the product to the computer, which has a description and
the latest price for the product.
Tower computer: A desktop system unit placed vertically.
Universal serial bus (USB): Combines with a PCI bus on the
Tower unit: See Tower computer. system board to support several external devices without insert-
ing cards for each device. USB buses are used to support high-
Track: Closed, concentric ring on a disk on which data is speed scanners, printers, and video-capturing devices.
recorded. Each track is divided into sections called sectors.
Universal serial bus (USB) port: These ports have replaced
Tracking cookies: See Third-party cookie. serial and parallel ports. They are faster, and one USB port can
be used to connect several devices to the system unit.
Traditional keyboard: Full-sized, rigid, rectangular keyboard
that includes function, navigational, and numeric keys. UNIX: An operating system originally developed for midrange
computers. It is now important because it can run on many of
Transaction processing system (TPS): System that records the more powerful personal computers.
day-to-day transactions, such as customer orders, bills, inven-
tory levels, and production output. The TPS tracks operations Uplink: To send data to a satellite.
and creates databases.
Uploading: Process of transferring information from the
Transfer rate: Or transfer speed, is the speed at which c omputer the user is operating to a remote computer.
modems transmit data, typically measured in bits per
second (bps). USB drive: The size of a key chain, these hard drives connect
to a computer’s USB port enabling a transfer of files.
Transmission control protocol/Internet protocol (TCP/IP):
TCP/IP is the standard protocol for the Internet. The essential
features of this protocol involve (1) identifying sending and
GLOSSARY 393
User: Any individual who uses a computer. See also End user. Virus: Hidden instructions that migrate through networks
and operating systems and become embedded in different
User interface: Means by which users interact with applica- programs. They may be designed to destroy data or simply to
tion programs and hardware. A window is displayed with infor- display messages.
mation for the user to enter or choose, and that is how users
communicate with the program. Voice over IP (VoIP): Transmission of telephone calls over net-
works. See also Telephony.
Utility: Performs specific tasks related to managing computer
resources or files. Norton Utility for virus control and system Voice recognition system: Using a microphone, sound card,
maintenance is a good example of a utility. Also known as ser- and specialty software, the user can operate a computer and
vice programs. create documents using voice commands.
Utility suite: A program that combines several utilities in one Voiceband: Bandwidth of a standard telephone line. Also
package to improve system performance. known as low bandwidth.
v VR: See Virtual reality.
Vector illustration: See Vector image. w
Vector image: Graphics file made up of a collection of objects WAN: See Wide area network.
such as lines, rectangles, and ovals. Vector images are more
flexible than bitmaps because they are defined by mathemati- Wand reader: Special-purpose handheld device used to read
cal equations so they can be stretched and resized. Illustration OCR characters.
programs create and manipulate vector graphics. Also known
as vector illustrations. Warm boot: Restarting your computer while the computer is
already on and the power is not turned off.
Very high level languages: Task-oriented languages that
require little special training on the part of the user. Wearable device: A type of mobile computer such as Apple’s
Watch that contains an embedded computer chip. Also known
VGA (Video Graphic Adapter) port: A type of port that pro- as a wearable device.
vides a connection to an analog monitor.
Web: Prior to the introduction of the web in 1992, the Internet
Video editor: Program for editing videos to enhance their was all text. The web made it possible to provide a multimedia
quality and appearance. interface that includes graphics, animations, sound, and video.
Video game design software: Program for organizing and pro- Web 1.0: The first generation of the web, which focused on
viding guidance for the entire game design process including linking existing information.
character development and environmental design.
Web 2.0: The second generation of the web, which evolved to
Videoconferencing system: Computer system that allows support more dynamic content creation and social interaction.
people located at various geographic locations to have in-person
meetings. Web 3.0: The third generation of the web, which focuses on
computer-generated information requiring less human interac-
Virtual keyboard: Displays an image of a keyboard on a tion to locate and to integrate information.
touch-screen device. The screen functions as the actual input
device, which is why the keyboard is considered virtual. Web auction: Similar to traditional auctions except that all
transactions occur over the web; buyers and sellers seldom meet
Virtual machine: A software implementation of a computer face to face.
that executes programs like a physical computer.
Web authoring: Creating a website.
Virtual memory: Feature of an operating system that
increases the amount of memory available to run programs. Web authoring program: Word processing program for gen-
With large programs, parts are stored on a secondary device erating web pages. Also called HTML editor or web page editor.
like your hard disk. Then each part is read in RAM only when Widely used web authoring programs include Adobe Dream-
needed. weaver and Microsoft FrontPage.
Virtual private network (VPN): Creates a secure private con- Web-based e-mail system: An e-mail system that does not
nection between a remote user and an organization’s internal require an e-mail program to be installed on your computer.
network. Special VPN protocols create the equivalent of a
dedicated line between a user’s home or laptop computer and a Web-based file transfer services: A type of file transfer service
company server. that uses a web browser to upload and download files, allowing
you to copy files to and from your computer across the Internet.
Virtual reality (VR): Interactive sensory equipment (headgear
and gloves) allowing users to experience alternative realities Web bug: Program hidden in the HTML code for a web page
generated in 3D by a computer, thus imitating the physical or e-mail message as a graphical image. Web bugs can migrate
world. whenever a user visits a website containing a web bug or opens
infected e-mail. They collect information on the users and
Virtualization: A process that allows a single physical com- report back to a predefined server.
puter to support multiple operating systems that operate
independently. Web log: A type of personal website where articles are regu-
larly posted.
Virtualization software: Software that creates virtual
machines. Web page: Browsers interpret HTML documents to display
web pages.
Web page editor: See Web authoring program.
394 GLOSSARY
Web suffix: Identifies type of organization in a URL. Wireless access point: Or base station. The receiver interprets
incoming radio frequencies from a wireless LAN and routes
Web utilities: Specialized utility programs making the Inter- communications to the appropriate devices, which could be
net and the web easier and safer. Some examples are plug-ins separate computers, a shared printer, or a modem.
that operate as part of a browser and filters that block access
and monitor use of selected websites. Wireless charging platform: Recharging device for laptops,
tablets, and wearable computers that does not require a con-
Webcam: Specialized digital video camera for capturing necting cable.
images and broadcasting to the Internet.
Wireless communication: The revolutionary way we now
Webcast: An Internet delivery medium that uses streaming communicate on devices like tablets, smartphones, and wear-
technology, in which audio and video files are continuously able devices.
downloaded to a computer while the user is listening to and/or
viewing the file content. Wireless LAN (WLAN): Uses radio frequencies to connect
computers and other devices. All communications pass through
Webmail: E-mail that uses a webmail client. the network’s centrally located wireless receiver or base station
and are routed to the appropriate devices.
Webmail client: A special program that runs on an e-mail pro-
vider’s computer that supports webmail. Wireless modem: Typically a small plug-in USB or Express-
Card device that provides very portable high-speed connectivity
Webmaster: Develops and maintains websites and web from virtually anywhere.
resources.
Wireless mouse: See Cordless mouse.
Wheel button: Some mice have a wheel button that can be
rotated to scroll through information displayed on the monitor. Wireless network card: Allows computers to be connected
without cables.
Wide area network (WAN): Countrywide and worldwide
networks that use microwave relays and satellites to reach users Wireless network encryption: Restricts access to authorized
over long distances. users on wireless networks.
Wi-Fi (wireless fidelity): Wireless standard also known as 802.11, Wireless revolution: A revolution that is expected to dramatically
used to connect computers to each other and to the Internet. affect the way we communicate and use computer technology.
Wiki: A website that allows people to fill in missing informa- Wireless wide area network (WWAN) modem: See Wireless
tion or correct inaccuracies on it by directly editing the pages. modem.
Wikipedia: An online encyclopedia, written and edited by Word: The number of bits (such as 16, 32, or 64) that can be
anyone who wants to contribute. accessed at one time by the CPU.
WiMax (Worldwide Interoperability for Microwave Word processor: The computer and the program allow you to
Access): Technology that extends Wi-Fi networks to operate create, edit, save, and print documents composed of text.
over greater distances.
Worksheet file: Created by electronic spreadsheets to analyze
Window: A rectangular area containing a document or things like budgets and to predict sales.
message.
Worm: Virus that doesn’t attach itself to programs and data-
Windows: An operating environment extending the capabil- bases but fills a computer system with self-replicating information,
ity of DOS. clogging the system so that its operations are slowed or stopped.
Windows 8: OS from 2012 that is designed to better integrate WPA2 (Wi-Fi Protected Access): A secure encryption protocol.
Microsoft’s desktop OS with its mobile OS. It provides support
for gestures, cloud integration, and apps. Write-once: See Recordable.
Windows Mobile 10: A mobile operating system introduced WWW (World Wide Web): Provides a multimedia interface
in 2015 to replace Windows 8. It is able to run many powerful to the Internet. Also known as the web.
programs designed for desktop and laptop computers.
WYSIWYG (what you see is what you get) editors: Web
Windows 10: OS from 2015 that merged Windows’ desktop authoring programs that build a page without requiring direct
and mobile operating systems. It introduced Cortana, a digital interaction with the HTML code and then preview the page
assistant that can accept commands through text or speech. described by the HTML code.
Windows Phone 8: Introduced in 2012 by Microsoft to sup- z
port a variety of mobile devices including smartphones. It has
the ability to run many powerful programs designed for desk- Zombie: A computer infected by a virus, worm, or Trojan
top and laptop computers. horse that allows it to be remotely controlled for malicious
purposes.
Windows RT: A version of Windows 8 designed to run with
tablets using a particular microprocessor from ARM.
GLOSSARY 395
Subject Index
1G (first-generation mobile Advanced Research Project Agency Appszoom, 76
telecommunications), 201 Network (ARPANET), 28 Arithmetic-logic unit (ALU), 120
Arithmetic operations, 120
2G (second-generation mobile Agile development, 342 ARPANET, 28
telecommunications), 201 AJAX, 33 ASCII (American Standard Code for
Aldebaran Robotics, 350
3D printer, 154 All-in-one, 116, 117 Information Interchange), 130
3D scanner, 146 ALU, 120 Aspect ratio, 149
3D UHDTV, 151 Amazon Kindle, 150, 152 Assembly language, 346
3G (third-generation mobile Amazon Prime, 30 Asymmetric digital subscriber line
amazon.com/cloud, 181
telecommunications), 201 American Standard Code for (ADSL), 201
3GL (third-generation language), ATM withdrawal (real-time
Information Interchange
346–347 (ASCII), 130 processing), 281
4G (fourth-generation mobile Analog signal, 129, 200 AT&T, 201
Analyzing the data, 308–309 Attribute, 279, 287
telecommunications), 201 Android, 94 Auction fraud, 234
4GL (fourth-generation Animation, 69 Audi, 49
Annual forecast and analysis, 68 Audio-input devices, 148
language), 347 annualcreditreport.com, 233 Audio-output devices, 155
5GL (fifth-generation language), 348 Anonymity on the web, 227, 242 Augmented Reality, 79
32-bit-word computer, 121 Antispyware, 230 Augmented reality display, 162
64-bit-word computer, 121 Antivirus programs, 9, 97, 232 AutoCorrect, 66
802.11ac, 199 App, 74–75, 86 Automated design tools, 309
802.11ax, 199 App store, 75, 76 Autonomic computing, 105
802.11g, 199 Apple App Store, 75, 76 Autonomic Computing Initiative
802.11n, 199 Apple FileMaker, 70
Apple Health App, 47 (ACI), 105
a Apple iWork, 76 Avast! Free Antivirus, 232
Apple Keynote, 69 AVG AntiVirus FREE, 9
A Series, 121 Apple Numbers, 67 AVG Family Safety, 35
AC adapter, 128 Apple Pages, 64 Azure, 239
Access, 225 Applet, 33
Access data dictionary form, 283 Application generation subsystem, b
Access data entry form, 283 282–283
Access speed, 175 Application generator, 348 B2B, 45
Accessing other people’s private Application software, 8, 60–87 B2C, 44
categories, 62 Back and neck pain, 159
networks, 211 common features, 64 Backbone, 209
Accounting, 255, 259, 260 database management system Background, 92
Accounting applications, 74 Backup software, 239
Accounts receivable, 260 (DBMS), 70, 71 Balance sheet, 260
Accuracy, 225 defined, 62 Bandwidth, 202
Acquiring hardware, 312 general-purpose applications, Bar code, 146
Acquiring software, 312 Bar code reader, 146
Acrobat Reader, 34 64–70 Bar code scanner, 146
Active display area, 149 graphics programs, 70–72 Barnes & Noble Nook, 150, 152
Activity Monitor, 98–99, 112 mobile apps, 74–75 Base station, 207
Activity tracker, 118 presentation graphics, 69 Baseband, 202
Ad-Aware, 230 software suites, 76 Basic input/output system
Additive manufacturing, 154 specialized applications,
Address, 33 (BIOS), 123
Adobe Dreamweaver, 73 70–74 Batch processing, 280
Adobe Illustrator, 72 spreadsheet, 67–68 BD (Blu-Ray disc), 180
Adobe InDesign, 70 user interface, 62–64 Beta testing, 341
Adobe Photoshop, 72 video game design software, 73 Big data, 225
ADSL (asymmetric digital web authoring programs, 73 Binary numbers, 129
word processor, 64–66 Binary system, 129
subscriber line), 201
Advance fee loan (Internet
scam), 234
396
Bing, 43 programmer, 349 Communications and networks,
Biometric scanning, 235 software engineer, 77 194–221
BIOS (basic input/output systems analyst, 316
technical writer, 161 basic elements of computer
system), 123 webmaster, 48 system, 197–198
Bird Species Identification, 266 Carpel tunnel syndrome, 160
Bit, 121, 129 Cascading style sheet (CSS), 33 communication channel, 198–200
Bit-patterned media (BPM), 186 CASE tools, 309, 344, 345 connection devices, 200–202
Bitdefender, 103 CBS News, 30 data transmission, 202–204
Bitmap, 72 CD, 179 network, 204–206
BitTorrent, 35 CD-R, 180 network architecture, 208–210
BlackBerry thumb, 161 Cell, 67, 199 network types, 206–208
Blocking cookies, 228, 229 Cell tower, 199 organizational network, 210–212
Blog, 41 Cellular communication, 199 Compact disc (CD), 179
Blog creation site, 41 Cellular service providers, 201 Company database, 288
Blogger, 41 Center-alignment, 65 Compiler, 347
Blu-Ray disc (BD), 180, 186 Central processing unit (CPU), 120 Compressed files, 177
Blue Gene supercomputer, 10 Chain letter, 234 Computer aided design/computer-
Bluetooth, 155, 199, 207 Changing times (evolution of the
Bookmark, 32 aided manufacturing (CAD/
Booting, 92 computer age), 16 CAM), 265, 266
Botnet, 233 Character, 279 Computer-aided software
BPM (bit-patterned media), 186 Character and mark recognition engineering (CASE) tools, 309,
Brain implant, 131 344, 345
Broadband, 202 devices, 147 Computer-based information
Browser, 32 Character effects, 65 systems, 258–264. See also
Browser cache, 228 Character encoding, 129–130 Information system
Bugs (programming errors), 340, 358 Chart, 68 Computer buyer’s guide, 16
Bus, 124, 209 Child node, 284 Computer communications, 196
Bus lines, 120, 124–125 Chip, 119 Computer crime, 231–234
Bus network, 209 Chip carrier, 119, 120 Computer ethics, 238. See also Ethics
Bus width, 124 Chrome, 32 Computer Fraud and Abuse Act,
Business directories, 290 Chrome OS, 96 231, 233
Business statistical information, 290 Circles, 40 Computer implant in your brain, 131
Business-to-business (B2B), 45 Cisco TelePresence, 213 Computer monitoring software, 229
Business-to-consumer (B2C), 44 Clarity, 149 Computer network, 204–206. See
Buttons, 62 Class, 287 also Communications and
Byte, 121, 129 Client, 46, 205 networks
Client-based e-mail system, 38 Computer programmer, 349
c Client/server network, 210 Computer security, 231. See also
Cloud-based backup, 239, 249 Security
C++, 339 Cloud computing, 15, 46–47, 76, Computer support specialist, 104
C2C, 44–45 Computer technician, 130
Cable, 126 180, 317 Computer virus, 9, 103, 231, 232
Cable modem, 200, 201 Cloud printer, 154 Confidentiality, 193. See also Privacy
Cable service, 201 Cloud storage, 180–183, 192, 193 Connection devices, 197, 200–202
Cache memory, 122 Cloud storage services, 181, 239 Connection services, 200–202
CAD/CAM, 265, 266 Cloud suite, 76 Connectivity, 14, 196
CAN-SPAM, 38 CNN, 30 Consumer-to-consumer (C2C),
Capacity, 175 Coaxial cable, 198 44–45
Caps Lock key, 143 Code-generation assistance, 345 Contextual tabs, 63
Caption, 66 Code review, 340 Contrast ratio, 149
Carbonite Personal Backup Plans, 239 Coding, 338 Control unit, 120
Card reader, 146 Cold boot, 92 Conversion, 313
Careers .com, 33 Cookies, 228, 229
Combination input and output Coprocessor, 121
computer programmer, 349 Copyright, 240
computer support specialist, 104 devices, 155–159 Cordless mouse, 144
computer technician, 130 Combination keys, 143 Corel Presentations, 69
disaster recovery specialist, 185 Commercial database, 289 Corel Quattro Pro, 67
information system manager, 266 Common data item, 285 Corel WordPerfect, 64
IT security analyst, 241 Communication channel, CorelDRAW, 72
network administrator, 212 CorelDRAW Graphics Suite X6, 76
198–200 Cortana, 95, 148
Communication devices, 12
Communication system, 197–198
SUBJECT INDEX 397
Cortex-A series, 121 strategic uses, 290 Digital whiteboard, 151
CPU (central-processing unit), 120 text, 290 DIMM (dual in-line memory
Cracker, 231 web, 290
Credit card companies, 225 Database administrator (DBA), module), 122
Credit monitoring, 233 Direct approach, 313
Criminal database, 292 283, 291 Directory server, 205
Crossy Road, 75 Database file, 13 Disaster management, 237–238
Cryptoprocessor, 121, 138 Database management system Disaster recovery plan, 238
CSS, 33 Disaster recovery specialist, 185
Ctrl key, 143 (DBMS), 70, 71, 282 Disk caching, 176–177
Curved monitor, 150 Database manager, 70 Disk Cleanup, 101
Cyberbullying, 234 Database model, 284 Display screen, 149. See also Monitor
Cybercrime, 231–234 Database security, 290–291, 300 Disposal of computer hardware,
Cylinder, 175 DBA (database administrator),
120, 138
d 283, 291 Distributed database, 289
Dban, 233 DNS (domain name server), 204
Dark Web, 234, 250 DBMS, 70, 71, 282 DO WHILE structure, 337
Data, 13, 262, 278 DBMS engine, 282 Document, 64
Data administration subsystem, 283 DBMS organization, 284–288 Document file, 13
Data analysis, 308–309 DBMS software, 282–283 Document scanner, 146
Data bank, 289 DBS (deep brain stimulation), 131 Document theme, 69
Data center, 317 Debugging, 340 Documentation, 342
Data cube, 286 Decision model, 262–263 Domain name, 33
Data definition subsystem, 282 Decision support system (DSS), 258, Domain name server (DNS), 204
Data dictionary, 282, 283 DoS (denial of service) attack, 233
Data encryption, 236–237 262–263 Dot pitch, 149
Data flow diagram, 309, 310 Dedicated server, 205 Dots per inch (dpi), 153
Data flow diagram symbols, 310 Deep brain stimulation (DBS), 131 Double-sided disc, 180
Data integrity, 281, 282 Defining the problem, 306–307 Double-sided DVD, 180
Data loss, preventing, 238 Defragment, 102 Dow Jones Interactive Publishing, 289
Data maintenance, 282 Deleting browsing history, 229 Downlink, 199
Data manipulation and security, 233 Demand report, 261 Downloading, 35
Data manipulation subsystem, 282 Demodulation, 200 dpi (dots per inch), 153
Data mining, 290 Demographic data, 290 DPS (data processing system), 259
Data organization, 279–281 Denial of service (DoS) attack, 233 Dragon Quest V, 75
Data plan, 203 Density, 175 Drawing program, 72
Data processing system (DPS), 259 Department of Motor Vehicles, 286 drive.google.com, 181
Data redundancy, 281, 282 Desk checking, 340 DRM (digital rights
Data security, 238 Desktop, 92
Data transmission, 202–204 Desktop computer, 11, 116 management), 240
Data transmission Desktop operating system, 93, 95–97 Drone, 156, 225, 249
Desktop publishing program, 70 Dropbox, 181–183
specifications, 198 Device driver, 90 DS3, 200
Data usage, 203 Diagnostic programs, 97 DSL (digital subscriber line),
Data warehouse, 290 Dial-up service, 201
Data worker, 265 Dialog box, 62, 93 200, 201
Database, 70, 71 Dialog Information Services, 289 DSL (digital subscriber line)
Dictionary attack, 236
advantages, 282 Digital camera, 148, 226 service, 201
commercial, 289 Digital cash, 45 DSS (decision support system),
company, 288 Digital Millennium Copyright Act,
criminal, 292 258, 262–263
defined, 280 240 Dual in-line memory module
distributed, 289 Digital pen, 117
hierarchical, 284–285 Digital projector, 151 (DIMM), 122
individual, 288 Digital rights management Duckduckgo, 43
multidimensional, 286–287 Duplex printing, 153
network, 285 (DRM), 240 DVD, 179–180
object-oriented, 287 Digital signal, 129, 200 DVD-R, 180
personal computer, 288 Digital subscriber line (DSL), DVI (digital video interface) port, 126
relational, 285–286
security, 290–291 200, 201 e
Digital subscriber line (DSL)
E-book, 150–151, 152, 170
service, 201 E-book readers (e-readers), 150, 152
Digital versatile disc (DVD), 179–180 E-commerce, 44–45
Digital video interface (DVI) E-ink, 150
port, 126
398 SUBJECT INDEX
E-learning, 29 Ethernet LAN, 206 FERPA (Family Educational Rights
E-mail, 37–38, 196 Ethernet port, 125, 126 and Privacy Act), 231
Ethics, 24
client-based system, 38 Fiber-optic cable, 198
encryption, 236, 237 cloud storage, 181 Fiber-optic service (FiOS), 201
end-of-chapter discussion, 58 computer virus, 103 Field, 71, 279
spam, 38, 229 copyright, 240 Fifth-generation language (5GL), 348
web-based system, 38 defined, 238 File, 13, 92, 93
E-mail address, 37 eavesdropping tools, 198 File compression, 177
E-mail attachment, 37 electronic monitoring, 198, 220 File compression programs, 97
E-mail client, 38 ethical duties of technology File decompression, 177
E-mail encryption, 236, 237 File encryption, 236, 237
E-reader, 150, 152 companies, 238, 250 File History, 100, 239
Eavesdropping tools, 198 how and where goods produced?, File recovery software, 177
eBay, 45 File server, 185
EBCDIC (Extended Binary Coded 116, 138 File sharing, 208
image editing, 72 File transfer protocol (FTP), 35
Decimal Interchange Code), 130 net neutrality, 240, 250 File transfer utilities, 35
Economic feasibility, 310 plagiarism, 240, 241 Filter, 34–35, 58
Edison (processor), 121 “right to be forgotten” law, Financial institutions, 225
.edu, 33 Financial planning suites, 76
EIS (executive information 230, 249 findlaw.com, 43
shielding children from dangers Fingerprint scan, 235, 291
system), 258 FiOS (fiber-optic service), 201
Electronic books (e-books), 150–151, of Internet, 35 Firefox, 32
webcam, 148, 170 Firewall, 208, 211, 212, 236, 291
152, 170 Evolution of the computer age, 16 FireWire bus, 125
Electronic commerce (e-commerce), Exception report, 261 FireWire port, 126
Executive information system First-generation mobile
44–45
Electronic data and instructions, (EIS), 258 telecommunications (1G), 201
Executive support system (ESS), 258, First-party cookie, 228
129–130 Fitbit, 47
Electronic fingerprint scanner, 291 263–264, 273 Flash drive, 178
Electronic mail, 37. See also E-mail Expansion bus, 124–125 Flash memory, 122–123, 178
Electronic monitoring, 198, 220 Expansion card, 123 Flash memory card, 178, 179
Electronic profile, 225 Expansion slot, 123 Flash Player, 34
Embedded operating system, 93 Expert system, 266 Flat-panel monitor, 150
Employee-monitoring Extended Binary Coded Decimal Flatbed scanner, 146
Flixel, 73
software, 227 Interchange Code (EBCDIC), Flowchart
Encrypted e-mail, 237 130
Encrypting data, 236–237 External data, 262 program, 335, 336
Encryption, 236 External hard drive, 176 system, 309
Encryption key, 236 External serial advanced Flyer, 65
End user, 4 technology attachment Folder, 92, 93
Enterprise storage system, 184 (eSATA) port, 126 Font, 65
Entity, 279 External USB device, 125 Font size, 65
Environment, 24 Extranet, 211, 212 Footer, 66
Eyestrain and headache, 159 Footnote, 66
e-mail, 37 Ford Motor Company, 49
ethical duties of technology f Foreground, 92
Forms, 71
companies, 238, 250 Face Recognition by iNFINITE Formulas, 67
GPS technology, 200 Studios LLC, 235 Fourth-generation language
mobile devices and apps, 74
operating systems, 92 Facebook, 39–40, 41 (4GL), 347
recycling computer hardware, Facebook group, 40 Fourth-generation mobile
Facebook mobile app, 74
120, 138 Facebook Pages, 40 telecommunications (4G), 201
reduce, reuse, recycle, 6 Facebook privacy settings, 40 Fragmentation, 102
storage and energy Facebook Profile, 40 Free antivirus program, 9
FaceTime, 156 Freedom of Information Act, 227
requirements, 178 Fake hotspot, 208 Friend, 39
Erasure software, 233 Family Educational Rights and FTP, 35
Ergonomic keyboard, 160 Function, 67
Ergonomics, 159–161 Privacy Act (FERPA), 231
eSATA port, 126 FastAccess face recognition
ESS (executive support system), 258,
application, 235
263–264, 273 Favorites bar, 32
Ethernet, 206 Femtosecond, 121
Ethernet cable, 126, 198
SUBJECT INDEX 399
Function keys, 143 Google Wallet, 45 High-level procedural language,
Future directions .gov, 33 346–347
GPS, 199, 200, 220
anonymity on the web, 242 GPS navigation, 199 Higher level programming
augmented reality display, 162 GPU (graphics processing unit), 121 language, 346
computer implant in your brain, Gramm-Leach-Bliley Act, 230
Grammar checker, 65 HIPAA (Health Insurance Portability
131 Graphical user interface (GUI), 62, and Accountability Act),
computing devices in 230–231
63, 91
automobiles, 49 Graphics card, 123 History files, 227–228
keeping up-to-date, 317 Graphics coprocessor, 121 historynet.com, 43
next-generation storage, 186 Graphics processing unit (GPU), 121 Hit, 43
next-generation user interfaces, 79 Graphics programs, 70–72 Hologram, 213
programmable robots, 350 Graphics suites, 76 Holography, 213
self-healing computers, 105 Grayscale, 153 HoloLens, 79, 162
telepresence, 213 Grid chart, 309 Home network, 206–207
Watson (supercomputer), 267 Group, 63 Host, 205
Group decision support system Host operating system, 97
g Hotmail, 38
(GDSS), 263 Hotspot, 207
Galaxy Tab, 151 Guest operating system, 97 hotspot-locations.com, 207
Gallery, 64 GUI, 62, 63, 91 HTML, 33, 73
Game controller, 144, 145 HTML editor, 73
Gamepad, 144, 145 h https, 33, 202, 236
Games, 75 Hub, 205
Gaming laptop, 117 Hacker, 231, 233 Hulu, 30
Gaming mouse, 144, 145 HAMR (heat-assisted magnetic Human resources, 255
GB (gigabyte), 122 Humanoid robots, 350
Gbps, 200 recording), 186 Hyperlink, 33
GDSS (group decision support Handheld wand reader, 147 Hypertext Markup Language
Handwriting recognition software,
system), 263 (HTML), 33, 73
GE Global Research, 186 145 Hypertext transfer protocol secure
General ledger, 260 Hangouts, 40, 156
General-purpose applications, 64–70 Hard copy, 153 (https), 202, 236
Generations of programming Hard disk, 175–177
Hard drive, 186 i
languages, 346–348 Hardware, 4, 5, 10–12
Gesture control, 93 Hardware acquisition, 312 i7 processor, 121
Gigabyte (GB), 122 Hauppauge hybrid WinTV-HVR, 127 IBM, 10, 105, 267
GIMP (GNU Image Manipulation HD 720, 149 iCloud, 96, 239
HD 1080, 149 icloud.com, 181
Program), 72 HDMI cable, 125, 126 Icon, 62, 92
Global positioning system (GPS), HDMI port, 125, 126 Identity theft, 233, 273
Head crash, 176 IDS (intrusion detection
199, 200, 220 Header, 37, 66
Gloves, 159 Headgear, 159 system), 211
Gmail, 38 Headphone, 155 IF-THEN-ELSE structure, 337
GNU Image Manipulation Program Headset, 155 IFPS (interactive financial planning
Health Insurance Portability and
(GIMP), 72 system), 347
Google, 43 Accountability Act (HIPAA), Illusion of anonymity, 227, 242
Google+, 40, 41 230–231 Illustration program, 72
Google Chrome, 228, 229 Heat-assisted magnetic recording IM (instant messaging), 39
Google Cloud Print, 154 (HAMR), 186 Image capturing devices, 147–148
Google Docs, 64, 76, 78, 86 Help, 93 Image editing, 86
Google Drive, 239 Hex digit, 129 Image editor, 72
Google Drive Docs, 181 Hexadecimal system (hex), 129 IMDb (Internet Movie Database),
Google Glass, 162 Hi def (high definition), 180
Google Hangouts, 156 Hidden websites (Dark Web), 299
Google Now, 28, 148 234, 250 Immersive experience, 159
Google Obvibase, 70 Hierarchical database, 284–285 Incognito mode, 228
Google Play, 75, 76 Hierarchical network, 209 Income statement, 260
Google Plus, 40 High definition multimedia interface Individual database, 288
Google Sheets, 67 (HDMI) port, 125, 126 Information, 4
Google Slides, 69 Information broker, 225
Google Street View, 226 Information reseller, 225, 226
Google Translate, 148 Information sharing, 299
400 SUBJECT INDEX
Information system, 4 messaging, 38–39 l
careers (information system microblogs, 41
manager), 266 podcasts, 42 LAN (local area network), 206, 207
decision support system (DSS), social networking, 39–40, 41 LAN adapter, 205
258, 262–263 webcasts, 41–42 Land, 179
executive support system (ESS), wiki, 42 Language translation, 7, 148
258, 263–264 Internet Move Database Language translator, 90
expert system, 266 Laptop, 11, 116–117, 161, 203
knowledge work system, 265 (IMDb), 299 Laptop keyboard, 143
management information system Internet of Things (IoT), Laptop power supply, 128
(MIS), 258, 261 Large databases, 225–227
office automation system (OAS), 265 15, 47 Laser printer, 154
transaction processing system Internet privacy, 227–230 lavasoft.com, 230
(TPS), 258, 259–260 Internet protocol address (IP LCD (liquid crystal display), 150
LED (light-emitting diode), 150
Information system manager, 266 address), 204 Levels of programming languages,
Information technology (IT), 7 Internet scams, 234
Information utility, 289 Internet security suite, 36 346–348
Information worker, 265 Internet service provider (ISP), 32 LexisNexis, 289
Infrared, 200 Internet technologies, 211 Light-emitting diode (LED), 150
Inkjet printer, 153–154, 170 Internet telephony, 156 Link, 33
Inkscape, 72 Interpreter, 347 LinkedIn, 40, 41
Input and output, 140–171 Intranet, 211, 212 Linux, 96, 210
Intrusion detection system Liquid crystal display (LCD), 150
audio-input devices, 148 Local area network (LAN), 206, 207
audio-output devices, 155 (IDS), 211 Location, 33
combination input and output Intuit QuickBooks, 74 Logic error, 340
Inventory, 260 Logic operations, 120
devices, 155–159 Inventory control system, 260 Logic structures, 337
definitions, 142, 149 iOS, 94 Logical data organization, 279
image capturing devices, 147–148 IoT (Internet of Things), 15, 47 Logical view, 278
keyboard entry, 142–143 IP address, 204 Long-range planning, 256
monitors, 149–151 iPad, 94, 151 Long term evolution (LTE), 201–202
pointing devices, 144–145 iPhone, 33, 94 Look to the future. See Future
printers, 153–155 iPhone OS, 94
scanning devices, 146–147 Iris scan, 235 directions
Input devices, 142 iRobot, 350 Loop structure, 337
Instagram, 41 ISP, 32 Low bandwidth, 202
Instagram app, 74 IT (information technology), 7 Lower level programming
Instant messaging (IM), 39 IT security analyst, 241
Intego Personal Antispam, 38 iTunes Music Store, 240 language, 346
Integrated circuit, 119 LTE (long term evolution), 201–202
Interactive financial planning system j
m
(IFPS), 347 Java, 339
Interactive whiteboard, 151 JavaScript, 33, 339 Mac OS, 95–96
Internal data, 262 Joystick, 144, 145 Mac OS X, 8, 96, 97
Internal hard disk, 176 Mac OS X Mavericks, 96
Internet, 14, 26–59 k Mac OS X Server, 210
Mac OS X Yosemite, 96
access to, 32–33, 203 Kaspersky, 103 Machine language, 346
cloud computing, 46–47 Kaspersky Anti-Virus, 230 Magnetic card reader, 146
communication, 37–42 Keeping up-to-date, 317 Magnetic-ink character recognition
e-commerce, 44–45 Key field, 280
evaluating website content, 43–44 Keyboard, 142–143, 160, 236 (MICR), 147
historical overview, 28 Keyboard shortcuts, 32 Mainboard, 119
physical network, 28 Keystroke logger, 229 Mainframe computer, 10
privacy, 227–230 Kindle, 150, 152 Maintenance programmer, 342
scams, 234 Kinect motion-sensing device, 144, Making IT Work for You, 23
search tools, 43–44
uses, 29 145 antivirus program, 9
web utilities, 34–36 Knowledge base, 266 cloud-based backup, 239
Internet access, 32–33, 203 Knowledge-based system, 266 cloud storage, 182–183
Internet communication, 37–42 Knowledge work system, 265 Google Docs, 78
blogs, 41 Knowledge worker, 265 MAC OS X Activity Monitor,
e-mail, 37–38 Kodi, 127
98–99
SUBJECT INDEX 401
Making IT Work for You—Cont. Microwave dish, 199 Netflix app, 74
mobile Internet, 203 Middle management, 256, 257 Network, 204–206. See also
online entertainment, 30–31 Middle managerial-level information
Skype, 157–158 Communications and networks
TV tuner, 127 flow, 257 Network adapter card, 123
MIDI port, 126 Network administrator, 206, 212
Malicious programs, 9, 231–233 Midrange computer, 10–11 Network architecture, 208–210
Malicious software, 231 Midwives Assistant, 266 Network attached storage
Malware, 231 .mil, 33
MAN (metropolitan area network), Mini DisplayPort (MiniDP) port, 126 (NAS), 185
Mini notebook, 117 Network database, 285
208 Mini tablet, 117 Network gateway, 206
Management information system MiniDP port, 126 Network interface card (NIC), 123, 205
MIS (management information Network operating system (NOS),
(MIS), 258, 261
Management information system system), 258, 261 93, 206
Mistaken identity, 227 Network security, 211
report, 261 MMS (multimedia messaging Network server, 93
Managerial levels, 256 Network strategy, 208, 210
Many-to-many relationship, 285 service), 38 Network topology, 208, 209–210
Marketing, 255 Mobile applications, 74 Network types, 206–208
Mass storage, 184 Mobile apps, 74–75 Next-generation storage, 186
Mass storage device, 184–185 Mobile browser, 33 Next-generation user interfaces, 79
Mavericks, 96 Mobile hotspot device, 203 NIC (network interface card),
MaxiCode, 146 Mobile Internet, 203, 220
MB (megabyte), 122 Mobile operating system, 94 123, 205
Mbps, 200 Mobile OS, 94 Node, 204, 205, 284
McAfee Family Protection, 35 Modem, 200, 201 Nook Simple Touch, 150, 152
McAfee Internet Security, 35 Modulation, 200 Norton AntiVirus, 97
mDP port, 126 Module, 334 Norton Internet Security, 35, 76
Media, 175 Moneytree Software’s TOTAL Norton Online Family, 35
Medium band, 202 Norton SystemWorks, 76
Megabits per second (Mbps), 200 Planning Suite, 76 Norton Utilities, 103
Megabyte (MB), 122 Monitor, 149–151 NOS (network operating system),
Memory, 122–123 Monitor resolution, 149
Memory capacity, 122 Monthly credit card statements 93, 206
Menu, 62, 93 Numeric keypad, 143
Menu bar, 62 (batch processing), 280 Numeric representation, 129
Mesh network, 209–210 Motherboard, 119
Message, 37 Motion-sensing device, 144, 145 o
Messaging, 38–39 Mouse, 144
Metallofullerenes, 186 Mouse pointer, 144 OAS (office automation system), 265
Methods, 287 Multicore processor, 121 Object, 287, 345
Metropolitan area network Multidimensional database, 286–287 Object code, 347
Multifunctional device (MFD), 156 Object-oriented database, 287
(MAN), 208 Multimedia messaging service Object-oriented programming
MFD (multifunctional device), 156
MICR (magnetic-ink character (MMS), 38 (OOP), 345
Multitasking, 92 Object-oriented software
recognition), 147 Multitouch screen, 144
Microblog, 41 Musical instrument digital interface development, 344–345
Microprocessor, 120–121 Objectives, 332
Microprocessor chips, 121 (MIDI) port, 126 OC (optical carrier), 200
Microsecond, 121 MyFord Touch, 49 OCR (optical-character recognition),
Microsoft Access, 70, 71, 282, 347
Microsoft Excel, 67, 68 n 147
Microsoft Expression Web, 73 Office for iPad, 76, 77
Microsoft HoloLens, 79 Nanosecond, 121 Office software suite, 76
Microsoft Office, 76 Nao robot, 350 Office suite, 76
Microsoft Office 365, 76 NAS (network attached storage), 185 Oil Spill Advisor, 266
Microsoft PowerPoint, 69 National crime database, 292 OLED (organic light-emitting diode),
Microsoft Project, 74, 265 Natural language, 348
Microsoft Publisher, 70 Navigation keys, 143 150
Microsoft Security Essentials, 232 NBC, 30 OMR (optical-mark recognition), 147
Microsoft Windows, 95 .net, 33 One-to-many relationship, 284
Microsoft Word, 64–66 Net Nanny, 35 Online, 28
Microwave communication, 199 Net neutrality, 240, 250 Online entertainment, 30–31, 57
Netflix, 30 Online identity, 230
Online office suite, 76
Online processing, 281
402 SUBJECT INDEX
Online storage, 181 Page layout program, 70 Preliminary investigation, 306–307
OOP (object-oriented PaintShop Pro, 72 Presentation file, 13
PAN (personal area network), 207 Presentation graphics, 69
programming), 345 Pandora, 31, 49, 74 Pretty Good Privacy, 236
Open source, 96 Parallel approach, 313 Preventing data loss, 238
OpenOffice, 76 Parallel processing, 121 Prezi, 69
OpenOffice Base, 70 Parent node, 284 Price Check app, 75, 147
OpenOffice Calc, 67 Password, 235–236 Primary key, 71, 280
OpenOffice Impress, 69 Password manager, 236 Primary storage, 174
OpenOffice Writer, 64 Patches, 342 Printer, 153–155, 170
Operating system, 91–94 Pay-as-you go services, 31 Privacy, 23, 224–231
payments.amazon.com, 45
categories, 93 PayPal, 45 accessing other people’s private
defined, 91 Payroll, 260 networks, 211
desktop, 95–97 PC (personal computer), 11, 116–118
features, 92–93 PCI Express (PCIe), 125 anonymity on the web, 227, 242
functions, 91–92 Pebble OS, 93 cookies, 228, 229
mobile, 94 Peer-to-peer (P2P) network, 210 cryptoprocessor, 121, 138
Operating system power People, 4 Dark Web, 234, 250
Performance enhancement deleting data, 177
management, 112 drones, 225, 249
Operating system security, 112 techniques, 177 Internet, and, 227–230
Operational feasibility, 311 Periodic report, 261 large databases, 225–227
Operational model, 263 Personal area network (PAN), 207 legislation, 230–231
Operator, 342 Personal computer (PC), 11, 116–118 mobile phone, 75
Optical carrier (OC), 200 Personal computer database, 288 personal privacy in public
Optical-character recognition Personal computer hardware, 11–12
Personal financial applications, 74 spaces, 226
(OCR), 147 Personal laser printer, 154 principal issues, 225
Optical disc, 179–180 Personal privacy in public printers and anonymity, 155, 170
Optical disc drive, 179 private network, 227
Optical-mark recognition spaces, 226 social networking, 40, 227
Phased approach, 314 software development, 358
(OMR), 147 Phishing, 234 spreading inaccurate
Optical mouse, 144 Photo editor, 72
Optical scanner, 146 Physical connections information, 227
Optimize Drives, 102 spreading information without
.org, 33 (communication channel), 198
Organic light-emitting diode Physical security, 237–238 personal consent, 226
Physical view, 278 spyware, 229–230
(OLED), 150 Picosecond, 121 stolen/lost smartphone, 95
Organization, 16 Picture Password, 235 Privacy mode, 228
Pilot approach, 313 Private browsing, 228
functions, 254–255 Pinterest, 41 Private network, 227
information flow, 257–258 Pit, 179 Problem definition, 306–307
information systems. See Pixel, 72, 149 Procedural language, 346–347
Pixel pitch, 149 Processing rights, 283
Information system PixelSense, 79 Processing speeds, 121
levels of management, 256 Plagiarism, 240, 241, 250 Processor, 120
Organization chart, 308 Plagiarist, 240 Production, 255
Organizational cloud storage, 185 Platform scanner, 146 Productivity suite, 76
Organizational functions, 255 Platter, 175 Professional recovery services, 178
Organizational information flow, Plotter, 155 Program, 330
Plug-in, 34 Program analysis, 332
257–258 Podcast, 42 Program code, 338, 339
Organizational intranet, 211, 212 Pointer, 62, 92 Program coder, 348
Organizational network, 210–212 Pointing devices, 144–145 Program definition, 332
OS power management, 112 Port, 125–126 Program design, 334–337
OS X Activity Monitor, 98–99, 112 Portable computer, 161 Program documentation, 342
OS X Mavericks, 96 Portable language, 346 Program flowchart, 335, 336
OS X Yosemite, 96 Portable scanner, 146 Program maintenance, 343–344
Output, 149. See also Input and Posture, sitting, 160 Program module, 334
Power supply unit, 128 Program objectives, 332
output PowerPoint, 69 Program specification, 332–333
Output devices, 149 Program specifications
p document, 333
P2P network, 210
Packet, 204
Packetization, 204
SUBJECT INDEX 403
Program test, 340–341 RAM chips, 122 Scanning devices, 146–147
Programmable robots, 350 Random-access memory (RAM), 122 Schema, 282, 283
Programmer, 331, 342, 349 Rapid applications development scholar.google. com, 43
Programming and languages, SD card, 124
(RAD), 315 SDLC (software development life
328–359 Raster, 72
careers (computer programmer), Read-only disc, 180 cycle), 330, 331
Read-only memory (ROM), 122 Seagate, 186
349 Reader, 34 Search engine, 43, 225
CASE tools, 344, 345 Reader/sorter, 147 Search services, 43
generations of programming Real-time operating system Search tools, 43–44
Second-generation mobile
languages, 346–348 (RTOS), 93
object-oriented software Real-time processing, 281 telecommunications (2G), 201
recipebridge.com, 43 Second storage media, 175
development, 344–345 Record, 71, 279 Secondary storage, 12, 172–193
program code, 338, 339 Recordable (R) disc, 180
program design, 334–337 Recovery/undelete storage, 178 characteristics, 175
program documentation, 342 Recuva, 178 cloud storage, 180–183
program maintenance, 343–344 Recycling computer hardware, 120, environmental considerations, 178
program specification, 332–333 hard disk, 175–177
program test, 340–341 138 mass storage device, 184–185
security/privacy, 358 Reduce, reuse, recycle, 6 next-generation storage, 186
six programming steps, 331, 344 Redundant arrays of inexpensive optical disc, 179–180
widely used programming permanent/nonvolatile
disks (RAID), 177
languages, 339 Relation, 285 storage, 174
Programming errors, 340, 358 Relational database, 285–286 solid-state storage, 178
Programming generations, 346–348 ReNaChip, 131 Secondary storage devices, 174
Programming language, 338, 339, Repetition structure, 337 Sector, 102, 175
Repetitive strain injury (RSI), 160 Secure data deletion, 177, 192
346–348 Report, 66 Secure deletion utility, 177
Project Glass, 162 Research, 255 Secure file transfer protocol
Project management software, 74 Resolution
Project manager, 265 (SFTP), 35
Property, 225 monitor, 149 Security, 231–238
Protocol, 33, 202–204 printer, 153
Prototyping, 315 Rewritable (RW) disc, 180 careers (IT security analyst), 241
Proxy server, 211, 212 RFID reader, 147 computer crime, 231–234
Pseudocode, 335 RFID (radio-frequency identification) cyberbullying, 234
Purchase order, 260 data, 238
Purchasing, 260 tag, 147 data encryption, 236–237
Ribbon, 63 data manipulation, 233
q Ribbon GUI, 63 database, 290–291, 300
“Right to be forgotten” law, 230, 249 denial of service (DoS) attack, 233
QuarkXPress, 70 Ring network, 209 disaster management, 237–238
Query-by-example, 282 Robot, 156, 213, 350 e-commerce, 45
Query language, 347 Robot network, 233 identity theft, 233
Query wizard, 347 Rogue hotspot, 208, 233 Internet scams, 234
QuiBids, 45 Roku, 31 malicious programs, 231–233
Quicken Starter Edition, 74 Role playing game (RPG), 75 password, 235–236
QuickTime, 34 ROM (read-only memory) 122 physical, 237–238
Qustodio Parental Control, 35 Router, 205 preventing data loss, 238
QWERTY, 142 RSI (repetitive strain injury), 160 protecting computer security,
RTOS (real-time operating
r 235–238
system), 93 restricting access, 235–236
R (recordable) disc, 180 RW (rewritable) disc, 180 rogue Wi-Fi hotspots, 233
RAD (rapid applications software development, 358
s Security suite, 36, 236
development), 315 Selection structure, 337
Radio-frequency identification Sales forecast, 67 Self-healing computers, 105
Sales order processing, 260 Semiconductor, 119
(RFID) tag, 147 SAN (storage area network), 185 Sending and receiving devices, 197
RAID (redundant arrays of Satellite communication, 199 Sequential structure, 337
Satellite connection services, 201 Serena, 315
inexpensive disks), 177 Scam, 234 serve.com, 45
RAID storage device, 177 Scanner, 146 Server, 10–11, 205
RAID system, 185
RAM (random-access memory), 122
404 SUBJECT INDEX
Server operating system, 210 Specialized search engine, 43 System bus, 124
Service provider Specialized suite, 76 System chassis, 116
Specialty processor, 121 System flowchart, 309
cloud computing, 47 Speech recognition, 117 System flowchart symbols, 309
ISP, 32 Spelling checker, 65 System Restore, 100
SFTP, 35 Spider, 43 System software, 7–8, 88–113, 262
Shared laser printer, 154 Spokeo, 225
Sheet name, 68 Spotify, 31, 74 collection or system of
Shopping, 75 Spreadsheet, 67–68 programs, 90
shopstyle.com, 43 Sprint, 201
Short message service (SMS), 38 Spy removal programs, 230 desktop operating system,
Signature, 37 Spyware, 9, 229–230 95–97
Silicon chip, 119 SQL (structured query language),
Silverlight, 34 mobile operating system, 94
Siri, 148 282, 347 operating system, 91–94
Sitting posture, 160 SSD (solid-state drive), 178 types of programs, 90
Six-phase systems life cycle, 305 Stand-alone operating system, 93 utilities, 97–103
skydrive.com, 181 Standard ports, 126 System unit, 11, 12, 114–139
Skype, 156, 157–158, 170 Star network, 209 bus lines, 124–125
Slot, 119–120 Start screen, 95 components, 118
Smart card, 146 Staying up-to-date, 317 defined, 116
Smartphone, 11, 118, 147, 161, 203 Stencyl, 73 expansion slots and cards,
Smartphone bar code reader, 147 Storage, 174. See also Secondary
Smartphone tracking, 86 123–124
Smartwatch, 93, 118 storage memory, 122–123
SMS (short message service), 38 Storage area network (SAN), 185 microprocessor, 120–121
Social networking, 39–40, 41, 57, 74, Storage devices, 175 ports, 125–126
Strategic model, 262–263 power supply, 128
227, 249 Strategic planning, 256 system board, 119–120
Social networking sites, 225, Strategy, 210 System unit components, 118
Streaming, 41, 203 Systems analysis, 308–310
226, 230 Structured program, 338 Systems analysis report, 310
Socket, 119 Structured programming Systems analysis software, 325
Software, 7–8 Systems analyst, 305, 316
techniques, 334 Systems audit, 314
application, 60–87. See also Structured query language (SQL), Systems design, 310–311
Application software Systems design report, 311
282, 347 Systems development, 312–313
defined, 4 Stuxnet worm, 232 Systems implementation, 313
purpose, 4 Stylus, 145 Systems life cycle, 305
system, 88–113. See also System Subscription services, 30–31 Systems maintenance, 314
Supercomputer, 10, 121
software Supervisor, 256, 257 t
Software acquisition, 312 Supervisory-level information
Software development, 330, 358. T1, 200
flow, 257 T3, 200
See also Programming and Surgical robot, 156 T-Mobile, 201
languages Swift, 339 Table, 71, 279
Software development life cycle Switch, 205 Tablet, 11, 117, 150–151, 161, 203
(SDLC), 330, 331 Sync, 49 Tablet computer, 117
Software engineer, 77, 331 Synchronization icon, 183 Tablet hunch, 161
Software environment, 93 Syntax error, 340, 341 Tabs, 63, 92, 93
Software platform, 93 System, 304 Tactical model, 263
Software suite, 76 System analysis and design, Tactical planning, 256
Software update, 342 TB (terabyte), 122
Solaris, 210 302–326 Tbps, 200
Solid-state drive (SSD), 178 careers (systems analyst), 316 TCP/IP (transmission control
Solid-state storage, 12, 178, 193 preliminary investigation,
Source code, 347 protocol/Internet protocol), 202
Source code generator, 358 306–307 Technical feasibility, 311
Spam blocker, 38, 229 steps in process (overview), Technical writer, 161
Spam filter, 38 Telephone, 156
SPAMfighter, 38 305, 315 Telephone line, 198
Speaker, 155 systems analysis, 308–310 Telephony, 156
Specialized applications, 62, 70–74 systems design, 310–311 Telepresence, 213
Specialized portable voice systems development, 312–313 Template, 69
recorders, 148 systems implementation, 313
Specialized ports, 126 systems maintenance, 314 SUBJECT INDEX 405
System board, 119–120
Temporary Internet files, 228 u Virtual machine, 97
Temporary (volatile) storage, 122 Virtual memory, 122
Terabyte (TB), 122 UAV (unmanned aerial vehicle), 156 Virtual private network (VPN),
Testing uBid, 45
UHD 4K, 149 211, 237
beta, 341 UHD 5K, 149 Virtual reality (VR), 159
program, 340–341 UHDTV (ultra-high-definition Virtualization, 97
system, 313 Virtualization software, 97
Text database, 290 television), 151 Virus, 9, 103, 231, 232
Text entries, 67 Ultra-high-definition television Virus protection scams, 103, 112
Text messaging, 38 Visual Basic, 339
Texting, 38, 196 (UHDTV), 151 Voice over IP (VoIP), 156
Thermal printer, 155 Ultrabook, 117 Voice recognition, 49
Third-generation language (3GL), Ultraportable, 117 Voice recognition system, 148
Unauthorized network intrusion, Voiceband, 202
346–347 VoIP, 156
Third-generation mobile 211, 220 Volatile storage, 122
Undelete 360, 178 VPN (virtual private network),
telecommunications (3G), 201 Undelete storage, 178
Third-party cookie, 228 Unicode, 130 211, 237
Thought-controlled prosthetic Uniform resource locator (URL), 33 VR (virtual reality), 159
United Parcel Service (UPS), 146
devices, 131 Unity, 73 w
Thumb keyboard, 143 Universal product code (UPC), 146
Thunderbolt cable, 125, 126 Universal serial bus (USB), 125 wallet.google.com, 45
Thunderbolt port, 125, 126 Universal serial bus (USB) port, 125, WAN (wide area network), 208
Tile, 95 Wand reader, 146, 147
Time Machine, 97, 239 126 Warm boot, 92
Toggle keys, 143 UNIX, 96 Watch OS, 93
Toolbar, 62 Unmanned aerial vehicle (UAV), 156, Watson (supercomputer), 267
Top-down analysis method, Wearable computer, 118
225 Wearable device, 11, 118
308–309 UPC (universal product code), 146 Web, 28. See also Internet
Top-down program design, 334 Uplink, 199 Web 1.0, 28
Top-level domain (TLD), 33 Uploading, 35 Web 2.0, 28
Top management, 256, 257 UPS (United Parcel Service), 146 Web 3.0, 28
Top managerial-level information URL, 33 Web 3.0 application, 29
USB, 125 Web auction, 44–45
flow, 257 USB 3.1, 125 Web authoring, 73
Topology, 209 USB cable, 125, 126 Web authoring programs, 73
Touch pad, 144 USB drive, 178, 179 Web-based e-mail system, 38
Touch screen, 144 USB port, 125, 126 Web-based file transfer services, 35
Tower computer, 116 User, 262, 342 Web browser, 32
Tower unit, 116, 117 User interface, 62, 79, 91 Web bugs, 228–229
TPS (transaction processing system), Utilities, 8, 97–103. See also Web Web database, 290
Web filter, 34–35
258, 259–260 utilities Web log, 41
Track, 102, 175 Utility suites, 76, 103 Web page, 33
Tracking cookies, 228 Web page editor, 73
Tracking viruses, 231, 232 v Web suffix, 33
Traditional keyboard, 143 Web utilities, 34–36
Training, 314 Vacation prize (Internet scam), 234
Transaction processing system (TPS), Vector illustration, 72 file transfer utilities, 35
Vector image, 72 filters, 34–35
258, 259–260 Verizon, 201 Internet security suite, 36
Transfer rate, 200 Very high level language, 347 plug-ins, 34
translate.google.com, 148 VGA (video graphics adapter) Webcam, 148, 170, 226
Transmission control protocol/ Webcast, 41–42
port, 126 Webmail client, 38
Internet protocol (TCP/IP), 202 Video editor, 72 Webmaster, 48
Tree network, 209 Video game design software, 73 webmd.com, 43
Trojan horse, 232 Video graphics adapter (VGA) Webroot SecureAnywhere
Troubleshooting programs, 97
Tumblr, 41 port, 126 AntiVirus, 97
Turnitin, 240, 241 Videoconferencing, 196 Website encryption, 236
TV tuner, 127, 138 Videoconferencing system, 265
Tweet, 41 Viewing history files, 228
Twisted-pair cable, 198 Vine, 41
Twitter, 41 Virtual keyboard, 143
Two-in-one laptop, 117
406 SUBJECT INDEX
What-if analysis, 68 WinTV-HVR, 127 Worm, 232
Wheel button, 144 WinZip, 177 WPA2 (Wi-Fi Protected Access), 237
Wi-Fi (wireless fidelity), 199 Wireless access point, 207 WQXGA, 149
Wi-Fi access points, 203 Wireless charging platform, 128 Write-once disc, 180
Wi-Fi Protected Access (WPA2), 237 Wireless communication, 15 WWAN (wireless wide area network)
Wi-Fi standards, 199 Wireless communication
Wide area network (WAN), 208 model, 200
Widely used programming devices, 14 WWW, 28
Wireless connections, 199 WYSIWYG (what you see is what
languages, 339 Wireless keyboard, 117
Wiki, 42 Wireless LAN (WLAN), 207 you get) editor, 73
Wikipedia, 42 Wireless modem, 200, 201
WiMax (worldwide interoperability Wireless mouse, 144 y
Wireless network card, 124
for microwave access), 199 Wireless network encryption, 237 Yahoo!, 43
Window, 62, 92, 93 Wireless revolution, 197 Yahoo!Mail, 38
Windows, 95 Wireless wide area network Yoga mats, 255
Windows 8, 95, 97 Yosemite, 96
Windows 10, 8, 95 (WWAN) model, 200 YouTube, 42
Windows 10 Mobile, 94 WLAN (wireless LAN), 207 YouTube app, 74
Windows Defender, 230 Word, 121 YouTube Video Editor, 72
Windows File History, 100 Word processor, 64–66 YoYo GameMaker, 73
Windows key, 143 WordPress, 41
Windows Live Movie Maker, 72 Workbook, 68 z
Windows Phone 8, 94 Worksheet, 67
Windows Photo Gallery, 72 Worksheet file, 13 .zip file, 97
Windows RT, 95 World Wide Web, 28 Zoho, 76
Windows Server, 210 Worldwide interoperability for Zombie, 233
Windows utilities, 100–102
microwave access (WiMax), 199
SUBJECT INDEX 407