Information Storage and Retrieval Systems Terminology

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Motherboard

The motherboard serves to connect all of the parts of a computer together. The CPU, memory, hard drives, optical drives, video card, sound card and other ports and expansion cards all connect to the motherboard directly or via cables.The motherboard is the piece of computer hardware that can be thought of as the "back bone" of the PC.

Core Memory

The old term for main memory, which was composed of doughnut-shaped magnets called cores. Core memory, or more accurately magnetic core memory is a random access memory (RAM) system that was developed at MIT by Jay Forrester in 1951. It was initially very expensive to fabricate but prices dropped as the market developed.

Operation Code

The part or parts of a machine language instruction which determines what kind of action the computer should take, e.g. add, jump, load, store. In any particular instruction set certain fixed bit positions within the instruction word contain the op code, others give parameters such as the addresses or registers involved. For example, in a 32-bit instruction the most significant eight bits might be the op code giving 256 possible operations. For some instruction sets, certain values in the fixed bit positions may select a group of operations and the exact operation may depend on other bits within instruction word or subsequent words. When programming in assembly language, the op code is represented by a readable name called an instruction mnemonic.

Bit Stream Image

A Bit stream image is a sector-by-sector / bit-by-bit copy of a hard drive. A bit stream image is actually a set of files that can be used to create an exact copy of a hard drive, preserving all latent data in addition to the files and directory structures. A bit stream image can be read by the majority of the tools used by the Center for Computer Forensics to analyze the hard drive such as Encase, FTK, ProDiscover and many others. By utilizing the bit-stream image, the Center for Computer Forensics takes no risk of contaminating the original evidence.

DIMM

A DIMM (dual in-line memory module) is a double SIMM (single in-line memory module). Like a SIMM, it's a module containing one or several random access memory ( RAM ) chips on a small circuit board with pins that connect it to the computer motherboard . A SIMM typically has a 32 data bit (36 bits counting parity bits) path to the computer that requires a 72-pin connector. For synchronous dynamic RAM ( SDRAM ) chips, which have a 64 data bit connection to the computer, SIMMs must be installed in in-line pairs (since each supports a 32 bit path). A single DIMM can be used instead. A DIMM has a 168-pin connector and supports 64-bit data transfer. It is considered likely that future computers will standardize on the DIMM.

PC Blade

A PC Blade is a form of client or personal computer (PC). In conjunction with a client access device (usually a thin client) on a user's desk, the supporting PC Blade is typically housed in a rack enclosure, usually in a data center or specialised environment. Together, they accomplish many of the same functions of a traditional PC, but they also take advantage of many of the architectural achievements pioneered by blade servers.

Suspense File

A Suspense file used to maintain information (transactions, payments or other events) until the proper disposition of that information can be determined.

Peripherals

A computer devive, such as a CD-ROM drive or printer, that is not part of the essential computer, i.e., the memory and microprocessor. Peripherals devices can be external such as a mouse, keyboard, printer, monitor, external Zip drive or scanner or internal, such as a CD-ROM drive, CD-R drive or internal modem. Internal peripherals devices are often referred to as integrated peripherals.

Problem

Anything causing an incident or interrupt in a system is called a problem.

Coding

Coding, in computer terms, is the process of writing, assembling, and compiling computer code. Code is simply the instructions for hardware and software. HTML is a kind of computer code or language that you can use to create your own web pages.

CISI Collection

Collection composed of 1460 documents that are selected from an ISI assembled collection.

Archives

An archives is a collection of computer files that have been packaged together for backup, to transport to some other location, for saving away from the computer so that more hard disk storage can be made available, or for some other purpose. An archives can include a simple list of files or files organized under a directory or catalog structure (depending on how a particular program supports archiving).

Imaging

Imaging is the representation or reproduction of an object's outward form, especially a visual representation (i.e., the formation of an image).

Implement

Implement is the realization of an application, or execution of a plan, idea, model, design, specification, standard, algorithm, or policy.Many implementations may exist for a given specification or standard. For example, web browsers contain implementations of World Wide Web Consortium-recommended specifications, and software development tools contain implementations of programming languages.

Collision Avoidance

In computer networking and telecommunication, collision avoidance methods try to avoid resource contention by attempting to avoid simultaneous attempts to access the same resource.Collision avoidance methods include prior scheduling of timeslots, carrier detection schemes, randomized access times, and exponential backoff after collision detection.

Channel I/O

In computer science, channel I/O is a high-performance input/output (I/O) architecture that is implemented in various forms on a number of computer architectures, especially on mainframe computers. In the past they were generally implemented with a custom processor, variously named channel, peripheral processor, I/O processor, I/O controller, or DMA controller.

DASD

DASD, pronounced DAZ-dee (Direct access storage device), is a general term for magnetic disk storage devices. The term has historically been used in the mainframe and minicomputer (mid-range computer) environments and is sometimes used to refer to hard disk drives for personal computers. A redundant array of independent disks (RAID) is also a type of DASD.

Data Availability

Data availability is a term used by some computer storage manufacturers and storage service providers (SSPs) to describe products and services that ensure that data continues to be available at a required level of performance in situations ranging from normal through "disastrous." In general, data availability is achieved through redundancy involving where the data is stored and how it can be reached. Some vendors describe the need to have a data center and a storage-centric rather than a server-centric philosophy and environment.

Downloading

Downloading is the transmission of a file from one computer system to another, usually smaller computer system. From the Internet user's point-of-view, to download a file is to request it from another computer (or from a Web page on another computer) and to receive it.

Drive by Pharming

Drive by pharming is a vulnerability exploit in which the attacker takes advantage of an inadequately protected broadband router to gain access to user data. Symantec developed the technique, in conjunction with Indiana University, as a proof-of-concept exploit that could result in identity theft or other unwanted results, such as denial of service (DoS) or malware infection. Routers that are susceptible to a drive-by pharming attack include products from Cisco, D-Link, Linksys and Netgear. Cisco released an advisory stating that 77 percent of their routers were at risk.

Fiscal Value

Fiscal value is a term that is used to identify the worth of value of a record in terms of providing documentation for some type of financial transaction. Typically, records that have this type of value are maintained at least until the business or transactions relevant to those documents have been completed. At that point, the documents with fiscal value may be coded and filed away in hard copy form, or archived in an electronic format, allowing them to be easily retrieved in the future if necessary.

Direct Sequence Code Division Multiple Access

In telecommunications, direct-sequence spread spectrum (DSSS) is a modulation technique. As with other spread spectrum technologies, the transmitted signal takes up more bandwidth than the information signal that modulates the carrier or broadcast frequency. The name 'spread spectrum' comes from the fact that the carrier signals occur over the full bandwidth (spectrum) of a device's transmitting frequency. Certain IEEE 802.11 standards use DSSS signaling.

Block Numeric System

In the block numeric system, each subject heading is assigned a block of numbers, in this example, any file beginning with a number between 800-899 would be identified as a Human Resources file.

Exact Match

Mechanism where only objects matching specific criteria are returned as an answer.

Cache

Pronounced like the physical form of U.S. currency, Cache is a high-speed access area that can be either a reserved section of main memory or a storage device. The two main cache types are memory cache and disk cache. Memory cache is a portion on memory of high-speed static RAM (SRAM) and is effective because most programs access the same data or instructions over-and-over. By keeping as much of this information as possible in SRAM, the computer avoids accessing the slower DRAM. Most computers today come with L3 cache or L2 cache, while older computers included only L1 cache.

Protocol Converter

A Protocol Converter is a device used to convert standard or proprietary protocol of one device to the protocol suitable for the other device or tools to achieve the interoperability.

CPU

A central processing unit (CPU) (formerly also referred to as a central processor unit) is the hardware within a computer that carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system. The term has been in use in the computer industry at least since the early 1960s. The form, design, and implementation of CPU have changed over the course of their history, but their fundamental operation remains much the same.

Personal Information Bank

A collection of personal information that is organized and capable of being retrieved by an individual's name, an identifying number, symbol or other particular assigned to an individual.

Tag

A command inserted in a document that specifies how the document, or a portion of the document, should be formatted. Tag are used by all format specifications that store documents as text files. This includes SGML and HTML.

Original Record

A complete and finished document that is able to produce the consequences intended by its author.

Corporate Area Network

A corporate area network (CAN) is a separate, protected portion of a corporation's intranet. When people are on the corporate area network, they are sometimes said to be in the CAN: they do not have access to the Internet -- or to the rest of the corporate network, for that matter. Users may be connected directly, for example in a token ring configuration, or may be geographically dispersed and connected by backbone lines.CAN is sometimes said to stand for campus area network, where it refers to an interconnection of local area networks (LANs) that are geographically dispersed more widely than in a LAN, but less so than in a wide area network (WAN).

Crossover Cable

A crossover cable is a cable that is used to interconnect two computers by "crossing over" (reversing) their respective pin contacts. Either an RS-232C or a telephone jack connection is possible. A crossover cable is sometimes known as a null modem.

Doubler

A doubler is an electronic device that doubles the frequency of an input signal . Doublers are occasionally used in wireless communications to obtain transmission frequencies higher than those normally possible for a given circuit design.A doubler works by introducing nonlinearity into the input signal, that is, the waveform is deliberately distorted. This results in the generation of signals at harmonic frequencies, which are whole-number multiples of the input, or fundamental, frequency. In a doubler, a tuned circuit in the output is adjusted for resonance at the second harmonic of the input frequency (twice the fundamental).

Floppy Disk

A floppy disk, or diskette, is a disk storage medium composed of a disk of thin and flexible magnetic storage medium, sealed in a rectangular plastic carrier lined with fabric that removes dust particles. Floppy disks are read and written by a floppy disk drive (FDD).Floppy disks, initially as 8-inch (200 mm) media and later in 5ź-inch (133 mm) and 3˝-inch (90 mm) sizes, were a ubiquitous form of data storage and exchange from the mid-1970s well into the 2000s.

Physical Format

A format which prepares a disk for a specific type of disk controller, and performs tasks such as sector identification. Such a format will destroy all data on a disk, while a high-level format only resets file-allocation tables so that the operating system sees the disk as empty. In the case of a hard disk, a physical format is usually performed by the manufacturer. Also called low-level format.

Multiplexer

A multiplexer, sometimes referred to as a multiplexer or simply a mux, is an electronic device that selects from several input signals and transmits one or more output signals. In its simplest form, a multiplexer will have two signal inputs, one control input and one output. One example of an analog multiplexer is the source control on a home stereo unit that allows the user to choose between the audio from a compact disc (CD) player, digital versatile disc (DVD) player and cable television line.

Network PC

A network PC (sometimes called an appliance) is a term used to denote a new kind of relatively low-cost PC designed for Internet access and specialized business use, but without the full capabilities ot today's personal computer and software. The device is expected to cost in the $500 to $1,000 range.

NSP

A network service provider (NSP) is a business or organization that sells bandwidth or network access by providing direct Internet backbone access to the Internet and usually access to its network access points (NAPs). For such a reason, network service provider are sometimes referred to as backbone providers or internet providers.Network service providers may consist of telecommunications companies, data carriers, wireless communications providers, Internet service provider, and cable television operators offering high-speed Internet access.

Network Service Provider

A network service provider (NSP) is a business or organization that sells bandwidth or network access by providing direct Internet backbone access to the Internet and usually access to its network access points (NAPs). For such a reason, network service providers are sometimes referred to as backbone providers or internet providers.Network service providers may consist of telecommunications companies, data carriers, wireless communications providers, Internet service providers, and cable television operators offering high-speed Internet access.

Networking Chip

A networking chip is a microprocessor that provides the logic for sending and receiving data (including voice and video) on a telecommunications network so that additional devices are not needed for these functions. Among other manufacturers, IBM reportedly will sell networking chips that support asynchronous transfer mode (ATM) and token ring communication.

One Armed Router

A one armed router is a router that routes traffic between virtual local area networks (VLANs). A one-armed router operates on the 80/20 rule, which states that 80% of traffic in a network remains within a virtual local area network and doesn't need routing service. The other 20% of network traffic is between VLANs and goes through the one-armed router. Because the one armed router takes care of the more intensive traffic between VLANs, it frees the primary data path in a network for inter-VLAN traffic.

Passive Optical Network

A passive optical network (PON) is a telecommunications network that uses point-to-multipoint fiber to the premises in which unpowered optical splitters are used to enable a single optical fiber to serve multiple premises. A PON consists of an optical line terminal (OLT) at the service provider's central office and a number of optical network units (ONUs) near end users. A PON reduces the amount of fiber and central office equipment required compared with point-to-point architectures. A passive optical network is a form of fiber-optic access network.

Patch Cord

A patch cable or patch cord or patch lead is an electrical or optical cable used to connect ("patch-in") one electronic or optical device to another for signal routing. Devices of different types (e.g. a switch connected to a computer, or a switch to a router) are connected with patch cords. Patch cord are usually produced in many different colors so as to be easily distinguishable, and are relatively short, perhaps no longer than two metres. Types of patch cord include microphone cables, headphone extension cables, XLR connector, Tiny Telephone (TT) connector, RCA connector and ź" TRS phone connector cables (as well as modular Ethernet cables), and thicker, hose-like cords (snake cable) used to carry video or amplified signals. However, patch cord typically refer only to short cords used with patch panels.

Pen Drive

A pen drive is a portable Universal Serial Bus (USB) flash memory device for storing and transferring audio, video, and data files from a computer. As long as the desktop or laptop has a USB port, and the pen drive is compatible with the operating system, it should be easy to move the data from the hard drive to the device and to another computer in a matter of minutes. The drive gets its name from the fact that many have a retractable port connector like a ballpoint pen, and they are small enough to fit into a pocket. Other names include flash drive, jump drive, and thumb drive.

PSU

A power supply unit (PSU) converts mains AC to low-voltage regulated DC power for the internal components of a computer. Modern personal computers universally use a switched-mode power supply. Some power supplies have a manual selector for input voltage, while others automatically adapt to the supply voltage.

Subsystem

A subsystem is a system that is part of some larger system, or it can also mean the coherent and somewhat independent component of a larger system.

Disaster

A sudden accident or a natural damage that causes great damage or loss to an enterprise.

System

A system is a set of interacting or interdependent components forming an integrated whole or a set of elements (often called 'components' ) and relationships which are different from relationships of the set or its elements to other elements or sets.

Integrated Records Classification and Scheduling System

A system that integrates records classification with retention and disposition schedules, such as Administrative Records Classification System (ARCS) and Operational Records Classification Systems (ORCS).

Edge Router

A term used in asynchronous transfer mode (ATM) networks, an edge router is a device that routes data packets between one or more local area networks (LANs) and an ATM backbone network, whether a campus network or a wide area network (WAN). An edge router is an example of an edge device and is sometimes referred to as a boundary router. An edge router is sometimes contrasted with a core router, which forwards packets to computer hosts within a network (but not between networks).

Hard Drive

Alternatively referred to as a hard drive and abbreviated as HD or HDD, the hard drive is the computer's main storage media device that permanently stores all data on the computer. The hard drive was first introduced on September 13, 1956 and consists of one or more hard drive platters inside of air sealed casing. Most computer hard drives are in an internal drive bay at the front of the computer and connect to the motherboard using either ATA, SCSI, or a SATA cable and power cable. Below, is a picture of what the inside of a hard drive looks like for a desktop and laptop hard drive.

Central Processing Unit

Alternatively referred to as the brain of the computer, processor, central processor, or microprocessor, the CPU (pronounced as C-P-U) was first developed at Intel with the help of Ted Hoff in the early 1970's and is short for Central Processing Unit. The computer Central processing unit is responsible for handling all instructions it receives from hardware and software running on the computer.

Ethernet Modem

An Ethernet modem is a device used to connect a computer to the Internet. These modems use broadband technology that operates at far higher speeds than older, dial-up methods. Created in the 1970s by Robert Metcalfe, and based on an earlier system known as Alohanet, Ethernet technology originally had theoretical data transfer rates of up to ten megabits per second (Mbps). Current technology allows for much faster speeds.

Forms

An HTML forms is a section of a document containing normal content, markup, special elements called controls (checkboxes, radio buttons, menus, etc.), and labels on those controls. Users generally "complete" a form by modifying its controls (entering text, selecting menu items, etc.), before submitting the form to an agent for processing (e.g. to a Web server, to a mail server, etc).

Access Method

An access method is a function of a mainframe operating system that enables access to data on disk, tape or other external devices. They were introduced in 1963 in IBM OS/360 operating system. Access method provide an application programming interface (API) for programmers to transfer data to or from device, and could be compared to device drivers in non-mainframe operating systems.

Access Path

An access path describes the order in which the rows are retrieved from a database file. If the rows in the file are accessed in a physical sequence, that is known as an arrival sequence access path. If the rows need to be processed in an ordered manner, then a keyed access path is needed to sort the data in the specified order. With DB2 for iSeries, keyed access paths are supplied to DB2 by creating a keyed logical file, keyed physical file, or SQL index.

One Time Accession Number

An accession number that is used by an office for a single transfer of records to a government approved records storage facility.

Edge Device

An edge device is a physical device that can pass packets between a legacy network (like an Ethernet network) and an ATM network, using Data Link layer and Network layer information. An edge device does not have responsibility for gathering network routing information. It simply uses the routing information it finds in the network layer using the route distribution protocol. An edge router is an example of an edge device.

Deposited

"Filed, registered, recorded and kept" as interpreted defined in the Document Disposal Act (RSBC 1996, c. 99, s. 1).

Endpoint Device

An endpoint device is an Internet-capable computer hardware device on a TCP/IP network. The term can refer to desktop computers, laptops, smart phones, tablets, thin clients, printers or other specialized hardware such POS terminals and smart meters.Most experts recommend a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.

AD-WARE

AD-WARE, or advertising supported software, is any software package which automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. The term is sometimes used to refer to software that displays unwanted advertisements.

Physical Unit

Abbreviated as PU, a Physical Unit in IBM's SNA protocol, is a physical device and its related network resources.In terms of measurement, a physical unit is a value or size that is widely accepted.

AGP

Accelerated Graphics Port, an interface specification developed by Intel Corporation. AGP is based on PCI, but is designed especially for the throughput demands of 3-D graphics. Rather than using the PCI bus for graphics data, AGP introduces a dedicated point-to-point channel so that the graphics controller can directly access main memory. The AGP channel is 32 bits wide and runs at 66 MHz. This translates into a total bandwidth of 266 MBps, as opposed to the PCI bandwidth of 133 MBps. AGP also supports two optional faster modes, with throughputs of 533 MBps and 1.07 GBps. In addition, AGP allows 3-D textures to be stored in main memory rather than video memory.

Accuracy

Accuracy is how close a measured value is to the actual (true) value. An example of accuracy is a software engineer that is able to design and implement an extensible, relatively bug-free application, which a customer can use.

Working Materials

All electronic files, scrap proofs, and original artwork / photos will created at Durdy Work, Multi - Media Graphics will remain property of Durdy Work, Multi - Media Graphics and will be kept for a minimum of 1 year for future re-orders or adjustments.

Audit Accountability

Audit accountability is collection of performance measurement, cost, timeliness and quality against agreed service levels of service delivery.

Green Collar

Denoting or relating to employment concerned with products and services designed to improve the quality of the environment.

Hypertext Model

Hypertext modelling specifies composition and navigation of the site.

Keyboard

In computing, a keyboard is a typewriter-style device, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches. Following the decline of punch cards and paper tape, interaction via teleprinter-style keyboards became the main input device for computers.A keyboard typically has characters engraved or printed on the keys and each press of a key typically corresponds to a single written symbol. However, to produce some symbols requires pressing and holding several keys simultaneously or in sequence. While most keyboard keys produce letters, numbers or signs (characters), other keys or simultaneous key presses can produce actions or execute computer command.

Resource Sharing

In computing, a shared resource, or network share, is a computer resource made available from one host to other hosts on a computer network.Some examples of shareable resources are computer programs, data, storage devices, and printers. Network sharing is made possible by inter-process communication over the network.

Input Device

In computing, an input device is any peripheral (piece of computer hardware equipment) used to provide data and control signals to an information processing system such as a computer or other information appliance. Examples of input devices include keyboards, mouse, scanners, digital cameras and joysticks.

Optical Disk Drive

In computing, an optical disc drive (ODD) is a disk drive that uses laser light or electromagnetic waves within or near the visible light spectrum as part of the process of reading or writing data to or from optical discs. Some drives can only read from discs, but recent drives are commonly both readers and recorders, also called burners or writers. Compact discs, DVDs, and Blu-ray discs are common types of optical media which can be read and recorded by such drives. Optical drive is the generic name, drives are usually described as "CD" "DVD", or "Blu-ray", followed by "drive", "writer", etc.

FEC

In telecommunication, information theory, and coding theory, forward error correction (FEC) or channel coding is a technique used for controlling errors in data transmission over unreliable or noisy communication channels. The central idea is the sender encodes their message in a redundant way by using an error-correcting code (ECC). The American mathematician Richard Hamming pioneered this field in the 1940s and invented the first error-correcting code in 1950: the Hamming (7,4) code.

Archival Appraisal

In the archival appraisal is a process usually conducted by a member of the record-holding institution (often a professional archivist) in which a body of records are examined to determine their value. Some considerations when conducting appraisal include how to meet the record-granting body's organizational needs, how to uphold requirements of organizational accountability (be they legal, institutional, or determined by archival ethics), and how to meet the expectations of the record-using community.

Information Criteria

Information Criteria are a core component of the COBIT Framework that describes the intent of the objectives, namely the control of.

Feature Information

Information extracted from a specific object used during a query process.

Informative Feedback

Information given to the user about any relationship between a query and the document retrieved.

Information

Information is that which informs, i.e. that from which data can be derived. Information is conveyed either as the content of a message or through direct or indirect observation of some thing. That which is perceived can be construed as a message in its own right, and in that sense, information is always conveyed as the content of a message. Information can be encoded into various forms for transmission and interpretation. For example, information may be encoded into signs, and transmitted via signals.

Information Management

Information management (IM) is the collection and management of information from one or more sources and the distribution of that information to one or more audiences. This sometimes involves those who have a stake in, or a right to that information. Management means the organization of and control over the planning, structure and organisation, controlling, processing, evaluating and reporting of information activities in order to meet client objectives and to enable corporate functions in the delivery of information.

Information Retrieval

Information retrieval is the activity of obtaining information resources relevant to an information need from a collection of information resources. Searches can be based on metadata or on full-text (or other content-based) indexing.

Information System

Information system (IS) is the study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create and distribute data.Information Systems encompasses a variety of disciplines such as: the analysis and design of systems, computer networking, information security, database management, and decision support systems. Information Management deals with the practical and theoretical problems of collecting and analyzing information in a business function area including business productivity tools, applications programming and implementation, electronic commerce, digital media production, data mining, and decision support. Communications and Networking deals with the telecommunication technologies. Information Systems bridges business and computer science using the theoretical foundations of information and computation to study various business models and related algorithmic processes within a computer science discipline.

Mask ROM

Mask ROM (MROM) is a type of read-only memory (ROM) whose contents are programmed by the integrated circuit manufacturer (rather than by the user). The terminology "mask" comes from integrated circuit fabrication, where regions of the chip are masked off during the process of photolithography.It is common practice to use rewritable non-volatile memory such as UV-EPROM or EEPROM for the development phase of a project, and to switch to mask ROM when the code has been finalized. For example, Atmel microcontrollers come in both EEPROM and mask ROM formats.

Legislative Records

Numerical listing of all numbered matters filed for consideration by the General Court. Includes a brief description of the matter and its full legislative history.

Retrieval Task

Occurs when an information system executes a task in response to a specific user request.

PCI X

PCI X, short for Peripheral Component Interconnect eXtended, is a computer bus and expansion card standard that enhances the 32-bit PCI Local Bus for higher bandwidth demanded by servers. It is a double-wide version of PCI, running at up to four times the clock speed, but is otherwise similar in electrical implementation and uses the same protocol.

Personal Records

Personal Records are records pertaining to employees of an organization. These records are accumulated, factual and comprehensive information related to concern records and detained. All information with effect to human resources in the organization are kept in a systematic order. Such records are helpful to a manager in various decision making areas.

Presence Technology

Presence technology is a type of application that makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.Instant messaging (IM) is a very common example. Both proprietary products, such as Sametime, and freely available ones, such as AIM, can be used to add presence to any application. That faculty makes collaboration possible wherever and whenever users are online. In another example (among many possibilities), a driver with a GPS-enabled device can be tracked and sent messages warning about traffic delays and suggesting alternate routes.

AD HOC Retrieval

Standard retrieval task in which the user specifies his information need through a query which initiates a search (executed by the information system) for documents which are likely to be relevant to the user.

Human Computer Interfaces

Study of certain interfaces that assist a user with their information seeking tasks like tracking of a retrieval disk or query formulation.

System Design

System design is the process of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. Systems design could be seen as the application of systems theory to product development. There is some overlap with the disciplines of systems analysis, systems architecture and systems engineering.

System Software

System software is a type of computer program that is designed to run a computer's hardware and application programs. If we think of the computer system as a layered model, the system software is the interface between the hardware and user applications.The operating system (OS) is the best-known example of system software. The OS manages all the other programs in a computer.

Record Keeping System

Systematic procedure by which the records of an organization are created, captured, maintained, and disposed of. This system also ensures their preservation for evidential purposes, accurate and efficient updating, timely availability, and control of access to the them only by authorized personnel.

Tape Management System

Tape management system (TMS) is computer software that manages the usage and retention of computer backup tapes. This may be done as a stand alone function or as part of a broader backup software package.Tape management system (TMS) are usually used in conjunction with backup applications and are generally used to manage magnetic tape media that contains backup information and other electronically stored information. Tape management systems are used by organizations to locate, track, and rotate media according to an organizations internal policies as well as government regulations.

Auxiliary Carry Flag

The Adjust flag (also known as the auxiliary carry flag) is a CPU flag in the FLAGS register of all x86-compatible CPUs. It is located at bit position 4. It indicates when an arithmetic carry or borrow has been generated out of the four least significant bits, or lower nibble. It is primarily used to support binary-coded decimal (BCD) arithmetic.

Backup Center

The Backup Center is a small yet powerful application that automatically backs up all your important data to secure servers but also makes it possible for you to access it on the go. Your data stays safe and available for you anytime, from anywhere you have an Internet connection.

Domain Name System

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates information from domain names with each of the assigned entities. Most prominently, it translates easily memorized domain names to the numerical IP addresses needed for locating computer services and devices worldwide. The Domain Name System is an essential component of the functionality of the Internet. This article presents a functional description of the Domain Name System. Broader usage and industry aspects are captured on the Domain name page.

E-Server

The E-Server is an open access electronic publishing cooperative, founded in 1990, which publishes writings in the arts and humanities free of charge to Internet readers. It is rated by Alexa as the most popular arts and humanities website in the world.As of 2005, the EServer published more than 32,000 works. In December 2006 it hosted approximately 66,000 readers per day (two million per month).Martha L. Brogan and Daphnée Rentfrow wrote in 2005 that it has "more than 200 active members, including editors of an eclectic mix of 45 discrete 'collections' (Web sites), which 'publish' more than 32,000 works.Duke University Library rates the EServer among the best overall directories for literary information on the Web.

PXE

The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator. The PXE code is typically delivered with a new computer on a read-only memory chip or boot disk that allows the computer (a client) to communicate with the network server so that the client machine can be remotely configured and its operating system can be remotely booted.

Preboot Execution Environment

The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator. The PXE code is typically delivered with a new computer on a read-only memory chip or boot disk that allows the computer (a client) to communicate with the network server so that the client machine can be remotely configured and its operating system can be remotely booted.

XOR

The XOR gate (sometimes EOR gate, or EXOR gate) is a digital logic gate that implements an exclusive or, that is, a true output (1/HIGH) results if one, and only one, of the inputs to the gate is true. If both inputs are false (0/LOW) or both are true, a false output results. XOR represents the inequality function, i.e., the output is true if the inputs are not alike otherwise the output is false. A way to remember XOR is "one or the other but not both".

Trustworthiness

The accuracy, reliability, and authenticity of a record. To ensure that electronic records are Trustworthiness, the system that contains them should be dependable and produce consistent results based on well established procedures.

Final Disposition

The action taken when records become inactive under an approved records schedule. Final disposition can be physical destruction of records,transfer of the records to the custody of the government archives for selective retention or full retention, which may include conversion to another physical format and destruction of the original records, or alienation of records from the Crown.

Full Retention

The archival appraisal decision by a government archivist to preserve a set of records in its entirety and in an accessible format. Retention decisions are documented in the records schedule. Under the terms of full retention, the archivist responsible may destroy unnecessary duplicates, publications, ephemera, and other items that are not an integral part of the record series.

Primary

The basic building block of Administrative Records Classification System (ARCS) and Operational Records Classification Systems (ORCS). A primary relates to a function or subject. It consists of a 5 digit number and a descriptive title under which specific records may be classified and arranged.

Functionality

The capacity of a computer program or application to provide a useful function. computing a function or range of functions in a computer, program, package, etc.

Cathode Ray Tube

The cathode ray tube (CRT) is a vacuum tube containing one or more electron guns (a source of electrons or electron emitter) and a fluorescent screen used to view images.It has a means to accelerate and deflect the electron beam onto the screen to create the images. The images may represent electrical waveforms (oscilloscope), pictures (television, computer monitor), radar targets or others. cathode ray tube have also been used as memory devices, in which case the visible light emitted from the fluorescent material (if any) is not intended to have significant meaning to a visual observer (though the visible pattern on the tube face may cryptically represent the stored data).

Scope Note

The component of a classification system that describes the functions, uses and content of the records that are to be classified together, in Administrative Records Classification System (ARCS) and Operational Records Classification Systems (ORCS), each primary has a scope note. A scope note describes the administrative or operational function to which the records relate and provides a general statement about the record types (memos, forms, reports, etc.) and media (photographs, video recordings, etc.) covered. A scope note may also contain information about related records classified elsewhere.

Computer Case

The computer case serves mainly as a way to physically mount and contain all of the actual computer components. Cases typically come bundled with a power supply.

Expansion Card

The expansion card (also expansion board, adapter card or accessory card) in computing is a printed circuit board that can be inserted into an electrical connector, or expansion slot on a computer motherboard, backplane or riser card to add functionality to a computer system via the expansion bus.An expansion bus is a computer bus which moves information between the internal hardware of a computer system (including the CPU and RAM) and peripheral devices. It is a collection of wires and protocols that allows for the expansion of a computer.

Current Legal Custodians

The government organization that has legal custody of specific records, or in other words is currently responsible for them.

Creating Agency

The government organization that is responsible for specific records at the time the file containing them was closed, or in other words, at the time they ceased to be active.

Legal Custody

The legal responsibility for ensuring the guardianship of government records in accordance with predetermined rules and regulations. To ensure proper management of records, the current Legal custody is the designated office of responsibility.

Microcode

The lowest-level instructions that directly control a microprocessor. A single machine-language instruction typically translates into several microcode instructions. In modern PC microprocessors, the microcode is hardwired and can't be modified. Some RISC designs go one step further by completely eliminating the microcode level so that machine instructions directly control the processor. At the other end of the spectrum, some mainframe and minicomputer architectures utilize programmable microcode. In this case, the microcode is stored in EEPROM, which can be modified. This is called microprogramming.

Physical Custody

The responsibility for the care, preservation and security of a set of records in their physical location, in accordance with predetermined rules and regulations.

Retention Period

The retention period of a document is an aspect of records management. It represents the period of time a document should be kept or "retained" both electronically and in paper format. At the termination of the retention period, the document is usually destroyed.

Micro-Graphics

The technique of photographing written or printed pages in reduced form to produce microfilm or microfiche.

Configuration Item

The term configuration item or CI refers to the fundamental structural unit of a configuration management system. Examples of CIs include individual requirements documents, software, models, and plans. The Configuration management system oversees the life of the CIs through a combination of process and tools by implementing and enabling the fundamental elements of identification, change management, status accounting, and audits. The objective of this system is to avoid the introduction of errors related to lack of testing as well as incompatibilities with other CIs.

Electronic Vaulting

The term electronic vaulting is used to describe the transfer of data by electronic means to a backup site, as opposed to the physical shipment of backup tapes or disks.The viability of electronic vaulting depends upon the availability, cost, and bandwidth of communication lines. It should be remembered that a man on a bicycle with a set of magnetic tapes can easily deliver an average bandwidth of 300 MBits/sec over a five mile range.

Records Services Application Number

The unique number that identifies each application for records services submitted to Government Records Service. The number appears in the top right hand corner of the application form. If the application is for an Operational Records Classification Systems (ORCS) or one time records schedule, the application number will become the schedule authority number.

Primary Value

The value of records for the activities for which they were created or received.The value of the system characteristics upon which all ecosystem functions depend.

Digitize

To translate into a digital form. For example, optical scanners digitize images by translating them into bit maps. It is also possible to digitize sound, video, and any type of movement. In all these cases, digitization is performed by sampling at discrete intervals. To digitize sound, for example, a device measures a sound wave's amplitude many times per second. These numeric values can then be recorded digitally.

Usability

Usability means making products and systems easier to use, and matching them more closely to user needs and requirements.The extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use.

Vocabulary

Vocabulary is the set of words within a language that are familiar to that person. A vocabulary usually develops with age, and serves as a useful and fundamental tool for communication and acquiring knowledge.

Partition

When referring to a computer hard drive, a disk partition or partition is a segment of the hard drive that is separated from other portions of the hard drive. Partition help enable users to divide a computer hard drive into different drives or into different portions for multiple operating systems to run on the same drive.

Xm

XM Satellite Radio (XM) is one of two satellite radio (SDARS) services in the United States and Canada, operated by Sirius XM Radio. It provides pay-for-service radio, analogous to cable television. Its service includes 73 different music channels, 39 news, sports, talk and entertainment channels, 21 regional traffic and weather channels and 23 play-by-play sports channels. XM channels are identified by Arbitron with the label XM (e.g. "XM32").

Special Schedules

Occasionally BART has maintenance work or other situations that may affect certain trips. These messages provide information about which stations are affected and the dates and times when the special schedule might occur. These special schedule messages are automatically generated for any QuickPlanner trips created using the API, but can also be returned directly with an API call.

Openness

Openness is degree of accessibility to view, use, and modify computer code in a shared environment with legal rights generally held in common and preventing proprietary restrictions on the right of others to continue viewing, using, modifying and sharing that code.

Subject Files

A file that consists of letters, memorandums, attachments, reports and other related documents. Relates to any topic such as, an action, event, person, place or other subject. Arranged by subject, gathered together to support current or potential business task, function or decision. They are distinguished from case files which relate to a situation affecting or relating to some particular investigation or administrative action, whereas the documents in case files typically capture the same category of information about each investigation or action, the content and format of documents in subject files often are varied.

Microfilm

A film bearing a photographic record on a reduced scale of printed or other graphic matter.Microfilm, also called microphotography, consists in the reduction of images to such a small size that they cannot be read without optical assistance. This amazing photographic compression often results in a ninety-nine percent saving of space. The microfilm service is one of the most extensively used and common practices in modern reprographic science.

Finding Aid

A finding aid, in the context of archival science, is a document containing detailed information about a specific collection of papers or records within an archive. Finding aids are used by researchers to determine whether information within a collection is relevant to their research. The finding aid for a collection is usually compiled by an archivist or librarian during archival processing.

Population

A group of individuals or items that share one or more characteristics from which data can be gathered and analyzed.

Help Desk

A help desk is a resource intended to provide the customer or end user with information and support related to a company's or institution's products and services. The purpose of a help desk is usually to troubleshoot problems or provide guidance about products such as computers, electronic equipment, food, apparel, or software. Corporations usually provide help desk support to their customers through various channels such as toll-free numbers, websites, instant messaging, or email. There are also in-house help desks designed to provide assistance to employees.

Twisted Pair

Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper wires are twisted around each other. Each connection on twisted pair requires both wires. Since some telephone sets or desktop locations require multiple connections, twisted pair is sometimes installed in two or more pairs, all within a single cable. For some business locations, twisted pair is enclosed in a shield that functions as a ground. This is known as shielded twisted pair (STP). Ordinary wire to the home is unshielded twisted pair (UTP).

Universal Serial BUS

Universal Serial Bus, USB is a standard that was introduced in 1995 by Intel, Compaq, Microsoft and other computer companies. USB 1.x is an external bus standard that supports data transfer rates of 12 Mbps and is capable of supporting up to 127 peripheral devices.

Hand Print Scanner

A person's hand/palm and finger are unique however not as unique as their fingerprints or irises, for this reason, businesses and schools like to use hand scanner and finger reader biometrics technology, to authenticate but not identify its users. Authentication is a one-to-one comparison, it compares your characteristic with your stored information. Identification, on the other hand, is a one-to-many comparison. In this way, some people may find it less intrusive.

Personal Area Network

A personal area network (PAN) is a computer network used for data transmission among devices such as computers, telephones and personal digital assistants. PANs can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet (an uplink).

Outlet

A point on a wiring system at which current is taken to supply electric devices.

Primary Block

A set of primaries covering related functions that form a logical group and are assigned sequential numbers. Each block contains a general primary and two or more primaries covering functions or activities subordinate to the major function of the block.

Codes

A set of symbols for representing something. For example, most computers use ASCII codes to represent characters.Written computer instructions. The term codes is somewhat colloquial. For example, a programmer might say: "I wrote a lot of code this morning" or "There's one piece of code that doesn't work."

Conservation

All actions that can be taken to ensure the long term survival of the physical format of records.

CPE Device

Customer Premises Equipment Device. A CPE device is telecommunications hardware located at the home or business of a customer. Such equipment might include cable or satellite television set-top boxes, digital subscriber line (DSL) or other broadband Internet routers, VoIP base stations, telephone handsets or other customized hardware used by a particular telecommunications service provider. CPE is generally owned by the telecommunications provider, though some customers do choose to purchase modems or routers. Leasing or rental arrangements are also common, especially for cable television or broadband subscribers. Renting or leasing CPE insulates customers against the cost of upgrades and allows telecommunications companies to control more of the method and technology used to interact with their networks.

DVD

DVD sometimes explained as "digital video disc" or "digital versatile disc" is a digital optical disc storage format, invented and developed by Philips, Sony, Toshiba, and Panasonic in 1995. DVDs can be played in many types of players, including DVD players. DVDs offer higher storage capacity than compact discs while having the same dimensions.Pre-recorded DVDs are mass-produced using molding machines that physically stamp data onto the DVD. Such discs are known as DVD-ROM, because data can only be read and not written or erased. Blank recordable DVD discs (DVD-R and DVD+R) can be recorded once using a DVD recorder and then function as a DVD-ROM. Rewritable DVDs (DVD-RW, DVD+RW, and DVD-RAM) can be recorded and erased multiple times.

Record Office

Any office of a court in which documents are deposited as defined in the Document Disposal Act.

Audit

Audit is defined as a systematic and independent examination of data, statements, records, operations and performances (financial or otherwise) of an enterprise for a stated purpose. In any audit the auditor perceives and recognizes the propositions before him for examination, collects evidence, evaluates the same and on this basis formulates his judgment which is communicated through his audit report.

Authenticity

Authenticity concerns the truthfulness of origins, attributes, commitments, sincerity, devotion, and intentions.In social media, authenticity is the word used to describe "real" people behind blog posts and other social profiles that can develop an authentic voice with readers and followers.

Backup

Backup is the activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe. Backup is usually a routine part of the operation of large businesses with mainframes as well as the administrators of smaller business computers. For personal computer users, backup is also necessary but often neglected. The retrieval of files you backed up is called restoring them. Personal computer users can consider both local backup and Internet backup.

Security Classification

Security level assigned to a government document, file, or record based on the sensitivity or secrecy of the information. Four common security classifications are,: Highest degree of protection for information that is paramount in national defense matters and whose unauthorized disclosure may cause extremely grave danger or damage to the nation. Unauthorized disclosure of which may result in serious damage or danger. Unauthorized disclosure of which may undermine the defense or government operations. Unauthorized disclosure of which is undesirable.

Guided Tour

Sequence of navigation choices that present the nodes in a specific order for some goal.

Belief Network

A Bayesian network, Bayes network, belief network, Bayesian model or probabilistic directed acyclic graphical model is a probabilistic graphical model (a type of statistical model) that represents a set of random variables and their conditional dependencies via a directed acyclic graph (DAG). For example, a Bayesian network could represent the probabilistic relationships between diseases and symptoms. Given symptoms, the network can be used to compute the probabilities of the presence of various diseases.

Data Access Arrangement

A Data Access Arrangement (DAA) is an electronic interface within a computer and its modem to a public telephone line. A Data Access Arrangement is also sometimes called a Telephone Line Interface Circuit (or Module). Data Access Arrangement are required in any device that attaches to the public switched telephone network ( PSTN ), including fax machines, private branch exchange , set-top box , and alarm systems. Among other things, the Data Access Arrangement isolates the electronic device from the higher voltage on the telephone line. Data Access Arrangement circuitry requires registration with the telephone system governing authority (such as the Federal Communications Commission in the U. S.). However, most manufacturers of modems and other devices build an already-approved DAA design into the modem.

DAFS

Direct Access File System (DAFS) is a network file system, similar to Network File System (NFS) and Common Internet File System (CIFS), that allows applications to transfer data while bypassing operating system control, buffering, and network protocol operations that can bottleneck throughput. DAFS uses the Virtual Interface (VI) architecture as its underlying transport mechanism. Using VI hardware, an application transfers data to and from application buffers without using the operating system, which frees up the processor and operating system for other processes and allows files to be accessed by servers using several different operating systems. DAFS is designed and optimized for clustered, shared-file network environments that are commonly used for Internet, e-commerce, and database applications. DAFS is optimized for high-bandwidth InfiniBand networks, and it works with any interconnection that supports VI including Fibre Channel and Ethernet.

Disaster Recovery

Disaster recovery (DR) the process, policies and procedures that are related to preparing for recovery or continuation of technology infrastructure which are vital to an organization after a natural or human-induced disaster. Disaster recovery focuses on the IT or technology systems that support business functions, as opposed to business continuity, which involves planning to keep all aspects of a business functioning in the midst of disruptive events.

Electronic System

Electronic system are groupings of electronic circuits and components which are designed to accomplish one or more complex functions. Examples include telecommunication systems, computer systems, power distribution systems, radar systems, electronic music systems, and many others.

Enterprise Resource Planning System

Enterprise resource planning system provides an integrated view of core business processes, often in real-time, using common databases maintained by a database management system. enterprise resource planning system track business resources,cash, raw materials, production capacity,and the status of business commitments: orders, purchase orders, and payroll. The applications that make up the system share data across the various departments (manufacturing, purchasing, sales, accounting, etc.) that provide the data. enterprise resource planning system facilitates information flow between all business functions, and manages connections to outside stakeholders. Enterprise system software is a multi-billion dollar industry that produces components that support a variety of business functions. IT investments have become the largest category of capital expenditure in United States-based businesses over the past decade. Though early enterprise resource planning system focused on large enterprises, smaller enterprises increasingly use enterprise resource planning system.

Forms Management

Establishing standards for the research, analysis, design (including format), production, and distribution of all forms used within an organization.

Ethernet IP

EtherNet IP (Ethernet Industrial Protocol) is a communications protocol originally developed by Rockwell Automation, currently managed by the Open DeviceNet Vendors Association (ODVA) and designed for use in process control and other industrial automation applications.EtherNet/IP uses Ethernet physical layer network infrastructure. It is built on the TCP/IP protocols, but the "IP" in EtherNet/IP stands for "Industrial Protocol." It is not an abbreviation for "Internet Protocol".

Full Disk Encryption

Full disk encryption (FDE) is encryption at the hardware level. FDE works by automatically converting data on a hard drive into a form that cannot be understood by anyone who doesn't have the key to "undo" the conversion. Without the proper authentication key, even if the hard drive is removed and placed in another machine, the data remains inaccessible. FDE can be installed on a computing device at the time of manufacturing or it can be added later on by installing a special software driver.

FDE

Full-disk encryption (FDE) is encryption at the hardware level. FDE works by automatically converting data on a hard drive into a form that cannot be understood by anyone who doesn't have the key to "undo" the conversion. Without the proper authentication key, even if the hard drive is removed and placed in another machine, the data remains inaccessible. FDE can be installed on a computing device at the time of manufacturing or it can be added later on by installing a special software driver.The advantage of FDE is that it requires no special attention on the part of the end user after he initially unlocks the computer. As data is written, it is automatically encrypted. When it is read, it is automatically decrypted. Because everything on the hard drive is encrypted, including the operating system, a disadvantage of FDE is that the encrypting/decrypting process can slow down data access times, particularly when virtual memory is being heavily accesse.

IOPS

IOPS (input/output operations per second) is the standard unit of measurement for the maximum number of reads and writes to non-contiguous storage locations. IOPS is pronounced EYE-OPS. IOPs is often measured with an open source network testing tool called an Iometer. Measuring both IOPS and latency can help a network administrator predict how much load a network can handle without performance being negatively affected.

Accumulator

In a computer's central processing unit (CPU), an accumulator is a register in which intermediate arithmetic and logic results are stored. Without a register like an accumulator, it would be necessary to write the result of each calculation (addition, multiplication, shift, etc.) to main memory, perhaps only to be read right back again for use in the next operation. Access to main memory is slower than access to a register like the accumulator because the technology used for the large main memory is slower (but cheaper) than that used for a register. Early electronic computer systems were often split into two groups, those with accumulator and those without.

Cross Bar Switch

In a network, a cross bar switch is a device that is capable of channeling data between any two devices that are attached to it up to its maximum number of ports. The paths set up between devices can be fixed for some duration or changed when desired and each device-to-device path (going through the switch) is usually fixed for some period.Cross-bar topology can be contrasted with bus topology, an arrangement in which there is only one path that all devices share. Traditionally, computers have been connected to storage devices with a large bus. A major advantage of cross-bar switching is that, as the traffic between any two devices increases, it does not affect traffic between other devices. In addition to offering more flexibility, a cross-bar switch environment offers greater scalability than a bus environment.

Network Topology

In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.The physical topology of a network is the actual geometric layout of workstations. There are several common physical topologies.

Value

In computer science, a value is an expression which cannot be evaluated any further (a normal form).The members of a type are the values of that type. For example, the expression "1 + 2" is not a value as it can be reduced to the expression "3". This expression cannot be reduced any further (and is a member of the type Nat) and therefore is a value.The "value of a variable" is given by the corresponding mapping in the environment. In languages with assignable variables it becomes necessary to distinguish between the r-value (or contents) and the l-value (or location) of a variable.

Volume

In computers, a volume is an identifiable unit of data storage that is sometimes (but not always) physically removable from the computer or storage system. In tape storage systems, a volume may be a tape cartridge (or, in older systems, a tape reel). In mainframe storage systems, a volume may be a removable hard disk. Each volume has a system-unique name or number that allows it to be specified by a user.In some systems, the physical unit may be divided into several separately identifiable volumes. In audio, volume is the loudness of the signal.

Fault

In computing and operating systems, a trap, also known as an exception or a fault, is typically a type of synchronous interrupt typically caused by an exceptional condition . A trap usually results in a switch to kernel mode, wherein the operating system performs some action before returning control to the originating process. A trap in a system process is more serious than a trap in a user process, and in some systems is fatal. In some usages, the term trap refers specifically to an interrupt intended to initiate a context switch to a monitor program or debugger.

Reserved Secondaries

Secondary numbers used to cover record series that are repeated in several primaries. Secondaries 00 and 01 are reserved throughout all Administrative Records Classification System (ARCS) and Operational Records Classification Systems (ORCS) for policy and procedures files and general files respectively.

PROM

Short for programmable read-only memory, a memory chip on which data can be written only once. Once a program has been written onto a PROM, it remains there forever. Unlike RAM, PROMs retain their contents when the computer is turned off.The difference between a PROM and a ROM (read-only memory) is that a PROM is manufactured as blank memory, whereas a ROM is programmed during the manufacturing process. To write data onto a PROM chip, you need a special device called a PROM programmer or PROM burner. The process of programming a PROM is sometimes called burning the PROM.

Enduring Value

Something is said to have enduring value when it has historical significance or another form of worth that is expected to last well into the future. While many artistic documents have enduring value, including artists' manifestos and literary works, this term also is often used for legal and business documents. The reasons for keeping a document are varied, but they usually involve the document containing information that is new, revolutionary or expected to be useful in the future. On average, documents with enduring value are less than 5 percent of all documents made. The organizations responsible for the documents normally do not determine which documents are valuable, this is usually left to archivists.

E-Server I-Series 400

The AS/400 - formally renamed the "IBM iSeries," but still commonly known as AS/400 - is a midrange server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks with Web applications. The AS/400 uses the PowerPC microprocessor with its reduced instruction set computer technology. Its operating system is called the OS/400. With multi-terabytes of disk storage and a Java virtual memory closely tied into the operating system, IBM hopes to make the AS/400 a kind of versatile all-purpose server that can replace PC servers and Web servers in the world's businesses, competing with both Wintel and UNIX servers, while giving its present enormous customer base an immediate leap into the Internet.

Extended Boolean Model

The Extended Boolean model was described in a Communications of the ACM article appearing in 1983, by Gerard Salton, Edward A. Fox, and Harry Wu. The goal of the Extended Boolean model is to overcome the drawbacks of the Boolean model that has been used in information retrieval. The Boolean model doesn't consider term weights in queries, and the result set of a Boolean query is often either too small or too big. The idea of the extended model is to make use of partial matching and term weights as in the vector space model. It combines the characteristics of the Vector Space Model with the properties of Boolean algebra and ranks the similarity between queries and documents. This way a document may be somewhat relevant if it matches some of the queried terms and will be returned as a result, whereas in the Standard Boolean model it wasn't.

Office of Primary Responsibility

The Office of Primary Responsibility (OPR) is the organization and/or position within an organization that is responsible for maintaining the integrity of a record .

Reliable Record

Record that can be trusted due to their degree of completeness, the degree of control exercised on their creation and maintenance procedures, and/or the author's reliability.

Special Media

Records in forms other than text on paper, including photographs, sound recordings, motion picture films, video recordings, audio visual materials, paintings, prints, maps, plans, blueprints, architectural drawings, and other sound, film, video, photographic, or cartographic materials. All records relating to a function are classified in Administrative Records Classification System (ARCS) or Operational Records Classification Systems (ORCS) as appropriate, regardless of media.

User Information Need

Language declaration from users about their user information need.

Preservation

Preservation consists of all the measures taken to extend the life expectancy of records possessing long term legal, administrative, or cultural value.

Phlashing

Phlashing is a permanent denial of service (DoS) attack that exploits a vulnerability in network-based firmware updates. Such an attack is currently theoretical but if carried out could render the target device inoperable.

Decision Support Systems

A Decision Support Systems (DSS) is a computer-based information system that supports business or organizational decision-making activities. DSSs serve the management, operations, and planning levels of an organization (usually mid and higher management) and help to make decisions, which may be rapidly changing and not easily specified in advance (Unstructured and Semi-Structured decision problems). Decision support systems can be either fully computerized, human or a combination of both.

Split Data Systems

A condition in which each of an enterprise's regional locations maintains its own financial and operational data while sharing processing with an enterprise wide, centralized database.

DSU

A digital communication device(DSU) that works with a Channel Service Unit (CSU) to connect a local area network (LAN) to an external communication carrier service or a wide area network (WAN) link (such as a T1 line). Data Service Units (DSUs) provide a modem-like interface between data terminal equipment (DTE) such as a router and the CSU connected to the digital service line. DSUs also serve to electrically isolate the telco's digital telecommunication line from the networking equipment at the customer premises.

Directory

A directory is a location for storing files on your computer. Directories are found in a hierarchical file system such as DOS, OS/2, Unix, etc. When referring to a directory, a user commonly indicates the name of the directory.

Domain Controller

A domain controller (DC) is a server that handles all the security requests from other computers and servers within the Windows Server domain. Security requests include requests to log in to another server and checking permissions for various functions that need to be performed (e.g. accessing a file folder on a server or modifying a file within a folder). The domain controller originated in Windows NT and managed the access to various resources granted to users and other servers through the use of a username and password.

Instruction Pointer

A instruction pointer is a register in a computer processor that contains the address (location) of the instruction being executed at the current time. As each instruction gets fetched, the instruction pointer increases its stored value by 1. After each instruction is fetched, the instruction pointer points to the next instruction in the sequence. When the computer restarts or is reset, the program counter normally reverts to 0.

Port Redirector

A COM port redirector (tty port redirector under Unix/Linux) is specialized software (often including device driver and user application) that includes the underlying network software necessary to access networked device servers that provide remote serial devices or modems.

NAS Accelerator

A NAS accelerator (network-attached storage accelerator) is a printed circuit card that offloads TCP/IP processing from a microprocessor. This can reduce latency, increase throughput, and reduce overhead costs in a storage area network (SAN). A NAS accelerator is also called a TCP/IP accelerator network interface card or a TCP offload engine (TOE) network interface card (TNIC).A high-end NAS accelerator can process Internet functions including e-mail and Web browsing, file transfers, and file serving, as well as data backup and archiving. This allows all network applications to run faster, because the microprocessor is not burdened with TCP/IP processing. It is claimed that the installation of NAS accelerator can provide network performance improvement comparable to that obtained by doubling the number of processors, but at much lower cost.

Network Access Point

A Network Access Point (NAP) was a public network exchange facility where Internet service providers (ISPs) connected with one another in peering arrangements. The NAPs were a key component in the transition from the 1990s NSFNET era (when many networks were government sponsored and commercial traffic was prohibited) to the commercial Internet providers of today. They were often points of considerable Internet congestion.

Primary Domain Controller

A Primary Domain Controller (PDC) is a server computer in a Windows domain. A domain is a network of logically grouped computers to which access is controlled by the PDC. Various account types exist in the domain, the most basic is the "guest" or "anonymous login" account. The PDC has an administration account which has overall total control of the domain resources.

Records Officer

A Records Officer is someone in the office that is knowledgeable about the office's records and who has been authorized to make decisions concerning them.

Comodity

A basic good used in commerce that is interchangeable with other commodities of the same type. Commodity are most often used as inputs in the production of other goods or services. The quality of a given commodity may differ slightly, but it is essentially uniform across producers. When they are traded on an exchange, commodities must also meet specified minimum standards, also known as a basis grade.

Accession

A body of records registered as a unit for the purposes of physical and administrative control. Accession typically cover records maintained in a records storage facility contracted by government. Upon expiry of the active and semi active retention periods, records in the accession are either destroyed, or if scheduled for selective or full retention, transferred to the custody of the government archives.

Brouter

A brouter (pronounced BRAU-tuhr or sometimes BEE-rau-tuhr) is a network bridge and a router combined in a single product. A bridge is a device that connects one local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or token ring). If a data unit on one LAN is intended for a destination on an interconnected LAN, the bridge forwards the data unit to that LAN, otherwise, it passes it along on the same LAN. A bridge usually offers only one path to a given interconnected LAN. A router connects a network to one or more other networks that are usually part of a wide area network (WAN) and may offer a number of paths out to destinations on those networks. A router therefore needs to have more information than a bridge about the interconnected networks. It consults a routing table for this information. Since a given outgoing data unit or packet from a computer may be intended for an address on the local network, on an interconnected LAN, or the wide area network, it makes sense to have a single unit that examines all data units and forwards them appropriately.

Buffer Overflow

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability.

Case File

A case file is a file which is established and maintained by an agency. The agency documents a family's or individual's application for and/or receipt of public assistance or public social services. A case file may include documents and computer records.

Chip Set

A chip set is a designated group of microchips that are designed to work with one or more related functions that were first introduced in 1986 when Chips and Technologies introduced the 82C206. The original 82C206 chipset included the 82284 Clock Generator functions, 82288 Bus Controller, 8254 System Timer, dual 8259 Interrupt Controllers, dual 8237 DMA controllers, and the MC146818 Clock. Four of the 82C206 chips were later replaced by CS8221 or NEAT (New Enhanced AT) chipset that contained only three chips. This was then replaced by the 82C836 SCAT (Single Chip AT) chip set that combined all the chips in the set into a single chip.

CO Location Center

A co location centre or co location center (also spelled co-location, collocation, colo, or coloc) is a type of data centre where equipment, space, and bandwidth are available for rental to retail customers. Co location facilities provide space, power, cooling, and physical security for the server, storage, and networking equipment of other firms—and connect them to a variety of telecommunications and network service providers—with a minimum of cost and complexity.

Bus

A collection of wires through which data is transmitted from one part of a computer to another. You can think of a bus as a highway on which data travels within a computer. When used in reference to personal computers, the term bus usually refers to internal bus. This is a bus that connects all the internal computer components to the CPU and main memory. There's also an expansion bus that enables expansion boardsto access the CPU and memory.

Official File Copy

A complete, final, and authorized version of a record. An official file copy is the version that is classified and filed in the office record keeping system.

Control Network

A control network is a network of nodes that collectively monitor, sense, and control or enable control of an environment for a particular purpose. A home appliance network is a good example of a control network. In fact, thousands of control networks already exist in everyday life in automobiles, refrigerators, traffic light controls, city lighting systems, and on factory floors. Control networks vary enormously in the number of nodes (from three to thousands) in the network and in their complexity. Unlike networks that people use to communicate with each other, control networks tend to be invisible. In the future, control networks are expected to become an important aspect of what is sometimes called ubiquitous computing.

Control Store

A control store is the part of a CPU's control unit that stores the CPU's microprogram. It is usually accessed by a microsequencer.The control store usually has a register on its outputs. The outputs that go back into the sequencer to determine the next address have to go through some sort of register to prevent the creation of a race condition. In most designs all of the other bits also go through a register. This is because the machine will work faster if the execution of the next microinstruction is delayed by one cycle. This register is known as a pipeline register. Very often the execution of the next microinstruction is dependent on the result of the current microinstruction, which will not be stable until the end of the current microcycle. It can be seen that either way, all of the outputs of the control store go into one big register. Historically it used to be possible to buy EPROMs with these register bits on the same chip.

Converged Network Adapter

A converged network adapter (CNA) is a single network interface card (NIC) that contains both a Fibre Channel (FC) host bus adapter (HBA) and a TCP/IP Ethernet NIC. It connects servers to FC-based storage area networks (SANs) and Ethernet-based local area networks (LANs).The CNA connects to the server via a PCI Express (PCIe) interface. The server sends both FC SAN and LAN and traffic to an Ethernet port on a converged switch using the Fibre Channel over Ethernet (FCoE) protocol for the FC SAN data and the Ethernet protocol for LAN data. The converged switch converts the FCoE traffic to FC and sends it to the FC SAN. The Ethernet traffic is sent directly to the LAN.In networks without CNAs, servers have to have at least two adapters: One with a FC HBA to connect the server to the storage network, and another with a TCP/IP Ethernet NIC to connect the server to the LAN.Using a single CNA to connect servers to storage and networks reduces costs by requiring fewer adapter cards, cables, switch ports, and PCIe slots. CNAs also reduce the complexity of administration because there is only one connection and cable to manage.

Core Router

A core router is a router that forwards packets to computer hosts within a network (but not between networks). A core router is sometimes contrasted with an edge router, which routes packets between a self-contained network and other outside networks along a network backbone.

Daisy Chain

A daisy chain is an interconnection of computer devices, peripherals, or network nodes in series, one after another. It is the computer equivalent of a series electrical circuit. In personal computing, examples of "daisy-chainable" interfaces include Small Computer System Interface (SCSI) and FireWire, which allow computers to communicate with peripheral hardware such as disk drives, tape drives, CD-ROM drives, printers, and scanners faster and more flexibly than previous interfaces.

Buffer

A data buffer (or just buffer) is a region of a physical memory storage used to temporarily store data while it is being moved from one place to another.

Optical Network

A data network built on fiber-optics technology, which sends data digitally, as light, through connected fiber strands. Optical network offer an enormous increase in both transmission capacity and speed from traditional copper wire-based networks.

Data Service Unit

A data service unit, sometimes called a digital service unit, is a piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment. The device converts bipolar digital signals coming ultimately from a digital circuit and directly from a Channel service unit (CSU), into a format (e.g. RS- 530) compatible with the piece of data terminal equipment (DTE) (e.g. a router) to which the data is sent. The DSU also performs a similar process in reverse for data heading from the DTE toward the circuit. The telecommunications service a DSU supports can be a point-to-point or multipoint operation in a digital data network.

Query

A database query can be either a select query or an action query. A select query is simply a data retrieval query. An action query can ask for additional operations on the data, such as insertion, updating or deletion.

Standard

A definition or format that has been approved by a recognized standard organization or is accepted as a de facto standard by the industry. Standards exist for programming languages, operating systems, data formats, communications protocols, and electrical interfaces.From a user's standpoint, standards are extremely important in the computer industry because they allow the combination of products from different manufacturers to create a customized system. Without standards, only hardware and software from the same company could be used together. In addition, standard user interfaces can make it much easier to learn how to use new applications.

Optical Scanner

A device that can read text or illustrations printed on paper and translate the information into a form the computer can use. A scanner works by digitizing an image -- dividing it into a grid of boxes and representing each box with either a zero or a one, depending on whether the box is filled in. (For color and gray scaling, the same principle applies, but each box is then represented by up to 24 bits.) The resulting matrix of bits, called a bit map, can then be stored in a file, displayed on a screen, and manipulated by programs.Optical scanner do not distinguish text from illustrations, they represent all images as bit maps. Therefore, you cannot directly edit text that has been scanned. To edit text read by an optical scanner, you need an optical character recognition (OCR ) system to translate the image into ASCII characters. Most optical scanner sold today come with OCR packages.

Terminal

A device that enables you to communicate with a computer. Generally, a terminal is a combination of keyboard and display screen. In networking, a terminal is a personal computer or workstation connected to a mainframe. The personal computer usually runs terminal emulation software that makes the mainframe think it is like any other mainframe terminal.

Dumb Network

A dumb network is one that provides the physical interconnection between nodes but not much processing to support signaling. The Internet is often cited as a dumb network relative to the public switched telephone network. The telephone system is considered an "intelligent network" because the intelligence required for operation is carried within the network, while the end devices (telephones) are simple devices. (Recent telephone control systems - Advanced Intelligent Network and Signaling System 7 - provide even more intelligence in the network.) The Internet takes the opposite approach: the network simply transports packets of data without needing to know anything about them and the end devices (computers, for example) contain the intelligence. This approach is sometimes referred to as "dumb network, smart devices."

Fat Client

A fat client (sometimes called a thick client) is a networked computer with most resources installed locally, rather than distributed over a network as is the case with a thin client. Most PCs (personal computers), for example, are fat clients because they have their own hard driveDVD drives, software applications and so on.Fat clients are almost unanimously preferred by network users because they are very customizable and the user has more control over what programs are installed and specific system configuration. On the other hand, thin clients are more easily managed, are easier to protect from security risks, and offer lower maintenance and licensing costs.

Fax Server

A fax server (or faxserver) is a system installed in a local area network (LAN) server that allows computer users whose computers are attached to the LAN to send and receive fax messages. Alternatively the term fax server is sometimes used to describe a program that enables a computer to send and receive fax messages, set of software running on a server computer which is equipped with one or more fax-capable modems (or dedicated fax boards) attached to telephone lines or, more recently, software modem emulators which use T.38 ("Fax over IP") technology to transmit the signal over an IP network. Its function is to accept documents from users, convert them into faxes, and transmit them, as well as to receive fax calls and either store the incoming documents or pass them on to users. Users may communicate with the server in several ways, through either a local network or the Internet. In a big organization with heavy fax traffic, the computer hosting the fax server may be dedicated to that function, in which case the computer itself may also be known as a fax server.

Female Connector

A female connector is a connector attached to a wire, cable, or piece of hardware, having one or more recessed holes with electrical terminals inside, and constructed in such a way that a plug with exposed conductors ( male connector ) can be inserted snugly into it to ensure a reliable physical and electrical connection . A female connector is also known as a jack, outlet, or receptacle. This type of connector can be recognized by the fact that, when it is disconnected or removed, the electrical conductors are not directly exposed, and therefore are not likely to make accidental contact with external objects or conductors.

Fiber Jumper

A fiber jumper, sometimes called a fiber patch cord is a length of fiber cabling fitted with LC, SC, MTRJ or ST connectors at each end. The LC, a smaller form factor connector, is most commonly used. Fiber jumpers also come in hybrid varieties with one type of connector on one end and another type of connector on the other. Jumpers are used in the same manner as patch cords, to connect end devices or network hardware to the structured cabling system.Fiber patch cords come in either single mode or multimode and should be selected to match the structured cabling system. The only exception to this is mode conditioning patch cords (also known as mode conditioning fiber jumpers) that are required when transmitting gigabit signals over 200m on 62.5 micron multimode fiber.

Plug

A fitting, commonly with two metal prongs for insertion in a fixed socket, used to connect an appliance to a power supply.

Four Way Server

A four way server is a server that incorporates a multi-core processor for increased performance. Ideally, a four-way server would be four times as powerful as a server using a single-core processor. In practice, performance gains are somewhat less than that.Multi-core processing has become a growing industry trend as single-core processors reach their practical limits of performance. In the past several years, two-way servers and four-way servers have become especially popular among medium-sized and large businesses.

Fractional T1

A fractional T1 or T3 line is a T1 or T3 digital phone line in the North American T-carrier system that is leased to a customer at a fraction of its data-carrying capacity and at a correspondingly lower cost. A T1 line contains 24 channels, each with a data transfer capacity of 64 Kbps. The customer can rent some number of the 24 channels. The transmission method and speed of transfer remain the same. Overhead bits and framing are still used, but the unrented channels simply contain no data.

Gatekeeper

A gatekeeper is a management tool for H.323 multimedia networks. A single gatekeeper controls interactions for each zone, which comprises the terminals, multipoint control units (MCUs), and gateways within a particular domain. Although the gatekeeper is an optional component, when it is included, it becomes the central administrative entity.

Gateway

A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes.In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server. A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.

Government Records

A government records is a record created by or received by a public body in the conduct of its affairs and includes a Cabinet record, transitory record and an abandoned record disposal of a government record must be sanctioned by a records retention and disposal schedule that has been approved by the Government Records Committee (GRC).

Address

A location of data, usually in main memory or on a disk. You can think of computer memory as an array of storage boxes, each of which is one byte in length. Each box has an address (a unique number) assigned to it. By specifying a memory address, programmers can access a particular byte of data. Disks are divided into tracks and sectors, each of which has a unique address. Usually, you do not need to worry about addresses unless you are a programmer. A name or token that identifies a network component. In local area networks (LANs), for example, every node has a unique address. On the Internet, every file has a unique address called a URL.

Magnetic Card Reader

A magnetic card reader is a device which reads information contained in a encrypted sequence on a magnetic strip. Such as a credit card reader, or Driverse License reader. Hotel Door locks now commonly have a magnetic card reader attached to replace the old fassioned key, since the cards are so cheap to make, and can be remade even if the original is lost.

Microfiche

A microfiche is a card made of transparent film used to store printed information in miniaturized form. To read the card, a user places it under the lens of a reader machine, which magnifies it greatly. The thinness and small size of the film enables it to be stored very easily and efficiently, allowing libraries, museums and businesses to increase their resource collections without the need for additional storage space. While many organizations store records digitally, microfiche records are still created and used and, in fact, have some advantages over digital storage options, including their potentially longer lifespan.

Monitor

A monitor or a display is an electronic visual display for computers. The monitor comprises the display device, circuitry and an enclosure. The display device in modern monitor is typically a thin film transistor liquid crystal display (TFT-LCD) thin panel, while older monitor used a cathode ray tube (CRT) about as deep as the screen size.Originally, computer monitor were used for data processing while television receivers were used for entertainment. From the 1980s onwards, computers (and their monitor) have been used for both data processing and entertainment, while televisions have implemented some computer functionality. The common aspect ratio of televisions, and then computer monitor, has also changed from 4:3 to 16:9.

Mouse

A mouse is a hardware input device that was invented by Douglas Engelbart in 1963 while working at Xerox PARC, who at the time was working at the Stanford Research Institute, which was a think tank sponsored by Stanford University.The mouse allows an individual to control a pointer in a graphical user interface (GUI) and manipulate on-screen objects such as icons, files, and folders. By using a mouse the user doesn't have to memorize commands, like those used in a text-based command line environment such as MS-DOS. For example, in MS-DOS a user would have to know the cd command and dir command to navigate to a folder and view the files. However, in Windows the user only has to double-click on the folder to view all the files.

Network Access Server

A network access server (NAS) is a computer server that enables an independent service provider (ISP) to provide connected customers with Internet access. A network access server has interfaces to both the local telecommunication service provider such as the phone company and to the Internet backbone.The server authenticates users requesting login. It receives a dial-up call from each user host (such as your computer) that wants to access the Internet, performs the necessary steps to authenticate and authorize each user, usually by verifying a user name and password, and then allows requests to begin to flow between the user host and hosts (computers) elsewhere on the Internet.The term network access server may refer to a server devoted entirely to managing network access or to a server that also performs other functions as well. A network access server can be configured to provide a host of services such as VoIP, fax-over-IP, and voicemail-over-IP as well.

Network Drive

A network drive is a storage device on a local access network (LAN) within a business or home. Within a business, the network drive is usually located on a server or a network-attached storage (NAS) device. In a home, the network drive may be located on a dedicated server, a NAS device, an external hard drive or one of the networked computers. If the drive is on one of the networked computers, however, other users will not be able to access the drive when that computer is turned off. A network drive on a home LAN makes it easier to share files and store files without using up computer resources. If the drive has enough capacity, it can also be used to back up all the computers on the network.

Network Tap

A network tap is a hardware device which provides a way to access the data flowing across a computer network. In many cases, it is desirable for a third party to monitor the traffic between two points in the network. If the network between points A and B consists of a physical cable, a "network tap" may be the best way to accomplish this monitoring. The network tap has (at least) three ports: an A port, a B port, and a monitor port. A tap inserted between A and B passes all traffic through unimpeded, but also copies that same data to its monitor port, enabling a third party to listen.Network tap are commonly used for network intrusion detection systems, VoIP recording, network probes, RMON probes, packet sniffers, and other monitoring and collection devices and software that require access to a network segment. Network Tap are used in security applications because they are non-obtrusive, are not detectable on the network (having no physical or logical address), can deal with full-duplex and non-shared networks, and will usually pass through traffic even if the tap stops working or loses power.

Permanent Virtual Circuit

A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network. A feature of frame relay that makes it a highly flexible network technology is that users (companies or clients of network providers) can define logical connections and required bandwidth between end points and let the frame relay network technology worry about how the physical network is used to achieve the defined connections and manage the traffic. In frame relay, the end points and a stated bandwidth called a Committed Information Rate (CIR) constitute a PVC, which is defined to the frame relay network devices. The bandwidth may not exceed the possible physical bandwidth. Typically, multiple PVCs share the same physical paths at the same time. To manage the variation in bandwidth requirements expressed in the CIRs, the frame relay devices use a technique called statistical multiplexing.

Port Interface Card

A port interface card (PIC) is a computer circuit board that provides multiple, diverse interfaces for connections to external networks. In effect, a PIC is an enhanced network interface card (NIC).Port interface cards are used in local area networks (LANs), metropolitan area networks (MANs) and wide area networks (WANs) that employ two or more communications modes. Multiple ports facilitate the configuration of routers and switches for diverse network topologies and media without the need for replacing or swapping core hardware. The cards can also streamline the use of backup communications options. An example is the use of a dial-up connection when a high-speed Internet connection fails.

Printer

A printer is an external hardware device responsible for taking computer data and generating a hard copy of that data. Printer are one of the most used peripherals on computers and are commonly used to print text, images, and photos. The picture is the Lexmark Z605 Inkjet printer and an example of a computer printer.

Data Mining

A process used by companies to turn raw data into useful information. By using software to look for patterns in large batches of data, businesses can learn more about their customers and develop more effective marketing strategies as well as increase sales and decrease costs. Data mining depends on effective data collection and warehousing as well as computer processing.

Program Counter

A program counter is a register in a computer processor that contains the address (location) of the instruction being executed at the current time. As each instruction gets fetched, the program counter increases its stored value by 1. After each instruction is fetched, the program counter points to the next instruction in the sequence. When the computer restarts or is reset, the program counter normally reverts to 0.

Quality Management System

A quality management system (QMS) is a collection of business processes focused on achieving your quality policy and quality objectives i.e. what your customer wants and needs. It is expressed as the organizational structure, policies, procedures, processes and resources needed to implement quality management.

Record Series

A record series is the highest level of organization in Laserfiche Records Management. It is a type of folder that can be created either within the root folder of the repository or within another record series.

One Time Records Schedule

A records schedule that authorizes the retention and final disposition of a specific set of records, and does not provide authority for ongoing final disposition of records of the same type.

Ongoing Records Schedule

A records schedule that authorizes the retention and final disposition, on a continuing basis, of the types of records described in the schedule. Administrative Records Classification System (ARCS) and Operational Records Classification Systems (ORCS) serve as ongoing records schedules for ministry or agency administrative records and operational records. Special schedules are another type of ongoing records schedule.

Records Schedule

A records schedule, also known as a records disposition authorization (RDA), is a policy document that provides certain descriptive information about a given set of records.

Local Analysis

A reference to techniques of identifying document and term relationships through the analysis of the documents retrieved by a given user query.

Router

A router is a device that forwards data packets between computer networks. This creates an overlay internetwork, as a router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node.

Inverted File Index

A sequence of (key, pointer) pairs where each pointer points to a record in a database which contains the key value in some particular field. The index is sorted on the key values to allow rapid searching for a particular key value, using e.g. binary search. The index is "inverted" in the sense that the key value is used to find the record rather than the other way round. For databases in which the records may be searched based on more than one field, multiple indices may be created that are sorted on those keys.

Personal Computer

A small, relatively inexpensive computer designed for an individual user. In price, personal computer range anywhere from a few hundred dollars to thousands of dollars. All are based on the microprocessor technology that enables manufacturers to put an entire CPU on one chip. Businesses use personal computer for word processing, accounting, desktop publishing, and for running spreadsheet and database management applications. At home, the most popular use for personal computer is for playing games.Personal computers first appeared in the late 1970s. One of the first and most popular personal computers was the Apple II, introduced in 1977 by Apple Computer. During the late 1970s and early 1980s, new models and competing operating systems seemed to appear daily. Then, in 1981, IBM entered the fray with its first personal computer, known as the IBM PC. The IBM PC quickly became the personal computer of choice, and most other personal computer manufacturers fell by the wayside. One of the few companies to survive IBM's onslaught was Apple Computer, which remains a major player in the personal computer market place.

Solid State Drive

A solid state drive (SSD) (also known as a solid state disk or electronic disk, though it contains no actual disk) is a data storage device using integrated circuit assemblies as memory to store data persistently. SSD technology uses electronic interfaces compatible with traditional block input/output (I/O) hard disk drives, thus permitting simple replacement in common applications.Also, new I/O interfaces like SATA Express are created to keep up with speed advancements in SSD technology.

Source Document

A source document is a document in which data collected for a clinical trial is first recorded. These data are usually later entered in the case report form. The ICH-GCP guidelines define source documents as "original documents, data, and records." Source documents contain source data, which is defined as "all information in original records and certified copies of original records of clinical findings, observations, or other activities in a clinical trial necessary for the reconstruction and evaluation of the trial.

Secondary

A subdivision of a primary that, like the primary, consists of a number and a descriptive title. The 2 digit secondary number is combined with the 5 digit primary number and the records schedule number to form a unique classification number for a file series.

Tape Drive

A tape drive is a data storage device that reads and writes data on a magnetic tape. Magnetic tape data storage is typically used for offline, archival data storage. Tape media generally has a favorable unit cost and long archival stability.

Filtering Retrieval Task

A task where a need for information by a user remains static as new documents enter a system.

Schedule Authority Number

A unique 6 digit number linked to a records schedule. Used in conjunction with the accession number, the schedule authority number allows Government Records Service, ministries and agencies to manage the storage and final disposition of government records.

Virus Signature File

A unique string of bits, or the binary pattern, of a virus. The Virus signature file is like a fingerprint in that it can be used to detect and identify specific viruses. Anti-virus software uses the virus signature to scan for the presence of malicious code.

ATX

ATX (Advanced Technology eXtended) is a motherboard form factor specification developed by Intel in 1995 to improve on previous de facto standards like the AT form factor. It was the first major change in desktop computer enclosure, motherboard and power supply design in many years, improving standardization and interchangeability of parts. The specification defines the key mechanical dimensions, mounting point, I/O panel, power and connector interfaces between a computer case, a motherboard and a power supply. With the improvements it offered, including lower costs, ATX overtook AT completely as the default form factor for new systems within a few years. ATX addressed many of the AT form factors annoyances that had frustrated system builders. Other standards for smaller boards (including microATX, FlexATX and mini-ITX) usually keep the basic rear layout but reduce the size of the board and the number of expansion slots.

EPROM

Acronym for erasable programmable read-only memory, and pronounced ee-prom, EPROM is a special type of memory that retains its contents until it is exposed to ultraviolet light. The ultraviolet light clears its contents, making it possible to reprogram the memory. To write to and erase an EPROM, you need a special device called a PROM programmer or PROM burner.

Active Records

Active Records (AR) is a popular Object-Relational Mapping (ORM) technique. Each Active Records class represents a database table (or view) whose attributes are represented as the Active Records class properties, and an Active Records instance represents a row in that table. Common CRUD operations are implemented as Active Records methods. As a result, we can access our data in a more object-oriented way.

Address Space

Address space is the amount of memory allocated for all possible addresses for a computational entity, such as a device, a file, a server, or a networked computer. Address space may refer to a range of either physical or virtual addresses accessible to a processor or reserved for a process. As unique identifiers of single entities, each address specifies an entity's location (unit of memory that can be addressed separately). On a computer, each computer device and process is allocated address space, which is some portion of the processor's address space. A processor's address space is always limited by the width of its address bus and registers. Address space may be differentiated as either flat, in which addresses are expressed as incrementally increasing integers starting at zero, or segmented, in which addresses are expressed as separate segments augmented by offsets (values added to produce secondary addresses). In some systems, address space can be converted from one format to the other through a process known as thunking.

Fiber Patch Cord

Also known as a patch cable, a fiber patch cord is a piece of copper wire or fiber optic cable that connects circuits on a patch panel.Patch cords are classified by transmission medium (long or short distance), by connector construction and by construction of the connector's inserted core cover.

Touchpad

Alternatively referred to as a glide pad, glide point, pressure sensitive tablet, or trackpad, a touchpad is an input device found on the majority of portable computers, and now also available with some external keyboards, that allow you to move the mouse cursor without the need of an external mouse.A touchpad is operated by using your finger and dragging it across a flat surface, as you move your finger on the surface, the mouse cursor will move in that same direction, and like most computer mice, the touchpad also has two buttons below the touch surface that enables you to click like a standard mouse.

Operational Records Classification System

An Operational Records System (ORS) is a classification system and retention schedule used to manage an agency's operational records, those records document the functions for which an agency is responsible according to statute, mandate or policy. Due to the unique nature of operational records, ORS cannot be developed in a common format. Rather, these systems are developed on an agency-by-agency basis in consultation with Information Management Archivists from the Saskatchewan Archives.

Ongoing Accession Number

An accession number that is used by an office for the regular or continuing transfer of records to government approved records storage facilities. An ongoing accession number differs from a one time accession number in that it can be used for multiple transfers. OANs are used to regularly transfer high volume records series, usually related to a single secondary classification number.

Electronic Forms

An e-form (electronic forms) is a computer program version of a paper form. Aside from eliminating the cost of printing, storing, and distributing pre-printed forms, and the wastage of obsolete forms, e-forms can be filled out faster because the programming associated with them can automatically format, calculate, look up, and validate information for the user. With digital signatures and routing via e-mail, approval cycle times can be significantly reduced. With electronic submission of completed forms, you can eliminate the cost of rekeying data and the associated errors.Compared to paper forms, e-forms allow more focus on the business process or underlying problem for which they are designed (for example, expense reporting, purchasing, or time reporting). They can understand the roles and responsibilities of the different participants of the process and, in turn, automate routing and much of the decision making necessary to process the form.

Digital Library

An electronic library (also referred to as digital library or digital repository) is a focused collection of digital objects that can include text, visual material, audio material, video material, stored as electronic media formats (as opposed to print, micro form, or other media), along with means for organizing, storing, and retrieving the files and media contained in the library collection. Digital libraries can vary immensely in size and scope, and can be maintained by individuals, organizations, or affiliated with established physical library buildings or institutions, or with academic institutions. The electronic content may be stored locally, or accessed remotely via computer networks. An electronic library is a type of information retrieval system.

Erbium Amplifier

An erbium amplifier, also called optical amplifier or an erbium-doped fiber amplifier or EDFA, is an optical or IR repeater that amplifies a modulated laser beam directly, without opto-electronic and electro-optical conversion. The device uses a short length of optical fiber doped with the rare-earth element erbium. When the signal-carrying laser beams pass through this fiber, external energy is applied, usually at IR wavelengths. This so-called pumping excites the atoms in the erbium-doped section of optical fiber, increasing the intensity of the laser beams passing through. The beams emerging from the EDFA retain all of their original modulation characteristics, but are brighter than the input beams.

Error

An error is a term used to describe any issue that arises unexpectedly that cause a computer to not function properly. Computers can encounter either software errors or hardware errors.Hardware errors are any defects with hardware inside the computer or connected to the computer. Although some hardware issues can be fixed with such things as firmware updates, typically any hardware errors caused by defects are resolved by replacing the defective hardware.Software errors are the most common types of errors on a computer and are typcially fixed with software updates or patches that are designed to fix errors in the code.

Classification System

Classification system are systems with a distribution of classes created according to common relations or affinities.

Instruction

An instruction is an order given to a computer processor by a computer program. At the lowest level, each instruction is a sequence of 0s and 1s that describes a physical operation the computer is to perform (Add) and, depending on the particular instruction type, the specification of special storage areas called registers that may contain data to be used in carrying out the instruction, or the location in computer memory of data.In a computer's assembler language, each language statement generally corresponds to a single processor instruction. In high-level languages, a language statement generally results (after program compilation) in multiple processor instructions.

Intrusion Detection System

An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.There are network based (NIDS) and host based (HIDS) intrusion detection systems. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization.

Online Public Access Catalogue

An online public access catalogue (often abbreviated as OPAC or simply library catalog) is an online database of materials held by a library or group of libraries. Users search a library catalog principally to locate books and other material available at a library.

Optical Amplifier

An optical amplifier is a device that amplifies an optical signal directly, without the need to first convert it to an electrical signal. An optical amplifier may be thought of as a laser without an optical cavity, or one in which feedback from the cavity is suppressed. Optical amplifiers are important in optical communication and laser physics.There are several different physical mechanisms that can be used to amplify a light signal, which correspond to the major types of optical amplifiers. In doped fibre amplifiers and bulk lasers, stimulated emission in the amplifier's gain medium causes amplification of incoming light. In semiconductor optical amplifiers (SOAs), electron-hole recombination occurs. In Raman amplifiers, Raman scattering of incoming light with phonons in the lattice of the gain medium produces photons coherent with the incoming photons. Parametric amplifiers use parametric amplification.

Photonic Network

An optical photonic network is a communications network in which information is transmitted as optical or infrared radiation transmission (IR) signals. In a true photonic network, every switch and every repeater works with IR or visible-light energy and conversion to and from electrical impulses is only done at the source and destination (origin and end point). Electric current propagates at about 10 percent of the speed of light (18,000 to 19,000 miles or 30,000 kilometers per second), while the energy in fiber optic systems travels at the speed of light. This results in shorter data-transmission delay times between the end points of a network. The top speed for data running over a single optical channel is about 10 Gbps but greater speeds can be obtained by dividing up a single optical cable into a number of channels.

Transferring Agency

An organisation utilised by mutual fund companies and other financial services firms to prepare and maintain documents and records relating to shareholder accounts.Specifically, transfer agency in the fund industry focus on buying and selling records of securities within funds. Some firms act as their own transfer agency, while the majority of shops employ an external vendor.

Uninterruptible Power Supply

An uninterruptible power supply, also uninterruptible power source, UPS or battery/flywheel backup, is an electrical apparatus that provides emergency power to a load when the input power source, typically mains power, fails. A UPS differs from an auxiliary or emergency power system or standby generator in that it will provide near-instantaneous protection from input power interruptions, by supplying energy stored in batteries, supercapacitors, or flywheels. The on-battery runtime of most uninterruptible power sources is relatively short (only a few minutes) but sufficient to start a standby power source or properly shut down the protected equipment.

Device

Any machine or component that attaches to a computer. Examples of device include disk drives, printers, mice, and modems. These particular devices fall into the category of peripheral devicesbecause they are separate from the main computer.Most devices, whether peripheral or not, require a program called a device driver that acts as a translator, converting general commands from an application into specific commands that the device understands.

Correspondence

Any written or digital communication exchanged by two or more parties. Correspondences may come in the form of letters, emails, text messages, voicemails, notes, or postcards. Correspondence are important for most businesses because they serve as a paper trail of events from point A to point B. The law firm required all employees to archive their correspondences so that they could be retrieved as a reference point for pending cases.

Biometric Locks

Biometric locks employ high-tech fingerprint recognition technology to verify your identity before allowing a locked door to be opened.

Blu Ray Disc

Blu ray Disc (BD) is a digital optical disc data storage format designed to supersede the DVD format, in that it is capable of storing high-definition video resolution (1080p). The plastic disc is 120 mm in diameter and 1.2 mm thick, the same size as DVDs and CDs. Conventional (pre-BD-XL) Blu ray Disc contain 25 GB per layer, with dual layer discs (50 GB) being the industry standard for feature-length video discs. Triple layer discs (100 GB) and quadruple layers (128 GB) are available for BD-XL re-writer drives. The name Blu ray Disc refers to the blue laser used to read the disc, which allows information to be stored at a greater density than is possible with the longer-wavelength red laser used for DVDs.

Browsing

Browsing is a kind of orienting strategy. It is supposed to identify something of relevance for the browsing organism. When used about human beings it is a metaphor taken from the animal kingdom. It is used, for example, about people browsing open shelves in libraries or browsing databases or the Internet. In Library and information science it is an important subject, both purely theoretically and as applied science aiming at designing interfaces which support browsing activities for the user.

Bulk Data Transfer

Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files. FTP (File Transfer Protocol) is the most common way to transfer bulk data over the Internet.

Network Cabling

Network cabling is a process used to connect one network device to other network devices or to connect two or more computers to share printer, scanner etc. Different types of network cabling like Coaxial cable, Optical fiber cable, Twisted Pair cables are used depending on the network's topology, protocol and size.

Chip

Chip is short for microchip, the incredibly complex yet tiny modules that store computer memory or provide logic circuitry for microprocessors. Perhaps the best known chips are the Pentium microprocessors from Intel. The PowerPC microprocessor, developed by Apple, Motorola, and IBM, is used in Macintosh personal computers and some workstations. AMD and Cyrix also make popular microprocessor chips.There are quite a few manufacturers of memory chips. Many special-purpose chips, known as application-specific integrated circuits, are being made today for automobiles, home appliances, telephones, and other devices.

CWDM

Coarse wavelength division multiplexing (CWDM) is a method of combining multiple signals on laser beams at various wavelengths for transmission along fiber optic cables, such that the number of channels is fewer than in dense wavelength division multiplexing (DWDM) but more than in standard wavelength division multiplexing (WDM).CWDM systems have channels at wavelengths spaced 20 nanometers (nm) apart, compared with 0.4 nm spacing for DWDM. This allows the use of low-cost, uncooled lasers for CWDM. In a typical CWDM system, laser emissions occur on eight channels at eight defined wavelengths: 1610 nm, 1590 nm, 1570 nm, 1550 nm, 1530 nm, 1510 nm, 1490 nm, and 1470 nm. But up to 18 different channels are allowed, with wavelengths ranging down to 1270 nm.

Coaxial Cable

Coaxial cable is the kind of copper cable used by cable TV companies between the community antenna and user homes and businesses. Coaxial cableCoaxial cable is called "coaxial" because it includes one physical channel that carries the signal surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis. The outer channel serves as a ground. Many of these cables or pairs of coaxial tubes can be placed in a single outer sheathing and, with repeaters, can carry information for a great distance.Coaxial cable is sometimes used by telephone companies from their central office to the telephone poles near users. It is also widely installed for use in business and corporation Ethernet and other types of local area network. Depending upon the carrier's technology and other factors, twisted pair copper wire and optical fiber may be used instead of coaxial cable.

Commodity Hardware

Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.To be interchangeable, commodity hardware is usually broadly compatible and can function on a plug and play basis with other commodity hardware products. In this context, a commodity item is a low-end but functional product without distinctive features. A commodity computer, for example, is a standard-issue PC that has no outstanding features and is widely available for purchase.

Communication Server

Communication server are open, standards-based computing systems that operate as a carrier-grade common platform for a wide range of communications applications and allow equipment providers to add value at many levels of the system architecture.

CD ROM

Compact Disc Read Only Memory, CD ROM drives or optical drives are CD players inside computers that can have speeds in the range from 1x and beyond, and have the capability of playing audio CDs and computer data CDs. Below is a picture of the front and back of a standard CD ROM drive.

Complementary Code Keying

Complementary Code Keying (CCK) is a modulation scheme used with wireless networks (WLANs) that employ the IEEE 802.11b specification. In 1999, Complementary Code Keying was adopted to supplement the Barker code in wireless digital networks to achieve data rate higher than 2 Mbit/s at the expense of shorter distance. This is due to the shorter chipping sequence in Complementary Code Keying (8 bits versus 11 bits in Barker code) that means less spreading to obtain higher data rate but more susceptible to narrowband interference resulting in shorter radio transmission range. Beside shorter chipping sequence, Complementary Code Keying also has more chipping sequences to encode more bits (4 chipping sequences at 5.5 Mbit/s and 64 chipping sequences at 11 Mbit/s) increasing the data rate even further. The Barker code, however, only has a single chipping sequence.

Computer Output Micro-Form

Computer Output Micro-form is a system that converts stored data directly to microfilm or microfiche. I know around ten people who used to sell Bell & Howell Computer Output Microfilm systems as far back as the 1960s to the 1980s. It almost seems to be a prerequisite for sales people in the micrographics industry from that era.

Hardware

Computer hardware is the collection of physical elements that constitutes a computer system. Computer hardware refers to the physical parts or components of a computer such as the monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that can be touched. In contrast, software is instructions that can be stored and run by hardware.

Memory

Computer memory is any physical device capable of storing information temporarily or permanently. For example, Random Access Memory (RAM), is a type of volatile memory that is stores information on an integrated circuit, and that is used by the operating system, software, hardware, or the user. Below is an example picture of a 512MB DIMM computer memory module.

Migration

Computer migration also referred to as personal computer (PC) migration, data migration, or software migration is the moving of data and applications between two different computers. Reasons for requiring a computer migration are varied, two of the most common reasons are the purchase of a new PC and the upgrading of PCs in a business environment. These situations could create the need to transfer all of the information from the older computer systems to the new ones. The migration of data can be performed manually, though full computer migration is usually facilitated by the aid of a software package and hardware, such as a data transfer cable.

Confidential Record

Confidential record are created with an expectation that they will not be disclosed to anyone except those persons requiring the records for a legitimate purpose.

Configuration Drift

Configuration drift is inconsistent configuration across computers ordevices.Configuration drift is a naturally occurring phenomenon in data center environments because of continual changes to software and hardware to the environment. Once configuration drift occurs, management can become extremely difficult. Configuration drift can account for many high availability and disaster recovery system failures.

Conventional PCI

Conventional PCI, often shortened to just PCI, is a local computer bus for attaching hardware devices in a computer. PCI is an initialism of Peripheral Component Interconnect and is part of the PCI Local Bus standard. The PCI bus supports the functions found on a processor bus but in a standardized format that is independent of any particular processor's native bus. Devices connected to the PCI bus appear to a bus master to be connected directly to its own bus and are assigned addresses in the processor's address space. It is a parallel bus, synchronous to a single bus clock.

Conversion

Conversion is the conversion of computer data from one format to another. Throughout a computer environment, data is encoded in a variety of ways. For example, computer hardware is built on the basis of certain standards, which requires that data contains, for example, parity bit checks. Similarly, the operating system is predicated on certain standards for data and file handling. Furthermore, each computer program handles data in a different manner. Whenever any one of these variable is changed, data must be converted in some way before it can be used by a different computer, operating system or program. Even different versions of these elements usually involve different data structures. For example, the changing of bits from one format to another, usually for the purpose of application interoperability or of capability of using new features, is merely a data conversion. conversion may as simple as the conversion of a text file from one character encoding system to another, or more complex, such as the conversion of office file formats, or the conversion of image and audio file formats.

Data Administration

Data administration or data resource management is an organizational function working in the areas of information systems and computer science that plans, organizes, describes and controls data resources. Data resources are usually as stored in databases under a database management system or other software such as electronic spreadsheets. In many smaller organizations, data administration is performed occasionally, or is a small component of the database administrator's work.

Data Recovery Service

Data Recovery Service is the process of salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives, solid-state drives (SSD), USB flash drive, storage tapes, CDs, DVDs, RAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system (OS).

Data Center Services

Data center services encompass all of the technology and facility-related components or activities that support the projects and operation of a data center, which is an environment that provides processing, storage, networking, management and the distribution of data within an enterprise.Generally, data center services fall into two categories: services provided to a data center or services provided from a data center. Services to a data center can include any services that help to plan, design, manage, support, update or modernize data center equipment, software or facilities. Services from a data center can encompass any compute service that data centers deliver, such as data backup and archiving, managed e-mail or cloud computing.

Completeness

Data completeness refers to an indication of whether or not all the data necessary to meet the current and future business information demand are available in the data resource.It deals with determining the data needed to meet the business information demand and ensuring those data are captured and maintained in the data resource so they are available when needed.

Data

Data is distinct pieces of information, usually formatted in a special way. All software is divided into two general categories,data and programs. Programs are collections of instructions for manipulating data.Data can exist in a variety of forms ,as numbers or text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored in a person's mind.Strictly speaking, data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word

DLITE

Data recovery system that has two parts of functionality control of a search process and a display of the search's results.

Data Streaming

Data streaming is the transfer of data at a steady high-speed rate sufficient to support such applications as high-definition television (HDTV) or the continuous backup copying to a storage medium of the data flow within a computer. Data streaming requires some combination of bandwidth sufficiency and, for real-time human perception of the data, the ability to make sure that enough data is being continuously received without any noticeable time lag.

Occurrence List

Data structure that assigns a list of positions to each text word within a document.

DTE

Data terminal equipment (DTE) is an end instrument that converts user information into signals or reconverts received signals. These can also be called tail circuits. A DTE device communicates with the data circuit-terminating equipment (DCE). The DTE/DCE classification was introduced by IBM.V.35 is a high-speed serial interface designed to support both higher data rates and connectivity between DTEs (data-terminal equipment) or DCEs (data-communication equipment) over digital lines.

Data Terminal Equipment

Data terminal equipment (DTE) is an end instrument that converts user information into signals or reconverts received signals. These can also be called tail circuits. A DTE device communicates with the data circuit-terminating equipment (DCE). The DTE/DCE classification was introduced by IBM.V.35 is a high-speed serial interface designed to support both higher data rates and connectivity between DTEs (data-terminal equipment) or DCEs (data-communication equipment) over digital lines.

Multimedia Data

Data that combines different media sources like text, images video or sound.

DWDM

Dense wavelength division multiplexing (DWDM) is a technology that puts data from different sources together on an optical fiber, with each signal carried at the same time on its own separate light wavelength. Using DWDM, up to 80 (and theoretically more) separate wavelengths or channels of data can be multiplexed into a lightstream transmitted on a single optical fiber. Each channel carries a time division multiplexed (TDM) signal. In a system with each channel carrying 2.5 Gbps (billion bits per second), up to 200 billion bits can be delivered a second by the optical fiber. DWDM is also sometimes called wave division multiplexing (WDM). Since each channel is demultiplexed at the end of the transmission back into the original source, different data formats being transmitted at different data rates can be transmitted together. Specifically, Internet (IP) data, Synchronous Optical Network data (SONET), and asynchronous transfer mode (ATM) data can all be travelling at the same time within the optical fiber.

Destruction of Records

Destruction of records is the final stage in records management whereby records which are no longer worthwhile or needed in terms of administration, research or law are sorted and disposed of in accordance with the set procedures.

DAB

Digital Audio Broadcasting (DAB) is a digital radio technology for broadcasting radio stations, used in several countries, particularly in Europe. As of 2006, approximately 1,002 stations worldwide broadcast in the DAB format.The DAB standard was initiated as a European research project in the 1980s.The Norwegian Broadcasting Corporation (NRK) launched the very first DAB channel in the world on 1 June 1995 (NRK Klassisk), and the BBC and SR launched their first DAB digital radio broadcasts in September 1995. DAB receivers have been available in many countries since the end of the 1990s. DAB may offer more radio programmes over a specific spectrum than analogue FM radio. DAB is more robust with regard to noise and multipath fading for mobile listening, since DAB reception quality first degrades rapidly when the signal strength falls below a critical threshold, whereas FM reception quality degrades slowly with the decreasing signal.

DVI

Digital Video Interactive (DVI) was the first multimedia desktop video standard for IBM-compatible personal computers. It enabled full-screen, full motion video, as well as stereo audio, still images, and graphics to be presented on a DOS-based desktop computer. The scope of Digital Video Interactive encompasses a file format, including a digital container format, a number of video and audio compression formats, as well as hardware associated with the file format.

Emanation Monitoring

Emanation monitoring is to monitor electric or electromagnetic radiation emanations from electronic equipment including microchips, monitors etc.

Direct Access File System

Direct Access File System (DAFS) is a file-access sharing protocol that uses memory-to-memory interconnect architectures, such as VI and InfiniBand. DAFS is designed for storage area networks (SANs) to provide bulk data transfer directly between the application buffers of two machines without having to packetize the data. With DAFS an application can transfer data to and from application buffers without using the operating system, which frees up the processor and operating system for other processes and allows files to be accessed by servers using several different operating systems.

Disparity

Disparity refers to the distance between two corresponding points in the left and right image of a stereo pair. If you look at the image below you see a labelled point X (ignore X1, X2 & X3). By following the dotted line from X to OL you see the intersection point with the left hand plane at XL. The same principal applies with the right-hand image plane.

Display Port

Display Port is a digital display interface developed by the Video Electronics Standards Association (VESA). The interface is primarily used to connect a video source to a display device such as a computer monitor, though it can also be used to carry audio, USB, and other forms of data.

Diverse Routing

Diverse routing is where the carrier provides more than one route to bring the ISDN 30's from the exchange, or exchanges, (as in dual parenting), but they may share underground ducting and cabinets.

Inactive Records

Document no longer required in the day to day operations of an organization, but which must be kept for administrative, historical, or legal purposes.

Legal Value

Document or record's lawfully defined worth. Legal proof of authority or business transaction, enforceable rights or obligations, or the basis for a legal action all rest of this worth of legal value.

Operational Records

Document relating specifically to operations and services provided by a particular department or division, and which is distinct from the general administrative (housekeeping) records. Also called functional record or unique record.

Dot Green

Dot green is a shorthand way of describing the online green computing movement, including both hype and real innovation. The dot-green movement is considered to follow the dot-com boom model, with the same bubble of speculators profiting from the buzz.

DSR

Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks. It is similar to AODV in that it forms a route on-demand when a transmitting computer requests one. However, it uses source routing instead of relying on the routing table at each intermediate device.Determining source routes requires accumulating the address of each device between the source and destination during route discovery. The accumulated path information is cached by nodes processing the route discovery packets. The learned paths are used to route packets. To accomplish source routing, the routed packets contain the address of each device the packet will traverse. This may result in high overhead for long paths or large addresses, like IPv6. To avoid using source routing, DSR optionally defines a flow id option that allows packets to be forwarded on a hop-by-hop basis.

Dynamic Source Routing

Dynamic Source Routing (DSR) is a self-maintaining routing protocol for wireless networks. The protocol can also function with cellular telephone systems and mobile networks with up to about 200 nodes. A Dynamic Source Routing network can configure and organize itself independently of oversight by human administrators.In Dynamic Source Routing, each source determines the route to be used in transmitting its packets to selected destinations. There are two main components, called Route Discovery and Route Maintenance. Route Discovery determines the optimum path for a transmission between a given source and destination. Route Maintenance ensures that the transmission path remains optimum and loop-free as network conditions change, even if this requires changing the route during a transmission.

DRAM

Dynamic random access memory (DRAM) is a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit. The capacitor can be either charged or discharged, these two states are taken to represent the two values of a bit, conventionally called 0 and 1. Since even "nonconducting" transistors always leak a small amount, the capacitors will slowly discharge, and the information eventually fades unless the capacitor charge is refreshed periodically. Because of this refresh requirement, it is a dynamic memory as opposed to SRAM and other static memory.

EEPROM

EEPROM (also written E2PROM) stands for Electrically Erasable Programmable Read-Only Memory and is a type of non-volatile memory used in computers and other electronic devices to store small amounts of data that must be saved when power is removed, e.g. calibration tables or device configuration.Unlike bytes in most other kinds of non-volatile memory, individual bytes in a traditional EEPROM can be independently read, erased, and re-written.When larger amounts of static data are to be stored a specific type of EEPROM such as flash memory is more economical than traditional EEPROM devices. EEPROMs are organized as arrays of floating-gate transistors.

Elastic Load Balancing

Elastic load balancing (ELB) is a load balancing solution that automatically scales its request-handling capacity in response to incoming application traffic. ELB solutions often provide scalable cloud computing capacity.Historically, load balancing divides the amount of work that a computer has to do among multiple computers so that users, in general, get served faster.

Electronic Data Processing

Electronic Data Processing (EDP) can refer to the use of automated methods to process commercial data. Typically, this uses relatively simple, repetitive activities to process large volumes of similar information. For example: stock updates applied to an inventory, banking transactions applied to account and customer master files, booking and ticketing transactions to an airline's reservation system, billing for utility services. The modifier "electronic" or "automatic" was used with "data processing" (DP), especially ca. 1960, to distinguish human clerical data processing from that done by computer.

Endurance Testing

Endurance testing involves examining a system while it withstands a huge load for a long period of time, and measuring the system's reaction parameters under such conditions. Performance quality may also be tested to make sure that both the result and the reaction times - after a defined long period of continuous load - are degraded no more than a certain specified percentage from their values at the beginning of the test.

Energy Star

Energy Star (trademarked ENERGY STAR) is an international standard for energy efficient consumer products originated in the United States of America. It was created in 1992 by the Environmental Protection Agency and the Department of Energy. Since then, Australia, Canada, Japan, New Zealand, Taiwan and the European Union have adopted the program. Devices carrying the Energy Star service mark, such as computer products and peripherals, kitchen appliances, buildings and other products, generally use 20-30% less energy than required by federal standards. In the United States, the Energy Star label is also shown on EnergyGuide appliance label of qualifying products.

EDFA

Erbium Doped Fiber Amplifier. EDFA is an optical repeater device that is used to boost the intensity of optical signals being carried through a fiber optic communications system. An optical fiber is doped with the rare earth element erbium so that the glass fiber can absorb light at one frequency and emit light at another frequency. An external semiconductor laser couples light into the fiber at infrared wavelengths of either 980 or 1480 nanometers. This action excites the erbium atoms. Additional optical signals at wavelengths between 1530 and 1620 nanometers enter the fiber and stimulate the excited erbium atoms to emit photons at the same wavelength as the incoming signal. This action amplifies a weak optical signal to a higher power, effecting a boost in the signal strength.Fiber optic use in the 1980s required the light signals to be converted back into electronic signals at the data's final destination. EDFA removes this step from the process: all the steps of its operation are the actions of photons, so there is no conversion of optical signals to electronic signals.

Ethernet Industrial Protocol

EtherNet/IP (Ethernet Industrial Protocol) is a communications protocol originally developed by Rockwell Automation, currently managed by the Open DeviceNet Vendors Association (ODVA) and designed for use in process control and other industrial automation applications.EtherNet/IP uses Ethernet physical layer network infrastructure. It is built on the TCP/IP protocols, but the "IP" in EtherNet/IP stands for "Industrial Protocol." It is not an abbreviation for "Internet Protocol".

Exclusive OR

Exclusive disjunction or exclusive is a logical operation that outputs true whenever both inputs differ (one is true, the other is false). It is symbolized by the prefix operator J and by the infix operators XOR, EOR, EXOR, ⊻, ⊕, ↮, and ≢. The opposite of XOR is logical biconditional, which outputs true whenever both inputs are the same.It gains the name "exclusive or" because the meaning of "or" is ambiguous when both operands are true, exclusive or excludes that case. This is sometimes thought of as "one or the other but not both". This could be written as A or B but not A & B.

Express Card

Express Card is an interface to allow peripheral devices to be connected to a computer, usually a laptop computer. Formerly called NEWCARD the ExpressCard standard specifies the design of slots built into the computer and of cards which can be inserted into ExpressCard slots. The cards contain electronic circuitry and connectors to which external devices can be connected. The ExpressCard standard replaces the PC Card (also known as PCMCIA) standards.

FICON

FICON (for Fiber Connectivity) is a high-speed input/output (I/O) interface for mainframe computer connections to storage devices. As part of IBM's S/390 server, FICON channels increase I/O capacity through the combination of a new architecture and faster physical link rates to make them up to eight times as efficient as ESCON (Enterprise System Connection), IBM's previous fiber optic channel standard.

Failure Mode

Failure mode (FM) refers to the way in which something might break down and includes potential errors that may occur, especially errors that may affect the customer. Effective analysis (EA) involves deciphering the consequences of those break downs by making sure that all failures can be detected, determining how frequently a failure might occur and identifying which potential failures should be prioritized. Business analysts typically use FMEA templates to assist them in the completion of the analysis.

Femtocell

Femtocell are an alternative way to deliver the benefits of fixed-mobile convergence (FMC). The distinction is that most FMC architectures require a new (dual-mode) handset which works with existing unlicensed spectrum home/enterprise wireless access points, while a femtocell-based deployment will work with existing handsets but requires installation of a new access point that uses licensed spectrum.Many operators have launched femtocell service, including Vodafone, SFR, AT&T, Sprint Nextel, Verizon, Zain, Mobile TeleSystems, and Orange.

Fiber Connectivity

Fiber optic cable is the highest capacity and fastest communications medium in the world. Operating at the speed of light Government operations, enterprises, individuals and Internet users all benefit from fiber. Telephone companies provide high-capacity backhaul for mobile and land-line subscribers over fiber links. Government offices can provide quick and uniform services with fiber's high speed. Healthcare facilities are able to connect doctors, patients, hospitals and clinics to provide the most advanced health services. Education facilities can connect students to the world's growing bank of distance-learning applications to boost education at every level. Individuals from home can enjoy high-speed Internet access for video-downloads.

File List

File List are explicitly named lists of files. Whereas FileSets act as filters, returning only those files that exist in the file system and match specified patterns, FileLists are useful for specifying files that may or may not exist. Multiple files are specified as a list of files, relative to the specified directory, with no support for wildcard expansion (filenames with wildcards will be included in the list unchanged). FileLists can appear inside tasks that support this feature or as stand-alone types.

File Operations

File operations are simply those things that you can do to a file. For example, you can create a file, save a file, open a file, etc. In the last section, you learned about naming and saving a file. There are many different types of file operations. The main ones that most people use are: Creating a file,Opening a file,Closing a file,Renaming a file,Copying a file,Deleting a file.

Functional Analysis

Functional analysis is a branch of mathematical analysis, the core of which is formed by the study of vector spaces endowed with some kind of limit-related structure (e.g. inner product, norm, topology, etc.) and the linear operators acting upon these spaces and respecting these structures in a suitable sense. The historical roots of functional analysis lie in the study of spaces of functions and the formulation of properties of transformations of functions such as the Fourier transform as transformations defining continuous, unitary etc. operators between function spaces. This point of view turned out to be particularly useful for the study of differential and integral equations.

Fuzzy Model

Fuzzy model is often used to represent nonlinear dynamic systems, by interpolating between local linear, time-invariant (LTI) ARX models. There are two approaches to extract a linear model from the fuzzy model around a given operating point. The first approach is based on the fact that the TS model interpolates between local linear models. Hence, the extracted linear model is obtained by interpolating the parameters of the local models in the TS model. The second approach extracts the parameters of the linear model by Taylor expansion. The locally interpreted interpolated model is not identical to the model obtained by this Taylor expansion based linearization of the fuzzy model. For the identification of a fuzzy model, also two approaches can be followed. With the global approach the parameters of all rule consequences are estimated within one identification problem, yielding an optimal predictor. The local parameter estimation does not estimate all parameters simultaneously. It rather divides this task into a set of weighted least-squares problems. As it has been shown in this project, only consequent parameters obtained by local estimation (weighted least squares) can be interpreted locally and used as a Linear Parameter Varying (LPV) model in the MPC where the extracted model parameters are interpolated. Parameters obtained by global identification do not lend themselves to the LPV interpretation. Such a model is only applicable where the extracted models are obtained by Taylor-series linearization.

Global Analysis

Global analysis, also called analysis on manifolds, is the study of the global and topological properties of differential equations on manifolds and vector space bundles. Global analysis uses techniques in infinite-dimensional manifold theory and topological spaces of mappings to classify behaviors of differential equations, particularly nonlinear differential equations. These spaces can include singularities and hence catastrophe theory is a part of global analysis. Optimization problems, such as finding geodesics on Riemannian manifolds, can be solved using differential equations so that the calculus of variations overlaps with global analysis.

Green Networking

Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.Although investing in green networking may require an initial cash outlay, the products and practices involved typically save money once put in place.

Grid Storage

Grid storage is a general term for any approach to storing data that employs multiple self-contained storage nodes interconnected so that any node can communicate with any other node without the data having to pass through a centralized switch. Each storage node contains its own storage medium, microprocessor, indexing capability, and management layer. Typically, several nodes may share a common switch, but each node is also connected to at least one other node cluster. Several topologies have been designed and tested, including the interconnection of nodes in a hypercube configuration, similar to the way nodes are interconnected in a mesh network.

HDMI

HDMI (High-Definition Multimedia Interface) is a compact audio/video interface for transferring uncompressed video data and compressed or uncompressed digital audio data from a HDMI-compliant source device to a compatible computer monitor, video projector, digital television, or digital audio device. HDMI is a digital replacement for existing analog video standards.

IT Infrastructure

IT infrastructure consists of all components that somehow play a role in overall IT and IT-enabled operations. It can be used for internal business operations or developing customer IT or business solutions. IT infrastructure refers to the composite hardware, software, network resources and services required for the existence, operation and management of an enterprise IT environment. It allows an organization to deliver IT solutions and services to its employees, partners and/or customers and is usually internal to an organization and deployed within owned facilities.

General Computer Control

ITGCs may also be referred to as General Computer Control which are defined as: Controls, other than application control, which relate to the environment within which computer-based application systems are developed, maintained and operated, and which are therefore applicable to all applications. The objectives of general controls are to ensure the proper development and implementation of applications, the integrity of program and data files and of computer operations. Like application controls, general controls may be either manual or programmed. Examples of general controls include the development and implementation of an IS strategy and an IS security policy, the organization of IS staff to separate conflicting duties and planning for disaster prevention and recovery.

PU

In IBM's Systems Network Architecture ( SNA ), a physical unit (PU) identifies a network node that supports communication sessions between logical units (LU). Logical units represent end users. Two logical units that communicate depend on physical connections being established through associated physical units. The network point at each end of a communication that sets up the communication session between logical units is called the system services control point (SSCP) . The SSCP sets up its own session with the PU on behalf of the LU-LU session. Typically, a logical unit is a unique connection to an application program. A physical unit is the hardware and routing aspect of a network node . IBM's Virtual Telecommunication Access Method ( VTAM ) is used by an application program to manage session and communication requests on behalf of logical units.

Framework

In computer programming, a software framework is an abstraction in which software providing generic functionality can be selectively changed by additional user-written code, thus providing application-specific software. A software framework is a universal, reusable software platform to develop software applications, products and solutions. Software frameworks include support programs, compilers, code libraries, tool sets, and application programming interfaces (APIs) that bring together all the different components to enable development of a project or solution.

Cohesion

In computer programming, cohesion refers to the degree to which the elements of a module belong together. Thus, it is a measure of how strongly related each piece of functionality expressed by the source code of a software module is.Cohesion is an ordinal type of measurement and is usually described as "high cohesion" or "low cohesion". Modules with high cohesion tend to be preferable because high cohesion is associated with several desirable traits of software including robustness, reliability, reusability, and understandability whereas low cohesion is associated with undesirable traits such as being difficult to maintain, difficult to test, difficult to reuse, and even difficult to understand.

Table Look-Up

In computer science, a Table look up is an array that replaces runtime computation with a simpler array indexing operation. The savings in terms of processing time can be significant, since retrieving a value from memory is often faster than undergoing an 'expensive' computation or input/output operation. The tables may be precalculated and stored in static program storage, calculated (or "pre-fetched") as part of a program's initialization phase (memoization), or even stored in hardware in application-specific platforms. Table look up are also used extensively to validate input values by matching against a list of valid (or invalid) items in an array and, in some programming languages, may include pointer functions (or offsets to labels) to process the matching input.

Stream

In computer science, a stream is a sequence of data elements made available over time. A stream can be thought of as a conveyor belt that allows items to be processed one at a time rather than in large batches.

Edit Distance

In computer science, edit distance is a way of quantifying how dissimilar two strings (e.g. words) are to one another by counting the minimum number of operations required to transform one string into the other. Edit distances find applications in natural language processing, where automatic spelling correction can determine candidate corrections for a misspelled word by selecting words from a dictionary that have a low distance to the word in question. In bioinformatics, it can be used to quantify the similarity of macromolecules such as DNA, which can be viewed as strings of the letters A, C, G and T.Several definitions of edit distance exist, using different sets of string operations. One of the most common variants is called Levenshtein distance, named after the Soviet Russian computer scientist Vladimir Levenshtein. In this version, the allowed operations are the removal or insertion of a single character, or the substitution of one character for another. Levenshtein distance may also simply be called "edit distance", although several variants exist.

SISD

In computing, SISD (single instruction, single data) is a term referring to a computer architecture in which a single processor, a uniprocessor, executes a single instruction stream, to operate on data stored in a single memory. This corresponds to the von Neumann architecture.SISD is one of the four main classifications as defined in Flynn's taxonomy. In this system classifications are based upon the number of concurrent instructions and data streams present in the computer architecture. According to Michael J. Flynn, SISD can have concurrent processing characteristics. Instruction fetching and pipelined execution of instructions are common examples found in most modern SISD computers.

Log File

In computing, a logfile (or simply log) is a file that records either the events which happen while an operating system or other software runs, or the personal messages between different users of a communication software. The act of keeping a logfile is called logging. In the simplest case, log messages are written to a single log file.Many operating systems, software frameworks and user programs include some form of logging subsystem. A general standard outlining a logging system is the Syslog standard (described in RFC 5424), which allows the filtering and recording of log messages to be performed by a separate dedicated subsystem, rather than placing the onus on each application to provide its own ad hoc logging system.

External Storage

In computing, external storage comprises devices that temporarily store information for transporting[citation needed] from computer to computer. Such devices are not permanently fixed inside a computer.Semiconductor memories are not sufficient to provide the whole storage capacity required in computers. The major limitation in using semiconductor memories is the cost per bit of the stored information. So to fulfill the large storage requirements of computers, magnetic disks, optical disks are generally used.

Shared Memory Multiprocessor

In computing, shared memory is memory that may be simultaneously accessed by multiple programs with an intent to provide communication among them or avoid redundant copies. Shared memory is an efficient means of passing data between programs. Depending on context, programs may run on a single processor or on multiple separate processors.

Computer Form Factor

In computing, the Computer form factor is the specification of a motherboard - the dimensions, power supply type, location of mounting holes, number of ports on the back panel, etc. Specifically, in the IBM PC compatible industry, standard form factor ensure that parts are interchangeable across competing vendors and generations of technology, while in enterprise computing, form factor ensure that server modules fit into existing rackmount systems. Traditionally, the most significant specification is for that of the motherboard, which generally dictates the overall size of the case. Small form factor have been developed and implemented.

Disk Mirroring

In data storage, disk mirroring is the replication of logical disk volumes onto separate physical hard disks in real time to ensure continuous availability. It is most commonly used in RAID 1. A mirrored volume is a complete logical representation of separate volume copies.In a disaster recovery context, mirroring data over long distance is referred to as storage replication. Depending on the technologies used, replication can be performed synchronously, asynchronously, semi-synchronously, or point-in-time. Replication is enabled via microcode on the disk array controller or via server software. It is typically a proprietary solution, not compatible between various storage vendors.

Records

In database management systems, a complete set of information. Records are composed of fields, each of which contains one item of information. A set of records constitutes a file. For example, a personnel file might contain records that have three fields: a name field, an address field, and a phone number field.In relational database management systems, records are called tuples.Some programming languages allow you to define a special data structure called a record. Generally, a record is a combination of other data objects. For example, a record might contain three integers, a floating-point number, and a character string.

Channel Service Unit

In telecommunications, a channel service unit (CSU) is a line bridging device for use with T-carrier that is used to perform loopback testing,may perform bit stuffing, may also provide a framing and formatting pattern compatible with the network,provides a barrier for electrical interference from either side of the unit, and is the last signal regeneration point, on the loop side, coming from the central office, before the regenerated signal reaches a multiplexer or data terminal equipment (DTE).

Connection Broker

In desktop virtualization, a connection broker is a software program that allows the end-user to connect to an available desktop. The connection broker performs tasks that include,Validating the user name and providing a connection for the user.Providing the ability for the user to connect to a specific virtual machine (VM), virtual client, PC blade or terminal services server. Providing the ability for the user to access multiple VM pools. (If the user is permitted to access a variety of pools, the broker prompts the user to select a pool at login time.)Monitoring the activity level of a given virtual machine and setting status to active or inactive.Handling reassignment of a virtual machine when a user disconnects.

Logic Gates

In electronics, a logic gates is an idealized or physical device implementing a Boolean function, that is, it performs a logical operation on one or more logical inputs, and produces a single logical output. Depending on the context, the term may refer to an ideal logic gates, one that has for instance zero rise time and unlimited fan-out, or it may refer to a non-ideal physical device.

Document

In general, a document (noun) is a record or the capturing of some event or thing so that the information will not be lost. Usually, a document is written, but a document can also be made with pictures and sound. A document usually adheres to some convention based on similar or previous documents or specified requirements. Examples of documents are sales invoices, wills and deeds, newspaper issues, individual newspaper stories, oral history recordings, executive orders, and product specifications.

Accessibility

In human-computer interaction, accessibility (also known as Accessible computing) refers to the accessibility of a computer system to all people, regardless of disability or severity of impairment. It is largely a software concern, when software, hardware, or a combination of hardware and software, is used to enable use of a computer by a person with a disability or impairment, this is known as Assistive Technology.

Image Processing

In imaging science, image processing is any form of signal processing for which the input is an image, such as a photograph or video frame, the output of image processing may be either an image or a set of characteristics or parameters related to the image. Most image-processing techniques involve treating the image as a two-dimensional signal and applying standard signal-processing techniques to it.Image processing usually refers to digital image processing, but optical and analog image processing also are possible. This article is about general techniques that apply to all of them. The acquisition of images (producing the input image in the first place) is referred to as imaging.

Neural Networks

In information technology, a neural networks is a system of programs and data structures that approximates the operation of the human brain. A neural networks usually involves a large number of processors operating in parallel, each with its own small sphere of knowledge and access to data in its local memory. Typically, a neural networks is initially "trained" or fed large amounts of data and rules about data relationships (for example, "A grandfather is older than a person's father"). A program can then tell the network how to behave in response to an external stimulus (for example, to input from a computer user who is interacting with the network) or can initiate activity on its own (within the limits of its access to the external world).

Stemming

In linguistic morphology and information retrieval, stemming is the process for reducing inflected (or sometimes derived) words to their stem, base or root form—generally a written word form. The stem need not be identical to the morphological root of the word, it is usually sufficient that related words map to the same stem, even if this stem is not in itself a valid root. Algorithms for stemming have been studied in computer science since the 1960s. Many search engines treat words with the same stem as synonyms as a kind of query expansion, a process called conflation.

Greenfield Deployment

In networking, a greenfield deployment is the installation and configuration of a network where none existed before, for example in a new office. A brownfield deployment, in contrast, is an upgrade or addition to an existing network and uses some legacy components. The terms come from the building industry, where undeveloped land (and especially unpolluted land) is described as greenfield and previously developed (often polluted and abandoned) land is described as brownfield.

Requirements

In product development and process optimization, a requirements is a singular documented physical and functional need that a particular design, product or process must be able to perform. It is most commonly used in a formal sense in systems engineering, software engineering, or enterprise engineering. It is a statement that identifies a necessary attribute, capability, characteristic, or quality of a system for it to have value and utility to a customer, organisation, internal user, or other stakeholder. A specification (often abbreviated as spec) may refer to an explicit set of requirements to be satisfied by a material, design, product, or service.

Component

In programming and engineering disciplines, a component is an identifiable part of a larger program or construction. Usually, a component provides a particular function or group of related functions. In programming design, a system is divided into components that in turn are made up of modules . Component test means testing all related modules that form a component as a group to make sure they work together. In object-oriented programming and distributed object technology, a component is a reusable program building block that can be combined with other components in the same or other computers in a distributed network to form an application. Examples of a component include: a single button in a graphical user interface, a small interest calculator, an interface to a database manager. Components can be deployed on different servers in a network and communicate with each other for needed services. A component runs within a context called a container .

Function

In programming, a named section of a program that performs a specific task. In this sense, a function is a type of procedure or routine. Some programming languages make a distinction between a function, which returns a value, and a procedure, which performs some operation but does not return a value.Most programming languages come with a prewritten set of functions that are kept in a library. You can also write your own functions to perform specialized tasks.

Forward Error Correction

In telecommunication, information theory, and coding theory, forward error correction (FEC) or channel coding is a technique used for controlling errors in data transmission over unreliable or noisy communication channels. The central idea is the sender encodes their message in a redundant way by using an error-correcting code (ECC). The American mathematician Richard Hamming pioneered this field in the 1940s and invented the first error-correcting code in 1950: the Hamming (7,4) code.

DSSS

In telecommunications, direct sequence spread spectrum (DSSS) is a modulation technique. As with other spread spectrum technologies, the transmitted signal takes up more bandwidth than the information signal that modulates the carrier or broadcast frequency. The name 'spread spectrum' comes from the fact that the carrier signals occur over the full bandwidth (spectrum) of a device's transmitting frequency. Certain IEEE 802.11 standards use DSSS signaling.

Transaction Log

In the field of databases in computer science, a transaction log (also transaction journal, database log, binary log or audit trail) is a history of actions executed by a database management system to guarantee ACID properties over crashes or hardware failures.If, after a start, the database is found in an inconsistent state or not been shut down properly, the database management system reviews the database logs for uncommitted transactions and rolls back the changes made by these transactions. Additionally, all transactions that are already committed but whose changes were not yet materialized in the database are re-applied. Both are done to ensure atomicity and durability of transactions.

Networking

In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.

Information Resource Management

Information Resource Management - (IRM) A philosophical and practical approach to managing government information. Information is regarded as a valuable resource which should be managed like other resources, and should contribute directly to accomplishing organisational goals and objectives. IRM provides an integrated view for managing the entire life-cycle of information, from generation, to dissemination, to archiving and/or destruction, for maximising the overall usefulness of information, and improving service delivery and program management.

Information Architecture

Information architecture (IA) is the structural design of shared information environments, the art and science of organizing and labeling websites, intranets, online communities and software to support usability and findability, and an emerging community of practice focused on bringing principles of design and architecture to the digital landscape. Typically, it involves a model or concept of information which is used and applied to activities that require explicit details of complex information systems. These activities include library systems and database development.

IT Risk

Information technology risk, or IT risk, IT-related risk, is any risk related to information technology. This relatively new term due to an increasing awareness that information security is simply one facet of a multitude of risks that are relevant to IT and the real-world processes it supports. Generally speaking, risk is the product of the likelihood of an event occurring and the impact that event would have on an information technology asset, i.e. Risk = Likelihood * Impact.

Documentation

Instructions for using a computer device or program. Documentation can appear in a variety of forms, the most common being manuals. When you buy a computer product (hardware or software), it almost always comes with one or more manuals that describe how to install and operate the product. In addition, many software products include an online version of the documentation that you can display on your screen or print out on a printer. A special type of online documentation is a help system , which has the documentation embedded into the program. Help systems are often called context-sensitive because they display different information depending on the user's position (context) in the application.

Spanning Port

It is a process of connecting two or more ports on a network switch so that traffic can be simultaneously sent to a network connected to another port.

Photonic Switching

Lambda switching (sometimes called photonic switching, or wavelength switching) is the technology used in optical networking to switch individual wavelengths of light onto separate paths for specific routing of information. In conjunction with technologies such as dense wavelength division multiplexing (DWDM) - which enables 80 or more separate light wavelengths to be transmitted on a single optical fiber lambda switching enables a light path to behave like a virtual circuit.Although the ability to redirect specific wavelengths intelligently is, in itself, a technological breakthrough, lambda switching works in much the same way as traditional routing and switching. Lambda routers which are also called wavelength routers, or optical cross-connects (OXC) are positioned at network junction points. The lambda router takes in a single wavelength of light from a specific fiber optic strand and recombines it into another strand that is set on a different path. Lambda routers are being manufactured by a number of companies, including Ciena, Lucent, and Nortel.

Records Inventory

List of all documents, files, and records created/received and maintained by an organization. It describes the title, function, purpose, content, date, format, and recording media, etc., and helps in development of a record retention schedule.

Local Context Analysis

Local context analysis is a main way to enhance the effectiveness of query expansion in the information retrieval field. A typical query may go through a pre- refinement process to improve its retrieval power. Most of the existing local context analysis methods are attempting to solve invalid selection of additive terms, which will result in retrieval performance degradation, in the process of query expansion. In this paper, we introduce a complementary method. The new local context analysis technique is improved by incorporating semantic similarity metric into query expansion model. Finally in our experimental results, using the three groups of data sets on text retrieval conference, we show a significant enhancement of precision over current existing method in the field.

Magnetic Ink Character Recognition

MICR (magnetic ink character recognition) is a technology used to verify the legitimacy or originality of paper documents, especially checks. Special ink, which is sensitive to magnetic fields, is used in the printing of certain characters on the original documents. Information can be encoded in the magnetic characters.The use of MICR can enhance security and minimize the losses caused by some types of crime. If a document has been forged - for example, a counterfeit check produced using a color photocopying machine, the magnetic-ink line will either not respond to magnetic fields, or will produce an incorrect code when scanned using a device designed to recover the information in the magnetic characters. Even a legitimate check can be rejected if the MICR reader indicates that the owner of the account has a history of writing bad checks.

Near Field Communication

Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. Communication is also possible between a NFC device and an unpowered NFC chip, called a "tag".

Mainframe

Mainframe computers (colloquially referred to as "big iron") are computers used primarily by corporate and governmental organizations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning and transaction processing.The term originally referred to the large cabinets called "main frames" that housed the central processing unit and main memory of early computers. Later, the term was used to distinguish high-end commercial machines from less powerful units.Most large-scale computer system architectures were established in the 1960s, but continue to evolve.

Management

Management in business and organizations is the function that coordinates the efforts of people to accomplish goals and objectives using available resources efficiently and effectively. Management comprises planning, organizing, staffing, leading or directing, and controlling an organization or initiative to accomplish a goal. Resourcing encompasses the deployment and manipulation of human resources, financial resources, technological resources, and natural resources. Management is also an academic discipline, a social science whose object of study is the social organization.

Meta Search

Meta search means instead of getting results from one search engine, you'll be getting the best combined results from a variety of engines, and not just any engines, but industry leading engines like Google and Yahoo.

Micro Form

Micro form are any forms, either films or paper, containing microreproductions of documents for transmission, storage, reading, and printing. Micro form images are commonly reduced to about one twenty-fifth of the original document size. For special purposes, greater optical reductions may be used.All microform images may be provided as positives or negatives, more often the latter.

Mini VGA

Mini VGA connectors are a non-standard, proprietary alternative used on some laptops and other systems in place of the standard VGA connector, although most laptops use a standard VGA connector. Apple, HP and Asus have separate implementations using the same name. Apart from its compact form, mini VGA ports have the added ability to output both composite and S-Video in addition to VGA signals through the use of EDID.The mini-DVI and now Mini Display Port connectors have largely replaced mini-VGA. Mini VGA connectors are most commonly seen on Apple's iBooks, eMacs, early PowerBooks (12 inch), and some iMacs, but has also been included on several laptops manufactured by Sony. HP's versions are found in HP Minis and HP TouchSmarts.

Inference Network

Model of document retrieval that uses document interpretation, index terms, and user queries as nodes of a Bayesian network.

Near End Crosstalk

Near end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling. NEXT is usually caused by crossed or crushed wire pairs. The error condition does not require that the wires be crushed so much that the conductors inside become exposed. Two conductors only need to be close enough so that the radiating signal from one of the wires can interfere with the signal traveling on the other. Most medium- to high-end cable testers are capable of testing for NEXT errors.

NFC

Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. Communication is also possible between a NFC device and an unpowered NFC chip, called a "tag".

Non Volatile Random Access Memory

Non volatile random access memory (NVRAM) is random-access memory that retains its information when power is turned off (non-volatile). This is in contrast to dynamic random-access memory (DRAM) and static random-access memory (SRAM), which both maintain data only for as long as power is applied.The best-known form of NVRAM memory today is flash memory. Some drawbacks to flash memory include the requirement to write it in larger blocks than many computers can automatically address, and the relatively limited longevity of flash memory due to its finite number of write-erase cycles (most consumer flash products at the time of writing can withstand only around 100,000 rewrites before memory begins to deteriorate). Another drawback is the performance limitations preventing flash from matching the response times and, in some cases, the random addressability offered by traditional forms of RAM. Several newer technologies are attempting to replace flash in certain roles, and some even claim to be a truly universal memory, offering the performance of the best SRAM devices with the non-volatility of flas.

Null Modem

Null modem is a communication method to connect two DTEs (computer, terminal, printer etc.) directly using an RS-232 serial cable. The name stems from the historical use of the RS-232 cable to connect two teleprinter devices to modems in order to communicate with one another, null modem communication was possible by instead using RS-232 to connect the teleprinters directly to one another.The RS-232 standard is asymmetrical as to the definitions of the two ends of the communications link so it assumes that one end is a DTE and the other is a DCE e.g. a modem. With a null modem connection the transmit and receive lines are crosslinked. Depending on the purpose, sometimes also one or more handshake lines are crosslinked. Several wiring layouts are in use because the null modem connection is not covered by a standard.

Optical Character Recognition

Optical character recognition, usually abbreviated to OCR, is the mechanical or electronic conversion of scanned or photographed images of typewritten or printed text into machine-encoded/computer-readable text. It is widely used as a form of data entry from some sort of original paper data source, whether passport documents, invoices, bank statement, receipts, business card, mail, or any number of printed records. It is a common method of digitizing printed texts so that they can be electronically edited, searched, stored more compactly, displayed on-line, and used in machine processes such as machine translation, text-to-speech, key data extraction and text mining. OCR is a field of research in pattern recognition, artificial intelligence and computer vision.

Optical Wireless

Optical wireless refers to the combined use of two technologies - conventional radio-frequency (RF) wireless and optical fiber - for telecommunication. Long-range links are provided by optical fiber (also known as fiber optic cables), and links from the long-range end-points to end users are accomplished by RF wireless. Sometimes the local links are provided by laser systems, also known as free-space optics (FSO), rather than by RF wireless.

PCI Express

PCI Express (Peripheral Component Interconnect Express), officially abbreviated as PCIe, is a high-speed serial computer expansion bus standard designed to replace the older PCI, PCI-X, and AGP bus standards. PCIe has numerous improvements over the aforementioned bus standards, including higher maximum system bus throughput, lower I/O pin count and smaller physical footprint, better performance-scaling for bus devices, a more detailed error detection and reporting mechanism (Advanced Error Reporting (AER)), and native hot-plug functionality. More recent revisions of the PCIe standard support hardware I/O virtualization.

Patch Antenna

Patch antenna (also known as a rectangular microstrip antenna) is a type of radio antenna with a low profile, which can be mounted on a flat surface. It consists of a flat rectangular sheet or "patch" of metal, mounted over a larger sheet of metal called a ground plane. The assembly is usually contained inside a plastic radome, which protects the antenna structure from damage. Patch antennas are simple to fabricate and easy to modify and customize. They are the original type of microstrip antenna described by Howell in 1972,the two metal sheets together form a resonant piece of microstrip transmission line with a length of approximately one-half wavelength of the radio waves. The radiation mechanism arises from discontinuities at each truncated edge of the microstrip transmission line.The radiation at the edges causes the antenna to act slightly larger electrically than its physical dimensions, so in order for the antenna to be resonant, a length of microstrip transmission line slightly shorter than one-half a wavelength at the frequency is used. A patch antenna is usually constructed on a dielectric substrate, using the same materials and lithography processes used to make printed circuit boards.

Payback Period

Payback period in capital budgeting refers to the period of time required to recoup the funds expended in an investment, or to reach the break-even point. For example, a $1000 investment which returned $500 per year would have a two-year payback period. The time value of money is not taken into account. Payback period intuitively measures how long something takes to "pay for itself." All else being equal, shorter payback period are preferable to longer payback period.

Personal Information

Personal information is information or an opinion, including information or an opinion forming part of a database, whether true or not, and whether recorded in a material form or not, about an individual whose identity is apparent, or can reasonably be ascertained, from the information or opinion.

Phase Change Cooling

Phase change cooling is an extremely effective way to cool the processor. A vapor compression phase-change cooler is a unit which usually sits underneath the PC, with a tube leading to the processor. Inside the unit is a compressor of the same type as in a window air conditioner. The compressor compresses a gas (or mixture of gases) into a liquid. Then, the liquid is pumped up to the processor, where it passes through a condenser (heat dissipation device) and then an expansion device to vaporize the fluid, the expansion device used can be a simple capillary tube to a more elaborate thermal expansion valve. The liquid evaporates (changing phase), absorbing the heat from the processor as it draws extra energy from its environment to accommodate this change . The evaporation can produce temperatures reaching around 15 to 150 degrees Celsius. The gas flows down to the compressor and the cycle begins over again. This way, the processor can be cooled to temperatures ranging from 15 to 150 degrees Celsius, depending on the load, wattage of the processor, the refrigeration system (see refrigeration) and the gas mixture used. This type of system suffers from a number of issues but, mainly, one must be concerned with dew point and the proper insulation of all sub-ambient surfaces that must be done (the pipes will sweat, dripping water on sensitive electronics).

Off Site Storage

Physically remote facility or site equipped to provide protected storage for magnetic/optical media, microfilm, and paper records. Some sites also rent space on their hard drives or tapes on which customers can download data via internet or other network for backup storage.

Point of Sale Systems

Point of sale (POS) systems are electronic systems that provide businesses with the capability to retain and analyze a wide variety of inventory and transaction data on a continuous basis. POS systems have been touted as valuable tools for a wide variety of business purposes, including refining target marketing strategies, tracking supplier purchases, determining customer purchasing patterns, analyzing sales (on a daily, monthly, or annual basis) of each inventory item, department, or supplier, and creating reports for use in making purchases, reorders, etc. Basic point of sale systems currently in use include standalone electronic cash registers, also known as ECRs, ECR-based network systems, and controller-based systems. All function essentially as sales and cash management tools, but each has features that are unique.

POE

Power over Ethernet or POE describes any of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras. Unlike standards such as Universal Serial Bus which also power devices over the data cables, PoE allows long cable lengths. Power may be carried on the same conductors as the data, or it may be carried on dedicated conductors in the same cable.

Index Term Keyword

Pre selected term used to refer to specific content in a document. Used by common search engines.

Corporate Cloud

Private cloud (also called internal cloud or corporate cloud) is a marketing term for a proprietary computing architecture that provides hosted services to a limited number of people behind a firewall.

Private Cloud

Private cloud is the phrase used to describe a cloud computing platform that is implemented within the corporate firewall, under the control of the IT department.A private cloud is designed to offer the same features and benefits of public cloud systems, but removes a number of objections to the cloud computing model including control over enterprise and customer data, worries about security, and issues connected to regulatory compliance.

Hard Drive Data Recovery

Process of extracting data from damaged hard drive, failed hard drive, corrupted hard drive, or inaccessible hard drive storage media.

Provenance

Provenance (also known as pedigree or lineage) refers to the complete history of a document. In the scientific community, provenance refers to the information that describes data in sufficient detail to facilitate reproduction and enable validation of results. In the archival community, provenance refers to the chain of ownership and the transformations a document has undergone. However, in most computer systems today, provenance is an after-thought, implemented as an auxiliary indexing structure parallel to the actual data.

Public Use Records

Public use records are documents or pieces of information that are not considered confidential.Although public records are records of public business, they are not necessarily available without restriction.

QFE

Quad Fast Ethernet (QFE) is a network interface card (NIC) manufactured by Sun Microsystems that is designed to enhance the bandwidth of a Peripheral Component Interconnect (PCI)-based server using Sun Microsystem's Solaris 8 or later operating environment. Speeds of up to 100 megabits per second (Mbps) are provided by converting PCI data streams into Fast Ethernet traffic. QFE cards are hot-swappable, minimizing downtime, and comply with the IEEE 802/3U Ethernet standard. A single card can work with up to four network interfaces at a time and provide support for multihoming.

Quality Control

Quality control (QC) is a procedure or set of procedures intended to ensure that a manufactured product or performed service adheres to a defined set of quality criteria or meets the requirements of the client or customer. QC is similar to, but not identical with, quality assurance (QA). QA is defined as a procedure or set of procedures intended to ensure that a product or service under development (before work is complete, as opposed to afterwards) meets specified requirements. QA is sometimes expressed together with QC as a single expression, quality assurance and control (QA/QC).

RAID

RAID (redundant array of independent disks, originally redundant array of inexpensive disks) is a way of storing the same data in different places (thus, redundantly) on multiple hard disks. By placing data on multiple disks, I/O (input/output) operations can overlap in a balanced way, improving performance. Since multiple disks increases the mean time between failures (MTBF), storing data redundantly also increases fault tolerance.

Raid Data Recovery

RAID originally stood for Redundant Array of Inexpensive Disks. It was a way of writing data across a series of cheap disk drives such that if one drive failed, the data would not be lost. This entailed duplicating some data, hence the term "redundant." In later years the phrase was reworded so that Independent replaced Inexpensive. This was largely a marketing exercise designed to stop people thinking of RAID as a cheap, and thus low-quality, storage solution.Most people using a RAID set-up tend not to have as rigorous a back-up scheme as with standalone drives. That's mainly because the costs of backing up the individual disks in a RAID set-up can outweigh the savings of using RAID in the first place. This means users will likely have to rely on RAID data recovery in the event that enough disks are damaged to affect the entire system.

Random Access Memory

RAM is an acronym for random access memory, a type of computer memory that can be accessed randomly, that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.

Semi Active Records

Record which is referred to only occasionally but is of primary value. In large organizations, records that have less than one reference per linear foot in a month are considered semi active records.

Records Management

Records management (RM), also known as Records information management or RIM, is the professional practice or discipline of controlling and governing what are considered to be the most important records of an organization throughout the records life-cycle, which includes from the time such records are conceived through to their eventual disposal. This work includes identifying, classifying, prioritizing, storing, securing, archiving, preserving, retrieving, tracking and destroying of records.

Electronic Records

Records provide evidence of business activity and can be in any format, including digital format. Today, the vast majority of records are produced electronically or 'born digital'. According the National Archives of Australia (NAA) electronic or digital records include "word-processed documents, emails, databases and images" (NAA, 2004a). While many records are printed and kept in paper or hard copy format, increasingly business activities are conducted in a purely digital context. As such, organisations need to be able to capture there electronic records to ensure an effective and efficient business environment that can provide evidence of the organisations activities and fulfill legislative requirements. Those electronic records that are identified as being of continuing value need to be managed in such a way that they remain accessible.Electronic records can be stored throughout an organisation in a variety of ways - in databases, on hard drives, in shared folders, in email accounts. In order to effectively manage the electronic records being produced by an organisation a method of capturing records using an Electronic Records Management System (ERMS) needs to be implemented.

Redundant Source Records

Records that have been copied or converted, where the copies, once verified to ensure their accuracy and authenticity, replace or supersede the originals and are filed in the office record keeping system.

Search History

Refers to the list of web pages a user has visited recently and associated data such as page title and time of visit,which is recorded by web browser software as standard for a certain period of time. Web browser software does this in order to provide the user with a Back button and/or a History list, to go back to pages they have visited previously, rather than relying on the user to remember where they have been on the web.

Full Duplex

Refers to the transmission of data in two directions simultaneously. For example, a telephone is a full-duplex device because both parties can talk at once. In contrast, a walkie-talkie is a half-duplex device because only one party can transmit at a time.Most modems have a switch that lets you choose between full-duplex and half-duplex modes. The choice depends on which communications program you are running.In full-duplex mode, data you transmit does not appear on your screen until it has been received and sent back by the other party. This enables you to validate that the data has been accurately transmitted. If your display screen shows two of each character, it probably means that your modem is set to half-duplex mode when it should be in full-duplex mode.

Transitory Records

Routine correspondence or other documents having short-term value and which are not an integral part of administrative or operational records file, not required to sustain administrative or operational functions, not regularly filed under a standard records classification system, not required to meet statutory obligations, and recorded only for the time required for completion of actions or ongoing records associated with them.

Secondary Value

Secondary value are defined as the outputs, life-support functions and services, generated by wetlands. Methods for measuring these values are discussed. Three case studies are presented which use different valuation methods and which to different degrees capture the primary and secondary value.

Selective Retention

Selective retention, in relating to the mind, is the process when people more accurately remember messages that are closer to their interests, values and beliefs, than those that are in contrast with their values and beliefs, selecting what to keep in the memory, narrowing the informational flow.Outside of the theory of memory and mind: Selective retention may also be retaining of contractual agreements upon moving on in open politics or of physical phenotypes in eugenic methods of propagation of traits and features of a genome. Among other fields where action can impose a strata of creative limitation.

Accession Number

Sequential number assigned to each record or volume as it is added to a database (such as a library catalog or index) and which indicates the chronological order of its acquisition.

Arithmetic Logic Unit

Short for Arithmetic Logic Unit, ALU is one of the many components within a computer processor. The ALU performs mathematical, logical, and decision operations in a computer and is the final processing performed by the processor. After the information has been processed by the ALU, it is sent to the computer memory.In some computer processors, the ALU is divided into an AU and LU. The AU performs the arithmetic operations and the LU performs the logical operations.

Personal Digital Assistant

Short for personal digital assistant, a handheld device that combines computing, telephone/fax, Internet and networking features. A typical PDA can function as a cellular phone, fax sender, Web browser and personal organizer. PDAs may also be referred to as a palmtop, hand-held computer or pocket computer.

Informational Value

That (unlike evidential value) is derived from the content information a document or record contains on people, places, subjects, etc.

Dispose

The .NET framework facilitates garbage collection (GC), manages object memory and resources and reclaims invalid object memory references by invoking Finalize - a non-deterministic method. The Dispose method controls the lifetime of object memory instances and provides explicit memory cleanup control, versus Finalize's implicit memory cleanup. Dispose may be invoked even when other memory object instances exist, whereas Finalize may only be invoked after the last memory object is destroyed.

Administrative Records

The administrative records or project file is a critical part of the decision-making process, because Freedom of Information Act requests and/or litigation will require an organized and complete record for response. All cited documents in the text, as well as complete references that have been summarized or incorporated by reference in the EIS or the EA, need to be reasonably available for public inspection if NPS receives such a request. Litigation may focus almost entirely on the contents of the record.

Payment System

The payment system is an operational network - governed by laws, rules and standards - that links bank accounts and provides the functionality for monetary exchange using bank deposits.The payment system is the infrastructure (consisting of institutions, instruments, rules, procedures, standards,and technical means) established to effect the transfer of monetary value between parties discharging mutual obligations. Its technical efficiency determines the efficiency with which transaction money is used in the economy, and risk associated with its use.

Alienation of Records

The permanent transfer of records and all present and future rights to the records from the Crown provincial to another entity. Records may only be alienated from the Crown with the approval of the Legislative Assembly.

Program Status Word Register

The program status word register (PSW) is an IBM System/360 architecture and successors control register which performs the function of a Status register and Program counter in other architectures, and more. Although certain fields within the PSW may be tested or set by using non-privileged instructions, testing or setting the remaining fields may only be accomplished by using privileged instructions. Contained within the PSW are certainly the zero (non-zero) and carry (borrow) flags and similar flags of other architectures' status registers, in this case encoded as a condition code with values from 0 to 15, representing the arithmetic sum of the four condition code bit values, 23 + 22 + 21 + 20.

Audit Value

The value records may have in documenting the generation, expenditure, or transfer of monies, or other types of business functions, which are required for audit purposes. Audit value may be affected by federal or provincial statutes and regulations that govern records retention and disposition. Audit value is determined by statutory or regulatory audit periods.

Simultaneous Peripheral Operations Online

To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document). One can envision spooling as reeling a document or task list onto a spool of thread so that it can be unreeled at a more convenient time.The idea of spooling originated in early computer days when input was read in on punched cards for immediate printing (or processing and then immediately printing of the results). Since the computer operates at a much faster rate than input/output devices such as printers, it was more effective to store the read-in lines on a magnetic disk until they could be conveniently printed when the printer was free and the computer was less busy working on other tasks. Actually, a printer has a buffer but frequently the buffer isn't large enough to hold the entire document, requiring multiple I/O operations with the printer.

Vital Records

Vital records are records of life events kept under governmental authority, including birth certificates, marriage licenses, and death certificates. In some jurisdictions, vital records may also include records of civil unions or domestic partnerships.

Wiretapping

Wiretapping refers to listening in on electronic communications on telephones, computers, and other devices. Many governments use it as a law enforcement tool, and it is also used in fields like corporate espionage to gain access to privileged information. Depending on where in the world one is, wiretapping may be tightly controlled with laws that are designed to protect privacy rights, or it may be a widely accepted practice with little or no protections for citizens. Several advocacy organizations have been established to help civilians understand these laws in their areas, and to fight illegal wiretapping.

Bus Configuration

You can connect buses in different ways depending on your requirements. For example, you can link messaging engines to distribute message workload, and to provide availability if there is a system failure.


संबंधित स्टडी सेट्स

Using Graphs to Advertise Practice

View Set

Inductive, deduction, Sound, + Valid Arguments

View Set

Nursing Fundamentals Chapter 1: Prep U questions

View Set

Mastering Biology Gene Expression

View Set

Traffic School (3dollarseasiesttrafficschool.com)

View Set

Chapter 4 - Supporting Social Entrepreneurship

View Set

NUR234 Ch 11: Maternal Adaptation During Pregnancy

View Set