BGSU MBA 6020P

Ace your homework & exams now with Quizwiz!

graphical user interface

A GUI (usually pronounced GOO-ee) is a graphical (rather than purely textual) user interface to a computer. As you look at your computer screen, you see the GUI of your particular web browser.

Bot

A bot (short for "robot") is a program that operates as an agent for a user or another program or simulates a human activity. On the Internet, the most ubiquitous bots are the programs, also called spiders or crawlers, that access Web sites and gather their content for search engine indexes.

client

A client is the requesting program or user in a client/server relationship. For example, the user of a Web browser is effectively making client requests for pages from servers all over the Web. The browser itself is a client in its relationship with the computer that is getting and returning the requested HTML file. The computer handling the request and sending back the HTML file is a server.

" compiler

A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.

Cookies

A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time. (More technically, it is information for future use that is stored by the server on the client side of a client/server communication.)

data dictionary

A data dictionary is a collection of descriptions of the data objects or items in a data model for the benefit of programmers and others who need to refer to them.

data warehouse

A data warehouse is a central repository for all or significant parts of the data that an enterprise's various business systems collect.

database

A database is a collection of information that is organized so that it can easily be accessed, managed, and updated.

Domain name (DNS also)

A domain name locates an organization or other entity on the Internet. (In the internet address www.bgsu.edu, "bgsu" is the domain name.) The domain name system (DNS) is the way that Internet domain names are located and translated into internet protocol (IP) addresses.

field

A field is an area in a fixed or known location in a unit of data such as a record, message header, or computer instruction that has a purpose and usually a fixed size. In some contexts, a field can be subdivided into smaller fields.

firewall

A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks.

Local Area Network (LAN)

A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link and typically share the resources of a single processor or server within a small geographic area (for example, within an office building).

modem

A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device.

Network Interface Card (NIC)

A network interface card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network. Personal computers and workstations on a local area network (LAN) typically contain a network interface card specifically designed for the LAN transmission technology, such as Ethernet or Token Ring.

ethernet

A network protocol that operates at Layers 1 and 2 of the TCP/IP-OSI architecture. Ethernet, the world's most popular LAN protocol, is used on WANs as well.

Pop-up ad

A pop-up ad is a pop-up window used for advertising. When the program is initiated by some user action, such as a mouse click or a mouseover, a window containing an offer for some product or service appears in the foreground of the visual interface.

relational database

A relational database is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables.

server farm

A server farm is a group of computers acting as servers and housed together in a single location. A server farm is sometimes called a server cluster. A Web server farm can be either (1) a Web site that has more than one server, or (2) an Internet service provider (ISP) that provides Web hosting services using multiple servers.

Smart card

A smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use.

C2C

A subset of the B2C category, C2C allows individuals to buy and sell items in the marketplace.

topology

A topology (from Greek topos meaning place) is a description of any kind of locality in terms of its layout. In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.

Value chain

A value chain is an e-business model that is characterized by integrated processes that add significant value to raw material inputs (e.g. Dell Computers).

virtual private network (VPN)

A virtual private network (VPN) is a way to use a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost.

virus

A virus is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event. A virus is often designed so that it is automatically spread to other computer users. Viruses can be transmitted as attachments to an e-mail note, as downloads, or be present on a diskette or CD.

Digital wallet

A wallet is a small software program used for online purchase transactions. Many payment solution companies, such as CyberCase, offer free Wallet software that allows several methods of payment to be defined within the wallet (for example, several different credit cards).

Wide Area Network (WAN)

A wide area network (WAN) is a geographically dispersed telecommunications network. The term distinguishes a broader telecommunication structure from a local area network.

artificial intelligence

AI (pronounced AYE-EYE) or artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. These processes include learning (the acquisition of information and rules for using the information), reasoning (using the rules to reach approximate or definite conclusions), and self-correction.

ASCII

ASCII (American Standard Code for Information Interchange) is the most common format for text files in computers and on the Internet. In an ASCII file, each alphabetic, numeric, or special character is represented with a 7-bit binary number (a string of seven 0s or 1s). 128 possible characters are defined.

Internet Service Provider (ISP)

An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.

application program

An application program (sometimes shortened to application) is any program designed to perform a specific function directly for the user or, in some cases, for another application program. Examples of application programs include word processors; database programs; Web browsers; development tools; drawing, paint, and image editing programs; and communication programs.

Application Service Provider (ASP)

An application service provider (ASP) is a company that offers individuals or enterprises access over the Internet to applications and related services that would otherwise have to be located in their own personal or enterprise computers.

Extranet

An extranet is a private network that uses the Internet protocol and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. An extranet can be viewed as part of a company's intranet that is extended to users outside the company.

Intranet

An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.

object-oriented database management system

An object-oriented database management system (OODBMS), is a database management system (DBMS) that supports the modeling and creation of data as objects. This includes some kind of support for classes of objects and the inheritance of class properties and methods by subclasses and their objects.

operating system

An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. The other programs are called applications or application programs.

authentication

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords.

B2C

B2C is short for business-to-consumer, or the retailing part of e-commerce on the Internet. It is often contrasted to B2B or business-to-business.

Bandwidth

Bandwidth has a general meaning of how much information can be carried in a given time period (usually a second) over a wired or wireless communications link.

Bluetooth

Bluetooth is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants (PDAs) can be easily interconnected using a short-range wireless connection.

CD-ROM

CD-ROM (Compact Disc, read-only-memory) is an adaptation of the CD that is designed to store computer data in the form of text and graphics, as well as hi-fi stereo sound.

CPU

CPU (central processing unit) is an older term for processor and microprocessor, the central unit in a computer containing the logic circuitry that performs the instructions of a computer's programs.

Client-server system

Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.

Circuit-switched

Contrasted with packet-switched is circuit-switched, a type of network such as the regular voice telephone network in which the communication circuit (path) for the call is set up and dedicated to the participants in that call. For the duration of the connection, all resources on that circuit are unavailable for other users. Voice calls using the Internet's packet-switched system are possible. Each end of the conversation is broken down into packets that are reassembled at the other end.

cryptography

Cryptography is the practice and study of hiding information. Modern cryptography includes the disciplines of mathematics, computer science, and engineering.

DOS

DOS (Disk Operating System) was the first widely-installed operating system for personal computers.

Digital Subscriber Line (DSL)

DSL (Digital Subscriber Line) is a technology for bringing high-bandwidth information to homes and small businesses over ordinary copper telephone lines.

data mining

Data mining is sorting through data to identify patterns and establish relationships. Data mining parameters include: 1) Association - looking for patterns where one event is connected to another event 2) Sequence or path analysis - looking for patterns where one event leads to another later event 3) Classification - looking for new patterns (May result in a change in the way the data is organized but that's ok) 4) Clustering - finding and visually documenting groups of facts not previously known and 5) Forecasting - discovering patterns in data that can lead to reasonable predictions about the future.

data modeling

Data modeling is the analysis of data objects that are used in a business or other context and the identification of the relationships among these data objects.

electronic data interchange (EDI)

EDI is the computer-to-computer exchange of structured information, by agreed message standards, from one computer to another by electronic means with a minimum of human intervention

Enterprise Resource Planning System (ERP)

ERP (Enterprise resource planning) is an industry term for the broad set of activities supported by multi-module application software that helps a manufacturer or other business manage the important parts of its business, including product planning, parts purchasing, maintaining inventories, interacting with suppliers, providing customer service, and tracking orders.

Electronic Money

Electronic money (also known as e-currency, e-money, electronic cash, and digital money) is money or script which is exchanged only electronically.

encryption

Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.

FTP

File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the Simple Mail Transfer Protocol (SMTP), which transfers e-mail, FTP is an application protocol that uses the Internet's TCP/IP protocols. FTP is commonly used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet.

HTML

HTML (Hypertext Markup Language) is the set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page.

HTTP

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the world wide web.

HTTPS

HTTPS (Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a Web protocol developed by Netscape and built into its browser that encrypts and decrypts user page requests as well as the pages that are returned by the Web server.

Hardware

Hardware is the physical aspect of computers, telecommunications, and other information technology devices. The term arose as a way to distinguish the "box" and the electronic circuitry and components of a computer from the program you put in it to make it do things. Hardware can be thought of as the invariable part of the computer.

hypertext

Hypertext is the organization of information units into connected associations that a user can choose to make. An instance of such an association is called a link or hypertext link.

Input/Output

I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer. Typical I/O devices are printers, hard disks, keyboards, and mouses. In fact, some devices are basically input-only devices (keyboards and mouses); others are primarily output-only devices (printers); and others provide both input and output of data (hard disks, diskettes, writable CD-ROMs).

identity theft

Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. In addition to running up debt, an imposter might provide false identification to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen.

"batch processing

In a computer, a batch job is a program that is assigned to the computer to run without further user interaction. In larger commercial computers or servers, batch jobs are usually initiated by a system user. Some are defined to run automatically at a certain time. In some computer systems, batch jobs are said to run in the background and interactive programs run in the foreground. In general, interactive programs are given priority over batch programs, which run during the time intervals when the interactive programs are waiting for user requests.

Switch

In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.

record

In computer data processing, a record is a collection of data items arranged for processing by a program. Multiple records are contained in a file or data set.

program

In computing, a program is a specific set of ordered operations for a computer to perform.

private key

In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages.

public key

In cryptography, a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures.

file

In data processing, using an office metaphor, a file is a related collection of records. For example, you might put the records you have on each of your customers in a file.

Broadband

In general, broadband refers to telecommunication in which a wide band of frequencies is available to transmit information.

server

In information technology, a server is a computer program that provides services to other computer programs (and their users) in the same or other computers. The computer that a server program runs in is also frequently referred to as a server (though it may be used for other purposes as well).

legacy application

In information technology, legacy applications and data are those that have been inherited from languages, platforms, and techniques earlier than current technology.

byte

In most computer systems, a byte is a unit of data that is eight binary digits long. A byte is the unit most computers use to represent a character such as a letter, number, or typographic symbol (for example, "g", "5", or "?").

Router

In packet-switched networks such as the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to.

analog signals

In telecommunications, an analog signal is one in which a base carrier's alternating current frequency is modified in some way, such as by amplifying the strength of the signal or varying the frequency, in order to add information to the signal. Broadcast and telephone transmission have conventionally used analog technology.

Middleware

In the computer industry, middleware is a general term for any programming that serves to "glue together" or mediate between two separate and often already existing programs. A common application of middleware is to allow programs written for access to a particular database to access other databases. The term middleware is sometimes used to describe programming that mediates between application and system software or between two different kinds of application software (for example, sending a remote work request from an application in a computer that has one kind of operating system to an application in a computer with a different operating system).

data integrity

Integrity, in terms of data and network security, is the assurance that information can only be accessed or modified by those authorized to do so. Measures taken to ensure integrity include controlling the physical environment of networked terminals and servers, restricting access to data, and maintaining rigorous authentication practices.

Java

Java is a programming language expressly designed for use in the distributed environment of the Internet. It was designed to have the "look and feel" of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network. It can also be used to build a small application module or applet for use as part of a Web page. Applets make it possible for a Web page user to interact with the page.

mobile commerce (m-commerce)

M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants (PDAs). Known as next-generation e-commerce, m-commerce enables users to access the Internet without needing to find a place to plug in.

machine code

Machine code is the elemental language of computers, consisting of a stream of 0's and 1's. Ultimately, the output of any programming language analysis and processing is machine code.

mainframe

Mainframe is an industry term for a large computer, typically manufactured by a large company such as IBM for the commercial applications of Fortune 1000 businesses and other large-scale computing purposes. Historically, a mainframe is associated with centralized rather than distributed computing.

B2B

On the Internet, B2B (business-to-business), also known as e-biz, is the exchange of products, services, or information between businesses rather than between businesses and consumers.

search engine

On the Internet, a search engine is a coordinated set of programs that includes: 1) a spider (also called a "crawler" or a "bot") that goes to every page or representative pages on every Web site that wants to be searchable and reads it, using hypertext links on each page to discover and read a site's other pages 2) a program that creates a huge index (sometimes called a "catalog") from the pages that have been read, and 3) a program that receives your search request, compares it to the entries in the index, and returns results to you.

Packet-switched

Packet-switched describes the type of network in which relatively small units of data called are routed through a network based on the destination address contained within each packet. Breaking communication down into packets allows the same data path to be shared among many users in the network. This type of communication between sender and receiver is known as connectionless (rather than dedicated). Most traffic over the Internet uses packet switching and the Internet is basically a connectionless network.

P2P distributed computing

Peer-to-peer is a communications model in which each party has the same capabilities and either party can initiate a communication session.

Personal Digital Assistant (PDA)

Personal digital assistant (PDA) is a term for any small mobile hand-held device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedule calendars and address book information handy.

portal

Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site. There are general portals and specialized or niche portals. Some major general portals include Yahoo, Excite, Netscape, Lycos, CNET, Microsoft Network, and America Online's AOL.com.

RAM

RAM (random access memory) is the place in a computer where the operating system, application programs, and data in current use are kept so that they can be quickly reached by the computer's processor. RAM is much faster to read from and write to than the other kinds of storage in a computer, the hard disk, floppy disk, and CD-ROM. However, the data in RAM stays there only as long as your computer is running. When you turn the computer off, RAM loses its data. When you turn your computer on again, your operating system and other files are once again loaded into RAM, usually from your hard disk.

ROM

ROM (read-only memory) is "built-in" computer memory containing data that normally can only be read, not written to. ROM contains the programming that allows your computer to be "booted up" or regenerated each time you turn it on.

raw data

Raw data (sometimes called source data or atomic data) is data that has not been processed for use. A distinction is sometimes made between data and information to the effect that information is the end product of data processing. Raw data that has undergone processing is sometimes referred to as cooked data.

Structured Query Language (SQL)

SQL (Structured Query Language) is a standard interactive and programming language for getting information from and updating a database. Although SQL is both an ANSI and an ISO standard, many database products support SQL with proprietary extensions to the standard language.

Secondary Storage

Secondary storage is all addressable data storage that is not currently in the computer's main storage or memory. Synonyms are external storage and auxiliary storage.

source code

Source code and object code refer to the "before" and "after" versions of a computer program that is compiled (see compiler) before it is ready to run in a computer.

spyware

Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.

Domain Name System (DNS)

The domain name system (DNS) is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember "handle" for an Internet address.

bit

The means by which computers represent data (short for binary digit). A bit is either a "0" or a "1."

information technology

The study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware

twisted pair telephone lines

Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper wires are twisted around each other. Each connection on twisted pair requires both wires. Since some telephone sets or desktop locations require multiple connections, twisted pair is sometimes installed in two or more pairs, all within a single cable. For some business locations, twisted pair is enclosed in a shield that functions as a ground. This is known as shielded twisted pair (STP). Ordinary wire to the home is unshielded twisted pair (UTP).

Unix

Unix (often spelled "UNIX," especially as an official trademark) is an operating system that originated at Bell Labs in 1969 as an interactive time-sharing system. Ken Thompson and Dennis Ritchie are considered the inventors of Unix. The name (pronounced YEW-nihks) was a pun based on an earlier system, Multics. In 1974, Unix became the first operating system written in the C language. Unix has evolved as a kind of large freeware product, with many extensions and new ideas provided in a variety of versions of Unix by different companies, universities, and individuals.

wireless

Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path.

XBRL

XBRL (Extensible Business Reporting Language) is an XML-based language being developed specifically for the automation of business information requirements, such as the preparation, sharing, and analysis of financial reports, statements, and audit schedules.

XML

XML (Extensible Markup Language) is a flexible way to create common information formats and share both the format and the data on the world wide web, intranets, and elsewhere.


Related study sets

Маймылдардың пайда болуы 11 кл.

View Set

History and Systems Exam 1 (Chapters 1-4)

View Set

NATIONAL QUIZ BANK "Forms of Ownership"

View Set

Questions and Vocabulary from Martin Luther King Jr.'s letter from Birmingham Jail

View Set

Econ Test 3 - Inflation, Unemployment, and Discretionary Fiscal Policy

View Set