Operating System Terminology

Ace your homework & exams now with Quizwiz!

Computer Sequence Checking

A Computer sequence checking is a verification that is performed to help ensure that data is properly ordered.Testing a list of items or file of records for correct ascending or descending sequence based on the item or key fields in the records.

TV Operating System

A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that makes it possible for a user to access and control advanced features and connected devices. As in a personal computer, there is a graphical user interface (GUI) for interaction in a TV OS. Essentially, smart TVs are Internet-connected entertainment-specialized computers that can connect to many devices wirelessly.TV operating system allow a user to browse not just channels on satellite or cable TV but also on demand video services. The systems also access pictures, music or video content on connected storage devices or streamed.

Binary Code

A binary code represents text or computer processor instructions using the binary number system's two binary digits, 0 and 1. A binary code assigns a bit string to each symbol or instruction. For example, a binary string of eight binary digits (bits) can represent any of 256 possible values and can therefore correspond to a variety of different symbols, letters or instructions.

Bits

A bits (short for binary digit) is the smallest unit of data in a computer. A bits has a single binary value, either 0 or 1. Although computers usually provide instructions that can test and manipulate bits, they generally are designed to store data and execute instructions in bits multiples called bytes. In most computer systems, there are eight bits in a byte. The value of a bits is usually stored as either above or below a designated level of electrical charge in a single capacitor within a memory device.

Limit Check

A check to determine if a value entered into a computer system is within acceptable minimum and maximum values.

File

A collection of data or information that has a name, called the filename. Almost all information stored in a computer must be in a file. There are many different types of files: data files, text files , program files, directory files, and so on. Different types of files store different types of information. For example, program files store programs, whereas text files store text.

Master File

A collection of records pertaining to one of the main subjects of an information system, such as customers, employees, products and vendors. Master file contain descriptive data, such as name and address, as well as summary information, such as amount due and year-to-date sales.

Compiler

A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses. Typically, a programmer writes language statements in a language such as Pascal or C one line at a time using an editor . The file that is created contains what are called the source statements . The programmer then runs the appropriate language compiler, specifying the name of the file that contains the source statements.

Context Switch

A context switch is a procedure that a computer's CPU (central processing unit) follows to change from one task (or process) to another while ensuring that the tasks do not conflict. Effective context switch is critical if a computer is to provide user-friendly multitasking.

Data Owner

A data owner is an individual or entity that holds managerial and financial accountable for a dataset and that has legal ownership rights of a dataset, even if the dataset was collected by another party.

Database Management System

A database management system (DBMS) is a collection of programs that enables you to store, modify, and extract information from a database. There are many different types of DBMSs, ranging from small systems that run on personal computers to huge systems that run on mainframes. The terms relational, network, flat, and hierarchical all refer to the way a DBMS organizes information internally. The internal organization can affect how quickly and flexibly you can extract information.

False Negative

A false negative error, or in short false negative, is where a test result indicates that a condition failed, while it actually was successful. I.e. erroneously no effect has been assumed. A common example is a guilty prisoner freed from jail. The condition: "Is the prisoner guilty?" actually had a positive result (yes, he is guilty). But the test failed to realize this, and wrongly decided the prisoner was not guilty.A false negative error is a type II error occurring in test steps where a single condition is checked for and the result can either be positive or negative.

False Positive

A false positive error, or in short false positive, commonly called a "false alarm", is a result that indicates a given condition has been fulfilled, when it actually has not been fulfilled. I.e. erroneously a positive effect has been assumed. In the case of "crying wolf" - the condition tested for was "is there a wolf near the herd?", the actual result was that there had not been a wolf near the herd. The shepherd wrongly indicated there was one, by calling "Wolf, wolf!".A false positive error is a Type I error where the test is checking a single condition, and results in an affirmative or negative decision usually designated as "true or false".

Firewall

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Procedure

A fixed, step-by-step sequence of activities or course of action (with definite start and end points) that must be followed in the same order to correctly perform a task. Repetitive procedure are called routines.

Flat File Service

A flat file system is a system of files in which every file in the system must have a different name. In Windows 95 and most other operating system today, files are managed in a hierarchical file system with a hierarchy of directories and subdirectories, each containing a number of files (or subdirectories). The operating system allows more than one file to have the same name as long as it is stored in a different directory. Early versions of the Macintosh and DOS operating systems used a flat file system.

Host Operating System

A host operating system (OS) is the original OS installed on a computer. Other operating systems are sometimes installed on a computer, in addition to the host OS, as guest operating systems. For the purposes of disk partitioning, a guest OS must be the same as the host OS. In virtualization, however, a guest OS can be a different from the host.

Hot Fix

A hot fix is code (sometimes called a patch) that fixes a bug in a product. Users of the products may be notified by e-mail or obtain information about current hotfixes at a software vendor's Web site and download the hotfixes they wish to apply. Hotfixes are sometimes packaged as a set of fixes called a combined hotfix or a service pack.

Hyper-Visor

A hyper-visor, also called a virtual machine manager, is a program that allows multiple operating systems to share a single hardware host. Each operating system appears to have the host's processor, memory, and other resources all to itself. However, the hypervisor is actually controlling the host processor and resources, allocating what is needed to each operating system in turn and making sure that the guest operating systems (called virtual machines) cannot disrupt each other.

Kilobyte

A kilobyte (KB) is a multiple unit used for binary data. Although "kilo" generally refers to 1,000, in computer science, one kilobyte often refers to 1,024 (2^10) bytes. It may also be used to refer to 1,000 bytes depending on the context. This measure is often used to describe memory capacity and disk storage.

Linear Function

A linear function whose control flow contains no loops.

Lock

A lock is a mechanism for controlling access to something. In programming, locks are often used so that multiple programs or threads of a program can share a resource - for example, access to a file for updating it ,on a one-at-a-time basis. Typically, a lock is of temporary duration and when the resource is no longer required, it is freed for locking and use by the next sharer in a queue.From a system point-of-view, locking is a method of synchronizing potentially concurrent uses of a database or other common resource. An operating system may enforce locking or some other mechanism in order to ensure that actions occur in the right sequence (when they don't, the situtation is known as a race condition). An operating system must also provide for means to ensure that two programs do not become dependent on each other for the release of a lock, a situation known as a deadlock in which the programs are essentially halted. In some systems, a mutex is a named object that provides a lock for a given resource.

Logical Partition

A logical partition (LPAR) is the division of a computer's processors, memory , and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and application s. The number of logical partitions that can be created depends on the system's processor model and resources available. Typically, partitions are used for different purposes such as database operation or client/server operation or to separate test and production environments. Each partition can communicate with the other partitions as if the other partition is in a separate machine. Logical partitioning was first studied by IBM in 1976 and later introduced by Amdahl and then IBM. Hitachi and Sun Microsystems also use forms of logical partitioning. Today, both IBM's S/390 (now z/900 Series) and AS/400 products support logical partitioning.

Man Page

A man page (short for manual page) is a form of online software documentation usually found on a Unix or Unix-like operating system. Topics covered include computer programs (including library and system calls), formal standards and conventions, and even abstract concepts. A user may invoke a man page by issuing the man command.

Linear Efficiency

A measure of algorithm efficiency in which the run time is proportionate to the number of elements being processed O(n).

Quadratic Efficiency

A measure of algorithm efficiency in which the run time is proportionate to the number of elements squared O(n2).

Processor Pool Model

A modification of the workstation server model in which processors can be dynamically allocated to user tasks for the lifetime of the process.

Parity Bit

A parity bit, or check bit is a bit added to the end of a string of binary code that indicates whether the number of bits in the string with the value one is even or odd. Parity bit are used as the simplest form of error detecting code. There are two variants of parity bits: even parity bit and odd parity bit. In the case of even parity, the number of bits whose value is 1 in a given set are counted. If that total is odd, the parity bit value is set to 1, making the total count of 1's in the set an even number. If the count of ones in a given set of bits is already even, the parity bit's value remains 0.

Password Cracker

A password cracker is an application program that is used to identify an unknown or forgotten password to a computer or network resources. It can also be used to help a human cracker obtain unauthorized access to resources.Password cracker use two primary methods to identify correct passwords: brute-force and dictionary searches. When a password cracker uses brute-force, it runs through combinations of characters within a predetermined length until it finds the combination accepted by the computer system. When conducting a dictionary search, a password cracker searches each word in the dictionary for the correct password. Password dictionaries exist for a variety of topics and combinations of topics, including politics, movies, and music groups.

Password

A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user. Typically, users of a multiuser or securely protected single-user system claim a unique name (often called a user ID) that can be generally known. In order to verify that someone entering that user ID really is that person, a second identification, the password, known only to that person and to the system itself, is entered by the user. A password is typically somewhere between four and 16 characters, depending on how the computer system is set up. When a password is entered, the computer system is careful not to display the characters on the display screen, in case others might see it.

Card Swipe

A plastic card with a magnetic strip containing encoded data that is read by passing the card through a usually slotted electronic device, used especially to make electronic transactions and to provide access to restricted or secure areas.

Process

A process is an instance of a program running in a computer. It is close in meaning to task , a term used in some operating systems. In UNIX and some other operating systems, a process is started when a program is initiated (either by a user entering a shell command or by another program). Like a task, a process is a running program with which a particular set of data is associated so that the process can be kept track of. An application that is being shared by multiple users will generally have one process at some stage of execution for each user.

Comparison Program

A program for the examination of data, using logical or conditional tests to determine or to identify similarities or differences.

Race Condition

A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time, but because of the nature of the device or system, the operations must be done in the proper sequence in order to be done correctly.In computer memory or storage, a race condition may occur if commands to read and write a large amount of data are received at almost the same instant, and the machine attempts to overwrite some or all of the old data while that old data is still being read. The result may be one or more of the following: a computer crash, an "illegal operation," notification and shutdown of the program, errors reading the old data, or errors writing the new data. This can be prevented by serialization of memory or storage access, such that if read and write commands are received close together, the read command is executed and completed first, by default.

Real Time Operating System

A real time operating system (RTOS) is an operating system (OS) intended to serve real-time application requests. It must be able to process data as it comes in, typically without buffering delays. Processing time requirements (including any OS delay) are measured in tenths of seconds or shorter.A key characteristic of an RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application's task, the variability is jitter.A hard real-time operating system has less jitter than a soft real-time operating system. The chief design goal is not high throughput, but rather a guarantee of a soft or hard performance category. An RTOS that can usually or generally meet a deadline is a soft real time OS, but if it can meet a deadline deterministically it is a hard real-time OS.

Downtime Report

A report that identifies the elapsed time when a computer is not operating correctly because of machine failure.

Manual Restore Point

A restore point is a saved "snapshot" of a computer's data at a specific time. Restore point are a component of the Windows System Restore utility. By creating a restore point, you can save the state of the operating system and your own data so that if future changes cause a problem, you can restore the system and your data to the way it was before the changes were made.

Window

A section of the computer's display in a GUI that shows the program currently being used. For example, the browser window that you are using to view this web page is a window. Windows allow a user to work with multiple programs or view multiple programs at once. Almost all window allow you to minimize and maximize them, allowing you to hide and view a program temporarily.

Bug

A software bug is an error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. Most bugs arise from mistakes and errors made by people in either a program's source code or its design, or in frameworks and operating systems used by such programs, and a few are caused by compilers producing incorrect code.

Browser

A software program that allows a person to explore the Internet in an easy to use way. Navigating the Internet through a series of links the user is able to browse the Internet. Examples of popular browsers are Chrome, Internet Explorer, Firefox, Safari, and Opera. The picture is of the Google Chrome browser and a good example of a browser.

System of Internal Control

A system of internal control refers to the process by which organizations maintain environments that encourage incorruptibility and deter fraudulent activities by management and employees. An organization's components of internal control are evaluated during the planning phase of an independent financial statement audit. The results of the evaluation directly influence the auditor's level of detailed testing. To reduce detailed testing, and perhaps the audit fee, organizations implement common features of a proper internal control system.

Internal Storage

A system or hardware component located inside the device and used for the purpose of storing data.internal storage can mean several different things, but most often refers to a computer's internal hard drive. This is the primary storage device used to store a user's files and applications. If a computer has multiple internal hard drives, they are all considered part of the computer's internal storage.

File Allocation Table

A table that the operating system uses to locate files on a disk. Due to fragmentation, a file may be divided into many sections that are scattered around the disk. The FAT keeps track of all these pieces.In DOS systems, FATs are stored just after the boot sector.The FAT system for older versions of Windows 95 is called FAT16, and the one for new versions of Windows 95 and Windows 98 is called FAT32.

Virtual Appliance

A virtual appliance (VA) is a virtual machine (VM) image file consisting of a pre-configured operating system (OS) environment and a single application. The purpose of a virtual appliance is to simplify delivery and operation of an application. To this end, only necessary operating system components are included.A virtual appliance can be deployed as a VM or a subset of a virtual machine running on virtualization technology, such as VMware Workstation. Deploying an application as a virtual appliance can eliminate problems with installation and configuration, such as software or driver compatibility issues. Users can simply download a single file and run the application. Resources required for maintenance are also reduced. Virtual appliances have proven useful in deploying network applications. They are also helpful in grid computing, where they can solve problems introduced by heterogeneous hardware and operating systems, and in the Software as a Service (SaaS) delivery model, where the simplicity of the virtual appliance can help improve economies of scale.

Virtual Desktop Manager

A virtual desktop manager is a program that allows a computer user to have more than one user interface available simultaneously on a single computer. Each user interface is called a virtual desktop.

Virtual Device Driver

A virtual device driver (VxD) is a software device driver that emulates hardware and other devices so that multiple applications running in protected mode can access hardware interrupt channels, hardware resources and memory without causing conflicts. The Vxd was superseded by the Windows Driver Model (WDM) and is now obsolete.

Virtual Machine

A virtual machine (VM) is a software implementation of a computing environment in which an operating system (OS) or program can be installed and run.The virtual machine typically emulates a physical computing environment, but requests for CPU, memory, hard disk, network and other hardware resources are managed by a virtualization layer which translates these requests to the underlying physical hardware.VMs are created within a virtualization layer, such as a hypervisor or a virtualization platform that runs on top of a client or server operating system. This operating system is known as the host OS. The virtualization layer can be used to create many individual, isolated VM environments.

Watchdog Timer

A watchdog timer (WDT) is a device or electronic card that performs a specific operation after a certain period of time if something goes wrong with an electronic system and the system does not recover on its own.A common problem is for a machine or operating system to lock up if two parts or programs conflict, or, in an operating system, if memory management trouble occurs. In some cases, the system will eventually recover on its own, but this may take an unknown and perhaps extended length of time. A watchdog timer can be programmed to perform a warm boot (restarting the system) after a certain number of seconds during which a program or computer fails to respond following the most recent mouse click or keyboard action. The timer can also be used for other purposes, for example, to actuate the refresh (or reload) button in a Web browser if a Web site does not fully load after a certain length of time following the entry of a Uniform Resource Locator (URL).

Windowing System

A windowing system is a system for sharing a computer's graphical display presentation resources among multiple applications at the same time. In a computer that has a graphical user interface (GUI), you may want to use a number of applications at the same time (this is called task). Using a separate window for each application, you can interact with each application and go from one application to another without having to reinitiate it. Having different information or activities in multiple windows may also make it easier for you to do your work.A windowing system uses a window manager to keep track of where each window is located on the display screen and its size and status. A windowing system doesn't just manage the windows but also other forms of graphical user interface entities.

Application Programming Interface

API, an abbreviation of application programming interface, is a set of routines, protocols, and tools for building software applications. The API specifies how software components should interact and are used when programming graphical user interface (GUI) components. A good API makes it easier to develop a program by providing all the building blocks. A programmer then puts the blocks together.

APPC

APPC (Advanced Program-to-Program Communication, sometimes called LU 6.2) is a communication protocol and programming interface standard that operates in the presentation layer (the layer that ensures that messages are in the proper format for the recipient) and the session layer (the layer responsible for setting up and taking down the association of the two end points in a connection) of the Open Systems Interconnection (OSI) communications model. Originally developed by IBM as a remote transaction processing tool, APPC is now used to provide distributed services within a heterogeneous computing environment.

Active Rendering

Active rendering is a style of programming that allows Java code to handle all of the rendering in a simple while loop. This approach resembles traditional game programming, allowing more time to be spent developing a game and less time spent worrying about which paint method to override.

Activity Diagram

Activity diagram are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency. In the Unified Modeling Language, activity diagram are intended to model both computational and organisational processes (i.e. workflows). Activity diagram show the overall flow of control.

Address Space

Address space is the amount of memory allocated for all possible addresses for a computational entity, such as a device, a file, a server, or a networked computer. Address space may refer to a range of either physical or virtual addresses accessible to a processor or reserved for a process. As unique identifiers of single entities, each address specifies an entity's location (unit of memory that can be addressed separately). On a computer, each computer device and process is allocated address space, which is some portion of the processor's address space. A processor's address space is always limited by the width of its address bus and registers. Address space may be differentiated as either flat, in which addresses are expressed as incrementally increasing integers starting at zero, or segmented, in which addresses are expressed as separate segments augmented by offsets (values added to produce secondary addresses). In some systems, address space can be converted from one format to the other through a process known as thunking.

Boot

Alternatively referred to as boot up, booting is the process of powering on a computer and getting into the operating system. During the boot process, the computer will perform a self-diagnostic, also known as a POST and load necessary drivers and programs that help the computer and devices communicate.

Distributed System

Alternatively referred to as distributed computing, distributed system is a collection of computers that act, work, and appear as one large computer. There are several distributed computing projects on the Internet that help work on complex problems by sharing the processing power of millions of different peoples computers. To participate and help these programs, often you only need to download a small program that is run whenever your computer is not being used. Below is a listing of some of these programs.

Logoff

Alternatively referred to as log, logoff, log out, disconnecting, and sign out, sign off is a term used to describe the process of disconnecting from a network or what occurs when your connection is lost. For example, a user using a modem to connect to the Internet may sign off from the Internet to free up the phone line but still be able to use the computer.The term sign off is also used to describe the process of disconnecting from a network service such as IRC.

Access Rights

An access rights is a bit flag that corresponds to a particular set of operations that a thread can perform on a securable object. If a thread tries to perform an operation on an object, but does not have the necessary access right to the object, the system does not carry out the operation.

Internal Controls

An accounting procedure or system designed to promote efficiency or assure the implementation of a policy or safeguard assets or avoid fraud and error etc.

Exception Reports

An exception reports is generated when a purchase order is submitted and signed but contains some inaccurate or missing information. The report contains a table that breaks down how and where the errors are occurring, as well as providing a possible solution to fix the error. Once the error has been corrected, another attempt to sign the purchase order should be made. Once the purchase order has been signed, the exception report will be removed.

Program

An organized list of instructions that, when executed, causes the computerto behave in a predetermined manner. Without program, computers are useless.A program is like a recipe. It contains a list of ingredients (called variables) and a list of directions (called statements) that tell the computer what to do with the variables. The variables can represent numeric data, text, or graphical images.There are many programming languages -- C, C++, Pascal, BASIC, FORTRAN, COBOL, and LISP are just a few. These are all high-level languages. One can also write programs in low-level languages called assembly languages, although this is more difficult. Low-level languages are closer to the language used by a computer, while high-level languages are closer to human languages.

Analytical Technique

Analytical technique range from basic counts to content analysis to complicated inferential statistical analyses. After being collected, data typically are cleaned and entered into databases or spreadsheets. Next, statistical or qualitative analysis software is used to conduct various analyses. Depending on the type of data, you might conduct quantitative analysis, qualitative analysis, or both.

Android 4

Android 4 (Ice Cream Sandwich) is the latest version of the Android platform for phones, tablets, and more. It builds on the things people love most about Android — easy multitasking, rich notifications, customizable home screens, resizable widgets, and deep interactivity — and adds powerful new ways of communicating and sharing.

Android 4.2 Jelly Bean

Android 4.2 Jelly Bean is the version of Google's mobile operating system that follows Android 4.0 Ice Cream Sandwich (ICS). Android 4.2 Jelly Bean will run on tablet computers and smartphones.According to Google, there are more than 600,000 apps and games available for use with Android 4.2 Jelly Bean, along with thousands of movies and millions of songs and books.

Android OS

Android OS is an operating system based on the Linux kernel with a user interface based on direct manipulation, designed primarily for touchscreen mobile devices such as smartphones and tablet computers, using touch inputs, that loosely correspond to real-world actions, like swiping, tapping, pinching, and reverse pinching to manipulate on-screen objects, and a virtual keyboard. Despite being primarily designed for touchscreen input, it also has been used in televisions, games consoles, digital cameras, and other electronics.

Application Compatibilily Toolkit

Application Compatibility Toolkit (ACT) is a set of freely downloadable program utilities and related documents from Microsoft for ensuring compatibility among application programs in Windows operating systems, especially in a large network environment. The Toolkit can also be used to diagnose and fix problems that may be related to compatibility. The Toolkit can be used for applications running in Windows 2000 with Service Pack 3 or later, Windows XP, and Windows Server 2003. Microsoft says that the tools can be used to resolve over 200 symptoms of problems.

Arista Extensible Operating System

Arista Extensible Operating System is a scalable network operating system (OS) that offers high availability, streamlines maintenance processes, and enhances network security. A multi-process state-sharing architecture provides for fault containment, so that when problems occur in one part of the network, they will not easily spread to other parts. In addition, programs can in effect heal themselves when bugs or malware cause problems.

Alternate Process

As the shape name suggests, this flowchart symbol is used when the process flow step is an alternate to the normal process step. Flow lines into an alternate process flow step are typically dashed.

Authentication

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant (such as the exchange of money) is that passwords can often be stolen, accidentally revealed, or forgotten.

Automated Application Controls

Automated application controls is the application of control theory for regulation of processes without direct human intervention. In the simplest type of an automatic control loop, a controller compares a measured value of a process with a desired set value, and processes the resulting error signal to change some input to the process, in such a way that the process stays at its set point despite disturbances. This closed-loop control is an application of negative feedback to a system. The mathematical basis of control theory was begun in the 18th century, and advanced rapidly in the 20th. Designing a system with features of automatic control generally requires the feeding of electrical or mechanical energy to enhance the dynamic features of an otherwise sluggish or variant, even errant system. The control is applied by regulating the energy feed.

Batch Control

Batch control Correctness checks built into data-processing systems and applied to batches of input data, particularly in the data-preparation stage. There are two main forms of batch control: sequence control involves numbering the records in a batch consecutively so that the presence of each record can be confirmed during data validation, control totals involve establishing record counts, or totals of the values in selected fields within each record, and checking these totals during data validation. Control totals may be "meaningful", in the sense that they may have a use (for instance to an auditor) that is additional to their function within the system.

Benchmarking

Benchmarking is simply the comparison of one organization's practices and performance against those of others. It seeks to identify standards, or "best practices," to apply in measuring and improving performance.

Black Box Testing

Black box testing is a method of software testing that examines the functionality of an application (e.g. what the software does) without peering into its internal structures or workings (see white-box testing). This method of test can be applied to virtually every level of software testing: unit, integration, system and acceptance. It typically comprises most if not all higher level testing, but can also dominate unit testing as well.

Boot Loader

Boot loader is a piece of code that runs before any operating system is running. Boot loader are used to boot other operating systems, usually each operating system has a set of bootloaders specific for it.Boot loader usually contain several ways to boot the OS kernel and also contain commands for debugging and/or modifying the kernel environment.

Business Impact Analysis

Business impact analysis (BIA) is an essential component of an organization's business continuance plan, it includes an exploratory component to reveal any vulnerabilities, and a planning component to develop strategies for minimizing risk. The result of analysis is a business impact analysis report, which describes the potential risks specific to the organization studied. One of the basic assumptions behind BIA is that every component of the organization is reliant upon the continued functioning of every other component, but that some are more crucial than others and require a greater allocation of funds in the wake of a disaster. For example, a business may be able to continue more or less normally if the cafeteria has to close, but would come to a complete halt if the information system crashes.

Byte Code

Bytecode, also known as p-code (portable code), is a form of instruction set designed for efficient execution by a software interpreter. Unlike human-readable source code, bytecodes are compact numeric codes, constants, and references (normally numeric addresses) which encode the result of parsing and semantic analysis of things like type, scope, and nesting depths of program objects. They therefore allow much better performance than direct interpretation of source code.

Capacity Stress Testing

Capacity stress testing is used to determine the stability of a given system or entity. It involves testing beyond normal operational capacity, like a breaking point, in order to observe the results.

Centralized Data Processing

Centralized data processing is a Computer data processing architecture where data processing support is provided by one or a cluster of computers, generally a large. dedicated computers, located in a central data processing facility. In a centralized architecture, each person is provided with a local terminal that is connected by a communications.

Check Pointing

Check pointing is a technique for inserting fault tolerance into computing systems. It basically consists of storing a snapshot of the current application state, and later on, uses it for restarting the execution in case of failure.

Competence

Competence are the measurable or observable knowledge, skills, abilities, and behaviors (KSABs) critical to successful job performance.

Computationally Greedy

Computationally greedy needs a lot of computer power which means how fast the processor can compute the data.

Corrective Control

Control established to remedy control problems (e.g. misstatements) that are discovered through detective controls.Corrective Control are only initiated as a result of a Detective Control identifying an active exploit of a Vulnerability and triggering it. As a result, Corrective Controls are all about reducing the Impact of the exploited Vulnerability rather than preventing them from happening in the first place.

Detailed IS Controls

Controls over the acquisition, implementation, delivery and support of IS systems and services made up of application controls plus those general controls not included in pervasive controls.

Configurable Control

Customized and can be disabled or set up to operate in different ways ,example three-way matching, auto-accounting.

Data Communications

Data communication refers to the exchange of data between a source and a receiver. Data communication is said to be local if communicating devices are in the same building or a similarly restricted geographical area.The meanings of source and receiver are very simple. The device that transmits the data is known as source and the device that receives the transmitted data is known as receiver. Data communication aims at the transfer of data and maintenance of the data during the process but not the actual generation of the information at the source and receiver.

Data Diddling

Data diddling is the changing of data before or during entry into the computer system. Examples include forging or counterfeiting documents used for data entry and exchanging valid disks and tapes with modified replacements.

Data Security

Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption. Data security is the main priority for organizations of every size and genre.Data security is also known as information security (IS) or computer security.

End User Computing

End user computing (EUC) refers to systems in which non-programmers can create working applications. EUC is a group of approaches to computing that aim at better integrating end users into the computing environment. These approaches attempt to realize the potential for high-end computing to perform in a trustworthy manner in problem-solving.End-user computing can range in complexity from users simply clicking a series of buttons, to writing scripts in a controlled scripting language, to being able to modify and execute code directly.

Enterprise Resource Planning System

Enterprise resource planning system provides an integrated view of core business processes, often in real-time, using common databases maintained by a database management system. enterprise resource planning system track business resources,cash, raw materials, production capacity,and the status of business commitments: orders, purchase orders, and payroll. The applications that make up the system share data across the various departments (manufacturing, purchasing, sales, accounting, etc.) that provide the data. enterprise resource planning system facilitates information flow between all business functions, and manages connections to outside stakeholders. Enterprise system software is a multi-billion dollar industry that produces components that support a variety of business functions. IT investments have become the largest category of capital expenditure in United States-based businesses over the past decade. Though early enterprise resource planning system focused on large enterprises, smaller enterprises increasingly use enterprise resource planning system.

Executable Code

Executable code may also refer to programs written in interpreted languages that require additional software to actually execute. Some interpreted languages remain in their source code form, such as JavaScript and VBScript, while others are compiled into an intermediate language, such as Java and Visual Basic. Interpreted languages require software runtime engines to convert the program into executable instructions for a particular CPU family that the hardware executes.

Batch Processing

Executing a series of non-interactive jobs all at one time. The term originated in the days when users entered programs on punch cards. They would give a batch of these programmed cards to the system operator, who would feed them into the computer. Batch jobs can be stored up during working hours and then executed during the evening or whenever the computer is idle. Batch processing is particularly useful for operations that require the computer or a peripheral device for an extended period of time. Once a batch job begins, it continues until it is done or until an error occurs. Note that batch processing implies that there is no interaction with the user while the program is being executed.

Execution Environment

Execution environment (EEs) are symbolic representations of JREs. For example, rather than talking about a specific JRE, with a specific name at a specific location on your disk, you can talk about the J2SE-1.4 execution environment. The system can then be configured to use a specific JRE to implement that execution environment. Execution environments are relevant both to development (compile) time and runtime.

Extensible Access Control Markup Language

Extensible Access Control Markup Language(XACML), the standard defines a declarative access control policy language implemented in XML and a processing model describing how to evaluate access requests according to the rules defined in policies.As a published standard specification, one of the goals of XACML is to promote common terminology and interoperability between access control implementations by multiple vendors. XACML is primarily an Attribute Based Access Control system (ABAC), where attributes (bits of data) associated with a user or action or resource are inputs into the decision of whether a given user may access a given resource in a particular way. Role-based access control (RBAC) can also be implemented in XACML as a specialization of ABAC.

Extensible Markup Language

Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. It is defined in the XML 1.0 Specification produced by the W3C, and several other related specifications, all free open standards.The design goals of XML emphasize simplicity, generality, and usability over the Internet. It is a textual data format with strong support via Unicode for the languages of the world. Although the design of XML focuses on documents, it is widely used for the representation of arbitrary data structures, for example in web services.

Fault Tolerant System

Fault tolerant system describes a computer system or component designed so that, in the event that a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerant system can be provided with software, or embedded in hardware, or provided by some combination.

File Service

File Service provides technologies that help manage storage, perform backup and recovery tasks, enable file replication, manage shared folders, ensure fast file searching, and enable access for UNIX client computers.

Partitioned File

File composed of sequential subfiles.

Front End

Front end and back-end are terms used to characterize program interfaces and services relative to the initial user of these interfaces and services. (The "user" may be a human being or a program.) A "front-end" application is one that application users interact with directly. A "back-end" application or program serves indirectly in support of the front-end services, usually by being closer to the required resource or having the capability to communicate with the required resource. The back-end application may interact directly with the front-end or, perhaps more typically, is a program called from an intermediate program that mediates front end and back-end activities.

Resource

Generally, any item that can be used. Devices such as printers and disk drives are resources, as is memory. In many operating systems, including Microsoft Windows and the Macintosh operating system, the term resource refers specifically to data or routines that are available to programs.

HP UX

HP UX (Hewlett-Packard UniX) is Hewlett-Packard's proprietary implementation of the Unix operating system, based on UNIX System V (initially System III) and first released in 1984. Recent versions support the HP 9000 series of computer systems, based on the PA-RISC processor architecture, and HP Integrity systems, based on Intel's Itanium architecture.

I5/OS

I5/OS is the name IBM has given to its newest release of OS/400 V5R3. i5/OS runs on IBM's i5 servers, which are based on IBM's Power5 microprocessors.

IPL

IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory . A mainframe operating system (OS/390) contains many megabytes of code that is customized by each installation, requiring some time to load the code into the memory. On a personal computer, booting or re-booting (re-starting) is the equivalent to IPLing (the term is also used as a verb) .In earlier operating systems, when you added devices to the hardware system, you had to stop the system, change the configuration file, and then "re-IPL," an activity that meant the system would be unavailable for some period of time. Today's systems provide dynamic reconfiguration so that the system can keep running.

IRIX

IRIX is a computer operating system developed by Silicon Graphics, Inc. (SGI) to run natively on their MIPS architecture workstations and servers. It was based on UNIX System V with BSD extensions. IRIX was the first operating system to include the XFS file system.

Process Group

In POSIX-conformant operating systems, a process group denotes a collection of one or more processes. Process groups are used to control the distribution of signals. A signal directed to a process group is delivered individually to all of the processes that are members of the group.

Loader

In a computer operating system , a loader is a component that locates a given program (which can be an application or, in some cases, part of the operating system itself) in offline storage (hard disk ), loader it into main storage (in a personal computer, it's called random access memory ), and gives that program control of the computer (allows it to execute its instruction s).A program that is loaded may itself contain components that are not initially loaded into main storage, but can be loaded if and when their logic is needed. In a multitasking operating system, a program that is sometimes called a dispatcher juggles the computer processor's time among different tasks and calls the loader when a program associated with a task is not already in main storage.

File System

In a computer, a file system is the way in which files are named and where they are placed logically for storage and retrieval. The DOS, Windows, OS/2, Macintosh, and UNIX-based operating systems all have file systems in which files are placed somewhere in a hierarchical (tree) structure. A file is placed in a directory (folder in Windows) or subdirectory at the desired place in the tree structure.

Vectored Interrupt

In a computer, a vectored interrupt is an I/O interrupt that tells the part of the computer that handles I/O interrupts at the hardware level that a request for attention from an I/O device has been received and and also identifies the device that sent the request.A vectored interrupt is an alternative to a polled interrupt , which requires that the interrupt handler poll or send a signal to each device in turn in order to find out which one sent the interrupt request.

Cohesion

In computer programming, cohesion refers to the degree to which the elements of a module belong together. Thus, it is a measure of how strongly related each piece of functionality expressed by the source code of a software module is.Cohesion is an ordinal type of measurement and is usually described as "high cohesion" or "low cohesion". Modules with high cohesion tend to be preferable because high cohesion is associated with several desirable traits of software including robustness, reliability, reusability, and understandability whereas low cohesion is associated with undesirable traits such as being difficult to maintain, difficult to test, difficult to reuse, and even difficult to understand.

Efficiency

In computer science terms efficiency is the ratio of useful work to ressources (processor and storage) expended. In other words, the ratio of the output to the input of a given system. If for example an algorithm is said to be effecient, it does a good job of economising on the computer resources to achieve its objective.

Library

In computer science, a library is a collection of implementations of behavior, written in terms of a language, that has a well-defined interface by which the behavior is invoked. This means that as long as a higher level program uses a library to make system calls, it does not need to be re-written to implement those system calls over and over again.

Masking

In computer science, a masking is data that is used for bitwise operations, particularly in a bit field.Using a mask, multiple bits in a byte, nibble, word (etc.) can be set either on, off or inverted from on to off (or vice versa) in a single bitwise operation.To turn certain bits on, the bitwise OR operation can be used, following the principle that Y OR 1 = 1 and Y OR 0 = Y. Therefore, to make sure a bit is on, OR can be used with a 1. To leave a bit unchanged, OR is used with a 0.There is no way to change a bit from on to off using the OR operation. Instead, bitwise AND is used. When a value is ANDed with a 1, the result is simply the original value, as in: Y AND 1 = Y. However, ANDing a value with 0 is guaranteed to return a 0, so it is possible to turn a bit off by ANDing it with 0: Y AND 0 = 0. To leave the other bits alone, ANDing them with a 1 can be done. On my iPhone om

Memory Leak

In computer science, a memory leak occurs when a computer program incorrectly manages memory allocations. In object-oriented programming, a memory leak may happen when an object is stored in memory but cannot be accessed by the running code. A memory leak has symptoms similar to a number of other problems and generally can only be diagnosed by a programmer with access to the program.Because they can exhaust available system memory as an application runs, memory leaks are often the cause of or a contributing factor to software aging.

Micro Kernel

In computer science, a micro kernel (also known as μ-kernel or Samuel kernel) is the near-minimum amount of software that can provide the mechanisms needed to implement an operating system (OS). These mechanisms include low-level address space management, thread management, and inter-process communication (IPC).

Thread

In computer science, a thread of execution is the smallest sequence of programmed instructions that can be managed independently by an operating system scheduler. The scheduler itself is a light-weight process. The implementation of threads and processes differs from one operating system to another, but in most cases, a thread is contained inside a process. Multiple thread can exist within the same process and share resources such as memory, while different processes do not share these resources. In particular, the threads of a process share the latter's instructions (its code) and its context.

Action

In computer science, action at a distance is an anti-pattern (a recognized common error) in which behavior in one part of a program varies wildly based on difficult or impossible to identify operations in another part of the program. The way to avoid the problems associated with action at a distance are a proper design, which avoids global variables and alters data in a controlled and local manner, or usage of a pure functional programming style with referential transparency.

Concurrency

In computer science, concurrency is a property of systems in which several computations are executing simultaneously, and potentially interacting with each other. The computations may be executing on multiple cores in the same chip, preemptively time-shared threads on the same processor, or executed on physically separated processors. A number of mathematical models have been developed for general concurrency computation including Petri nets, process calculi, the Parallel Random Access Machine model, the Actor model and the Reo Coordination Language.

Distributed Mutual Exclusion

In computer science, distributed mutual exclusion refers to the requirement of ensuring that no two concurrent processes are in their critical section at the same time, it is a basic requirement in concurrency control, to prevent race conditions. Here, a critical section refers to a period when the process accesses a shared resource, such as shared memory.

Queue

In computer science, queue refers to lining up jobs for a computer or device. For example, if you want to print a number of documents, the operating system (or a special print spooler) queue the documents by placing them in a special area called a print buffer or print queue. The printer then pulls the documents off the queue one at a time. Another term for this is print spooling .The order in which a system executes jobs on a queue depends on the priority system being used. Most commonly, jobs are executed in the same order that they were placed on the queue, but in some schemes certain jobs are given higher priority.

Scheduling

In computer science, scheduling is the method by which threads, processes or data flows are given access to system resources (e.g. processor time, communications bandwidth). This is usually done to load balance and share system resources effectively or achieve a target quality of service. The need for a scheduling algorithm arises from the requirement for most modern systems to perform multitasking (executing more than one process at a time) and multiplexing (transmit multiple data streams simultaneously across a single physical channel).

Threat

In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm.A threat can be either "intentional" (i.e., intelligent, e.g. an individual cracker or a criminal organization) or "accidental" (e.g. the possibility of a computer malfunctioning, or the possibility of a natural disaster such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.

Availability

In computer systems and networking, availability is a general term that is used to describe the amount of time over a one-year period that the system resources is available in the wake of component failures in the system.

Utility

In computers, a utility is a small program that provides an addition to the capabilities provided by the operating system. In some usages, a utility is a special and nonessential part of the operating system. The print "utility" that comes with the operating system is an example. It's not absolutely required to run programs and, if it didn't come with the operating system, you could perhaps add it. In other usages, a utility is an application that is very specialized and relatively limited in capability. A good example is a search-and-replace utility. Some operating systems provide a limited capability to do a search-and-replace for given character strings. You can add a much more capable search-and-replace utility that runs as an application program. However, compared to a word processor, a search-and-replace utility has limited capability.

Denial of Service Attack

In computing, a Denial of service attack (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, DDoS (Distributed Denial of Service) attacks are sent by two or more persons, or bots. DoS (Denial of Service) attacks are sent by one person or system.

Memory Dump

In computing, a core dump (in Unix parlance), memory dump, or system dumpconsists of the recorded state of the working memory of a computer program at a specific time, generally when the program has terminated abnormally (crashed). In practice, other key pieces of program state are usually dumped at the same time, including the processor registers, which may include the program counter and stack pointer, memory management information, and other processor and operating system flags and information. Core dumps are often used to assist in diagnosing and debugging errors in computer programs.The name comes from magnetic core memory, the principal form of random access memory from the 1950s to the 1970s. The name has remained long after magnetic core technology became obsolete.On many operating systems, a fatal error in a program automatically triggers a core dump, by extension the phrase "to dump core" has come to mean, in many cases, any fatal error, regardless of whether a record of the program memory results.

Driver

In computing, a device driver (commonly referred to as simply a driver) is a computer program that operates or controls a particular type of device that is attached to a computer.A driver provides a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details of the hardware being used.

Shell

In computing, a shell is a user interface for access to an operating system's services. Generally, operating system shell use either a command-line interface (CLI) or graphical user interface (GUI). Mac OS and Microsoft Windows are widely used operating systems with GUIs.

Inputs and Outputs

In computing, inputs and outputs or I/O (or informally, io or IO) is the communication between an information processing system (such as a computer) and the outside world, possibly a human or another information processing system. Inputs are the signals or data received by the system, and outputs are the signals or data sent from it. The term can also be used as part of an action, to "perform I/O" is to perform an input or output operation. I/O devices are used by a person (or other system) to communicate with a computer. For instance, a keyboard or a mouse may be an input device for a computer, while monitors and printers are considered output devices for a computer. Devices for communication between computers, such as modems and network cards, typically serve for both input and output.

IPC

In computing, inter-process communication (IPC) is a set of methods for the exchange of data among multiple threads in one or more processes. Processes may be running on one or more computers connected by a network. IPC methods are divided into methods for message passing, synchronization, shared memory, and remote procedure calls (RPC). The method of IPC used may vary based on the bandwidth and latency of communication between the threads, and the type of data being communicated.

Massively Parallel Processing

In computing, massively parallel processing refers to the use of a large number of processors (or separate computers) to perform a set of coordinated computations in parallel.In one approach, e.g. in grid computing the processing power of a large number of computers in distributed, diverse administrative domains, is opportunistically used whenever a computer is available. An example is BOINC, a volunteer-based, opportunistic grid system.

Kernel

In computing, the kernel is a computer program that manages input/output requests from software and translates them into data processing instructions for the central processing unit and other electronic components of a computer. The kernel is a fundamental part of a modern computer's operating system.

Acknowledgement

In data networking, an acknowledgement (or acknowledgment) is a signal passed between communicating processes or computers to signify acknowledgement, or receipt of response, as part of a communications protocol. For instance, acknowledgement packets are used in the Transmission Control Protocol (TCP) to acknowledge the receipt of SYN packets when establishing a connection, data packets while a connection is being used, and FIN packets when terminating a connection.The acknowledgement function is used in the automatic repeat-request (ARQ) function. Acknowledgement frames are numbered in coordination with the frames that have been received, and then sent to the transmitter. This allows the transmitter to remain within the window size of the receiver's buffers, and to become aware of any missed frames.

Board Support Package

In embedded systems, a board support package (BSP) is implementation of specific support code (software) for a given (device motherboard) board that conforms to a given operating system. It is commonly built with a bootloader that contains the minimal device support to load the operating system and device drivers for all the devices on the board.Some suppliers also provide a root file system, a toolchain for making programs to run on the embedded system (which would be part of the architecture support package), and configurators for the devices (while running).

Logon

In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer. Almost always a logon requires that the user have a user ID and a password. Often, the user ID must conform to a limited length such as eight characters and the password must contain at least one digit and not match a natural language word. The user ID can be freely known and is visible when entered at a keyboard or other input device. The password must be kept secret (and is not displayed as it is entered). Some Web sites require users to register in order to use the site, registered users can then enter the site by logging on.

Protocol

In information technology, a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities. Protocol exist at several levels in a telecommunication connection. For example, there are protocol for the data interchange at the hardware device level and protocol for data interchange at the application program level. In the standard model known as Open Systems Interconnection (OSI), there are one or more protocol at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocol are often described in an industry or international standard.

Layer

In object-oriented design, a layer is a group of classes that have the same set of link-time module dependencies to other modules. In other words, a layer is a group of reusable components that are reusable in similar circumstances. In programming languages, the layer distinction is often expressed as "import" dependencies between software modules.

Walk Through

In software engineering, a walkthrough or walk through is a form of software peer review "in which a designer or programmer leads members of the development team and other interested parties through a software product, and the participants ask questions and make comments about possible errors, violation of development standards, and other problems"."Software product" normally refers to some kind of technical document. As indicated by the IEEE definition, this might be a software design document or program source code, but use cases, business process definitions, test case specifications, and a variety of other technical documentation may also be walk through.

Module

In software, a module is a part of a program. Programs are composed of one or more independently developed modules that are not combined until the program is linked. A single module can contain one or several routines.

Timeout

In telecommunication and related engineering (including computer networking and programming), the term timeout or time-out has several meanings, including: A network parameter related to an enforced event designed to occur at the conclusion of a predetermined elapsed time. A specified period of time that will be allowed to elapse in a system before a specified event is to take place, unless another specified event occurs first, in either case, the period is terminated when either event takes place. Note: A timeout condition can be canceled by the receipt of an appropriate time-out cancellation signal.

Registry Key

In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry, an internal database the computer uses to store configuration information. The registry in Windows stores data in binary format, keeping the configuration data for the machine and its users in separate files. This allows the system and its applications to load global and individual configurations upon startup and login. When an administrator runs the command regedit, pre-defined keys called root keys, high-level keys or HKEYS display in the left pane of the Registry Editor window. To a lay person, a registry key looks just like any other Windows folder. A pre-defined key and its nested subkeys are collectively called a hive.

Relative ID

In the context of the Microsoft Windows NT line of computer operating systems, the relative identifier (RID) Is a variable length number that is assigned to objects at creation and becomes part of the object's Security Identifier (SID) that uniquely identifies an account or group within a domain.

Information

Information is that which informs, i.e. that from which data can be derived. Information is conveyed either as the content of a message or through direct or indirect observation of some thing. That which is perceived can be construed as a message in its own right, and in that sense, information is always conveyed as the content of a message. Information can be encoded into various forms for transmission and interpretation. For example, information may be encoded into signs, and transmitted via signals.

Information Technology

Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. The term is commonly used as a synonym for computers and computer networks, but it also encompasses other information distribution technologies such as television and telephones. Several industries are associated with information technology, including computer hardware, software, electronics, semiconductors, internet, telecom equipment, e-commerce and computer services.

Infrastructure as a Service

Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The client typically pays on a per-use basis.

Input Control

Input control are the interactive components in your app's user interface. Android provides a wide variety of controls you can use in your UI, such as buttons, text fields, seek bars, checkboxes, zoom buttons, toggle buttons, and many more.

Operator Console

Interface that you use to perform monitoring functions.

Invocation

Invocation is a term used by some authors for a style of software architecture in which a system is structured around event handling, using a form of callback. It is closely related to inversion of control and what is known informally as the Hollywood principle.

Checkpoint Restart Procedure

It is a procedure of recovering from a system failure. A checkpoint is a copy of the computer's memory that is saved on disk and can be used during failure i. e the last checkpoint serves as a recovery point.

False Authorization

It is a process of detecting an unauthorised person as a authorised one is called False authorization.

Generic Process Control

It is a process that is applied to the entire class of an organisation is called as Generic process control.

System Exit

It is a process to terminate the execution of program and come out of it.

Disclosure Controls and Procedures

It is the procedure of uniting all the information material in the report which is submitted to the Security and Exchange Commission in United States.

Job Control Language

JCL (job control language) is a language for describing jobs (units of work) to the MVS, OS/390, and VSE operating systems, which run on IBM's S/390 large server (mainframe) computers. These operating systems allocate their time and space resources among the total number of jobs that have been started in the computer. Jobs in turn break down into job steps. All the statements required to run a particular program constitute a job step. Jobs are background (sometimes called batch) units of work that run without requiring user interaction (for example, print jobs).

Bar Code

Lines of different widths and sizes representing data, that when read determine what the scanned object is. Bar code are often used to help organize and index information or prices about an object. Bar code used by the U.S. postal service that helps speed the delivery of mail is another perfect example of how a bar code could be used. The picture is an example of what a bar code for an address may look like.

Litestep

LiteStep is a Windows Shell replacement for Windows 9x and up, licensed under the terms of the GNU General Public License (GPL).LiteStep replaces the Windows Shell which provides access to the graphical user interface on Windows based computers. Depending on the theme used, it can replace or remove shell elements, such as the start menu and taskbar. It can also be used to create informational-type displays. Aside from the core executable, LiteStep is made up of modules, some of which are included with the initial installation. Other modules, which a theme may require to function properly, are automatically downloaded. The modules and core provide users with the ability to create anything from minimal environments, to elaborate and heavily scripted desktops. Customizations are provided in the form of themes, which may be created or modified with a text editor. A theme for LiteStep is a collection of configurations, scripts, and/or images which are distributed in a file with the zip or lsz extension. The lsz file extension is a renamed zip file, which is associated with the Litestep Theme Installer.

MINIX

MINIX is a Unix-like computer operating system based on a microkernel architecture created by Andrew S. Tanenbaum for educational purposes, MINIX also inspired the creation of the Linux kernel.MINIX (from "mini-Unix") was first released in 1987, with its complete source code made available to universities for study in courses and research. It has been free and open source software since it was re-licensed under the BSD license in April 2000.

MPE

MPE/iX is the operating system for the line of e3000 midrange business server s from Hewlett-Packard (HP). Its latest version, MPE/iX Version 7.0, is marketed as " Web -enabled" and "Internet-ready." The operating system includes support for Java and HP describes it as providing " OLTP performance and functionality for business-critical applications." Support also is provided for PCI I/O devices. HP emphasizes the value of an operating system that, since its first release in 1972 has built a reputation for being stable, reliable, and robust .

MPP

MPP (massively parallel processing) is the coordinated processing of a program by multiple processor s that work on different parts of the program, with each processor using its own operating system and memory . Typically, MPP processors communicate using some messaging interface. In some implementations, up to 200 or more processors can work on the same application. An "interconnect" arrangement of data paths allows messages to be sent between processors. Typically, the setup for MPP is more complicated, requiring thought about how to partition a common database among processors and how to assign work among the processors. An MPP system is also known as a "loosely coupled" or "shared nothing" system.

MS DOS

MS DOS (Microsoft Disk Operating System) was the Microsoft-marketed version of the first widely-installed operating system in personal computers. It was essentially the same operating system that Bill Gates's young company developed for IBM as Personal Computer - Disk Operating System (PC-DOS). Most users of either DOS system simply referred to their system as Disk Operating System. Like PC-DOS, MS DOS was (and still is) a non-graphical line-oriented command-driven operating system, with a relatively simple interface but not overly "friendly" user interface.

Microsoft Disk Operating System

MS-DOS short for Microsoft Disk Operating System is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid-1990s, until it was gradually superseded by operating systems offering a graphical user interface (GUI), in particular by various generations of the Microsoft Windows operating system.

MULTOS

MULTOS is a multi-application smart card operating system, that enables a smart card to carry a variety of applications, from chip and pin application for payment to on-card biometric matching for secure ID and ePassport. MULTOS is an open standard whose development is overseen by the MULTOS Consortium a body composed of companies which have an interest in the development of the OS and includes smart card and silicon manufacturers, payment card schemes, chip data preparation, card management and personalization system providers, and smart card solution providers. There are more than 30 leading companies involved in the consortium.

Multiple Virtual Storage

MVS (Multiple Virtual Storage) is an operating system from IBM that continues to run on many of IBM's mainframe and large server computers. MVS has been said to be the operating system that keeps the world going and the same could be said of its successor systems, OS/390 and z/OS. The payroll, accounts receivable, transaction processing, database management, and other programs critical to the world's largest businesses are usually run on an MVS or successor system. Although MVS has often been seen as a monolithic, centrally-controlled information system, IBM has in recent years repositioned it (and successor systems) as a "large server" in a network-oriented distributed environment, using a 3-tier application model.

Mac OS X Lion

Mac OS X Lion (version 10.7, marketed as OS X Lion) is the eighth major release of Mac OS X, Apple's desktop and server operating system for Macintosh computers.A preview of Lion was publicly unveiled at the "Back to the Mac" Apple Special Event on October 20, 2010. It brings many developments made in Apple's iOS, such as an easily navigable display of installed applications, to the Mac, and includes support for the Mac App Store, as introduced in Mac OS X Snow Leopard version 10.6.6. On February 24, 2011, the first developer's preview of Lion (11A390) was released to subscribers to the Apple Developer program. Other developer previews were subsequently released, with Lion Preview 4 (11A480b) being released at WWDC 2011.

OS 10.2

Mac OS X version 10.2 Jaguar is the third major release of Mac OS X, Apple's desktop and server operating system. It superseded Mac OS X v10.1 and preceded Mac OS X Panther. The operating system was initially available on August 23, 2002 either for single-computer installations, and in a "family pack", which allowed five installations on separate computers in one household The operating system was generally well received by most Mac users as a large step forward in the areas of stability, general speed enhancements, compatibility with other flavors of Unix and the lineup of both graphical and terminal applications available, however, many critics, such as Amazon.com users, still claimed that significant user interface speed issues existed and that the operating system was still a big step down from Mac OS 9. Jaguar was the first Mac OS X release to publicly use its code name in marketing and advertisements, a practice that has continued in subsequent releases of the operating system.

Mac OS

Mac OS is a series of graphical user interface-based operating systems developed by Apple Inc. for their Macintosh line of computer systems. original version was the integral and unnamed system software first introduced in 1984 with the original Macintosh, and referred to simply as the "System" software. The Macintosh system software gained an official name in 1996, when Apple branded version 7.6 as Mac OS as part of their Macintosh clone program. The Macintosh, specifically its system software, is credited with popularizing the graphical user interface concept.

Master Boot Record

Master Boot Record, MBR is also sometimes referred to as the master boot block, master partition boot sector, and sector 0. The MBR is the first sector of the computer hard drive that tells the computer how to load the operating system, how the hard drive is partitioned, and how to load the operating system.

Meta File

Meta file is a generic term for a file format that can store multiple types of data. This commonly includes graphics file formats. These graphics files can contain raster, vector, and type data. A common use for these files is to provide support for an operating system's computer graphics, e.g. Microsoft Windows uses Windows Metafile, and Mac OS X uses PDF.

Microsoft

Microsoft Corporation is an American multinational corporation headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer web browser. Its flagship hardware products are Xbox game console and the Microsoft Surface series of tablets. It is the world's largest software maker measured by revenues. It is also one of the world's most valuable companies.

Microsoft Windows Server 2012 R2

Microsoft Windows Server 2012 R2 is the second iteration of Windows Server 2012.

Middle-Ware

Middle-ware is computer software that provides services to software applications beyond those available from the operating system. It can be described as "software glue". Middle-ware makes it easier for software developers to perform communication and input/output, so they can focus on the specific purpose of their application.

Min Win

Min Win is the code name for the core components of the Windows operating system. Min Win runs the kernel, the TCP/IP stack and basic system services, it is self-contained and has no understanding of, or dependence upon, the rest of the Windows operating system.Min Win grew out of project at Microsoft to map all the interdependencies in the Windows operating system (OS). Once the interdependencies were determined, the architects were able to break the OS down into modular parts, called layers. The bottom layer, which provides the foundation upon which the rest of Windows is built, was isolated and given the name Min Win.Microsoft says it has no plans at this time to turn Min Win into a product. It will be used internally to allow Microsoft developers to grow the Windows operating system in new ways without having to rewrite core services or worry about breaking dependencies. The current version of Min Win takes up 25MB of disk space and can run on as little as 40MB of RAM. Future versions are expected to require less space and memory.

Mobile Device Fragmentation

Mobile device fragmentation is a phenomenon that occurs when some mobile users are running older versions of an operating system, while other users are running newer versions.Mobile device fragmentation is often made worse when the wireless carrier, and not the device manufacturer, is in charge of deciding when to deploy operating system updates. Mobile device fragmentation can be a problem for software developers who must create different versions of the same app in order to make sure it works correctly with different versions of a given OS. It can also be a problem for IT departments because different operating versions have different capabilities, which can make them harder to manage and secure.Mobile device fragmentation is often associated with Android, Google's mobile OS. Mobile device fragmentation is not as much of an issue with iOS devices.

Moblin

Moblin, short for 'mobile Linux', was an open source operating system and application stack for Mobile Internet Devices (MIDs), netbooks, nettops and embedded devices. It first merged with the Maemo effort and then both were integrated with the MeeGo project. Nokia stopped all MeeGo development after switching to Windows Phone. Intel discontinued work on MeeGo using Tizen instead.

Middleweight Thread

Modern OS kernels are considered middleweight thread because multiple threads can exist in a single address space. This reduces the amount of context that needs to be saved for each one, significantly decreasing the switching time. In contrast, a Unix process is considered a heavyweight thread. Most user-level threads are considered lightweight threads.A thread and a task are very similar and are often confused. The OS considers a running program a task, giving each task a turn at performing an operation. If a program requests that a file be saved, the OS creates a thread. Most of today's operating systems support multitasking and multithreading to provide efficient application processing.

Motif

Motif is a graphical user interface ( GUI ) guideline and development toolkit for the X Window System . As such, it defines the rules and tools for the "look-and-feel" in the graphical user interface of most UNIX -based operating systems and their applications. Developed in 1989 by the Open Software Foundation (now part of The Open Group ), Motif corresponds to IBM's Common User Access (CUA) guideline for its OS/2 Presentation Manager and to the guidelines built into the Microsoft Windows application programming interfaces, including the Microsoft Foundation Classes ( Microsoft Foundation Class Library ) for user interface objects (often called widget ).Motif is also the name of a Microsoft Windows program object for a sound sequence or musical motif (short theme or iconic sound). Motif are also known as Microsoft Interactive Music Controls.

Multics

Multics (Multiplexed Information and Computing Service) was a mainframe time-sharing operating system that was developed in the 1963-1969 period through the collaboration of the Massachusetts Institute of Technology (MIT), General Electric (GE), and Bell Labs. Multics was the first or one of the first operating systems that used page-segmented storage. The operating system was written in PL/I and ran on GE hardware. By 1970, Bell Labs had withdrawn from the project, and Honeywell, which had bought GE's computer division, continued as the hardware provider. Support from the Advanced Research Projects Agency helped sustain the project.

Multiplexed Information and Computing Service

Multics (Multiplexed Information and Computing Service) was a mainframe time-sharing operating system that was developed in the 1963-1969 period through the collaboration of the Massachusetts Institute of Technology (MIT), General Electric (GE), and Bell Labs. Multics was the first or one of the first operating systems that used page-segmented storage. The operating system was written in PL/I and ran on GE hardware. By 1970, Bell Labs had withdrawn from the project, and Honeywell, which had bought GE's computer division, continued as the hardware provider. Support from the Advanced Research Projects Agency helped sustain the project.

Multitasking

Multitasking, in an operating system, is allowing a user to perform more than one computer task (such as the operation of an application program) at a time. The operating system is able to keep track of where you are in these tasks and go from one to the other without losing information. Microsoft Windows 2000, IBM's OS/390, and Linux are examples of operating systems that can do multitasking (almost all of today's operating systems can). When you open your Web browser and then open Word at the same time, you are causing the operating system to do multitasking.

OS 9

OS 9 is a family of real-time, process-based, multitasking, multi-user, Unix-like operating systems, developed in the 1980s, originally by Microware Systems Corporation for the Motorola 6809 microprocessor. It was purchased by Radisys Corp in 2001. It is currently owned by Microware LP.The OS 9 family was popular for general-purpose computing and remains in use in commercial embedded systems and amongst hobbyists. Today, OS 9 is a product name used by both a Motorola 68000-series machine language OS and a portable (PowerPC, x86, ARM, MIPS, SH4, etc.) version written in C, originally known as OS-9000.

OS 10

OS X previously Mac OS X, is a series of Unix-based graphical interface operating systems developed and marketed by Apple Inc. It is designed to run exclusively on Mac computers, having been pre-installed on all Macs since 2002. It was the successor to Mac OS 9, released in 1999, the final release of the "classic" Mac OS, which had been Apple's primary operating system since 1984. The first version released was Mac OS X Server 1.0 in 1999, and a desktop version, Mac OS X v10.0 "Cheetah" followed on March 24, 2001. Previous releases of OS X were named after big cats, for example, OS X v10.8 was referred to as "Mountain Lion". However, with the announcement of OS X Mavericks in June 2013, this was dropped in favor of Californian landmarks.

OS X

OS X previously Mac OS X,is a series of Unix-based graphical interface operating systems developed and marketed by Apple Inc. It is designed to run exclusively on Mac computers, having been pre-installed on all Macs since 2002. It was the successor to Mac OS 9, released in 1999, the final release of the "classic" Mac OS, which had been Apple's primary operating system since 1984. The first version released was Mac OS X Server 1.0 in 1999, and a desktop version, Mac OS X v10.0 "Cheetah" followed on March 24, 2001. Previous releases of OS X were named after big cats, for example, OS X v10.8 was referred to as "Mountain Lion". However, with the announcement of OS X Mavericks in June 2013, this was dropped in favor of Californian landmarks.

OS/2

OS/2 is an IBM operating system for the personal computer that, when introduced in 1987, was intended to provide an alternative to Microsoft Windows for both enterprise and personal PC users. The last version of OS/2 Warp, Warp 4, offered a Netscape-based Web browser that exploited OS/2's speech recognition capability. IBM enhanced OS/2 to provide server functions for e-business .While OS/2 is still in use, IBM has announced that its support will require a special contract beginning in 2006.

OS/390

OS/390 is the IBM operating system most commonly installed on its S/390 line of mainframe server. It is an evolved and newly renamed version of MVS (Multiple Virtual Storage), IBM's long-time, robust mainframe operating system. By whatever name, MVS has been said to be the operating system that keeps the world going. The payroll, accounts receivable, transaction processing, database management, and other programs critical to the world's largest businesses are usually run on an MVS system. Although MVS tends to be associated with a monolithic, centrally-controlled information system, IBM has in recent years repositioned it as a "large server" in a network-oriented distributed environment that would tend to use a 3-tier application model.

OS/400

OS/400 is IBM's operating system for its AS/400 and AS/400e line of business computers. Because OS/400 is closely attuned to the AS/400 hardware design and generally comes as part of the basic package, there is no alternative operating system to compete with it. OS/400 is built to operate with the AS/400 logical partition (LPAR) architecture, in which multiple instances of the operating system can run concurrently in different partitions. Among other uses, LPAR is useful when migrating to a new release. The old production system can keep operating in one partition while a new system is being tested.

Object Code

Object code, or sometimes an object module, is what a computer compiler produces. In a general sense object code is a sequence of statements or instructions in a computer language, usually a machine code language (i.e., 1's and 0's) or an intermediate language such as RTL.Object files can in turn be linked to form executable file or library file. In order to be used, object code must either be placed in an executable file, a library file, or an object file.

Operating System Audit Trail

Operating system audit trail, maintains a record of system activity by a operating system mechanism i. e by system application processes and by user performed activities applications on a system.

Operational Audit

Operational Audit is a systematic review of effectiveness, efficiency and economy of operation. Operational audit is a future-oriented, systematic, and independent evaluation of organizational activities. In Operational audit financial data may be used, but the primary sources of evidence are the operational policies and achievements related to organizational objectives. Operational audit is a more comprehensive form of an Internal audit.

Initial Program Load

PL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory . A mainframe operating system (such as OS/390) contains many megabytes of code that is customized by each installation, requiring some time to load the code into the memory. On a personal computer, booting or re-booting (re-starting) is the equivalent to IPLing.

Stage Gate

Point where one phase or stage of new product activity is finished and another begins. Usually accompanied by phased reviews.Stage Gate Reviews are conducted by the IT governance organization (in conjunction with investment stakeholders) to ensure that projects, as they move through their life cycles, are fully complying with relevant IT project management requirements. The reviews also review project performance against baselines and require corrective action plans or rebaselining as appropriate to the situation. Most importantly, Stage Gate Reviews determine that the project is ready to advance to the next Phase. Stage Gate Reviews are also the most appropriate time for the IT governance organization, in consultation with affected Business Owners, to change project cost, schedule or performance baselines in response to changing HHS mission priorities.

Analysis

Presents an algorithmic approach to mathematical analysis, with a focus on modelling and on the applications of analysis Describes mathematical theory alongside the basic concepts and methods of numerical analysis, supported by computer experiments and programming exercises.

Systems Acquisition Process

Procedures established to purchase application software, or an upgrade, including evaluation of the supplier's financial stability, track record, resources and references from existing customers.

Process Goals

Process goals, over which the individual has complete control, deal with the technique or strategy necessary to perform well. Process goals can also be established to map the route to achieving the desired outcome goal.

Asymmetric Key

Public-key cryptography, also known as Asymmetric. Asymmetric key, is a class of cryptographic algorithms which require two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used to encrypt plaintext or to verify a digital signature, whereas the private key is used to decrypt ciphertext or to create a digital signature. The term "asymmetric" stems from the use of different keys to perform these opposite functions, each the inverse of the other - as contrasted with conventional ("symmetric") cryptography which relies on the same key to perform both.

Red Hat Enterprise Linux

Red Hat Enterprise Linux (RHEL) is a Linux distribution developed by Red Hat and targeted toward the commercial market. Red Hat Enterprise Linux is released in server versions for x86, x86-64, Itanium, PowerPC and IBM System z, and desktop versions for x86 and x86-64.q

Registry Virtualization

Registry virtualization is an application compatibility technology that enables registry write operations that have global impact to be redirected to per-user locations. This redirection is transparent to applications reading from or writing to the registry. It is supported starting with Windows Vista.This form of virtualization is an interim application compatibility technology, Microsoft intends to remove it from future versions of the Windows operating system as more applications are made compatible with Windows Vista and later versions of Windows. Therefore, it is important that your application does not become dependent on the behavior of registry virtualization in the system.

Reliability

Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications. It has long been considered one of three related attributes that must be considered when making, buying, or using a computer product or component. Reliability, availability, and serviceability RAS) for short - are considered to be important aspects to design into any system. In theory, a reliable product is totally free of technical errors, in practice, however, vendors frequently express a product's reliability quotient as a percentage. Evolutionary products (those that have evolved through numerous versions over a significant period of time) are usually considered to become increasingly reliable, since it is assumed that bug s have been eliminated in earlier releases. For example, IBM's z/OS (an operating system for their S/390 server series), has a reputation for reliability because it evolved from a long line of earlier MVS and OS/390 operating system versions.

Response Token

Response token is a method that goes through challenge handshake authentication protocol. Example if a user logging in by username and password making a request to the server. If password is correct then the user can log in else not.

Risk Appetite

Risk Appetite is a method to help guide an organisation's approach to risk and risk management.The level of risk that an organization is prepared to accept, before action is deemed necessary to reduce it. It represents a balance between the potential benefits of innovation and the threats that change inevitably brings.

Risk

Risk is the expectation of a loss or damage (consequence),the combined severity and probability of a loss,the long term rate of loss,a potential problem (leading to a loss) that may or may not occur in the future.

Root Cause Analysis

Root cause analysis (RCA) is a method of problem solving that tries to identify the root causes of faults or problems. A root cause is a cause that once removed from the problem fault sequence, prevents the final undesirable event from recurring.

Security Software

Security software is any computer program designed to enhance information security. The defense of computers against intrusion and unauthorized use of resources is called computer security. Similarly, the defense of computer networks is called network security.

Firmware

Software (programs or data) that has been written onto read-only memory (ROM). Firmware is a combination of software and hardware. ROMs, PROMs and EPROMs that have data or programs recorded on them are firmware.

Benchmark

Standard, or a set of standards, used as a point of reference for evaluating performance or level of quality. Benchmark may be drawn from a firm's own experience, from the experience of other firms in the industry, or from legal requirements such as environmental regulations.

Concurrency Transparency

System ensures resources are accessed in a sequential manner (at some level of detail) users do not have to consider other users concurrency transparency, in computing, refers to when multiple path of execution (threads or processes) are running at the same time. This is a very loosely defined term and may refer to multiple things: Multiple processes or threads executing on the same processor are said to be running concurrently.Multiple processes or threads executing on different processors may be said to be "truly concurrent," since they can be running instructions at the same time (without the need of a CPU scheduler).

System Testing

System testing of software or hardware is testing conducted on a complete, integrated system to evaluate the system's compliance with its specified requirements. System testing falls within the scope of black box testing, and as such, should require no knowledge of the inner design of the code or logic. As a rule, system testing takes, as its input, all of the "integrated" software components that have passed integration testing and also the software system itself integrated with any applicable hardware system(s). The purpose of integration testing is to detect any inconsistencies between the software units that are integrated together (called assemblages) or between any of the assemblages and the hardware. System testing is a more limited type of testing, it seeks to detect defects both within the "inter-assemblages" and also within the system as a whole.

TRON

TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system ( RTOS ) kernel that can be tailored to any embedded system . TRON, originally invented by Ken Sakamura, has become a standard for embedded systems in Japan. The specification and its variants are used in more than 3,000,000,000 microprocessors worldwide. The main focus of the TRON project, supported almost entirely by Japanese industries, is to provide an environment for distributed computing among small machines on a vast scale.

Test Data

Test data is data which has been specifically identified for use in tests, typically of a computer program.Some data may be used in a confirmatory way, typically to verify that a given set of input to a given function produces some expected result. Other data may be used in order to challenge the ability of the program to respond to unusual, extreme, exceptional, or unexpected input.Test data may be produced in a focused or systematic way (as is typically the case in domain testing), or by using other, less-focused approaches (as is typically the case in high-volume randomized automated tests). Test data may be produced by the tester, or by a program or function that aids the tester. Test data may be recorded for re-use, or used once and then forgotten.

Default Deny Policy

The Default Deny Policy allows the user to retrieve or filter off only a predefined set of values.Default Deny is a type of firewall ruleset in which the default condition of the firewall is to deny ALL connectivity - from anywhere, to anywhere. A default deny firewall with no additional rules loaded effectively has no network interfaces in it at all.

Hypertext Transfer Protocol

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer hypertext.

Feature

The Institute of Electrical and Electronics Engineers defines the term feature in IEEE 829 as "A distinguishing characteristic of a software item (e.g. performance, portability, or functionality).

Registry

The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems. It contains settings for low-level operating system components and for applications running on the platform that have opted to use the registry. The kernel, device drivers, services, SAM, user interface and third party applications can all make use of the registry. The registry also provides a means to access counters for profiling system performance.

Fault Tolerance

The ability of a system to respond gracefully to an unexpected hardware or software failure. There are many levels of fault tolerance, the lowest being the ability to continue operation in the event of a power failure. Many fault-tolerant computer systems mirror all operations -- that is, every operation is performed on two or more duplicate systems, so if one fails the other can take over.

Byte

The byte is a unit of digital information in computing and telecommunications that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable unit of memory in many computer architectures.

Feasibility Study

The feasibility study is an evaluation and analysis of the potential of a proposed project which is based on extensive investigation and research to support the process of decision making.A well-designed feasibility study should provide a historical background of the business or project, a description of the product or service, accounting statements, details of the operations and management, marketing research and policies, financial data, legal requirements and tax obligations. Generally, feasibility studies precede technical development and project implementation.

Life Cycle

The normal stages that a product passes through: research and development, growth, expansion, maturity, saturation, and decline. In the research stage, there are no sales at all. In the growth stage, sales are slow and often need to be supplemented by heavy sales and advertising efforts. In the expansion stage, sales may grow more rapidly. In the maturity stage, sales start slowing down as most people who might want the product already have it. In the saturation stage, everyone who wants the product has it, and there are few opportunities for increasing sales. In the decline stage, sales fall and the product eventually becomes obsolete.

One's Complement

The ones' complement of a binary number is defined as the value obtained by inverting all the bits in the binary representation of the number (swapping 0s for 1s and vice-versa). The ones' complement of the number then behaves like the negative of the original number in some arithmetic operations. To within a constant (of −1), the ones' complement behaves like the negative of the original number with binary addition. However, unlike two's complement, these numbers have not seen widespread use because of issues such as the offset of −1, that negating zero results in a distinct negative zero bit pattern, less simplicity with arithmetic borrowing, etc.

Operating System

The operating system is the most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating system perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop , it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.

Security Administration

The person charged with monitoring and implementing security controls and procedures for a system. Whereas each university will have one Information Security Officer, technical management may designate a number of security administrator.

Servlet

The servlet is a Java programming language class used to extend the capabilities of a server. Although servlets can respond to any types of requests, they are commonly used to extend the applications hosted by web servers, so they can be thought of as Java applets that run on servers instead of in web browsers. These kinds of servlets are the Java counterpart to other dynamic Web content technologies such as PHP and ASP.NET.

Performance

The speed at which a computer operates, either theoretically (for example, using a formula for calculating Mtops - millions of theoretical instructions per second) or by counting operations or instructions performed (for example, ( MIPS ) - millions of instructions per second) during a benchmark test. The benchmark test usually involves some combination of work that attempts to imitate the kinds of work the computer does during actual use. Sometimes performance is expressed for each of several different benchmarks.The total effectiveness of a computer system, including throughput , individual response time , and availability.

Recovery Action

The task or activity performed to bring back the normal condition is called Recovery action.

Artificial Intelligence

The theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.

Quiesce

To quiesce is to put a computer, a program, a thread , or some other computer resource into a temporarily inactive or inhibited state. A resource that is in a quiesced state can be reactivated more quickly than one that has been completely removed from the system. Typically, any descriptive information about a resource that has been built by the system remains where it is during the quiescence. The reverse of quiesce is usually unquiesce , but reset and other terms are also used.

TUX

Tux is a penguin character and the official mascot of the Linux kernel. Originally created as an entry to a Linux logo competition, Tux is the most commonly used icon for Linux, although different Linux distributions depict Tux in various styles. In video games featuring the character, female counterparts named Penny and Gown accompany him. The character is used in many other Linux programs and as a general symbol of Linux.

Concurrent

Two or more tasks, activities, or events whose execution may overlap in time.

UNIX

Unix is a multitasking, multiuser computer operating system that exists in many variants. The original Unix was developed at AT&T's Bell Labs research center by Ken Thompson, Dennis Ritchie, and others. From the power user's or programmer's perspective, Unix systems are characterized by a modular design that is sometimes called the "Unix philosophy," meaning the OS provides a set of simple tools that each perform a limited, well-defined function, with a unified filesystem as the main means of communication and a shell scripting and command language to combine the tools to perform complex workflows.

Utility Software

Utility software is system software designed to help analyze, configure, optimize or maintain a computer. Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, software and data storage) operates.

VMS

VMS (Virtual Memory System) is an operating system from the Digital Equipment Corporation (DEC) that runs in its older mid-range computers. VMS originated in 1979 as a new operating system for DEC's new VAX computer, the successor to DEC's PDP-11. VMS is a 32-bit system that exploits the concept of virtual memory.VMS was renamed OpenVMS when it was redeveloped for the Alpha processor. (OpenVMS is also the name now used on the VAX computer.) The "Open" suggests the added support for the UNIX-like interfaces of the Portable Operating System Interface (POSIX) standard. Programs written to the POSIX standard, which includes a set of standard C language programming functions, can be ported to any POSIX-supporting computer platform.

VMware Converter

VMware Converter is a utility that facilitates the creation of VMware virtual machines from physical systems or virtual machines associated with third-party vendors. The utility also enables migration of virtual machines between VMware platforms from a centralized management console.With VMware Converter 3, the latest version of the utility, multiple simultaneous conversions are possible without source server downtime or OS (operating system) on the source machine. Conversion speed is enhanced by sector-based copying. The complexity of the process is minimized by user-friendly wizards. If desired, conversions and migrations can be controlled from remote locations.

VXWORKS

VXWorks is a real-time operating system (RTOS) that can be used in embedded systems. VxWorks can be customized easily and can run on most processors designed for distributed computing. VXWorks is used to control network and communication devices, test and measurement equipment, computer peripherals, automotive systems, avionics (aeronautics and astronautics) equipment and diverse consumer products.VXWorks has some similarities to Unix and includes a shell, debugging functions, memory management, performance monitoring and support for multiprocessing. The OS includes a kernel for preemptive multitasking, interrupt response, interprocess communication and a file system. Programming in VXWorks can be difficult for novices because the programmer must write the code on an as-needed basis. However, the fact that there is minimal content to save and restore means that VXWorks uses less processing power than Unix, so it can run faster.

Validity Check

Validity check is a verification performed, either through software or manually, to verify that no errors are present or that it adheres to a standard.

VFAT

Virtual File Allocation Table (VFAT) is the part of the Windows 95 and later operating system that handles long file names, which otherwise could not be handled by the original file allocation table file allocation table (VFAT) programming. A file allocation table is the means by which the operating system keeps track of where the pieces of a file are stored on a hard disk. Since the original VFAT for the Disk Operating System (DOS) assumed file names were limited to a length of eight characters, a program extension was needed to handle the longer names allowed in Windows 95. Microsoft refers to this extension as a driver since other operating systems may need to install and use it in order to access VFAT partitions written by Windows 95 and later Windows systems. The VFAT extension runs in protected mode, uses 32-bit code, and uses VCACHE for disk cache.

Virtual Memory System

Virtual Memory System is a feature of an operating system that enables a process to use a memory (RAM) address space that is independent of other processes running in the same system, and use a space that is larger than the actual amount of RAM present, temporarily relegating some contents from RAM to a disk, with little or no overhead.In a system using virtual memory, the physical memory is divided into equally-sized pages. The memory addressed by a process is also divided into logical pages of the same size. When a process references a memory address, the memory manager fetches from disk the page that includes the referenced address, and places it in a vacant physical page in the RAM. Subsequent references within that logical page are routed to the physical page. When the process references an address from another logical page, it too is fetched into a vacant physical page and becomes the target of subsequent similar references.

Virtual Organizations

Virtual organizations (VOs) are groups of people who share a data-intensive goal. To achieve their mutual goal, people within a VO choose to share their resources, creating a computer grid. This grid can give VO members direct access to each other's computers, programs, files, data, sensors and networks.

Virtuozzo

Virtuozzo is a software application for enterprise server virtualization that allows an administrator to create virtual environments on a host computer at the operating system (OS) layer.Instead of having one physical machine run multiple operating systems simultaneously, as the virtual machine model used by VMware and Microsoft Virtual Server or XEN does, Virtuozzo approaches virtualization by running a single OS kernel as its core and exporting that core functionality to various partitions on the host. Each of the partitions effectively becomes a stand-alone entity called a virtual private server (VPS).

Virtual Computing

Visual computing is computing that lets you interact with and control work by manipulating visual images either as direct work objects or as objects representing other objects that are not necessarily visual themselves. The visual images can be photographs, 3-D scenes, video sequences, block diagrams, or simple icons.

WebOS

WebOS is an LG-owned, Linux-based, smart TV operating system that is set up to allow control and access of LG Smart TV's more advanced features and connected devices through a graphical user interface (GUI).WebOS was developed by Palm as a mobile OS. The company released it in 2009 as Palm webOS. Hewlett Packard acquired palm in April 2010. The operating system was used in a number of Palm and HP smartphones before being modified for use in HP tablet PCs, such as the TouchPad. After the TouchPad failed to gain market share, HP made webOS open source. LG purchased webOS in February 2013 and modified it as a smart TV operating system.

False Enrollment

When an unauthorised person tries to register officially as a member in the biometric system is called False enrollment.

Domain

When referring to a computer network running Microsoft network operating system, a domain is a group of network resources assigned to a group of users. Domains are commonly used to divide global areas of a corporation or a corporation's departments. A domain may need to be specified when mapping a network computer or drive.When referring to an Internet address or name a domain name is the name of the web page. For example, "computerhope.com" is our domain name. When creating a domain name, make sure to keep it simple and something that is easy to remember. Additional promoting tips for websites can be found on our promotion page.

Default Password

Where a device needs a username and/or password to log in, a default password is usually provided that allows the device to be accessed during its initial setup. Manufacturers of such equipment typically use a simple password, such as admin or password on all equipment they ship, in the expectation that users will change the password during configuration.Generally, if the current password of a device is not available it may be necessary to reset the device to factory defaults to re-enable the default password it was provided with from the factory. This often resets the entire device to factory defaults and includes all configuration and data. The default username and password is usually located in the instruction manual or located on the device itself.

Win Bind

Win bind is a program that allows users in a heterogeneous network to log in using workstations that have either Unix or Windows NT operating systems. The program makes workstations using Unix functional in NT domains, by making NT appear to look like Unix to each Unix workstation.Traditionally, solutions to the NT/Unix problem have been awkward and tedious to implement, requiring duplicate accounts for both operating systems. Winbind solves this problem in an efficient manner. All passwords are stored on the domain controller. The Winbind system is intended for administrators of NT-based networks in which the addition of Unix-based workstations is contemplated.

Win32s

Win32s is a Microsoft upgrade to the Windows 3.1 and Windows for Workgroups 3.1 operating systems, which run 16-bit applications, that allows them to run some 32-bit applications. Users of Windows 3.1 or Windows for Workgroups 3.1 who did not want to install Windows 95 (which was designed for 32-bit applications) could download Win32s and install it so that certain 32-bit applications would run.The NCSA Mosaic browser was an example of a 32-bit application that would run on Windows 3.1 if you downloaded Win32s.

Win9X

Win9X is a generic term referring to a series of Microsoft Windows computer operating systems produced from 1995 to 2000, which were based on the Windows 95 kernel and its underlying foundation of MS-DOS, both of which were updated in subsequent versions.

Windows 2000

Windows 2000 (W2K) is a est commercial version of Microsoft's evolving Windows operating system. Previously called Windows NT 5.0, Microsoft emphasizes that Windows 2000 is evolutionary and "Built on NT Technology." Windows 2000 is designed to appeal to small business and professional users as well as to the more technical and larger business market for which the NT was designed.

W2K

Windows 2000 is an operating system for use on both client and server computers. It was produced by Microsoft and released to manufacturing on December 15, 1999 and launched to retail on February 17, 2000. It is the successor to Windows NT 4.

Windows 7

Windows 7 is a personal computer operating system developed by Microsoft, a version of Windows NT. Development of 7 occurred as early as 2006 under the codename "Blackcomb". Windows 7 was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time.

Windows 8

Windows 8 is a personal computer operating system developed by Microsoft as part of Windows NT family of operating systems. Development of Windows 8 started before the release of its predecessor, Windows 7, in 2009. It was announced at CES 2011, and followed by the release of three pre-release versions from September 2011 to May 2012. The operating system was released to manufacturing on August 1, 2012, and was released for general availability on October 26, 2012.

Windows 98

Windows 98 is a widely-installed product in Microsoft's evolution of the Windows operating system for personal computers. Windows 98 was code named "Memphis" during development and was, at one point, called "Windows 97" based on an earlier production schedule. Windows 98 expressed Microsoft's belief that users want and should have a global view of their potential resources and that Web technology should be an important part of the user interface. Although building Microsoft's own Web browser into the user desktop was one of the defining issues in the U.S. Justice Department's antitrust suit against Microsoft in the 1990s, Windows 98 was released as planned with its tightly integrated browser.Microsoft's Internet Explorer was designed to be considerably more with the operating system than previous versions. WithActive Desktop, users can view and access desktop objects online as well as local files and applications. The Windows 98 desktop is, in fact, a Web page with HTML links and features that exploit Microsoft's ActiveX control.

Millennium Edition

Windows Millennium Edition, or Windows ME, is a graphical operating system from Microsoft released to manufacturing on June 19, 2000 and launched on September 14, 2000. It was the last operating system released in the Windows 9x series.Windows ME was the successor to Windows 98 SE and was targeted specifically at home PC users. It included Internet Explorer 5.5, Windows Media Player 7, and the new Windows Movie Maker software, which provided basic video editing and was designed to be easy to use for home users. Microsoft also updated the graphical user interface, shell features, and Windows Explorer in Windows ME with some of those first introduced in Windows 2000, which had been released as a business-oriented operating system seven months earlier. Windows ME could be upgraded to Internet Explorer 6 SP1 (but not to SP2 (SV1) or Internet Explorer 7), Outlook Express 6 SP1 and Windows Media Player 9 Series.

Windows NT

Windows NT is a Microsoft Windows personal computer operating system designed for users and businesses needing advanced capability. NT's technology is the base for the Microsoft successor operating system, Windows 2000. Windows NT (which may originally have stood for "New Technology," although Microsoft doesn't say) is actually two products: Microsoft NT Workstation and Microsoft NT Server. The Workstation is designed for users, especially business users, who need faster performance and a system a little more fail-safe than Windows 95 and Windows 98. The Server is designed for business machines that need to provide services for network-attached computers. The Server is required, together with an Internet server such as Microsoft's Internet Information Server (IIS), for a Windows system that plans to serve Web pages.

Virtual PC

Windows Virtual PC. Windows Virtual PC is the latest Microsoft virtualization technology. You can use it to run more than one operating system at the same time on one computer, and to run many productivity applications on a virtual Windows environment, with a single click, directly from a computer running Windows 7.

X.25 Interface

X. 25 Interface is an interface between data terminal equipment and data circuit terminating equipment in data network.

Z/OS

Z/OS is the computer operating system for IBM's zSeries 900 (z900) line of large (mainframe) servers. Z/OS is a renamed and upgraded version of OS/390, which in turn evolved from the MVS operating system. IBM's renamed servers and operating systems reflect a strategy to realign its products more closely with the Internet and its own e-business initiatives.Z/OS is described as an extremely scalable and secure high-performance operating system based on the 64-bit Z/Architecture. Like its predecessor, OS/390, Z/OS lays claim to being highly reliable for running mission-critical applications. The operating system supports Web and Java-based applications.

iOS

iOS (previously iPhone OS) is a mobile operating system developed by Apple Inc. and distributed exclusively for Apple hardware. It is the operating system that powers iPhone, iPad, iPod Touch, and Apple TV.The user interface of iOS is based on the concept of direct manipulation, using multi-touch gestures. Interface control elements consist of sliders, switches, and buttons. Interaction with the OS includes gestures such as swipe, tap, pinch, and reverse pinch, all of which have specific definitions within the context of the iOS operating system and its multi-touch interface. Internal accelerometers are used by some applications to respond to shaking the device (one common result is the undo command) or rotating it in three dimensions (one common result is switching from portrait to landscape mode).

iOS 7

iOS 7 is the seventh major release of the iOS mobile operating system designed by Apple Inc as the successor to iOS 6. It was announced at the company's Worldwide Developers Conference (WWDC) on June 10, 2013, and was released on September 18, 2013. iOS 7 includes a redesigned user interface and numerous functionality changes. The design of iOS 7's new elements was led by Jony Ive, Apple's Senior Vice President of Design.As of May 2014, iOS 7 has been installed about 90% iOS Devices, unsupported included. Recently, iOS 7.1.1, which is told to be one of the serious bug-fixing and improvements update, was released on April 22, 2014.


Related study sets

ACC 2213 Dustin Holifield - Exam Ch 1-4

View Set

Baylor World Oceans Exam 1 study guide

View Set

Sociology 1301 Mid Term Chapter 10.2b

View Set

Mental Health Exam Ch. 18, 22, 24, 25 (Quizlets)

View Set

ESYS 63A & CAS 83 Chapter 5 Networking Concepts

View Set

Operations with Rational Numbers (***WITH EXPLANATIONS***)

View Set

1.3 The Python Programming Language

View Set