Computer Analysis FINAL Part 1

STUDY
PLAY
J2EE
Java
.NET
A computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
Web Services
A collection of Web and object-oriented technologies for linking web-based applications running on different hardware, software, database, or network platforms. Ex: These could link key business functions within the applications a business shares with its customers, suppliers, and business partners.
Data Warehouses
Collections of data designed to support management decision making
AI
Application of human intelligence to computers
Workflow Applications
Program that assists in the management and tracking of all the activities in a business process from start to finish
Data Validity Checks
Process of comparing data with a set of rules or values to find out if the data is correct
SDLC or SDC
Collection of phases in system development
Malware
Short for malicious software; programs that act without a user's knowledge and deliberatley alter a computer's operations
System Software
Programs that control or maintain the operations of a computer and its devices
Operating System
Set of programs that work together to coordinate all the activities among computer hardware resources
Utility
A program designed for general support of the processes of a computer
Internet Telephony
Enables people to use the internet as a medium to make telephone calls
Newsgroup
Online area in which users have written discussion about a particular subject
SFA
Software equips traveling salespeople with the tools they need
CAD
Software used in art and architecture and engineering and manufacturing to assist in precision drawing
MRP
The planning of materials, personnel and machinery
MRP II
This supports many linkages across the organization including linkages with sales and marketing via development of master production schedule
CIM
Use of computer to integrate the many different operations of the manufacturing process
Digital Signature
Data that is appended to a message, made from the message itself and the sender's private key, to ensure the authenticity of the message.
Backdoor
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
Mirroring
The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data
Striping
A data storage method that breaks up data files across all volumes of a disk set to minimize wear on a single volume
Booting
Process of starting or restarting a computer
DBMS
A software system that facilitates the creation and maintenance and use of an electronic database
QBE
DBMS feature that has a graphical user interface to assist users with retrieving data
XML
Format for sharing data that allows Web developers to create customized tags, as well as use predefined tags
Social Networking
Online interaction in the community format where people share personal information, etc.
MMS
Picture/video messaging services
GPS
A navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
SMS
Communications protocol that allows short text messages over cell phone
Cookie
Small text file that a Web server stores on a computer
Proxy
Authorized agent; authority to act for another
Zombie
Compromised computer whose owner is unaware the computer is being controlled remotely by an outsider
ERD
A database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often a relational database, and its requirements in a top-down fashion
UML
Standardized general-purpose modeling language in the field of object-oriented software engineering
Channel
Pathway through which information is distributed
Communication Device
Any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device
Use Case
Description of a system's behavior as it responds to a request that originates from outside of that system
Groupware
Software that helps groups of people work together on projects and share information over a network
Hypertext
Text displayed on a computer or other electronic device with references (hyperlinks) to other text that the reader can immediately access, machine-readable text that is not sequential but is organized so that related items of information are connected
Prototype
First model of a product
Spyware
Program placed on a computer without the user's knowledge that secretly collects information about the user