Sunteți pe pagina 1din 84

Technology Terms and Acronyms

2-BIT VIDEO ADAPTER See Video adapter

2-D, 2D Two dimensional

Two dimensional graphics images and animated images. Software options for 2-D scanning and
authoring are reviewed in the NewMedia 1995 Tool Guide, pp. 33-43. (See also Paintbrush software)

3-D, 3D Three dimensional

Three dimensional graphics images and animated images. Images in 3-D, especially 3-D photographs, are
sometimes called "holograms." Biedney (1994) provides a technical discussion and a comparison of
alternative software options for rendering 3-D images on desktop computers. Software options for 3-D
rendering on the web are reviewed in the NewMedia, May 5 1998, pp. 52-64. The NewMedia web site is
at http://www.newmedia.com Those authoring packages rated as "Awesome" include Live Picture
Reality Studio at http://www.livepicture.com (800-724-7900) and Platinum Technology VRCreator at
http://www.platinum.com (800-442-6861). There are many other options rated as "Thumbs Up" or
"Does the Job." (See also Rendering)

3DO See CD-3DO

4-BIT COMPUTER See Bus

4-BIT VIDEO ADAPTER See Video adapter

4GL Fourth Generation Language

The first three generations were developed fairly quickly, but these were painfully slow and complex for
certain kinds of tasks such as report generation and database queries. Many of the 4GLs are: database
query languages (e.g. SQL; Focus, Metafont, PostScript, RPG-II, S, IDL-PV/WAVE, Gauss, Mathematica
and data-stream languages such as AVS, APE, Iris Explorer.) See GainMomentum and Relational
database management.

16:9 TV See Wide-screen TV

24-BIT VIDEO ADAPTER See Video adapter

32-BIT COMPUTER See Bus

AB ROLL EDITING

The transfer of portions of two video sources into one master videotape. For example, one source may
be a VCR and the other source a video camera. (See also Video)
AB STYLE SWITCHES

analog switchers that are designed to be used in applications whenever multiple computer sources must
be connected to a single display device such as a monitor, projector, or LCD panel. For example, multiple
VGA or SVGA PCs may be connected to a single data projector or PCs and Macs may be connected to a
single data projector. Extron carries an extensive line of AB style switches at
http://www.extron.com/prodline.htm. See also Projection.

ABKY The Atkinson, Banker, Kaplan, and Young (1994)

Textbook entitled Management Accounting which is noteworthy in this glossary as being the first
accounting text accompanied by an Internet bulletin board. Prentice-Hall was the first publishing
company, to our knowledge, to offer an interactive two-way network dialog between adopters of
selected textbooks and the authors of those books, including a bulletin board of latest readings related
to the text, abstracts of related literature, and classroom aids. The ABKY network was the first of the
Prentice-Hall offerings to adopters and is available on listserver@watarts.uwaterloo.ca. (See also
Internet and Networks)

ACCELERATOR BOARD

A hardware electronic board (containing a microprocessor) that can be added to some computers in
order to speed up the processing in slow computers. The speed gains are confined to internal calculating
and sorting such that no apparent gains are obtained for file management and other busing activities.
(See also CPU, Board, and Bus)

ACCESS POINT (AP)

A device connected to the wired local area network that receives and transmits signals to wireless
clients; this device must also be connected to the wired LAN if connections to external networks are
required.

ACCOUNT BOOT DISK

A disk used to load DOS into the computer when it is turned on.

ACROBAT See PDF

ACTIVE VIDEO

A video AV standard and open-video architecture that Microsoft Corporation hopes will become the
popular standard to replace the Video for Windows (.avi file extension) and Quicktime (.mov file
extension) video architecture. Active video attempts to overcome common complaints with its Video for
Windows (e.g., limited throughput, poor A/V synchronization, and hardware/software incompatibilities.
Also, Active Video will have software MPEG decoding and will cross platforms with Windows, Windows
2000, and Power Macintosh. It will also have an Active Movie filter to play on the Internet via
Microsoft's Explorer browser. Whereas Video for Windows was losing out to Apple's Quicktime in
popularity, Microsoft's Active Video makes it a closer race between Apple and Microsoft for dominance
in the setting of video standards. (See also Video and MPEG)

ACTIVE X

utilities from Microsoft Corporation that combine older Object Linking and Embedding (OLE) and
Component Object Model (COM) utilities. AcitiveX is usually coded in Visual Basic and is quite confusing
since it is an outgrowth of a complex set of OLE and COM technologies. Various ActiveX applications can
be downloaded from http://www.download.com/PC/Activex/0,271,0-0,00.html. One of the most
widespread applications is to give interactive controls (e.g., ask questions, provide answers, perform
computations, push buttons, etc.) to users of Internet Explorer on the web. Therein lies a huge risk as
well when computers also have Windows Scripting Host (WSH) utilities using ActiveX. WSH files have a
file extension whs and are similar to PIF files in older 16-bit applications. Prior to WSH applications,
users could browse the web and use email without any worries about virus infections as long as security
warnings were heeded about file downloads that run in Microsoft Word, Excel, etc. That is no longer
the case if WSH utilities are installed. To avoid such risks, users can either rely upon Netscape products
for email and web browsing since Netscape products use Java rather than ActiveX software. If users
prefer Microsoft Internet Explorer for web browsing and Microsoft Outlook for email, then they may
want to consider adding security barriers to WSH risks. In Internet Explorer you can click on menu
choices (View, Internet Options, Security, Custom, Settings) and choose the option to disable "ActiveX
Controls Not Marked as Safe." Repeat the same procedure for Microsoft Outlook and Outlook Express.
You may also want to consider disabling WSH, although you thereby lose the applications relying on
WSH utilities. For virus updates and news, two good web sites are Network Associates at
http://www.nai.com/vinfo/ and Mcafee at http://www.mcafee.com/ . (Also see Visual Basic and CORBA
) For more information on the use of ActiveX in distributed network computing, see Database, ADO, and
RDS.

ADAM Animated Dissection of Anatomy for Medicine

Project that resulted in high quality computer-aided learning modules for schools of medicine. The
"inside story" of A.D.A.M. is briefly reviewed in PC World, November 1994, p. 96. See A.D.A.M. Software,
Inc. at http://www.adam.com/ for more details.

ADC Analog to Digital Converter

Converts analog sound to binary code form (digital information). (See also DAC, Modem and Video)

ADO ActiveX Data Objects; See ActiveX, Database

ADPCM Adaptive Pulse Code Modulation

ADPCM of audio waveform sampling that records the difference between samples is recorded rather
than the actual values. This increases fidelity with lower resolution than conventional PCM. (See also
Audio and PCM)
AERO

1. "Before Going to Buy High-Tech Devices, Learn the New Terms," by Walter S. Mossberg, The
Wall Street Journal, November 16, 2006; Page B1 ---
http://online.wsj.com/article/personal_technology.html
2. This is the graphical user interface that's a key part of Microsoft's Windows Vista operating
system. If you want to get the full benefit of Vista, make sure any Windows PC you buy this
season is capable of running Aero. Many are not.

AGENT

Agents are search tools that automatically seek out relevant online information based on your
specifications. Agents are also called intelligent agents, personal agents, knowbots or droids.

AGP Accelerated/Advanced Graphics Port

A bus specification by that gives 3D graphics cards faster access to main memory than the usual PCI bus.
AGP allows scattered data in system memory to be read in bursts. AGP reduces the overall cost by using
existing system memory.

AIF

One format of Macintosh audio (sound) files. (See also Audio)

AIS Automated Information System

Any equipment of an interconnected system or subsystem of equipment that is used in the automatic
acquisition, storage, manipulation, control, display, transmission, or reception of data and includes
software, firmware, and hardware.

AIX

An IBM version of the Unix operating system. It will run on PCs with 386 or higher chips and on
workstations and mainframes. (See also Unix)

ALDERSON LOOP

A special kind of infinite loop that traps the user by using a false exit condition; i.e., “Click OK” when the
“OK” function has been disabled.

ALN Asynchronous Learning Networks

ALN networks of education and training modules or courses where students learn in self-paced online
pedagogy in contrast to synchronized presentations in traditional classrooms or electronic classrooms.
Synchronous education in a scheduled sequence of classes will face serious new competition of
asynchronous education distributed on networks where students learn and communicate most any day
and most any time of day and study at their own paces. Ideally, faculty or other expert help is available
online to both help students and evaluate student work and ideas. In addition, asynchronous courses
may schedule synchronous virtual online meetings of subsets of students or entire classes of students.
Networked courses may thus be synchronous and asynchronous, although the technical learning
components are largely asynchronous.

ALPHA PROCESSOR

The ultimate top-of-the line processor for PCs that uses DEC's 21064 chip. The "Alpha-based" systems
such as the DECpc from Digital Equipment Corporation claims it is the fastest system available for
Windows 2000.

ALT

1. Alternate value keyboard key


2. Software ALTernatives to authoring systems that have full CMS utilities. In other words,
professors who do not need full CMS features may opt for alternative authoring packages such
as hypertext or hypermedia packages that do not have full CMS features. Various ALT options
are compared in Chapter 3. (See also CMS)

AOL America Online

The commercial AOL network (800-827-6364) that "remains the hottest, easiest-to-use and most
interesting of the services" according to Mossberg (1994a). AOL offers Time Magazine, the Chigago
Tribune, and other news and television network options. New services to educators online include an
American Federation of Teachers online doctoral program from the Electronic University Network and
the Forum on Technology in Education and Training (FORUM-TET). With the May 11, 1994
announcement of a merger of AOL and Redgate Communications, AOL will take an early lead over
competitors in multimedia and GUI graphics networking. (See also GUI, Networks, CompuServe,
Internet, eWorld, Interchange, and Prodigy)

AMIGA

A video computing hardware/software desktop workstation formerly manufactured and marketed by


Commodore International based on Motorola microprocessors. Amiga workstations became a widely
popular option in conjunction with NewTek's Video Toaster software for home and office videotape
productions. Amiga developed its own operating system called Amiga DOS. A major drawback is that as
a computer it does not communicate (i.e., its files are not readable) on more popular Apple, PC, and
Unix operating systems. For example, it can neither read MS-DOS files into its operating system nor
write out MS-DOS files. It is far less of a competitor for digital computers and networking than for analog
video computers such as Mac Video (see Birkmaier (1993) and Torres 1993). The new Amiga
workstations became aggressive low-priced competitors to Silicon Graphics and Sun workstations for 3D
animation rendering for broadcast quality video. The future of the Amiga is clouded by the 1994
declaration of bankruptcy and subsequent liquidation of the former Commodore International
Corporation. At this juncture it is uncertain whether another manufacturer will take over all Amiga
technologies and patents. NewTek Inc. (800-847-6111) now sells workstations for its Video Toaster
software formerly used in Amiga computers. The Amiga and NewTek workstations compete with Apple
AV and SGI competitors, but these options should not be confused with the more extensive concepts of
network video servers. (See also Video server, CD32, Apple AV, SGI, and Mac)

A combination of fierce loyalty and anti-Microsoft sentiment that would make Linux and Mac users
blush has Amiga users clinging to their aging computers. The prospect of new hardware is almost too
much for the dedicated outcasts to handle. They stick with the platform because it's stable, fast, and has
an elegant OS that could multitask in only 512KB of memory fifteen years ago, back when Microsoft still
thought DOS was the way to go.

No new hardware has been made for the Amiga since Commodore went under in 1993, with the
exception of some third-party peripherals.

"And [now] there's tremendous hatred for Microsoft," said Harv Laser, founder of the AmigaZone, the
oldest Amiga fan site online, with roots dating back to the mid-1980s. "A lot of people, myself included,
don't want to give Bill Gates one penny."

So when a mysterious German computer company materialized last week announcing new computers
based on the long-abandoned Amiga technology, there was much jubilation, along with some
skepticism, on Amiga enthusiast sites.

AMIGA DOS See Amiga

AMPS See Wireless Glossary of Terms

ANALOG See Video

ANCHOR

Synonymous with hyperlinks, anchor refers to non-linear links among documents. Or more simply put,
it's the word or phrase that can be selected to connect to another page resource.

ANCHOR COLOR

The color on a browser screen that represents the anchor tag (navigation item) colors. The reason so
many are blue is that blue is often the default color in browser software. This color can be changed to
any combination of red, green and blue. The ability to change these colors at the reader level
complicates choice of color at the authoring level.

ANIMATION

Time-phased moving graphic images that give the impression of motion such as in motion picture
cartoons or videographic movements of objects about the screen. Several frames show a progression of
movement, and thereby simulate movement. The best-buy in animation software is Autodesk 3D Studio
according to PC Computing, December 1994, p. 204. (See also 3-D, flc/fli, Morphing, and Video)
ANKLE BITER

A person who aspires to be a hacker/cracker but has very limited knowledge or skills related to AISs.
Usually associated with young teens who collect and use simple, malicious programs obtained from the
Internet.

ANNOTATIONS

Personal notes you can attach to the documents you have saved in your Web browser. The notes are
available to you whenever the document is viewed.

ANOMALY DETECTION MODEL

A model where intrusions are detected by looking for activity that is different from a user's or a system's
normal behavior.

ANSI The American National Standards Institute

ANSI sets basic standards like ASCII characters and acts as the United States' delegate to the ISO.
Standards can be ordered from ANSI by writing to the ANSI Sales Department, 1430 Broadway, New
York, NY 10018. (See also ASCII, ISO 9000, and Rich-text format)

ANTI-BLUR

Also known as antishake or image stabilization, this is a crucial feature of digital cameras today. Because
few cameras have optical viewfinders, users tend to hold them at arm's length to frame the shot on the
LCD screen. This increases the likelihood of shaking the camera. An anti-blur feature can correct that.
The best anti-blur technology is optical. Digital versions are less effective.

API Application Program Interface

Interface by which an application program accesses operating system. An API can also provide an
interface between a high level language and lower level utilities and services which were written
without consideration for the calling conventions supported by compiled languages. Netscape
Corporation and Microsoft both provide APIs called NSAPI and ISAPI that essentially extend their web
servers, and it provides developers a way to put application code actually within the web server. This
means that you don’t have to start up a separate process each time one of these applications is called.
And, since that application is always running, it can maintain connections to the database.

APPLE AV

A line of computers that was popular for low-cost analog video computing due to built video capture
hardware on the motherboard, a DAV connector, and a scan converter for analog video output to
television sets and videotape recorders. The Power Macs have replaced the Apple AVs. (See also Video
server, Dry camera, SGI, Mac, PowerPC, Mozart, Copeland, Gershwin, and Amiga)

APPLE CORPORATION See Mac


APPLE Q UICKTIME See QuickTime

ARCHIE

Derived from the word archive, Archie is a Net-based service that allows you to locate files that can be
downloaded via FTP.

ARPANET The Advanced Research Projects Agency Network

ARPANet was formed in 1969 to connect the Department of Defense (DOD) with institutions conducting
major defense contract research. The network linked super computers in major research universities
with the DOD. This is credited with being the first academic computer network and is considered the
"mother" of the Internet. In the 1980s, ARPANet split into two networks called ARPANet and MILNet (for
unclassified military research). An interconnection with the DOD Advanced Research Projects Agency
(DARPA) led to a set of networks called DARPA Internet that later became referred to as just the
Internet. (See also Internet)

ARRAY

1. A collection of discrete values arranged in a matrix


2. A collection of disk drives, generally in a specialized enclosure that are configured to operate as
a “disk array”. This collection of disks is generally formatted as a RAID or JBOD array.
3. See Jukeboxes

AI Artificial Intelligence

AI is a branch (usually called AI/Expert Systems) of computer science, mathematics, psychology, and
systems engineering that attempts to make computer "decision making" more like human decision
making and to aid or replace human decision makers with machines. Expert systems attempt to utilize
the skills, knowledge, and decision evaluation processes of human experts. For example, computers now
aid physicians in diagnosing diseases and computer-guided laser rockets virtually replace human
guidance decisions. AI failed to live up to its early expectations when it was believed that AI computers
would never fail to win at chess and language translators would soon be put out of work by computers.
However, applications of AI have been taking place and computers can now play very good chess to a
point where they occasionally beat even the grand masters.

ASCII American Standard Code for Information Interchange

ASCII computer character set (text and symbols) that enables transfer of text and data between
different computing systems. This international standard provides only very plain text without options
for font modifications. For example, files from word processors such as Microsoft Word, Word Perfect,
and Word Star often cannot be imported to hypertext or hypermedia software without conversion to
ASCII code (most word processors will change files to ASCII "text" files). The downside is that nearly all
formatting and font variations are lost in ASCII conversions such that imported ASCII text may have to be
re-formatted line by line and altered for font preferences. Very few software alternatives have "filters"
that import word processor files directly without having to convert to ASCII codes, although many are
now adding rich-text format (RTF) utilities. In hypertext authoring, choice of a hypertext software option
should include a question concerning whether "filters" are available for avoidance of ASCII text
conversions. (See alsoANSI, Internet Messaging, and Rich-text format)

ASIM Automated Security Incident Measurement

Monitors network traffic and collects information on targeted unit networks by detecting unauthorized
network activity.

ASK / ASK JEEVES See Search engine

ASP

1. Application Service Provider: Organization that provides individuals or enterprises access


over the Internet to applications and related services. This service is s sometimes referred to as
"apps-on-tap." Early applications include:
a. Remote access serving for the users of an enterprise
b. An off-premises local area network to which mobile users can be connected, with a
common file server
c. Specialized applications that would be expensive to install and maintain within your own
company or on your own computer
d. Hewlett-Packard, SAP, and Qwest have formed one of the first major alliances for
providing ASP services.
2. Active Server Pages: ASP script extensions contain either Visual Basic or Jscript code. When a
browser requests an ASP page, the Web server generates a page with HTML code and sends it
back to the browser. So ASP pages are similar to CGI scripts, but they enable Visual Basic
programmers to work with familiar tools. This is a page that performs customized "applications"
services.

ASPECT RATIO

The ratio of the horizontal to vertical size of the screen. Some monitors display rectangular pixels which
can make the picture or image appear stretched. Software that allows images to be resized and changed
with respect to aspect ratios greatly facilitates authoring. Otherwise, images have to be transported to
other software for such changes and then transported back in a cumbersome process that makes
authors grateful when aspect ratios and image sizes can be modified without such difficulties.
Macromedia Director is one of the very few hypermedia authoring systems that has a utility for
changing the scale and aspect ratios of imported bitmap pictures as well as rotating and inverting such
pictures.

ASSESSMENT

The evaluation of the efficiency and effectiveness of technology on attitudes and performance. Tidd
(1995) discusses various assessment scales such as the Computer Attitude Scale, the Computer Anxiety
Rating Scale, and the Computer Self-Efficacy Scale. Assessment is very difficult because no matter how
good the findings are in an empirical study, the relevance of those findings quickly falls away due to
constantly emerging technologies that are significantly better than older technologies used in the study.

ASYNCHRONOUS

A method of communication that places data in discrete blocks that are surrounded by framing bits.
These bits show the beginning and ending of a block of data.

ASYNCHRONOUS CONNECTION

The type of connection a modem makes over a phone line, this connection is not synchronized by a
mutual timing signal or clock.

AT See PC

ATG See Video server

ATM

1. Automatic Teller Machines for banks


2. Asynchronous Transfer Mode: The high speed ATM networks allow transmission of video,
audio, and data over local and world-wide networks. (See also Broadband, Networks, and Sonet)

ATTACKER TRAPS

Systems used to lure hackers or other information warriors into an attack so that they can be traced.

AU

The file extension for UNIX audio (sound) files. This is an audio format developed for Sun workstations
and often used to distribute sound clips via the Web. (See also Audio)

AUDIO

Voice, music, and other sounds recorded and stored in analog or digital form. The term RealAudio refers
to a helper-app (plug-in) that allows WWW users to hear audio files in real time. Options for creating
and playing digital audio Java applets are reviewed in deCarmo (1996). Options for converting written
text into audio are given in Text reading. (See also Sound board, AU, AIF, Board, Hertz, Java, MIDI,
Speech recognition, Text reading, Video/audio networking, and Wave file)

AUDIO BOARD See Sound board

AUDIO CARD See Sound board

AUDIO CONVERSION TO TEXT See Text reading

AUDIO ON THE INTERNET See Internet audio and video


AUDIO STREAMING See Web streaming

AUTHENTICATED PAYMENT PROGRAM

Visa has begun the global rollout of the Authenticated Payment Program. The Program, based on
commercial incentives, will vastly improve the payment service for e-merchants, consumers and Visa
Members by enhancing convenience, acceptance and security. Consumers will know that they can shop
safely and conveniently while preventing fraud on their card, and merchants will know they are dealing
with a legitimate cardholder anywhere in the world. The newest authentication technology, 3-D
Secure™, forms the basis for global interoperability of Authenticated Payments.

AUTHENTICATION

A process that verifies that the user has permission to access the network; often associated with the
process of joining a Bluetooth piconet or WLAN.

AUTHORING

Developing (writing of text, recording of audio, importing of video, inserting graphics, etc.) hypertext
and hypermedia learning, entertainment, and reference materials. Also see Cross-platform, Delta
Project, Hypertext, CORE, Non-core, Hypermedia, Morphing, Presentation, Titles, and Rendering)

AUTHORING SOFTWARE

This term refers to software that enables the creation of multimedia or hypertext documents and
presentations.

AUTHORWARE

Macromedia's hypermedia authoring system designed primarily for training and education
asynchronous learning courses.

AUTODESK

Company that manufactures CAD software including AutoCAD

AV, A/V Audio/Video

AVATAR

This term refers to an interactive representation of a human in a virtual reality environment; the term
was popularized by Neal Stephenson's novel "Snow Crash."

AVI Audio Video Interleaved

Digitized video files (with audio tracks) that satisfy MPC standards for Video for Windows playback. The
Media Player (mplayer.exe) file that is included in Windows operating systems runs AVI files. Most PC
video capture boards will convert analog video into AVI files. The AVI standard from Microsoft's Video
for Windows is giving way to Microsoft's newer Active Video architecture. (See also Active video, MCI,
MPC, and QuickTime)

ACCEPTABLE USE POLICY

This is a policy set up by the network administrator or other school leaders in conjunction with their
technology needs and safety concerns. This policy restricts the manner in which a network may be used,
and helps provide guidelines for teachers using technology in the classroom.

ALIAS

1. A file that points to another item, such as a program, document, folder, or disk. When an alias is
opened, the original item that the alias points to is opened. This helps in the organizing and
accessing of files. Alias is purely a Mac term. The equivalent term for Windows-based
computers is a shortcut.
2. An “A” record in DNS that provides an alternative “friendly name” alias for a given IP address.

ASCII American Standard Code for Information Interchange

This international standard contains 128 codes that correspond to all upper and lower-case Latin
characters, numbers, and punctuation marks. Each code is represented by a seven-digit binary number:
0000000 through 1111111.

APPLICATION

A software program that lets you complete a task, such as writing a paper, creating a poster, designing
an image, or viewing a Web page.

B
B2B Business to Business (See E-Business)

B2C Business to Consumer (See E-Business)

BACKDOOR/TRAPDOOR

An intentional breach in the security of a computer system left in place by designers or maintainers. A
hidden software or hardware mechanism used to circumvent security controls. A breach created
intentionally for the purpose of collecting, altering, or destroying data.

BACK-END

1. The final stage in a process or a task not apparent to the user. A common usage is in a compiler.
A compiler's back-end generates machine language and performs optimizations specific to the
machine's architecture. Generally each layer uses the layer immediately below it and provides a
service to the layer above in a "back ended" way.
2. In the third generation of network computing, web servers perform back-end database
computing where it’s controlled and managed. But third generation computing takes advantage
of the new interactive server/client interactive technology like Sun's Java andMicrosoft's
Microsoft's ActiveX/CORBA. Users on the client side want to interact in various ways such as
perform sensitivity (what-if) type of analyses.

BANDWIDTH

Capacity (range) of transmission frequencies on a network as expressed in cycles per second (hertz) or
bits per second that determines the amount of data, audio, and video that can flow over the network.
The higher the frequency, the higher the bandwidth. (See also Baseband, Broadband, Hertz, bps, and
Information highway)

BAR CODES

Alternate standards for marking products or other items for reading by laser beams. They are used
extensively for locating items on videodiscs and CDs. The LaserBarCode was the original standard for
CAV discs. This was extended to LaserBarCode2 for CLV discs. The Bar Code CD is an audio standard for
CD discs. (See also Videodisc and CD)

BASEBAND

A network cable that has only one channel for carrying data signals.

BASTION HOST

A system that has been hardened to resist attack at some critical point of entry and that is installed on a
network in such a way that it is expected to come under attack. Bastion hosts are often components of
firewalls or may be "outside" Web servers or public access systems. Generally, a bastion host is running
some form of general-purpose operating system (e.g., LNIX, VMS, WNT, etc.) rather than a ROM-based
or firmware operating system.

BAUD

A unit of speed in data transmission, or the maximum speed at which data can be sent down a channel.
Baud is often equivalent to bits per second. Named after J. M. E. Baudot (died 1903). (See also bps)

BBS Bulletin Board Systems

BBS on the Internet that provide electronic bulletin board and conferencing services. (See also CWIS and
Freenets)

BE VOCAL See Speech Recognition

BINHEX

A file conversion format that converts binary files to ASCII text files.

BIOS Basic Input Output System (See VESA)


BITNET Because It's Time NETwork

BITNET is an early network of academic and research professionals. Most users have shifted to e-mail
gateways. (See also Internet and Networks)

BLOB Binary Large Object

Can be stored in a database but normally not interpretable by a database program. Occasionally used as
a mild hacker threat when mailed. Can also be used to hide malicious logic code.

BLOG See Weblog

BLUE BOMB a.k.a. Blue Screen of Death or WinNuke

Technique for causing the Windows operating system of someone you’re communicating with to crash
or suddenly terminate. The blue bomb contains information that the operating system can't process.
This condition causes the operating system to "crash" or terminate prematurely. Its name comes from
the effect it sometimes causes on the display, as the operating system is terminating a white-on-blue
error screen.

BMP Bitmap

Bitmap graphics files that are accessible through Windows Paintbrush and most other PC graphics
software. (See also Compression, CGM, and JPEG)

BOARD

A hardware component that fits into the expansion slot of a computer unit and expands the capabilities
of the computer. A board can enable the computer to communicate with an external hardware device,
such as a CD-ROM. Alternate terms are card, expansion card, interface card, interface board. (See also
SCSI, Sound board, Video board, and PCMCIA)

BOMB A generic description for the crashing of software or hardware systems.

BOOKMARK

A user-defined place mark that enables the user to return to a particular screen or starting point after
accessing related information. Bookmarks may also be used to locate sections on related topics.

BOT

a roBot that usually is a software program that can be good (administering or policing on the network)
or bad (causing evil) on the network. Bots commonly are used in real audio chat lines. A WebBot are
"smart objects" that can be inserted into web pages to perform tasks that otherwise would require CGI
scripting or some other dynamic action programming. WebBots can help set up dynamic chat lines, time
image appearances, register and confirm actions, reference annotations, perform calculations, etc.
Some HTML editors can be used to create WebBots.
BPS bits per second

This is a measure of transfer speed that is commonly used in modems. (See also Bandwidth and Baud)

BRANCH

Any one of the paths an application can take after it evaluates a specific condition.

BREACH

1) The successful defeat of security that could result in system penetration.

2) Violation of a system’s controls that exposes information assets or system components.

BRIDGE

A device that connects different LANs so a node on one LAN can communicate with a node on another
LAN.

BROADBAND

Network transmission capacity that greatly exceeds capacity required for voice transmission over
traditional telephone cables. Broadband networks may have dedicated portions for audio, video, and
data or they may allow for capacity switching. (See also Bandwidth, Information highway, Switched
network, Networks, and ATM)

BROADCASTING See webcasting

BROWSER

A type of software that allows you to navigate information databases; examples are Netscape Navigator
and NCSA Mosaic.

BROWSERS See Web browsers

"BRUTE FORCE " PASSWORD CRACKER

Guessing the password until you figure it out, whether via manual methods or by using a program that
continually guesses passwords. Programs will try passwords like "aa," "ab," "ac," and so on until every
legal character combination has been tried.

BSP Business Service Provider (See ASP)

BUFFER UNDERRUN

A common error where the data stream being fed from the CD-R's cache buffer falls behind the laser
doing the writing. (See also CD-R)

BULLETIN BOARD See BBS, e-mail


BUS

The internal pathways (data bus, address bus, and control bus) of wires connecting various parts of a
computer. Common standards for buses were Industry Standard Architecture (ISA) 16-bit bus common
in AT-compatible PCs, Micro Channel Architecture (MCA) 32-bit buses in IBM PS/2 computers, and
Enhanced Industry Standard Architecture (EISA) 32-bit buses that are backward compatible with ISA
adapters. An "expansion bus" is an extension of the data bus and address bus that includes slots for
adapter boards. It is better than ISA and EISA for hypermedia authoring to also purchase a "local bus"
system in 32-bit or higher capacity with eight or more expansion slots for multimedia options. A local
bus connects the CPU with peripherals directly so as to improve performance speed. However, in recent
years, the VL local buses are not as good as the Peripheral Component Interconnect (PCI) brainchild of
Intel. The term "bus" can also apply to standards for connecting electronic components other than
computer components. The term CDBus or consumer electronics bus refers to a home or office
automation standard such that components connected through power lines, coaxial cable, infrared
connections, and telephone lines will be mutually compatible. (See also VL-Bus and Cache)

BUS TOPOLOGY

A physical layout of a LAN where all nodes are connected to a single cable.

BYTE

1. The number of bits used to represent a character, in most current systems a byte is defined as 8
bits.
2. Grouping of eight bits. While a bit can assume only two states, 0 and 1, a byte can store from 0
up to 255 different states. Most of the time a character is stored in a byte. Therefore, a byte can
store up to 255 different characters. The standard ASCII character set consists of 128 characters;
the additional characters generally used in PC software brings the total number of characters up
to 255.

BANDWIDTH

The amount of information that one can send through a connection, measures in bits-per-second (Bps).
A standard page of English text contains about 16,000 bits.

BCC Blind Courtesy Copy; Blind Carbon Copy

A way to send an e-mail message to more than one recipient, without the parties knowing that an
identical message was sent to others. Using the BCC is a good way to avoid the long list of recipients that
your correspondents usually have to wade through in the header of a mass-mailing. See CC.

BIT Binary DigIT

A single digit number in base-2 (either a one or a zero). This is the smallest unit of computerized data.

BROWSER
The software application that allows you to view Internet pages.

BROWSER-SAFE COLORS

Although there are millions of colors in the computer world, there are only 216 colors that are browser-
safe, or are able to be read by any Web browser. These colors will remain true no matter what platform
or browser you use, and their hexadecimal codes (numerical names for colors) are made up by using any
combination of 00 33 66 99 CC or FF.

BTW By The Way

BYTE

A set of 8 bits that means something to the computer, like a letter, number, or punctuation mark. For
example, the byte 01001000 signifies the character H. The three-letter word hat requires 3 bytes.

C
C2 Command and Control

The arrangement and deployment of personnel, equipment, communications, facilities, and procedures
employed in accomplishing a mission.

C2W Command and Control Warfare

In addition to the traditional physical destruction aspect of war, this includes the integrated use of
operations security, military deception, psychological operations, and electronic warfare to degrade or
destroy the adversary’s command and control capabilities and to protect one’s own. It is a subset of
information warfare.

CAT5E Category 5 Enhanced

A category of performance for inside wire and cable. Used in support of signaling rates of up to 100 MHz
over distances of up to 100 meters. Calls for tighter twists, electrical balancing between pairs and fewer
cable anomalies. CAT5e is intended to support 100 Base-T, ATM and Gigabit Ethernet.

CARNIVORE

A controversial FBI system to monitor e-mail and other traffic through Internet service providers.

CACHE

1. A storage area in both RAM (cache memory) and disc drives (cache controllers) that keeps
frequently accessed instructions more readily accessible. (See also Bus)
2. An object relational database software manufactured by Intersystems.

CAL
1. Client Access License: A software license that allows a single user to access a software
application at a given time. This is most common on server applications such as Databases,
Operating Systems andWeb Servers.
2. Computer Aided Learning or Computer Assisted Learning: CAL encompasses in-class lecture
aids, learning materials for computer labs, electronic books, learning materials available on
networks such as the Internet, and any other learning aids that are used with computers or
related devices such as compact disc (CD) players connected to television sets. Especially see the
concept of a shell. (See also Authoring, Computer Based Training, Course Management Systems,
Hypertext, Hypermedia, and Networks)

CALLER ID

Caller identification of the phone number of person placing a call to another number. Some states now
allow telephone owners to have visual displays of the caller ID.

CAMCORDER See Video camera and Video from digital (DV) camcorders. Also see Video.

CAMERA See Dry camera

CAPTURE

1. A NetWare utility program used to redirect output from a printer port on the workstation to a
network printer.
2. See Screen capturing. Also see Video.

CARD See Board

CAREERS See Authoring

CASE Computer Assisted Software Engineering

Software tools for automating information systems design and programming. See also Database and
MDA.

CASTANET See Webcasting

CASTINGSee Webcasting

CAT Computer Aided Teaching

That subset of CAL that entails CAT. This subset is restricted to software designed for authoring and/or
delivery of learning materials in a classroom or on line in a computer network or teleconference in
which the instructor is present and using the CAT materials as an aid to his or her teaching.

CAV Constant Angular Velocity


CAV playback in magnetic and laser discs where the disc rotates at a constant speed. Relative to CLV
variable speeds, the CAV approach results in varying data retrieval times that depend upon where the
read/write head is located relative to the disc spindle. Authors of CAV disc products try to locate
commonly accessed files closer to spindle. In videodiscs, CAV discs hold only 30 minutes of video on
each side of a 12-inch disc. However, CAV facilitates searching for individual frames. (See also CLV)

CBT Computer-Based Training

CBT in which the computer becomes a tutor for asynchronous learning that adjusts to each student's
learning pace. CBT that contains artificial intelligence for adapting training requirements and options to
different aptitudes and skills of individual students is referred to in military training as Intelligent CBT
(ICBT) to distinguish ICBT from traditional CBT that does not automatically adapt to skills and needs of
different learners. (Also see Authoring, Computer Based Training, Computer Aided Learning, Course
Management Systems, Hypertext, Hypermedia, and Networks).

CD Compact Disk

A "small" injection-molded optical disc containing digitized information that has been recorded with a
laser device and must be read on a laser device. The term "small" generally refers to a disc that is 8 cm
or 12 cm (4.72 inches) in diameter as opposed to videodiscs that typically are much larger in diameter.
Also, videodiscs usually are restricted to analog inputs from videotape whereas CDs rely on inputs from
computer tape or other digitized platforms. Although there are several types of CDs for audio, television,
and computer playback, the CD-Audio and CD-ROM discs have overwhelming shares of the market. For
example, Kim (1994) discusses why CD-ROM discs are replacing floppy discs in a "ground swell." CD-
ROM discs now hold approximately 680 Mb (i.e., 680 million characters) although compression
techniques make it possible to record CDs from even larger computer files. Usually CDs have slower
access speeds than magnetic hard drives, but speeds are improving and playback of video is now
possible on both CD-ROM and CD-I players. Although the best known CDs once were those that contain
only audio recordings, there is a rapidly growing market for various types of CDs that contain computer
files and/or files that can be read on special devices connected to television sets. (See also Bar codes,
CAV, CLV, Photo CD, Videodisc, Minidisc, CD-Stand Alone, Nintendo/SGI Cartridges, and Laserdisc)

CD BURNING See CD-R

CDMA

1. core digital multiple alignment


2. code division multiple access: CDMA is used in the United States by Verizon Wireless and Sprint
Nextel Corp., as well as in Japan, India, China and South Korea. In other markets, including
Europe, the Middle East and Africa, GSM, or Global System for Mobile communications, is the
dominant standard. Code Division Multiple Access and Time Division Multiple Access dual-mode
cellular telephones that aid in the receiving of fax and computer network data on computers
and PDAs. (See also Wireless Glossary of Terms, CDPD, Networks and PDA)
3. control digital management access
4. control density media attention
CD-PD CD Phase Change Dual (See Phase Change Dual)

CD RECORDING See CD-R and CD-DVD

CD32

The 32-bit multimedia CD system that plays on Amiga Computers from Commodore Corporation. These
CDs are used for CD movies, games, and educational material on Amiga Computers. The future of the
CD32 is clouded by the 1994 declaration of bankruptcy by Commodore Corporation. (See also Amiga)

CD-3DO

A type of compact disc designed originally to compete against CD-I and CD-MM for interactive television
set entertainment and, possibly, education. A promoter named Trip Hawkins put together an impressive
grouping of Hollywood movie studios and other developers of interactive videos using MPEG
compression. Large companies such as Panasonic, Sanyo, and others produced playback machines for TV
sets. The 3DO video games lost out completely to competitors like Matsushita, Philips, Sony, and Victor
who agreed upon a competing CD-Karaoke standard. Prospects once seemed high that this would
emerge a winner. In 1993, 3DO stock soared in price. Time Magazine, January 3, 1994, p. 76, ranked the
Panasonic CD-3DO Multiplayer as Number 1 in a listing and discussion of the top ten "best" new
products of 1993. However, in 1994, sales of 3DO players fell far short of expectations (except in Japan)
and the 3DO stock price fell from a high of over $45 per share to less than $15. (See also Games, CD-VIS,
CD-I, CD-MM, CD-R, and CD-Karaoke)

CD-AUDIO

A CD that contains only audio playback. These were invented by Philips and Sony and have become
extremely popular in the music recording industry. In order for these discs to be compatible with
consumer playback machines, most discs are recorded according to the CD-Digital Audio "Reebok"
standard.

CDBUS See Bus

CD-DVD CD-Digital Versatile Disc; CD-Digital Video Disc

DVD combines the best features of CD-ROM size and data storage with capacity for video storage
beyond that of videodiscs. DVD was so revolutionary that in it replaced VHS videotapes, CD-ROMs and
videodiscs. Unfortunately, the major vendors were divided between the DVD-RAM Type 1 and 2
standards (Panasonic, Toshiba, Hitachi) versus the DVD+RW standard (Sony, Philips, HP). DVD-RAM was
first on the market. DVD-RAM and DVD+RW discs are incompatible with each other and require
different technology capabilities to use them.

CD-ERASABLE See CD-R

CDF
1. Channel Definition Format: CDF is an XML vocabulary, or XML-based data format, that can
be used to organize a set of related Web documents into a logical hierarchy. CDF enables
developers to describe the structure and logically present various structured views of their
HTML-based sites. Individual Web pages can be described by a CDF file to specify a hierarchy of
associated Web pages.
2. Compound Document Format: A Compound Document is the W3C term for a document that
combines multiple formats, such as XHTML, SVG, SMIL and XForms. The W3C Compound
Document Formats (CDF) Working Group will specify the behaviour of some format
combinations, addressing the needs for an extensible and interoperable Web.
3. cumulative distribution function: In probability theory, the CDF completely describes the
probability distribution of a real-valued random variable X.

CD+G

Audio CD plus still-image graphics such as with Photo CD. Although these are commonly displayed on
television screens, they are less interactive than CD-I, CD-VIS, CD-R, CD-Karaoke, CD-3DO, CD-MM, and
CD-TV. For a more technical definition see http://www.soatusa.com/Cambda/NFProduc.htm .(See also
Photo CD and CD-Karaoke)

CD-I Compact Disc-Interactive

CD-I compact disc (developed by the Philips electronics conglomerate headquartered in The
Netherlands) that will play back visual as well as audio CD entertainment and learning materials in a
hypermedia format on a television set. These discs require special players for CD-Karaoke that connect
to a television much like a VCR machine. The future of CD-I and CD-MM is seriously in doubt. (See also
CD-DVD, CD-VIS, CD-R, CD-Karaoke, CD-3DO, CD-MM, CD-TV, Games, and Photo CD)

CD-KARAOKE

The video CD format that JVC and Philips initially agreed upon that eventually became the standard
Video CD format agreed upon by major vendors such as Matushita, Philips, Sony, and Victor of Japan.
Initially, vendors were trying to develop CDs for television sets that each had a different standard
analogous to having different track gauges for different railroads. The agreed upon video standard in
1993 at last makes it possible to cross platforms in CDs for television. The announcement is reported in
Videography, September 1993, p. 10. (See CD for market share data. See also CD-R, CD-I, CD-3DO, CD-
MM, Games, and Photo CD)

CD-MM

Older Sony CDs that compete with CD-VIS, CD-I, and CD-3DO discs that also play back visual as well has
audio entertainment and learning materials in a hypermedia format on a television set. These will be
replaced with newer players for CD-DVD. CD-MM discs required special players that connected to a
television much like a VCR machine. They compete with CD-I discs but are not the same size and will not
play on CD-I players. Only discs developed by Sony Corporation will run on CD-MM players. Various CD-
MM games, encyclopedias, hypermedia art books, and other consumer products are available on CD-I
discs in department stores and video stores. Whereas CD-I and CD-ROM discs may be recorded on CD-R
blanks in home recording devices, it is less likely that CD-MM discs will ever be produced outside
professional studios. Users will thus be limited by what Sony develops and promotes. In 1993, Sony
agreed to a new CD-format that is more in line with other players in the market. With the initial market
shock of CD-3DO, the future of CD-I and CD-MM is seriously in doubt. (See also CD-DVD, CD-3DO, CD-
Karaoke, CD-VIS, and CD-I)

CD-PD CD- Phase Change

CDPD Cellular Digital Packet Data

CDPD technology that facilitates more traffic on existing cellular networks. CDPD hardware is required
for sending e-mail to PDAs. (See also Wireless Glossary of Terms and PDA)

CD-PHOTO See Photo CD

CD-R / CD-RW CD-Recordable / CD-ReWritable

A term used for machines (drives) that will record CD laser discs that will read on standard CD-ROM
drives. CD "encoding" depicts the recording (burning or transfer of files) to a CD, whereas CD "decoding"
depicts the reading of those files. The term CD-Erasable in the early 1990s depicted recording of
erasable CDs that could not be read only in special drives rather than CD-ROM drives. The first CD-RW
drive on the market (in March 1997) was from RICOH for $595. In times past, CD-R depicted a
recordable CD blank disc also known as a CD-WORM disc. Recording CDs of any type is often referred to
as "burning" or "baking." A CD recorder will not necessarily record every type of CD. CD-DVD recording
requires more expensive hardware. Some record CD-Karaoke with appropriate software. Some CDs such
as CD-MM and CD-3DO cannot usually be recorded on home recorders. CD-ROM and other types of CDs
can be reproduced for less than $1 per disc. (See also CD-DVD, CD-Erasable, WORM, CD-I, CD-3DO, CD-
MM, Phase Change Dual (PD), Games, and Photo CD)

CD-R2 See CD-DVD

CD-ROM Compact Disc-Read Only Memory

CD-ROM TITLES

Books and games available on CD-ROM discs.

CD-ROM XA See CD-ROM

CD-STAND ALONE

Reference to audio/video players that stand alone in the sense of not needing a computer. The term
generally refers to set-top video boxes for network television or to CD players such as CD-3DO, CD-I, CD-
MM, CD-TV, CD-VIS, etc. (See also Set-top box and CD)
CD-STANDARDS See http://www.soatusa.com/Cambda/NFProduc.htm

CD-TV Commodore Dynamic-Total Vision

Player manufactured by Commodore Corporation to compete with CD-I, CD-MM, CD-VIS, and CD-3DO
CD players for television sets. CD-TV discs are viewed in television sets from a CD-TV player or on Amiga
video computers. They may not, however, be played on CD-ROM players. See CD for market share data.
The market share of CD-TV is so small that its future is quite uncertain and is clouded by the 1994
declaration of bankruptcy by Commodore Corporation. (See also CD-I, CD-3DO, CD-MM, CD-VIS, Games,
and Photo CD)

CD-VIS

The Memorex MD-2500 Visual Information System CD player marketed by Radio Shack that competes
with CD-MM, CD-I, and CD-3DO discs that also play back visual as well has audio interactive
entertainment on television sets. The Memorex MD-2500 requires no host computer to perform
interactive operations from a remote control. Compton's Multimedia Encyclopedia disc and some other
discs are available, but the market share of CD-VIS never became great enough to attract widespread
authorship of VIS discs. At present there are very few titles and interest in CD-VIS relative to CD-I and
CD-3DO is waning.

CD-WORM See CD-R

CERT Computer Emergency Response Team

The Defense Advanced Research Projects Agency (DARPA) used this term to describe the first computer
emergency response team, founded in December 1988 at Carnegie Mellon University's Software
Engineering Institute in Pittsburgh. The official term is now CERT/CC, which stands for CERT
Coordination Center (http://www.cert.org/).

CETA Center for Educational Technology in Accounting

CETA is no longer operational. CETA once served as a clearinghouse of information on use of technology
in accounting education and research.

CFML Cold Fusion Markup Language

Language for creation of dynamic and interactive Web pages. Along with the usual Hypertext Markup
Language (HTML) tags that determine page layout and appearance, the page creator uses CFML tags to
bring in content based on the results of a database query or user input. CMFL is a proprietary language
developed for use with ColdFusion, a product from Allaire. See also Database and HTML.

CGA See Graphics adapter

CGI Common Gateway Interface


CGI is a standard for running external programs from a World-Wide Web HTTP server. CGI specifies how
to pass dynamic components to the executing program as part of the HTTP request. For example, it will
allow answers typed into an HTML form on the client computer to be tabulated and stored in a database
on the server-side computer. Commonly, the server-side CGI program will generate some HTML which
will be passed back to the client's browser. For example, it might report to the client user that the form
is not filled out properly or report the invoice total of an order. CGI allows the returned HTML (or other
document type) to depend in any arbitrary way on the request. The CGI program can, for example,
access information in a database and format the results as HTML. CGI is not a programming language.
There are various "CGI" scripting programs. Perl is a common choice for writing CGI scripts in UNIX code.
Some HTTP servers require CGI programs to reside in a special directory, often "/cgi-bin" but better
servers provide ways to distinguish CGI programs so they can be kept in the same directories as the
HTML files to which they are related. CGI was one of the most popular UNIX-based programs/devices
that supply interfaces between browsers and servers on the Internet. In order to improve performance,
Netscape devised NSAPI and Microsoft developed the ISAPI standard which allow CGI-like tasks to run as
part of the host server process, thus avoiding the overhead of creating a new process to handle each CGI
invocation.

CGM Computer Graphics Metafile

International standard for 16-bit color graphics. CGM files cross platforms between PCs and Macs and
can be generated in most graphics, paintbrush, and draw software. (See also Graphics and Cross-
platform)

CHANNEL

1. Transmission line that can carry the sound of a separate MIDI instrument. Each MIDI port allows
up to 16 separate channels for sending or receiving data. Each channel can function as a
separate instrument in an ensemble, each using its own patch and responding independently to
continuous controllers. (See also MIDI).
2. Channel Definition Format (CDF)
3. Channel Casting/Surfing = See Webcasting
4. Another name for frequencies, especially within a defined band.

CHAT LINES / CHAT ROOMS

real time internet conversations (written or oral) that transpire in real (synchronous) time as opposed to
conferencing (e.g., message board posting and topic classification." There are many sources for free chat
software downloads. One such source is at http://www.chat.yahoo.com/. Comparisons with bulletin
boards, email groups, chat rooms, etc. are made in the e-mail definition of this glossary. See e-mail
definition, IRC, Listserv, USENet, teleconferencing, videoconferencing, webcasting, andtelephony.

CHERNOBYL PACKET

An information packet that introduces a broadcast storm and network meltdown.


CHIPPING See Security

CHRP Common Hardware Reference Platform

Architecture in processors for Power PCs. This term has been replaced by "PowerPC Reference Platform"
and is IBM's open system standard intended to ensure compatibility among PowerPC-based systems
built by different companies.

CIAC Computer Incident Advisory Capability

Plans for establishing this team were prepared before November 1988. It was founded as a second-
incident response team in the spring of 1989. Its constituencies are sites within the DOE.

CIAO Critical Infrastructure Assurance Office

Created in May 1998 to assist in the coordination of the U.S. Federal Government's initiatives on critical
infrastructure protection (http://www.ciao.gov/).

CISC Complex Instruction Set Computing

Architecture for chipsets such as the Intel 386, 486, and Pentium and the Motorola 680x0 family in Mac
computers. These were the most popular processors until the RISC alternatives entered the market. As
of the Intel 686 and later, the CISC architecture has waned in favor of RISC.

CISCO IP/TV

A comprehensive network video-streaming system for businesses, schools and governmental


organizations. Using network-efficient multicast technology it delivers TV-quality live video
programming.

CLICK FRAUD

The act of purposely clicking ad listings without intending to buy from the advertiser. In online
advertising, click fraud involves sending fraudulent clicks to Cost Per Click (CPC) advertisers. The clicks
can be artificially generated via automated technology methods (such as hitbots) or via manual clicking
for the purpose of debiting CPC advertiser accounts or increasing CPC network partner/affiliate
commission revenues.

CLIENT

A computer that has access to services over a computer network. The computer providing the services is
a server. Note: in an X-11 environment, the meanings of client and server are reversed. See Database.

CLIENT -SERVER

A corporate computing trend that is gradually replacing the old way of conducting business--large
mainframe computers connected to terminals. In the new arrangement, company software applications
run on a midrange computer (the server) that is connected over networks to PCs (clients). (See also
Server)

CLIENT -SERVER ARCHITECTURE

An information-passing scheme that works as follows: a client program, such as Mosaic, sends a request
to a server. The server takes the request, disconnects from the client and processes the request. When
the request is processed, the server reconnects to the client program and the information is transferred
to the client. This architecture differs from traditional Internet databases where the client connects to
the server and runs the program from the remote site. Note: in an X-11 environment, the meanings of
client and server are reversed.

CLIPBOARD

A holding device that contains the most recently copied or cut text or image such that contents of the
clipboard can be pasted one or more times into other parts of the document at hand or other
documents. It is usually possible to cross between different software options such as between Windows
programs.

CLIPPER CHIP

The Clipper Chip is a cryptographic device promoted by the U.S. government. Its purported advantage is
that it provides a standard for securing private voice communication. With Clipper, however, the
government has the opportunity to obtain decryption keys that are held in escrow by two government
agencies. Although the Clipper proposal requires legal authorization to obtain these keys, the history of
illegal domestic surveillance by Federal agencies makes the existence of this "back-door" decryption
channel a cause for concern. (Also see security)

CLOCK SPEED

The speed of the processor is measured with the clock frequency. The processor consistently works
internally at the same clock frequency. The early IBM PC had a clock frequency of 4.77 MHz
(Megahertz). Clock speeds now are generally measured in Ghz (Gigahertz).

CLV Constant Linear Velocity

Playback in magnetic and laser discs where the disc rotates at varying speeds. Relative to CAV constant
speeds, the CAV approach results in constant data retrieval times that do not depend upon where the
read/write head is located relative to the disc spindle. CLV videodiscs hold up to 60 minutes of video per
side of a 12-inch disc. However, CLV discs cannot be searched for individual frames as effectively as CAV
discs. (See also CAV)

CMC Computer Mediated Communication

A very broad term that encompasses chat lines, virtual communities, and other forms of
communication. See IRC, Collaboration, and Virtual. See also Groupware.
CMS

1. Content Mangement System: Software system for the management of digital content such as
documents, images or other files. (See also Document Management System)
2. Course Management Systems: That subset of CAL that entails CMS. Chief among theattributes
of CMS are utilities that allow instructors to keep student records, call up examination templates
and questions, administer examinations, track student learning in course modules, and
randomly access lecture and case materials. (See also Runtime, Hypertext and Hypermedia)

COAX Coaxial cable

A cable consisting of a single metal wire surrounded by insulation, which is itself surrounded by a
braided or foil outer conductor.

CODEC Encode/Decode

Hardware and software for compressing and decompressing large volumes of data. The term generally
applies to multimedia.

COLLABRASHARE

Collaboration groupware from Netscape Corporation. Netscape Collabra provides enterprise group
discussions based on Internet standards, letting the groups share and track information efficiently.
Collabra makes it easy to share information and create a knowledge base that people can access at any
time.

COLLABORATION

A joint effort that network technology has facilitated with email, FTP, and more advanced means of
sharing ideas, documents, and data. Writing has become more of a collaborative effort since the dawn
of the WWW. The WWW takes authors beyond the telephone by enabling them to speak to one another
(audio), see one another (videoconferencing), and visualize documents and data. See also CMC,
CollabraShare, IRC, Videoconferencing, Groupware, and Virtual.

COLLAR

A derivative instruments investing term where an investor puts a "collar" around investment risk, usually
by selling a put option (an option to purchase) and purchasing a call option (an option to sell) around an
investment. Amgen and Oracle sold put warrants on their own common stock and then used the
proceeds to purchase calls on the same stock. This process is called a "costless collar" and is used to
express a bullish view of the stock by management.

COMPACT DISC See CD

COMPANDING See dbx


COMPRESSION

1. Algorithms for shrinking the storage space required for files stored on discs. In those instances,
nothing is usually sacrificed in the compression, although files may have to be decompressed
before they can be utilized later on.
2. The storage of graphics or video files in such a way that they can be stored and/or processed
more efficiently on computers. Something (e.g., color depth, resolution, image sharpness, etc.)
is usually lost in the process. (See also GIF, JPEG, Indeo, and MPEG)

COMPUTER

An electronic system that can store and process information under program control.

COMPUTER BASED TRAINING See CBT

COMPUTER VIRUS See Virus

COMSEC Communications Security

Measures taken to deny unauthorized persons information derived from the telecommunications of an
entity involved in national or organizational security and to ensure the authenticity of such
telecommunications. Communications security includes crypto security, transmission security, emission
security, and physical security of communications security material and information.

CONCURRENCY CONTROL

Concurrency control deals with the issues involved with allowing multiple people simultaneous access to
shared entities, be they objects, data records, or some other representation. It is very important to have
a recovery system such that if bad data is entered in a shared environment the databases can be
recovered. It is important understand transactions, which are collections of actions that potentially
modify records. More than one record may be involved, especially in double entry bookkeeping. An
example of a transaction is a transfer of funds between two bank accounts. Concurrency controls are
related to transactions controls, but they are not the same since transactions controls apply to single-
person as well as multiple-person access. Transactions controls are intended to assure that updated
transactions are allowable and orderly. Transactions in relational databases are often commands in a
two phase commit system. A "two phase commit" transactions control is the process by which a
relational database ensures that distributed transactions are performed in an orderly manner. In this
system, transactions may be terminated by either committing them or rolling them back. Also see
Database.

CONFIGURATION

This is a general-purpose computer term that can refer to the way you have your computer set up. It is
also used to describe the total combination of hardware components that make up a computer system
and the software settings that allow various hardware components of a computer system to
communicate with one another.

CONFIGURE

The act of changing software or hardware actions by changing the settings.

CONSOLE

A character-based interface to an operating system. Windows NT uses the Command Prompt tool as the
console

CONTROL CODE

Special nonprinting codes that cause electronic equipment to perform specific actions.

CONVENTIONAL MEMORY See RAM

COOKIES

Web Browsers set aside a small amount of space on the user's hard drive to record detected
preferences. Cookies perform storage on the client side that might otherwise have to be stored in a
generic-state or database server on the server side. Cookies can be used to collect information for
consumer profile databases. Browsers can be set to refuse cookies. Many times when you browse a
website, your browser checks to see if you have any pre-defined preferences (cookie) for that server if
you do it sends the cookie to the server along with the request for a web page. Sometimes cookies are
used to collect items of an order as the user places things in a shopping cart and has not yet submitted
the full order. A cookie allows WWW customers to fill their orders (shopping carts) and then be billed
based upon the cookie payment information. Cookies retain information about a users browsing
patterns at a web site. This creates all sorts of privacy risks since information obtained from cookies by
vendors or any persons who put cookies on your computer might be disclosed in ways that are harmful
to you. Browsers will let you refuse cookies with a set up that warns you when someone is about to
deliver a cookie, but this really disrupts Web surfing and may block you from gaining access to many
sites. It is probably better to accept cookies for a current session and then dispose of unwanted cookies
as soon as possible so that cookie senders do not obtain repeated access to your private information.
(See also Finger, Security, and World Wide Web)

COPELAND

The name given to Apple's troubled operating OS 8 System 8.0 for Mac and PowerPC computers.

COPERNICUS

The codename under which the Navy reformulated its command and control structures in the age of
Information Warfare. Copernicus enables those in the field to get the information they need to make
tactical decisions.
COPROCESSOR

Electronic component that relieves the microprocessor of some important tasks. Increased performance
can often be achieved through the use of coprocessors. For example, a math coprocessor performs
many of the math operations outside the microprocessor. A coprocessor may also speed graphics
computations.

COPYING See VCR, CD-R, Wide-screen TV, and SCMS

CORBA Common Object Request Broker Architecture

CORBA evolved out of TCP/IP. Both CORBA and OLE/DCOM are designed to distribute objects or
assembly of appplications from discreet, self-contained components. Both are appealing in the fast
growing technology of "object middleware." Object middleware has corporate appeal due to the ability
to provide highly abstracted object-oriented programming interfaces. Microsoft added new terminology
in this area. see Distributed Network Computing.

CORE LEAK

A programming error that causes the program to fail to reclaim discarded memory, leading to eventual
collapse due to memory exhaustion. Not as critical a problem as it was before the advent of virtual
memory.

CPU Central Processing Unit

Hardware that encompasses a computer's RAM, processing, and control circuitry, including the
arithmetic-logic (ALU) unit. Both the ALU and the control units are wholly contained on the
microprocessing chip whereas the primary storage is on the mother board or the expansion bus. For test
comparisons of Intel Pentium, PowerPC, and Mips R4X00, and DEC Alpha, see Montgomery (1994).
Montgomery ranks Pentium and Mips highest in terms of file servers. He ranks Pentium higher on most
graphics and business applications criteria except for price since PowerPC is a cheaper alternative. There
are, of course, other considerations. The PowerPC currently performs better than Pentium in terms of
temperature, speed, and price, but all these advantages are expected to disappear when Intel
introduces its upgrade versions of the Pentium. The PowerPC, however, will not perform as well using
DOS and Windows operating systems. (See also Alpha processor, Pentium, MIPS, PowerPC, CISC, RISC,
Operating system, and Motherboard)

CRACKER

Like a hacker, a cracker is someone who breaks into secure systems. A cracker’s primary aim is to break
into secure systems, while hackers want to gain knowledge about computer systems and use this
knowledge for pranks or to cause damage. The terms "hack" and "crack" are often used
interchangeably.

CRM Customer Relationship Management


CRM system based upon information technology. Central to CRM are databases customer relationships
in sufficient detail so that management, salespeople, people providing service, and perhaps the
customer directly could access information, match customer needs with product plans and offerings,
remind customers of service requirements, know what other products a customer had purchased, and
so forth. See Database and SAP.

CROSS-PLATFORM

The ability of a software package or an electronic "book" to run in more than one operating system such
as Icon Author and TIE crossings between Windows, Unix, and DOS operating systems. Rosenthal (1995)
compares hypermedia authoring software having cross-platform capabilities. Some will only play back
on cross-platforms but cannot be used to author in the platform of choice. Apple Media Kit and ScriptX
authoring will run in DOS, Mac, Unix, and other operating systems, but neither option can be used for
authoring in DOS or Windows.

CRYPTOLOPE

The combination of "cryptographic" security encryption with "envelopes" of a domain. Cryptolopes


enable publishers on the WWW to securely distribute content with copyright protections and security
over payments for copyrighted material usage.

CSRC Computer Security Response Center

Another acronym for CERTs.

CWIS Campus Wide Information System

Bulletin board services that can be accessed on the Internet. These are available on most college
campuses and provide bulletin board information on campus calendars, e-mail directories on the
campus, employment opportunities, campus events, course catalogs, etc.

CYBERMALL

A term commonly used to describe an electronic site shared by a number of commercial interests.

CYBERSPACE

A term coined by William Gibson in his fantasy novel "Neuromancer" to refer to a near-future computer
network where users mentally travel through matrices of data. The term is now used to describe the
Internet and the other computer networks.

CYBERWAR

Actions taken to achieve information superiority over an adversary—to deny, exploit, corrupt, or destroy
an enemy’s information while protecting your own. See Information Warfare.
CYBERIAN WINTER

The theoretical aftermath of an all-out cyberwar, characterized by “cold” disabled computer systems
and businesses.

CLIENT / SERVER

A term denoting the technology relationship between two types of computers, the client (normally your
Mac or PC) and the server (a computer that stores and delivers information or files to you). When
surfing the Internet, you are the client, and the pages you are reading come from the server, such as the
www4teachers server.

CC Courtesy Copy; Carbon Copy

A way to send an e-mail message to a person other than the main recipient or recipients. The CC'ed
party can see that they are not the main recipient of the letter.

COMMAND KEY

A key on Mac keyboards only that is used to access commands through the keyboard rather than the
menus. commands are commonly shortcuts.

CTRL control key

A key used to access commands through the keyboard rather than the menus. CTRL commands are
commonly shortcuts.

CONTROL PANEL

A window you can open to adjust various aspects of your computer, such as the volume, fonts, desktop
background, mouse speed, and clock.

CPU Central Processing Unit

The CPU is the hardware that most people consider the "brain" of the computer. It takes instructions
from software, makes calculations, and helps run the show!

D
DAB/DAR Digital Audio Broadcast and Digital Audio Radio

Broadcasting in digital formats via satellites and fiber optic cable. (See also Networks and DCC)

DAC Digital Analog Conversion

Hardware that converts digital signals into analog form. (See also ADC, Scan converter, Modem, and
Video)

DAEMON Disk And Execution MONitor


Pronounced "demon" or "damon," daemon is a process that runs in the background and performs a
specified operation at predefined times or in response to certain events. Sometimes referred to as
System Agents and services. Typical daemon processes include print spoolers, e-mail handlers, and other
programs that perform administrative tasks for the operating system. The term comes from Greek
mythology, where daemons were guardian spirits.

Programs that are not initially executed but lie in wait for certain contingencies to occur. Daemons are
extremely common in UNIX operating systems. The slightly revised form Demon refers to the program
itself whereas Daemon refers to an operating system process. See also HTTPd.

DARK-SIDE HACKER

A malicious hacker.

DARWIN See Operating System

DAT Digital Audio Tape

Tape used for recording computer disc files onto a cheap backup and storage medium. DAT tapes are
contained in small cartridges that are the cheapest means of storing vast amounts of data. For example,
a cartridge smaller than the palm of an adult hand can hold two or more gigabyes of data. Popular
manufacturers of DAT backup tape drives include Sony and Hewlett-Packard.

DATABASE

A computer file or system of data organized in records and fields for fast retrieval and ease of updating.
Also see CFML, Concurrency Control, DTP, GainMomentum, Grid Computing, JDBC, MDA, Middleware,
Relational database management, SAP, Resource Description Framework, and 4GL.

Object-oriented database systems are quite different from the extremely relational database systems
(e.g., MS Access, FoxPro, DBase, etc) that are extremely popular today.

A critical feature unique to the OO approach is that an "object" package includes both the attributes of
the object and the methods or procedures that pertain to that object. The methods might dictate how
the object's attributes are modified in response to different events, or how the object causes changes in
the attributes of other objects. Thus, a key difference between the database models described earlier
and the OO approach is that OO models combine data (attributes) and procedures (methods) in one
package, i.e., the "object." This feature of OO models is referred to as encapsulation - attributes and
methods are represented together in one capsule. Another powerful feature of OO models is
inheritance. OO models depict the real world as a hierarchy of object classes, with lower level classes
inheriting attributes and methods from higher level classes. Thus, lower level object classes do not need
to redefine attributes and methods that are common to the higher level object classes in the class
hierarchy.
An OO model contains all details needed for implementation and object-oriented DBMS are powerful
enough to represent all the information contained in the model. However, most organizations that have
made heavy investments in RDBMS see little need to migrate to OO environments. While OO modeling
methods are available, there is no consensus regarding the "best" method to use. Finally, although
OODBMS are beginning to become commercially available, they have not gained much acceptance in
the marketplace probably due to their relatively high cost and poor performance in comparison to
RDBMS. Gemstone, ObjectStore, VBase, and O2 are some examples of OODBMS.

DATA DISCMAN See Games

DATA-DRIVEN ATTACK

An attack form that is encoded in data that appears harmless and is executed by a user or a process,
often behind a firewall.

DATA MINING

Data Mining is the discovery and modeling of hidden patterns in large amounts of data. It is usually case-
based, in that the parameters can be statistically modeled. Technically, data mining is statistical analysis,
but on a complex scale. IBM invented data mining and holds some of the patents. One of the goals of
data mining is to allow the user to discover patterns and build models automatically, without knowing
exactly what she's looking for.

The models are both descriptive and prospective. They address why things happened and what is likely
to happen next. A user can pose "what-if" questions to a data-mining model that cannot be queried
directly from the database or warehouse. Examples include: "What is the expected lifetime value of
every customer account," "Which customers are likely to open a second account," or "Will this customer
cancel our service if we introduce higher fees?" (Questions like this assume a Natural Language front
end.) Text mining is a subset of data mining which applies the same rules and logic, but is directed at
gleaning information from large bodies of text rather than numerical data. The information technologies
associated with making data mining a functional process are neural networks, genetic algorithms, fuzzy
logic, and rule induction. Data mining is becoming more prevalent as businesses, governments and
organizations look for ways to leverage the existing mountains of information they already have.

DATATEL see database

DATA WAREHOUSE

A database, frequently very large, that can access all of a company's information. While the warehouse
can be distributed over several computers and may contain several databases and information from
numerous sources in a variety of formats, it should be accessible through a server. Thus, access to the
warehouse is transparent to the user, who can use simple commands to retrieve and analyze all the
information. The data warehouse also contains data about how the warehouse is organized, where the
information can be found, and any connections between data. Frequently used for decision support
within an organization, the data warehouse also allows the organization to organize its data, coordinate
updates, and see relationships between information gathered from different parts of the organization.

DAV Digital Audio Video

DAV connectors such as those found on the Apple AV that allow the flow of digitized video to bypass the
computer's main bus. (See also Bus)

DB2 see database

DBA

1. Dominant battlefield awareness

Applies to own system advantage in terms of sensor, reconnaissance, and intelligence data in a
particular “battle space.”

2. Database Administrator

Person who is responsible for the administration of a database system

DBK Dominant battlefield knowledge

The ability to recognize and understand what the user sees and to act on it decisively.

DBX

The "companding" compression and expansion of audio signals to reduce noise distortions of stereo
television broadcasts. (See also MTS/SAP)

DCC Digital Compact Cassette

Format that improves sound quality relative to traditional analog formats of audio cassettes. Analog
cassettes can be played on DCC tape decks such that the purchase of a DCC tape deck does not preclude
listening to analog tapes.

DCOM Distributed Component Object Model

DDOS Distributed Denial of Service Attack (see DOS)

DEBUGGING

Executing a program, one statement at a time, to identify and fix errors.

DEC ALPHA See Alpha processor

DECRYPT
To unscramble data that has been encrypted. Decryption is the act of unscrambling data so that it can
be understood.

DELTA PROJECT

A European Economic Community (EEC) funded project of the Commission of European Communities.
With a budget of over $100 million, this is probably the world's largest attempt to apply modern
technologies to distance training and education. Partners in the project include major universities,
telecommunications companies, and business firms of all sizes across the EEC. Collis and de Vries (1994)
report on 27 major projects with over 300 sub-projects in network education and multimedia
development.

DERF

The act of exploiting a terminal unwittingly left logged on.

DES Data Encryption Standard

The Data Encryption Standard was the first official U.S. government cipher intended for commercial use.
DES is the most widely used cryptosystem in the world.

DESKTOP SEARCH

Search utilities that search for words, phrases, characters, pictures, and even multimedia files on your
personal computer. Popular alternatives are from Google (GDS) , Yahoo, and Microsoft. See also OCR.

DEVICE DRIVER

Software that controls the communications between a computer program and various hardware devices
such as the sound card, the video card, the CD-ROM player, the MIDI, disk drives, etc.

DHTML Dynamic HTML (See HTML)

DIAL-UP CONNECTION

This is a connection from your computer to a host computer over standard telephone lines using a
phone modem.

DIGITAL SIGNATURE

A digital guarantee that a file has not been altered, as if it were carried in an “electronically sealed”
envelope. The "signature" is an encrypted digest (one-way hash function) of the text message,
executable, or other file.

DIP SWITCH Dual In-line Package


Case on a computer board that contains small switches for configuring hardware components. A given
board can be configured in a way that is compatible with the entire system of other peripheral
hardware. (See also Board)

DIRECT CONNECTION

A permanent connection between your computer system and the Internet. This is sometimes referred to
as a leased-line connection because the line is leased from the telephone company.

DIRECT SEQUENCE SPREAD SPECTRUM (DSSS)

A spread spectrum technique that uses a "chip" (redundant bit pattern for each bit to be transmitted) to
encode the signal to ensure more reliable delivery; the technology employed in IEEE 802.11
implementations.

DIRECT TV See DSS

DISABILITIES PRODUCTS

A variety of hardware and software options for users having certain types of disabilities. See also Speech
recognition and Text reading

DISK-AT-ONCE RECORDING

Single-session recording mode, where all the data to be included on a disk is written in one pass. You
must write in this mode to have your CD mass-produced by a stamping house. (See also CD-R)

DISTRIBUTED NETWORK COMPUTING

Distributed Network Computing where a network computer can perform computing functions in
another computer on the same network. In the early days of the Internet, Telnet could be used for
remote computing. In modern times, the trend is toward database access and computing among
networked computers. Development tools for data enabled frameworks are starting to emerge. New
standards are also starting to emerge like CORBA's IIOP, Sun's RMI, amd Microsoft's DCOM. RMI is part
of the Java programming language library which enables a Java program running on one computer to
access the objects and methods of another Java program running on a different computer. Some
vendors are also having their own proprietary extensions as well. IIOP is built upon CORBA technology.
DCOM is Microsoft Corporation's standard for distrubuted network computing. See Database, ADO,
and RDS .

DLL Dynamic Link Library

Bundle of coded subroutines that can be shared with different programs on the system.

DNS Domain Name Server


DNS refers to a database of Internet names and addresses which translates the names to the official
Internet Protocol numbers and vice versa.

DOCKING STATION

A platform that can be attached to portable computers giving them a variety of added options such as
stereo speakers, a CD-ROM player, an SCSI port, and bays for additional components such as data tape
drives and floppy disc drives. The numbers and types of options vary among vendors. Some docking
stations are small and portable. Others are large and relatively heavy, especially those docking stations
that provide notebook computers with added expansion slots for boards such as video capture boards.

DOCUMENT

When used in reference to the World Wide Web, a document is any file containing text, media or
hyperlinks that can be transferred from an HTTP server to a client program.

DOM Document Object Model (See HTML)

DOCUMENT TYPE DEFINITION See DTD

DOCUMENT WINDOW

This is the Web browser's scrollable window in which HTML documents can be viewed.

DNR / DOLBY-NR Dolby-Noise Reduction

There are various levels of quality, which in rank order from lowest to highest quality include Dolby B
(good), Dolby C (better), Dolby S (best), and Dolby SR (professional). DSB Dolby surround digital systems
are even higher quality systems used in movie soundtracks and videodiscs. HDTV will also include DSD. A
sound enforcement system first used in the movie THX 1138 by George Lucas is now known as the THX
system. The THX-licensed speakers use a professional Dolby process for commercial and home theater
systems. (See also HX-Pro)

DOMINO see Lotus Notes

DOS

1) Denial of Service Attack - Action against a host resulting in the target's inability to perform
service(s) for other users, particularly over a network.
2) Disk Operating System
a. The family of closely related operating systems which dominated the IBM PC compatible
market between 1981 and 1995.
b. MS DOS Microsoft Disk Operating System introduced by Microsoft Corporation in 1981.
It became the operating system standard for PCs around the world and served as the
foundation of several versions of the Microsoft Windows operating system. The ability
to operate from DOS on low-capacity PCs having only 640K of random access memory
(RAM) has become the limitation in modern times for DOS to remain a standard for
higher speed and higher RAM computers. DOS has not been upgraded for newer 32-bit
processors and has faded as 32-bit, 64-bit, and higher capacity PCs spread across world
markets. (See also Operating system, Windows, Windows 2000, and OS/2)

DOWNLOAD

To transfer to your computer a copy of a file that resides on another computer. For details see Modem.

DRIVER

A memory resident program usually used to control a hardware device.

DRY CAMERA

A digital camera that records images directly to a disk or other medium that can be read directly into
computers without having to develop imaging film with "wet" developer chemicals. Various vendors
have relatively inexpensive dry cameras whereas these same vendors like Nikon, Kodak, Logitech, and
Dycam have superior and very expensive models that have much higher imaging quality. Apple,
Stormware, and other vendors have only the lower priced modes. Photographs can be scanned readers
that plug into the back PCs, although the later versions will also plug directly into a PCMCIA slot for
downloading into a computer. An example of the latter option is Nikon's Coolpix model. (See also Video
camera and Video from digital (DV) camcorders)

DSD See Dolby-NR

DSL Digital Subscriber Line

DSL technology for transmitting data up to 50 times faster than present analog modem and ISDN
alternatives. Telephone companies are hoping that DSL service will keep telephone lines competitive
with cable modems and other competitive alternatives to present telephone transmission services.
Telephone companies are considering two dominant DSL technologies: Asymmetric Digital Subscriber
Line (ADSL, ASL) and High Rate Digital Subscriber Line (HDSL). ADSL technology will deliver higher
downstream speeds (6 Mbps) than upstream speeds (640 kbps). ADSL or ASL differs from DSL in that
there is an asymmetry in transmission speeds into (download) and out of (upload) your computer. In
ASL, the upload speeds are much slower than the download speeds. However, ASL connections are
being pushed heavily into the huge home market, whereas DLS is being touted for the business firm
market.

DSP Digital Signal Processing

Manipulating an audio signal digitally to create various possible effects at the output. Often refers to
artificially generated surround effects derived from and applied to two-channel sources. Also, chips that
are common in cards added to expansion slots in computers, especially for adding multimedia to
computers. (See also Sound board and Multimedia Video Processor)
DSS Digital Satellite Systems

DSS such as those introduced by Hughes Communications and USSB United States Satellite Broadcasting,
Inc. The term for commercial satellite dishes used for this system is DirectTV which will compete actively
with full-service cable TV. Since 120 channel capacity is expected on small 18-inch home satellite dishes,
it becomes much more feasible to bring remote education into homes, schools, and offices. (See also
Teleconference)

DSU Digital Services Unit

DSU replaces the modem in synchronous connections to the Internet.

DTD Document Type Definition

A document type definition (DTD) that follows the rules of the Standard Generalized Markup Language
(SGML). A DTD is a specification that accompanies a document and identifies what the funny little codes
(or markup) are that separate paragraphs, identify topic headings, and so forth and how each is to be
processed. For example, the most common DTD in web documents is HTML. DTD is vital to extracting
SGML and XML from web documents and databases that are not marked up with SGML or XML. See
wrapper.

DTP

1. DeskTop Publishing
2. Distributed Transaction Processing

DUAL BOOT

A computer that is configured to boot, or to start up, in two different operating systems, depending on
which the user chooses at any one time. The most important example of this currently is on Apple's
Macintosh computers, which now can be set up to run either the Mac operating system or Microsoft
Windows using Apple's free dual-boot software, called Boot Camp.

DUAL CORE

A type of microprocessor -- the brain that runs a computer -- which packs the equivalent of two
processors into a single chip. The best known dual-core processors in consumer computers are Intel's
Core 2 Duo and Core Duo, but rival AMD also makes them. They are a good bet for most people.

DUMPSTER DIVING

Spying the old-fashioned way: rummaging through garbage or recycling cans for information such as
invoices, passwords, and account numbers.

DV Digital Video (See Video camera and Video from digital (DV) camcorders)

DVD See CD-DVD


DVD-RAM See CD-DVD

DVI

1. Digital Video Interactive: Video compression hardware and standard developed by the
Moving Pictures Experts Group (MPEG) before MPEG video boards hit the market. DVI is a form
of compressed full-motion video for computer file storage. Full-motion video at over 30 frames
per second takes up so much digitized storage that video must be compressed to make it more
useful in hypermedia. DVI was an early compression option that required special and somewhat
expensive DVI hardware installation inside the computer of both authors and users (readers) of
hypermedia materials. New technology allows for video compression without such expensive
hardware. MPEG hardware for video coded compression and decompression seems to be taking
over the recent market share lead over DVI largely due to quality of the MPEG and options
emerging after DVI. (See also Video for Windows, QuickTime, Compression, Video, Indeo, MCI,
Ultimedia Video, and MPEG)
2. Digital Visual Interface: Connection standard developed by Intel for connecting computers to
digital monitors such as flat panels and DLP projectors. A consumer electronics version, not
necessarily compatible with the PC version, is used as a connection standard for HDTV tuners
and displays. Transmits an uncompressed digital signal to the display. The latter version uses
HDCP copy protection to prevent unauthorized copying.

DESKTOP

The background behind all your windows, menus, and dialog boxes: your virtual desk. You can change
the look of your desktop by applying different properties to it through your control panel.

DOMAIN NAME

The unique friendly textual address name for an Internet site. Each domain name is associated with an
Internet Protocol (IP) address number, which is translated by a Domain Name System (DNS).

DOWNLOAD

To save a file onto your computer from another source, like the Internet. People often download files,
such as free-ware, share-ware, for installations, and sounds, movie clips, text files, or news streams onto
their computer for viewing or listening.

DNS Domain Name System

This is a service that stores, translates, and retrieves the numerical address equivalents of familiar host
names that you use everyday. Each host name corresponds to a numerical address required by standard
Internet protocol that the DNS retrieves in order to allow you to remember addresses with names, not
numbers. DNS entries are housed on numerous servers worldwide.

E
EASTER EGG
An undocumented function hidden in a program that may or may not be sanctioned by management.
Easter Eggs are secret "goodies" found by word-of-mouth or by accident. See also Trapdoor.

E-BUSINESS

A term that is easily confused with E-Commerce. E-Business may be an umbrella term that refers to any
type of business transaction on the Internet. Some writers, however, may use the term in a more
restricted context such as a business-to-business (B2B) transaction as opposed to a business-to-
consumer (B2C) transaction. For example, a B2B transaction might be a business firm's online banking
transaction. E-Commerce refers more to the B2C context where a firm sells goods on the internet and
makes collections via some payment scheme such as online credit card transactions. See ASP.

ECCH European Case Clearing House

The ECCH now offers an on line network server for international cases. Although none of the cases are,
as yet, in hypertext or hypermedia format, it is a useful feature to have cases available for file transfer
on the Internet. (See also HBSP)

ECHELON

A multinational surveillance network centered in Sugar Grove, WV. It has been called the greatest spy
network in history. ECHELON intercepts all forms of electronic communications—phone, fax, and e-
mail—and automatically searches for predetermined keywords. Member countries are the United
States, Britain, Australia, and New Zealand.

ECHO

Return response between a host server and a terminal computer. It is generally coded to be "on" or
"off." If echo is "on" (full duplex), the host will send back every character the user types in. If echo is
"off" (half duplex), the host will not send back the characters, and the user's local computer or terminal
writes each character to the screen directly. This can be confusing to new users if the state of the echo
parameter is different on the host computer and the user's computer.

EDI Electronic Data Interchange or Electronic Data Invoicing.

The EDI system allows linked computers to conduct business transactions such as ordering and invoicing
over telecommunications networks. The technology dates back to the 1970s when the first attempts at
setting uniform standards commenced. However, EDI in telecommunications never lived up to its
expectations largely due to high fees of Value Added Network (VAN) providers that, prior to the Internet
usage, charged both monthly and transaction fees. In the late 1990s, EDI became less costly (as low as
10% of former VAN costs) when business applications exploded on the Internet and in intranets. The
ultimate goal of EDI is to have standardized computer forms for business transactions and networking of
nearly all aspects business transactions. This would greatly simplify use of networks to conduct business,
accounting for transactions, and auditing.
EDGAR Electronic Data Gathering, Analysis, and Retrieval

Database of the Securities and Exchange Commission (SEC). EDGAR contains the digitized versions of
many corporate filings, including 10Q quarterly and 10K annual financial reports of registered
corporations and mutual funds.

EDUCOM

A group of cooperating colleges and universities dedicated to advancing computer and network
communications technology in education. EDUCOM coordinates newsletters and other publishing
efforts along with conferences and related activities.

EDUQ UEST

A revitalized system of multimedia hardware and software packages from IBM Corporation. The system
primarily targets the K-12 education system in the United States. The new system is designed to be more
powerful with networked PCs and a variety of Plug and Play adapters for auxiliary components.

EISA See Bus

ELECTRONIC CLASSROOM

A large or small classroom filled with multimedia devices. The usual context is that of a lecture hall
where the instructor has fingertip control of multimedia aids such as computer images, video tape
images, videodisc images, audio, CD-ROM players, Internet connections, cameras that transfer images to
large screens, etc. Some electronic classrooms have student response hardware such as response pads
or even computer terminals. Usually, however, the electronic classroom is not viewed in the same
context as a computer/multimedia lab or a language lab. In a lab setting the student usually works alone
or in small teams in front of computers. In an electronic classroom, the instructor is usually focusing the
attention of the entire class upon the same learning media. However, labs can be equipped with central
screens so that combinations of instructor-focused materials can be combined with individual learning.
Large lecture halls can also be equipped with students who combine large lectures with "studio
classroom learning."

ELECTRONIC JAMMING See Security

E-MAIL / EMAIL

Electronic mail transmitted between millions of users connected on networks worldwide. Messages are
exchanged instantaneously, usually at zero marginal cost to users, thereby saving greatly on national or
international telephone and express mail fees. Messages may be stored in computer files and processed
at a user's convenience. (See also Internet, Internet Messaging, Instant Messaging, SLIP, and USENet)

E-MAIL BOMBS
Code that when executed sends many messages to the same address(es) for the purpose of using up
disk space and/or overloading the e-mail or Web server.

EMP/T BOMB

Electromagnetic pulse transformer, which disables or destroys an electronic network. Similar to a HERF
Gun but many times more powerful.

EMULATION See Native

ENCRYPTION

1. Altering data to make it unreadable unless you know how to decrypt it.
2. Cryptographic conversion of data into ciphertext in order to prevent any but the intended
recipient from reading that data. There are many types of data encryption, and they are the
basis of network security. Common types include Data Encryption Standard and public-key
encryption.

ENCRYPTION CRACKING

Breaking the encryption that is used to protect the contents of e-mail, fax, and voice transmissions, as
well as software or other content.

E NETWORK SOFTWARE See IBM

ENTERPRISE

A synonym for business, mainly big business. The enterprise computing market is typically the
corporations that buy hardware and software and use them to run their operations.

EPG Electronic Program Guide

System that displays scheduled shows on screen such as TV Guide On Screen.

ERP Enterprise Resource Planning See SAP

ERIC Educational Resources Information Center

Documents database that contains a variety of resources to educators, especially teachers in K-12
schools. (See also Telnet)

ESH Electronic Super Highway See Information highway

ETHERNET

A widely used interface data processing scheme for managing data transfers on network. An ethernet
board (card) must be put into the computer for network connections. It can network a wide variety of
computers, it is not proprietary, and components are widely available from many commercial sources.
ETHERNET SNIFFING

Listening with software to the Ethernet interface for packets that interest the user. When the software
sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting
packet is one that contains words like "login" or "password."

EVALUATION See Assessment

EVENT HANDLER

A special type of function that executes automatically when a particular user-enabled, system-enabled,
or code-generated event occurs.

E WORLD

A commercial world-wide network launched by Apple Corporation to compete with Interchange,


CompuServe, Prodigy, and America Online. Key features of eWorld include its ease of use and graphical
interface. The major limitation is that its use is restricted to Mac operating systems. A second drawback
according to Mossberg (1994c) is that eWorld uses older technology revised from America Online. (See
also Networks, CompuServe, Internet, Prodigy, Interchange, and America Online)

EXECUTION FLOW

The section of code that the application executes, depending on branching decisions.

EXPANDED MEMORY See RAM

EXPANSION BOARD /SLOT See Board

EXPERT SYSTEMS See Artificial Intelligence

EXPLORER

1. Internet Explorer: See Web browsers


2. Windows Explorer: File management application included as part of Microsoft Windows.
Windows Explorer shares common software libraries with Internet Explorer.
3. Explorer: Microsoft Windows graphical shell

EXPRESS AUTHOR

A front end to Asymetrix Multimedia ToolBook that performs automatic scripting to both speed
authoring and aid ToolBook novices. The software was developed at the IAT. This front end is mainly an
aid to beginning authors who do not plan to become ToolBook experts. (See also Authoring and IAT)

EXTENDED MEMORY See RAM

E XSTENSIBLE S TYLE LANGUAGE See XSL, HTML


EXTERNAL VIEWER

A program used for presenting graphics, audio and video files. Programs that allow the viewing of GIF
and JPEG files and the hearing of AU files fall into this category.

EXTRACTOR See Wrapper

EXTRANET

A term depicting networks on the Internet dedicated to business communications between a vendor
and its suppliers, customers, or dealers. The term originated from network pioneer Robert Metcalfe.
Using the common format of the World Wide Web, companies, their suppliers, customers, or suppliers
exchange data electronically rather than sending paper-based information back and forth. It is viewed as
an Internet alternative to Electronic Data Interchange comprised of dedicated lines and software rather
than the Internet. Extranets are a lower cost alternative to EDI. See EDI, Internet, and Intranet.

ETHERNET

A common method of networking computers in a Local Area Network (LAN). Ethernet can handle from
10,000,000-100,000,000 bits-per-second (or 10-100 megabits-per-second) and can be used with almost
any kind of computer.

F
FAQ Frequently Asked Questions

A common feature on the Internet, FAQs are files of answers to commonly asked questions. Read FAQs
before wasting electrons asking obvious questions. Saves you from receiving flames.

FC-AL See SSA

FAX

Devices for transmitting and receiving photocopies over telephone lines. Text and graphics may be
printed on paper or stored in computer files. Text is received as a graphic and must be translated by
specialized software to be stored as text files for word processors. (See also PDA)

FDMA Frequency Division Multiple Access

Refers to the use of multiple carriers within the same transponder where each uplink has been assigned
frequency slot and bandwidth. This is usually employed in conjunction with Frequency Modulation.

FIBER OPTIC

Cable that carries light pulses instead of electrical current. A cable comprised of a multitude of fine glass
fibers has much more capacity than the previously popular copper cable. (See also Information highway,
Networks, and Sonet)
FIBER OPTICS

A technology in which light is used to transport information from one point to another. More
specifically, fiber optics are thin filaments of glass through which light beams are transmitted over long
distances carrying enormous amounts of data.

FIERO ONLINE

The Princeton University online art class on Fiero del Fancesca, an Italian 15th century Renaissance
artist. This is an Iris Silicon Graphics high-end database library with scanned images of frescoes and a
three-dimensional walking tour on computer for students. Students also construct their own models.
This is considered one of the most successful CAL applications in universities.

FILE ATTRIBUTES

Access rights attached to each file.

FILE SERVER

A computer running a network operating system that enables other computers to access its files.

FILE TRANSFER

The ability to transfer text, graphics, software, spreadsheets, audio files, and video files over vast
distances on computer networks such as the Internet. For example, the entire works of Shakespeare can
be downloaded from Dartmouth College and government documents may be transferred from the
Library of Congress. (See also FTP, Internet, and SLIP)

FINGER

An Internet protocol used to find out more information about an Internet user. (See also Cookies)

FINGER GATEWAY

A source listing of graphics images that have been placed around the world on the Internet. (See also
Mosaic)

FIREWALL

1. A form of Web security that stands between a private network and the Internet to prevent
unwanted traffic from passing either way. Some firewalls have proxy functions built in. Often
the distinction between a firewall and a proxy is blurry. True firewalls generally support packet-
filtering, proprietary application filtering, and some proxy functions.
2. A firewall is a hardware or software solution to enforce security policies. In the physical security
analogy, a firewall is equivalent to a door lock on a perimeter door or on a door to a room inside
of the building - it permits only authorized users such as those with a key or access card to
enter. A firewall has built-in filters that can disallow unauthorized or potentially dangerous
material from entering the system. It also logs attempted intrusions.

FIRE W IRE

Serial bus hardware specification IEEE 1394. See Bus

FISHBOWL

To contain, isolate, and monitor an unauthorized user to gain information about that user.

FLASH

The name of a software product from Macromedia that is intended for more efficient Internet delivery
of graphics and other media.

FLASH MEMORY

An erasable memory used as an alternative to hard disk and laser disc storage. The term is used most
often in conjunction with PCMCIA cards. (See also Hard drive, RAM and PCMCIA)

FLASH PLAYER

A small-capacity digital music player, like Apple's iPod Nano and Shuffle. These players use flash
memory, a type of memory chip that behaves like a small hard disk to store music, photos and videos.
Larger players, such as the full-size iPod and the new Microsoft Zune, use actual hard disks, like the ones
in computers. Flash memory is also what's inside the small memory cards used in digital cameras.

FLATBED See Scanner

FLC / FLI

File extensions for animations conforming to Autodesk formats. With appropriate changes in the win.ini
file, most PC computers will play back these animations without having Autodesk software installed.
(See also Animation)

FLOODING PROGRAMS

Code that when executed will bombard the selected system with requests in an effort to slow down or
shut down the system.

FM SYNTHESIS

The least-expensive method for producing synthesized sound. FM synthesis uses one sine wave to
control the frequency of another. Most synthesizers built into PC audio boards and sound modules use
more sophisticated synthesis techniques for greater accuracy in reproducing the sounds of different
instruments.
FMV Full Motion Video

Video depicting at 30 or more fps. (See also Video)

FORK BOMB

A disruptive piece of code directed toward a UNIX-based system which replicates, or “forks,” until it
eventually “explodes” and devours operating system processes, causing the system to lock up.

FOURTH GENERATION DATABASE LANGUAGES See 4GL

FPS frames per second

Typical "full-motion" video in television and movies is 30 fps, but in digitized video such high fps rates
are not yet common. Apple's QuickTime and Microsoft's Video for Windows typically run at 12 to 18 fps.
(See also Video)

FREENETS

Bulletin board services that are funded by individuals and organizations dedicated to making
information freely available on networks. They operate much like public libraries through the National
Public Telecommunication Network (NPTN.). Users can connect through modems or through Internet
terminals.

FREQUENTLY HOPPING SPREAD SPECTRUM (FHSS)

A spread spectrum technique that uses a range of frequencies and changes frequencies during the
transmission; the technology employed in HomeRF (SWAP) implementations.

FTP File Transfer Protocol

Protocol used for downloading files on the Internet. Listings of ftp sites are available from Mosaic. (See
also File transfer, Remote login, Mosaic, and Protocol)

FULL-DUPLEX

In full duplex communication, the terminal transmits and receives data simultaneously.

FUNCTION

An instruction to the application that performs operations or returns a value, or both.

FULLERENES

Fullerenes, those soccer ball–shaped carbon molecules also known as “buckyballs,” have generated
outsized expectations ever since their discovery in 1985. Scientists think they could eventually be used
in chemical sensors, fuel cells, drug delivery, cancer medicines, and smart materials. Yet while
commercial demand for fullerenes is gradually emerging, so are fears that these molecules, which
measure only a few billionths of a meter across, pose serious health and environmental hazards.

FUNDING

The raising of funds for hardware, software, and development.

FINDER

The Finder is the default open application on a Macintosh, and it's represented by a little, purple, happy
face icon in the top right-hand corner of the screen. Most people think of it as the desktop, however, or
as the utility that lets you navigate quickly among open programs. When you click on the Finder, you can
designate which of your open applications will be the active one.

FIREWALL

Hardware and/or software that separates a Local Area Network (LAN) into two or more parts for
security purposes.

FTP File Transfer Protocol

A set of rules that allows two computers to "talk" to one another while transferring files from one to
another. This is the protocol used when you transfer a file from one computer to another across the
Internet. Many Internet sites have publicly accessible repositories of information that can be obtained
using FTP, by logging in using the account name "anonymous." These sites are called "anonymous ftp
servers."

G
GAMES

Interactive entertainment programs that can be played back on computers or special playing machines
connected to television sets. Some games are sold on compact discs that can either be played in CD-
ROM drives connected to computers or CD players that are proprietary. (See also MUDs)

GATEWAYS

Gateways are connectors between two or more dissimilar networks that facilitate communication in
such instances. Gateways have their own processors to perform both protocol and bandwidth
conversions. Gateways between the Outernet and the Internet translate different protocols such as e-
mail protocols of different networks into Internet protocols. (See also Internet, Mosaic, Finger Gateway,
Whois Gateway, and Outernets)

GDI Graphics Device Interface

GDIs link graphics hardware devices with the CPU. Much of the power of graphics processing depends
upon whether the system has 8-bit, 16-bit, 32-bit, or 64-bit graphics power. Limitations of customer
hardware often detract from the ability to develop operating systems to take full advantage of graphics
power. For example, when developing Windows Chicago for 32-bit processors, Microsoft Corporation
had to leave 16-bit GDI capacity on its 32-bit operating system.

GDS See Desktop Search

GERSHWIN

The name given to Apple's planned operating system 9.0 for Mac and PowerPC computers. New
features were to include advanced speech recognition, interfacing that adapts to individual users, and
new microkernal architecture. However, the System 9.0 has been abandoned in favor of an entirely new
operating system called Rhapsody. (See also Mac, PowerPC, Operating system, Copeland, Gershwin, and
Rhapsody)

GIF Graphics Interchange Format

An efficient method of storing graphics developed for CompuServe in the early 1980s. GIF files take up a
small amount of disk space and can be transmitted quickly over phone lines. GIFs can be viewed on any
computer platform and are best for illustrations, cartoons, logos, or similar non-photographic graphics.
This is an extremely popular standard because it is so widely read in graphics software alternatives and
is commonly used as the "GIF" file extensions of images carried on bulletin boards and transported
across networks. A major drawback is the loss of color depth in GIF compression. Animated GIFs are
popular at web sites. Click here for some links to Animated Gif Construction. (See also JPEG)

GINA

A graphical interface (formerly known as GUIDE) for the Internet. This is a low-cost option for graphically
interfacing with e-mail, bulletin boards, databases, library catalogs, news services, and conferencing.

GNUTELLA / NAPSTER See Napster / Gnutella

GOPHER

A menu-driven and user-friendly system of Internet sites that facilitate searching and browsing of
documents and files around the world. Gopher has been largely overtaken by more modern web
browsers (see Web browsers). Gopher was the first system that communicated easily between different
types of operating systems and computer installations. The term "Gopher" arises from the fact that the
system originated with graduate students at the site of the "Golden Gophers" at the University of
Minnesota. Gopher became very popular on the Internet, but it is now largely replaced. (See also GINA,
Mosaic, Internet, and SLIP)

GOPHERSPACE

A term used to describe the entire gopher network.

GPS Global Positioning System


Hardware that facilitates navigation via satellites. There are now versions for automobiles that have LCD
screens to show maps and present vehicle location.

GRANTS See Funding

GRAPHICS

Computer images that contain pictures, drawings, and other forms of imagery other than text. Popular
file extensions for graphics files are bmp, pcx, tif, and cgm. See CGM for a discussion of graphics that will
cross platforms between Mac and PC computers. (See also 2-D, 3-D, SVG, and Paintbrush software)

GRAPHICS ADAPTER

The hardware inside a computer that enables the computer to display graphics on the screen. In
contrast to Mac computers, PCs have a larger variety of graphics adapters that complicate compatibility
between different PCs. In the early days, the PC standard was the Color Graphics Adapter (CGA) that, by
today's standards, is low resolution and low in color combinations. This was replaced by EGA Enhanced
Graphics Adapter and then VGA Video Graphics Array having a standard 480 lines vertical and 640 pixels
horizontal resolution. Today Super VGA extensions (to at least 600 lines vertical and 800 pixels
horizontal) are the choice among most PC users for whom graphics displays are important. Be aware,
however, that there are different Super VGA resolutions and monitor options that can affect the
compatibility of graphics images among different PCs. Also be aware that LCD panels are not able to
handle the higher resolutions of cathode ray monitors; therefore, images may not look as good during
class delivery as they did on a monitor during the authoring process.

GRID COMPUTING

Grid computing (or the use of a computational grid) is applying the resources of many computers in a
network to a single problem at the same time - usually to a scientific or technical problem that requires
a great number of computer processing cycles or access to large amounts of data. A well-known
example of grid computing in the public domain is the ongoing SETI (Search for Extraterrestrial
Intelligence) @Home project in which thousands of people are sharing the unused processor cycles of
their PCs in the vast search for signs of "rational" signals from outer space. According to John Patrick,
IBM's vice-president for Internet strategies, "the next big thing will be grid computing." Grid computing
requires the use of software that can divide and farm out pieces of a program to as many as several
thousand computers. Grid computing can be thought of as distributed and large-scale cluster computing
and as a form of network-distributed parallel processing. It can be confined to the network of computer
workstations within a corporation or it can be a public collaboration (in which case it is also sometimes
known as a form of peer-to-peer computing). A number of corporations, professional groups, university
consortiums, and other groups have developed or are developing frameworks and software for
managing grid computing projects. The European Community (EU) is sponsoring a project for a grid for
high-energy physics, earth observation, and biology applications. In the United States, the National
Technology Grid is prototyping a computational grid for infrastructure and an access grid for people. Sun
Microsystems offers Grid Engine software. Described as a distributed resource management (DRM) tool,
Grid Engine allows engineers at companies like Sony and Synopsys to pool the computer cycles on up to
80 workstations at a time. (At this scale, grid computing can be seen as a more extreme case of load
balancing.) Grid computing appears to be a promising trend for three reaons: (1) its ability to make
more cost-effective use of a given amount of computer resources, (2) as a way to solve problems that
can't be approached without an enormous amount of computing power, and (3) because it suggests that
the resources of many computers can be cooperatively and perhaps synergistically harnessed and
managed as a collaboration toward a common objective. In some grid computing systems, the
computers may collaborate rather than being directed by one managing computer. One likely area for
the use of grid computing will be pervasive computing applications - those in which computers pervade
our environment without our necessary awareness.

GROUP

A collection of users.

GROUP RIGHTS

Rights given to a collection of users.

GROUPWARE

Software applications that facilitate shared work over long distances on documents and information.
Groupware supports person-to-person collaborations.

GSM Global System for Mobile communications

The most widely used digital mobile phone system and the de facto wireless telephone standard in
Europe. Originally defined as a pan-European open standard for a digital cellular telephone network to
support voice, data, text messaging and cross-border roaming. GSM is now one of the world's main 2G
digital wireless standards

GUI Graphical User Interface

GUI refers to a software front-end meant to provide an attractive and easy to use interface between a
computer user and application, which historically gave rise to the icon-based operating system of Apple
Corporation computers. The GUI concept actually had its origins in Xerox Corporation's Palo Alto
Research Center (PARC) in the early 1970s. However, it was Apple Corporation who eventually exploited
the technology that is now the fundamental basis of Mac, Windows, and other GUI operating systems
that perform commands based upon bit-mapped graphics icons. This paved the way for object-oriented
systems of the 1990s. (See also Mac and Windows) A decade of the revolution in GUI and hypermedia
Mac computing is celebrated in a book by Levy (1994) that is given an extensive review in Time
Magazine, January 31, 1994, pp. 93-94. (See also America Online)

H
HACKER
A person who breaks into systems for which he or she has no authorization. Hackers penetrate
information systems to browse, steal, or modify data; deny access or service to others; or cause damage
or harm in some other way.

HACKING RUN

An extended hack session that goes beyond normal working times, especially if more than 12 hours
long.

HALF DUPLEX

In half duplex communication, the terminal transmits and receives data in separate, consecutive
operations.

HANDICAPPED See Disabilities

HANDSHAKING

A set of commands recognized by the sending and receiving stations that control the flow of data
transmission.

HARD DRIVE

A "hard disc" file storage disc (usually a magnetic disc) on a computer that has higher storage capacity
and faster access time (e.g., under 20 ms) than slower devices such as floppy disc drives and optical disc
(e.g., CD-ROM) drives. This is not the same as memory or random access memory (RAM). Usually the
term "hard drive" refers to rigid discs coated with magnetic material. Fast hard discs are compared and
reviewed in NewMedia, November 1994, p. 103. (See also RAM, Flash memory, RAID, and CD)

HAWTHORNE EFFECTS

Refer to distortions and possibly non-sustaining effects of a treatment just because its newness captures
more of an individual's attentiveness. In double blind studies of the impact of technologies upon
learning, Hawthorne effects are particularly troublesome. Students are more apt to be more attentive to
newer technologies simply because they are "new" curiosities. Positive results on learning impacts may
not be sustaining, however, after the novelty and curiosity factors decline with repeated use of the
technology over time.

HDD hard disk drive; hard drive

A device for storing information in a fixed location within your computer. The equivalent of a filing
cabinet in an office, the hard drive is used for storing programs and documents that are not being used.

HDMI High-Definition Multimedia Interface


Describes a new kind of cable for hooking high-definition TVs to things like cable boxes and DVD players.
It provides a high-quality digital feed, and combines both audio and video signals via a single connection.
When shopping for an HDTV, make sure it has HDMI connectors on the back.

HDSPA High Speed Downlink Packet Access

A high-speed cellphone network being deployed in the U.S. by Cingular Wireless intended to compete
with successful high-speed networks from Verizon and Sprint called EVDO, or Evolution Data Only. All of
these new networks allow Internet access at about the speed of a slow home DSL line, which is a big
boost for cellphones. If you care about email and Internet access on a phone, and you are using Cingular,
get a phone that can handle HSDPA.

HDTV High-Definition TV

Digitized formats that will eventually replace present analog formats in 16:9 wide-screen TV. The
Japanese version of HDTV is not truly the fully-digitized version broadcast system intended for the
United States by the end of the year 2000. (See also Intercast,IDTV, Wide-screen TV, Video, and
Videodisc-digital)

HELPER APP See Plug-in

HERF High Energy Radio Frequency Gun

HERF guns shoot a high-power radio signal at an electronic target and knock it out of commission.

HERTZ

Unit of measure that equals a frequency of one cycle per second. (See also Bandwidth, bps, Kilohertz,
and megahertz)

HEXADECIMAL CODE

Also called Hex codes. In HTML, colors are identified by a six-character string of numbers and letters
(0,1,2,3,4,5,6,A,B,C,D,E,F) derived from base-16 mathematics. The codes are used to convert RGB (red,
red, and red) values into something HTML can understand. Pure red would be #FF0000.

HI-8

A professional-quality format for high-end video cameras. Whereas the standard consumer resolution
8mm camera records 250 lines, the Hi-8 versions record 400 lines or more so as to produce more detail
in video images.

HL Hyper-Learning using hypertext, hypermedia, and computer networks.

Authors like Perelman (1993) tend to use the term in the context of learning from servers on an
information highway such as the Internet after multimedia transmissions become more common. (See
also JITT and Hypermedia)
HOLOGRAM See 3-D

HOME PAGE

The document displayed when you first open your Web browser. Home Page can also refer to the first
document you come to at a Web site.

HONEYPOT

A decoy server set up either inside or outside a firewall to lure and trick an intruder. It is designed to
make hackers/crackers think they are on a valid production system. It is used to catch and stop an
intruder or detect and track intruder techniques and test system vulnerability.

HOP See Internet Messaging

HOST

A computer acting as an information or communications server. The name given to any computer
directly connected to the Internet. Host computers are usually associated with running computer
networks, online services, or bulletin board systems. A host computer on the Internet could be anything
from a mainframe to a personal computer. See also DNS.

HOT SPOTS

1. Buttons or other programmable objects that can activate objects or linked events.
2. Wireless Hot Spot is a geographic location where wireless network connectivity is available.

HOTLINK See Hyperlink

HOTLISTS

Lists of frequently used Web locations and URLs (Uniform Resource Locators).

HOTWORD See Hyperlink

HP/UX Hewlett-Packard Unix operating system

Hewlett-Packard also uses other operating systems such as its own proprietary MPE and NEXTStep. (See
also Operating system and Unix)

HTML HyperText Markup Language

HTML is the language used to tag various parts of a Web document so browsing software will know how
to display that document's links, text, graphics and attached media. Your are viewing an HTML
document at this moment. The popular HTML and the emerging HTML are subsets of the GML text
scripting conceived in1969 IBM researchers depicting Generalized Markup Languages (and not-so-
coincidentally the lead researchers were named Goldfarb, Mosher, and Lorie). Between 1978 and 1987,
Dr. Charles F. Goldfarb led the team that developed the SGML Standard GML that is became
International Standard ISO 8879. In 1990, Tim Berners-Lee led a team of particle physicists that
invented the World Wide Web using a very small part of SGML that became the widely known and used
scripting language known as Hypertext Markup Language (HTML). SGML is tremendously powerful but
inefficient and complex. HTML is marvelously simple but not very powerful. In 1996, Jon Bosak of Sun
Microsystems to spearheaded the development of the XML standard to lend power, efficiency, cross-
platform standards, and simplicity to the networking of databases on the Internet. At the time of this
writing, the world is converging upon an important standard known as RDF (Resource Description
Framework) rooted in XML that will be the biggest thing to hit the Internet since HTML hit the Internet
in 1991.

Efforts are underway to create standards for a new Dynamic HTML (DHTML) in a Document Object
Model (DOM). However, progress is slow and will take years according to "A Tangled Web of Standards,"
in Internet Week, September 27, 1997, p. 1. For more on the WWW Consortium dealing with such
issues, see http://www.w3.org/. A problem with DHTML is that it is inefficient and requires too many
scripts to perform simple tasks. Moving beyond DHTML is Extensible Markup Language (XML)
originating with Goldfarb and Bosak for putting tags on web pages to facilitate more efficient web
searches. The XML term is misnamed in the sense that it is not technically a markup language. XML is
becoming popular for business operations and web sites. For a review of XML see
http://www.trinity.edu/rjensen/xmlrdf.htm. See wrapper.

HTML DOCUMENT

A document with a HyperText Markup Language DTD. It must be read using HTTP protocol. See HTML.

HTTP HyperText Transfer Protocol

HTTP is used to link and transfer hypertext documents. The secured socket extension is HTTPs for
HyperText Transfer Protocol Secure (has SSL underneath HTTP. Another extension is HTTPd standing for
Hypertext transfer protocol Daemon. This protocol can be used to customize web searches and handle
response forms on web documents.

HUB

The point of a network where circuits are connected. Also, a switching node. In Local Area Networks, a
hub is the core of a star as in ARCNET, StarLAN, Ethernet and Token Ring. Hub hardware can be either
active or passive. Wiring hubs are useful for their centralized management capabilities and for their
ability to isolate nodes from disruption.

HYPERCARD See Hypermedia, Hypertext, Resource Description Framework, World Wide Web, and
Authoring

HYPERFACTS

Hypertext and/or hypermedia versions of fact books. The best known of these are encyclopedia CD-
ROMs such as the Compton and Grolier options. But there are many other widely selling hyperfact
books such as The Way Things Work by David Macauley, a CD-ROM book that has sold over 3 million
copies to readers interested in guides and graphics of important inventions. This and several other
innovative CD-ROM fact books ranging from sign language to art collections are referenced by Rigler
(1994). (See Hyperfiction, Hypertext, Hypermedia, and Authoring)

HYPERFICTION

Hypertext and/or hypermedia versions of fiction, usually on CD-ROM discs. The main feature of
hyperfiction is that alternative navigations through the plot are possible. In some cases the reader
creatively determines certain outcomes. For a review of some of the popular alternatives see Svoboda
(1994). Rigler (1994) reports that electronic book offerings at the American Booksellers Association
annual meetings seem to be doubling in size annually. She discusses some of the more popular options
such as Stowaway by Stephen Biesty. (See also Hyperfacts, Hypertext, Hypermedia, and Authoring)

HYPERIONICS HYPERCAM See Video

HYPERLINK

Interactive navigation to other parts of a document, other documents, and other WWW sites. (See also
Hypertext and Hypermedia)

HYPERMEDIA

Hypertext with added features for audio and video features. Hypermedia may also entail touchscreen or
remote control capabilities such that users can navigate by touching the computer screen or remote
control devices. Eventually hypermedia will entail other senses such as smell. The key to hypermedia is
random access that allows lightning-fast non linear navigation based upon reader choice or other reader
actions such as responses to questions. The term "multimedia" is not totally synonymous with
"hypermedia," because multimedia may not entail hypertext authoring. (See also Hypertext,
Multimedia, and Timeline presentation) Training workshops are offered by the IAT (Institute for
Advanced Technology) (919-405-1900). The IAT also broadcasts training courses via satellite KU and C
bands and distributes tapes of those broadcasts. An extensive listing of training programs is provided in
Appendix 6. For an introduction to hypermedia, see Jensen (1993). Further details on ToolBook and
other authoring options are given in Chapter 3. (Also see Asynchronous Learning Networks, CD,
Hyperfiction, Authoring, RAID, and CMS)

HYPERTEXT

Pages of computer text that are authored in software allowing for non linear navigation based upon
button controls, hotwords, or other controls that make sequencing of pages virtually irrelevant.
Hypertext authoring packages typically differ from word processing packages that are intended primarily
for preparing text for hard copy printing. Hypertext software may have options to print particular pages,
but the intent is for computer use rather than printing. The key to hypertext is random access that
allows lightning-fast non linear navigation based upon reader choice or other reader actions such as
responses to questions. (See also Hypermedia and Timeline presentation.) Popular software terminology
for hypertext includes HyperCard "stacks," Authorware "network icons," and ToolBook "books." Career
opportunities in authoring multimedia are discussed by Jerram (1994a). Courses, trade shows, and
literature on learning how to author multimedia works are summarized by Lindstrom (1994). The IAT
also broadcasts training courses via satellite KU and C bands and distributes tapes of those broadcasts
for persons unable to view/record them live. An extensive listing of training programs is provided in
Appendix 6. For an introduction to hypermedia, see Jensen (1993). See Chapter 3 for hypertext and/or
hypermedia authoring software options. (Also see Asynchronous Learning Networks, Authoring and
CMS)

HX-PRO

An audio tape monitoring system marketed by Dolby that facilitates recording of analog audio tapes at
higher decibel levels to reduce tape hiss. This is a feature available on high-end tape decks. (See also
Dolby-NR)

HZ See Hertz

I
IAB Internet Architecture Board

The IAB is the council that makes decisions about Internet standards. (See also IETF .)

IAT Institute for Academic Technology

This was initially an IBM-funded support center for PC hypertext/hypermedia developers in higher
education that was funded primarily through a grant from IBM Corporation. The IAT served as a
clearinghouse for technology developments, develops some Multimedia ToolBook hypermedia
education materials (especially in language education), and provides demonstrations on hypermedia.
The IAT offered workshops for developers. The IAT Inforbits online newsletter is still in operation. The
IAT also broadcasted training courses via satellite KU and C bands and distributed tapes of those
broadcasts for persons unable to view/record them live. After IBM withdrew its funding of the IAT, the
University of North Carolina closed the IAT on June 30, 1998. (See also IKE)

IBM International Business Machines Corporation

A giant present and historic leader in mainframe and PC computing. Having survived an enormous
downturn of bad fortunes in the 1980s, IBM has struggled back with new products and joint ventures. In
1997, IBM announced that network software would all be sold under the banner eNetwork Software.
IBM developed a superior operating system called OS/2, but poor marketing and timing resulted in a
loss of momentum to Microsoft's Windows and Windows 2000 operating systems. IBM's joint venture
with Apple Corporation resulted in the Power Mac and Power PC desktop computers. Most interesting is
the IBM Global Campus initiative and the IBM Higher Education home page.. (See also EduQuest, IAT,
and IKE)

ICBT See CBT


ICON

Graphical representation of an object (file, directory, picture, text field, etc.) as a tiny symbol that can be
arranged with other icons and clicked on using a mouse pointer.

IDE

1. Intelligent Drive Electronics - Interface hard drive disc controller standard for PCs that enables
the controller to reside on the motherboard and, thereby, not require the use of an expansion
slot. This enhances ease of installation and allows for the elimination of SCSI controllers for
accessing auxiliary hard drives, CD-ROM drives, CD-R drives, etc. See SCSI.
2. Integrated Development Environment

IDF Intermediate Distribution Frame

A metal rack designed to connect cables, located in equipment or in a closet. Consists of components
that provide the connection between the interbuilding and intrabuilding cabling, i.e. between the Main
Distribution Frame (MDF) and individual phone wiring. There's usually a permanent, large cable running
between the MDF and IDF. The changes in wiring are done at the IDF, preventing confusion in wiring.

IDTV Improved Definitional TV

TV format that uses a computerized line doubling technique to simulate HDTV at higher resolutions. (See
also Video and HDTV)

IDL Interface Definition Language

Language that facilitates interfacing between servers and IDL compliant client computers. For example,
a Java IDL enables Java to communicate with non-Java objects on networks. (See also Java.)

IEEE Institute for Electrical and Electonics Engineers

The IEEE is a huge organization that is a major source of technical literature, training, standards, and
virtually everything else in electrical and electronics engineering. See also ISO 9000.

IIOP See Internet Messaging

IETF Internet Engineering Task Force

IETF refers to a subgroup of the Internet Architecture Board that focuses on solving technical problems
on the Internet.

IKE IBM Kiosk for Education

One thing that stood out, or rather did not stand out, at the 1994 EDUCOM Conference was a booth in
the most obscure part of the vendor exhibit area. IBM made a grant to the University of Washington to
develop the IKE-IBM Kiosk for Education. Subsequently, IBM folded the IKE activities into the IBM Global
Campus portfolio of products and services for educators. (see also IAT and the IBM Global Campus.)

IMAGE MAP

A graphic image at WWW sites that is a navigational tool. It contains two elements: (1) the graphic that
is visible on the screen and (2) a text file that contains the HTML or other hyperlink coding. (See also
World Wide Web)

IMAP4 See Internet Messaging

INCREMENTAL PACKET WRITING

Like multisession Photo CD, this process lets you add data to a disk in multiple sessions and create a
single table of contents when the disk is full. Unlike Photo CD disks, though, a disk written in this way is
readable by other CD drives only when the disk is finalized, not before. (See also CD-R)

INDEO

Video compression hardware manufactured by Intel for PC computers. The main competitor for Indeo
will be MPEG compression boards that are anticipated by analysts to be the major standard of the
future. (See also Video for Windows, QuickTime, Video, DVI, Compression, MCI, Ultimedia Video, and
MPEG)

INDUSTRY , SCIENTIFIC, AND MEDICAL (ISM) Band

An unregulated radio frequency that uses the 900 MHz and 2.4 GHz bands for communication; these
bands were approved by the FCC in 1985.

INDY See SGI

INFORMATION HIGHWAY

A world wide combination of fiber optic cable and satellite receivers in a future time when homes and
offices around the world will be linked by highways of electronic information that can be traversed
interactively both to and from a connected user. Technologies are coming to a head and plans are being
laid to bring the digital information highways to Main Street USA and elsewhere in the world. In homes
and offices, a single piece of interactive TV digital television equipment (let's call it the PCTV
computer/television superhighways terminal) will combine what are now television sets, telephones,
stereos, videotape players, videodisc players, compact disc players, and computers. The PCTV will be
networked to hundreds of millions of "servers" ranging from the computer files of individuals to the
systems of computer files that contain virtually all the movies ever made, all the contents of daily
newspapers, all the "television" shows ever recorded, all the cataloged products and services available
from vendors, all public documents of governments, all the contents of libraries, all instructional and
training courses on most anything known in the world, and so on to limits beyond our present
imaginations. Even before the information superhighways come to town via digital satellites, Barcroft
(1993), telephone fiber optics, and cable digital TV, technology see Victor (1993b) is presently in place to
make vast amounts of digitized financial information publicly available in hypermedia structures. The
hardware for a fiber optic superhighway across the United States made great progress when AT&T
Corporation announced that "Sonet" service is operational initially between 200 cities. In 1994,
Macromedia teamed up with Microware Systems Corporation in Des Moines, Iowa, to extend the
Director software into PC and Mac utilities for authoring interactive network television titles. (See also
Intercast, Webcasting, PCTV, Video server, PPV, Set-top box, Sonet, Internet, and SLIP)

INFOSEC Information Security

The protection of classified information that is stored on computers or transmitted by radio, telephone
teletype, or any other means.

INLINE IMAGES

These are the graphics contained within a Web document.

INSTANT MESSAGING (IMING)

Messaging between to or more individuals who are simultaneously online. It is more like a telephone
conversation than email. America OnlineAOL introduced instant messaging and has had an ongoing
dispute with Microsoft over its use in Internet Explorer. An Open Source alternative to AOL's instant
messaging is called Jabber. In order for IMing to work, both users (who must subscribe to the service)
must be online at the same time, and the intended recipient must be willing to accept instant messages.
Under most conditions, IMing is truly "instant." Even during peak Internet usage periods, the delay is
rarely more than a second or two. It is possible for two people to have a real-time online "conversation"
by IMing each other back and forth.

INTEGRATED INFORMATION SYSTEM

Networked systems that allow centrally located multimedia sources to communicate with remote
centers such as classrooms. For example, over 5,000 classrooms are purportedly linked to the Dynacom
(800-782-7230) integrated information system that utilizes video servers, satellite receivers, and
classroom hand-held control devices.

INTELLIGENT COMPUTER BASED TRAINING See CBT

INTERACTIVE TV See Information highway

INTERCAST

A term given by Intel Corporation for incoming-only (push-only) reception of HDTV. An upgrade tuner
for intercasting can be installed in a PC. The cost of such a tuner is under $150. Without any monthly
fee, phone modem, or cable modem, users can receive broadcasts and webcasts. However, intercasting
will not allow interactive searching or other two-way communication. See also PCTV, HDTV, and
Webcasting.
INTERCHANGE

A commercial network service introduced by a computer book publishing firm called Ziff-Davis. Although
designed to compete with CompuServe and other commercial network services, Interchange tries to
provide more services for technology monitoring of computer users. (See also Networks, CompuServe,
Internet, eWorld, Prodigy, and America Online)

INTERFACE

The connection between a computer and its auxiliary equipment such as hard drives, CD-ROM drives,
videodisc players, printers, scanners, etc.

INTERLEAVING

A process that allows separate channels for data, audio, and video files to be played back simultaneously
on a compact disc. Interleaving also allows the reader to choose from one of several audio channels
while a video channel is playing. In playback, interleaved audio and video sequences are alternately
played back such that on slow systems there may be choppy interrupts when video and audio are played
simultaneously.

INTERNET

An international grouping of computer networks. The Internet started as a relatively tiny United States
Department of Defense (DOD) Advanced Research Project Agency (ARPA) project in 1969. It commenced
with the networking of four computers. The Internet was not widely known between 1969 and 1991.
Its popularity exploded when HTML, HTTP, and the World Wide Web made it much easier to use the
Internet. For interactive computing between computers on the Internet, see Distributed Network
Computing. For web browsers see Web browsers, Java, GINA, Gopher, Mosaic, and SLIP. For accounting
educator Internet networks see ANet, ADO and RDS, International Internet Association, Internet 2, PIC-
AECM, and RAW. (See also ABKY, IKE, Sonet, Telnet, FTP, TENet, ARPANet, BITNET, World Wide Web,
Finger Gateway, Whois Gateway, UUCP, NSFNet, NYSERNet, Gateways, Outernets, Macmillan
Information SuperLibrary, Remote login, Search engine, TCP/IP, and USENet). Also see Instant
Messaging and Portal.

INTERNET 2

The Internet 2 Consortium of more than 100 universities and other organizations collaborating to
develop the next-generation Internet technology. In addition to bandwidth issues, the Consortium is
dealing with such issues as audio and video integration, interactive distance learning, telemedicine,
online research collaboration, and real-time simulation/modelling. The main web site is at
http://www.internet2.edu/.

INTERNET AUDIO AND VIDEO


The transport of audio and video such that users can hear sounds and watch video while reading text
and graphics on the Internet. It is no longer necessary to download these media files and install them on
a local computer or a local server. These files can be played live on the Internet. Ozer (1996) reviews
audio and video hardware and software for the Internet. Popular QuickTime (MOV) and Windows Video
(AVI) standards will soon have to compete with the newer Microsoft (AV) standard. Various playback
utilities, including the always popular QuickTime playback software, can be downloaded free from
<http://www.texas.net./>. Both real-time and pseudo streaming are discussed under Web streaming.
(See also Active Video (AV), AVI, Java, QuickTime, and Web streaming)

INTERNET MESSAGING

Category of technologies for sending messages across the Internet. Leading technologies are shown
below:

IMAP4 (Internet Message Access Protocol, Version 4)


MIME (Multipurpose Internet Mail Extensions)

A standard for transmitting nontext e-mail message attachments via SMTP. Most proprietary
mail systems must translate any received MIME attachments through an SMTP gateway. See
also MIME.

NNTP (Network News Transfer Protocol)

The protocol used by clients to post and retrieve messages to and from news servers, which
host discussions. NNTP is also used by news servers to replicate newsgroup discussions.

POP3 (Post Office Protocol, Version 3)

An established protocol that lets Internet users send and retrieve e-mail to and from mail
servers. POP3 provides simple store-and-forward e-mail functionality, compared with the richer
IMAP4 specification.

SMTP (Simple Mail Transfer Protocol)

A standard protocol that defines how e-mail messages are transferred between servers. SMTP
defines only ASCII text content, necessitating the MIME standard for nontext attachments.

Uuencode/uudecode

Along with MIME, another common method of sending binary e-mail attachments as plain ASCII
text. See ASCII.

HTML (HyperText Markup Language)


The simple document-formatting language of the World Wide Web. Netscape and other vendors
have begun using HTML as their standard for rich-text formatting across all Internet
applications, such as e-mail and newsgroup messages. See HTML.

HTTP (HyperText Transfer Protocol)

The protocol that negotiates delivery of text and other elements from a Web server to a Web
browser. See HTTP.

IIOP (Internet Inter-ORB Protocol)

An evolving wire-level protocol that defines how distributed objects communicate with each
other. IIOP--which is similar to Microsoft's Distributed Common Object Model (DCOM)
specification--is based around the Common Object Request Broker Architecture (CORBA). In
theory, any IIOP-compliant client software on any platform will be able to access the same
object, a programming function that performs a specific task (such as authenticating a user
against a server).

LDAP (Lightweight Directory Access Protocol)

An emerging directory service protocol that uses a subset of the X.500 directory standard to
provide a common way to identify user and group information. It can be extended to provide
information on other network resources.

S/MIME (Secure MIME)

A public-key encryption protocol for securely sending MIME attachments.

SSL (Secure Sockets Layer)

A protocol for sending encrypted information between a client and a server, often a Web server.
SSL can work with any application-layer TCP/IP protocol and is most commonly used with HTTP.

X.509 certificates

Digital-signature certificates that use public-key encryption for authenticating users. X.509
certificates can be issued by either a certificate authority (such as VeriSign) or an internal
certificate server.

INTERNET PHONES AND VIDEOCONFERENCING

Emerging telephony on the Internet coupled with the extension to video telephony. Technology in this
area is reviewed in PC Magazine, March 26, 1996, pp. 143-145. Also see Instant Messaging

INTERNET SURFING See Web surfing

INTERNET SURFING BACKWARDS See Web surfing backwards


INTERNIC INFO SOURCE

An information server about the Internet. (See also Mosaic)

INTRANET

The use of the Internet and Internet-type software for subsytems of computing for private organizations
and individuals. Companies are storing key forms and documents on web sites inside their operations,
making it easy for employees to find information using standard web browsers, not special-purpose
database programs. Most intranets use the "free" connections of the Internet, and turn the Internet into
an intranet with passwords or other access barriers to documents and databases. Combinations of free
Internet lines connected with leased (usually from telephone companies) private nodes are termed
"virtual private networks" or VPN. A VPN functionality of a dedicated line, but which is really like a
private network within a public one, because it is still controlled by a telephone company. VPN's use
encryption and other security mechanisms to ensure that only authorized users can access the network
and that the data cannot be intercepted. Some security mechanisms exist that are not available on
intranets. The finer points of VPN networking is discussed by in a very long article by Mike Fratto in
"VPNs Across Multiple Sites," Network Computing, July 1, 1998, 38-70.(See also TCP/IP, WAN, LAN, and
Extranet.)

IP Internet Protocol

IP refers to the set of communication standards that control communications activity on the Internet. An
IP address is the number assigned to any Internet-connected computer.

IP NUMBER Internet Protocol number

A unique number consisting of four parts separated by dots, for example 129.237.247.243. This is the
number assigned to a host machine which is retrieved by a DNS when a request for an Internet site is
made. These numbers usually correspond to unique domain names, which are easier for people to
remember.

IPOD

Apple Corporation’s brand of portable media players launched in 2001. Devices in the iPod range are
primarily music players, designed around a central scroll wheel --- http://en.wikipedia.org/wiki/Ipod.
Microsoft’s competing player is called Zune.

IP SNIFFING

Stealing network addresses by reading the packets. Harmful data is then sent stamped with internal
trusted addresses.

IP SPOOFING

An attack whereby an active, established session is intercepted and co-opted by the attacker.
IPX Internetwork Packet Exchange

One of the data transmission protocols used by NetWare.

IRC Internet Relay Chat

IRC audio conversation channel on the WWW that works much like a CB radio for chatting on particular
topics. Chat lines are typically in real time whereas "conferencing" use topical message boards to allow
messaging to take place asynchronously. (See also World Wide Web)

ISA See Bus

ISDN Integrated Services Digital Network

ISDN means of connecting to digital networks, including the Internet, via a common (digital) telephone
line. For a review of ISDN in accounting, see Harding (1996). It is the fastest way for many individuals to
connect to digital networks via a modem. However, at the present capacity of 128,000 bps, it is very
slow relative to cable TV modems that can do over 1 million bps and exponentially faster direct
connections that do not use modems at all. (See also Modem, MMDS, and DSL)

ISO 9000

International Organization for Standardization's series of international standards for information


systems intended for compatibility and quality assurance. These are intended to foster world trade. ISO
9000 Translated into Plain English http://www.connect.ab.ca/~praxiom/. ISO standards include:

ISO 9001- "Quality Systems - Model for Quality Assurance in Design, Development, Production,
Installation, and Servicing";
ISO 9002 - "Model for Quality Assurance in Production, Installation, and Servicing";
ISO 9003 - "Model for Quality Assurance in Final Inspection and Test.";
ISO 9004 - a document guide to further quality development;
ISO 14000 - a new standard to address environmental issues.

Most importantly, ISO is comprised of many other standard setting bodies, including the following:

ANSI (American National Standards Institute)


ITU (International Telecommunication Union)
IEEE (Institute of Electrical and Electronic Engineers)
VESA (Video Electronics Standards Association)

The key to these standards has been an audit and certification system. Companies seeking ISO
certification must have an audit. The certification has become important, especially in Europe, for
market advantages, cost reduction, access to markets, improved communications, reduced political
conflicts, documentation and dissemination processes, and employee training. Many of the standards
are focused upon meeting paperwork and record keeping requirements.
ISO 9660

The data-format and file-naming conventions that ensure CD-based data can be accessed across
multiple computer platforms. (See also CD-R)

ISOC Internet Society

ISOC is an organization formed to support a worldwide information network. ISOC is the sponsoring
body of the Internet Architecture Board.

ISP Internet Service Provider

Organization that provides access to the Internet and the World Wide Web.

IS YNC

iSync From Apple Corporation Beats Microsoft to the Market, January 6, 2002 message from
AppDevTrends@101communications-news.com. Basically, the iSync platform adds mobile phones to
Apple's digital hub strategy. It works with the Mac OS X Jaguar Address Book and iCal (Apple's calendar
program) to synchronize contacts and calendars among Bluetooth-enabled mobile phones, PalmOS
devices, Apple's iPod portable digital music player and other Macs using Apple's .Mac service. With iSync
1.0, users can sync their Jaguar Address Book with the new .Mac Address Book, making it possible to
access contacts while using .Mac Web Mail from virtually any computer, the company said in a
statement. iSync 1.0 also includes a feature that allows for regularly scheduled Mac-to-Mac
synchronization. (Also see Wireless)

ITAD Integrated Telephone Answering Device

Answering machine that avoids tape recording by using direct digital recorders for telephones.

IW Information Warfare

Actions taken to achieve information superiority over an adversary: to deny, exploit, corrupt, or destroy
an enemy’s information while protecting your own. Also known as "third-wave war" or "knowledge
war"; see Cyberwar.

J
JAVA

A programming (a derivative of C++) language from Sun Microsystems based upon bytecode and just-in-
time compilation. In 1997, IBM became the world leader in Java development with its subsidiary
Taligent developer leading the way. Java has spread like wildfire among software developers and can
now be run from all leading browsers. An especially important advantage of Java is the ability to run on
virtually any operating system (Windows, Macintosh, OS/2, etc.) or even without a GUI operating
system. An important advantage on network computers is the Remote Method Invocation (RMI)
standard. RMI is that part of the Java programming language library which enables a Java program
running on one computer to access the objects and methods of another Java program running on a
different computer. Java is extremely controversial since it allows for "centralized" housing of software
to run on inexpensive networked computers (as opposed to decentralized installation of software on
higher-capacity desktop machines). Many users hope to rent software (e.g., word processors) as
opposed to purchasing and installing software on individual machines. Although it has been possible for
some time to purchase LAN versions of software for multiple machines, Java makes it possible to run
software worldwide from a single server. See also IDL , World Wide Web and OLE.

JAVASCRIPT

Javascript is a scripting language introduced by Netscape. Javascript code allows users to go beyond
what is possible in HTML coding of web documents. A summary of JavaSript commands can be found at
http://www.javaworld.com/javaworld/jw-12-1996/jw-12-javascript.html. For interactive computing on
the web, see Distributed Network Computing.

JAVASTATION

A low cost hardware unit that provides users an internet browser specifically designed to employ Java.
The first model introduced was described in "Information Week," October 28, 1996, p. 24. JavaStation is
based on the Pico-Java technology that Sun licenses to developers for WWW-based microcomputing.
(See also Browser and Java)

JAVA VIRTUAL MACHINE

Software that allows Java to run on different platforms (operating systems). A Java virtual machine is
the environment in which Java bytecode is executed, regardless of hosting platform.

JDBC Java Database Connectivity

JDBC is a Java standard that allows Java to interface with databases. See Database, IDL, and Java.

JEEVES See Search Engine

JITT Just-In-Time Training

In many technical and complex areas it is not practical for employees or other persons to be
knowledgeable about all details at all times. For example, it has become impractical for auditors to have
a working knowledge of every accounting and auditing standard in the United States and other nations.
Physicians and other medical practitioners cannot have instant recall of details of every disease and
combination of medical symptoms and treatments. JITT refers to a process (that is usually aided by
computers, compact discs, computer networks, and/or teleconferencing) in which the person receives
training "just-in-time" when it is needed for a particular purpose. The JITT process may change the
entire process of education and training, because the focus may become how to effectively access and
utilize JITT rather than how to teach students and/or employees technical details that have to be
memorized long before they are needed in practice. (See also Kiosk)
JOY STICK

A remote control device that can be used in place of a keyboard or a mouse to allow for interactions
between a computer and its user. Joy sticks are commonly used for computer games and usually
connect through a serial port.

JPG OR JPEG Joint Photographic Experts Group

Standards for image compression that is an increasingly popular compressed graphics image file, the
extension for which is usually jpg. Because large and high resolution graphics images with considerable
color depth require massive amounts of storage (e.g., over 30 Mb) for each image, compression routines
that create images almost as good with substantially fewer storage requirements are highly desirable.
JPEG images are generally of sufficient quality that it is not necessary to utilize more storage space for
uncompressed files. JPEG compression of graphics images requires no special playback boards. When
using any compression utility such as JPEG, it pays to study the limitations. For example, JPEG
compression does not work especially well with hard edges and lines in graphics images. Black and white
images should never be compressed into JPEG images. Also conversions from GIF to JPEG may be
disappointing since GIF images are usually color reduced before becoming GIF images. Also math
coprocessors will not speed up JPEG graphics since JPEG algorithms use only integer arithmetic. JPEG
can be used with motion video cards such as the RasterOps MoviePak2 video compression daughter
card for Mac computers. (See also Video board, Compression, GIF, and MPEG)

JUKEBOXES

Hardware devices for stacking discs, especially compact discs such as CD-ROM discs for a computer. Two
hardware options for moving from one active CD to another are called jukeboxes and arrays. Jukeboxes
typically take up only one SCSI device spot but they can be slow to access while the robot finds, extracts,
moves, and inserts each disc. Arrays are linked CD devices that are both faster and cheaper than
jukeboxes. See Glatzer (1994) for a discussion of details and comparisons of alternatives.

K
KALEIDA

Kaleida Labs, Inc. in Mountain View, CA (415-966-0400). This is a software/hardware development


company (along with the PowerPC and another company called Taligent) funded in a joint venture by
Apple Corporation and IBM. The first noteworthy product is the long-delayed ScriptX hypermedia
package designed to cross multiple platforms. Kaleida announced a 20% reduction in work force on May
10, 1994. Eventually the project was terminated as a joint venture and work in process was diverted to
other projects in both companies. Kaleida is largely viewed by the public as a failed joint venture that did
not meet its main goals. (See also Taligent, Firewall, PowerPC, and ScriptX)

KB kilobyte

A thousand bytes. Due to the binary nature of computers, it's 210 bytes, technically 1024 bytes.
KERBEROS

Kerberos is a network authentication protocol. It is designed to provide strong authentication for


client/server applications by using secret-key cryptography. A free implementation of this protocol is
available from the Massachusetts Institute of Technology. Kerberos is available in many commercial
products as well. Also see security.

KE SHELL Knowledge Executive Shell

Software from Arthur Andersen Worldwide Organization, Center for Professional Education, St Charles,
IL. The software called Knowledge Executive Shell (KE Shell) provides facilities for integrating multimedia
components of text, video, audio, and graphics.

KEY

A symbol or sequence of symbols (or the electrical or mechanical equivalent) applied to text to encrypt
or decrypt.

KEYSTROKE MONITORING

A device or software that records every key struck by a user and every character of the response that
the user gets.

KHZ See kilohertz

KILOHERTZ

Unit of measure that equals a frequency of 1 thousand cycles per second. (See also Hertz and
megahertz)

KIOSK

A multimedia display system such as those used in marketing displays at conferences and in stores.
Kiosks are typically used for demonstrations and may be self-contained hardware units having
computer, video, and audio capabilities. For example, Computer and Control Solutions (800-998-3525)
offers one such self-contained Kiosk machine. (See also JITT) Also, a center of standalone interactive
information or content. Large department store chains such as Sears and Kmart are installing web
kiosks for accessing online catalogs and the entire inventories of items available for ordering. See
"Virtual Shopping Gets Real," Information Week, May 17, 1999. p. 30.

KISS Keep It Simple Stupid

KISS refers mainly to the authoring of electronic books and/or development of software in which success
often depends upon keeping the learning and usage mindlessly simple. (See also Authoring)

KLUGE
A programming trick designed to solve a problem quickly.

KM Knowledge Management

KM is a term that can have multiple meanings. In business information technology knowledge
management refers to an entire integrated system for accumulation, integration, manipulation, and
access of data across multiple organizations, including such data as credit data, consumer profiles,
market data, product development data, etc. A good article about Microsoft Corporation's movement
into this systems market is "Smart Moves," by Stuart Johnston in Information Week, May 31, 1999, 18-
20. The online version is at http://www.informationweek.com/736/km.htm . At another level, it may
refer to Enterprise Resource Management systems such as SAP. At still another level it may simply refer
to database systems for "knowledge" such as the Ask Jeeves knowledge base. See also database.

L
LAB See Studio classroom

LAN Local Area Network

LAN is a network that depicts any computer network technology that operates at high speed over short
distances (up to a few thousand meters). A LAN may refer to a network in a given department or within
a given firm or campus. It differs from computer networks that cross wider geographic spaces such as
those networks on a WAN network. A LAN does not use the publc arteries of the Internet like intranets
and VPNs. (See also Internet, TCP/IP, WAN, Intranet, Wireless, Extranet, and Virtual Private Networks
(VPN))

LASERDISC See Videodisc and Videodisc-digital

LCD Liquid Crystal Device

LCD computer/video panel and projector displays. Miniature television sets, laptop computers, and
notebook computers generally use some type of LCD display due to difficulties in manufacturing
portable cathode ray tube monitors. LCD displays may come in black and white, gray scale, and various
degrees of color depth. The panels that can be laid on top of overhead projectors for displaying
computer images on walls and large screens are called "LCD panels." LCD panels differ as to whether
they can display full-motion video as well as computer images. For a review of some of the leading
vendors and their panels, see NewMedia, September, p. 89, and NewMedia, February 1994, p. 85. One
of the top new generation projectors is the Sharp XG-E850U that is so bright it is "bringing the
obsolescence of CRT-based projectors one step closer" according to a quotation from Videography,
October 1994, p. 112. (See also Three-beam projector)

LD See Videodisc

LDAP Lightweight Directory Access Protocol (See Internet Messaging)

LEAPFROG ATTACK
An attack in which the hacker gains access to a site or server from a third-party site. Use of user ID and
password information obtained illicitly from one host to compromise another host. The act of telnetting
through one or more hosts in order to preclude a trace (a standard cracker procedure).

LEGACY

An adjective that refers to technology associated with old corporate programs, such as those on
mainframes. Increasingly used as a put-down, the opposite of cutting edge.

LETTER BOMB

E-mail containing live data intended to perform malicious acts on a machine or terminal.

LINEAR PRESENTATION See Hypermedia and Timeline presentation

LINKS

These are the hypertext connections between Web pages. This is a synonym for hotlinks or hyperlinks.

LINSPIRE Lindows

LinspireTM is a full-featured operating system like Microsoft Windows XP or Apple Mac OSX. Linspire
offers you the power, stability and cost-savings of Linux with the ease of a windows environment. In
addition, Linspire features exclusive CNR technology that makes installing software on Linspire fast and
easy -- simply find the software you want in the CNR Warehouse, then click and run it! Lindows Inc. on
April 14, 2004 changed the name of its Lindows operating system to Linspire, responding to a federal
judge's refusal to halt Microsoft Inc.'s trademark infringement lawsuits outside the U.S. See operating
systems.

LINUX

An operating system that is a UNIX clone. It was created by programmer Linus Torvalds, who gave Linux
its name. Linux is under special copyright that allows anyone to improve it, but no one to profit from it.

LISTSERV

Listserv is an email system where users "subscribe" to join in on group messages. A message sent to the
listserv is sent to every subscriber's mail box. A listserv is similar to an email "bulletin board." However,
users of bulletin boards do not receive the messages in their mail boxes without first going to the
bulletin board to view a listing of messages. There are thousands upon thousands of listservs on topics
of mutual interest from sewing to microbiology. It is common for college courses to have a listserv so
that instructors and students can all communicate easily with group messages. Over 70,000 interest
groups (at this writing) are linked at http://www.liszt.com/. Comparisons with bulletin boards, email
groups, chat rooms, etc. are made in the e-mail definition of this glossary. See e-mail, Chat Lines, IRC,
USENet, teleconferencing, videoconferencing, webcasting, and telephony.

LIVE
When used in reference to a World Wide Web file, this term designates an object linked to another layer
of information.

LIVELINK See Groupware

LOCAL BUS See Bus

LOGIC BOMB

A piece of unauthorized computer code, usually delivered via e-mail. It attacks a system after verifying
certain conditions within that system.

LOTUS NOTES

A networking set of application programs from Lotus Development Corporation, now owned by IBM
Corporation, which allows organizations to share documents, databases, and exchange electronic mail
messages. Purportedly, Lotus Notes was the major reason why Lotus was purchased by IBM
Corporation. An interactive web server called Domino was introduced in 1996 so that Lotus Notes users
could build intranets on the internet. For example, the accounting firm of Coopers & Lybrand makes
extensive use of Domino for worldwide groupware applications. Java applets will give web browsers the
look and feel of Notes. The main web site for Lotus Notes is at http://www2.lotus.com/home.nsf. See
also Groupware and CollabraShare.

LOTUS SCREENCAM See Video

LOOP

A set of statements in a program executed repeatedly, either a fixed number of times or until a specified
condition is true or false.

M
MAIL BOMB

Sent to urge others to send massive amounts of e-mail to a single system with a goal of crashing the
recipient's system.

MAILING LIST

A system that allows people to send e-mail to one address, which is then copied and sent to all of the
other subscribers to the mail list. In this way, people who may be using different kinds of e-mail access
can participate in discussions together.

MDF Main Distribution Frame

A wiring arrangement that connects external telephone lines on one side and the internal lines on the
other. A main distribution frame may also carry protective devices as well as function as a central testing
point.
MENU BAR

A horizontal strip at the top of a window that shows the menus available in a program.

MIPS Million Instructions Per Second

A measure of computing speed.

MOCKINGBIRD

A computer program that mimics the legitimate behavior of a normal system feature but launches into a
malicious activity once activated by the user.

MOTHERBOARD

A computer's main circuit board, containing the CPU, microprocessor support chips, RAM, and
expansion (bus) slots. Also known as the logic board.

MTRJ

A small form-factor style of fiber optic connector that is defined by its high-density footprint and RJ45
locking mechanism.

MULTIMODE

An optical fiber designed to allow light to carry multiple carrier signals, distinguished by frequency or
phase, at the same time. (Contrasts with singlemode.)

N
NANO MACHINES

Tiny robots that attack the hardware of a computer system, as opposed to the software. After being
unleashed at a facility, these robots (smaller than insects) can literally crawl through an office until they
find a computer, then drop through slots in the computer and shut down the electronic circuits.

NETWORK

A group of connected computers that allows people to share information and equipment. Many schools
have a Local Area Network and are also connected to a Wide Area Network, such as the World Wide
Web.

NETWORK WORM

A program or command file that uses a computer network as a means for adversely affecting a system's
integrity, reliability, or availability. A network worm may attack from one system to another by
establishing a network connection. It is usually a self-contained program that does not need to attach
itself to a host file to infiltrate network after network.
NEWSGROUP

Usenet newsgroups are Internet discussion groups whose topics are about as diverse as you can
imagine. If you have an original idea for a newsgroup, and gather some people who want to subscribe,
you can probably begin a newsgroup.

NIPC National Infrastructure Protection Center

Established in February 1998, the NIPC is considered the U.S. government's focal point for threat
assessment, warning, investigation, and response for threats or attacks against critical national
infrastructures.

O
ONE -TIME PASSWORD

In network security, a password issued only once as a result of a challenge:response authentication


process. Cannot be "stolen" or reused for unauthorized access.

ONE -W AY HASH FUNCTION

In cryptography, an algorithm that generates a fixed string of numbers from a text message. The "one-
way" means that it is extremely difficult to turn the fixed string back into the text message. One-way
hash functions are used for creating digital signatures for message authentication.

OODA Observation, Orientation, Decision, Action Loop

Refers to the computerized cycle from data acquisition to information integration through to initiation
of a response. Taking out the OODA loop is frequently mentioned as the goal of Information Warfare.

ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM)

A multiplexing technique used in 802.11a WLANs; this technique minimizes the effect of multipath
distortion encountered in 802.11b networks.

OS operating system

This is the programming that makes your computer run its most basic functions. Some examples are
UNIX, Linux, Windows 95, 98, or NT, and Mac OS 7 and 8.5.

P
PACKET SNIFFING

A technique in which a software program is planted at remote junctions in a computer network. The
program monitors information packets as they are sent through networks and reveals usernames and
passwords to the hacker, who is then able to break into the system.

PC personal computer
A microcomputer with its own processor and hard drive. Although technically this refers to all such
computers, including Macs, the term PC is nearly synonymous with only the IBM-compatible
microcomputers.

PHREAKING

Hacking directed at the telephone system (as opposed to the data communications networks) or hacking
with a telephone. Using different "boxes" and "tricks" to manipulate the phone companies and their
phones, phreakers can gain many things, two of which are knowledge about telephones and how they
work, and free local and long-distance phone calls.

PING Packet Internet Gopher

A TCP/IP application that sends a message to another computer, waits for a reply, and displays the time
the transmission took. This serves to identify what computers are available on the Internet and how
long wait-times are.

PING OF DEATH

The Ping of Death is a denial-of-service attack that crashes servers by sending invalid IP ping packets.

PLAIN TEXT

This is text without extraneous codes that designate font size, font style, et cetera. See ASCII.

PLUG-IN

A small piece of software that adds features to already existing, usually large, programs.

PORT SCANNING

The act of systematically scanning a computer's ports. Since a port is a place where information goes
into and out of a computer, port scanning identifies open doors to a computer. Port scanning has
legitimate uses in managing networks, but port scanning also can be malicious if someone is looking for
a weakened access point.

PROWLER

A daemon that is run periodically to seek out and erase core files, truncate admin log files, “nuke” lost-
and-found directories, and otherwise clean up the system.

PROXY

Using one computer or device to make requests or “stand in” in place of another. Proxies are often used
for Internet security. You can use a proxy to pass data between an internal network and the Internet.
The server on the Internet never knows that the request is coming from anywhere but the proxy. Some
proxies have caching and site filtering built in.
PULLDOWN MENU

A list of options that "pulls down" when you select a menu at the top of a window. For example, the File
menu in most programs is a pulldown menu that reveals commands such as open, new, and save.

Q
QBE Query By Example

A search method for databases in which the user fills out the form by following the examples given.

Q UADRANT

A short name referring to technology that provides tamper-resistant protection to cryptography


equipment.

R
RAINBOW SERIES

A library of technical manuals on evaluating “trusted computer systems” issued by the National Security
Agency between 1987 and 1995. So named because each book ‘s cover is a different color.

RAM Random Access Memory

Readable and writeable memory that acts as a storage area while the computer is on, and is erased
every time the computer is turned off. This memory stores data and helps execute programs while in
use.

RARP Reverse Address Resolution Protocol

RARP is a protocol by which a physical machine in a local area network can request to learn its IP
address from a gateway server's Address Resolution Protocol (Address Resolution Protocol) table or
cache. A network administrator creates a table in a local area network's gateway router that maps the
physical machine (or Media Access Control - MAC address) addresses to corresponding Internet Protocol
addresses. When a new machine is set up, its RARP client program requests from the RARP server on the
router to be sent its IP address. Assuming that an entry has been set up in the router table, the RARP
server will return the IP address to the machine which can store it for future use. RARP is available for
Ethernet, Fiber Distributed-Data Interface, and token ring LANs.

REPLICATOR

Any program, such as a worm, a fork bomb, or virus, that acts to produce copies of itself. It is even
claimed by some that UNIX and C are the symbiotic halves of an extremely successful replicator.

RETRO -VIRUS

A virus that waits until all possible backup media are infected before activating, thereby making it
impossible to restore the system to its uninfected state.
RMA (Revolution in Military Affairs)

The military’s realization that information and information technologies must be considered as a
weapon in plotting any military strategy.

ROM

1. Read Only Memory

Readable memory that cannot be corrupted by accidental erasure. ROM retains its data when
the computer is turned off.

2. Rough Order of Magnitude

Rough estimate of magnitude of some action, activity or effort, especially in reference to level of
effort for a task.

ROOTKIT

A hacker security tool that captures passwords and message traffic to and from a computer. A collection
of tools that allows a hacker to provide a backdoor into a system, collect information on other systems
on the network, mask the fact that the system is compromised, and much more. Rootkit is a classic
example of Trojan horse software.

S
SAMURAI

A hacker who hires out for legal cracking jobs like snooping for factions in corporate political fights or
doing work for lawyers pursuing privacy rights and First Amendment cases, and hacking for other parties
with legitimate reasons to need an electronic locksmith.

SC

Designation for an optical connector featuring a 2.5 mm physically contacting ferrule with a push-pull
mating design. This connector is recommended in the TIA/EIA-568A Standard for structured cabling.

SCRIPT KIDDIE

A low-level amateurish hacker. They are generally regarded as mischief makers as opposed to real
threats.

SEARCH ENGINE

Any of a number of giant databases on the Internet which store data on Web sites and their
corresponding URLs. Some popular search engines are Google, MSN, Ask, Metacrawler, Alta Vista, and
Excite.

SECURE SOCKETS LAYER (SSL)


A protocol from Netscape that allows for "secure" passage of data. It uses public key encryption,
including digital certificates and digital signatures, to pass data between a browser and a server. It is an
open standard and is supported by Netscape's Navigator and Microsoft's Internet Explorer.

SELF-GARBLING VIRUSES

Viruses that attempt to hide from virus scanning programs by keeping most of their code garbled in
some way. They change the garbling each time they spread. When such a virus runs, a small header
degarbles the body of the virus and then branches to it.

SERVER

A computer or software package that provides a specific service to client software running on other
computers. The term can refer to a particular piece of software, such as a WWW server, or to the
machine on which the software is running, hence the popular phrase: "The server's down."

SET (Secure Electronic Transaction)

A new standard that enables secure credit card transactions on the Internet. The SET standard has been
endorsed by virtually all the major players in the electronic-commerce arena.

SHORTCUTS

Key strokes that enact the same commands available in the menus of a program. They are quicker and
more direct, and usually involve two or three keys depressed simultaneously. An example is the save
shortcut: CTRL + s on a PC or +s on a Mac. To learn more, click here.

SINGLEMODE

A fiber that allows only a single mode of light to propagate. This eliminates the main limitation to
bandwidth, modal dispersion.

SKYPE ™

A program allowing telephone conversations via the Internet. (See VoIP)

SMURF

A type of network security breach in which a network connected to the Internet is swamped with replies
to ICMP echo (PING) requests. A Smurf attacker sends PING requests to an Internet broadcast address.

SNEAKER

A person hired to break into a system to test its security.

SNIFFER
A program and/or device that monitors data traveling over a network. Sniffers can be used both for
legitimate network management functions and for stealing information off a network. Unauthorized
sniffers can be extremely dangerous to a network's security because they are virtually impossible to
detect and can be inserted almost anywhere, making them a favorite weapon of hackers.

SOLAR SUNRISE

A 1998 series of attacks that targeted Defense Department network domain name servers to exploit the
vulnerability in the Solaris Operating System computers that operated there. The attacks were thought
to be a reconnaissance for a widespread attack on the entire Pentagon information infrastructure.

SOLUTIONS INTEGRATOR

A type of consulting business that helps other businesses integrate new technology into their existing
structure. The technology being integrated includes: supply-chain management systems, sales-force
automation systems, e-commerce, Internet development telecommunications, computer telephony,
etc.

SPOOFING

1. Faking the sending address of a transmission to make it look like it is coming from a trusted host
or address in order to gain illegal entry into a secure system
2. A generic label for activities in which trusted relationships or protocols are exploited.
Impersonating, masquerading, and mimicking are forms of spoofing.

SPREAD SPECTRUM TRANSMISSION (SS)

A technique that takes a narrow signal and spreads it over a broader portion of the radio frequency
band.

ST

Designation for the "straight tip" connector developed by AT&T. This optical connector features a
physically contacting, nonrotating 2.5 mm ferrule design and bayonet connector-to-adapter mating.

STATEFUL INSPECTION

Also referred to as dynamic packet filtering. It’s a firewall architecture that works at the network layer.
Stateful inspection checks both the header information and contents of the packet. As an added security
measure against port scanning, stateful inspection firewalls close off ports until connection to the
specific port is requested.

STEALTH VIRUSES

Viruses that attempt to hide from detection programs by masking their presence in boot records or files.
When such viruses are run, they install a resident extension. This resident extension intercepts various
disk accesses, determines if its own code is part of the disk access, and removes the code before giving
the data to the calling program. The result is that the virus can be in several places on the disk. Normal
reads of the disk will not reveal it.

SYSOP Systems operator

A person responsible for the operations of a computer system or network. Part of such operations are
security checks and routine maintenance.

T
T-1

One of the fastest leased-line connections used for the Internet. It is capable of transmitting data at
roughly 1.5 million bits per second, still not fast enough for full-screen, full-motion video.

TCP/IP Transmission Control Protocol/Internet Protocol

The programming protocols invented by individuals in the U.S. Department of Defense to carry
messages around the Internet.

TECHNOLOGY

The application of scientific discoveries to the development and improvement of goods and services that
ideally improve the life of humans and their environment. Such goods and services include materials,
machinery, and processes that improve production or solve problems. In schools, technology ranges
from pencils, books, and furniture to lighting, transportation, computers, and more. Most common
references in schools imply computing or computer-related programs.

U
UNIX

A multi-user operating system that was used to create most of the programs and protocols that built the
Internet.

UNLICENSED NATIONAL INFORMATION INFRASTRUCTURE (U-NII) Band

An unregulated radio frequency that uses the 5 GHz band for communication; this band is divided into
three sub-bands and are intended for use by short-range, high-speed wireless digital communication
devices.

URL Uniform Resource Locators

This is the address of any given site on the Internet. The URL of this site is:
http://www.4teachers.org/glossary/index.shtml

V
VGA Virtual Graphics Array
This standard video graphics adapter was created by IBM and has been since improved in Super VGA,
which generally supports "true color" or 16.8 million colors.

VIRTUAL

With regard to memory, virtual refers to temporarily storing information on the hard drive. Virtual
memory is controlled automatically by the operating system.

W
WAIS Wide Area Information Server

A software system intended to search large database servers on the Web, and then rank the findings or
hits.

WAN Wide Area Network

This network connects several computer so they can share files and sometimes equipment, as well as
exchange e-mail. A wide area network connects computers across a large geographic area, such as a
city, state, or country. The World Wide Web is a WAN.

WI-FI (Wireless Fidelity)

Another name for IEEE 802.11b standard; this trademark is owned by WECA and devices that comply
with it assure interoperability among vendors.

WIRED EQUIVALENT PROTOCOL (WEP)

The IEEE specification for data encryption between wireless devices defined by the IEEE 802.1x standard.

WIRELESS LOCAL NETWORK (WLAN)

A local area network that is not connected by wires but instead uses one of the wireless technologies.

WORD PROCESSOR

The software used to produce documents, such as letters, posters, reports, and syllabi. Common word
processors used in schools are MS Works, MS Word, or ClarisWorks.

WYSIWYG What You See Is What You Get

Monitor output that closely resembles the printed output. Most software now offers WYSIWYG options,
like "print preview."

X
X.25

A communication protocol used on public data networks.


X.509 See Internet Messaging

XBRL See HTML

XFRML See HTML

XHTML See HTML

XMETAL See HTML

XML See HTML

XMODEM

A file transfer protocol for modems in which data is sent from the Internet to the PC without
acknowledgment from the PC.

XSL eXstensible Style Language See HTML

XT See PC

Y
YMMV your mileage may vary

Z
ZIPPED FILES

Zipped files are files that are compressed and must be "unzipped" to be read. Zipped files download
faster because they are smaller than an uncompressed equivalent.

ZLANGO

The newest language for mobile text messaging looks like hieroglyphics and sounds like a caveman. The
language is Zlango, and its creators aim to inject whimsy and emotion into text messaging while
reducing the number of keystrokes needed to get the point across. "SMS is the driest of all forms of
communication," Zlango founder and Chief Executive Officer Yoav Lorch told UPI. "SMS," short for "short
messaging service," is how much of the rest of the world refers to text messaging.

ZUNE

Microsoft Corporation’s attempt to break the dominance of Apple Computer Inc.'s iPod in the digital
music market with the Zune player that went on sale November 14, 2006 --- http://www.zune.net/en-
US/

S-ar putea să vă placă și