Sunteți pe pagina 1din 4

IT

Chapter 7
Batch processing- Accumulating transactions and feeding them into a computer in large
batches.
Data warehouse- An integrated collection of corporate data stored in one location.
Dirty data- Data record with spelling mistakes , incorrect or obsolete value,or other
errors.
Identity theft- The crime, committed by hacker or other unscrupulous individuals, of
obtaining enough information about a person to assume his or her identity, often as a
prelude to illegally using the victims credit cards.
Object-oriented database- Instead of storing records in tables and hierarchies, it stores
software objects that contain procedures with data.
Relational database- A program that allows files to be related to each other so changes in
one file are reflected in other files automatically.
Chapter 8
Asynchronous communication- The poster and the reader dont have to be logged in at
the same time.
Bandwidth- The quantity of information that can be transmitted through a communication
medium in a given amount of time.
Cloud computing- A type of grid computing in which resources (storage, applications,
data, and more) are distributed across the Internet rather than confined to a single
machine. Resources seem to be coming from the cloud (the Internet) rather than from a
particular computer.
Global Positioning System (GPS) - A Defense Department system with 24 satellites that
can pinpoint any location on the earth.
Protocol- A set of rules for the exchange of data between a terminal and a computer or
between two computers.
Social networking- A term used to describe Web sites that make it easy for members to
connect with friends, meet people with common interests, and create online
communities.These sites often rely on email, instant messages, chat rooms, Web forums,
blogs, and other network communication technologies.

Spam Internet junk mail.


TCP/IP ( Transmission Control Protocol/ Internet Protocol)- Protocols developed as an
experiment in internetworking , now the language of Internet, allowing cross-network
communication for almost every type of computer and network.

Chapter 9
Key term
Application services provider (ASP)- a company that manages and delivers application
services on a contract basis.
RSS An XML-based format for sharing data with aggregators, commonly used by
bloggers.
Uniform resources locator (URL)- The address of a Web site.
Chapter 10
Biometrics- Measurements of individual body characteristics, such as a voiceprint or
fingerprint; sometimes used in computer securities.
Denial-of-services (Dos) attack- A type of computer vandalism that bombards servers and
Web sites with so much bogus traffic that theyre effectively shut down, denying service
to legitimate customers and clients.
Firewall- A software or hardware gate that protects internal networks from
unauthorized access.
Hacking- Electronic trespassing and vandalism. Also used as slang for programming.
Malware Malicious software , especially destructive programs such as the viruses,
worms, and Trojan horses devised and spread by computer saboteurs.
Phishing- The use of a deceptive email message or Web site to lure a person into
divulging credit card numbers or other sensitive information.
Spoofing- A process used to steal passwords online through deception.
Spyware- Technology that collects information from computer users without their
knowledge or consent.
Chapter 12

Decision support system(DSS)- a computer system that provides managers with the tools
they need to analyze information they deem relevant for a particular decision or class of
decisions.
Enterprise resource planning (ERP)- Creating information systems to support an
organizations operational business processes.
Executive information system (EIS)- A system that combines features of management
information and decision support systems to support unstructured decision making by top
managers.
Management Information System(MIS)- Also known as a management reporting system ,
a system that gives a manager the information he or she needs to make decisions,
typically structured decisions, regarding the operational activities of the company.
Real-time processing- Processing each transaction as it occurs, which is appropriate when
users need the data immediately, as with bank ATM machines.
Supply chain management- The use of enterprise resource planning to improve the
coordination of a companys value chain logistics activities and the logistics activities of
its suppliers and customers.
Chapter 14
Algorithm- a set of step-by-step instruction that, when completed , solves a problem.
Compiler- A translator program that translates an entire program from a high-level
computer language before the program is run for the first time.
Data dictionary- A catalog, or dictionary, that describes all the data flowing through a
system.
Decision tables- A table that shows, in a row/column format , the decision rule that apply
and what actions to take when certain conditions occur.
Interpreter- A translation program that translates and transmits each source code
statement individually into machine language.
Logic error- An error in the logical structure of a program that makes difference between
what the program is supposed to do and what is actually does.
Prototype- A limited working system or subsystem that is created to give users and
managers an idea of how the complete system will work.

Pseudocode- a cross between a computer language and plain English, a form that
programmers typically use to write algorithms before translating them into computer
language.
Chapter 15
Artificial intelligence(AI)- the field of computer science devoted to making computers
perceive , reason , and act in ways that have , until now, been reserved for human beings.
Image analysis- The process of identifying objects and shapes in a photograph, drawing ,
video , or other visual image.
Knowledge base- A database that contain both facts and a system of rules for
determining and changing the relationship among those facts.
Parallel processing- Using multiple processors to divide jobs into pieces and work
simultaneously on the pieces.
Semantics- the underlying meaning of words anf phrases.
Searching- looking ahead at the possibilities.
Heuristics- a rule of thumb
Pattern recognition- recognizing recurring patterns
Machine learning- learning from experience

S-ar putea să vă placă și