Term
|
Definition
| IP) is a term referring to a number of distinct types of creations of the mind for which a set of exclusive rights are recognized. |
|
|
Term
|
Definition
| refers to a state of affairs where the purported maker of a statement will not be able to successfully challenge the validity of the statement or contract. |
|
|
Term
|
Definition
| is a form of net abuse consisting of sending huge volumes of e-mail to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted |
|
|
Term
|
Definition
| is to send unsolicited bulk messages indiscriminately |
|
|
Term
|
Definition
| is a computer program that can replicate itself[1] and spread from one computer to another |
|
|
Term
|
Definition
| is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. |
|
|
Term
|
Definition
| is the art of manipulating people into performing actions or divulging confidential information |
|
|
Term
|
Definition
| is a technique used to retrieve information that could be used to carry out an attack on a computer network. |
|
|
Term
|
Definition
| is a way of attempting to acquire information such as usernames, passwords and credit card details thru deceit. |
|
|
Term
|
Definition
| is a hacker's attack aiming to redirect a website's traffic to another, bogus website. |
|
|
Term
|
Definition
| is the technique whereby content is blocked or allowed based on analysis of its content |
|
|
Term
|
Definition
| is an electronic document which uses a digital signature to bind a public key with an identity |
|
|
Term
|
Definition
| is a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts. |
|
|
Term
|
Definition
| one of the first database management systems from the 1960s. |
|
|
Term
|
Definition
| focuses on the IT or technology systems that support business functions. |
|
|
Term
| Business Continuity Planning |
|
Definition
| is planning which identifies the organization's exposure to internal and external threats |
|
|
Term
|
Definition
| is being able to function at a lower level instead of having a complete failure. |
|
|
Term
|
Definition
| is being able to switch to another server in case of a failure of your initial one. |
|
|
Term
| Three kinds of Back-up sites for after a disaster: |
|
Definition
Cold site: Minimalist site, has no backup copies of data nor hardware, mot inexpensive Hot site: Basically a duplicate of the original site Warm site: A compromise to some extent between the two sites |
|
|
Term
|
Definition
| Making sure your server can accommodate future growth needs |
|
|
Term
|
Definition
| Computer speed basically doubles every two years (# of transistors on a CPU) |
|
|
Term
|
Definition
| 10^6 Hertz -> A hertz is the number of cycles per period |
|
|
Term
|
Definition
| 10^9 Hertz -> A hertz is the number of cycles per period |
|
|
Term
|
Definition
| Linking many computers together to act as one |
|
|
Term
|
Definition
| A CPU doing more than one task at once. |
|
|
Term
|
Definition
| Having more than one CPU perform a function to increase the speed |
|
|
Term
|
Definition
| the ratio of computation to the amount of communication; how often and with how much info |
|
|
Term
|
Definition
| Encompasses all organizational information; used for managerial operations |
|
|
Term
| Transactional Information: |
|
Definition
| Information in a business process; used for day to day operations |
|
|
Term
|
Definition
| Duplicating critical components to increase reliability of system |
|
|
Term
|
Definition
| Extract, transform, load; taking information, fitting it to your specs, loading it into storage |
|
|
Term
| Multi-dimensional Analysis: |
|
Definition
| Analysis of data from a variety of angles |
|
|
Term
|
Definition
| an error correction technique using codes |
|
|
Term
|
Definition
| Discovering new patterns from large data sets |
|
|
Term
|
Definition
| Deriving high-quality information from text sets |
|
|
Term
|
Definition
| Discovering new patterns from the web |
|
|
Term
|
Definition
| Sorting data into clusters of similar characteristics |
|
|
Term
|
Definition
| Reveals relationships between variables along with frequency and nature of them |
|
|
Term
|
Definition
| When retailers seek to understand the purchase behavior of customers |
|
|
Term
|
Definition
| An emergency repair disk used by some Microsoft operating systems |
|
|
Term
|
Definition
|
|
Term
|
Definition
| a centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format |
|
|
Term
|
Definition
| An interactive website kept constantly updated and relevant due to a database |
|
|
Term
|
Definition
| Databases are better for mass storage of high volumes of data. Excel can do this, but retrieving data from anything but the simplest quarries can lead to data validation and data corruption problems. Store data in a database, work on it in a spreadsheet. |
|
|
Term
|
Definition
| Means one has a lot of data, but does not understand it or has not analyzed.. basically making the data have little useful value |
|
|