Академический Документы
Профессиональный Документы
Культура Документы
Wi-Fi is a wireless networking technology that allows computers and other devices to
communicate over a wireless signal. It describes network components that are based on
one of the 802.11 standards developed by the IEEE and adopted by the Wi-Fi Alliance.
Examples of Wi-Fi standards, in chronological order, include:
802.11a
802.11b
802.11g
802.11n
802.11ac
Wi-Fi is the standard way computers connect to wireless networks. Nearly all modern
computers have a built-in Wi-Fi chip that allows users to find and connect to wireless
routers. Most mobile devices, video game systems, and other standalone devices also
support Wi-Fi, enabling them to connect to wireless networks as well. When a device
establishes a Wi-Fi connection with a router, it can communicate with the router and other
devices on the network. However, the router must be connected to the Internet (via a DSL
or cable modem) in order to provide Internet access to connected devices. Therefore, it is
possible to have a Wi-Fi connection, but no Internet access.
MICR
Magnetic Ink Character Recognition is a character recognition system that uses special
ink and characters. When a document that contains this ink needs to be read, it passes
through a machine, which magnetizes the ink and then translates the magnetic
information into characters. MICR technology is used by banks. Numbers and characters
found on the bottom of checks (usually containing the check number, sort number, and
account number) are printed using Magnetic Ink. To print Magnetic Ink need, you need a
laser printer that accepts MICR toner. MICR provides a secure, high-speed method of
scanning and processing information.
Internet
A means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers. When two computers are connected over the Internet, they
can send and receive all kinds of information such as text, graphics, voice, video, and
computer programs.
No one owns Internet, although several organizations the world over collaborate in its
functioning and development. The high-speed, fiber-optic cables (called backbones)
through which the bulk of the Internet data travels are owned by telephone companies in
their respective countries.
The Internet grew out of the Advanced Research Projects Agency's Wide Area Network
(then called ARPANET) established by the US Department Of Defense in 1960s for
collaboration in military research among business and government laboratories. Later
universities and other US institutions connected to it. This resulted in ARPANET growing
beyond everyone's expectations and acquiring the name 'Internet.'
The development of hypertext based technology (called World Wide web, WWW, or just
the Web) provided means of displaying text, graphics, and animations, and easy search
and navigation tools that triggered Internet's explosive worldwide growth.
Social Networking:
A social structure made of nodes that are generally individuals or organizations. A social
network represents relationships and flows between people, groups, organizations,
animals, computers or other information/knowledge processing entities.
The use of internet-based social media programs to make connections with friends,
family, classmates, customers and clients. Social networking can be done for social
purposes, business purposes or both. The programs show the associations between
individuals and facilitate the acquisition of new contacts.
Cyber Crime
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate
crimes). Cybercriminals may use computer technology to access personal information,
business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals
can also use computers for communication and document or data storage. Criminals who
perform these illegal activities are often referred to as hackers.
Cybercrime may also be referred to as computer crime.
Common types of cybercrime include online bank information theft, identity theft, online
predatory crimes and unauthorized computer access. More serious crimes like
cyberterrorism are also of significant concern.
Cybercrime encompasses a wide range of activities, but these can generally be broken
into two categories:
Crimes that target computer networks or devices. These types of crimes include
viruses and denial-of-service (DoS) attacks.
Crimes that use computer networks to advance other criminal activities. These
types of crimes include cyberstalking, phishing and fraud or identity theft.
The FBI identifies cybercrime fugitives who have allegedly committed bank fraud and
trafficked counterfeit devices that access personal electronic information. The FBI also
provides information on how to report cybercrimes, as well as useful intelligence
information about the latest cybercriminals.
Bandwith
Definition: Bandwidth in computer networking refers to the data rate supported by a
network connection or interface. One most commonly expresses bandwidth in terms of
bits per second (bps). The term comes from the field of electrical engineering, where
bandwidth represents the total distance or range between the highest and lowest signals
on the communication channel (band). Bandwidth represents the capacity of the
connection.
The greater the capacity, the more likely that greater performance will follow, though
overall performance also depends on other factors, such as latency.
Bandwidth is the difference between the upper and lower frequencies in a continuous set
of frequencies. It is typically measured in hertz, and may sometimes refer to passband
bandwidth, sometimes to baseband bandwidth, depending on context.
What does Wireless Network mean?
Wireless networks are computer networks that are not connected by cables of any kind.
The use of a wireless network enables enterprises to avoid the costly process of
introducing cables into buildings or as a connection between different equipment
locations. The basis of wireless systems are radio waves, an implementation that takes
place at the physical level of network structure.
Wireless networks use radio waves to connect devices such as laptops to the Internet, the
business network and applications. When laptops are connected to Wi-Fi hot spots in
public places, the connection is established to that businesss wireless network.
There are four main types of wireless networks:
Wireless Local Area Network (LAN): Links two or more devices using a wireless
distribution method, providing a connection through access points to the wider
Internet.
Wireless Wide Area Network (WAN): Covers large areas such as neighboring
towns and cities.
The document or message sender (signer) or public/private key supplier shares the
public key with the end user(s).
The sender, using his private key, appends the encrypted signature to the message
or document.
The end user decrypts the document and verifies the signature, which lets the end
user know that the document is from the original sender.
Definition - What does Intelligent Character Recognition (ICR)mean?
Intelligent character recognition (ICR) is a computer-based interpretation of handwritten
or printed characters so that they can be transcribed into a standardized format that can be
recognized and understood by a computer.
ICR and optical character recognition (OCR) have essentially the same meaning. Before
these technologies were developed, written text was transformed into digital form by a
data entry specialist, who continually typed written text with a keyboard.
OCR/ICR technologies have since been substituted for older manual methods.
The most common input device for characters in written, no digital form is a scanner.
These characters are processed by a digital signal processing-based (DSP-based)
program, which compares characters within a stored database. This process is typically
followed by a confirmation process based on a built-in dictionary that suggests matches
closest to the entered characters.
Today, scanning is the only manual part of the process, and it is much faster than entering
characters individually. ICR-based programs have the capacity to achieve highrecognition accuracy exceeding 98 percent. This is the same realized percentage of a data
entry specialist, but it is accomplished within a shorter period of time.
Definition - What does Audit Trail mean?
An audit trail, in the context of IT, is a chain of evidence in the form of hard or electronic
business transactions or communications resulting from business processes, functions or
programming executions.
An audit trail describes the chronological sequence of transactions, communications or
both, and serves as a tool for facilitating financial or legal research and investigations to
verify that all involved parties are fair, honest and truthful.
An audit trail may involve a specific purchase, sale or instance of noncompliance and
includes a number of applications across a variety of fields, including:
Telecommunications
Information security/auditing
Communication security/auditing
Medical investigations
Research investigations
Legal investigations
Definition - What does Call Center mean?
A call center is a facility that handles inbound and/or outbound calls on behalf of an
organization. For example, a call center may handle customer service calls, complaints or
other issues related to a company's products and services. The function of a call center is
strictly focused on large telephone call volume beyond an organization's internal
capabilities and infrastructure.
Today, call center operations are regularly outsourced to third-party service providers many with operators that work from third-world countries, where telecommunication
labor costs are low. Additinally, most call center services include some type of
incorporated automation.
Inbound call centers handle customer inquiries and support, while outbound call centers
handle telemarketing or communicate with customers about the products and services of a
company. Some call centers are part of a larger conglomerate of servicing known as
contact centers, which provide phone, fax, email and live chat communication.
Definition - What does Programming Language mean?
A programming language is a computer language engineered to create a standard form of
commands. These commands can be interpreted into a code understood by a machine.
Programs are created through programming languages to control the behavior and output
of a machine through accurate algorithms, similar to the human communication process.
A programming language is also known as a programming system, computer language or
computer system.
A programming language is typically divided into two elements: syntax and semantics.
There is pretty much always a specification document to define both elements. For
example, an ISO standard defines C, while Perl has a dominant implementation used as a
reference.
An algorithm is described using the programming language. Programming languages are
typically called computer languages; however, some authors deem programming
languages to be subsets of computer languages. Since the oldest forms of programming
languages like COBOL and FORTRAN, thousands of computer languages have been
developed.
Definition - What does Cache Memory mean?
Cache memory is a small-sized type of volatile computer memory that provides highspeed data access to a processor and stores frequently used computer programs,
applications and data. It stores and retains data only until a computer is powered up.
Cache memory is the fastest memory in a computer. It is typically integrated on the
motherboard and directly embedded on the processor or main random access memory
(RAM).
Cache memory provides faster data storage and access by storing an instance of programs
and data routinely accessed by the processor. Thus, when a processor requests data that
already has an instance in the cache memory, it does not need to go to the main memory
or the hard disk to fetch the data.
Cache memory can be primary or secondary cache memory, where primary cache
memory is directly integrated or closest to the processor. In addition to hardware-based
cache, cache memory also can be a disk cache, where a reserved portion on a disk stores
and provide access to frequently accessed data/applications from the disk.
Definition - What does Fiber Optic mean?
Fiber optic refers to the technology and medium used in the transmission of data as pulses
of light through a strand or fiber medium made of glass or plastic (optical fiber), versus
being sent as electrical pulses through conductive metal, like copper wires. Optical fiber
technology can carry much more data than conventional copper wires and is less prone to
electromagnetic interference, simply because data is transmitted in the form of light,
rather than electricity.
Fiber optic technology uses glass fibers to transmit data at blazing fast speeds, although
not as fast as the speed of light. This is because the general notion of the speed of light,
which is 299,792,458 meters per second, occurs in a vacuum. In reality, the speed at
which light travels greatly varies, depending on the medium through which it passes.
To decode data, special hardware with light sensors is needed for each terminal of the
fiber optic cable. This technology is considerably more expensive because manufacturing
this type of cable is more expensive, and even connecting two ends requires expensive
measures.
CPU
CPU (pronounced as separate letters) is the abbreviation forcentral processing unit.
Sometimes referred to simply as the central processor, but more commonly called
processor, the CPU is the brains of the computerwhere most calculations take place. In
terms of computing power, the CPU is the most important element of a computer system.
Alternatively referred to as the brain of the computer, processor, central processor, or
microprocessor, the CPU (pronounced as C-P-U), short for Central Processing Unit, was
first developed at Intel with the help of Ted Hoff in the early 1970's. The computer CPU
is responsible for handling all instructions it receives fromhardware and software running
on the computer.
Definition - What does Flowchart mean?
A flow chart is a type of diagram representing a process using different symbols
containing information about steps or a sequence of events. Each of these symbols is
linked with arrows to illustrate the flow direction of the process.
Flowcharts are a methodology used to analyze, improve, document and manage a process
or program. Flowcharts are helpful for:
1. Aiding understanding of relationships among different process steps
2. Collecting data about a particular process
3. Helping with decision making
4. Measuring the performance of a process
5. Depicting the structure of a process
6. Tracking the process flow
7. Highlighting important steps and eliminating the unnecessary steps
A flowchart in computer science typically has the following types of symbols to represent
a process or program:
Utility Software
Utility software is system software designed to help analyze, configure, optimize or
maintain a computer. Utility software usually focuses on how the computer infrastructure
(including the computer hardware, operating system, softwareand data storage) operates.
System software is run by the OS, versus end users. Because system software runs in the
background at a basic level, it is considered low-level software.
Basic examples of system software include:
Utility software
System servers
Device drivers
Operating system (OS)
Windows/graphical user interface (GUI) systems
Multi-processing refers to the ability of a system to support more than one processor at
the same time. Applications in a multi-processing system are broken to smaller routines
that run independently. The operating system allocates these threads to the processors
improving performance of the system.
Definition - What does Enterprise Resource Planning (ERP)mean?
Enterprise resource planning (ERP) is a method of efficiently utilizing people, hardware
and software to increase productivity and profit, thus simplifying a companys business
processes. ERP may include many software applications or a single (but more complexes)
software package that smoothly disseminates data required by two or more unique
business departments.
An enterprise resource planning system (ERP system) is an information system that
incorporates enterprise-wide internal and external information systems into a single
unified solution.
ERP systems integrate the software, hardware and network resources essential for
building an enterprise resource planning (ERP) information system solution. ERP systems
aim to streamline business processes.
Definition - What does Extranet mean?
An extranet is a controlled private network allowing customers, partners, vendors,
suppliers and other businesses to gain information, typically about a specific company or
educational institution, and do so without granting access to the organization's entire
network. An extranet is often a private part of a website. It is restricted to select users
through user IDs, passwords and other authentication mechanisms on a login page.
dimensions with specific conventions for the product in question. It can be used to
produce either two-dimensional or three-dimensional diagrams, which can then when
rotated to be viewed from any angle, even from the inside looking out. A special printer or
plotter is usually required for printing professional design renderings.
The concept of designing geometric shapes for objects is very similar to CAD. It is called
computer-aided geometric design (CAGD).
CAD is also known as computer-aided design and drafting (CADD)
SWIFT
Society for Worldwide Interbank Financial Telecommunications. Global communication
network that facilitates 24-hour secure international exchange of payment instructions
between banks, central banks, multinational corporations, and major securities firms. A
member owned cooperative organized in 1977 under Belgium law, it now includes over
6,500 participating members from more than 180 countries which together process in
excess of a billionmessages every year (about 300 million messages every day). See also
chips.
Online marketing
Online advertising
Online sales
Product delivery
Product service
Online billing
Online payments
Depositors can monitor each transaction in an accessible user interface to understand how
credits, deposits, deductions and payments affect their account's balance.
ASCII
ASCII (American Standard Code for Information Interchange) is the most common
formatfor text files in computers and on the Internet. In an ASCII file, each alphabetic,
numeric, or special character is represented with a 7-bit binary number (a string of seven
0s or 1s). 128 possible characters are defined.
UNIX and DOS-based operating systems use ASCII for text files. Windows NT and 2000
uses a newer code, Unicode. IBM's S/390 systems use a proprietary 8-bit code called
EBCDIC. Conversion programs allow different operating systems to change a file from
one code to another.
ASCII was developed by the American National Standards Institute (ANSI).
Definition - What does Business Process Outsourcing (BPO)mean?
Business process outsourcing (BPO) is the contracting of non-primary business activities
and functions to a third-party provider. BPO services include payroll, human resources
(HR), accounting and customer/call center relations.
BPO is also known as Information Technology Enabled Services (ITES).
Techopedia explains Business Process Outsourcing (BPO)
BPO categories are front office customer services (such as tech support) and back office
business functions (such as billing).
The following are BPO advantages:
Organizational growth increases when capital resource and asset expenditures are
not required, which averts problematic investment returns.
Primary storage devices are internal to the system and are the fastest of the
memory/storage device category. Typically, primary storage devices have an instance of
all the data and applications currently in use or being processed. The computer fetches
and keeps the data and files it in the primary storage device until the process is completed
or data is no longer required. Random access memory (RAM), graphic card memory and
cache memory are common examples of primary storage devices.
Definition - What does Secondary Storage Device mean?
A secondary storage device refers to any volatile storage device that is internal or external
to the computer. It can be any storage device beyond the primary storage that enables
permanent data storage.
A secondary storage device is also known as an auxiliary storage device or external
storage.
Secondary storage devices are primarily referred to a storage devices that serve as an
addition to the computer's primary storage, RAM and cache memory. Typically,
secondary storage allows for the storage of data ranging from a few megabytes to
petabytes. These devices store virtually all programs and applications stored on a
computer, including the operating system, device drivers, applications and general user
data. Most of the secondary storage devices are internal to the computer such as the hard
disk drive, the tape disk drive and even the compact disk drive and floppy disk drive.
As the base of an Octal Numbers system is 8 (base-8), which also represents the number
of individual numbers used in the system, the subscript 8 is used to identify a number
expressed in octal. For example, an octal number is expressed as: 2378
Just like the hexadecimal system, the octal number system provides a convenient way
of converting large binary numbers into more compact and smaller groups. However,
these days the octal numbering system is used less frequently than the more popular
hexadecimal numbering system and has almost disappeared as a digital base number
system.
Definition - What does Keyboard mean?
A keyboard is a peripheral device that enables a user to input text into a computer or any
other electronic machinery. A keyboard is an input device and is the most basic way for
the user to communicate with a computer. This device is patterned after its predecessor,
the typewriter, from which the keyboard inherited its layout, although the keys or letters
are arranged to function as electronic switches. The keys include punctuation,
alphanumeric and special keys like the Windows key and various multimedia keys, which
have specific functions assigned to them.
There are different types of keyboard layouts manufactured based on the region and
language used. QWERTY: This layout is the most widely used and is named after the first
six letters that appear on the top row. This layout is commonly manufactured today
because of its popularity. It is so common across the world - even in countries that do not
use the Latin-based alphabet for their language - that some people think that it is the only
kind of keyboard there is. AZERTY: This was developed in France as another variation to
the QWERTY layout and is considered the standard French keyboard. DVORAK: This
layout was created to reduce finger movement when typing and produce faster typing
speeds than QWERTY or AZERTY.
.
Definition - What does Management Information System (MIS)mean?
A management information system (MIS) is a broadly used and applied term for a threeresource system required for effective organization management. The resources are
people, information and technology, from inside and outside an organization, with top
priority given to people. The system is a collection of information management methods
involving computer automation (software and hardware) or otherwise supporting and
improving the quality and efficiency of business operations and human decision making.
As an area of study, MIS is sometimes referred to as IT management (information
technology management) or information services (IS). Neither should be confused with
computer science.
Techopedia explains Management Information System (MIS)
It is important to note that a management information system should not only indicate the
status of a businesss conditions, but also indicate why the conditions are improving or
deteriorating. For example, an MIS should report performance relative to cost and
profitable or unprofitable projects, while identifying individual accountability both
current and past. This can be done only if such reports are based on constantly updated
information accessible to those in authority who are responsible for assessing and
assuring it is used for timely decision-making.
Examples of the broad scope and varied contexts of MISs are:
Decision Support Systems
Project Management
The ability to shifting job processing time to other resources that are less busy
The ability to avoid idling computer resources with manual intervention and
supervision