Sie sind auf Seite 1von 4

MARALIT, NHILRIZA B

BSMA 2-1
DEFINITIONS
1. WORLD WIDE WEB. The Web has a body of software, and a set of protocols and conventions. Through the use
hypertext and multimedia techniques, the web is easy for anyone to roam, browse, and contribute to. The World
Wide Web (known as "WWW', "Web" or "W3") is the universe of network-accessible information, the
embodiment of human knowledge. Tim Berners-Lee, a British scientist, invented the World Wide Web (WWW) in
1989, while working at CERN.
2. KNOWLEDGE MANAGEMENT SYSTEM. Knowledge management is any system that helps people in an
organization share, access, and update business knowledge and information. A knowledge management system
is any kind of IT system that stores and retrieves knowledge to improve understanding, collaboration, and process
alignment. Knowledge management systems can exist within organizations or teams, but they can also be used to
center your knowledge base for your users or customers.
3. MOBILE COMMERCE. Mobile commerce (alternately known as m commerce or m-commerce) is the browsing,
buying and selling of products and services on mobile devices such as cellphones or tablets. In other words, it's a
complete online shopping experience, but with all the convenience of being on a cellphone or tablet. It’s a fancy
term for the routine things we do almost daily, such as sending our half of the restaurant bill to our friend through
the Cash App on our phones, or ordering a new book through the bookstore on our tablets.
4. BUSINESS PROCESS REENGINEERING. Business process reengineering (BPR) involves the examination and
redesign of business processes and workflows in your organization. A business process is a set of related work
activities that are performed by employees to achieve business goals. Basically, a business process is the way we
perform our work and business process reengineering is the process of changing the way we do our work so we
do it better to accomplish the goals of our business. Business Process Reengineering or BPR for short, is a
methodology and technique with which organisations radically change their business processes with the aim of
becoming more efficient and more modern. The far-reaching measures that are taken after the decision to
restructure a process not only concern formal procedures or other existing processes, but can also bring about
radical changes in management style and corporate culture. The founder of the Business Process Reengineering
concept is Michael Hammer. Michael Hammer published the article ‘Reengineering Work: Do not Automate,
Obliterate‘ in 1990.
5. CHANGE MANAGEMENT MODEL. Change management is the process, tools and techniques to manage the people
side of change to achieve the required business outcome. Change management incorporates the organizational
tools that can be utilized to help individuals make successful personal transitions resulting in the adoption and
realization of change. Change management is a systematic approach to dealing with the transition or
transformation of an organization's goals, processes or technologies. The purpose of change management is to
implement strategies for effecting change, controlling change and helping people to adapt to change. Such
strategies include having a structured procedure for requesting a change, as well as mechanisms for responding
to requests and following them up.
6. HARD DISK DRIVE. The term "hard drive" is actually short for "hard disk drive." The term "hard disk" refers to the
actual disks inside the drive. However, all three of these terms are usually seen as referring to the same thing --
the place where your data is stored.
7. INTEGRATED CIRCUIT. An integrated circuit, or IC, is small chip that can function as an amplifier, oscillator, timer,
microprocessor, or even computer memory. An IC is a small wafer, usually made of silicon, that can hold anywhere
from hundreds to millions of transistors, resistors, and capacitors. These extremely small electronics can perform
calculations and store data using either digital or analog technology.
8. NETWORK ATTECHED STORAGE. An NAS device is a storage device connected to a network that allows storage
and retrieval of data from a central location for authorised network users and varied clients. NAS devices are
flexible and scale out, meaning that as you need additional storage, you can add to what you have. NAS is like
having a private cloud in the office. It’s faster, less expensive and provides all the benefits of a public cloud on site,
giving you complete control.
9. RADIO FREQUENCY IDENTIFICATION. RFID tags are intelligent bar codes that can talk to a networked system to
track every product that you put in your shopping cart. Radio Frequency Identification (RFID) technology uses
radio waves to identify people or objects. There is a device that reads information contained in a wireless device
or “tag” from a distance without making any physical contact or requiring a line of sight.
10. RANDOM ACCESS MEMORY. Random Access Memory, or RAM (pronounced as ramm), is the physical hardware
inside a computer that temporarily stores data, serving as the computer's "working" memory. Additional RAM
allows a computer to work with more information at the same time, which usually has a considerable effect on
total system performance.
11. READ ONLY MEMORY. It is an example of nonvolatile memory. ROM full form is Read Only Memory. It is a class
of storage medium used in computers and other electronic devices. Read Only Memory (ROM), also known as
firmware, is an integrated circuit programmed with specific data when it is manufactured. The instructions for
starting the computer are housed on Read only memory chip.
12. REDUNDANT ARRAY OF INDEPENDENT RISKS. RAID allows information to access several disks. RAID uses
techniques such as disk striping (RAID Level 0), disk mirroring (RAID Level 1), and disk striping with parity (RAID
Level 5) to achieve redundancy, lower latency, increased bandwidth, and maximized ability to recover from hard
disk crashes. RAID consistently distributes data across each drive in the array. RAID then breaks down the data
into consistently-sized chunks (commonly 32K or 64k, although other values are acceptable). Each chunk is then
written to a hard drive in the RAID array according to the RAID level employed. When the data is read, the process
is reversed, giving the illusion that the multiple drives in the array are actually one large drive.
13. SOLID STATE STORAGE DEVICE. Solid state memory drives, often referred to as solid state drives, or SSDs, are an
alternative to hard disk drives (HDDs). They are usually equipped with flash memory, in which data are stored on
chips within the drive. A type of storage technique that employs storage devices built using silicon microchip based
storage architecture. Solid-state storage is designed on the architecture and storage mechanism of volatile and
non–volatile flash memory and stores data electronically by passing electrical charge across the memory chips.
14. STORAGE AREA NETWORK. A Storage Area Network (SAN) is a specialized, high-speed network that provides
block-level network access to storage. SANs are typically composed of hosts, switches, storage elements, and
storage devices that are interconnected using a variety of technologies, topologies, and protocols. SANs may also
span multiple sites. A SAN presents storage devices to a host such that the storage appears to be locally attached.
This simplified presentation of storage to a host is accomplished through the use of different types of
virtualization.
15. APPLICATION PROGRAMMING INTERFACE. PIs let your product or service communicate with other products and
services without having to know how they’re implemented. This can simplify app development, saving time and
money. When you’re designing new tools and products—or managing existing ones—APIs give you flexibility;
simplify design, administration, and use; and provide opportunities for innovation.
16. ENTERPRISE APPLICATION INTEGRATION. Enterprise application integration establishes a middleware framework
that helps data flow freely between applications without significant changes to database configurations or the
applications themselves, leading to a streamlined process and increased data availability. Enterprise Application
Integration is the process of integrating Enterprise Applications using IT enabled systems. Enterprise Applications
are crucial to the operations of various modern organisations and hence their integration is even more crucial to
streamline all activities and ensure smooth functioning of enterprise level activities.
17. GRAPHICAL USER INTERFACE. A GUI (graphical user interface) is a system of interactive visual components for
computer software. A GUI displays objects that convey information, and represent actions that can be taken by
the user. The objects change color, size, or visibility when the user interacts with them. It is a user interface that
includes graphical elements, such as windows, icons and buttons. The term was created in the 1970s to distinguish
graphical interfaces from text-based ones, such as command line interfaces. However, today nearly all digital
interfaces are GUIs.
18. OPERATING SYSTEM. An operating system (OS), in its most general sense, is software that allows a user to run
other applications on a computing device. While it is possible for a software application to interface directly with
hardware, the vast majority of applications are written for an OS, which allows them to take advantage of common
libraries and not worry about specific hardware details. An operating system handles input and output devices.
Operating systems use device drivers written by hardware creators to communicate with their devices.
19. RICH INTERNET APPLICATIONS. Web-based applications that have some characteristics of graphical desktop
applications. Built with powerful development tools, RIAs can run faster and be more engaging. They can offer
users a better visual experience and more interactivity than traditional browser applications that use only HTML
and HTTP.
20. SERVICE ORIENTED ARCHITECTURE. Service-Oriented Architecture (SOA) is an architectural approach in which
applications make use of services available in the network. In this architecture, services are provided to form
applications, through a communication call over the internet.
21. DATA DEFINITION LANGUAGE. Data definition language may sound like it's another programming language, but
it's actually a method of categorizing the different types of SQL commands. Data definition language (DDL) refers
to the set of SQL commands that can create and manipulate the structures of a database. DDL statements are
used to create, change, and remove objects including indexes, triggers, tables, and views. Common DDL
statements include: CREATE (generates a new table), ALTER (alters table), DROP (removes a table from the
database)
22. DATA LIFECYCLE MANAGEMENT. Data life cycle management (DLM) is a policy-based approach to managing the
flow of an information system's data throughout its life cycle: from creation and initial storage to the time when
it becomes obsolete and is deleted. DLM products automate the processes involved, typically organizing data into
separate tiers according to specified policies, and automating data migration from one tier to another based on
those criteria. As a rule, newer data, and data that must be accessed more frequently, is stored on faster, but
more expensive storage media, while less critical data is stored on cheaper, but slower media.
23. DATA ADMINISTRATION. Data administration is the process by which data is monitored, maintained and managed
by a data administrator and/or an organization. Data administration allows an organization to control its data
assets, as well as their processing and interactions with different applications and business processes. Data
administration ensures that the entire life cycle of data use and processing is on par with the enterprise’s
objective.
24. DATA BASE-AS-A-SERVICE. DBaaS is a self-service portal that allows end users, whether they are a DBA team,
internal developers or outside clients, to rapidly provision a database. That database can be selected from a
portfolio of options including database type (Oracle, Microsoft, MySQL); database size; performance
characteristics; backup and recovery standards; high-availability and replication options; and even databases with
pre-populated data, which could be a redacted replica of a production environment.
25. DATABASE MANAGEMENT SYSTEM. A software for storing and retrieving users' data while considering
appropriate security measures. It consists of a group of programs which manipulate the database. The DBMS
accepts the request for data from an application and instructs the operating system to provide the specific data.
In large systems, a DBMS helps users and other third-party software to store and retrieve data.
26. COARSE CODNG STYLE. Coarse coding is a method of converting a high resolution image into several lower
resolution ones. This is done by overlaying the high resolution image with several staggered lower resolution
images. If any of the fine pixels are in a coarse pixel, then that pixel turns on. This program takes in an image and
outputs its coarse coded representations.
27. EXTENSIBLE MARKUP LANGUAGE. Stands for "Extensible Markup Language." (Yes, technically it should be EML).
XML is used to define documents with a standard format that can be read by any XML-compatible application.
The language can be used with HTML pages, but XML itself is not a markup language. Instead, it is a
"metalanguage" that can be used to create markup languages for specific applications. For example, it can
describe items that may be accessed when a Web page loads. Basically, XML allows you to create a database of
information without having an actual database. While it is commonly used in Web applications, many other
programs can use XML documents as well.
28. HYPERTEXT MARKUP LANGUAGE. Hypertext markup language (HTML) is the major markup language used to
display Web pages on the Internet. In other words, Web pages are composed of HTML, which is used to display
text, images or other resources through a Web browser. All HTML is plain text, meaning it is not compiled and
may be read by humans. The file extension for an HTML file is .htm or .html. A set of standards, a variety of SGML,
used to tag the elements of a hypertext document. It is the standard protocol for formatting and displaying
documents on the World Wide Web.
29. LONG TERM EVOLUTION. Long Term Evolution (LTE) refers to a standard for smooth and efficient transition
toward more advanced leading-edge technologies to increase the capacity and speed of wireless data networks.
LTE is often used to refer to wireless broadband or mobile network technologies. LTE is also referred to as 3GPP
Long Term Evolution. 3GPP is an acronym for 3rd Generation Partnership Project, which operates under a name
trademarked by the European Telecommunications Standards Institute. LTE is also known as LTE Super 3G and
LTE Super 4G.
30. LOCAL AREA NETWORK. A privately-owned network and stands for local area network. A network is a group of
computers and other devices connected so they can pass information back and forth. The local area network (LAN)
is a network which is designed to operate over a small physical area such as an office, factory or a group of
buildings up to a few kilometers in size. LANs very widely used in a variety of computers to share resources (e.g.,
printers) and exchange information.
31. METROPOLITAN AREA NETWORK. A class of network which serves a large geographical area between 5 to 50
kilometers in range. This geographical area can include several buildings, such as a college campus, sometimes
referred to as a campus network, or an area as large as a city (metropolitan area). These networks are larger than
a LAN, but smaller than a WAN, generally providing communications via fiber optic cable, and mostly works within
Layer 2, or the data link layer, of the OSI model. Usually, a MAN does not belong to any particular organization,
but rather a consortium of users or a single network provider which takes charge of the service, owns its hardware
and other equipment, and sells access to the network to end users. In this regard, levels of service must be
discussed and agreed upon between each user and the MAN provider.
32. PERSONAL AREA NETWORK. A personal area network (PAN) is a computer network organized around an
individual for personal use only. They typically involve a computer, phone, printer, tablet, or some other device
like a PDA. The difference between PANs and other network types like local area networks, wireless local area
networks, wide area networks, and metropolitan area networks is that they transmit information between devices
that are nearby instead of sending that same data through a LAN or WAN before it reaches something that's
already within reach. You can use these networks to transfer files, including email, calendar appointments, photos,
and music. If you do the transfers wirelessly -- for example, using Wi-Fi or Bluetooth -- it's technically called a
WPAN, which is a wireless personal area network.
33. SOFTWARE DEFINED NETWORKING. A network architecture approach that enables the network to be intelligently
and centrally controlled, or ‘programmed,’ using software applications. This helps operators manage the entire
network consistently and holistically, regardless of the underlying network technology. SDN enables the
programming of network behavior in a centrally controlled manner through software applications using open APIs.
By opening up traditionally closed network platforms and implementing a common SDN control layer, operators
can manage the entire network and its devices consistently, regardless of the complexity of the underlying
network technology.
34. UNIFORM RESOURCE LOCATOR. Stands for "Uniform Resource Locator." A URL is the address of a specific
webpage or file on the Internet. For example, the URL of the TechTerms website is "http://techterms.com." The
address of this page is "http://techterms.com/definition/url" and includes the following elements:
http:// – the URL prefix, which specifies the protocol used to access the location
techterms.com – the server name or IP address of the server
/definition/url – the path to the directory or file.
35. VIRTUAL PRIVATE NETWORK. VPN apps are often used by individuals who want to protect data transmissions on
their mobile devices or visit web sites that are geographically restricted. Secure access to an isolated network or
website through a mobile VPN should not be confused with private browsing, however. Private browsing does not
involve encryption; it is simply an optional browser setting that prevents identifiable user data, such as cookies,
from being collected and forwarded to a third-party server.

Das könnte Ihnen auch gefallen