Glossary Flashcards

1
Q

Abend

A

abnormal end to computer job; termination to a task prior to its completion. Because an error condition that cannot be resolve by recovery facilities while the task is executing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acceptable use policy(AUP)

A

Policy that establish an agreement between user and the enterprise and define for all parties’ the ranges of use that are approved before gaining access to a network or the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control

A

Process, rule, and development mechanisms that control access to information systems, resource and physical access to premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL - Access Control List

A

Internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Control Table

A

Internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access Method

A

Technique used for selecting records in a file, one at a time, for processing, retrieval or storage. Access method is related to, nut distinct from, the file organization, which determines how the records are stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Path

A

Logical route an end user takes to access computerized information. Typically, includes a route through the operating system, telecommunications software selected application software and the access control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access Rights

A

Permission / privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access server

A

Provides centralized access control for managing remote access dial-up service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

address

A

Within computer storage, the code used to designate the location of a specific piece of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

address space

A

The number of distinct locations that may be referred to with the machine address. For most binary machines, it is equal to 2n, where n is the number of bits in the machine address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Addressing

A

The method used to identify the location of a participant in a network. Ideally,
addressing specifies where the participant is located rather than who they are (name) or how to
get there (routing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Administrative Controls

A

The rules, procedures and practices dealing with operational

effectiveness, efficiency and adherence to regulations and management policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adware

A

A software package that automatically plays, displays or downloads advertising
material to a computer after the software is installed on it or while the application is being used.
In most cases, this is done without any notification to the user or without the user’s consent. The
term adware may also refer to software that displays advertisements, whether or not it does so
with the user’s consent; such programs display advertisements as an alternative to shareware
registration fees. These are classified as adware in the sense of advertising supported software,
but not as spyware. Adware in this form does not operate surreptitiously or mislead the user, and
provides the user with a specific service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Alpha

A

The use of alphabetic characters or an alphabetic character string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Alternative routing

A

A service that allows the option of having an alternate route to complete a
call when the marked destination is not available. In signaling, alternate routing is the process of
allocating substitute routes for a given signaling traffic stream in case of failure(s) affecting the
normal signaling links or routes of that traffic stream.

17
Q

Analog

A

Transmission signal that varies continuously in amplitude and time is generated in a wave formation. Analog singals are used in telecommunications

18
Q

Anonymous File Transfer Protocol (FTP)

A

method for downloading public files using the
File Transfer Protocol. Anonymous FTP is called anonymous because users do not need to
identify themselves before accessing files from a particular server. In general, users enter the
word “anonymous” when the host prompts for a username; anything can be entered for the
password such as the user’s email address or simply the word “guest.” In many cases, an
anonymous FTP site will not even prompt users for a name and password.

19
Q

Antivirus software

A

An application software deployed at multiple points in an IT architecture.
It is designed to detect and potentially eliminate virus code before damage is done and repair or
quarantine files that have already been infected.

20
Q

Applet

A

program written in a portable, platform independent computer language such as Java,
JavaScript or Visual Basic. An applet is usually embedded in a Hypertext Markup Language
(HTML) page downloaded from web servers and then executed by a browser on client machinesto run any web-based application (e.g., generate web page input forms, run audio/video
programs, etc.). Applets can only perform a restricted set of operations, thus preventing, or at
least minimizing, the possible security compromise of the host computers. However, applets
expose the user’s machine to risk if not properly controlled by the browser, which should not
allow an applet to access a machine’s information without prior authorization of the use

21
Q

Application

A

computer program or set of programs that perform the processing of records for
a specific function. Contrasts with systems programs, such as an operating system or network
control program, and with utility programs, such as copy or sort

22
Q

application controls

A

The policies, procedures and activities designed to provide reasonable
assurance that objectives relevant to a given automated solution (application) are achieved

23
Q

Application Layer

A

Open Systems Interconnection (OSI) communications model, the
application layer provides services for an application program to ensure that effective
communication with another application program in a network is possible. The application layer
is not the application that is doing the communication; a service layer that provides these
services.

24
Q

Application Program

A

program that processes business data through activities such as data
entry, update or query. Contrasts with systems programs, such as an operating system or network
control program, and with utility programs such as copy or sort.

25
Q

Application programming

A

act or function of developing and maintaining applications

programs in production

26
Q

Application programming interface (API)

A

set of routines, protocols and tools referred to
as “building blocks” used in business application software development. A good API makes it
easier to develop a program by providing all the building blocks related to functional
characteristics of an operating system that applications need to specify, for example, when
interfacing with the operating system (e.g., provided by Microsoft Windows, different versions
of UNIX). A programmer utilizes these APIs in developing applications that can operate
effectively and efficiently on the platform chosen.

27
Q

Application software tracing and mapping

A

Specialized tools that can be used to analyze the
flow of data through the processing logic of the application software and document the logic,
paths, control conditions and processing sequences. Both the command language or job control
statements and programming language can be analyzed. This technique includes
program/system: mapping, tracing, snapshots, parallel simulations and code comparisons

28
Q

Arithmetic logic unit (ALU)

A

The area of the central processing unit that performs

mathematical and analytical operations

29
Q

Artificial intelligence

A

Advanced computer systems that can simulate human capabilities, such
as analysis, based on a predetermined set of rules

30
Q

ASCII

A

Representing 128 characters, the American Standard Code for Information Interchange
(ASCII) code normally uses 7 bits. However, some variations of the ASCII code set allow 8 bits.
This 8-bit ASCII code allows 256 characters to be represented.

31
Q

Assembler

A

program that takes as input a program written in assembly language and
translates it into machine code or machine language

32
Q

Asymmetric key (public key)

A

cipher technique in which different cryptographic keys are

used to encrypt and decrypt a message (See public key encryption)

33
Q

Asynchronous Transfer Mode (ATM)

A

high-bandwidth low-delay switching and
multiplexing technology that allows integration of real-time voice and video as well as data. It is
a data link layer protocol. ATM is a protocol-independent transport mechanism. It allows highspeed data transfer rates at up to 155 Mbit/s.

34
Q

Asynchronous transmission

A

Character-at-a-time transmission