1.
NET Framework
The NET Framework is a software
framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions
to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for
the framework. The NET Framework is a key Microsoft offering and is intended to be used by most new applications created for
the Windows platform.
2. Active Server Pages (ASP)
It is also known as Classic ASP, was
Microsoft's first server-side script engine for dynamically-generated web pages. Initially released as an add-on to Internet Information Services (IIS) via the Windows NT 4.0 Option Pack, it was subsequently included as a free component of Windows Server
(since the initial release of Windows 2000 Server).
Developing rich functionality in ASP websites is enabled by the active scripting engine's support of the Component Object Model (COM), with each object providing a related group of frequently-used functions and data attributes. In ASP 2.0 there were six built-in objects: Application, ASP Error, Request, Response, Server, and Session. Session, for example, is a cookie-based session object that maintains the state of variables from page to page. Functionality is further extended by objects which, when instantiated, provide access to
the environment of the web server; as an example File System Object (FSO) is used to create, read, update and delete files.
3. Access
Microsoft Office Access, previously known
as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. It is a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows and also sold separately. There
is no version for MacOS or for Microsoft Office Mobile.
Access stores data in its own format based on
the Access Jet Database Engine. It can also import or link directly to data stored in other Access databases, Excel, Share Point lists, text, XML, Outlook, HTML, dBase, Paradox, Lotus
1-2-3, or any ODBC-compliant data container including Microsoft SQL Server, Oracle, MySQL and PostgreSQL. Software developers and data architects can use it to develop application software and non-programmer "power users" can use it to build simple applications. It supports some object-oriented techniques but falls short of being a fully object-oriented development tool.
4. Access privileges
Component
access privileges define the actions you can perform on components. By default, you are granted the highest level of access,
Manage, on any component you create. The Action column of the Oracle Portal
Navigator indicates the actions you can perform on the component.
To
build a component, you must have Edit or higher privileges in a provider that will own the finished component. The component
by default inherits privileges from the provider. For example, after a component is created in MY_APP, all Oracle Portal developers
with Execute or higher access privileges on MY_APP can run the component. Component owners can override these privileges and
set access on a user by user level rather than the provider level.
5. Active Hyperlink
A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when
clicking on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.
6. Administrator
7. Authentication
Authentication is the act of establishing or
confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might
involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.
8. Data Administrator
A database
administrator (DBA) is a person who is responsible for the environmental
aspects of a database. The role of a database administrator has changed according to the technology of database management systems (DBMSs) as well as the needs of the owners of the databases. For example, although logical and physical database designs
are traditionally the duties of a database analyst or database designer, a DBA may be tasked to perform those duties.
Data administrator is a person who coordinates activities within the data administration
department? It is same as "database analyst."
9. Electronic commerce
Electronic commerce commonly known as e-commerce or eCommerce consists
of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. A
wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies
such as e-mail as well.
A large percentage of electronic commerce is
conducted entirely electronically for virtual items such as access to premium content on a website, but most electronic commerce involves the transportation
of physical items in some way. Online retailers are sometimes known as e-tailers
and online retail is sometimes known as e-tail. Almost all big retailers have
electronic commerce presence on the World Wide Web.
Electronic commerce is generally considered
to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.
10. E-governance
A definition that covers every aspect of government.
This is a broad definition covering the different aspects of relations between
the state and civil society. The Council of Europe is currently considering a recommendation which will offer a common vision of how
digital technology can be incorporated into exercise of power. Aware of the risks entailed in these technologies, the Council
reaffirms the need to strengthen democratic institutions and processes and to involve the public in political choices so that
their needs and priorities are respected. In this connection, governments must ensure that they involve the whole population,
in particular by ensuring that the largest possible numbers of citizens are educated in the use of computers.
11. Encryption
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography,
referred to as cipher text). In many contexts, the word encryption also implicitly
refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make
it unencrypted).
Encryption has long been used by militaries
and governments to facilitate secret communication. Encryption is now used in protecting information within many kinds of
civilian systems, such as computers, storage devices (e.g. USB flash drives), networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encryption is also used in digital rights management to prevent unauthorized use or reproduction of copyrighted material and in software also to protect against
reverse engineering.
12. Information technology
IT as defined by the Information Technology Association
of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.
Today, the term information technology has ballooned
to encompass many aspects of computing and technology, and the term has become very recognizable. The information technology
umbrella can be quite large, covering many fields. IT professionals perform a variety of duties that range from installing
applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems.
13. Information technology resources
Information
technology resources include, but are not limited to, all university-owned computers, applications software, systems software,
databases, and peripheral equipment; the data communications infrastructure; the voice communications infrastructure; UB voice
or data network traffic, including traffic entering and leaving the University network; classroom technologies; communication
services and devices, including electronic mail, voice mail, modems, and multimedia equipment. The components may be
stand-alone or networked and may be single-user or multi-user systems. Some university computing resources are reserved
or dedicated to specific functions that may limit their use by the general UB community. Personal devices used to access
University of Baltimore Information
Technology resources are subject to this policy.
14.
Intellectual property Rights
Intellectual property Rights (IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property
law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and
words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.
The majority of intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form
of temporary monopoly. While credited with significant contributions to modern economic growth, some have criticized the expansion
in nature and scope of IP laws.
Although many of the legal principles governing
intellectual property have evolved over centuries, it was not until the late 20th century that the term intellectual property
began to be used as a unifying concept.
15. I.S.O.
An ISO image is an archive file (also known as a disk image) of an optical disc in a format defined by the International Organization for Standardization (ISO). This format is supported by many software vendors. ISO image files typically have a file extension of .ISO but Mac OS X ISO images often have the extension .CDR. The name ISO is taken from the ISO 9660 file system used with CD-ROM media, but an ISO image can also contain UDF file system because UDF is backward-compatible with ISO 9660.
16.
Malicious Code
Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled
by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause
damage, vandals are auto-executable applications.
17. Malware
(virus) Detection Software
Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional
antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals
are auto-executable applications.
18. Patch
Patch is a Unix program that updates text files according to instructions contained in a separate file, called a patch file.
The patch file (also called a patch for short) is a text file that consists of a list of differences and is produced
by running the related diff program with the original and updated file as arguments. Updating files with patch is often referred to as applying
the patch or simply patching the files.
19. Personal IT Resources
20. Purge
In history and political science, a purge is the removal of people who are considered undesirable
by those in power from a government, from another organization, or from society as a whole. Purges can be peaceful or violent; many will end with
the imprisonment or exile of those purged, but in some cases they will simply be removed from office. Restoring people who have been purged
is known as rehabilitation.
21. Remote Access
In telecommunication, the term remote access has the following meanings:
- Pertaining to communication with a data processing facility from a remote location or facility through a data link. One of the more common methods of providing this type of remote access is using a VPN.
- A PABX service feature that allows a user at a remote location to access by telephone PABX features, such as access to Wide Area Telephone Service (WATS) lines.
- Remote Access is also the name of a DOS-based BBS software.
Remote access can refer to remote desktop, remote
terminal (like telnet) or any type of remote application (including remote browser).
Note: For remote access,
individual authorization codes are usually required.
22. Social engineering
In computer security, social engineering is a term that describes a non-technical
kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security
procedures. A social engineer runs what used to be called a "con game". For example, a person using social engineering to
break into a computer network would try to gain the confidence of someone who is authorized to access the network in order
to get them to reveal information that compromises the network's security. They might call the authorized employee with some
kind of urgent problem; social engineers often rely on the natural helpfulness of people as well as on their weaknesses. Appeal
to vanity, appeal to authority, and old-fashioned eavesdropping are typical social engineering techniques.
23. Spoofing
Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use
the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address
is only used by the destination machine when it responds back to the source.
A
common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line,
sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected,
meaning you cannot create a normal network connection.
24. Strong Encryption
25. User Identification Device
User Identification Device is a unique name given to a user for accepting a computer system, database, mailbox, etc. Coupled with a password, it provides a minimal level of security. It is also called username.