A
hyperlink is considered to be an
active hyperlink from the time a user presses and releases the mouse button when
clicking on the hyperlink. When designing a
Web page, you can choose a font color to represent active hyperlinks.
retrieved from: http://webopedia.internet.com/TERM/A/active_hyperlink.html
Administrator (as an IT resource)
Authentication
is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by
or about the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.
retrieved from: http://en.wikipedia.org/wiki/Authentication
Data Administrator
is a person who is responsible for the
environmental aspects of a database. The role of a database administrator has changed according to the technology of database management systems (DBMSs) as well as the needs of the owners of the databases. For example, although logical and physical database design are traditionally
the duties of a database analyst or database designer, a DBA may be tasked to perform those
duties.
retrived from: http://en.wikipedia.org/wiki/Database_administrator
Electronic Commerce
commonly known as e-commerce or eCommerce, consists of the buying and selling of
products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage. A wide variety of
commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.
retrieved from: http://en.wikipedia.org/wiki/Electronic_commerce
Electronic Government (eGovernment)
(short for electronic government, also known as e-gov, digital government, online government or transformational government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses, and other arms of government.
retrieved from: http://en.wikipedia.org/wiki/E-Government
Encryption
is the process
of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
retrieved from: http://en.wikipedia.org/wiki/Encryption
Information
Technology
as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware." IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.
retrieved
from: http://en.wikipedia.org/wiki/Information_technology
Information Technology Resource (IT Resource)
A resource used for electronic storage,
processing or transmitting of any data or information, as well as the data or information itself. This definition includes
but is not limited to electronic mail, voice mail, local databases, externally accessed databases, CD-ROM, recorded magnetic
media, photographs, digitized information, or microfilm. This also includes any wire, radio, electromagnetic, photo optical,
photo electronic or other facility used in transmitting electronic communications, and any computer facilities or related
electronic equipment that electronically stores such communications.
retrieved from: http://www.utahsbr.edu/policy/r345.htm
Intellectual property
rights (IPR)
are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property
law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and
words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.
retrieved from: http://en.wikipedia.org/wiki/Intellectual_property
ISO
ISO is the world's leading developer of International Standards
with a current portfolio of more than 17 800. In recent years, ISO has largely moved from paper-based processes for the
development of standards to electronic ones. This system now covers an array of diversified electronic and Web-based operations
including the ISO Web site, servers for accessing and exchanging information, an electronic balloting system and a Web store.
retrieved from: http://www.iso.org/iso/pressrelease.htm?refid=Ref1200
Malicious Code
is
a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast
to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications.
retrieved from: http://www.aladdin.com/csrt/malicious-code.aspx
Malware (virus) Detection Software
a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying
software or program code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
retrieved from: http://en.wikipedia.org/wiki/Malware
Patch
is a Unix program that updates text files according to instructions contained in a separate file, called a patch file. The patch file
(also called a patch for short) is a text file that consists of a list of differences and is produced by running the
related diff program with the original and updated file as arguments. Updating files with patch is often referred to as applying the
patch or simply patching the files.
reterieved from: http://en.wikipedia.org/wiki/Patch_(Unix)
Personal
IT Resources
Purge
is the removal of people who are considered
undesirable by those in power from a government, from another organisation, or from society as a whole. Purges can be peaceful or violent; many will end with the imprisonment or exile of those purged, but in some cases they will simply be removed from office. Restoring people who have been purged is known
as rehabilitation.
retrieved from: http://en.wikipedia.org/wiki/Purge
Remote Access
Pertaining to communication with a data processing facility from a remote location or facility through a data link. One of the more common methods of providing this type of remote access is using a VPN.
retrieved from: http://en.wikipedia.org/wiki/Remote_access
Social
Engineering
is the act of manipulating people into performing actions or divulging confidential information. While similar to
a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud or computer system access;
in most cases the attacker never comes face-to-face with the victim.
retrieved
from: http://en.wikipedia.org/wiki/Social_engineering_(computer_security)
Spoofing
is a situation in which one person or
program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
retrieved from: http://en.wikipedia.org/wiki/Spoofing_attack
Strong Encryption
UserID
users are identified within the kernel by an unsigned integer value called a user identifier, often abbreviated to UID or User ID. The range of its values varies
amongst different systems; at the very least, a UID is a 15-bit integer, ranging between 0 and 32767, with the following restrictions:
- The superuser must always have a UID of zero (0).
- The user "nobody" was traditionally assigned the largest possible UID (as the opposite of the Superuser), 32767. More recently, the user is
assigned a UID in the system range (1–100, see below) or between 65530–65535.
- UIDs from 1 to 100 are otherwise reserved for system use by convention; some manuals recommend that UIDs from 101 to 499
(RedHat) or even 999 (Debian) be reserved as well.
retrieved from: http://en.wikipedia.org/wiki/User_identifier_(Unix)