Term
|
Definition
■ Implement the “User” features that we established in the scope. ■ be designed to run on a pre-determined platform (Mac, Windows, iPhone) ■ =be planned as a Thick or Thin client. (whats the difference?) ● thick= itunes (has to download/update for constant use) ● thin= facebook (for everyday use, run off a browser, no updates necessary) ■ Designed first, Developed Later |
|
|
Term
|
Definition
| A tool used to establish guidelines for the developers to use while they create the interface. It is really an idea for a screen. Before you develop it, you need to identify what it is and what it will do. |
|
|
Term
|
Definition
| ■ Banner, Menu, Left Column, Right Column, Middle Work Area |
|
|
Term
|
Definition
○ System Design ○ Architecture of IS ○ Testing ○ Training ○ Documentation |
|
|
Term
|
Definition
- Allows you to have all of your visual information in front of you before you start building. 1.Collect the info you need 2.Group into pages 3.Plan the structure 4.Design the template 5.Test the template, structure, and pages |
|
|
Term
| Types of screens created in a Storyboard |
|
Definition
+ Add/ Edit Screen + View Detail Screen + List Screen + Portal Screen + Display Screen |
|
|
Term
| purpose of defining wireframes and storyboards |
|
Definition
| By defining wireframes and storyboards, the scope of the project can be understood by all the parties involved with the creation of the material. The Wireframe allows the designers to understand their direct tasks, while the Storyboard help the testing groups ensure the optimal functionality of the IS. |
|
|
Term
| How are wireframes and wireframe specifications created and used in the development of an IS |
|
Definition
| A graphic designer designs the webpage, generally associated with a wireframe and designates what said webpage will look and feel like. Wireframe is essentially the aesthetics of an IS. But it’s only a rough skeleton as shown below. |
|
|
Term
| What are the components of wireframes diagrams? |
|
Definition
| Wireframe diagrams are composed of a skeleton map of the desired location of each functionality group. Each box within the map represents the placement of a certain function. For example, a thin box running across the top of the page with the word “menu” within it is explaining that this is where the functioning menu will be placed. |
|
|
Term
|
Definition
| A structured collection of records or data that is stored in a computer system |
|
|
Term
|
Definition
| Structure is achieved by organizing the data according to a |
|
|
Term
|
Definition
Most common database model is the -consists of tables (files) |
|
|
Term
| Developers rely on Users to |
|
Definition
■ Tell them what they need to include in the Database ■ Check the Data Model ■ Verify the completeness and correctness of the final Data Model. |
|
|
Term
|
Definition
The smallest unit single students name, homework document or identification number. This usually consists of items referring to a single primary key. Made up of bytes/characters |
|
|
Term
|
Definition
| This is the first grouping that takes place |
|
|
Term
|
Definition
| This is the second organizational binding |
|
|
Term
|
Definition
| Refers to the primary identification that uniquely identifies each record within a Record/ Row. There is only one per Field/ Column. |
|
|
Term
|
Definition
| analyze existing reports; user activities |
|
|
Term
|
Definition
| a summary of the requirements for the database; a representation of the structure of the data to be incorporated into the database (like a blueprint). |
|
|
Term
|
Definition
| The definition of the number of instances that can be associated for each side of the relationship |
|
|
Term
|
Definition
| portrays an optional relationship |
|
|
Term
|
Definition
| portrays a mandatory one relationship |
|
|
Term
|
Definition
| refers to a mandatory many relationship |
|
|
Term
| Database Management System (DBMS) |
|
Definition
| Software used to create Databases. Ex. Access, MySQL, Oracle |
|
|
Term
|
Definition
| The rules defining how two tables interact or are connected with each other |
|
|
Term
|
Definition
| the primary key of connecting table |
|
|
Term
| Structured Query Language (SQL) |
|
Definition
| - international standard language for processing a database. This is the language that is used between a DBMS and a database |
|
|
Term
|
Definition
| a request for data from the database |
|
|
Term
|
Definition
| are the pieces of a larger file broken into smaller forms to ensure quality and timely transfer. |
|
|
Term
|
Definition
| Media Access Control Address. These are unique identifiers assigned to Network Cards (within the computer) that enable communication on the physical network segment. They are permanent, physical address given to each Network Interface Card (NIC) at the factory. |
|
|
Term
|
Definition
| used in private networks controlled by company that operates the network |
|
|
Term
|
Definition
| used on the internet by ICANN; each IP is unique across all computers |
|
|
Term
|
Definition
| A device that forwards Data Packets along the Internet. They understand where a request is coming from, and direct it to the next location. Traffic between networks. |
|
|
Term
|
Definition
| Transmitter Control Protocol/ Internet Protocol. These are rules and protocols that computers use to communicate with one another without encountering problems. This Protocol was originally used when the WWW first started. |
|
|
Term
|
Definition
series of steps: HTTP, PoP, PTP,FTP (shared language) The instructions to let me communicate. The steps taken to talk to other networks. -HTTP - websites -SMTP, PoP - email -FTP - file transfer protocol (downloading/uploading) |
|
|
Term
|
Definition
| A set of numbers that identify a certain location of data. |
|
|
Term
|
Definition
| are typicaly private addresses. These are usually not permanent. Generaly private. (Ex. Logging in through the restricted.utexas network) |
|
|
Term
|
Definition
| want to be known, public and shared. Any website usually has a permanent static webpage. Generaly Public. (ex. Utexas.edu) |
|
|
Term
|
Definition
| a digital networking communications method that groups all transmitted data into suitably-sized blocks |
|
|
Term
|
Definition
○ SSID broadcasting- disabling it makes access point to network connection invisible ○ User accounts ○ Encryption ○ MAC address filtering |
|
|
Term
| What are the three main pieces of Internet technology |
|
Definition
| routers, protocols, packets |
|
|
Term
|
Definition
| for smaller areas. Local area network, in a small place. connects computers and devices in a limited geographical area |
|
|
Term
| Network Interface Card (NIC) |
|
Definition
a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the use of MAC addresses. -Each has its unique id. This is written on a chip which is mounted on the card. |
|
|
Term
|
Definition
| It receives requests and remembers where to direct the responses back to the Clients. directs traffic within a network. |
|
|
Term
| Wireless Network Interface Card (WNIC) |
|
Definition
| allowing a computer to access wireless internet |
|
|
Term
|
Definition
| similar to LAN but covers wider area |
|
|
Term
| Virtual Private Network (VPN) |
|
Definition
| is a computer network which some of the links between nodes are carried by open connections or virtual circuits in some larger network( e.g., the Internet) instead of physical wires. Recreates privacy of computers connected by a cable. |
|
|
Term
|
Definition
| client=computer that makes a request. server=computer that responds to request |
|
|
Term
|
Definition
This software is accessed through a web browser and does not require any maintenance form the user. Ex. Facebook. -less functionality available to the user |
|
|
Term
|
Definition
| This software requires an effort from the user to download, install and update the software on the computer. Ex. iTunes. |
|
|
Term
|
Definition
| coded traffic. A scrambled message that is sent to keep the information safe. The only way to understand the message is if you know the code to break it.The message is understood by the use of a key that is understood to break the code. |
|
|
Term
|
Definition
| the most important aspect of a network with respect to security. It does not need every interaction or data transfer monitored by humans, as automated processes can be set up to assist in rejecting access request from unsafe sources, and allowing actions from recognized ones |
|
|
Term
|
Definition
■ Affected 11 million Americans in 2009 ■ Total damage in 2009 : $54 Billion ■ Total costs associated: $139 Billion |
|
|
Term
| Sources of Security Breaches |
|
Definition
○ Human error and mistakes (accidental) ○ Malicious human activity (intentional) ○ Natural events and disasters |
|
|
Term
| Unauthorized Data Disclosure |
|
Definition
| Can occur by human error when someone inadvertently releases data in violation of policy |
|
|
Term
|
Definition
| Understanding the chances that the information you provide may be stolen. |
|
|
Term
| Types of Security Threats |
|
Definition
○ Unauthorized data disclosure ○ Incorrect data modification ○ Faulty service ○ Loss of infrastructure |
|
|
Term
|
Definition
| occurs when a person gains unauthorized access to a computer system, to obtain critical data or to manipulate the system for financial gain. |
|
|
Term
|
Definition
| A hidden software within a network that collects all the information you request or send on entering the network. Usually a free Internet source, unguarded and easy to publicly access. |
|
|
Term
|
Definition
| an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. |
|
|
Term
|
Definition
| setting up a fake website that either looks like a legitimate online shopping website or masquerades as an existing, legitimate website |
|
|
Term
|
Definition
| recording traffic/intercepting computer communications, example in class was the email packets that could easily be read |
|
|
Term
|
Definition
| In which phase of the SDLC are wireframes typically created? |
|
|
Term
|
Definition
| A ________ physically connects computers at a single location |
|
|
Term
|
Definition
| piece of hardware processes a shared service, like sending a web page |
|
|