index

7
Index .net, 133 1:1, 271, 273, 278 1:many, 270, 273 1984 (novel), 238 2D array, 137 3GL (third generation language), 95, 96, 97, 102, 209 4GL(fourth generation language), 209 A abstract networks, 174 abstraction barrier, 41 access point (AP), 201 access router, 197 accumulator, 181 activation value, 349 activator, 349 actuator, 356 adventure games, 299 adware, 148, 327 aesthetics, 161 affordance, 45 AI (artificial intelligence), 332, 334, 359 AI (definition), 335 AI areas of study, 335 AI languages, 336 Aibo, 358 aim, 152, 156, 307, 312 algorithm, 65, 70, 98, 101, 108 algorithm call, 124 alias (SQL), 229, 230 alpha testing, 153 alternative architecture, 180 alternative reference mode, 256 analogue, 176 analytical approach, 65 and (logic), 109, 214 anti-malware, 25, 149 anti-phishing, 326 API (application programming interface), 25 append, 143 application service provider (ASP), 190 applications, 189 arguments (subroutine), 124 Aristotolean logic, 364 arithmetic and logic unit (ALU), 182 arithmetical operators (SQL), 226 arity, 278 arrays, 135, 143 artificial neural networks (ANNs), 180, 336, 357, 365 artificial neurons, 348 ASCII code, 143, 178 A.S.I.O., 239 Asimov, Issac, 358 assembler language, 95 assignment, 72, 98, 136, 143 assumptions, 152, 156, 288, 299, 307, 311 asynchronous transfer mode (ATM), 202 attributes, 341 attribution (CC-BY), 87 aural deficiencies, 38 Australian Bureau of Statistics (ABS), 239 Australian Copyright Act, 80 Australian Customs Service (ACS), 57 Australian Information Industry Association, 83 automation, 206 Autonomous Guided Vehicle (AGV), 356 autonomy, 37 avatar, 299, 303 axon, 357 B back propagation, 350 backdoor, 148 backup, 24, 25, 81, 149, 186, 192, 198 beta testing, 153, 166 Big Brother, 238 binary relationship, 258 binary values, 178 binary files, 146 biometrics, 57 BIOS (basic input output system), 183 bit torrent, 87 bits, 178 blackmail, 26 BLAN (bridged LAN), 196 blobs, 182 blogs, blogging, 297 blog storm, 298 blogroll, 298 Bluetooth, 202 Blu-Ray (BR), 185 boolean variable, 120 bot master, 159 botnet, 148 bots, 23 breadth first spanning algorithm, 19 bridge, 196 brute force logic, 365 bubble sort, 140 buddy list, 297 bug, 75 burning (CD/DVD), 186 burning in neural pathways, 348 bus (data), 179 Business Software Alliance, 83 button, 44 button mashing, 65 bytes, 178 C cabling, 200 cache, 184 call (subroutine), 73, 124 camel case, 106 candidate key, 276, 277 carding, 325 cartesian product, 229, 231 case based logic, 364 © Kevin Savage 2011 – Single user licence issued to Mitchell Ingall

Upload: mitchell-ingall

Post on 20-Jul-2016

214 views

Category:

Documents


2 download

TRANSCRIPT

Index

.net, 133 1:1, 271, 273, 278 1:many, 270, 273 1984 (novel), 238 2D array, 137 3GL (third generation language), 95, 96, 97, 102, 209 4GL(fourth generation language), 209

A abstract networks, 174 abstraction barrier, 41 access point (AP), 201 access router, 197 accumulator, 181 activation value, 349 activator, 349 actuator, 356 adventure games, 299 adware, 148, 327 aesthetics, 161 affordance, 45 AI (artificial intelligence), 332, 334, 359 AI (definition), 335 AI areas of study, 335 AI languages, 336 Aibo, 358 aim, 152, 156, 307, 312 algorithm, 65, 70, 98, 101, 108 algorithm call, 124 alias (SQL), 229, 230 alpha testing, 153 alternative architecture, 180 alternative reference mode, 256 analogue, 176 analytical approach, 65 and (logic), 109, 214 anti-malware, 25, 149 anti-phishing, 326 API (application programming interface), 25 append, 143

application service provider (ASP), 190 applications, 189 arguments (subroutine), 124 Aristotolean logic, 364 arithmetic and logic unit (ALU), 182 arithmetical operators (SQL), 226 arity, 278 arrays, 135, 143 artificial neural networks (ANNs), 180, 336, 357, 365 artificial neurons, 348 ASCII code, 143, 178 A.S.I.O., 239 Asimov, Issac, 358 assembler language, 95 assignment, 72, 98, 136, 143 assumptions, 152, 156, 288, 299, 307, 311 asynchronous transfer mode (ATM), 202 attributes, 341 attribution (CC-BY), 87 aural deficiencies, 38 Australian Bureau of Statistics (ABS), 239 Australian Copyright Act, 80 Australian Customs Service (ACS), 57 Australian Information Industry Association, 83 automation, 206 Autonomous Guided Vehicle (AGV), 356 autonomy, 37 avatar, 299, 303 axon, 357

B back propagation, 350 backdoor, 148 backup, 24, 25, 81, 149, 186, 192, 198 beta testing, 153, 166

Big Brother, 238 binary relationship, 258 binary values, 178 binary files, 146 biometrics, 57 BIOS (basic input output system), 183 bit torrent, 87 bits, 178 blackmail, 26 BLAN (bridged LAN), 196 blobs, 182 blogs, blogging, 297 blog storm, 298 blogroll, 298 Bluetooth, 202 Blu-Ray (BR), 185 boolean variable, 120 bot master, 159 botnet, 148 bots, 23 breadth first spanning algorithm, 19 bridge, 196 brute force logic, 365 bubble sort, 140 buddy list, 297 bug, 75 burning (CD/DVD), 186 burning in neural pathways, 348 bus (data), 179 Business Software Alliance, 83 button, 44 button mashing, 65 bytes, 178

C cabling, 200 cache, 184 call (subroutine), 73, 124 camel case, 106 candidate key, 276, 277 carding, 325 cartesian product, 229, 231 case based logic, 364

© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall

Leading Technology 384

case selection, 114 CAT5 (category 5) cable, 200 charged coupled device (CCD), 184 CD (compact disc), 185 cell (relational table), 19 centralised data, 195 certainty factor, 339 change log, 300 changing workplace, 206 channel pollution, 202 channels, 296 char type, 102, 114 character handling, 143 checks and balances, 27 Chinese room, 362 choke point, 339 circumvention devices, 81 clause (SQL), 211 client-server, 194 clustering, 180, 187 coaxial STP, 201 Codd, E. F, 17 code, 71 cognition, 366 cognitive difficulties, 38 collapsed entity, 258 Collection Limitation Principle, 236 colour, 53 colour blind, 54 columns, 19 combination key, 276 comments, 76, 104 comment out, 105 commercial monopoly, 131 commercial piracy, 83 Commonwealth Privacy Act (1988), 236 compiler, compiled program, 95 composite key, 279 compression algorithm, 86 computer worm, 148 concatenation, 102, 143 conceptual database, 13 conceptual information processor (CIP), 13 conceptual schema (CS), 13, 248, 255, 303, 315 conceptual schema design process, 286 conceptual view, 13 conceptualisation phase, 312 conclusion, 341 conditions, 109, 117, 213 confidence factor, 339

confidentiality, 12, 198 connectionism, 348 consistency, 36, 52, 161 constants, 104, 127 constraints, 313, 316 content management system (CMS), 88 contention protocol, 200 context sensitive help, 189 contrast, 52, 53 control unit, 181 convergence, 351 cookie, 328 copy restrictions, 24 copyright, 23, 80, 198 Copyright Amendment Act 2000, 81 copyright controls, 82 core memory, 178 cost of development barrier, 131 cost of information, 22 cost-benefit analysis, 310 count (SQL), 226 crackers, 82 create table (SQL), 218 CPU (central processing unit), 181 Creative Commons (CC), 87 credit rating, 22 criteria, 4 cross join, 231 CS diagram, 288, 313 cultural influences, 38 customise interface, 189 cyber-communities, 296 cyber-vandals, 327

D digital audio tape (DAT), 186 data, 8, 13 data abuse, 25 data dictionary, 24, 308, 315, 317 data diddling, 23 data flow diagram (DFD), 304, 308, 312 data integrity, 25 data loss, 246 data merging, 27 data mining, 23 data misuse, 25 Data Quality Principle, 236 data sharing, 27 data storage, 25 data structures, 17 data theft, 23, 26 database integrity, 20

database management system (DBMS), 13, 24 DDE cycle, 2, 205 DDR SDRAM, 184 debugging, 76, 153 decision matrix, decision tree, 341 declaration, 71, 103 declarative language, 209 declaring array, 138 decryption, 144 dedicated server, 194 deductive logic, 364 definite iteration, 116, 121 defragmentation, 193 degrees of freedom, 355 delete from command (SQL), 217 demo version, 83 dendrite, 347, 348 denial of service (DoS) attack, 327 depth-first spanning algorithm, 18 derived entity/fact, 268, 288, 315 Descarte, René, 367 design devices, 44 design phase, 153, 158 design principles, 161 design process, 50 desktop computer, 187 device specification, 308, 313, 317 digital, 176 digital certificate/signature, 81 DIMM (double inline memory module), 184 disc storage, 185 distinct operator (SQL), 212 distributed computing, 180 distributed denial of service (DDoS) attack, 327 distributed processing, 18, 192 Djikstra, Edsger, 96 DNA matching, 56, 57 DNS (domain name system), 201 do loop, 121, 160 document holder, 58 documentation, 4, 5, 76, 103, 105, 154, 161, 167, 309, 320 double strong constraint, 271 drive-by download, 150 dualism, 366 dummy key, 253 DVD (digital versatile disc), 185 dynamic declaration, 103

E economy of scale, 131

© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall

Index 385

electrically powered robots, 355 electro chemical signal, 347 electronic junk mail, 323 electronic trail, 57 electronic watermark, 81 elementary fact, 249, 314 elementary sentence, 250, 251, 255, 287, 313, 314 element (page), 50 elements (algorithm), 72 ELIZA, 359 email attachment, 149 emulation software, 191 encryption, 24, 82, 144, 202 end effector, 356 end user, 152, 309 Enigma code, machine, 22, 23 entity, 250, 251, 255, 313 entity constraint, 282 environment, 59 eof (end of file) function, 146 epicondylitis, 60 equality constraint, 283 equijoin, 231 ergonomics, 58 error, 75, 103 error free, 36 error value, 351 Ethernet, 200 EULA (end user license agreement), 37, 326 eureka experience, 65 evaluation, 4, 153, 167, 308, 319 excise, 37 excitory inputs, 347 exclusion constraint, 284 expert system, 335, 337 expert system model, 338 expert system shell, 338 expert user, 33 external documentation, 154 external HDD, 148, 185 external uniqueness, 283 external view, 12

F face recognition, 55, 56 Facebook, 297 fast ethernet, 201 fault tolerant, 36, 347 feature creep, 190 Federal Bureau of Investigation (FBI), 26 Federal Privacy Commissioner, 236

feed forward ANN, 349 feedback, 37, 161 field, 20 field programmable gate array (FPGA), 180 file handling, 146 file hosting network, 87 file maintenance, 192 file server, 194 file sharing, 87 finger based interface, 43 fingerprint reader, 56 fingerprinting, 55 firewall, 24, 149, 188 first normal form (1NF), 277 flag, 141 flat-file database, 243 flexibility, 37, 163 floating point numbers, 102, 178 floating point unit (FPU), 181 flow chart, 99, 153 flow through facility, 197 folders, 44 font, 53 for loop, 121 foreign key, 279 forgiveness, 37, 161 formal evaluation, 4, 154 formalisation, 308, 313, 317 fourth generation language (4GL), 209 frame based logic, 365 fraud, 23, 149 free and open source software (FOSS), 88 free to play (F2P), 83 Freedom of Information Act (FOI), 236 frequency constraint, 282 friending, 297 from clause (SQL), 211 functionalists, functionalism, 335, 362, 367 functions, 97, 98 fuzzy logic, 339, 351, 364

G game moderator, 299 game playing, 336 geek, 33 general problem description, 152, 156, 307, 309 general purpose application, 189 gesture interface, 43

gigabit ethernet, 201 gigabyte, 178 global declaration, 127 global scope, 126 global variable, 126, 127 goal-focussed, 34 GPU (graphics processing unit), 182 graceful degradation, 352 graphics tablet, 43 group by clause (SQL), 226 grouping (page layout), 51 GUI (graphical user interface), 41

H hackers, 23, 27, 327 hand scanning, 55 hand/finger geometry, 56 hard disc drive (HDD), 185 hard wired, 179 hardware, 11, 173 harmony (page layout), 52 having clause (SQL), 226 header information (packet), 197 help system, 309 heuristics, 66, 338, 339, 351 hidden layer (ANN), 350, 351 hierarchical information system, 15 hierarchical tree, 16 high level language, 95 Hoover, J. Edgar, 26 hot swap, 186 hotspot, 201 humanists, 364 hydraulically powered robots, 355 HyperCard, 42 hyperlink, 42, 300

I I/O unit, 181 IBM, 16, 17, 131, 202 icon, 41, 45 idealism, 366 identity theft, 23, 325 idiom, 45 IEEE 802.11 protocol, 201 if statement, 108 if...then...else selection, 113 IM (instant messaging), 297, 299 implicit declaration, 103 indefinite iteration, 116 indentation, 109, 113, 117, 154, 221 inductive logic, 364 industrial espionage, 22, 23 inference, 364

© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall

Leading Technology 386

inference engine, 338 infinite loop, 117 Information Literacy Cycle, 6, 242, 330 information manager, 23 information system, 11 information system design, 303 Information System Development Cycle, 6, 307 information system manager, 23 inhibitory inputs (neuron), 347 initialising variable, 117 inline comment, 104 input, 98 input and output requirements, 308, 312 input connectors (ANN), 339 input layer (ANN), 350 instance, 19, 251 integer type, 114, 121 integrated circuit, 181 integrity, 21 integrity of data, 24 intellectual property (IP), 23, 80, 87 intelligence, 332, 334 intent error, 76 interaction design, 31 interactionists, 366 interactive devices, 308, 313, 318 interconnectivity, 174 interface, 11, 36, 41, 49, 174 intermediate user, 33 internal documentation, 76, 103, 105, 109, 154 internal view, 13 International Electrotechnical Commission (IEC), 178 internet abuses, 323 interpreted program, 95 intuitive, 36 invoke, 73, 124 IP (internet protocol), 197, 201 IPX/SPX protocol, 202 IRC (internet relay chat), 296 ISP responsibilities, 81 iris recognition, 55, 56 iteration, 96, 116-21, 127

J join, 228, 229 joyrider, 23

K key field, 20, 253, 274, 289 keyboard, 58 keylogger, 148, 327 kilobit, 178 kilobyte, 178 knowledge, 9 knowledge acquisition bottleneck, 339 knowledge base (KB), 337 knowledge engineer, 339

L label, 251, 255 LAN (local area network), 197, 196 LAN segment, 196 laptop, 187 last in - first out (LIFO), 128 lead-through programming, 354 left outer join, 231 left-handedness, 38 level 1 cache, 181, 184 level 2 cache, 181, 184 library (subroutine), 124 lighting, 59 limits to miniaturisation, 179 Linden dollar L$, 300 Linux, 88, 149 literal (text), 71, 98, 143 load array, 136 local scope, 99 local variable, 99, 100 lock-in effect, 132 logic error, 76 logical abstraction, 243 logical operators, 109 logical view, 13, 15, 20 logicists, 364 look and feel, 84 loop counter, 121, 138 loops, 313, 217 low level language, 95 lumbar support, 58

M machine code, 41, 95 magnetic bubble memory, 184 mailing list, 22, 26, 27 main memory, 183 mainframe computer, 187, 191 malware, 148 mandatory constraint, 281 many:1, 270, 273, 278

many:many, 270, 274, 278 map specification, 71, 151 master-slave, 202 materialism, 366 meaningful variable identifier, 76, 105-6 megabyte, 178 menu design, 308, 313, 318 menu driven interface, 42 menu structure, 319 metacontext, 9 metaphor, 44 methods, 124 microblogging, 298 Microsoft, 89, 131 Microsoft monopoly, 131 Microsoft Office, 179 microtransaction, 83 millisecond, 184, 192 mind-body problem, 366 mini computer, 187 Minsky, Marvin, 334, 362 minimal latency, 197 mirrored drives, 186 MMORPG, 299 mobile robot, 356 modem, 177 modem/router, 197 moderated channel, 296 modular programming, 163 module testing, 163, 166 modules, 73, 126-7, 156, 158, 163 monopoly, 131 Moore’s Law, 176 motherboard, 182, 184 Moving Pictures Expert Group (MPEG), 86 mp3, 86 MS-DOS, 42 multiblogger, 288 multicasting, 197 multidimensional array, 137 multiplexing, 196 multitasking operating system, 192 multiuser access control, 25 multiuser operating system, 191 MySpace, 297

N naming conventions, 105 naming variables, 105 nanosecond, 183, 184, 192 Napster, 86 n-ary relation, 258

© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall

Index 387

Nassi–Shneiderman (NS) diagram, 99, 109, 115, 119, 121, 153 NAT (network address translation), 197 national broadband network (NBN), 180, 200 natural inner join, 231 natural language, 335 natural language processing, 351 necessity dot, 283 nested if selection, 113 nested relationship, 261, 275 nested ternary, 314 network attached storage (NAS), 186 network cabling, 199 network effect, 131 network file maintenance, 196 network information system, 17 network management, 198 network protocol, 199 network security, 198 network storage, 186 networking, 11, 194 neuromodulators, 347 neuron, 180, 347-9, 362, 366 neurotransmitters, 347 newbies, 32 NIC (network interface card), 199 no derivative works (CC-ND), 88 node, 16, 194, 196, 199, 201, 349 noise, 59 non-commercial (CC-NC), 88 non-English speakers, 33 non-invasive, 56 non-monotonic logic, 364 normalisation, 277, 316 normalised, 249 normalised relations, 308, 313 normalised tables, 313, 317 not (logical), 216 not null, 282 notebook computer, 187 null, 20

O object code, 95 object oriented (OO) database, 18 object-relational database, 18 obsolescence, 182 occupational health and safety, 61 occupational overuse syndrome (OOS), 60 OECD Privacy Principles, 236 on-demand software, 190

ONF (optimal normal form), 20, 244, 246, 277, 279 ONF tables, 313 ongoing evaluation, 4, 153 on-line games, 299 on-line help, 36 open source software (see also FOSS), 87, 88 operating system, 190 operationalist, 368 ops (channel moderator), 296 optical centre, 52 optical disc, 185 optical fibre, 190 optical storage, 185 optimised, 95 optimising systems, 18 or (logic), 109, 214 order by clause (SQL), 224 ordinal type, 114, 121 Orwell George, 238 output, 98 output connector (ANN), 349 output report, 317 overflow error, 128 ownership of data, 57

P packet, 195, 201 packet header, 195 packet switching, 195 packet tail, 195 packet-based protocol, 202 page tab, 45 palmtop computer, 186 parallel distributed processing, 348 parallel processing, 180, 192 parameters, 124-5, 127 parent node, 17 PARRY, 360 passed by reference, 125 passed by value, 125 password, 56 patent, 84 pattern matching program, 359 pattern recognition, 351 payload (virus), 148 PDA (personal digital assistant), 186 peer-to-peer (P2P), 82, 87, 194, 195 pen based computing, 43 peripheral, 194 personal area network (PAN)., 202 personnel management, 172 pharming, 325

phenomenalists, 366 phishing, 325 phone phreaking, 325 photo-reactive dye, 186 physical network, 174 physical security, 24 physical view, 13 piconet, 202 pipelining, 179 pirating, 82 platter (disc), 185 polling (in multiuser OS), 191 Polya, George, 151 pop-ups (web page), 149 portability, 95, 127, 163 portable language, 95 post-tested iteration, 117-9 posture, 58 power source, 355 presence awareness, 297 presentation, 304 pre-tested iteration, 117-9 primary key, 274, 277 privacy, 23, 57, 235, 297, 327 privacy principles, 236 problem solving, 64, 151 problem specification, 71 procedural language, 209 procedure call, 72 procedures, 124-5, 127 process, 5, 304 processing environment, 173 processor, 181, 183 profile, 22, 23, 25, 57, 297 prognosis system, 18 program model, 33, 44, 49 program suite, 189 programming constructs, 96 programming language, 94 projection, 212 protocol, 197 pseudocode, 71, 94, 97-9, 102, 108-10, 113-4, 117-8, 121, 159, 381 pseudocode comment, 105 pseudocode compiler, 381 public domain, 80 public timeline (Twitter), 298 Purpose Specification Principle, 236

Q QIC (quarter inch cartridge), 186 quality of service (QoS), 198 quantum computer, 180 quaternary relation, 258, 262

© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall

Leading Technology 388

Queensland Workplace Health and Safety Act, 61 query, 211

R RAID (redundant array of inexpensive discs), 186 RAM (random access memory), 183 RAM module, 184 random file, 146 rapid application development, 50 rationale for development, 152, 156, 307, 310 rationalists, 366 read/write head, 185 real variable type, 102 receding horizons effect, 363 record type, 142 recursion, 127-8 reduced instruction set computer (RISC), 180 redundancy, 206, 244, 245 reference mode, 250, 251, 255 referential integrity, 24 registers, 181 relational algebra, 17, 209, 212 relational information system, 17, 19, 247 relationships, 251, 255 remote applications, 190 repeat loop, 117 repeater, 197 report layout, 308 required field, 284 reserved word, 105 resolution, 52 rest periods, 59 restore data, 192 results-oriented user interface, 43 retinal scanning, 55, 56 reverse chronological order, 298 reverse engineer, 65, 83 revision history, 300 RF (radio frequency), 240 ribbon interface, 42 right of first digitisation, 81 right outer join, 231 rights management information (RMI), 81 robotics, 335, 354 roles, 251, 255 ROM (read only memory), 183 root node, 16 rootkit, 148

router, 197 row, 19 RPG (role playing game), 83 RSI (repetitive strain injury), 60 rule based expert system, 18, 337 rule interpreter, 338 runtime error, 76

S safety officer, 61 same table join, 230 sample input, 350 scope, 99, 100 screen layout, 58, 153, 161, 308, 318 script, 95, 148 Searle, John, 362 Second Life, 299 secondary cache, 183 secondary key, 275 secondary memory, 184 security, 12, 21, 25, 56, 172, 195, 304 segment address, 201 select clause (SQL), 211 select columns (SQL), 212 selection, 96-7, 107-10 sensor, 356 sequence, 70, 96, 98-100 sequential file, 146 server, 187 share alike (CC-SA), 88 shareware, 83, 87 shell, 339 signal interference, 201 signature recognition, 56 significant sample, 248 silicon chip, 181 simple bridge, 196 simulation, 18 single character wildcard, 216 single strong relationship, 270, 273 single table database, 244 skip, 72, 73, 109 smart bridge, 196 smartcard, 240 social engineering, 149, 325 social networking, 296, 297 software, 11, 64, 173, 189 software controls, 23 software development cycle, 6, 151, 154, 162 software interface, 43 software license, 81 software logger, 327

software monopoly, 104 software piracy, 81 solid state drive (SSD), 185 sorting, 140-2, 224 source code, 95 spam, 324, 326 spambot, 325 spanning tree algorithm, 197 special purpose application, 189 specification, 152, 156, 163 specification documentation, 309 spoofing, 324 spot colour, 54 spyware, 148, 149, 326 SQL functions, 225 SQL syntax, 211 stack, 128 standalone computer, 194 standalone operating system, 191 stealth blocking, 324 storage area network (SAN), 186 STP (shielded twisted pair), 200 streaming video, 200 string, 102-3 string handling, 143-4 strong AI, 335, 362 structuralists, 364 structure chart, 99, 153, 158 structured programming, 73, 124, 156, 162, 163 subquery, 219 subroutine, 124-6, 163 subset, 283 subtype, 284 super computer, 187 surplus entity, 265, 288, 315 swapping values, 125, 140 switch (network), 197 synapse, 347 synaptic gap, 348 syntax, 211 syntax error, 76 system, 11 system bus, 182 system manager, 23, 24 system owner, 309 system parts, 172 system security and integrity, 21 system view, 12

T table key, 245 table loops, 289 tables, 17, 19

© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall

Index 389

target output (ANN), 350 task-focussed, 34 Tax File Number (TFN), 27 TCP (transmission control protocol), 201 TCP/IP, 201 technical management, 172 technological protection measures, 81 technology, 1 technology neutral right of communication, 81 telco (telecommunication provider), 202 temporary files, 192 temporary variable, 141 tenosynovitis, 60 terabyte, 178 terminal node, 16 ternary relation, 258, 260, 288 test data, 155 testing of software, 77 testing protocols, 77 text files, 146 thin client, 190, 195 thin ethernet, 201 thoughtcrime, 238 thread, 298 threat monitoring, 23 Three Laws of Robotics, 358 time slicing, 191 Token Ring, 202 top down development, 156, 162 Torvalds, Linus, 88 touch screen, 43 trace table, 77, 121 trace values, 76 trade secret, 84 training (personnel), 172 training (ANN), 350 training weights, 350 transferor, 349 tree diagram, 16 tree spanning algorithm, 16, 18 trial and error, 64 trim (string), 143 Trojan horse, 148, 326 tuple, 20, 269 Turing, Alan, 22, 361-3, 368 Turing test, 361 tweets, 298 twisted pair cable, 200 Twitter, 298 typed files, 146

typeface, 53 types of computer, 186 types of error, 75 types of operating system, 191 types of variable, 102

U U.S. Privacy Commission, 28 unary relationships, 258 unauthorised access, 23, 27 unconstrained join, 231 underscore, 106 unique, 20, 269 unique identifier, 28 uniqueness constraint, 269, 274, 289 unit/module wide variable, 100 unit/module wide scope, 99 Unix, 42, 88 unperson, 239 unsupervised learning, 351 untyped files, 146 UoD (Universe of Discourse), 248, 287, 311 UoD expert, 248, 287, 304, 309 update anomaly, 19, 245 update command, 217 usability, 36 usability design, 31 usability engineering, 31 USB flash drive, 185 useability, 40 Usenet, 297 user, 11, 32, 59, 172 user assistance, 36, 157 user centred design, 49 user focus, 34 user friendly, 36, 189 user interface (UI), 31, 36, 41, 49 user liaison, 198 user limitations, 37 user management, 198 user manual, 321 user model, 33, 44, 49 user profile, 297 user proof, 36, 166 user proofing, 114, 159 using variables, 102 UTP (unshielded twisted pair), 200

V validation module, 339 vandalism, 149, 300 variable declaration, 103

variables, 71, 72, 102 video surveillance, 240 views, 12, 14 virtual communities, 296 virtual environment, 33 virtual machine, 191 virtual reality, 43 virus, 23, 148, 192, 327 virus scanner, 149 visual cohesion, 51 visual impairment, 37 voice recognition, 55, 56 void, 125 volition, 366 Von Neumann architecture, 179 Von Neumann bottleneck, 179 von Neumann computers, 347

W wireless access point (WAP), 201 weak constraint, 271 web page spoofing, 325 web-app, 190 weighted input, 349 Weizenbaum, Dr Joseph, 349 where clause (SQL), 211 while loop, 116-7, 161 white space, 52 wide area network (WAN), 194 Wi-Fi, 197, 201 Wikipedia, 300 wikis, 300 wildcard, 216 wireless network, 201 wireless security, 202 wisdom, 9 wizards, 190 WLAN (wireless LAN), 201 work for hire, 80 work procedures, 172 work station, 187 work station layout, 59 workplace health and safety, 61 worm, 148, 327 WWAN (wireless WAN), 201 WYSIWYG, 43

X, Y, Z XML, 133 YouTube, 288 zombie computer, 149, 327

© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall