Site hosted by Angelfire.com: Build your free website today!

Chun Li Presents...



Data Jargon...

Analog
Almost everything in the world can be described or represented in one of two forms: analog or digital. The principal feature of analog representations is that they are continuous. In contrast, digital representations consist of values measured at discrete intervals.

Digital watches are called digital because they go from one value to the next without displaying all intermediate values. Consequently, they can display only a finite number of times of the day. In contrast, watches with hands are analog, because the hands move continuously around the clock face. As the minute hand goes around, it not only touches the numbers 1 through 12, but also the infinite number of points in between.

Early attempts at building computers used analog techniques, but accuracy and reliability were not good enough. Today, almost all computers are digital.

Attribute
(1) A characteristic. In a word processing application, an underlined word would be said to have the underline attribute. In database systems, a field can have various attributes. For example, if it contains numeric data, it has the numeric attribute.

(2) In database management systems, the term attribute is sometimes used as a synonym for field.

(3) In DOS systems, every file has a file attributes that indicate several properties of the file. For example, they indicate whether the file is read-only, whether it needs to be backed up, and whether it is visible or hidden.

BER
Short for bit error rate. In a digital transmission, BER is the percentage of bits with errors divided by the total number of bits that have been transmitted, received or processed over a given time period. The rate is typically expressed as 10 to the negative power. For example, four erroneous bits out of 100,000 bits transmitted would be expressed as 4 x 10-5, or the expression 3 x 10-6 would indicate that three bits were in error out of 1,000,000 transmitted. BER is the digital equivalent to signal-to-noise ratio in an analog system.

BERT
Short for bit error rate test, or tester, a procedure or device that measures the bit error rate of a transmission.

BLOB
Short for binary large object, a collection of binary data stored as a single entity in a database management systems (DBMS). BLOBs are used primarily to hold multimedia objects such as images, videos, and sound, though they can also be used to store programs or even fragments of code. Not all DBMSs support BLOBs.

BPDU
Acronym for bridge protocol data unit. BPDUs are data messages that are exchanged across the switches within an extended LAN that uses a spanning tree protocol topology. BPDU packets contain information on ports, addresses, priorities and costs and ensure that the data ends up where it was intended to go. BPDU messages are exchanged across bridges to detect loops in a network topology. The loops are then removed by shutting down selected bridge interfaces and placing redundant switch ports in a backup, or blocked, state.

Browse
In database systems, browse means to view data. Many database systems support a special browse mode , in which you can flip through fields and records quickly. Usually, you cannot modify data while you are in browse mode.

Burst
(n) A set of bits, bytes or characters grouped together for transmission.

(v) An intermittent asynchronous transmission of a specific amount of data. Contrast with streaming.

Comma-Delimited
A data format in which each piece of data is separated by a comma. This is a popular format for transferring data from one application to another, because most database systems are able to import and export comma-delimited data.

Control Character
A special, non-printing character. The ASCII character set defines 32 control characters, as shown in the table. Originally, these codes were designed to control teletype machines. Now, however, they are often used to control display monitors, printers, and other modern devices.

Convert
To change data from one format to another.

Corrupted
Refers to data that has been damaged in some way.

Data
(1) Distinct pieces of information, usually formatted in a special way. All software is divided into two general categories: data and programs. Programs are collections of instructions for manipulating data.

Data can exist in a variety of forms -- as numbers or text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored in a person's mind.

Strictly speaking, data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word.

(2) The term data is often used to distinguish binary machine-readable information from textual human-readable information. For example, some applications make a distinction between data files (files that contain binary data) and text files (files that contain ASCII data).

(3) In database management systems, data files are the files that store the database information, whereas other files, such as index files and data dictionaries, store administrative information, known as metadata.

Data Dictionary
In database management systems, a file that defines the basic organization of a database. A data dictionary contains a list of all files in the database, the number of records in each file, and the names and types of each field. Most database management systems keep the data dictionary hidden from users to prevent them from accidentally destroying its contents.

Data dictionaries do not contain any actual data from the database, only bookkeeping information for managing it. Without a data dictionary, however, a database management system cannot access data from the database.

Data Entry
The process of entering data into a computerized database or spreadsheet. Data entry can be performed by an individual typing at a keyboard or by a machine entering data electronically.

Data Independence
The separation of data from the programs that use the data. Nearly all modern applications are based on the principle of data independence. In fact, the whole concept of a database management system (DBMS) supports the notion of data independence since it represents a system for managing data separately from the programs that use the data. In contrast, it is possible to write applications in which the data being processed is actually represented in the program's source code. This data-dependent approach is very inflexible because it makes it difficult to modify the data and it also makes the data inaccessible to other programs.

Data Mining
A hot buzzword for a class of database applications that look for hidden patterns in a group of data. For example, data mining software can help retail companies find customers with common interests. The term is commonly misused to describe software that presents data in new ways. True data mining software doesn't just change the presentation, but actually discovers previously unknown relationships among the data.

Data Processing
(1) Refers to a class of programs that organize and manipulate data, usually large amounts of numeric data. Accounting programs are the prototypical examples of data processing applications. In contrast, word processors, which manipulate text rather than numbers, are not usually referred to as data processing applications.

(2) Same as Information Technology (IT), refers to all computing functions within an enterprise.

Digital
Describes any system based on discontinuous data or events. Computers are digital machines because at their most basic level they can distinguish between just two values, 0 and 1, or off and on. There is no simple way to represent all the values in between, such as 0.25. All data that a computer processes must be encoded digitally, as a series of zeroes and ones.

The opposite of digital is analog. A typical analog device is a clock in which the hands move continuously around the face. Such a clock is capable of indicating every possible time of day. In contrast, a digital clock is capable of representing only a finite number of times (every tenth of a second, for example).

In general, humans experience the world analogically. Vision, for example, is an analog experience because we perceive infinitely smooth gradations of shapes and colors. Most analog events, however, can be simulated digitally. Photographs in newspapers, for instance, consist of an array of dots that are either black or white. From afar, the viewer does not see the dots (the digital form), but only lines and shading, which appear to be continuous. Although digital representations are approximations of analog events, they are useful because they are relatively easy to store and manipulate electronically. The trick is in converting from analog to digital, and back again.

This is the principle behind compact discs (CDs). The music itself exists in an analog form, as waves in the air, but these sounds are then translated into a digital form that is encoded onto the disk. When you play a compact disc, the CD player reads the digital data, translates it back into its original analog form, and sends it to the amplifier and eventually the speakers.

Internally, computers are digital because they consist of discrete units called bits that are either on or off. But by combining many bits in complex ways, computers simulate analog events. In one sense, this is what computer science is all about.

Digitize
To translate into a digital form. For example, optical scanners digitize images by translating them into bit maps. It is also possible to digitize sound, video, and any type of movement. In all these cases, digitization is performed by sampling at discrete intervals. To digitize sound, for example, a device measures a sound wave's amplitude many times per second. These numeric values can then be recorded digitally.

Drill Down
(v) In information technology, to move from summary information to detailed data by focusing in on something. To drill down through a series of folders, for example, on a desktop means to go through the hierarchy of folders to find a specific file or to click through drop-down menus in a GUI. To drill down through a database is to access information by starting with a general category and moving through the hierarchy of field to file to record.

(n) Spelled drilldown. The act of focusing in. For example, "He got the information he needed through a drilldown of the database."

Escape Sequence
A sequence of special characters that sends a command to a device or program. Typically, an escape sequence begins with an escape character, but this is not universally true.

Export
To format data in such a way that it can be used by another application. An application that can export data can create a file in a format that another application understands, enabling the two programs to share the same data. The two programs might be different types of word processors, or one could be a word processor while the other could be a database management system.

The flip side of exporting is importing. Importing refers to the ability of an application to read and use data produced by a different application. Exporting implies that the sending application reformats the data for the receiving application, whereas importing implies that the receiving application does the reformatting.

Fixed Length
Having a set length that never varies. In database systems, a field can have a fixed or a variable length. A variable-length field is one whose length can be different in each record, depending on what data is stored in the field.

The terms fixed length and variable length can also refer to the entire record. A fixed-length record is one in which every field has a fixed length. A variable-length record has at least one variable-length field.

Import
To use data produced by another application. The ability to import data is very important in software applications because it means that one application can complement another. Many programs, for example, are designed to be able to import graphics in a variety of formats.

The opposite of importing is exporting, which refers to the ability of one application to format data for another application.

Integer
Integers, floating-point numbers, and character strings constitute the basic data types that most computers support. There are often different sizes of integers available; for example, PCs support short integers, which are 2 bytes, and long integers, which are 4 bytes.

ISAM
Abbreviation for Indexed Sequential Access Method, a method for managing how a computer accesses records and files stored on a hard disk. While storing data sequentially, ISAM provides direct access to specific records through an index. This combination results in quick data access regardless of whether records are being accessed sequentially or randomly.

There are a number of products that provide basic ISAM access for different operating systems and program languages.

Key
(1) A button on a keyboard.

(2) In database management systems, a key is a field that you use to sort data. It can also be called a key field , sort key, index, or key word. For example, if you sort records by age, then the age field is a key. Most database management systems allow you to have more than one key so that you can sort records in different ways. One of the keys is designated the primary key, and must hold a unique value for each record. A key field that identifies records in a different table is called a foreign key.

(3) A password or table needed to decipher encoded data.

Line Feed
Often abbreviated LF, a line feed is a code that moves the cursor on a display screen down one line. In the ASCII character set, a line feed has a decimal value of 10.

On printers, a line feed advances the paper one line. Some printers have a button labeled LF that executes a line feed when pressed. (Note, however, that the printer must be in off-line mode to execute a line feed.)

Machine Readable
In a form that a computer can accept. Machine-readable data includes files stored on disk or tape, or data that comes from a device connected to a computer. Even typewritten pages can be considered machine-readable if you have an optical character recognition (OCR) system.

Meta Data
Data about data. Meta data describes how and when and by whom a particular set of data was collected, and how the data is formatted. Meta data is essential for understanding information stored in data warehouses.

Petabyte
2 to the 50th power (1,125,899,906,842,624) bytes. A petabyte is equal to 1,024 terabytes.

Precision
When used to describe floating-point numbers, precision refers to the number of bits used to hold the fractional part. The more precision a system uses, the more exactly it can represent fractional quantities.

Floating-point numbers are often classified as single precision or double precision. A double-precision number uses twice as many bits as a single-precision value, so it can represent fractional quantities much more exactly.

Punctuation
Like punctuation in human languages, punctuation in programming languages serves to separate words and phrases. But unlike human punctuation, which is often optional, computer punctuation is strictly required.

Purge
To systematically and permanently remove old and unneeded data. The term purge is stronger than delete. It is often possible to regain deleted objects by undeleting them, but purged objects are gone forever.

Qubit
A quantum bit. The smallest unit of information in quantum computing. Qubits hold an exponentially larger amount of information than traditional bits.

Random Access
Refers to the ability to access data at random. The opposite of random access is sequential access. To go from point A to point Z in a sequential-access system, you must pass through all intervening points. In a random-access system, you can jump directly to point Z. Disks are random access media, whereas tapes are sequential access media.

The terms random access and sequential access are often used to describe data files. A random-access data file enables you to read or write information anywhere in the file. In a sequential-access file, you can only read and write information sequentially, starting from the beginning of the file.

Both types of files have advantages and disadvantages. If you are always accessing information in the same order, a sequential-access file is faster. If you tend to access information randomly, random access is better.

Random access is sometimes called direct access.

Raw
Unprocessed. The term refers to data that is passed along to an I/O device without being interpreted. In contrast, cooked refers to data that is processed before being passed to the I/O device.

The term comes from UNIX, which supports cooked and raw modes for data output to a terminal. In cooked mode, special characters, such as erase and kill are processed by the device driver before being sent the output device.

Raw Data
Information that has not been organized, formatted, or analyzed.

RDF
Short for Resource Description Framework. RDF is a general framework for describing a Web site's metadata, or the information about the information on the site. It provides interoperability between applications that exchange machine-understandable information on the Web. RDF details information such as a site's sitemap, the dates of when updates were made, keywords that search engines look for and the Web page's intellectual property rights.

Developed under the guidance of the World Wide Web Consortium, RDF was designed to allow developers to build search engines that relay on the metadata and to allow Internet users to share Web site information more readily. RDF relies on XML as an interchange syntax, creating an ontology system for the exchange of information on the Web.

Read
(v) To copy data to a place where it can be used by a program. The term is commonly used to describe copying data from a storage medium, such as a disk, to main memory.

(n) The act of reading. For example, a fast disk drive performs 100 reads per second.

Read/Write
Capable of being displayed (read) and modified (written to). Most objects (disks, files, directories) are read/write, but operating systems also allow you to protect objects with a read-only attribute that prevents other users from modifying the object.

Read-Only
Capable of being displayed, but not modified or deleted. All operating systems allow you to protect objects (disks, files, directories) with a read-only attribute that prevents other users from modifying the object.

Record
(1) In database management systems, a complete set of information. Records are composed of fields, each of which contains one item of information. A set of records constitutes a file. For example, a personnel file might contain records that have three fields: a name field, an address field, and a phone number field.

In relational database management systems, records are called tuples.

(2) Some programming languages allow you to define a special data structure called a record. Generally, a record is a combination of other data objects. For example, a record might contain three integers, a floating-point number, and a character string.

Replication
The process of creating and managing duplicate versions of a database. Replication not only copies a database but also synchronizes a set of replicas so that changes made to one replica are reflected in all the others. The beauty of replication is that it enables many users to work with their own local copy of a database but have the database updated as if they were working on a single, centralized database. For database applications where users are geographically widely distributed, replication is often the most efficient method of database access.

The Lotus Notes system was one of the first to make replication a central component of its design, which has been one of the main reasons for its success.

Sequential Access
Refers to reading or writing data records in sequential order, that is, one record after the other. To read record 10, for example, you would first need to read records 1 through 9. This differs from random access, in which you can read and write records in any order.

Some programming languages and operating systems distinguish between sequential-access data files and random-access data files, allowing you to choose between the two types. Sequential-access files are faster if you always access records in the same order. Random-access files are faster if you need to read or write records in a random order.

Devices can also be classified as sequential access or random access. For example, a tape drive is a sequential-access device because to get to point q on the tape, the drive needs to pass through points a through p. A disk drive, on the other hand, is a random-access device because the drive can access any point on the disk without passing through all intervening points.

Sign
A symbol that identifies a number as being either positive or negative. A positive sign is +; a negative sign is -. These two signs are also used to indicate addition and subtraction, respectively.

STP
Acronym for Spanning Tree Protocol. STP, a link management protocol, is part of the IEEE 802.1 standard for media access control bridges. Using the spanning tree algorithm, STP provides path redundancy while preventing undesirable loops in a network that are created by multiple active paths between stations. Loops occur when there are alternate routes between hosts. To establish path redundancy, STP creates a tree that spans all of the switches in an extended network, forcing redundant paths into a standby, or blocked, state. STP allows only one active path at a time between any two network devices (this prevents the loops) but establishes the redundant links as a backup if the initial link should fail. If STP costs change, or if one network segment in the STP becomes unreachable, the spanning tree algorithm reconfigures the spanning tree topology and reestablishes the link by activating the standby path. Without spanning tree in place, it is possible that both connections may be simultaneously live, which could result in an endless loop of traffic on the LAN.

Variable Length
Refers to anything whose length can vary. For example, in databases, a variable-length field is a field that does not have a fixed length. Instead, the field length varies depending on what data is stored in it.

Variable-length fields are useful because they save space. Suppose, for example, that you want to define a NAME field. The length of each NAME field will vary according to the data placed in it. For example, John Smith is 10 characters long, but Thomas Horatio Jefferson is 24 characters long. With fixed-length fields, you would need to define each field to be long enough to hold the longest name. This would be a waste of space for records that had short names. With variable-length fields, the NAME field in each record would be just long enough to hold its data.

The opposite of variable length is fixed length.

Variable-Length Record
A record that has at least one variable-length field. The length of the entire record, therefore, varies according to what data is placed in the variable-length field.

WDDX
Created by Allaire, Web Distributed Data Exchange is an XML -based technology that facilitates complex-data exchange between Web programming languages (ColdFusion, Perl, ASP, Java, JavaScript, PHP, etc.).

For example, a Web site based in ColdFusion can share data with a Web site based in ASP. Data in ColdFusion would be translated into XML, sent to an ASP server, translated out of XML and into VBScript.

WDDX assigns a specific module for each supported language. The module will translate (or serialize) the native data structures into an abstract form represented as XML, or deserialize the WDDX XML into a native data structure.

WDDX supports Boolean, number, date-time, and string data types, as well as, arrays, structures, and recordsets.

Browser support for WDDX includes version 3.0 and higher Web browsers (I.E. and Netscape) for Windows, Unix and Macintosh platforms.

WDDX can be used with HTTP, SMTP, POP, and FTP.

Write
To copy data from main memory to a storage device, such as a disk.

index . data . network . graphics . software . hardware

standards . programming . communications . operating systems . links

Website Created By Koded.com