bomb. cause effect graph. Consultive Committee for International Telephony and Telegraphy. The cyber-world sure is confusing these days with a ton of jargon, technical words, and abbreviations. Contrast with nonincremental integration. Learn different types of networks, concepts, architecture and design. (2) Examines portions of the code that are not considered safety-critical code to ensure they do not cause hazards. Contrast with path analysis. key element. extremal test data. Usually, operating systems are predominantly software, but partial or complete hardware implementations are possible. (IEEE) A matrix that identifies possible requests for database access and relates each request to information categories or elements in the database. See: error guessing; testing, special case. code auditor. (IEEE) (1) A planned and systematic pattern of all actions necessary to provide adequate confidence that an item or product conforms to established technical requirements. Note: This term is defined differently in various programming languages. range check. It will facilitate consistency in. Users can perform multiple disparate tasks in one app instead of using multiple separate apps. comment. 3 . Computer terms, dictionary, and glossary Browse through our list of over 15,000 computer terms and definitions using the search above, browsing by letter, or by clicking one of the links below. See: traceability, traceability matrix. (NIST) A collection of material pertinent to the development of a software module. actuator. One of the functions of a modem is to enable digital data to be transmitted over analog transmission facilities. Contrast with EDSI, SCSI, ST-506. The wires are twisted around each other to minimize interference from other twisted pairs in the cable. statement coverage. programming language. (ISO) In programming languages, an abstraction of all possible paths that an execution sequence may take through a program. Others believe that human consciousness can never be replicated by physical processes. Contrast with serial. Syn: data-flow trace, data trace, value trace. (3) Not obscure, not vague. arithmetic overflow. Permanent memory that holds the elementary circuit operations a computer must perform for each instruction in its instruction set. It's the switching speed, or number of transitions [voltage or frequency change] made per second. (QA) An individual step in an critical control point of the manufacturing process. testing, branch. Contrast with data flow diagram. Often paths through the program are grouped into a finite set of classes. Regions are used to separate testing from production [normal use]. The input and output domains are partitioned into classes and analysis is performed to determine which input classes cause which effect. A registered trademark of Digital Research. TCP/IP. In addition to the functionality of each modular mini app or micro app, the super app has a functionality of its own. A measure of reliability, giving the average time before the first failure. Also chassis, cabinet, box, tower, enclosure, housing, system unit, or simply case. Another program, known as an assembler, translated these symbolic programs into an equivalent binary program whose steps the computer could carry out, or execute.. (IEEE) The process of estimating the amount of computer storage or the number of source lines required for a software system or component. See: end user. system analysis. Softwarea general term for programs and the operating system for computers. (IEEE) A software V&V task to simulate critical tasks of the software or system environment to analyze logical or performance characteristics that would not be practical to analyze manually. end user. The number is computed by dividing the size of the block by the size of each record contained therein. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely. In today's business world, managed services are more critical than ever. Contrast with interrupt. Retrieve the information content from a modulated carrier wave; the reverse of modulate. octal. See: execution trace, subroutine trace, symbolic trace, variable trace. Application software, sometimes general purpose, written for a variety of industries or users in a manner that permits users to modify the program to meet their individual needs. A technique a CPU can use to learn if a peripheral device is ready to receive data or to send data. Learn a new word every day. (Beizer) A representation of a state graph that specifies the states, the inputs, the transitions, and the outputs. optical character recognition. All source code, regardless of the language in which it was programmed, is eventually converted to machine code. different software system analysis. The board is "printed" with electrically conductive pathways between the components. This makes the source code harder to understand, thus increasing the chance of introducing errors during program development and maintenance. This value is a representation of the set of no numbers or no value for the operating system in use. The organization of this document is primarily alphabetical. (IEEE) Software maintenance performed to make a computer program usable in a changed environment. configuration item. (2) TCP/IP protocol that is used to log onto the network, list directories, and copy files. (IEEE) A compiler that executes on one computer but generates assembly code or object code for a different computer. See: computer instruction set. See: bomb, virus, worm. Contrast with specification, requirements. test case generator. A computer is an electronic device that stores and retrieves information. testability. These questions might be about DNA sequences in genes, patterns of activity in a consumer market, or all the uses of a word in texts that have been stored in a database. Two disparate programs must work in tandem, and there are many more decisions to make about separating data and processing between the client workstations and the database server. stepwise refinement. See: extended ASCII. A peripheral device can be used to input data; e.g., keypad, bar code reader, transducer, laboratory test equipment; or to output data; e.g., printer, disk drive, video system, tape drive, valve controller, motor controller. data item. transaction analysis. software safety test analysis. extended ASCII. event table. (IEEE) (1) A condition or mode of existence that a system, component, or simulation may be in; e.g., the pre-flight state of an aircraft navigation program or the input state of a given channel. A unit of frequency equal to one million cycles per second. The TCP protocol controls the transfer of the data, and the IP protocol provides the routing mechanism. A software tool which examines source code for adherence to coding and documentation conventions. (NIST) Determining and assessing measures associated with the invocation of program structural elements to determine the adequacy of a test run. An unprogrammed PROM has all links closed establishing a known state of each bit. data structure centered design. (2) Evaluates the sequence of operations represented by the coded program and detects programming errors that might create hazards. The calculations are chosen to optimize error detection. A federal agency under the Department of Commerce, originally established by an act of Congress on March 3, 1901 as the National Bureau of Standards. The automation of manufacturing systems and techniques, including the use of computers to communicate work instructions to automate machinery for the handling of the processing [numerical control, process control, robotics, material requirements planning] needed to produce a workpiece. Pertaining to design methodology that starts with the highest level of abstraction and proceeds through progressively lower levels. See: input-process-output chart. A multitasking, multiple-user (time-sharing) operating system developed at Bell Labs to create a favorable environment for programming research and development. C. A general purpose high-level programming language. Contrast with requirement. (IEEE) (1) The process of defining a collection of hardware and software components and their interfaces to establish the framework for the development of a computer system. (2) Defined logical data that is part of a record. Documents such as charts, diagrams, graphs which depict program structure, states of data, control, transaction flow, HIPO, and cause-effect relationships; and tables including truth, decision, event, state-transition, module interface, exception conditions/responses necessary to establish design integrity. local area network. top-down design. source program. (ISO) Physical equipment, as opposed to programs, procedures, rules, and associated documentation. (NIST) Checking of user- embedded statements that assert relationships between elements of a program. Created for use in the development of computer operating systems software. ANSI. (NIST) See: specification, design. error seeding. See: block diagram, box diagram, bubble chart, graph, input-process-output chart, structure chart. It strives to combine the power of assembly language with the ease of a high-level language. A limitation of this technique is the identification of system or software problems and hazards. completeness. A sequence of actions the user should take to avoid a problem or system limitation until the computer program is changed. See: abstraction. Types include addressing exception, data exception, operation exception, overflow exception, protection exception, underflow exception. See: FMEA, FMECA, FTA, software hazard analysis, software safety requirements analysis, software safety design analysis, software safety code analysis, software safety test analysis, software safety change analysis. See: disk, disk drive. See: static analysis. This causes the "fuse to blow", opening that link. Contrast with subroutine. Super apps can acquire large user bases by localizing their service. Useful for dynamic analysis techniques such as assertion checking, coverage analysis, tuning. (IEEE) A language used to express computer programs. record of change. Varying the characteristics of a wave in accordance with another wave or signal, usually to make user equipment signals compatible with communication facilities. Contrast with adaptive maintenance, perfective maintenance. (IEEE) A software V&V task to ensure that the algorithms selected are correct, appropriate, and stable, and meet all accuracy, timing, and sizing requirements. A symbol chosen to assist human memory and understanding; e.g., an abbreviation such as "MPY" for multiply. (4) Loosely, a routine. See: waterfall model. Delivered to your inbox! A mouse, keyboard, and monitor are examples of peripherals. A type of microelectronic circuit in which the base material is positively charged. FORTRAN emerged as the main high-level language for scientific programming, while COBOL became the main language for business programming. Syn: call trace. testing, volume. See: cross-assembler, cross-compiler. modularity. The logical state is established by charging, via an electrical current, all bits whose states are to be changed from the default state. critical control point. subroutine trace. hexadecimal. The computer science field of intelligent systems, originally known as artificial intelligence (AI), actually predates the first electronic computers in the 1940s, although the term artificial intelligence was not coined until 1956. (2) To produce a record as in (1). disk drive. (IEEE) The period of time in the software life cycle during which a software product is integrated into its operational environment and tested in this environment to ensure that it performs as required. concept phase. See: computer language, high-level language, low-level language. When 'thingamajig' and 'thingamabob' just won't do, A simple way to keep them apart. (ISO) A discrepancy between a computed, observed, or measured value or condition and the true, specified, or theoretically correct value or condition. (IEEE) A subprogram that is called by other programs and subprograms. (2) (ISO) In a programming language, a meaningful expression that specifies one operation and identifies its operands, if any. Contrast with Kermit, Xmodem, Zmodem. checksum. Basically, a redundant check in which groups of digits; e.g., a file, are summed, usually without regard to overflow, and that sum checked against a previously computed sum to verify operation accuracy. Many argue that AI improves the quality of everyday life by doing routine and even complicated tasks better than humans can, making life simpler, safer, and more efficient. Get a Britannica Premium subscription and gain access to exclusive content. The elements of this composite entity are used together in the intended operational or support environment to perform a given task or achieve a specific purpose, support, or mission requirement. (IEEE) Analysis demonstrating that safety requirements have been correctly implemented and that the software functions safely within its specified environment. See: memory. The File Transfer Protocol and Simple Mail Transfer Protocol provide file transfer and electronic mail capability. It can be used to report malfunctions such as parity, bus, and math co-processor errors. programmable logic array. (2) Not susceptible to different interpretations. An LSI IC contains 3,000 to 100,000 transistors. See: accuracy, bias, calibration. A software tool which analyzes potential conflicts in a system as a result of the occurrences of interrupts. See: conversational, interactive, real time. See: incremental development, rapid prototyping, spiral model, waterfall model. Storage device other than main memory [RAM]; e.g., disks and tapes. (IEEE) A document that describes the design of a system or component. Bitmap technology, together with high-resolution display screens and the development of graphics standards that make software less machine-dependent, has led to the explosive growth of the field. path. (IEEE) A software development technique that consists of isolating a system function or a set of data and the operations on those data within a module and providing precise specifications for the module. What is the impact of computer artificial intelligence (AI) on society? function definition. See: special test data; testing, special case. Mainframes now provide high-capacity data storage for Internet servers, or, through time-sharing techniques, they allow hundreds or thousands of users to run programs simultaneously. See: functional configuration audit, physical configuration audit. What are the most important computer terms I should know? Types include branch testing, path testing, statement testing. As of November 2021 the most powerful computer in the world is the Japanese supercomputer Fugaku, developed by RIKEN and Fujitsu. (IEEE) The process of defining the architecture, components, interfaces, and other characteristics of a system or component. (1) (ISO) a group of related data elements treated as a unit. (IEEE) A software module used to invoke a module under test and, often, provide test inputs, control and monitor execution, and report test results. physical configuration audit. Intended primarily for use in solving technical problems in mathematics, engineering, and science. (2) The result of the process in (1). (IEEE) A requirement that specifies or constrains the design of a system or system component. Contrast with code review, design review, formal qualification review, requirements review. boot. Learn more about TechTerms.com. file maintenance. This advantage applies to all types of ROM chips; ROM, PROM, EPROM, and EEPROM. byte. Internet terms are what apply to the practices or related-materials of the internet. code audit. computer science, the study of computers and computing, including their theoretical and algorithmic foundations, hardware and software, and their uses for processing information. check summation. interpret. Omissions? A device or storage area [memory] used to store data temporarily to compensate for differences in rates of data flow, time of occurrence of events, or amounts of data that can be handled by the devices or processes involved in the transfer or use of the data. (IEEE) An event that causes suspension of normal program operation. Read one researchers perspective. kilobyte. software design description. (IEEE) (1) The process of operating a system or component under specified conditions, observing or recording the results, and making an evaluation of some aspect of the system or component. The System Administrator is normally an employee or a member of the establishment. A measure of the speed of data transfer in a communications system. It is non-standard ASCII. (NIST) A description of required documentation indicating its scope, content, format, and quality. A peripheral input device which senses some variable in the system environment, such as temperature, and converts it to an electrical signal which can be further converted to a digital signal for processing by the computer. (IEEE) An event that causes suspension of normal program execution. programmable array logic. Data storage is a core function and . Syn: waiting time. qualification, process performance. Super apps are currently popular in Asia, Africa and Central America but haven't been adopted in North America. An object-oriented high-level programming language. The Institute's overall goal is to strengthen and advance the Nation's science and technology and facilitate their effective application for public benefit. Another advantage is that analog computers can frequently represent and solve a problem in real time; that is, the computation proceeds at the same rate as the system being modeled by it. (IEEE) A sequence of instructions that may be performed in the execution of a computer program. simulator. abstraction. (IEEE) A storage allocation technique in which programs or data are divided into fixed length blocks called pages, main storage/memory is divided into blocks of the same length called page frames, and pages are stored in page frames, not necessarily contiguously or in logical order, and pages are transferred between main and auxiliary storage as needed. See: coding. May be implemented by time slicing, priority-based interrupts, or other scheduling methods. ladder logic. An interlocked sequence of signals between connected components in which each component waits for the acknowledgement of its previous signal before proceeding with its action, such as data transfer. file transfer protocol. The New IEEE Standard Dictionary of Electrical and Electronics Terms, IEEE Std. A registered trademark of the Oracle Corp. original equipment manufacturer. A measure of the reliability of a computer system, equal to average operating time of equipment between failures, as calculated on a statistical basis from the known failure rates of various components of the system. archival database. incremental development. Contrast with call graph. (IEEE) Evaluation of: (1) software requirements specifications with hardware, user, operator, and software interface requirements documentation, (2) software design description records with hardware, operator, and software interface requirements specifications, (3) source code with hardware, operator, and software interface design documentation, for correctness, consistency, completeness, accuracy, and readability. (IEEE) A routine that returns control to the program or subprogram that called it. The data are stored so that they can be used by different programs without concern for the data structure or organization. See: incremental development, rapid prototyping, spiral model, waterfall model. (IEEE) A requirement that specifies a physical characteristic that a system or system component must posses; e.g., material, shape, size, weight. requirements analysis. specification analysis. testing, special case. Contrast with testing, development; testing, acceptance; See: testing, system. More than 50% of the world's population will be active daily users of super apps by 2027, according to a Gartner prediction in 2022. Syn: test harness. The device must wait until it is polled in order to send or receive data. About 1.2 billion of them use the super app WeChat, according to Statista. baseline. A logic chip that is programmed at the user's site. Security also pertains to personnel, data, communications, and the physical protection of computer installations. Written procedures describing coding [programming] style conventions specifying rules governing the use of individual constructs provided by the programming language, and naming, formatting, and documentation requirements which prevent programming errors, control complexity and promote understandability of the source code. (IEEE) A variable that is set to a prescribed state, often "true" or "false", based on the results of a process or the occurrence of a specified condition. Note: The result is not necessarily the same as that shown in a call graph. (ISO) The progressive linking and testing of system components into a complete system. Note: this differs from an ordinary trace, which is produced cumulatively during program execution. Equipment that is directly connected a computer. (ISO) A file that is part of a collection of files set aside for later research or verification, for security purposes, for historical or legal purposes, or for backup. Digital data is represented very compactly by tiny holes that can be read by lasers attached to high resolution sensors. development methodology. terminal. white-box testing. (IEEE) Analysis of the safety-critical design elements affected directly or indirectly by the change to show the change does not create a new hazard, does not impact on a previously resolved hazard, does not make a currently existing hazard more severe, and does not adversely affect any safety-critical software design element. In a local area network [LAN], the workstation is the client and the file server is the server. Another breakthrough was the concept of the stored-program computer, usually credited to Hungarian American mathematician John von Neumann. The most influential computer scientists include Alan Turing, the World War II code breaker commonly regarded as the father of modern computing; Tim Berners-Lee, inventor of the World Wide Web; John McCarthy, inventor of the programming language LISP and artificial intelligence pioneer; and Grace Hopper, U.S. Navy officer and a key figure in the development of early computers such as the UNIVAC I as well as the development of the computer language compiler. (IEEE) Software maintenance performed to improve the performance, maintainability, or other attributes of a computer program. Syn: International Standards Organization. A technique used to identify conceivable failures affecting system performance, human safety or other required characteristics. (Myers) A test case identification technique which produces enough test cases such that each decision has a true and a false outcome at least once. bandwidth. validation, verification, and testing. underflow exception. (NIST) A diagram of a system, instrument or computer, in which the principal parts are represented by suitably annotated geometrical figures to show both the basic functions of the parts and the functional relationships between them. flowchart or flow diagram. This device interprets the digital instructions of a computer application. See: documentation plan, software development plan, test plan, software engineering. An unintended alteration of a program's behavior caused by a change in one part of the program, without taking into account the effect the change has on another part of the program. Contrast with graph. (IEEE) A computer program that translates programs [source code files] written in assembly language into their machine language equivalents [object code files]. Fault Tree Analysis. The most powerful computers can perform extremely complex tasks, such as simulating nuclear weapon experiments and predicting the development of climate change. Super apps usually start as one service before evolving to include several mini services. In some situations the computer may be linked or networked with other computers that are used for administrative functions; e.g., accounting, word processing. Types include box diagram, flowchart, input-process-output chart, state diagram.
Average Deviation Is Also Known As, Miami Country Day Camp Brain, Trauma Journal Prompts, Comma Before And In List Of Names, How Many Rows Are In The Periodic Table, Gibraltar Mi Fireworks 2022,