The Microsoft .NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.
ASP - Active Server Pages
Active Server Pages (ASP), also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated web pages. Initially released as an add-on to Internet Information Services (IIS) via the Windows NT 4.0 Option Pack, it was subsequently included as a free component of Windows Server (since the initial release of Windows 2000 Server).
Microsoft® Active Server Pages (ASP) is a server-side scripting environment that you can use to create
and run dynamic, interactive Web server applications. With ASP, you can combine HTML pages, script commands, and COM components
to create interactive Web pages and powerful Web-based applications that are easy to develop and modify.
Access
Microsoft Office Access, previously known as
Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. It is a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows and
also sold separately. There is no version for MacOS or for Microsoft Office Mobile.
Access control
Access control is the ability to permit or deny the use of a particular
resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater,
to which only ticketholders should be admitted), logical resources (a bank account, with a limited number of people authorized
to make a withdrawal), or digital resources (for example, a private text document on a computer, which only certain users
should be able to read).
With respect to a computer filesystem, an access control list
(ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the
object and what operations are allowed to be performed on the object. In a typical ACL, each entry in the list specifies a
subject and an operation: for example, the entry (Alice, delete) on the ACL for file WXY gives Alice permission to
delete file WXY.
Access privileges
Access privileges determine which portal objects a user can browse
or edit, which objects appear in search results, and which can be added to My Pages and community pages
Active Hyperlink
A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button
when clicking on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.
Administrator (as an IT resource)
IT Resource Administrator - Institutional staff that, under the direction of the IT Resource Steward and
with operational instructions from the IT Resource Custodian, have day-to-day operational responsibility for data capture,
maintenance and dissemination.
Authentication
Authentication (from Greek: αυθεντικός;
real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic,
that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.
Authentication is the process of determining whether someone or something is, in fact,
who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly
done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers
initially (or is registered by someone else), using an assigned or self-declared password. On each subsequent use, the user
must know and use the previously declared password. The weakness in this system for transactions that are significant (such
as the exchange of money) is that passwords can often be stolen, accidentally revealed, or forgotten.
Data Administrator
A database administrator (DBA) is a person who is responsible for the
environmental aspects of a database. The role of a database administrator has changed according to the technology of database management systems (DBMSs) as well as the needs of the owners of the databases. For example, although logical and physical database
design are traditionally the duties of a database analyst or database designer, a DBA may be tasked to perform
those duties.
Electronic Commerce
Electronic commerce, commonly known as e-commerce or eCommerce,
consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage.
A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies
such as e-mail as well.
Electronic Government (eGovernment)
e-Government (short for electronic government, also known as e-gov, digital government, online government or transformational government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses,
and other arms of government.
Encryption
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In
many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make
it unencrypted).
Information Technology
Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.
Information Technology
Resource (IT Resource)
Information Technology Resource (IT Resource) - A resource used for electronic storage, processing or transmitting
of any data or information, as well as the data or information itself. This definition includes but is not limited to electronic
mail, voice mail, local databases, externally accessed databases, CD-ROM, recorded magnetic media, photographs, digitized
information, or microfilm. This also includes any wire, radio, electromagnetic, photo optical, photo electronic or other facility
used in transmitting electronic communications, and any computer facilities or related electronic equipment that electronically
stores such communications.