Managing Information Technology

(Frankie) #1

Social networking application An Internet application that
permits users to post information about themselves and to view
information posted by others; examples include MySpace and
Facebook.


Software The set of programs (made up of instructions) that
control the operations of the computer system.


Software as a Service (SaaS) A label sometimes given to a
hosted solution or an on-demand solution. See alsoHosted
solution.


Software package Computer software that is sold as a self-
contained “package” so that it may be distributed widely. In
addition to the computer programs, a package might include
comprehensive documentation of the system, assistance in
installing the system, training, a hotline consulting service for
dealing with problems, and even maintenance of the system.


SOA SeeService-oriented architecture.


SONET SeeSynchronous Optical Network.


Source program A program written in a second, third, or
fourth generation language.


SOW SeeStatement of work.


SOX SeeSarbanes-Oxley Act.


Spam Unsolicited electronic mail that is broadcast to a large
list of e-mail users in an attempt to reach potential customers.
Spam is the Internet equivalent to the “junk mail” that is physically
sent as bulk mail and delivered by a postal service to recipients
who often discard it without even opening it.


Specific DSS SeeDecision support system.


Speech recognition software Software package used to
convert the human voice into digitized computer input, so that
users can “dictate” a document or message to the computer and,
eventually, control the computer by oral commands.


Sponsor SeeProject sponsor.


Spoofing A way of misleading or defrauding a Web surfer by
setting up a Web site that mimics a legitimate site. The spoofer
might use some means, such as a message board, to direct the
victim to the spurious site, or he or she might simply use a close
variant of the legitimate site’s Uniform Resource Locator (URL)
to con people who make a typing mistake.


Spyware/adware Any software that covertly gathers user
information through the user’s Internet connection without his or
her knowledge, usually for advertising purposes. Spyware
typically is a hidden component within a downloaded screen
saver, music-swapping software, or other freeware or shareware,
or may be automatically downloaded when a user visits a specific
Web site or clicks on an ad.


SQL A standard query and data definition language for rela-
tional DBMSs. This standard, endorsed by the American
National Standards Institute (ANSI), is used in many personal
computer, midrange system, and mainframe computer DBMSs.


Star topology A network topology that has some primary
device at its center with cables radiating from the primary device
to all the other network devices.


Statement of work A high-level document that describes the
deliverables of the project and the key project milestones, which
can be used as a contract between the project manager and the
project sponsor to guide and manage the delivery of the project.
See alsoProject milestone.
Stored-program concept The concept of preparing a precise
list of exactly what the computer is to do (this list is called a
program), loading or storing this program in the computer’s
memory, and then letting the control unit carry out the program at
electronic speed. The listing or program must be in a form that
the control unit of the computer has been built to understand.
Strategic IS plan A set of long-term IS objectives and the
major IS initiatives to be undertaken to support an organization’s
information vision and the IT architecture to achieve these
objectives.
Structured techniques A body of structured approaches and
tools to document system needs and requirements, functional
features and dependencies, and design decisions. Also referred
to as procedurally oriented techniques. See alsoStructured
programming.
Subsystem A component of a system that is itself viewed as a
set of interrelated components. A subsystem has a well-defined
purpose that must contribute to the purpose of the system as a
whole.See alsoModule, Hierarchical decomposition.
Supercomputer The most expensive and most powerful
category of computers, ranging in cost from $1,000,000 to
$100,000,000 or more and power from 250,000 to 3,000,000,000
MFLOPS; used for numerically intensive computing and as a
very large Web server.
Superminicomputer Large minicomputers; the upper end of
the minicomputer category. Both minicomputers and super-
minicomputers have now disappeared, subsumed by the broader
midrange systems category. See also Midrange systems,
Minicomputers.
Supply chain management (SCM) system A computer-based
system for the distribution and transportation of raw materials
and finished products throughout the supply chain and for incor-
porating constraints caused by the supply chain into the
production scheduling process.
Support software Programs that do not directly produce
output needed by users, but instead support applications software
in producing the needed output. Support software provides a
computing environment in which it is relatively easy and efficient
for humans to work, enables applications programs written in a
variety of languages to be carried out, and ensures that computer
hardware and software resources are used efficiently. Support
software includes operating systems, language compilers, and
virus protection programs.
Switch A hardware device employed in a telecommunications
network to connect more than two local area networks (LANs) or
LAN segments that use the same protocols. For example, a
switch might connect several low-speed LANs (12 Ethernet
LANs running at 10 mbps) into a single 100-mbps backbone
network running Fast Ethernet.

686 Glossary

Free download pdf