Managing Information Technology

(Frankie) #1
Index 695

stored-program concept, 25–7
types of, 28–34
underlying structure of, 20
Compuware, 260
comScore, 262
Comshare Decision, 237
Conference on Data Systems Languages
(CODASYL), 44
connectivity, 89, 161–2
Conoco, Inc., 236
Construction phase
of controls, 355–7
of purchased systems, 398–9
of systems development life cycle (SDLC),
340, 365–6
system building, 366
system design, 365–6
system testing, 366
Consumer and Industrial Products, Inc., managing a
systems development project, 328, 432–41
contact management software, 41
contention bus design, 73
context diagram, 343
context, Web site characteristic, 272
“contextual” search results, 270
Continental Airlines, 89, 187, 225, 284–93
real-time business intelligence (BI) at, 284–93
data warehousing, 284–5
control activities, 568
control unit, 25
controllers, computer system controllers, 71
controls,See alsoinformation system (IS)
development processes and techniques
service delivery policies and procedures,
546–7
for minimizing risks, 354–8
conversion process, 367
cookie, 581
copyright protection, 586
cordless telephone, 67
core data, 102
Corel software, 39–41
Corel Quattro Pro, 39
WordPerfect, 38, 39
corporate data modeling, 98
Corvid expert systems software, 243
cost breakdown of SDLC projects, 363
Covad Communications, 84
coverage model, GIS, 232
Cox Communications Preferred cable modem
service, 83
CPMSeecritical path method (CPM)
cracker, 562

computer-aided design (CAD), 215, 216
computer-aided engineering (CAE), 216
computer-aided manufacturing (CAM), 215, 217
computer-aided process planning (CAPP), 216
computer-aided software engineering (CASE). See
CASE (computer-aided software engineering)
tools
Computer Associates, 55, 203
computer capacity, 542
computer crime, 561–4
cracker, 562
customer data theft, TJX Companies, 563
cyberwarfare, 563
external attackers, techniques for, 562
hacker, 562, 564
logic bomb, 563
social engineering, 564
spoofing, 564
virus, 562
worm, 354
computer display and report generators, 378
computer files, 23–5
direct access files, 24–5
sequential access files, 23–4
computer hardware, 2, 17, 19–35
defined, 19
computer-integrated manufacturing (CIM), 215, 243
computer memory, 21–3
bits, 22–3
byte, 22
coding schemes, 22–3
diagram of, 22
word, 22
computer-on-a-chip technology, 2
computer output microfilm (COM), 21
computer software, 2–3, 17, 19, 34–56
applications, 36–41 (See alsoapplications software)
applicationsvs.support software, 34–35
changing nature of, 55
defined, 19
disposable application, 103–4
electronic record management (ERM), 567–8
on-demand, 406
open source, 405–6
packaged software, 36, 340
proprietary, 400
support, 41–54 (See alsosupport software)
types of, 34–6
computer systems, 19–56. See alsocomputer hardware,
computer software, telecommunications networks
basic components of, 20–5
information technology industry, 55–6
software, 34–55 (See alsocomputer software)

Free download pdf