11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index 561Cybernetics <strong>of</strong> Control <strong>and</strong>Communication in the Animal <strong>and</strong>the Machine (Wiener) 511cyberpunk 220, 335, 419cyberspace advocacy groups124–125cyberspace <strong>and</strong> cyber culture 125–126, 391, 419, 482–483cyberstalking <strong>and</strong> harassment 100,126, 248, 252, 523cyberterrorism 126–127computer crimes in 100countering 118–119data backup <strong>and</strong> 37disaster planning <strong>and</strong> 152hackers in 220information warfare <strong>and</strong> 242Internet growth <strong>and</strong> 248online gambling <strong>and</strong> 346threat <strong>of</strong> 439Cyc 27, 267, 351cyclical redundancy check (CRC)186, 194cylinders, in hard disks 222DDAC (digital to analog converter)317daemon. See demonDahl, Ole-Johan 431DailyStrength.com 367daisy-wheel printer 381DAQ (data acquisition device) 129,130Dark Web 127DARPA (Defense AdvancedResearch Projects Agency) 113funding <strong>of</strong> 212Kay <strong>and</strong> 263Licklider at 277multiprocessing language<strong>and</strong> 324networks <strong>and</strong> 334research <strong>of</strong> 311, 404Sutherl<strong>and</strong> at 463DARPA automated vehiclechallenge 71Dartmouth Summer ResearchProject on Artificial Intelligence281, 297Darwin 357DAT (digital audio tape) 446data 128. See also backup <strong>and</strong>archive systemsin classes 88constants 115in distributed computing154in LISP 281in pattern recognition 363redundancy in 427repurposing 139in service-orientedarchitecture 426unanticipated use <strong>of</strong> 408in XML 520data abstraction 128–129data accessibility 130–131data acquisition 110, 129, 129–130,419data acquisition device (DAQ)129, 130databaseBoolean operators in 54for business data processing64caching for 70for CAD 98client-server computing<strong>and</strong> 89CORBA for 118in CRM 123data dictionary for 135data mining <strong>of</strong> 135–136data security in 137in decision support systems139distributed computing for154hard disk space for 223hashing in 223, 224information retrieval from240–241for library catalogs 275in management informationsystem 292middleware for 310for online research 349PHP <strong>and</strong> 372for real-time processing 400record-level security in 137relational model for 131–132,139, 292, 455. See alsodatabase managementsystemssearching in 446for s<strong>of</strong>tware agents 289in s<strong>of</strong>tware engineering 73sorting in 446storage <strong>of</strong> 192templates in 475WAIS for 248for wikis 511database administration 130–131,178database management systems(DBMS) 131, 131–133automatic programmingin 33benchmarks for 43for cartography 208computer science in 110development <strong>of</strong> 131early market for 206management informationsystems <strong>and</strong> 292network traffic <strong>and</strong> 334object-oriented programming<strong>and</strong> 341in <strong>of</strong>fice automation 342by Oracle 356SQL for 455data breaches 137data bus. See busdata communications 133–134with Bluetooth 53broadb<strong>and</strong>. See broadb<strong>and</strong>clock speed <strong>and</strong> 90in computer science 110error correction in 186measurement units for 298in UNIX 410data compression 134, 134–135codecs for 92<strong>of</strong> digital photographs 372on hard disks 223<strong>of</strong> images 50, 203, 214, 239<strong>of</strong> MP3 files 448–449in networks 334<strong>of</strong> PDFs 364redundancy <strong>and</strong> 241in streaming 459data conversion 135data dictionary 73–74, 135Data division 91Data Encryption St<strong>and</strong>ard (DES)39, 145, 180, 317Data General 106, 516data glove 221–222data integrity 130, 131, 132, 194data link layer 334data list 282data mining 27, 135–136cookies in 116in counterterrorism 118, 119in CRM 123data warehouses for 139in e-commerce 168employment in 179expert systems for 188Google’s use <strong>of</strong> 211in information retrieval 241knowledge representationin 267management informationsystems <strong>and</strong> 292Micros<strong>of</strong>t research on 404natural language processingin 330neural networks in 337pattern recognition in 363privacy <strong>and</strong> 384statistics in 458data models. See ontologies <strong>and</strong>data modelsData Over Cable Service InterfaceSpecification (DOCSIS) 69data processingfor bank transactions 39batch processing 257buffering in 60in business 63–64, 291in client-server computing89in COBOL 91in flowcharts 200job control language for 257mainframes for 290in scientific applications419–420, 420data security 136–137. See alsosecurityin database administration130at “hot spots” 250Internet growth <strong>and</strong> 248online backup services<strong>and</strong> 37in operating systems 354risk <strong>and</strong> 408satellite service <strong>and</strong> 416user accounts in 354data storage 36, 37, 74–75, 89, 222,299, 445–446data structures 137–138. See alsoarray; branching statements;enumerations <strong>and</strong> sets; hashing;loop; queue; treein Algol 7in algorithm design 8in APIs 20in BASIC 88bit manipulation in 52in computer science 109data types compared to 138lists for 282object-oriented programming<strong>and</strong> 339in Pascal 88queue 396–397in Ruby 413in Simula 431systems programming <strong>and</strong>465data types 138. See also classes;enumerations <strong>and</strong> setsabstract 128–129in Ada 2in Algol 7in BASIC 40binding <strong>and</strong> 45in C 65in C++ 68checking 66, 68in COBOL 91in compiling 96in computer science 110conversion <strong>of</strong> 61, 67in data structures 137data structures comparedto 138for FORTRAN 202in interpretation <strong>of</strong> data 128for knowledge representation266in LISP 281–282in Lua 286numeric 338in object-orientedprogramming 340in Pascal 362, 514in Perl 365in PHP 373in PL/I 373in procedural languages 388procedures <strong>and</strong> 385Python <strong>and</strong> 392in Ruby 413in scripting languages 421in Smalltalk 433in structured programming443for variables 490data validation 186–187, 197data warehouse 135, 139, 139, 292dates, storage <strong>of</strong> 522dBase 131DBMS. See database managementsystemsDCE (Distributed ComputingEnvironment) 310DCOM (Distributed ComponentObject Model) 89, 154DDR (double data rate) SDRAM301deafness 151Dean, Howard 377debit card transactions 39debugging. See bugs <strong>and</strong> debuggingDEC Alpha 402decimal numbers 338decision making, Feigenbaum’swork in 190decision statements. See branchingstatements; loopdecision support system (DSS)139–140decompilation 405decrement operation 65DeCSS 149, 246DECUS 488DEC VAX 227deductive synthesis 33Deep Blue 26, 85Deep Thought 85defragmentation 222–223DejaNews 333delegates 67deletion, from list 282del.icious.us 294, 523Dell, Inc. 108, 140, 184, 237, 366Dell, Michael 140, 184Delphi 114demo 428democracy 439demon 140–141, 144DENDRAL 27, 187, 190denial-<strong>of</strong>-service (DOS) attacks100, 111, 242Department <strong>of</strong> Defense. SeeARPANET; DARPADepartment <strong>of</strong> Homel<strong>and</strong> Security119, 136dependencies 389

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!