Index

.net, 133
1:1, 271, 273, 278
1:many, 270, 273
1984 (novel), 238
2D array, 137
3GL (third generation language), 95,
96, 97, 102, 209
4GL(fourth generation language),
209
A
abstract networks, 174
abstraction barrier, 41
access point (AP), 201
access router, 197
accumulator, 181
activation value, 349
activator, 349
actuator, 356
adventure games, 299
adware, 148, 327
aesthetics, 161
affordance, 45
AI (artificial intelligence), 332, 334,
359
AI (definition), 335
AI areas of study, 335
AI languages, 336
Aibo, 358
aim, 152, 156, 307, 312
algorithm, 65, 70, 98, 101, 108
algorithm call, 124
alias (SQL), 229, 230
alpha testing, 153
alternative architecture, 180
alternative reference mode, 256
analogue, 176
analytical approach, 65
and (logic), 109, 214
anti-malware, 25, 149
anti-phishing, 326
API (application programming
interface), 25
append, 143
application service provider (ASP),
190
applications, 189
arguments (subroutine), 124
Aristotolean logic, 364
arithmetic and logic unit (ALU), 182
arithmetical operators (SQL), 226
arity, 278
arrays, 135, 143
artificial neural networks (ANNs),
180, 336, 357, 365
artificial neurons, 348
ASCII code, 143, 178
A.S.I.O., 239
Asimov, Issac, 358
assembler language, 95
assignment, 72, 98, 136, 143
assumptions, 152, 156, 288, 299,
307, 311
asynchronous transfer mode (ATM),
202
attributes, 341
attribution (CC-BY), 87
aural deficiencies, 38
Australian Bureau of Statistics
(ABS), 239
Australian Copyright Act, 80
Australian Customs Service (ACS),
57
Australian Information Industry
Association, 83
automation, 206
Autonomous Guided Vehicle
(AGV), 356
autonomy, 37
avatar, 299, 303
axon, 357
B
back propagation, 350
backdoor, 148
backup, 24, 25, 81, 149, 186, 192,
198
beta testing, 153, 166
Big Brother, 238
binary relationship, 258
binary values, 178
binary files, 146
biometrics, 57
BIOS (basic input output system),
183
bit torrent, 87
bits, 178
blackmail, 26
BLAN (bridged LAN), 196
blobs, 182
blogs, blogging, 297
blog storm, 298
blogroll, 298
Bluetooth, 202
Blu-Ray (BR), 185
boolean variable, 120
bot master, 159
botnet, 148
bots, 23
breadth first spanning algorithm, 19
bridge, 196
brute force logic, 365
bubble sort, 140
buddy list, 297
bug, 75
burning (CD/DVD), 186
burning in neural pathways, 348
bus (data), 179
Business Software Alliance, 83
button, 44
button mashing, 65
bytes, 178
C
cabling, 200
cache, 184
call (subroutine), 73, 124
camel case, 106
candidate key, 276, 277
carding, 325
cartesian product, 229, 231
case based logic, 364
© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall
Leading Technology 384

case selection, 114
CAT5 (category 5) cable, 200
charged coupled device (CCD), 184
CD (compact disc), 185
cell (relational table), 19
centralised data, 195
certainty factor, 339
change log, 300
changing workplace, 206
channel pollution, 202
channels, 296
char type, 102, 114
character handling, 143
checks and balances, 27
Chinese room, 362
choke point, 339
circumvention devices, 81
clause (SQL), 211
client-server, 194
clustering, 180, 187
coaxial STP, 201
Codd, E. F, 17
code, 71
cognition, 366
cognitive difficulties, 38
collapsed entity, 258
Collection Limitation Principle, 236
colour, 53
colour blind, 54
columns, 19
combination key, 276
comments, 76, 104
comment out, 105
commercial monopoly, 131
commercial piracy, 83
Commonwealth Privacy Act (1988),
236
compiler, compiled program, 95
composite key, 279
compression algorithm, 86
computer worm, 148
concatenation, 102, 143
conceptual database, 13
conceptual information processor
(CIP), 13
conceptual schema (CS), 13, 248,
255, 303, 315
conceptual schema design process,
286
conceptual view, 13
conceptualisation phase, 312
conclusion, 341
conditions, 109, 117, 213
confidence factor, 339
confidentiality, 12, 198
connectionism, 348
consistency, 36, 52, 161
constants, 104, 127
constraints, 313, 316
content management system (CMS),
88
contention protocol, 200
context sensitive help, 189
contrast, 52, 53
control unit, 181
convergence, 351
cookie, 328
copy restrictions, 24
copyright, 23, 80, 198
Copyright Amendment Act 2000, 81
copyright controls, 82
core memory, 178
cost of development barrier, 131
cost of information, 22
cost-benefit analysis, 310
count (SQL), 226
crackers, 82
create table (SQL), 218
CPU (central processing unit), 181
Creative Commons (CC), 87
credit rating, 22
criteria, 4
cross join, 231
CS diagram, 288, 313
cultural influences, 38
customise interface, 189
cyber-communities, 296
cyber-vandals, 327
D
digital audio tape (DAT), 186
data, 8, 13
data abuse, 25
data dictionary, 24, 308, 315, 317
data diddling, 23
data flow diagram (DFD), 304, 308,
312
data integrity, 25
data loss, 246
data merging, 27
data mining, 23
data misuse, 25
Data Quality Principle, 236
data sharing, 27
data storage, 25
data structures, 17
data theft, 23, 26
database integrity, 20
database management system
(DBMS), 13, 24
DDE cycle, 2, 205
DDR SDRAM, 184
debugging, 76, 153
decision matrix, decision tree, 341
declaration, 71, 103
declarative language, 209
declaring array, 138
decryption, 144
dedicated server, 194
deductive logic, 364
definite iteration, 116, 121
defragmentation, 193
degrees of freedom, 355
delete from command (SQL), 217
demo version, 83
dendrite, 347, 348
denial of service (DoS) attack, 327
depth-first spanning algorithm, 18
derived entity/fact, 268, 288, 315
Descarte, René, 367
design devices, 44
design phase, 153, 158
design principles, 161
design process, 50
desktop computer, 187
device specification, 308, 313, 317
digital, 176
digital certificate/signature, 81
DIMM (double inline memory
module), 184
disc storage, 185
distinct operator (SQL), 212
distributed computing, 180
distributed denial of service (DDoS)
attack, 327
distributed processing, 18, 192
Djikstra, Edsger, 96
DNA matching, 56, 57
DNS (domain name system), 201
do loop, 121, 160
document holder, 58
documentation, 4, 5, 76, 103, 105,
154, 161, 167, 309, 320
double strong constraint, 271
drive-by download, 150
dualism, 366
dummy key, 253
DVD (digital versatile disc), 185
dynamic declaration, 103
E
economy of scale, 131
© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall
Index 385

electrically powered robots, 355
electro chemical signal, 347
electronic junk mail, 323
electronic trail, 57
electronic watermark, 81
elementary fact, 249, 314
elementary sentence, 250, 251, 255,
287, 313, 314
element (page), 50
elements (algorithm), 72
ELIZA, 359
email attachment, 149
emulation software, 191
encryption, 24, 82, 144, 202
end effector, 356
end user, 152, 309
Enigma code, machine, 22, 23
entity, 250, 251, 255, 313
entity constraint, 282
environment, 59
eof (end of file) function, 146
epicondylitis, 60
equality constraint, 283
equijoin, 231
ergonomics, 58
error, 75, 103
error free, 36
error value, 351
Ethernet, 200
EULA (end user license agreement),
37, 326
eureka experience, 65
evaluation, 4, 153, 167, 308, 319
excise, 37
excitory inputs, 347
exclusion constraint, 284
expert system, 335, 337
expert system model, 338
expert system shell, 338
expert user, 33
external documentation, 154
external HDD, 148, 185
external uniqueness, 283
external view, 12
F
face recognition, 55, 56
Facebook, 297
fast ethernet, 201
fault tolerant, 36, 347
feature creep, 190
Federal Bureau of Investigation
(FBI), 26
Federal Privacy Commissioner, 236
feed forward ANN, 349
feedback, 37, 161
field, 20
field programmable gate array
(FPGA), 180
file handling, 146
file hosting network, 87
file maintenance, 192
file server, 194
file sharing, 87
finger based interface, 43
fingerprint reader, 56
fingerprinting, 55
firewall, 24, 149, 188
first normal form (1NF), 277
flag, 141
flat-file database, 243
flexibility, 37, 163
floating point numbers, 102, 178
floating point unit (FPU), 181
flow chart, 99, 153
flow through facility, 197
folders, 44
font, 53
for loop, 121
foreign key, 279
forgiveness, 37, 161
formal evaluation, 4, 154
formalisation, 308, 313, 317
fourth generation language (4GL),
209
frame based logic, 365
fraud, 23, 149
free and open source software
(FOSS), 88
free to play (F2P), 83
Freedom of Information Act (FOI),
236
frequency constraint, 282
friending, 297
from clause (SQL), 211
functionalists, functionalism, 335,
362, 367
functions, 97, 98
fuzzy logic, 339, 351, 364
G
game moderator, 299
game playing, 336
geek, 33
general problem description, 152,
156, 307, 309
general purpose application, 189
gesture interface, 43
gigabit ethernet, 201
gigabyte, 178
global declaration, 127
global scope, 126
global variable, 126, 127
goal-focussed, 34
GPU (graphics processing unit), 182
graceful degradation, 352
graphics tablet, 43
group by clause (SQL), 226
grouping (page layout), 51
GUI (graphical user interface), 41
H
hackers, 23, 27, 327
hand scanning, 55
hand/finger geometry, 56
hard disc drive (HDD), 185
hard wired, 179
hardware, 11, 173
harmony (page layout), 52
having clause (SQL), 226
header information (packet), 197
help system, 309
heuristics, 66, 338, 339, 351
hidden layer (ANN), 350, 351
hierarchical information system, 15
hierarchical tree, 16
high level language, 95
Hoover, J . Edgar, 26
hot swap, 186
hotspot, 201
humanists, 364
hydraulically powered robots, 355
HyperCard, 42
hyperlink, 42, 300
I
I/O unit, 181
IBM, 16, 17, 131, 202
icon, 41, 45
idealism, 366
identity theft, 23, 325
idiom, 45
IEEE 802.11 protocol, 201
if statement, 108
if...then...else selection, 113
IM (instant messaging), 297, 299
implicit declaration, 103
indefinite iteration, 116
indentation, 109, 113, 117, 154, 221
inductive logic, 364
industrial espionage, 22, 23
inference, 364
© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall
Leading Technology 386

inference engine, 338
infinite loop, 117
Information Literacy Cycle, 6, 242,
330
information manager, 23
information system, 11
information system design, 303
Information System Development
Cycle, 6, 307
information system manager, 23
inhibitory inputs (neuron), 347
initialising variable, 117
inline comment, 104
input, 98
input and output requirements, 308,
312
input connectors (ANN), 339
input layer (ANN), 350
instance, 19, 251
integer type, 114, 121
integrated circuit, 181
integrity, 21
integrity of data, 24
intellectual property (IP), 23, 80, 87
intelligence, 332, 334
intent error, 76
interaction design, 31
interactionists, 366
interactive devices, 308, 313, 318
interconnectivity, 174
interface, 11, 36, 41, 49, 174
intermediate user, 33
internal documentation, 76, 103, 105,
109, 154
internal view, 13
International Electrotechnical
Commission (IEC), 178
internet abuses, 323
interpreted program, 95
intuitive, 36
invoke, 73, 124
IP (internet protocol), 197, 201
IPX/SPX protocol, 202
IRC (internet relay chat), 296
ISP responsibilities, 81
iris recognition, 55, 56
iteration, 96, 116-21, 127
J
join, 228, 229
joyrider, 23
K
key field, 20, 253, 274, 289
keyboard, 58
keylogger, 148, 327
kilobit, 178
kilobyte, 178
knowledge, 9
knowledge acquisition bottleneck,
339
knowledge base (KB), 337
knowledge engineer, 339
L
label, 251, 255
LAN (local area network), 197, 196
LAN segment, 196
laptop, 187
last in - first out (LIFO), 128
lead-through programming, 354
left outer join, 231
left-handedness, 38
level 1 cache, 181, 184
level 2 cache, 181, 184
library (subroutine), 124
lighting, 59
limits to miniaturisation, 179
Linden dollar L$, 300
Linux, 88, 149
literal (text), 71, 98, 143
load array, 136
local scope, 99
local variable, 99, 100
lock-in effect, 132
logic error, 76
logical abstraction, 243
logical operators, 109
logical view, 13, 15, 20
logicists, 364
look and feel, 84
loop counter, 121, 138
loops, 313, 217
low level language, 95
lumbar support, 58
M
machine code, 41, 95
magnetic bubble memory, 184
mailing list, 22, 26, 27
main memory, 183
mainframe computer, 187, 191
malware, 148
mandatory constraint, 281
many:1, 270, 273, 278
many:many, 270, 274, 278
map specification, 71, 151
master-slave, 202
materialism, 366
meaningful variable identifier, 76,
105-6
megabyte, 178
menu design, 308, 313, 318
menu driven interface, 42
menu structure, 319
metacontext, 9
metaphor, 44
methods, 124
microblogging, 298
Microsoft, 89, 131
Microsoft monopoly, 131
Microsoft Office, 179
microtransaction, 83
millisecond, 184, 192
mind-body problem, 366
mini computer, 187
Minsky, Marvin, 334, 362
minimal latency, 197
mirrored drives, 186
MMORPG, 299
mobile robot, 356
modem, 177
modem/router, 197
moderated channel, 296
modular programming, 163
module testing, 163, 166
modules, 73, 126-7, 156, 158, 163
monopoly, 131
Moore’s Law, 176
motherboard, 182, 184
Moving Pictures Expert Group
(MPEG), 86
mp3, 86
MS-DOS, 42
multiblogger, 288
multicasting, 197
multidimensional array, 137
multiplexing, 196
multitasking operating system, 192
multiuser access control, 25
multiuser operating system, 191
MySpace, 297
N
naming conventions, 105
naming variables, 105
nanosecond, 183, 184, 192
Napster, 86
n-ary relation, 258
© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall
Index 387

Nassi–Shneiderman (NS) diagram,
99, 109, 115, 119, 121, 153
NAT (network address translation),
197
national broadband network (NBN),
180, 200
natural inner join, 231
natural language, 335
natural language processing, 351
necessity dot, 283
nested if selection, 113
nested relationship, 261, 275
nested ternary, 314
network attached storage (NAS), 186
network cabling, 199
network effect, 131
network file maintenance, 196
network information system, 17
network management, 198
network protocol, 199
network security, 198
network storage, 186
networking, 11, 194
neuromodulators, 347
neuron, 180, 347-9, 362, 366
neurotransmitters, 347
newbies, 32
NIC (network interface card), 199
no derivative works (CC-ND), 88
node, 16, 194, 196, 199, 201, 349
noise, 59
non-commercial (CC-NC), 88
non-English speakers, 33
non-invasive, 56
non-monotonic logic, 364
normalisation, 277, 316
normalised, 249
normalised relations, 308, 313
normalised tables, 313, 317
not (logical), 216
not null, 282
notebook computer, 187
null, 20
O
object code, 95
object oriented (OO) database, 18
object-relational database, 18
obsolescence, 182
occupational health and safety, 61
occupational overuse syndrome
(OOS), 60
OECD Privacy Principles, 236
on-demand software, 190
ONF (optimal normal form), 20, 244,
246, 277, 279
ONF tables, 313
ongoing evaluation, 4, 153
on-line games, 299
on-line help, 36
open source software (see also
FOSS), 87, 88
operating system, 190
operationalist, 368
ops (channel moderator), 296
optical centre, 52
optical disc, 185
optical fibre, 190
optical storage, 185
optimised, 95
optimising systems, 18
or (logic), 109, 214
order by clause (SQL), 224
ordinal type, 114, 121
Orwell George, 238
output, 98
output connector (ANN), 349
output report, 317
overflow error, 128
ownership of data, 57
P
packet, 195, 201
packet header, 195
packet switching, 195
packet tail, 195
packet-based protocol, 202
page tab, 45
palmtop computer, 186
parallel distributed processing, 348
parallel processing, 180, 192
parameters, 124-5, 127
parent node, 17
PARRY, 360
passed by reference, 125
passed by value, 125
password, 56
patent, 84
pattern matching program, 359
pattern recognition, 351
payload (virus), 148
PDA (personal digital assistant), 186
peer-to-peer (P2P), 82, 87, 194, 195
pen based computing, 43
peripheral, 194
personal area network (PAN)., 202
personnel management, 172
pharming, 325
phenomenalists, 366
phishing, 325
phone phreaking, 325
photo-reactive dye, 186
physical network, 174
physical security, 24
physical view, 13
piconet, 202
pipelining, 179
pirating, 82
platter (disc), 185
polling (in multiuser OS), 191
Polya, George, 151
pop-ups (web page), 149
portability, 95, 127, 163
portable language, 95
post-tested iteration, 117-9
posture, 58
power source, 355
presence awareness, 297
presentation, 304
pre-tested iteration, 117-9
primary key, 274, 277
privacy, 23, 57, 235, 297, 327
privacy principles, 236
problem solving, 64, 151
problem specification, 71
procedural language, 209
procedure call, 72
procedures, 124-5, 127
process, 5, 304
processing environment, 173
processor, 181, 183
profile, 22, 23, 25, 57, 297
prognosis system, 18
program model, 33, 44, 49
program suite, 189
programming constructs, 96
programming language, 94
projection, 212
protocol, 197
pseudocode, 71, 94, 97-9, 102, 108-
10, 113-4, 117-8, 121, 159, 381
pseudocode comment, 105
pseudocode compiler, 381
public domain, 80
public timeline (Twitter), 298
Purpose Specification Principle, 236
Q
QIC (quarter inch cartridge), 186
quality of service (QoS), 198
quantum computer, 180
quaternary relation, 258, 262
© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall
Leading Technology 388

Queensland Workplace Health and
Safety Act, 61
query, 211
R
RAID (redundant array of
inexpensive discs), 186
RAM (random access memory), 183
RAM module, 184
random file, 146
rapid application development, 50
rationale for development, 152, 156,
307, 310
rationalists, 366
read/write head, 185
real variable type, 102
receding horizons effect, 363
record type, 142
recursion, 127-8
reduced instruction set computer
(RISC), 180
redundancy, 206, 244, 245
reference mode, 250, 251, 255
referential integrity, 24
registers, 181
relational algebra, 17, 209, 212
relational information system, 17,
19, 247
relationships, 251, 255
remote applications, 190
repeat loop, 117
repeater, 197
report layout, 308
required field, 284
reserved word, 105
resolution, 52
rest periods, 59
restore data, 192
results-oriented user interface, 43
retinal scanning, 55, 56
reverse chronological order, 298
reverse engineer, 65, 83
revision history, 300
RF (radio frequency), 240
ribbon interface, 42
right of first digitisation, 81
right outer join, 231
rights management information
(RMI), 81
robotics, 335, 354
roles, 251, 255
ROM (read only memory), 183
root node, 16
rootkit, 148
router, 197
row, 19
RPG (role playing game), 83
RSI (repetitive strain injury), 60
rule based expert system, 18, 337
rule interpreter, 338
runtime error, 76
S
safety officer, 61
same table join, 230
sample input, 350
scope, 99, 100
screen layout, 58, 153, 161, 308, 318
script, 95, 148
Searle, J ohn, 362
Second Life, 299
secondary cache, 183
secondary key, 275
secondary memory, 184
security, 12, 21, 25, 56, 172, 195,
304
segment address, 201
select clause (SQL), 211
select columns (SQL), 212
selection, 96-7, 107-10
sensor, 356
sequence, 70, 96, 98-100
sequential file, 146
server, 187
share alike (CC-SA), 88
shareware, 83, 87
shell, 339
signal interference, 201
signature recognition, 56
significant sample, 248
silicon chip, 181
simple bridge, 196
simulation, 18
single character wildcard, 216
single strong relationship, 270, 273
single table database, 244
skip, 72, 73, 109
smart bridge, 196
smartcard, 240
social engineering, 149, 325
social networking, 296, 297
software, 11, 64, 173, 189
software controls, 23
software development cycle, 6, 151,
154, 162
software interface, 43
software license, 81
software logger, 327
software monopoly, 104
software piracy, 81
solid state drive (SSD), 185
sorting, 140-2, 224
source code, 95
spam, 324, 326
spambot, 325
spanning tree algorithm, 197
special purpose application, 189
specification, 152, 156, 163
specification documentation, 309
spoofing, 324
spot colour, 54
spyware, 148, 149, 326
SQL functions, 225
SQL syntax, 211
stack, 128
standalone computer, 194
standalone operating system, 191
stealth blocking, 324
storage area network (SAN), 186
STP (shielded twisted pair), 200
streaming video, 200
string, 102-3
string handling, 143-4
strong AI, 335, 362
structuralists, 364
structure chart, 99, 153, 158
structured programming, 73, 124,
156, 162, 163
subquery, 219
subroutine, 124-6, 163
subset, 283
subtype, 284
super computer, 187
surplus entity, 265, 288, 315
swapping values, 125, 140
switch (network), 197
synapse, 347
synaptic gap, 348
syntax, 211
syntax error, 76
system, 11
system bus, 182
system manager, 23, 24
system owner, 309
system parts, 172
system security and integrity, 21
system view, 12
T
table key, 245
table loops, 289
tables, 17, 19
© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall
Index 389

target output (ANN), 350
task-focussed, 34
Tax File Number (TFN), 27
TCP (transmission control protocol),
201
TCP/IP, 201
technical management, 172
technological protection measures,
81
technology, 1
technology neutral right of
communication, 81
telco (telecommunication provider),
202
temporary files, 192
temporary variable, 141
tenosynovitis, 60
terabyte, 178
terminal node, 16
ternary relation, 258, 260, 288
test data, 155
testing of software, 77
testing protocols, 77
text files, 146
thin client, 190, 195
thin ethernet, 201
thoughtcrime, 238
thread, 298
threat monitoring, 23
Three Laws of Robotics, 358
time slicing, 191
Token Ring, 202
top down development, 156, 162
Torvalds, Linus, 88
touch screen, 43
trace table, 77, 121
trace values, 76
trade secret, 84
training (personnel), 172
training (ANN), 350
training weights, 350
transferor, 349
tree diagram, 16
tree spanning algorithm, 16, 18
trial and error, 64
trim (string), 143
Trojan horse, 148, 326
tuple, 20, 269
Turing, Alan, 22, 361-3, 368
Turing test, 361
tweets, 298
twisted pair cable, 200
Twitter, 298
typed files, 146
typeface, 53
types of computer, 186
types of error, 75
types of operating system, 191
types of variable, 102
U
U.S. Privacy Commission, 28
unary relationships, 258
unauthorised access, 23, 27
unconstrained join, 231
underscore, 106
unique, 20, 269
unique identifier, 28
uniqueness constraint, 269, 274, 289
unit/module wide variable, 100
unit/module wide scope, 99
Unix, 42, 88
unperson, 239
unsupervised learning, 351
untyped files, 146
UoD (Universe of Discourse), 248,
287, 311
UoD expert, 248, 287, 304, 309
update anomaly, 19, 245
update command, 217
usability, 36
usability design, 31
usability engineering, 31
USB flash drive, 185
useability, 40
Usenet, 297
user, 11, 32, 59, 172
user assistance, 36, 157
user centred design, 49
user focus, 34
user friendly, 36, 189
user interface (UI), 31, 36, 41, 49
user liaison, 198
user limitations, 37
user management, 198
user manual, 321
user model, 33, 44, 49
user profile, 297
user proof, 36, 166
user proofing, 114, 159
using variables, 102
UTP (unshielded twisted pair), 200
V
validation module, 339
vandalism, 149, 300
variable declaration, 103
variables, 71, 72, 102
video surveillance, 240
views, 12, 14
virtual communities, 296
virtual environment, 33
virtual machine, 191
virtual reality, 43
virus, 23, 148, 192, 327
virus scanner, 149
visual cohesion, 51
visual impairment, 37
voice recognition, 55, 56
void, 125
volition, 366
Von Neumann architecture, 179
Von Neumann bottleneck, 179
von Neumann computers, 347
W
wireless access point (WAP), 201
weak constraint, 271
web page spoofing, 325
web-app, 190
weighted input, 349
Weizenbaum, Dr J oseph, 349
where clause (SQL), 211
while loop, 116-7, 161
white space, 52
wide area network (WAN), 194
Wi-Fi, 197, 201
Wikipedia, 300
wikis, 300
wildcard, 216
wireless network, 201
wireless security, 202
wisdom, 9
wizards, 190
WLAN (wireless LAN), 201
work for hire, 80
work procedures, 172
work station, 187
work station layout, 59
workplace health and safety, 61
worm, 148, 327
WWAN (wireless WAN), 201
WYSIWYG, 43
X, Y, Z
XML, 133
YouTube, 288
zombie computer, 149, 327
© Kevin Savage 2011 – Single user licence issued to Mitchell Ingall