Index

............. 99 Bluetooth ........ 276 ATRAC3......... 142 Application software ............................................ 157 Binary search.......... 259 Access right ..... 277 BASIC ........ 256 Balance check ...................................................................... 264 Auxiliary storage device ........................... 266 ANSI (American National Standards Institute) .............. 48 Act on the Protection of Personal Information.......... 148 AUI cable .................................... 219 Acceptance test ......................................... 40 Bar graph ................................................................... 203 Blu-ray ............................................................................................................ 99 Benchmark .................... 40 Balance sheet.................................................................. 282 ....... 67 Analog ............................................................................. 224 Blog ......................................................................... 167... 30 Barcode .................................................................................................... 167 Black box test .......................................... 288 Accounting audit ........... 216....................................................................... 193 Availability ................................................. 134 ASCII ....................................... 161 Biometric authentication .................................................................................... 261 Backup .................................. 208 Big bang testing ............................. 206 BBS .................................................. 266.......................................................................................................... 161 Binary number............................... 42 Acquisition ........... 145 Average cost method ............................... 197 BMP ........ 209............................................................................................Index Symbol μs ............................................... 215............................. 282 Application gateway.......................................... 167 A A business operator handling personal information .................................................... 120 Blade server.............................................. 174 Alliance .. 294 BIOS.............. 23 Agent orientation............. 35 Act on the Prohibition of Unauthorized Computer Access...................................................................................................................................................................................................................... 102 Basic Resident Register Network System ................................................................ 34 AVI ................................................................ 27 Absolute path ............... 292 Application management ........................................................... 179 Basic policy ................. 126 Algorithm ....................... 122 Billing....................... 27............................................................. 52 AAC .................................................................................................................................................................................................. 226 Base plus metered ............................. 169 ASP .................................. 241 B Backbone LAN .............................................................................................................................................................................. 162 Approval test (Acceptance test) .......... 68 Acquisition cost.............................................. 240 Boot sector virus ............................. 177 Binary subtraction .... 242 ABC analysis.... 179 401 Asset ............................. 269 ADSL ............................ 124 Access point ... 22 ATM ......................................................................... 93 Audit report meeting .............................................................................................................................. 187..................................................................... 220 Addressing ............................................ 191 Bit ...... 272 Array ............................ 172 Arrow diagram ..... 262 Antivirus software ............................................................................. 168 Address......................................... 285........ 149 Audit trail ....................................................... 124 Archive .......................................... 149 Accounting title ......................... 169.................. 100 Assembly language ........................ 212 Batch processing .... 59 Barcode reader ............... 289 APOP..................................... 282 BOT....................................................... 286 Basic policy for computerization ................................................................................................................ 242 Attribute ............... 200 Analog line ................................................................................................................................................ 40 Association diagram ................................................................................................... 286 Availability management . 52 A/D conversion ............................. 218 Applied mathematics......... 212.............................. 81 Basic software .......................... 272 Appearance of symptoms ................... 242 ARPANET...................................................................... 215 Absolute reference ..................... 277 Binary addition .................... 276 Affinity diagram ......................................................................................................................................................................

................. 264 Cache memory ............................................................................... 197 Cell ........................................... 169 Characteristics of databases ......................... 192 CAD .................................................................... 218 Clock frequency ............................... 197 CD-RW............................. 212 Common frame ...................................................................................................... 242 Compression rate....................................... 95 Client ............................................................................................. 128 Common key cryptography ........................................... 246 Combination ... 265 Brightness............................................................................................................. 205 Collage ........................... 17 Business model........................ 39 Bridge ..................................................................... 84 Bubble sort .................................. 189 Cluster system .. 69 Class . 298 Communication line .......................................................... 38............................................................. 178 Competitive superiority ........ 84 CAM ....... 201 Brainstorming.................................................................................. 37 Byte ............................................. 95 Class diagram .. 76 Cell reference ................................................ 274 Cash cow .................................................................. 118 Complement ...... 17 Business perspective .................. 189 Clock generator .............................................. 163 Command button ......................................................................................Boundary value analysis ...................................... 69 CFO ..................... 83 Cap ....................................... 122 Compression............... 179 Code design ............................... 226 CD-R ............ 82.................. 66 Cash-flow statement ................................... 84 BtoE ................................................................ 206 Client/server system ....................................................................................................................................................................................................................................................................................................................................................................... 187 Computer graphics (CG) .......................... 76 BtoB .................................. 65 Buzz session ............................................................................. 198 Company system organization ................................................................................................................ 55 Change management ............................................................................................................. 178 Buffer overflow attack...................... 276 Cause and effect diagram ..................... 84 BtoC ....................................... 236 Chip ........................ 92 Business strategy ................... 43 Business objective ............................... 274 B/S............................................................................................................................................................................................................................................................................................................. 36 Break-even point ..................... 266 Communication service . 179 CA (Certification Authority) ...................................................................... 206 Clipboard............. 99 Check box ............................... 92 Business process improvement ....................................................... 190 Business management ........... 243 Coaxial cable ................................... 96 BPR ... 121 BPM ......................... 117 Cold standby system ................................................................... 52 Comprehensive testing ............................................................................................................. 142 Business process. 188 CIM (Computer Integrated Manufacturing)............ 72 BTO (Build To Order) .......................... 277 Capacity management .......................................................... 276 Broadcast mail........ 68 Capture card ...................... 264 COBOL ............... 40 BSC (Balanced Score Card) ........... 160 Compliance ................................................................................................................................................................................................................................................................................................................................................................................................................. 294 CALS ...... 83 Common application software ..................................................................................................................................................................................... 236 Commerce ........................................................................ 96 bps .................. 97 Business process model...................... 245 402 ............................................................................................. 69 Chain e-mail ................................... 204 CEO................... 267 Compact flash memory card............................................ 32 CBS .................................................... 240 Computer configuration ............................ 241 Carrier .......................................... 299 Cable ............................. 124 Bus power method .......................................................... 67 Compiler...... 91 Business model patent .................................................................. 219 Cell production system ................................................. 41 CATV (Cable television) .......................................... 145 Capital participation ................................................................................................................... 244 Broadband ............ 283 Bug control chart ................................................ 143 Character code...................... 83 CIO .. 19 Comparison sort ... 219 Centralized processing ........................................ 167 C C language........... 38 Break-even revenues ............ 201 Bus width . 247 Chat ....... 197 CD-ROM....................................................................... 274 Communications protocols...................................................................................... 246 Callback .................................... 205 CMYK............. 133 CCD .....................................................................................................................................

................................................................................... 207 Database software ................................................................. 97 Computer simulation ...................................... 35 Decode .................Computer literacy .............................................................................. 298 Design right ....................................... 188 Cracking .................................... 40 Current directory .............................................. 69 Data oriented approach ............. 168 Damage to data........... 69 Database .............................................................. 265 Default value ........................................................................................................ 73 CSR .................................................................................... 264 Cross-site scripting ............................................................................ 117 Data dispersion ............................................. 281 DAT .............................................................. 85 Contact type ... 76 Department ................................... 215 Current liability ............................................ 150 Cost ....................................................................... 237 Deferred asset .... 203 Device driver .... 43 Copyright and property rights ......... 44 Core competence ........... 253 Data mart .......................... 15 CTI .......... 40 Defragmentation................................................................................................................................................................. 55 Corporate objective ................................................................................................ 214 Current asset ............................................ 281 Credit card ..................................................................................... 244 Control . 118 Decimal number ........ 118 Device ...................................................................... 102 Computerization planning .... 43..... 78 Contactless type .............. 56 Critical path ....... 94 ............................ 20 Depletion ............................................................................................................ 43.... 151 Control chart ...... 45 Desktop .............. 29 Control device ................................ 250 Database management system (DBMS) ........................................................ 15 Corporate philosophy ....................... 35 Depreciation rate ..................................... 72 Customer satisfaction .................... 70 Data-driven.................................................... 69 Copyright .. 67 CSF ......................................................................................................................................................................................................................................................... 187.................................. 198 Data design ....................................... 195 D D/A conversion .................................................................................. 246 Computer virus....................................................................................... 283 CRT display.......................................................... 74 Cross compiler ........................ 35 Depreciation ................................................ 282 Computerization initiative ..................... 248 Database server ................................................................................................. 67 Customer satisfaction survey .....115................................. 188 Control activity ...................................................................................................................................................................................................................................................... 118 Confidentiality ................. 28 COSO ................................................... 27 CRM (Customer Relationship Management) ............................................. 247 Database design....................... 203 DFD.............................................................................................................. 15 Correlation ........................................................................................................... 73 CSF analysis ................................................... 171 Data warehouse ........................ 74 CtoC ........ 40 Current ratio ........................................................................... 227 CS ......... 180 Crossover cable .. 157 Decision-making ..................................................................................................... 228 CPU (Central Processing Unit) ........ 94 De facto standard ..................................................................... 150 COSO framework ............................................... 15 Corporate governance ...... 141 Debit card .............. 286 Configuration management ................................................. 78 Content filter .................................................................................................. 143 Consolidated testing .............................. 72 Cylinder............................... 195 Delphi method ........ 69 Data mining ............................................. 121 Constant .................... 249 Database model ....................... 126 Data structure ................ 32 Declining-balance method ............ 242 Default gateway ................. 293 Contracting ............................................................................................. 50 Contrast ............. 187 COO ........ 224 Development (Programming).......................................................... 35 DES (Data Encryption Standard) ............... 171 Construction of magnetic disks .............................................................. 168 Decompression ...................................... 84 403 CUI ......................... 78 Crisis communication.................................... 41 Customer loyalty ..................................................................................................................................................................................................................................................... 195 Consumer appliance ........................................................................................ 67 CS management ................................................................................................................................................... 102 Cost efficiency of systems ..................... 67 Corporate activity .......................................................... 38 Cost effectiveness.................................. 211 cpi ................................. 228 cps ............................................................... 79 Debugging ............................................ 165 Data manipulation ......... 102 Condition coverage .....................

.................................................................. 93 Entrance access control ............................. 99 Electronic money .............................................................................................................................................................. 205 DVD-R ..................................... 210 Falsification of information ......................... 225 DIMM ...................................................................................... 204 Distribution diagram . 255 Expansion memory ................... 93 ERP package ..................... 77 EPROM ....... 66 F FA (Factory Automation) ................................................ 146 Fail soft ........................................................ 262 Feature extraction ...... 182 Dual system .......................... 77 Divisional system organization ...... 197 DVD-RAM................. 255 Exclusive lock ...................................... 211 FDD (Floppy Disk Drive) ........................................................................................... 18 DMZ (DeMilitarized Zone)................ 281 Fast Ethernet .. 205 Duplex system ...... 148 Documented basic plan .............. 148 Dog ................................................... 83 Facility ............................ 82 Electronic bulletin board ................................................................................ 297 EOS ........................... 168 Encryption ......................................... 287 EUC.................................................................................. 79 E-mail ......................................................................................................................... 226 Digital signature ................................................. 266 DTD ....................................................................and long-term plan...... 269 Entity .... 272 Dormancy ............................................ 191 Equivalence partitioning ....... 211 Fail-safe............................................. 117 External environment ......... 38 External bus.......................................... 261 Fault management ................... 260 EU directive ................................................................. 79 Ethernet ............................ 293 DNS........................... 274 E-mail bomb ............ 169 E-business ................................................................... 83 Economic ordering quantity ................................................. 197 DVD-ROM... 125 ETC system .....................................................116........................... 66 Domain name .................. 84 EEPROM ................................................... 295 Fiber optic cable ................... 197 E Earned value management system .. 272 DNS server .................................................. 123 Exchange line service ................................................ 214 File server ............................... 32 Expense ...................................................................................................... 190 External clock frequency................................. 98.......................... 33 EDI ...................................................................... 282 DoS attack ......... 167 Digitizer/tablet ............................................................. 273 Documented audit plans ........................................................................ 298 End-to-end ....................................................... 291.................................... 181 Differential backup........................................................................................................................................................................................................................................................ 80 Estimation ........................................................................................................... 216 Digital......................................................................................................................................... 283 Employment agreement ............ 215 404 .......................................................................................... 122......................................... 25 Distribution information system .......................................................................................................................... 46 Digitization..................... 172 FIFO list .......................................................................................................................................................................... 264 Field type................................. 283 Dot impact printer .................................................................. 51 Encode............................ 172 File exchange software..... 190 External design ......................................... 146 Facility management ............................. 300 Digital watermarking ........................................... 214 Discrete mathematics ................................... 197 DVD-RW ...................................... 283 File management ................................................ 50 Dispatching .............................. 200 Digital camera ..................................................................... 191 Electronic application/notification system ........... 148 Documented medium............................................................ 193 Expectation value ......................... 169 EVMS ............................................. 227 Distributed processing ................. 193 Directory management ......... 120 E-R diagram .................... 228 dpi .. 136 EBCDIC ...................... 194 FDDI ....................... 143 Fault tolerant .......................................................................................................................................................................................... 207 File sharing ........ 191 Driver .......................................... 275 Exclusive control.................................................................................................... 50 Display ........................................ 157 Dispatched Workers Act ......................................................................................... 228 DRAM...................................... 173 File ...........DHTML.................................................................................................................................................................................................................................. 168 Encoding ..................................................................... 203 DSU.............. 211 Failure rate ...... 83 EC (Electronic Commerce) .......................................... 136 Exception handling testing ..................

........................................... 201 Image scanner ................ 264 Hue ......................................................... 226 Hardware .............................. 223 HDD (Hard Disk Drive) .......... 48 IE (Industrial Engineering) ..................... 214................. 166 Holding company .. 269 Hosting service ................................. 181 HTTP.................................. 25 GB ............. 77 IC tag .. 124 Gordon method ....................................... 266........................................................ 223 Generation management.................... 240 Hz ............ 104 Function-driven ......................................................................... 143 Incident management ......... 41 Incremental backup ......... 205 Host address ............................. 21 IEC (International Electrotechnical Commission) ........................................................................................... 238 Formal organization ........................................................... 58 IEEE (Institute of Electrical and Electronic Engineers) ........................................... 198 Flat ....................... 205 Housing service ............................................... 252 Individual documented plan ............ 79 GPS (Global Positioning System) ................... 189 G I Gantt chart ........... 101 HTML ...................................................................................................................................... 38................................. 195 Free software ........... 35 GUI .... 174 Follow-up ........ 271 Incident.............................................................405 Financial statement.... 18 Functional requirement .......................... 211 Hot standby system ..... 273 GIF ....................................................... 78 Icon ..................................... 216 Index ............................................................................................................................................................................................................................................................................................................ 235 IC (Integrated Circuit) chip ....................................................... 148 H .................. 217 Generic JP domain ...... 243 Graphics software ........................................................ 288 Human threat .................... 142 Identification code ........... 276 Function ............................................................................... 219 Function key..................... 143 Income statement .............................. 268 HTTPS . 96 Handwritten character input device....................................................................... 179 FP (Function Point) method ........ 235 Hexadecimal number .............. 248 Hierarchical organization ............................................................................. 291 First-in first-out method ..................... 244 Human interface design.... 268 Hub ... 101 Hot site ............................................................................ 191.................................................................... 295 Firewall ................ 47 Frequency distribution table .............................................................................................................................................................................. 40 Fixed cost ..................................... 42 General purpose computer ............................................................... 117 Human security measure ............. 40 Flash memory.. 236........................... 18 High-level language ...... 261 Global IP address .......................................................... 280 Hybrid cryptography ................. 274 FTTH (Fiber To The Home) ....................... 202 IEEE1394 .......................................... 77 IC card ..................................... 38 Fixed liability ..................................................................... 190 FTP ............... 34 Fixed asset .................. 167 General ledger ..... 237 Function testing .................................................................................................................................................................................................................................... 157 Hierarchical database ........................... 195 FORTRAN ................................. 149 Foolproof .......................................... 300 Hypermedia .................................................................................................................................................................................................................... 98 GtoC .................................................................................................................................. 166 FSB (Front Side Bus) ........................................ 240 Gigabit Ethernet ....................... 123 Functional organization .. 236 ICT infrastructure management .............................................................................. 79 Gompertz curve ............................................................................................ 277 Flowchart ............................................................................. 252 Form design................................... 270 Global navigation satellite system..................................................................................................................................... 17 Format (initialize)....................................... 211 Foreign key ........................ 125 Fragmentation ...................................... 84 Guaranteed rate ........................................................................................................... 38 Groupware............................................................................. 251........................................ 29.................................................... 36 GPS application system........................ 68 Horizontal distribution .............................. 40 Fingerprint authentication ......... 244 Gross profit...................... 79 Graphics processing ........................ 226 IMAP4............................................................................... 194 Help function......... 179 Histogram ........................................................................................................... 58 IEEE1284 .............................

............... 173 Limited liability company ............................................................................ 170 JIS Q 9001 .................................... 281 Leakage of information ..................................................................... 274 IT governance.............................. 141 ITU ................. 132 KJ method .............................................................................................................................. 282 Informal organization ................... 265 LAN board ..................... 73 Kick-off .................... 91 Initial cost ..................................................................... 284 ISO (International Organization for Standardization) ............................................................................................................................ 117 Internal environment ............................................................................................................................ 31 Line department ........................................................................................................................... 199 Interface design ........................................................................................................... 279 Information Disclosure Act . 275 ISMS .................................................................................. 279 Integration testing....................... 149 Information security management........................... 17 Information accessibility ................... 269 IrDA ............................................ 281 Leased line service ......................................................... 145 IT service management ..................................... 45 Intelligent home appliance ......... 239 Information asset .................................................................................................................................. 57 ISP (Internet Service Provider) .................. 258 LAN analyzer ..................................................................... 49 LAN ........................... 203 Iris ..................... 236 Interlaced display ............................................ 228 Input device ..................................... 267 J JAN (Japan Article Numbering) code ....................... 121 Integrity .. 225 Input/output interface ............. 33 KB ................................................................ 296 ISDN .............................................. 260 Language processor....................................................... 43 Intellectual property rights for websites .................................... 264 LAN standards ....................................... 180 JIS (Japanese Industrial Standards) ......... 180 Intrusion ........................................................................................................................ 92 Information systems strategy .. 285 Information system ...... 57 JIS X 5080 ......................................................................................................................................................... 73 L Labor Standards Act ................. 33 Inventory control ................................Industrial device ........................................................... 284 Information security policy ......... 58 JIT (Just-In-Time) system ............... 275 Least-squares method .................... 286 Intellectual property right ..................................116..... 270 K Kanban system ................................................................ 141 IT strategy .............. 85 Industrial property right ................................................. 65 Internet ................................................................................ 145 IT service financial management....................................................... 205 Interface ....................................... 259 Internet service ................ 55 Information literacy................ 199 Insertion sort ............................................ 34 IP ...... 31 Liability ............................. 269 IP phone ............... 33 Join .. 178 Intangible asset . 56 Information ethics .................................. 57 JIS code table ....... 17 Line chart .................................... 284 ISMS conformity assessment system ...................... 190 Internal control .............................................................................................. 227 Last-in first-out method ............................................. 150 Internal design ............................................... 58.............................................. 47 LIFO list ................................................................. 180 Laptop .. 167 Keyboard .......... 253 Journal book ........................................................................... 42 JPEG ........................................... 43............................................... 123 Invalid equivalence class..................... 187........... 274 Interpreter ...................................................... 45 Infection ............................................................................................................................................................................................................................. 224 Laser printer ............................... 179 JavaScript ................................................. 40 License agreement.... 211 Inkjet printer................................................................................................................................................................................. 204 Information system model....................... 97 Information security audit .............. 85 Interactive processing............................................................................................................................................. 32 Inventory valuing method .............. 121 Inventory carrying cost ....... 36 KPI .................................................... 59 Java ........ 227 Leakage ............. 246 Internal bus............................................... 240 JPNIC ............................................................................... 225 KGI ........ 151 ITIL .......... 275 IPv6 ................. 281 Intrusion testing............................................................................................... 266..................................................................................................................................................................................... 151 IT service continuity management ................................................................................ 34 LCD display ...... 18 406 .......

................................................ 258 Network address ............ 297 Median ...................................... 300 Metered ................. 162 Logical product . 55 Netnews.... 242 Lossy compression .............................................................................................................................................................................. 33 ms ................ 76 Linear search .................... 23 Matrix organization ................................. 164 Modeling ........................................................... 209 MTTR (Mean Time To Repair) .................................................... 235 407 Merge ............................................ 51 Marginal profit ................. 167 MSB ........................................................ 194 Mailbox ................................................................... 118 Module test..................................................................... 132 MIME ............................................................................ 148 Main memory ............................. 198 Mobile communication ........................ 246 Non-operating expense................................................................................................................................... 226 Magnetic disk ...................................... 178 Merge sort .............................................................. 281 Lossless compression .............. 177 List .......................................... 223 Middleware ................................ 166 Normalization................................................... 209 Multimedia ..................................................... 164 Memory ............. 207 NGO ................................... 92 Module .............. 237 Main audit ...................... 224 ns ......................... 242 Milestone ..................... 68 Message digest ......................................................................................................................................... 172 List box .............................................. 25 Mandate contract ....................... 274 Mailing list ............................................... 179 LP (Linear Programming) ........................................................................................................................ 242 Lot ..... 24 Matrix diagram................................................................................ 125 Malware ............................................... 242 MPEG .... 282 Management resource ......................................... 118 Monitoring ........................................................................................ 264 Niche strategy .................................... 70 Markup language........................................................................................................................... 187................................................................. 242 M M&A ................................................................................................................................................ 227 Multitask .................... 192 Maintenance ............................................. 190............................................................................................................... 190 Menu bar .................................................... 32 Luster .............. 191 Matrix data analysis ......................... 252 Notebook ......................................................................................................................................... 256 Logical operation ........................................................................................................................................................... 40 Net required quantity ................................................................................................ 276 Mode ..................... 70 Marketing ........................................................................................................................... 167 ............ 255 Log file ............................................................... 123 Lock ........................................................................................................................................................... 151 Moral right ..................................................................................................... 241 MPU ........................................................... 38 Normal distribution ...................................................................................... 98............. 16 Management science method ................Line production system ............................. 70 Marketing mix ......................... 68 MAC address.......................... 162 Logical structure . 162 Neighboring rights ..................... 50 Negation ........... 33 Netiquette .......................... 272 MO ............................................................................................................................................................................................................. 38 Non-operating income.... 57 NIC (Network Interface Card) .................................... 236 Load testing .................................................................................... 274 Main ............................... 240 Multiscan display ......................... 244 Lzh .. 44 Mouse ....... 213 N NDA (Non-Disclosure Agreement) ....... 67 Non-interlaced display ..................................................................................................... 188 MRP (Material Requirements Planning) .... 274 Network....... 164 Measures for physical security control.... 19 MB .................................................................................... 43................... 277 Microcomputer .... 34 Low-level language .......................... 180 Logical sum ..................................................... 180 Mask ROM................... 225 MP3 ............................................... 167 Mean .................... 265 Machine language ...... 248 Network printer ......................... 212 MIDI .... 162 Loss of information ............ 269 Network database .................................................................................... 282 Magnetic card reader ......... 178 Merger ......................................... 160 MTBF (Mean Time Between Failures) ........ 179 Macro virus ............................................................... 44 Net assets................................................................................ 164 Measure of central tendency of data ........................................................................................................... 39 Market research ......................................................................................................................................................

................... 38 Organization ..................... 136 Person-months ....................................... 255 Operability testing ........ 299 PL (Product Liability Act) .... 54 O Object orientation ............ 197 Optimization..................... 227............................................. 291 Online system ...... 210 Pareto chart ...................................................................................... 244 PKI .............. 167 Preliminary audit ................................................. 33 Ordinary income ...................................................... 223 OGC .................... 271 Pop-up menu .......................................................................................... 207 408 ............. 281 Peer to peer............................................. 212 OS types ... 133 PNG......................................... 188...................... 47 POS system ..... 187 Permutation ................................................. 283 Physical threats .................................. 226 Octal number ......................................................................................... 85......................... 291 Packet switching .................................................................................... 17 OS (Operating System) ............. 43.............................................................. 68 Office computer........................................................ 282 Portfolio ........................................ 125 Primary key ................ 203 Plug-in ................................................................................................................. 26 Parity bit ................................................................................ 206 Penetration test ..................................................................... 45 PB ............................................................................................................ 25 Portrait right ......................................................................................... 77 PostScript language ......... 123 Operating income ................ 228 ppm ................................................................................. 219 Opinion exchange meeting ........................................................ 202 PDA........... 169 Password ......................................................................................................... 220 Preventative maintenance...........Nuisance e-mail law ................................................. 276 Packet filtering .............................................................. 157 OEM ...... 52 Plotter ..................................................................................... 268...................................... 72 One-way hash function ............................... 202 Parallel processing ...................... 136 PERT ....................................................... 30 Pixel ............................................................................. 221 OSS types .............................................................................................................................. 141 OLED (Organic Light...................................................... 123 Performance testing................................................... 104 Operational test ....................................................................... 291 One-to-one marketing ............ 123 Operations audit .................... 253 Operation device .......................................................................... 275 Packet communication ........................................................................... 101 P P/L .................................... 133 OCR (Optical Character Reader) ..... 204 Online transaction processing .......................................... 222 Output device ......... 240 Pointing device .......... 228 Plug and play.................................... 227 OMR (Optical Mark Reader) .................................................................................................................... 227 Outsourcing .................................................................................................................. 214 OSI ................ 126 OBS .............. 222 OSI model .......... 17 PDF ................................................................... 205 Parallel system ............... 283 Patent right ........................................................................................ 149 Operator symbol .............. 149 Optical communication .................................... 267 OSS (Open Source Software)........................................................ 290 Password crack ...................................... 225 Pointing stick...................... 123.............................................................................................. 21 Ordering cost .....................................................................................................................................................................................................................................Emitting Diode) display ......................................................................................................... 208 Peripheral device ......................................................... 66 Prefix ................ 162 Personal information ............................. 226 One time password ................................ 275 Page printer ...................................................................................................................... 266 PC/AT-compatible computer ........................................................... 236 Port ............................................... 251............................... 225 POP3 .........224 PDCA ........................... 228 PPM (Product Portfolio Management)................................................................................................ 41 Packet ...................................... 227 Parallel interface ............... 201 PCMCIA....................................................................... 167 PBX ......... 187........................................ 195 OR (Operations Research) .. 148 Presentation software . 211 Operational requirement.................. 38 Operation............................................................................................... 287 Person-hours............. 276 Optical disk ............................................. 252 Print server . 240 Peeping ....................... 284 Pie chart......... 70........................ 187 Operational cost ................... 48 Port scan .................................................. 218 PMBOK . 27 Phishing.................................................................... 52 Personal information protection ........................................................................................................ 68........

.. 173 Queueing theory .. 224 RAD ...................................................... 132 Project organization ................................................. 167 Public domain software ................................................... 132 Project member ......... 144 Quantization ..................... 198 Range ...................................................................Printer ....................................................................... 253 Project ............ 31 Regression testing .. 66 Queue .. 59 Quality assurance agreement.................... 127..... 69 Requirements definition ....................................................................................................................................................... 127 RFC .. 248 Relational operation .......................................................................... 71 Production system .................................................. 213 Profit ............. 105 Product life cycle .................................................................................................................................. 125 Repeater ............................... 105 RFID ................104................. 187 Procurement ........ 143 Procedures for implementation ............................ 131 Project completion report ..................... 38 Program ................................................................. 77 Private IP address .... 285...................... 253 Relationship ..... 126 Processor .................................... 265 Release management ........................................... 274 Proxy server ................................................................................................................................. 236 Purchase planning ........ 38 Profitability............................................................ 270 Probability ........................................ 132 Project scope management ................................................................. 76 Profile ....... 241 R R&D ....... 93...................................... 158 RAM .................. 219 Relay device ....................................................................... 282 Programming.................. 127 Radar chart ................................ 280 Pull-down menu ................................................................................................................... 298 Publicity right ...................................................................................................................................................................... 48 Published information ........... 165 RAS ..... 286 Process oriented approach .................. 123 Relational database....................................................... 265 Repetition structure ........................ 161 Protocol ....... 251................. 162............................................................................................................................... 255 Real-time processing .............. 158 Radix conversion.... 106 RGB ................. 244 Response time ........ 41 Profitable line ....... 294 Read lock............................................................................................... 116 Residual value ........... 252 Regression analysis ....................................... 32 QuickTime....... 143 Remote maintenance ....................................................................................................................... 168 Question mark ..................................................................................................... 118............................................................................................... 251 Relative reference ........ 206 Receiving inspection ............................................ 20 Project plan ...................... 47 Private brand ............................... 227 Privacy Mark System ........................................................................ 267 Prototyping model ............. 125 Program virus ............................. 208 Restore ................... 172 Recovery process .... 236 Radix ..................................................................................................... 117 Program quality .................................................................................... 179 Project (DBMS) .................................................... 257 Referential constraint ............................................................... 287 Privacy rights ...................................... 131 Project manager........................ 46 Public key cryptography ........................................ 28 Radio button ................................................................................................................. 179 Program design ............................................................ 128 Provider ........................................................................................................................................................... 296 Reverse auction ...................................................................................... 84 Reverse engineering ................................ 78 RFP (Request For Proposal) ......................................................... 71 409 Q QR (Quick Response) code ........................................... 132 Project management ........116..................................................................... 119 Program step method ... 243 ................................................................................... 163 Problem management ..... 123 Record .......179 Programming language .......... 133 Proposition ........................... 75 Rack-mount server ......................................................................................................................... 66 Product planning ................................................................................................... 216 Retina ..................................................................................................... 191 Random access ................. 176 Representative director............... 270 RFI (Request For Information) ..................................................................................... 292 ps .... 35 Resolution ............................................................................................................................................ 115...........

......................................................................................................................................................... 151 Select ............................................. 75 ROE..... 201 RSA .............. 283 Security management ....... 142............... 44 Right of screening ....................................... 289 Signed binary number .............. 103 Risk assessment..................... 145 S/MIME ................................................................................................ 104 Software package for each industry .......................... 203 SD memory card ............................ 141 Service management implementation planning........................... 127 Software license .......... 144.................. 28 Scheduled maintenance .................................................................................... 206 Service contract .................... 117 Software development method ........ 38 Sequence structure .............................................. 298 Sector .............................. 99 SOA..................................................................... 44 Right of recitation ........................................................................ 169 Signature code ........................... 202 SCSI ID ................................................................................................. 54 Service support ..... 214 Routing ............................... 73 Screen design ..... 195 Secret key cryptography........... 193 Simulation ......................................... 198 SDMI...... 160 Signed bit ..................... 222 Source document ...................................................................... 237 SCSI ............................... 226 Source code .................................................................................................................................................................................... 32 Simulator ....................... 71 Sales promotion................................................................................ 44 Right of public rental .................................................... 91 SGML................................................................................................................................................................ 168 Sandwich testing ........................... 257 ROM ............................ 101 Sales planning ......................... 51.. 161 Set operation ........................................................... 255 Shareware .. 198 Serial interface .......................................................................... 280 Software architecture design ......... 268................. 257 Roll forward .................................................................. 100 Social engineering .. 123 S SaaS............................................................................................................................................... 201 Serial printer .................................................................... 175 Sequential access .................................................................. 71 Sampling ..................................................................... 236.................. 74 Scorecard ........................................... 117 Software detailed design ...................... 99 Sorting ............................................... 177 Search time ........ 137 Solution ...... 143 Service management ............... 115 Service delivery.............................................................................. 100 Solution business................ 246 SLA (Service Level Agreement) ......................................................................................................................................................... 142......................... 80 Software requirements definition ................................. 46 Software life cycle.................................. 236 SOW (Statement Of Work) ..................................116................ 125 SCM (Supply Chain Management) ... 146 Segment............................................................................................................................................ 279 Security hole . 81 Software package for each job role ................................................................. 44 Right of public transmission ............................................................................................ 41 Roll back ........ 175 Selling......... 178 Sound input device ........... 44 Right of reproduction ............ 261 Segregation of duties ................................................................................................................................................................... 210 Server .... general and administrative expense ............................................................................... 144 Service desk ......................................................116. 300 Set ................. 195 Secular change ..................................................... 284 Road map ................... 144 SLCP ........... 242 Search ................................ 271 SNS ...... 253 Selection structure .............. 160 SIMM ...................................................... 299 Rush testing ........................... 191 Root directory ........................................................................................................................................................................................................................ 44 Right of real name announcement....................................................................................... 227 Serial system .. 270 Routing table .............................................. 44 Right of translation.................................................................. 244 Scatter diagram .........Right of avoidance of modification ........................................................................................ 142 Service Providers Law ......... 143 Session key cryptography .. 270 RS-232C . 122 Saturation ........................................ 47 Shift JIS ........................................................................................................................ 74......................... 254 SFA (Sales Force Automation) ....... 44 Risk analysis ................................................................ 116 Solicitation .................................................................... 142 Security wire ................................... 285 Risk management ................................ 272 SMTP ......... 128 SLM (Service Level Management) .... 44 Right of publication ..................................................................................... 126 Software development model ........................................................... 105 410 ................. 181 Shared lock ...................... 294 Security .......................................................................................................

................................................................................... 239 Stylus pen ........... 282 SQL ............. 225 Touch panel .... 54 Standards for Measures against Unauthorized Access to Computers ......................... 225 Traceability system ..................................................................................................................................................................................... 214 Subscript..................... 291 Stack .................. 211 TCP ........................................................................................................................................... 122 Topology .................................. 176 Supercomputer ............................................................... 51 Sub-directory .................................................. 208 Tie-up ................................................................. 209 System requirements definition .............................................................. 35 Strategy map ...........................Specific application software ........ 279 Target income ...................................................................................................................................... 146 Surveillance camera ........................... 18 Stakeholder........................... 181 Tangible asset ................... 280 Spreadsheet software........................................................... 50 Terminator ................. 228 Thin client ............................................. 35 Stealth virus.................................... 225 Touch screen................... 269 TCP/IP............... 167 TCO (Total Cost of Ownership) ............................................................................................................................................ 283 Stock company ............................................................. 203 Testing ................................................................................................................... 126 Stub ........ 56 Standards for measures ................................................................................................................... 281 Technological strategy............ 39 Target marketing ................................................................. 199 Storage media ...... 198 Streaming ............... 268 Technical security measure ......... 122 Systems architecture design . 274 Temporary Transfer ....... 149 System audit standards ........ 101 System management standards .................................................................... 148 System auditor................................................................... 115 System performance ........................................................................ 215 Spiral model .. 207 Three primary colors of light ................................................................ 187........... 265 SWOT analysis................................................................................................................................................................................................... 78 .......................................116................................................ 191 SRI ........................115............................................... 173 Staff department ......................................... 119 Text box........................................................................................................................................................................ 240 Top-down testing ......................................................... 253 SRAM ...................................... 65 System acceptance ........................................................................................................... 240 Structured method ........ 69................................................................................. 116 System testing .................................... 286 Standards for Measures against Computer Viruses.............. 122 Style sheet ................. 244 Three-layer architecture .......... 261 Switching hub ............................ 127............ 236 Theft of information ......................... 193 Straight-line method ......... 205 Standard deviation...................................... 205 Three elements of color ..................................................... 118 Statistics ....................... 72 TB ..... 219 Spyware.................................................................................. 260 Total inventory cost ................. 54 Star ............... 281 Thermal transfer printer ............................................... 146 System integration. 241 Switch............................. 223 Surge protection ........................................................................................................................ 17 Stockholders’ meeting ............................................................... 33 Touchpad ................................. 54 System operation/maintenance................ 266 Table .................. 147 System audit report .................................................................................................................. 289 Technical threat .................................................... 297 SWF ...... 172 Sum .................................................................. 243 Throughput .................................................................. 190 Storage hierarchy ............................................................... 243 Three primary process colors ........................... 117 T TA............... 73 Streamer ............................................................................................................................................................................................... 68 TIFF ........................... 128 Spoofing ............. 56 Standardization organization ........... 212 Specific identification method ............... 66 Statement coverage .................... 69 Storage device ................................... 15 SSL ................................................ 165 Standardization....... 251 Tag.............. 75 Telephone line ...................... 225 Subcontract Act .................................................................................... 164 Statutory useful life ...................................... 34 Specify relative path..................... 282 Stepping stone ........................................................................................................................................................115...................... 275 Telnet .......................................................................................................... 132 Standalone ... 147 System design ................................................... 285............ 116 System environment development ....... 75 Technology development strategy ............................................ 208 System reliability . 115 411 System audit ..................................................................

........... 295 Venn diagram ...... 277 Transmission time .......... 133 Web accessibility ..................................... 244 Vein authentication ............................................................. 220............ 274 WWW browser . 205 Video conferencing ................ 235 Wireless chip ... 264 Transmission efficiency.................................... 239 Web browser....... 42 Trojan horse ......... 118 Unit variable cost .................................................................................................................................................................................................... 220 WYSIWYG ....................................................... 38...... 224 Types of servers..................... 43..................... 242 WBS (Work Breakdown Structure)............. 78 Wireless interface ...................................... 161 Vertical distribution ....................................................... 22 Trial balance sheet ........................................ 161 Turnaround time ............................................................................. 162 Truth-value ............................................................................................ 254 Window ........ 124 Utility model right ............................................ 47 VRAM.......................................................................................................... 223 Types of main memory...................................... 277 Trash scouring ........................... 121 Value chain management................ 282 Truth table ... 193 Types of memory ....... 281 Tree diagram ......................................... 195 Trackball ........................................................ 264 Two-layer architecture ................................................ 220 Usability .................... 239 USB ........................................................................................... 203 Wireless LAN..................................................................................... 21 Workflow analysis ...................................................... 38 Variance............ 260 Transmission speed .......................................................................... 165 Workflow ..... 262.................................................................................................. 94 Undepreciated balance ............................ 277 Transmission path .................. 280 UPS (Uninterruptible Power Supply)........................................................................................................ 242 Word processing software ........................... 192 VRML ................................................................................................... 259 Waterfall model ............................... 169 Unit contribution margin ................................................................... 290 User manual ..................................................................................................................................................... 212 V Valid equivalence class ............................................................................................................................... 213 Virtual reality (VR) ...................................... 95 User account ................ 35 Unfair Competition Prevention Act ..... 45 Unicode ................................................ 198 Use case diagram................................................................ 218 Work sampling ............................ 256 Transceiver ........ 39 Unit test .............................................................................................. 182 W W3C .......................................... 245 Virus .............................. 238 412 .............................................................. 99 Virtual memory ..................... 38.......... 58 WAN ................................... 208 Twisted pair cable ..................... 171 Variable cost ................................................................ 165 VE (Value Engineering) ............................................................................................................................................................................................ 239 Web system ................. 258 Types of PCs .............................................................................. 74 Variable ...................................... 43............... 225 Trackpad..... 240 Web design .................................................................................................................................................................................................................................. 45 Utility program.......... 207 U UML ................................ 213 User ID ............................................................ 201 USB memory. 206 White box test . 118 Wildcard ................................................................................................................. 45 Trademark right ................................................................................................................................................................................................................................................................ 39 Universal design .. 127 WAV ....................................... 220 Web content. 191 Types of networks ................................................... 146 URL.. 69............................... 282 Volume license agreement ................................ 73 Vector .. 223 Worm ............... 78 Wireless IC ........................................................................................................................................ 225 Trade secrets.................................... 207 Types of computers .................................. 96 Workflow system .....Track .......................................................................... 45 Transaction ........................................................ 96 Workstation ................ 282 WWW ........................... 263 WMA...................... 239 Unpublished information ..................

................................... 24 Zip ..................X x86........................................................................................................ 182 Z Z graph ................. 242 413 .......................................................................................... 189 XML .

contact information. 113-6591 JAPAN . translators. Hon-Komagome. Tokyo. • All screenshots are used in accordance with Microsoft Corporation guidelines. Windows. Windows Vista. 2009 (Revised : January. group names. Bunkyo-ku. locations. PowerPoint. Access. • Original Japanese edition published by FUJITSU FOM LIMITED (ISBN978-4-89311-798-4) Copyright © 2009 by FUJITSU FOM LIMITED Translation rights arranged with FUJITSU FOM LIMITED Translation copyright © 2009 by INFORMATION-TECHNOLOGY PROMOTION AGENCY. product names. 2-28-8. • All individual names. statutory. • M  icrosoft. 2010) E  very precaution has been taken in the preparation of this book. the information contained in this book is provided without any express. logos. and events used as examples in the book are fictional and do not exist. Bunkyo Green Court. Excel. and MS-DOS are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. e-mail addresses. Internet Explorer. or implied warranties. • All other company names and product names in the book are registered trademarks or trademarks of the respective companies. Neither the author. JAPAN INFORMATION-TECHNOLOGY PROMOTION AGENCY. nor publishers will be held liable for any damages caused or alleged to be caused either directly or indirectly by the book. JAPAN Center Office 16F. • TM and ® are omitted in the book. However.IT Passport Exam Preparation Book First Edition : November.