techopedia
Application Software
Definition - What does Application Software mean?
Application software is a program or group of programs designed for end users. These programs are divided
into two classes: system software and application software. While system software consists of low-level
programs that interact with computers at a basic level, application software resides above system software
and includes database programs, word processors, spreadsheets, etc. Application software may be grouped
along with system software or published alone.
Application software may simply be referred to as an application.
Techopedia explains Application Software
The different types of application software ar.
+ Application Suite: Has multiple applications bundled together. Related functions, features and user
interfaces interact with each other.
+ Enterprise Software: Addresses an organization's needs and data flow in a huge distributed
environment.
+ Enterprise Infrastructure Software: Provides capabilities required to support enterprise software
systems.
* Information Worker Software: Addresses individual needs required to manage and create information
for individual projects within departments.
* Content Access Software: Used to access contents and addresses a desire for published digital content
and entertainment.
+ Educational Software: Holds contents adopted for use by students.
* Media Development Software: Addresses individual needs to generate and print electronic media for
others to consume.techopedia
Arcade Game
Definition - What does Arcade Game mean?
An arcade game is a game machine typically found in public places like malls, restaurants and amusement
arcades, and is usually coin operated. Arcade games are usually video games, pinball machines or
electromechanical games. The late 1970s through the 1980s was the golden age of the arcade games. They
enjoyed some relative popularity even during the early 1990s. The popularity of this platform slowly
declined, however, as console and PC games came into prominence.
Techopedia explains Arcade Game
Arcade games often have short levels, which rapidly increase in difficulty with simple and intuitive controls.
Game players are essentially renting the game for as long as the game avatar is alive. For this business
model to be profitable, the difficulty of the game must be high enough to make the players reach a game-
over state and engaging or addictive enough to keep the players playing. Nowadays, the arcade is clearly
dead in most parts of the world as what was once amazing technology is available on your cell phone.
PC- or console games are sometimes referred to as arcade games if they share the same qualities as real
arcade games such as the following:
* Intuitive and simple controls with simple physies
Short levels which become increasingly difficult as the game progresses
+ A focus on gameplay rather than on content or storytechopedia
Attenuation
Definition - What does Attenuation mean?
Attenuation is a telecommunications term that refers to a reduction in signal strength commonly oceurring
while transmitting analog or digital signals over long distances.
Attenuation is historically measured in dB but it can also be measured in terms of voltage.
Techopedia explains Attenuation
Attenuation can relate to both hard-wired connections and to wireless transmissions.
There are many instances of attenuation in telecommunications and digital network circuitry.
Inherent attenuation can be caused by a number of signaling issues including:
+ Transmission medium - All electrical signals transmitted down electrical conductors cause an
electromagnetic field around the transmission. This field causes energy loss down the cable and gets
worse depending upon the frequency and length of the cable run. Losses due to
* Crosstalk from adjacent cabling causes attenuation in copper or other conductive metal cabling.
* Conductors and connectors - Attenuation can occur as a signal passes across different conductive
mediums and mated connector surfaces.
Repeaters are used in attenuating cireuits to boost the signal through amplification (the opposite of
attenuation). When using copper conductors, the higher the frequency signal, the more attenuation is
caused along a cable length. Modern communications use high frequencies so other mediums which have a
flat attenuation across all frequencies, such as fiber optics are used instead of traditional copper circuits.
Different types of attenuation include:
+ Deliberate attenuation can occur for example where a volume control is used to lower the sound level
on consumer electronics.
+ Automatic attenuation is a common feature of televisions and other audio equipment to prevent
sound distortion by automatic level sensing that triggers attenuation circu
+ Environmental attenuation relates to signal power loss due to the transmission medium, whether that
be wireless, copper wired or fiber optic connected.techopedia
Business Intelligence (BI
Definition - What does Business Intelligence (BI) mean?
Business intelligence (BI) is the use of computing technologies for the identification, discovery and analysis,
of business data - like sales revenue, products, costs and incomes.
BI technologies provide current, historical and predictive views of internally structured data for produets
and departments by establishing more effective decision-making and strategic operational insights through
functions like online analytical processing (OLAP), reporting, predictive analyties, data/text mining,
benchmarking and Business Performance Management (BPM). These technologies and functions are often
referred to as information management.
Techopedia explains Business Intelligence (BI)
Developed in the mid-1980s, modern BI evolved from 1960s-era decision support systems (DSS), which,
with help of computer-aided models, assisted with planning and decision-making, leading to executive
information systems (EIS), data warehouses (DW), OLAP and BI. BI did not achieve widespread acceptance
until the late 1990s
BI software applications are used to gather data from data warehouses or data marts, which are separate yet
linked BI architectural stack segments used for the preparation and use of data,
BI is used for multiple business purposes, including:
+ Measurement of performance and benchmarking progress toward business goals
* Quantitative analysis through predictive analytics, predictive modeling, business process modeling
and statistical analysis
+ Reporting of departmental /divisional and enterprise perspectives of data visualization, EISs and
OLAP
* Collaborative programs that allow internal and external business entities to collaborate through
clectronic data interchange (EDI) and data sharing
+ Use of knowledge management programs to identify and create insights and experiences for learning
management and regulatory compliance
BI also involves specific methodologies and procedures for implementing such interactive information
gathering techniques, including:
+ Identifying interview teams
+ Researching organizations
+ Selecting and preparing interviewees
+ Developing interview questions
+ Scheduling and sequencing interviews
BI and its subset, competitive intelligence (CI), are considered synonymous. Like CI, BI is considered a
decision support system (DSS). CI manages information focused on business competitors, whereas BI
manages these functions (and more) by focusing on internal business products and departments.
Studies by Merrill Lynch indicate that 85 percent of all business information is made up of unstructured or
semi-structured data, including emails, news, reports, Web pages, presentations, phone conversation notes,
image files, video files and marketing information. In the IT industry, management of such data is
considered a major unsolved problem.techopedia
Completely Automated Public Turing Test To Tell
Computers And Humans Apart (CAPTCHA)
Definition - What does Completely Automated Public Turing Test To Tell
Computers And Humans Apart (CAPTCHA) mean?
Completely automated public turing test to tell computers and humans apart, better known as CAPTCHA, is
a test to ensure responses through a human versus a computer program.
CAPTCHA was developed at Carnegie Mellon University by Nicholas J. Hopper, John Langford, Luis von
Abn and Manuel Blum. CAPTCHA automatically generates response challenges by providing a problem
which can only be solved by humans, automatically preventing access to system software and requesting a
typed character serie:
A computer administers CAPTCHA to a human, whereas a human administers the Turing test to a machine.
Techopedia explains Completely Automated Public Turing Test To Tell Computers
And Humans Apart (CAPTCHA)
Websites utilize CAPTCHA to prevent quality of service (QoS) degradation by bots or other automated
programs by using a test only understood by humans. CAPTCHA enhances security by using background
noise, which appears as character letters or links to actual letters. All online systems are constantly
vulnerable to hacking. Including a CAPTCHA element on a registration form can help avoid brute-force
hacking attempts. This is simply one element of security, as getting around a CAPTCHA element on a page
is extremely simple for a human.
To the average user, the CAPTCHA element is "that annoying box at the bottom of a registration form."
While it's simple to implement from a Web development perspective, a Web designer needs to decide
whether user annoyance is worth the added security.techopedia
Cellular Network
Definition - What does Cellular Network mean?
Acellular network is a radio network distributed over land through cells where each cell includes a fixed
location transceiver known as base station. These cells together provide radio coverage over larger
geographical areas. User equipment (UE), such as mobile phones, is therefore able to communicate even if
the equipment is moving through cells during transmission.
Cellular networks give subscribers advanced features over alternative solutions, including increased
capacity, small battery power usage, a larger geographical coverage area and reduced interference from
other signals. Popular cellular technologies include the Global System for Mobile Communication, general
packet radio service, 3GSM and code division multiple access.
Techopedia explains Cellular Network
Cellular network technology supports a hierarchical structure formed by the base transceiver station (BTS),
mobile switching center (MSC), location registers and public switched telephone network (PSTN). The BTS
enables cellular devices to make direct communication with mobile phones. The unit acts as a base station
to route calls to the destination base center controller. The base station controller (BSC) coordinates with
the MSC to interface with the landline-based PSTN, visitor location register (VLR), and home location
register (HLR) to route the calls toward different base center controllers.
Cellular networks maintain information for tracking the location of their subscribers’ mobile devices. In
response, cellular devices are also equipped with the details of appropriate channels for signals from the
cellular network systems. These channels are categorized into two fields:
+ Strong Dedicated Control Channel:
from the base station and vice versa.
+ Strong Paging Channel: Used for tracking the mobile phone by MSC when a call is routed to it.
Jsed to transmit digital information to a cellular mobile phone
Atypical cell site offers geographical coverage of between nine and 21 miles. ‘The base station is responsible
for monitoring the level of the signals when a call is made from a mobile phone. When the user moves away
from the geographical coverage area of the base station, the signal level may fall. This can cause a base
station to make a request to the MSC to transfer the control to another base station that is receiving the
strongest signals without notifying the subscriber; this phenomenon is called handover. Cellular networks
often encounter environmental interruptions like a moving tower crane, overhead power cables, or the
frequencies of other devices.techopedia
Computer Cluster
Definition - What does Computer Cluster mean?
Acomputer cluster is a single logical unit consisting of multiple computers that are linked through a LAN.
The networked computers essentially act as a single, much more powerful machine. A computer cluster
provides much faster processing speed, larger storage capacity, better data integrity, superior reliability and
wider availability of resources. Computer clusters are, however, much more costly to implement and
maintain. This results in much higher running overhead compared to a single computer.
Techopedia explains Computer Cluster
Many organizations use computer clusters to maximize processing time, increase database storage and
implement faster data storing & retrieving techniques. There are many types of computer clusters,
including: Load-balancing clusters High availability (ITA) clusters High performance (HP) clusters The
major advantages of using computer clusters are clear when an organization requires large scale processing.
When used this way, computer clusters offer: Cost efficiency: the cluster technique is cost effective
for the amount of power and processing speed being produced. It is more efficient and much
cheaper compared to other solutions like setting up mainframe computers. Processing
speed: multiple high speed computers work together to provided unified processing, and
thus faster processing overall. Improved network infrastructure: different LAN topologies
are implemented to form a computer cluster. These networks create a highly efficient and
effective infrastructure that prevents bottlenecks. Flexibility: unlike mainframe computers,
computer clusters can be upgraded to enhance the existing specifications or add extra
components to the system. High availability of resources: If any single component fails in a
computer cluster, the other machines continue to provide uninterrupted processing. This
redundancy is lacking in mainframe systems.techopedia
Computer Network
Definition - What does Computer Network mean?
Acomputer network is a group of computer systems and other computing hardware devices that are linked
together through communication channels to facilitate communication and resource-sharing among a wide
range of users. Networks are commonly categorized based on their characteristics.
Techopedia explains Computer Network
One of the earliest examples of a computer network was a network of communicating computers that
functioned as part of the U.S. military's Semi-Automatic Ground Environment (SAGE) radar system, In
1969, the University of California at Los Angeles, the Stanford Research Institute, the University of
California at Santa Barbara and the University of Utah were connected as part of the Advanced Research
Projects Agency Network (ARPANET) project. It is this network that evolved to become what we now call
the Internet.
Networks are used to:
+ Facilitate communication via email, video conferencing, instant messaging, ete.
+ Enable multiple users to share a single hardware device like a printer or scanner
+ Enable file sharing across the network
+ Allow for the sharing of software or operating programs on remote systems
+ Make information easier to access and maintain among network users
There are many types of networks, including:
* Local Area Networks (LAN)
+ Personal Area Networks (PAN)
+ Home Area Networks (HAN)
* Wide Area Networks (WAN)
+ Campus Networks
* Metropolitan Area Networks (MAN)
+ Enterprise Private Networks
* Internetworks
* Backbone Networks (BBN)
* Global Area Networks (GAN)
+ The Internet,techopedia
Computer-Aided Design (CAD)
Definition - What does Computer-Aided Design (CAD) mean?
Computer-aided design (CAD) is a computer technology that designs a product and documents the design's
process. CAD may facilitate the manufacturing process by transferring detailed diagrams of a product's
materials, processes, tolerances and dimensions with specific conventions for the product in question. It can
be used to produce either two-dimensional or three-dimensional diagrams, which can then when rotated to
be viewed from any angle, even from the inside looking out. A special printer or plotter is usually required
for printing professional design renderings.
The concept of designing geometric shapes for objects is very similar to CAD. It is called computer-aided
geometric design (CAGD).
CAD is also known as computer-aided design and drafting (CAD)
Techopedia explains Computer-Aided Design (CAD)
CAD is used as follows:
1. To produce detailed engineering designs through 3-D and 2-D drawings of the physical components of
manufactured products
2, To create conceptual design, product layout, strength and dynamic analysis of assembly and the
manufacturing processes themselves.
3. To prepare environmental impact reports, in which computer-aided designs are used in photographs
to produce a rendering of the appearance when the new structures are built.
CAD systems exist today for all of the major computer platforms, including Windows, Linux, Unix and Mae
OS X. The user interface generally centers around a computer mouse, but a pen and digitizing graphic tablet
can also be used. View manipulation can be accomplished with a spacemouse (or spaceball). Some systems
allow stereoscopic glasses for viewing 3-D models.
Most U.S. universities no longer require classes for producing hand drawings using protractors and
compasses. Instead, there are many classes on different types of CAD software. Because hardware and
software costs are decreasing, universities and manufacturers now train students how to use these high-
level tools. These tools have also modified design work flows to make them more efficient, lowering these
training costs even further.techopedia
Cut And Paste (C&P)
Definition - What does Cut And Paste (C&P) mean?
Cut and paste are two commands that are commonly used together in computer user interface interaction
and provide a method of transferring data from one location to another. Unlike the copy and paste
commands, which create a duplicate in the new location, cut and paste moves the entire contents to the new
location.
Techopedia explains Cut And Paste (C&P)
Similar to copy and paste, the cut action selects the data and stores it in a temporary location often known
as the clipboard, which is usually invisible to the user. When the paste command is issued, the data from the
clipboard is moved to the specific location. The Apple Lisa had the first text editing system that introduced
the concept of the clipboard. There are many applications which support eut and paste operations, often
with key combinations, toolbar options, pull-down menus or pop-up menus. In Windows and Macintosh-
based computers, The key combinations of Ctrl and "X" produces the cut effect whereas the key
combination of Ctr] and "V" produces the paste effect. These actions can also be done with the help of a
mouse.
However, unlike the copy and paste action, the cut and copy operation is destructive in nature and if not
executed properly, could lead to data loss.techopedia
Data Warehouse (DW)
Definition - What does Data Warehouse (DW) mean?
A data warehouse (DW) is a collection of corporate information and data derived from operational systems
and external data sources. A data warehouse is designed to support business decisions by allowing data
consolidation, analysis and reporting at different aggregate levels. Data is populated into the DW through
the processes of extraction, transformation and loading.
Techopedia explains Data Warehouse (DW)
The data warehouse architecture was born in the 1980s as an architectural model designed to support the
flow of data from operational systems to decision support systems. These systems require analysis of large
amounts of heterogeneous data accumulated by companies over time
Ina data warehouse, data from many heterogeneous sources is extracted into a single area, transformed
according to the decision support system needs and stored into the warehouse. For example, a company
stores information pertaining to its employees, their salaries, developed products, customer information,
sales and invoices. The CEO might want to ask a question pertaining to the latest cost-reduction measures;
the answers will involve analysis of all of this data. This is a main service of the data warehouse, ie.,
allowing executives to reach business decisions based on all these disparate raw data items.
Thus, a data warehouse contributes to future decision making. As in the above example, a firm
administrator can query warchouse data to find out the market demand of a particular product, sales data
by geographical region or answers other inquiries. This provides insight about required steps to more
effectively market a particular product. Unlike an operational data store, a data warehouse contains
aggregate historical data, which may be analyzed to reach critical business decisions. Despite associated
costs and effort, most major corporations today use data warehouses.techopedia
Database (DB)
Definition - What does Database (DB) mean?
A database (DB), in the most general sense, is an organized collection of data. More specifically, a database
is an electronic system that allows data to be easily accessed, manipulated and updated.
In other words, a database is used by an organization as a method of storing, managing and retrieving
information. Modern databases are managed using a database management system (DBMS).
‘Techopedia explains Database (DB)
Software programmers are well acquainted with database concepts through relational databases like Oracle,
SQL SERVER and MySQL, ete. Typically, a database structure stores data in a tabular format.
Database architecture may be external, internal or conceptual. The external level specifies the way in which
every end-user type comprehends the organization of its corresponding relevant data in the database. The
internal level deals with the performance, scalability, cost and other operational matters. The conceptual
level perfectly unifies the different external views into a defined and wholly global view. It consists of every
end-user required generic data.techopedia
Decryption
Definition - What does Decryption mean?
Decryption is the process of transforming data that has been rendered unreadable through encryption back
to its unencrypted form. In decryption, the system extracts and converts the garbled data and transforms it
to texts and images that are easily understandable not only by the reader but also by the system. Decryption
may be accomplished manually or automatically. It may also be performed with a set of keys or passwords.
Techopedia explains Decryption
One of the foremost reasons for implementing an encryption-decryption system is privacy. As information
travels over the World Wide Web, it becomes subject to scrutiny and access from unauthorized individuals
or organizations. As a result, data is encrypted to reduce data loss and theft. Some of the common items that
are encrypted include email messages, text files, images, user data and directories. ‘The person in charge of
decryption receives a prompt or window in which a password may be entered to access encrypted
information.techopedia
Desktop Publishing (DTP)
Definition - What does Desktop Publishing (DTP) mean?
Desktop publishing (DTP) refers to the use of a digital desktop for laying out and constructing documents.
The term is sometimes used to refer to processes that allow printing out paper copies of documents in a
localized hardware scenario. It may also refer simply to the creation and construction of digital documents
ona desktop.
Desktop publishing is also known as computer-aided publishing
Techopedia explains Desktop Publishing (DTP)
There are many aspects of today's modern technologies that support DTP. Some of these started with tools
like word processors that allowed for the ever-more-sophisticated creation of letter documents and
communications templates (such as letterheads and other stationery items). Over time, other tools were
added that allow for the direct insertion of tables, charts, graphs, pictures and numerous other
enhancements to a text document or for tagging the functional elements (title, author, etc.) of a business or
government document.
Today's DTP has gone even further, with new advancements such as DocuSign technologies, where the DTP
system facilitates remote signatures. In terms of layout and typography, there are also many advances in the
graphic design aspeet of document creation, all of which can be referred to as progressions in DTP. These
days, desktop computers have allowed many individuals, companies and agencies to self-publish all sorts of
documents, from brochures and marketing documents to transactional business documents, without
utilizing the services of a high-volume print company.techopedia
Encryption
Definition - What does Encryption mean?
Encryption is the process of using an algorithm to transform information to make it unreadable for
unauthorized users. This cryptographic method protects sensitive data such as credit card numbers by
encoding and transforming information into unreadable cipher text. This encoded data may only be
decrypted or made readable with a key. Symmetric-key and asymmetrie-key are the two primary types of
encryption.
Encryption is essential for ensured and trusted delivery of sensitive information.
Techopedia explains Encryption
Symmetric-key encryption uses two secret, often identical keys or codes for computers involved in message
transmission. Each secret key's data packet is self-encrypted. The first symmetric encryption algorithm is
the Data Eneryption Standard (DES), which uses a 56-bit key and is not considered attack-proof. The
Advanced Encryption Standard (AES) is considered more reliable because it uses a 128-bit, a 192-bit or a
256-bit key.
Asymmetric-key encryption, also known as public-key encryption, uses private and public keys in tandem.
The public key is shared with computers attempting to communicate securely with the user’s computer.
This key handles encryption, rendering the message indecipherable in transit. The private matching key
remains private on the user's computer. It decrypts the message and makes it readable, Pretty good privacy
(PGP) is a commonly used public-key encryption system.techopedia
Enterprise Computing
Definition - What does Enterprise Computing mean?
Enterprise computing is a buzzword that refers to business-oriented information technology that is critical
toa company’s operations. Enterprise computing encompasses all the various types of enterprise software,
including database management, relationship management and so on. Enterprise computing is usually seen
as a collection of big business software solutions to common problems such as resource management and
streamlining processes.
Techopedia explains Enterprise Computing
Enterprise computing is sometimes sold to business users as an entire platform that can be applied broadly
across an organization and then further customized by users within each area. This means the analytics,
reporting, database management and other applications are standard across the system, while the
application packages being used and the data being accessed in each area will be different. In this sense,
enterprise computing is a departure from finding single software solutions to specific business problems,
such as inventory or accounting software. Instead, enterprise computing is intended to offer integrated
solutions to these problems.techopedia
Extranet
Definition - What does Extranet mean?
An extranet is a controlled private network allowing customers, partners, vendors, suppliers and other
businesses to gain information, typically about a specific company or educational institution, and do so
without granting access to the organization's entire network. An extranet is often a private part of a website.
Itis restricted to select users through user IDs, passwords and other authentication mechanisms on a login
page.
Techopedia explains Extranet
‘An extranets may be viewed as an intranet mapped onto the public Internet or onto some other private
network.
Advantages of extranets include:
hhe ability to exchange large volumes of data using electronic data interchange
+ Sharing product data or catalogs with business partners
+ Joint company collaboration and training
+ Sharing services such as online banking applications among affiliated banks
Disadvantages are expensive implementation and maintenance if hosted internally and the potential for
compromised sensitive or proprietary information. Alternately, it may be hosted by an application service
provider.techopedia
Firewall
Definition - What does Firewall mean?
A firewall is software used to maintain the security of a private network. Firewalls block unauthorized
access to or from private networks and are often employed to prevent unauthorized Web users or illicit
software from gaining access to private networks connected to the Internet. A firewall may be implemented
using hardware, software, or a combination of both.
A firewall is recognized as the first line of defense in securing sensitive information. For better safety, the
data can be encrypted.
Techopedia explains Firewall
Firewalls generally use two or more of the following methods:
+ Packet Filtering: Firewalls filter packets that attempt to enter or leave a network and either accept or
reject them depending on the predefined set of filter rules.
+ Application Gateway: The application gateway technique employs security methods applied to certain
applications such as Telnet and File Transfer Protocol servers.
* Circuit-Level Gateway: A circuit-level gateway applies these methods when a connection such as
Transmission Control Protocol is established and packets start to move.
+ Proxy Servers: Proxy servers can mask real network addresses and intercept every message that enters
or leaves a network.
+ Stateful Inspection or Dynamic Packet Filtering: This method compares not just the header
information, but also a packet's most important inbound and outbound data parts. These are then
compared to a trusted information database for characteristic matches. This determines whether the
information is authorized to cross the firewall into the network.techopedia
Gateway
Definition - What does Gateway mean?
A gateway is a data communication device that provides a remote network with connectivity to a host
network.
‘A gateway device provides communication to a remote network or an autonomous system that is out of,
bounds for the host network nodes. Gateways serve as the entry and exit point of a network; all data routed
inward or outward must first pass through and communicate with the gateway in order to use routing paths.
Generally, a router is configured to work as a gateway device in computer networks.
Techopedia explains Gateway
Any network has a boundary or a limit, so all communication placed within that network is conducted using
‘the devices attached to it, including switches and routers. If a network node wants to communicate with a
node/network that resides outsides of that network or autonomous system, the network will require the
services of a gateway, which is familiar with the routing path of other remote networks.
The gateway (or default gateway) is implemented at the boundary of a network to manage all the data
communication that is routed internally or externally from that network. Besides routing packets, gateways
also possess information about the host network's internal paths and the learned path of different remote
networks. If a network node wants to communicate with a foreign network, it will pass the data packet to
the gateway, which then routes it to the destination using the best possible path.techopedia
Glitch
Definition - What does Glitch mean?
Aglitch, in technical terms, refers to a small and fleeting error in a system that occurs due to unknown,
causes. While the actual cause of a glitch is unknown, it can potentially cause serious harm to the system,
including power failure, temporary loss of service or data loss.
Techopedia explains Glitch
In the event of a glitch, the system experiences a temporary failure. In networks, a glitch can cause loss of
data or service and short-lived failure in the case of a power system. Glitches are not only common in
electrical and electronic systems where hardware is involved; software also experiences glitches, that are
commonly known as bugs. Software bugs often go away once the program is restarted because it eliminates
the conditions that caused the glitch. However, sometimes restarting the program is not enough and
systems needs to be rebooted in order to get rid of a system glitch.techopedia
Hashtag
Definition - What does Hashtag mean?
Ahashtag is a type of tag used to describe topics on social networking websites, most notably Twitter.
Hashtags, like all tags, are a type of metadata (data about data).
Twitter has popularized the use of the term hashtag, though there are some other social networks that use
it. On Twitter, Hashtags give other users and indication what a particular tweet is about. Hashtags are
indicated as such because they are prefixed with the pound symbol (#).
Techopedia explains Hashtag
A tag is basically a keyword. It's a non-hierarchical method to describe something. For example, take an
article that is about security and cloud computing. It would be tough to classify such an article in just one
category. Using tags, you can describe that the content is about both topies and differentiate it from, say, an
article on cloud computing and performance.
Here are some examples of hashtags:
+ tech
+ #CloudComputing
+ #FightClub
It's also common to hear the term at conferences. Often the moderator will announce a hashtag so that all
‘those tweeting can see the thoughts of the other audience members.techopedia
Intranet
Definition - What does Intranet mean?
An Intranet is a secure and private enterprise network that shares data o application resources via Internet
Protocol (IP). An Intranet differs from the Internet, which is a public network.
Intranet, which refers to an enterprise's internal website or partial IT infrastructure, may host more than
one private website and is a critical component for internal communication and collaboration.
Techopedia explains Intranet
‘company's Intranet is based on Internet concepts and technology, but for private use. The term can refer
to anything that is Web-based but for private use, but typically means a company's shared web applications.
For example, it is common for companies to store internal contact information, calendars, ete. on their
Intranet.