it.ojp.gov

Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (39)

1

0 Thumbs up   0 Thumbs down

AFIS


AFIS is a database of digitized offender fingerprint files. A user can enter a fingerprint and a computer will generate a list of possible matches within minutes. The matches are then examined and verified by a fingerprint expert. Architecture
Source: it.ojp.gov

2

0 Thumbs up   0 Thumbs down

BIOS


BIOS controls the startup of the machines or computers and other functions such as the keyboard, display, and disk drive. The BIOS is stored on read-only memory and is not erased when the computer is turned off. The BIOS on newer machines is stored on flash read-only memory, allowing it to be erased and rewritten to update the BIOS. C
Source: it.ojp.gov

3

0 Thumbs up   0 Thumbs down

CAD


CAD is a computer system that assists 911 operators and dispatch personnel in handling and prioritizing calls. Enhanced 911 will send the location of the call to the CAD system that will automatically display the address of the 911 caller on a screen in front of the operator. Complaint information is then entered into the computer and is easily ret [..]
Source: it.ojp.gov

4

0 Thumbs up   0 Thumbs down

Client / Server Architecture


Client / server architecture is a network model that a computer or process server uses to provide services to the workstations (clients) connected to that computer (server). This architecture allows the client to share resources such as files, printers, and processing power with other clients. Compliant
Source: it.ojp.gov

5

0 Thumbs up   0 Thumbs down

data dictionary


A data dictionary is a file that defines the basic organization of a database. It will contain a list of all files in the database, the number of records in each file, and the names and types of each field. Data Standards
Source: it.ojp.gov

6

0 Thumbs up   0 Thumbs down

Encryption


Encryption is a process that translates plain text into a code (ciphertext) as a mechanism for protecting its confidentiality, integrity, and sometimes its authenticity. The reader of an encrypted file must use an encryption algorithm and one or more encryption keys to decrypt the file. F
Source: it.ojp.gov

7

0 Thumbs up   0 Thumbs down

Firewalls


Firewalls are systems designed to prevent unauthorized access to or from a private network. They are often used to prevent Internet users from accessing private networks connected to the Internet. Functional Specifications
Source: it.ojp.gov

8

0 Thumbs up   0 Thumbs down

GPS


GPS is a satellite navigation system operated by the U.S. Department of Defense. It provides coded satellite signals that can be processed by a GPS receiver enabling the receiver to compute position, velocity and time. GUI (Graphical User Interface, often pronounced ''gooey'')
Source: it.ojp.gov

9

0 Thumbs up   0 Thumbs down

hardware


Hardware are objects used to store and run software, such as a computer, monitor, keyboard, disk, and printer. I
Source: it.ojp.gov

10

0 Thumbs up   0 Thumbs down

IAFIS


IAFIS is a new (July 1999) national online fingerprint and criminal history database run by the FBI. Justice agencies that submit urgent electronic requests for identification will receive a response within two hours. III (Interstate Identification Index)
Source: it.ojp.gov


To view all 39 definitions, please sign in.