Information Technology Reference
In-Depth Information
TCP/IP,.the.protocol.used.on.the.Internet.to.send.and.
receive.information;.HTTP,.used.for.Web.page.com-
munications,.is.a.subset.of.TCP/IP.
Read-Only:. A.disk,.ile,.data,.document,.and.so.on,.that.can.
be.viewed,.possibly.copied,.but.cannot.be.changed.
. . Items.within.a.system,.such.as.a.ROM.chip,.which.
the.system.can.read.from.but.not.write.to.
Removable Storage:. Computer. storage. media,. such. as.
disks,. tapes,. CDs,. and. so. forth,. that. can. easily. be.
removed.from.a.computer.and.moved.to.another.loca-
tion.or.used.in.another.computer.
Risk Assessment:. The. process. of. identifying. types. and.
severity. of. risks. and. determining. what. action. would.
be.appropriate.to.take.in.response.to.each..To.assist.
with.the.process,.various.risk.analysis.tools.are.on.the.
market..There.are.two.major.approaches.to.risk.analy-
sis,.either.quantitative.or.qualitative..The.quantitative.
approach.is.based.on.mathematical.calculations.involv-
ing.formulas.for.the.probability.of.a.scenario.occurring.
and.the.likely.value.the.loss.would.cause..The.qualita-
tive.analysis.does.not.require.probability.data.and.uses.
only.estimates.of.potential.losses.
Risk Management:. A. comprehensive. methodology. that.
strives.to.balance.risks.against.beneits.in.a.predeined.
environment.
Root:. A. “techie”. term,. this. refers. to. the. most. privileged.
access.possible.on.a.Unix.computer.system..With.root.
access,.one.can.create.or.delete.(or.corrupt).anything.
on. the. system.. The. use. of. root. is. normally. highly.
restricted. with. systems. operations. and. support. staff.
using.accounts.with.limited.privilege.
Root Directory:. In. a. computer's. iling. system. on. the. hard.
disk,.the.root.directory.is.the.directory.(or.folder).from.
which.all.other.directories.will.be.created..In.Microsoft.
Windows.the.root.is.denoted.by.the.symbol.“\”.and.
in.the.world.of.Unix.is.shown.by.“/”.(just.to.be.dif-
ferent).. In. Unix. the. all-powerful. user. of. the. system.