Definition of the word electronic information

  • Defenition of the word electronic information service

    • (computer science) a database that can be accessed by computers

Synonyms for the word electronic information service

    • computer database
    • electronic database
    • on-line database

Hyponyms for the word electronic information service

    • lexical database
    • object-oriented database
    • relational database

Hypernyms for the word electronic information service

    • database

See other words

    • What is electronic balance
    • The definition of elint
    • The interpretation of the word electronics intelligence
    • What is meant by electronics industry
    • The lexical meaning electronics company
    • The dictionary meaning of the word electromyography
    • The grammatical meaning of the word electromyograph
    • Meaning of the word electromyogram
    • Literal and figurative meaning of the word electromechanical device
    • The origin of the word electronic deception
    • Synonym for the word electronic device
    • Antonyms for the word electronic equipment
    • Homonyms for the word electronic fetal monitor
    • Hyponyms for the word electronic instrument
    • Holonyms for the word electronic reconnaissance
    • Hypernyms for the word electronic signal
    • Proverbs and sayings for the word electronic surveillance
    • Translation of the word in other languages electronic text

Definitions of electronic information service

  1. noun

    (computer science) a database that can be accessed by computers

DISCLAIMER: These example sentences appear in various news sources and books to reflect the usage of the word ‘electronic information service’.
Views expressed in the examples do not represent the opinion of Vocabulary.com or its editors.
Send us feedback

EDITOR’S CHOICE

Look up electronic information service for the last time

Close your vocabulary gaps with personalized learning that focuses on teaching the
words you need to know.

VocabTrainer - Vocabulary.com's Vocabulary Trainer

Sign up now (it’s free!)

Whether you’re a teacher or a learner, Vocabulary.com can put you or your class on the path to systematic vocabulary improvement.

Get started

Definitions.net

Princeton’s WordNetRate this definition:0.0 / 0 votes

  1. electronic database, on-line database, computer database, electronic information servicenoun

    (computer science) a database that can be accessed by computers

WikipediaRate this definition:0.0 / 0 votes

  1. electronic information service

    An Internet service provider (ISP) is an organization that provides services for accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.
    Internet services typically provided by ISPs can include Internet access, Internet transit, domain name registration, web hosting, Usenet service, and colocation.
    An ISP typically serves as the access point or the gateway that provides a user access to everything available on the Internet. Such a network can also be called as an eyeball network.

Matched Categories

    • Computer Science
    • Database

How to pronounce electronic information service?

How to say electronic information service in sign language?

Numerology

  1. Chaldean Numerology

    The numerical value of electronic information service in Chaldean Numerology is: 9

  2. Pythagorean Numerology

    The numerical value of electronic information service in Pythagorean Numerology is: 4

Translation

Find a translation for the electronic information service definition in other languages:

Select another language:

  • — Select —
  • 简体中文 (Chinese — Simplified)
  • 繁體中文 (Chinese — Traditional)
  • Español (Spanish)
  • Esperanto (Esperanto)
  • 日本語 (Japanese)
  • Português (Portuguese)
  • Deutsch (German)
  • العربية (Arabic)
  • Français (French)
  • Русский (Russian)
  • ಕನ್ನಡ (Kannada)
  • 한국어 (Korean)
  • עברית (Hebrew)
  • Gaeilge (Irish)
  • Українська (Ukrainian)
  • اردو (Urdu)
  • Magyar (Hungarian)
  • मानक हिन्दी (Hindi)
  • Indonesia (Indonesian)
  • Italiano (Italian)
  • தமிழ் (Tamil)
  • Türkçe (Turkish)
  • తెలుగు (Telugu)
  • ภาษาไทย (Thai)
  • Tiếng Việt (Vietnamese)
  • Čeština (Czech)
  • Polski (Polish)
  • Bahasa Indonesia (Indonesian)
  • Românește (Romanian)
  • Nederlands (Dutch)
  • Ελληνικά (Greek)
  • Latinum (Latin)
  • Svenska (Swedish)
  • Dansk (Danish)
  • Suomi (Finnish)
  • فارسی (Persian)
  • ייִדיש (Yiddish)
  • հայերեն (Armenian)
  • Norsk (Norwegian)
  • English (English)

Word of the Day

Would you like us to send you a FREE new word definition delivered to your inbox daily?


Citation

Use the citation below to add this definition to your bibliography:

Are we missing a good definition for electronic information service? Don’t keep it to yourself…

The focus will shift to the development and utilization of information resources, the traditional closed service mode will change to open the network electronic information service, outstanding performance in information Access to resources can be shared and remote through remote calls, breaking through the space and time constraints, for the sharing of resources and information services in the field of information research has brought far-reaching impact.

«In fact, the name ‘newsletter’ as a business is going to gradually be fading to be replaced by something akin to ‘electronic information service.’ As an indication of this trend, the newsletter publisher’s association has changed its name to the Specialized Information Publishers Association in 2006.»

The founder and former CEO of BuyWireless.com — a one-stop online shop featuring a wide assortment of accessories for wireless phones — Goldman is also the creator of WirelessNOW, the industry’s first dedicated electronic information service. The Strategis Group, a market research firm, now wholly owns that service which was initiated in 1994.

The National Library of Australia has agreed to make its Kinetica database service, which provides bibliographic data and associated information, available to subscribers of Ilanet, an electronic information service offered by the State Library of New South Wales.

As principal of three elementary schools in Utah over the past eight years, I have seen the incredible learning that is possible through the Internet.(2) One amazing tool accessible through this network is WorldClassroom, a global electronic information service that has helped us bring the world to our schools.(3) In addition to the Russian example, our students have communicated with children in countries that include Argentina, Australia, Belgium, Canada, Denmark, France, Germany, Great Britain, Hungary, Iceland, Indonesia, Kenya, Lithuania, Mexico, Singapore, Taiwan, the Netherlands, and Zimbabwe.

That same $5.95 rate entitles you to one free hour per month on America Online, the nation’s fastest-growing electronic information service.

US Health Link, which began operation in February 1992, is an electronic information service for health professionals.

But my bill for GEnie, an electronic information service that gives me access to 10 U.S.

One reaction of electronic information service providers to Feist may well be to cancel or modify plans to make their valuable data available on CD-ROMs for general distribution to the public.

* Who’s Buying Whom Monthly, an electronic information service that identifies every acquisition transaction announced, full details on each deal, in most cases providing a complete article or press release about the transaction.

(New York) and Edmund Greenslet Publishing (New York) to produce AirlineMonitor Weekly.com, a new weekly electronic information service. An annual subscription costs $200.

A B C D E F H I L M N O P R S T U V W


Access

Ability to use, create, modify, view, or otherwise manipulate information on a system.

Access control

Access control is the means by which the ability to use, create, modify, view, etc., is explicitly enabled or restricted in some way (usually through physical and system-based controls).

Account

The combination of user name and password that provides an individual, group, or service with access to a computer system or computer network.

Administrative/special access account

Privileged account that impacts access to an information system or that allows circumvention of controls in order to administer the information system.

Anti-malware software

Any software package that detects and/or removes malicious code. This can include anti-virus software and spyware protection.

Areas containing critical infrastructure

Facilities that contain information systems. The ASU Data Center is an example.

ASU in security policy

The population of a group whose membership is determined by each individual’s responsibility to fulfill university policy and state regulatory requirements.  If the requirement must be fulfilled by all employees, then that is the membership of “ASU” for that requirement.

Authentication

The process of confirming a claimed identity. All forms of authentication are based on something you know, something you have, or something you are.

  • ‘Something you know’ is some form of information that you can recognize and keep to yourself, such as a personal identification number (PIN) or password.
  • ‘Something you have’ is a physical item you possess, such as a photo ID or a security token.
  • ‘Something you are’ is a human characteristic considered to be unique, such as a fingerprint, voice tone, or retinal pattern.

Authorization

The act of granting permission for someone or something to conduct an act. Even when identity and authentication have indicated who someone is, authorization may be needed to establish what actions are permitted.

Availability

The requirement that an asset or resource be accessible to authorized persons, entities, or devices.

Backup

Copy of files and applications made to avoid loss of data and facilitate recovery in the event of a system failure.

Biometrics

Methods for differentiating humans based upon one or more intrinsic physical or behavioral traits such as fingerprints or facial geometry.

Biometric authentication

Using biometrics to verify or authenticate the identity of a person.

Business continuity plan (BCP)

The documentation of a predetermined set of instructions or procedures that describe how an organization’s critical business functions will be sustained during and after a significant disruption.

Category-1 data

Information whose confidentiality is protected by law or contract.  For a full definition see the Data Classification Standard.

Category-1a data

Information whose confidentiality is protected by law or contract, but for which there are no specifically proscribed penalties.  For a full definition see the Data Classification Standard.

Category-2 data

University information usually restricted to university employees, but which are releasable in accordance with the Texas Public Information Act.  For a full definition see the Data Classification Standard.

Category-3 data

University information that is generally publicly available. For a full definition see the Data Classification Standard.

Centralized storage

Storage on a central server made available over a network to users.

Change

Any implementation of new functionality, interruption of service, repair of existing functionality, and/or removal of existing functionality to an information system.

Change management

The process of controlling modifications to hardware, software, firmware, and documentation to ensure that information systems are protected against improper modification before, during, and after system implementation.

Computer security incident

See Security incident.

Confidential

The classification of data of which unauthorized disclosure/use could cause serious damage to an organization or individual.

Confidentiality

Characteristic of information indicating it is intended to be known by a limited set of people.

Confidential information

Information maintained by the university that is exempt from disclosure under the provisions of the Public Records Act or other applicable state and federal laws. The controlling factor for confidential information is dissemination.

Control

Method used to reduce the probability of occurrence or the negative impact of the realization of a risk.

Custodian

Custodians ensure the effective and secure operation of the information owner’s systems.  See the OP 44 series of operating policies for more information.

Data

See the Data Classification Standard.

Data loss prevention

Prevention of unnecessary exposure of protected information.

Data owner

See information owner.

Digital certificate

An electronic document which uses a digital signature to bind specially derived numerical information with an identity — such as the name of a person or an organization. Most often encountered on web sites using encryption (SSL/https).

Digital signature

Method of adding specially derived numerical information to a file or message (most often used as part of a digital certificate infrastructure).

Digital data

The subset of Data (as defined above) that is transmitted by, maintained, or made available in electronic media.

Disclosure

The act, intentional or otherwise, of revealing information that is otherwise held as confidential or protected.

Disaster Recovery Plan (DRP)

A written plan for processing critical IT applications in the event of a major hardware or software failure or destruction of facilities. Such plans are designed to restore operability of the target system, application, or computer facility.

DMZ

A DMZ, or demilitarized zone, is a physical or logical network that contains and exposes external-facing services to the Internet. Systems that need to be made available to the Internet, such as the ASU website, are located in a DMZ.

DNS

The Domain Name System (DNS) is a naming system for computers, services, or other resources connected to a network that associates a name with an IP address.

Electronic Information, Communication, and Technology (EICT)

Includes information technology and any equipment or interconnected system or subsystem of equipment used to create, convert, duplicate, or deliver data or information.

Other terms such as, but not limited to, Electronic Information Resources (EIR), Information and Communications Technology (ICT), Electronic Information Technology (EIT), etc. can be considered interchangeable terms with EICT for purposes of applicability for compliance with this rule.

Electronic Information Resources (EIR)

See Electronic Information, Communication, and Technology (EICT).

Electronic mail (email)

Any message, image, form, attachment, data, or other communication sent, received, or stored within an electronic mail system.

Electronic mail system

Any computer software application that allows electronic mail to be communicated from one computing system to another.

Electronic media

Any of the following: a) Electronic storage media including storage devices in computers (hard drives, memory) and any removable/transportable digital storage medium, such as magnetic tape or disk, optical disk, or digital memory card; or b) Transmission media used to exchange information already in electronic storage media. Transmission media include, for example, the internet (wide-open), extranet (using internet technology to link a business with information accessible only to collaborating parties), leased lines, dial-up lines, private networks, intranet, and the physical movement of removable/transportable electronic storage media.

Emergency change

When an unauthorized immediate response to imminent critical system failure is needed to prevent widespread service disruption.

Encrypted data

Data rendered unreadable to anyone without the appropriate cryptographic key and algorithm.

Encryption

Process of numerically changing data to enhance confidentiality. Data is obscured using a specific algorithm and key both of which are required to interpret the encrypted data.

End user

A person given authorization to access information on a system.

Escrow

Data decryption keys or passwords held in trust by a third party to be turned over to the user only upon fulfillment of specific authentication conditions.

Exposure

State during which a system’s controls do not adequately reduce risk that the information could be stolen or exploited by an unauthorized person.

Firewall

An access control mechanism that acts as a barrier between two or more segments of a computer network or overall client/server architecture, used to protect internal networks or network segments from unauthorized users or processes. Such devices include hardware that is placed in the network to create separate security zones, provide NAT, and create a point of access control.

Hardening

The process of making computer and network systems more resistant to tampering or malicious software.

Incident

Any set of circumstances in which the anticipated and configured delivery of a service is interrupted, delayed, or otherwise unavailable.

Incident management

Process of returning service as quickly and effectively as possible.

Information custodian or custodian

See Custodian.

Information owner

Responsible for specified information and establishing the controls for its collection, creation, processing, access, dissemination, and disposal. The owner of a collection of information is the person responsible for the business results of that system or the business use of the information. Where appropriate, ownership may be shared by managers of different departments. See OP 44.00 for a list of duties and responsibilities.

Information security

Protecting information so that it can only be seen, changed, deleted or copied by an authorized person and only in ways and to places authorized to contain it.

Information system

The equipment and software such as files, computers, tablets, servers, hard drives, removable thumb drives, cloud storage, etc. used to collect, record, process, display, and transmit information.

Information Resources Manager (IRM)

Authorized and accountable to the State of Texas for management of the university’s information systems to implement security policies, procedures, and guidelines to protect the information systems of the university. The Associate Vice President of Information Technology/CIO is designated as the university’s IRM. The IRM will:

  • Maintain information as a strategic asset of the university.
  • Provide the resources to enable employees to carry out their responsibilities for securing information and information systems.
  • Review and approve information owners and associated responsibilities.

Information Security Council

Body assembled by the CIO that contains at least the CIO and Information Security Officer. Provides direction and management of the information security program and information technology risk management program.

Information Security Officer (ISO)

Responsible for administering the information security functions within the university. The ISO is the university’s internal and external point of contact and internal resource for all information security matters. The ISO will:

  • Develop, coordinate and administer the ASU Information Security Program and periodically assess whether the program is implemented in accordance with ASU IT Security policies.
  • Provide consultation on balancing effective IT security with business needs.
  • Develop and maintain an information security awareness program.
  • Provide solutions, guidance, and expertise in IT security.
  • Maintain written IT security policies, standards and procedures as appropriate.
  • Collecting data relative to the state of IT security at ASU and communicating as needed.
  • Provide guidance on the information security requirements of federal, state and local privacy regulations.

Information security program

The elements, structure, objectives, and resources that establish an information system’s security function within the university.

Integrity

The accuracy and completeness of information and assets and the authenticity of transactions.

Intellectual property

Ideas for which property rights are recognized under patent, trademark, or copyright law. Usually a work originating from thought or an idea that is distinct, separate, clearly definable, and novel.

Internet

A global system interconnecting computers and computer networks. The computers and networks are owned separately by a host of organizations, government agencies, companies, and colleges.

Intrusion detection system (IDS)

Hardware or a software application that can be installed on network devices or host operating systems to monitor network traffic and host log entries for signs of known and likely methods of intruder activity and attacks. Suspicious activities trigger administrator alarms and other configurable responses.

Lawful intercept

The interception of data on the university network by ISO and IT Networking and Telecommunications staff, in accordance with local law and after following due process and receiving proper authorization from the appropriate authorities.

Local account

Account that allows access only to a local system and uses that systems local authentication service.

Local area network (LAN)

A data communications network spanning a limited geographical area. It provides communication between computers and peripherals at relatively high data rates and relatively low error rates.

Local storage

Storage that is physically local to the workstation or server.

Malicious code

Software designed to infiltrate or damage a computer system without the owner’s informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code including spyware, Trojan horses, viruses, and worms.

Mission critical information system

Information system defined to be essential to the university’s function and which, if made unavailable, will inflict substantial harm to the university and the university’s ability to meet its instructional, research, patient care, or public service missions. Mission critical information systems include those systems containing sensitive information.

Network

All associated equipment and media creating electronic transmission between any information system(s), such as wired, optical, wireless, IP, synchronous serial, telephony, etc.

Offsite storage

Based on data criticality, offsite storage should be in a geographically different location from the campus that does not share the same disaster threat event. Based on an assessment of the data backed up, removing the backup media from the building and storing it in another secured location on the campus may be appropriate.

Owner

See information owner.

Password

A string of characters used to verify or “authenticate” a person’s identity.

Password complexity

The characteristic of a password typically described by the number of characters, the size of the character set used, and the randomness with which those characters were chosen.

Password strength

Description of a password’s ability to resist being guessed or otherwise mathematically or cryptographically discovered.

Patch

A fix or update for a software program usually related to a security issue.

Penetration Test

A controlled attempt to circumvent the security of a network or computer system to test its ability to resit hacking.

Perimeter security control

The first layer of defense against malicious traffic that filters information between university internal networks and the internet.

Personally identifiable information

Any information that alone or in conjunction with other information identifies an individual, including Social Security numbers, driver’s license numbers, military ID numbers, passport ID numbers, passwords/PINs, personal accounts, credit card numbers, protected health information, financial information, criminal history records, unpublished home addresses or phone numbers, biometric data, and any other information that is deemed confidential by law or university policy.

Physical security

Area of knowledge concerned with creating and enhancing the safety and security of a physical space and the physical assets contained therein.

Physical security control

Devices and means to control physical access to sensitive information and to protect the availability of the information. Examples are physical access systems (fences, mantraps, guards); physical intrusion detection systems (motion detector, alarm system); and physical protection systems (sprinklers, backup generator).

PIN

Personal identification number — typically associated with systems using a physical security card (ATMs) together with a short number to authenticate an individual.

Plaintext data

Data in a form readable by anyone having access to the system on which it is stored or to the network over which it is transmitted.

Portable computing device

Any handheld portable device capable of performing basic computer tasks such as chat, email, web browsing, and storing information — smart phones, tablet computers (iPads), and PDAs all fall into this definition.

Production system

Any University system, software, or application that is used in the daily operations of the University.

Program

Set of instructions written in a computer programming language that performs a specific set of related functions (Microsoft Word, et.al.).

Protected information

Any information provided protection by law, regulation, or other legal means which mandates the methods, controls, processes, and/or procedures to afford such protection. This includes Personally Identifiable Information (PII).

Removable media

Any storage device built and intended to be easily connected to and removed from a computer system — examples include memory sticks, pen drives, external hard drives, and CD/DVDs.

Resolution

Returning service through the implementation of a permanent solution or a workaround.

Risk

Potential that a given set of circumstances and actions will lead to an undesirable outcome — in terms of information this means loss of one or more of (confidentiality, availability, and integrity).

Residual risk

Any risk remaining once controls have been applied.  The amount of residual risk allowed will be determined by the organization’s tolerance for risk.

Risk assessment

The process of identifying, evaluating, and documenting the level of impact that may result from the operation of an information system on an organization’s mission, functions, image, reputation, assets, or individuals. Risk assessment incorporates threat and vulnerability analyses and considers mitigations provided by planned or current security controls.

Risk management

Decisions to accept risk exposures or to reduce vulnerabilities and to align information system risk exposure with the organization’s risk tolerance.

Root access

Most privileged access to a computer system allowing the use, change, and deletion of any and all configuration information, system software, and data.

Scheduled change

Formal notification received, reviewed, and approved by the review process in advance of the change being made.

Scheduled outage

Any previously agreed upon period in which a system is not available for normal use. This typically requires specific methods of discussion, approval and scheduling (Change Management).

Security administrator

The person charged with monitoring and implementing security controls and procedures for a system. Whereas each university will have one information security officer, technical management may designate a number of security administrators.

Security incident

Any incident in which the secure configuration of a system has been compromised.

Security incident management

Area of incident management focused on controlling and correcting vulnerabilities, exposures, and compromise of the secure configuration of any system.

Sensitive information

Information maintained by the university that requires special precautions to protect it from unauthorized modification or deletion. Sensitive information may be either public or confidential. It is information that requires a higher than normal assurance of accuracy and completeness. The controlling factor for sensitive information is that of integrity.

Server

Any computer providing a service over the network. Services include, but are not limited to: website publishing, SSH, chat, printing, wireless access, and file sharing.

Single sign-on

Ability for a user to sign in once and have that sign-in allow access to multiple information systems without the need for providing a username and password for each separate system.

Spyware

Software that is installed surreptitiously on a computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent. While the term suggests software that secretly monitors the user’s behavior, the functions of spyware include collecting various types of personal information, interfere with control of the computer, changing computer settings, and redirecting web browser activity.

Strong password

A strong password is constructed so that it cannot be easily guessed by another user or a “hacker” program. It is typically a minimum number of positions in length and contains a combination of alphabetic, numeric, or special characters and should not be linked to any personal information such as a birth date, Social Security number, and so on.

System administrator

Person responsible for the effective operation and maintenance of information systems, including implementation of standard procedures and controls, to enforce a university’s security policy.

Synchronization

Process whereby information on two systems is shared so that each system’s copy is identical to the other.

System

In the context of IT, any device capable of performing complex functions to provide services by use of hardware, firmware, software, or other programming. Systems may include workstations, desktops, laptops, servers, routers, and switches.

System hardening

Process of enhancing the configuration of a system so that there is greater assurance the system can be used only by authorized users for authorized purposes.

Test and development systems

Systems used exclusively for testing or development of software and not used to directly support university operations.

Trojan

Destructive programs-usually viruses or worms-that are hidden in an attractive or innocent-looking piece of software, such as a game or graphics program. Victims may receive a Trojan horse program by email or on portable media, often from another unknowing victim, or may be urged to download a file from a website.

Unauthorized disclosure

The intentional or unintentional revealing of restricted information to people who do not have a legitimate need to access that information.

Unscheduled change

Failure to present notification to the formal process in advance of the change being made. Unscheduled changes will only be acceptable in the event of a system failure or the discovery of a security vulnerability.

Unscheduled outage

Any period in which a system is not available for normal use and that lack of availability was not previously discussed, approved, and scheduled.

UPS

An uninterruptible power supply. An electrical apparatus that provides emergency power to a load when the input power source (usually commercial power) fails.

Use/Using

An umbrella term that includes the terms store, process, change, delete, read, and access (and their progressive forms).

User

An individual that is authorized by the information owner to access the resource, in accordance with the information owner’s procedures and rules. The user is any person who has been authorized by the information owner to read, enter, or update that information. The user is the single most effective control for providing adequate security. See OP 44.00 and OP 44.01 for a list of duties and responsibilities.

Username

A pseudonym used by a user to access a computer system — typically based on the user’s legal name or some derivative thereof.

Virtual private network (VPN)

Encrypted connections over a larger network, typically over the Internet, which simulates the behavior of direct, local connections.

Virus

A computer virus refers to a program that enters your computer—often through email or Internet downloads—and makes copies of itself, spreading throughout your computer and files. There is a wide range of computer viruses out there. They can be anything from merely annoying to horribly damaging—deleting files or making your computer inoperable. Viruses attach themselves to an application on a computer and aren’t actually executed until that application is accessed or run.

Vulnerability

Any exploitable aspect of a system or process.  

Web page

A document on the World Wide Web. Every web page is identified by a unique URL (uniform resource locator).

Web server

A computer that delivers (serves up) web pages.

Website

A location on the World Wide Web, accessed by typing its address (URL) into a web browser. A website always includes a home page and may contain additional documents or pages.

Wireless networking

Transmission of computer-based information over short to medium distances using radio frequencies.

Wireless adhoc networking

Wireless networking in which centralized authorization and infrastructure are not used — this is an unauthorized method of connecting systems to the university network.

World Wide Web

Also referred to as “the Web.” A system of Internet hosts that supports documents formatted in HTML (hypertext markup language), which contain links to other documents (hyperlinks) and to audio, video, and graphic images. Users can access the Web with special applications called browsers, such as Firefox and Microsoft Internet Explorer.

Worm

A program that makes copies of itself elsewhere in a computing system. These copies may be created on the same computer or may be sent over networks to other computers. The first use of the term described a program that copied itself benignly around a network, using otherwise-unused resources on networked machines to perform distributed computation. Some worms are security threats, using networks to spread themselves against the wishes of the system owners and disrupting networks by overloading them. A worm is similar to a virus in that it makes copies of itself, but different in that it need not attach to particular files or sectors at all.

Educalingo cookies are used to personalize ads and get web traffic statistics. We also share information about the use of the site with our social media, advertising and analytics partners.

Download the app
educalingo

section

PRONUNCIATION OF ELECTRONIC DATA PROCESSING

GRAMMATICAL CATEGORY OF ELECTRONIC DATA PROCESSING

Electronic data processing is a noun.

A noun is a type of word the meaning of which determines reality. Nouns provide the names for all things: people, objects, sensations, feelings, etc.

WHAT DOES ELECTRONIC DATA PROCESSING MEAN IN ENGLISH?

electronic data processing

Electronic data processing

Electronic Data Processing can refer to the use of automated methods to process commercial data. Typically, this uses relatively simple, repetitive activities to process large volumes of similar information. For example: stock updates applied to an inventory, banking transactions applied to account and customer master files, booking and ticketing transactions to an airline’s reservation system, billing for utility services. The modifier «electronic» or «automatic» was used with «data processing», especially ca. 1960, to distinguish human clerical data processing from that done by computer.


Definition of electronic data processing in the English dictionary

The definition of electronic data processing in the dictionary is the processing of data by an electronic device such as a computer.

WORDS THAT RHYME WITH ELECTRONIC DATA PROCESSING

Synonyms and antonyms of electronic data processing in the English dictionary of synonyms

Translation of «electronic data processing» into 25 languages

online translator

TRANSLATION OF ELECTRONIC DATA PROCESSING

Find out the translation of electronic data processing to 25 languages with our English multilingual translator.

The translations of electronic data processing from English to other languages presented in this section have been obtained through automatic statistical translation; where the essential translation unit is the word «electronic data processing» in English.

Translator English — Chinese


电子数据处理

1,325 millions of speakers

Translator English — Spanish


procesamiento electrónico de datos

570 millions of speakers

Translator English — Hindi


इलेक्ट्रॉनिक डाटा प्रोसेसिंग

380 millions of speakers

Translator English — Arabic


معالجة البيانات إلكترونيا

280 millions of speakers

Translator English — Russian


электронная обработка данных

278 millions of speakers

Translator English — Portuguese


processamento eletrônico de dados

270 millions of speakers

Translator English — Bengali


ইলেকট্রনিক তথ্য প্রক্রিয়াকরণ

260 millions of speakers

Translator English — French


traitement électronique des données

220 millions of speakers

Translator English — Malay


Pemprosesan data elektronik

190 millions of speakers

Translator English — German


elektronische Datenverarbeitungs

180 millions of speakers

Translator English — Japanese


電子データ処理

130 millions of speakers

Translator English — Korean


전자 데이터 처리

85 millions of speakers

Translator English — Javanese


Pengolahan data elektronik

85 millions of speakers

Translator English — Vietnamese


xử lý dữ liệu điện tử

80 millions of speakers

Translator English — Tamil


மின்னணு தரவு செயலாக்கம்

75 millions of speakers

Translator English — Marathi


इलेक्ट्रॉनिक डेटा प्रोसेसिंग

75 millions of speakers

Translator English — Turkish


Elektronik veri işleme

70 millions of speakers

Translator English — Italian


elaborazione elettronica dei dati

65 millions of speakers

Translator English — Polish


Informatyka

50 millions of speakers

Translator English — Ukrainian


електронна обробка даних

40 millions of speakers

Translator English — Romanian


procesarea electronică a datelor

30 millions of speakers

Translator English — Greek


ηλεκτρονικής επεξεργασίας δεδομένων

15 millions of speakers

Translator English — Afrikaans


Elektroniese data verwerking

14 millions of speakers

Translator English — Swedish


elektronisk databehandling

10 millions of speakers

Translator English — Norwegian


elektronisk databehandling

5 millions of speakers

Trends of use of electronic data processing

TENDENCIES OF USE OF THE TERM «ELECTRONIC DATA PROCESSING»

The term «electronic data processing» is normally little used and occupies the 120.511 position in our list of most widely used terms in the English dictionary.

Trends

The map shown above gives the frequency of use of the term «electronic data processing» in the different countries.

Principal search tendencies and common uses of electronic data processing

List of principal searches undertaken by users to access our English online dictionary and most widely used expressions with the word «electronic data processing».

FREQUENCY OF USE OF THE TERM «ELECTRONIC DATA PROCESSING» OVER TIME

The graph expresses the annual evolution of the frequency of use of the word «electronic data processing» during the past 500 years. Its implementation is based on analysing how often the term «electronic data processing» appears in digitalised printed sources in English between the year 1500 and the present day.

Examples of use in the English literature, quotes and news about electronic data processing

10 ENGLISH BOOKS RELATING TO «ELECTRONIC DATA PROCESSING»

Discover the use of electronic data processing in the following bibliographical selection. Books relating to electronic data processing and brief extracts from same to provide context of its use in English literature.

1

Introduction to computers and data processing

Explains the workings of computer systems, describes the development of the electronic computer industry, and discusses the basics of computer programming

Gary B. Shelly, Thomas J. Cashman, 1980

2

Capital Cost Allowance in Canada

The 2004 Federal Budget contained a proposal to increase the capital cost
allowance rate for certain general-purpose electronic data processing equipment
from 30% to 45%. This proposal was implemented through new Class 45, which
 …

3

Electronic Data Processing Equipment for Census ’70

TABULATING. DATA. REPORTING. DATA. Methods Items Per Minute Methods
Products Time Required Pen Pen Printed Pencil 50 Items Hand-Set Type Report
Paper Printing 56 pages Pen Pen Printed Pencil 100 items Hand-Set Type …

4

StarBriefs Plus: A Dictionary of Abbreviations, Acronyms and …

… q Electron Diffraction Pattern q Electronic Data Processing • Electronic Data
Processor q Electronic Display Panel • Electronic Documentation Project •
Embedded Data Processor • Engineering Data Package q Engineering Design
Proposal …

5

Principles of Internal Control

The functions described in this chapter are referred to by various acronyms: •
EDP: electronic data processing; in many texts, it is abbreviated to data
processing; • ADP: automatic data processing; and • MIS: management
information systems.

6

Library of Congress Subject Headings

Electronic data processing (Indirect) (Continued) Information science Information
storage and retrieval systems Machine theory Office practice—Automation -—
Batch processing sa LIBMAINT (Computer program) x Batch processing in …

Library of Congress, 1986

7

Library of Congress Subject Headings

B32] UF ADP backup processing alternatives Backup processing alternatives in
electronic data processing Contingency planning in electronic data processing
BT Data processing service centersManagement Data protection _Batch …

Library of Congress. Cataloging Policy and Support Office, 2005

In a batch-processing environment, electronic data processing is a function
separate and distinct from actual operations. Batch processing systems are
relatively simple. However, by their very nature, they are not appropriate for
applications …

9

Auditing with the Computer

techniques for reviewing electronic data-processing installations. But the fact
remains that, up to the present time, no study has been made of the auditing
problems. Several suggestions made in recent articles are relevant to this
problem, …

10

Modern Dictionary of Electronics

Any computerized information system and the equipment used in that system.
electronic data-processing center — Abbreviated EDP center. A place in which is
kept automatically operated equipment, including computers, designed to
simplify …

10 NEWS ITEMS WHICH INCLUDE THE TERM «ELECTRONIC DATA PROCESSING»

Find out what the national and international press are talking about and how the term electronic data processing is used in the context of the following news items.

Labour laws take centre stage

… soon for approval, have significantly also proposed to include BPOs and electronic data processing firms as commercial establishments. «The Indian Express, Jul 15»

When the IoT meets your IT department…

Historically IT was known as the EDP Department (Electronic Data Processing). This is a far cry from the current remit of most enterprise IT … «CIO New Zealand, Jul 15»

Week ahead: Greece at the forefront of investors’ minds

L — news) 5% Cum Prf, Blackrock Income And Growth Investment Trust, Dunedin Smaller Companies Inv Trust, Electronic Data Processing … «Yahoo Finance UK, Jun 15»

Increase in general education aid helps Morris Area balance budget

The proposal includes an increase in coverage for electronic data processing and equipment as a result of the district’s technology investments. «Morris Sun Tribune, Jun 15»

Mid Cap Stocks Trending Alert — Discovery (DISCK), Avery Dennison …

… and Avery Dennison brands to label printers and converters for labeling, decorating, fastening, and electronic data processing applications in … «Techsonian, Jun 15»

Uncovering the Early History of Big Data In 1974 Los Angeles

… agencies to use electromechanical and electronic data processing systems in accomplishment of its day-to-day service rendering tasks… the … «Gizmodo India, Jun 15»

Electronic Data Processing Sells Sheffield Warehouse For GBP425 …

LONDON (Alliance News) — Electronic Data Processing PLC Thursday said it has completed the sale of its freehold warehouse in Sheffield for … «London South East, Jun 15»

Electronics exports rose 18% to $2.22B in April

… electronics, electronic data processing, automotive electronics, office equipment, communication/radar and control and instrumentation. «Inquirer.net, Jun 15»

Making sense of the first quarter 2015 GDP results

This more than offset the 44.68-percent and 8.31- percent contractions in Control Instrumentations and Electronic Data Processing, respectively … «Business Mirror, Jun 15»

First National Bank Alaska Names Lawer Chairwoman

… investor loan production, bank operations, electronic data processing and marketing. Lawer is also a director of the Federal Reserve Bank of … «American Banker, Jun 15»

REFERENCE

« EDUCALINGO. Electronic data processing [online]. Available <https://educalingo.com/en/dic-en/electronic-data-processing>. Apr 2023 ».

Download the educalingo app


Discover all that is hidden in the words on educalingo

Definition of Information.

The term ‘Information, is difficult to define precisely although its properties and effects are observed in all walks of life. The usage of information has given it different namings. The dictionary meaning of this term ‘Knowledge’ ‘Intelligence’ ‘a facts’ ‘data’ ‘a message’ ‘a signal’ which is transmitted by the act or process of communication.

“Information is an assemblage of data in a comprehensible form capable of communication. This may range from content in any format – written or printed on paper, stored in electronic databases, collected on the Internet etc. -to the personal knowledge of the staff of an organization.” – Harrods Librarian’s Glossary and Reference Book.

“The data are potential information but when data are actually used they are called Information.” – Davis & Johnson.

Types of information.

Information has its varieties. David B.Hertz and Albert B.Rubenstein have identified six varieties of information. These are as:

  • Conceptual information.
  • Empirical information.
  • Procedural information.
  • Stimulatory information.
  • Stimulatory information.
  • Policy information.
  • Directive information.

1. Conceptual information: Information which is based on ideas, concepts, theories, hypothesis etc, and might be used in future or not. It does not always means the actual meaning. Such information do not have scientific foundation.

  • e.g. Charles Darwin’s Theory of Evaluation.

2. Empirical Information: The word empirical information denotes information acquired by means of observation or experimentation. This information have scientific foundation.

  • e.g. H2+O2=H2O (Water)

3. Procedural Information: The methodology which enables the investigators to operate more effectively. Procedural information relates to means by which the data of investigation are obtained, manipulated, and tested.

  • e.g. police officer > Inform to public > Reason of investigation > To find out actual criminal.

4. Stimulatory Information: Information which creates stimulation among the people are called to be the stimulatory information.

  • e.g. Victory day celebration.

5. Policy Information: This type of information focuses on the decision making process. It can be obtained from description, picture, diagram etc.

  • e.g. Law and Justice.

6. Descriptive information: Information which deals with providing direction is called directive information.

  • e.g. Mode of operation in any organization.

Понравилась статья? Поделить с друзьями:
  • Definition of the word idiom
  • Definition of the word elderly
  • Definition of the word identity
  • Definition of the word effort
  • Definition of the word hurt