IT Services Glossary

The Word Usage List has grammatically and stylistically correct spelling and usage for commonly misused and misspelled words and product names. The Writing Guides and Glossaries article lists other University of Arkansas and technical glossaries and writing guides.

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

A

Academic Technology Includes learning management system (Blackboard) and classroom technology
Accessibility Conformance Report (ACR) Once completed, the VPAT® with documented testing results is referred to as an Accessibility Conformance Report (ACR) that details the accessible features of the tested product or service. The Accessibility Conformance Report (ACR), based on a completed ITI VPAT®, is the leading global reporting format for assisting buyers and sellers in identifying information and communications technology (ICT) products and services with accessibility features. (ITI)
Account Activation (UARK) Password Manager Activation page: https://newuser.uark.edu/login
Active Directory (AD) AD is used at the University of Arkansas to manage UARK user access.
Active Directory (AD) Group  
Active Directory (AD) Organizational Unit (OU) An Active Directory Organizational Unit (OU) allows management of security groups for access to resources, to organize workstations, and to apply group policies to workstations and other devices. University departments can request an OU through IT Services.
Managing OU Security Groups in Azure Active Directory
Active Student  
Adobe Creative Cloud  
Affiliate/Affiliate Account Academic affiliates include visiting speakers, researchers, and faculty. Non-academic affiliates include vendors, contractors, consultants and those with an athletics affiliation. Affiliate accounts can be granted to those not employed by the university or enrolled as students who have a legitimate need to access university resources. Affiliate accounts can access campus Wi-Fi, Workday, email, and other online services.
See more information on affiliates and affiliate accounts.
Asset  
Authentication  
Azure  

B

Blackboard Learn Students, faculty and instructors can participate in classes delivered online or access online materials and activities to complement face-to-face classroom experiences using Blackboard Learn as the campuswide learning management system. Faculty can also take advantage of streaming video and online conferencing tools provided within Blackboard. Blackboard login: https://learn.uark.edu/
Business Application Services IT Services team
BYOD Bring Your Own Device
   
   

C

Campus Web Data Campus Web Data is an online platform used for updating faculty and staff information including profile photo, department, classification, education information, and professional information. All personal information updates including name, email, title, and contact information will need to be updated through Workday. Log into Campus Web Data at: https://campuswebdata.uark.edu/
Capitalized Equipment The capitalization threshold for Capitalized Equipment is $5,000.00. In addition to having a first cost or initial value of at least $5,000, in order to be considered Capitalized Equipment, each capitalized item must have an estimated useful life of greater than one year, an identity that does not change with use, and a nature that makes formal accountability practical.
​Fayetteville Policies and Procedures 313.2 Inventory/Equipment Capitalization Thresholds
CAPTCHA Acronym for Completely Automated Public Turing test to tell Computer and Humans Apart
Catastrophic Event  
Change Management  
Clicker Some classes require the use of student response devices, often called clickers. Clickers are handheld devices that enable instructors to pose questions to students and immediately collect and view the responses of the entire class. They are often used to give quizzes, take polls, open discussions, and take attendance. Clickers can be purchased at the Tech Store. TurningPoint Mobile is software that allows the use of a smartphone, tablet, or browser in place of a clicker.
Cloud Services  
CNAME Record A Canonical Name record (abbreviated as CNAME record) is a type of resource record in the Domain Name System (DNS) that maps one domain name (an alias) to another (the canonical name). CNAME records are aliases for existing A or AAAA records, and can stand alone or as part of a host record. In the Infoblox GUI, the terms “CNAME” and “alias” are used interchangeably.
College  
Computing Activities Council (CAC) The Computing Activities Council (CAC) and its committees represent the IT governance structure at the University of Arkansas and facilitates participation among students, faculty, staff and administrators in order for the university to achieve its educational and research missions and goals. The CAC promotes effective processes and sharing of resources to establish excellent IT infrastructure and services on campus.
Content Management System (CMS)  
Cookie HTTP cookies (also called web cookies, Internet cookies, browser cookies, or simply cookies) are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser. Cookies are placed on the device used to access a website, and more than one cookie may be placed on a user's device during a session. They enable web servers to store stateful information (such as items added in the shopping cart in an online store) on the user's device or to track the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited in the past). They can also be used to save for subsequent use information that the user previously entered into form fields, such as names, addresses, passwords, and payment card numbers. (NIST)
Controlled Unclassified Information (CUI) A categorical designation that refers to unclassified information that does not meet the standards for National Security Classification under Executive Order 12958, as amended, but is pertinent to the national interests of the United States or to the important interests of entities outside the federal government, and under law or policy requires protection from unauthorized disclosure, special handling safeguards, or prescribed limits on exchange or dissemination. The designation CUI replaces Sensitive But Unclassified (SBU). Information that the government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, that a law, regulation, or government-wide policy requires or permits an agency to handle using safeguarding or dissemination controls, excluding information that is classified under Executive Order 13526, Classified National Security Information, December 29, 2009, or any predecessor or successor order, or the Atomic Energy Act of 1954, as amended. (from NIST)

D

Dashboard  
Data Distinct pieces of digital information that have been formatted in a specific way.
Pieces of information from which “understandable information” is derived.
A subset of information in an electronic format that allows it to be retrieved or transmitted.
A representation of information as stored or transmitted.
Any piece of information suitable for use in a computer.
A representation of information, including digital and non-digital formats.
Information in a specific representation, usually as a sequence of symbols that have meaning.
(NIST)
Data Breach The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where: a person other than an authorized user accesses or potentially accesses personally identifiable information; or an authorized user accesses personally identifiable information for another than authorized purpose. (NIST)
Data Breach Notification If security is breached and personally identifying information is compromised, the University will immediately notify law enforcement officials including, as appropriate, University Police, the FBI, the U.S. Secret Service, the U.S. Postal Inspection Service and/or other law enforcement agencies.
The University will contact everyone whose identity may have been put at risk, regardless of whether personal data appears to have been accessed or extracted. It will also notify the campus community about the security breach through electronic and others means. The notification will include the following information: Exactly when and how did the breach occur, and when was the breach detected? How many individuals are affected? What personal information was put at risk? Does the University know whether any information was stolen? What procedures did the University follow with regard to the security breach? How should individuals respond if they discover fraudulent use of their personal information? What steps is the University taking to prevent illegal access of confidential information in the future? What has the University done to notify those affected? Who can respond to additional questions concerning this security breach? The custodian of the data is responsible for notifying those affected by an electronic security breach. In the case of a non-electronic security breach, the office or department where the breach occurred will be responsible for notification.

Fayetteville Policies and Procedures 410.2 - Notification Procedures in Case of Breach of Privacy

Data Center IT Services maintains data center facilities for hosting important University of Arkansas campus IT resources. These facilities house regulated floor space, power, network and cooling. The deployment and maintenance of these resources is the responsibility of the data center facilities manager. Conditioned power is available to hosted data center resources. All systems have the option of being connected to one or more (N+1) uninterruptible power supply units (UPS). Backup power is provided by a local natural gas generator. The data center conditioned space has regulated temperature humidity and redundant cooling systems. All hosted resources have access to several redundant data networks.
Data Classification  
Data Criticality Level  
Data Governance ​A set of processes that ensures that data assets are formally managed throughout the enterprise. A data governance model establishes authority and management and decision-making parameters related to the data produced or managed by the enterprise.
​(CNSSI 4009-2015;&nbs from NSA/CSS Policy 11-1)
Data Management  
Data Owner  
Data Sensitivity Level  
Data Warehouse ​​Data Warehouse is a repository where staff and faculty with appropriate access can run queries and reports of university data. Data Warehouse access is only available to academic and administrative users. Access requires authorization from the department head or person responsible for authorizing cost center expenditures. Data Warehouse is made up of over 270 tables of financial (purchasing, payroll, general ledger, etc.), academic (UAConnect) and historical BASIS data copied from live production systems at regular intervals.
More information on Data Warehouse
Departmental Account (UARK) Faculty and staff can request a secondary UARK account for departmental email, VoIP phones and other services. An account used for departmental use such as an email or website where access may need to be shared among multiple people to maintain a departmental presence. If these accounts are to be used for email, they should be defined as a shared mailbox and include the list of email addresses which should have read and send access to the shared mailbox. A departmental phone account is designated with a departmental phone number and can be managed by one or more employees.
DOC file Microsoft Word document with the file extension DOCX

E

Eduroam ​​Eduroam is an international research and education community offering visitors wireless access at participating institutions. When visiting at a participating institution, UARK users can connect to their network using their @uark.edu email address and password. Visitors to the University of Arkansas from any eduroam participating institution can connect by logging in with their institution's email address and password.
Enterprise Application  
Enterprise Application Services Enterprise Application Services is a team within the Enterprise Applications & Data Services division of IT Services at the University of Arkansas.
Enterprise Data Services  
Enterprise Service Management  

F

FERPA (Family Educational Rights and Privacy Act)  
Firewall  
FOIA (Arkansas Freedom of Information Act) The law gives Arkansans access to public records and public meetings, with some exceptions. The intent of the FOIA is to keep government business and government records open and accessible to the people of Arkansas.

G

GitLab ​Opensource ​DevOps software that combines the ability to develop, secure, and  operate software in a single application.
The university offers a private, on-premises instance of GitLab, a web-based Git repository manager that provides knowledge/code continuity for researchers, departments, project teams, and more. GitLab features include code review, wiki and issue tracking, as well as automation and continuous integration.
UARK GitLab Login: http://git.uark.edu/
   
   

H

HECVAT  
   
   

I

Information and communications technology (ICT) Includes all categories of ubiquitous technology used for the gathering, storing, transmitting, retrieving, or processing of information (e.g., microelectronics, printed circuit boards, computing systems, software, signal processors, mobile telephony, satellite communications, and networks) and encompasses all technologies for the capture, storage, retrieval, processing, display, representation, organization, management, security, transfer, and interchange of data and information. (NIST)
Information Technology Industry Council (ITI) The Information Technology Industry Council (ITI) is the premier global advocate for technology by promoting public policies and industry standards that advance competition and innovation worldwide. ITI encourages all governments around the world to develop policies, standards, and regulations that promote innovation and growth for the tech industry.
   
   

J

   
   
   

K

   
   
   

L

   
Learning Management System (LMS)  
Legacy system  

M

Markdown Markdown is a lightweight markup language that you can use to add formatting elements to plain text text documents.
More information about Markdown
   
   

N

   
   
   

O

   
OneDrive  
Original Equipment Manufacturer (OEM)  

P

Personally Identifiable Information (PII) PII is information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other information that is linked or linkable to a specific individual, including but not limited to: Social Security number (SSN), mother's maiden name, driver's license number, military, or passport identification number, PINs or passwords, bank account information, relatives' names, personal characteristics, date or place of birth, health information not covered under HIPAA, and other information that would make the individual's identity easily attainable. (Policy 921.0 Data Classification)
Project management office (PMO)  
   
   

Q

   
   
   

R

ResourceSpace  
Respondus LockDown Browser  
   

S

Sandbox  
Secondary Account  
Section 508  
SharePoint  
Student Tech Center (STC)  

T

   
   
   

U

User Solutions Workday -- https://workday.uark.edu/about/meet_us.php
Username  
   

V

Voluntary Product Accessibility Template (VPAT) The ITI (Information Technology Industry) Voluntary Product Accessibility Template (ITI VPAT®) is a free template that presents testing criteria developed from accessibility requirements and standards to help buyers of technology confirm that the technology is accessible and has accessibility features. (See ACR)
   
   

W

WCAG  
   
   

X

   
   
   

Y

   
   
   

Z

   
   
   

 

Print Article

Details

Article ID: 647
Created
Thu 7/11/24 10:51 PM
Modified
Wed 9/18/24 10:13 PM