The process of moving within an audio file or tape to locate a particular section. The term originally comes from the days of reel-to-reel players, when rocking a reel would give the impression of scrubbing tape across the head. Many audio scrub tools today allow the user to drag a cursor across the wave form to audition different sections of an audio file.
- Audit Trail
A record showing who has accessed a computer system and what operations he or she has performed during a given period of time. Audit trails are useful both for maintaining security and for recovering lost transactions. Most accounting systems and database management systems include an audit trail component. In addition, there are separate audit trail […]
The process of identifying an individual, usually based on a username and password. In security systems, authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about […]
In social media, authenticity is the word used to describe “real” people behind blog posts and other social profiles that can develop an authentic voice with readers and followers.
- Authoring Tool
Also known as authorware, a program that helps you write hypertext or multimedia applications. Authoring tools usually enable you to create a final application merely by linking together objects, such as a paragraph of text, an illustration, or a song. By defining the objects’ relationships to each other, and by sequencing them in an appropriate […]
The process of granting or denying access to a network resource. Most computer security systems are based on a two-step process. The first stage is authentication, which ensures that a user is who he or she claims to be. The second stage is authorization, which allows the user access to various resources based on the […]