Part of the Application security glossary:

Google Docs is a free Web-based application in which document s and spreadsheet s can be created, edited and stored online. Files can be accessed from any computer with an Internet connection and a full-featured Web browser . Google Docs is a part of a comprehensive package of online applications offered by and associated with Google .

Users of Google Docs can import, create, edit and update documents and spreadsheets in various font s and file formats, combining text with formulas, lists, tables and images. Google Docs is compatible with most presentation software and word processor s. Work can be published as a Web page or as a print-ready manuscript. Users can control who sees their work. Google Docs is ideal for publishing within an enterprise, maintaining blog s or composing work for viewing by the general public.

Google Docs lends itself to collaborative projects in which multiple authors work together in real time from geographically diverse locations. All participants can see who made specific document changes and when those alterations were done. Because documents are stored online and can also be stored on users' computers, there is no risk of total data loss as a result of a localized catastrophe. However, the Internet-based nature of Google Docs has given rise to concerns among some authors that their work may not be private or secure.

This was last updated in November 2007
Posted by: Margaret Rouse

Related Terms

Definitions

  • shadow app

    - Shadow apps are software-as-a-service (SaaS) applications that are used on business networks but are not supplied by the IT department or even visible to them. Shadow apps are often collaborative ... (WhatIs.com)

  • TailsOS

    - TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distr... (WhatIs.com)

  • soft token

    - A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for... (WhatIs.com)

Glossaries

  • Application security

    - Terms related to application security, including procedural definitions for preventing software vulnerabilities and words and phrases about secure code development.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.