The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by afrizalharis302, 2022-12-27 22:46:55

IT DICTIONARY POCKET

IT DICTIONARY POCKET

1. A11Y: Accessibility There are eleven
2. A2A letters between the "a"
and the "y".

Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution

1

4. AA Automated A device, typically
5. AAA Attendant attached to a private
branch exchange or
voice mail system,
that answers
incoming calls.

Authentication, Also pronounced
authorization, "triple a." Refers to a
and accounting framework for
intelligently
controlling access to
computer resources,
enforcing policies,
auditing usage, and
providing the
information
necessary to bill for
services.

2

6. AAB All-to-all The process where
7. AAC Broadcast every node broadcasts
8. AAC its information to all
other nodes.

Advanced An audio compression
Audio format newer and more
Coding efficient than MP3,
used internally by
iTunes and Nintendo
Wii

ATM A device used to
Access concentrate a variety of
Concentrator services (such as frame
relay, Internet Protocol
and video) over a single
ATM network access
connection.

3

9. AAL ATM The ATM layer where
10. AARP Adaptation non-ATM data is
Layer converted to ATM
format. The AAL
serves as the "glue"
that connects
traditional packet and
frame structures with
short, fixed-length
ATM cells.

AppleTalk Provides for the
Address dynamic assignment of
Resolution node identifiers to
Protocol nodes within an
AppleTalk network.

4

11. AAS Auto Area Scanner technology
12. AAT Segmentation which detects and
13. AAUI optimizes text and
graphics on the same
page by Epson.

Average The average amount
Access Time of time it takes for a
storage peripheral to
transfer data to the
CPU.

Apple A 14-position, 0.050-
Attachment inch-spaced ribbon
Unit contact connector.
Interface

5

14. ABAP Advanced Powerful
Business programming
15. ABC Application language created
16. ABC Programming specifically for
developing SAP
applications. The
core development
tool in SAP's R/3
system.

Activity- An approach to
Based- understanding where
Costing and why costs are
incurred within an
enterprise.

Atanasoff- First digital
Berry calculating machine
Computer that used vacuum
tubes

6

17. ABEND Abnormal A type of system
18. ABEND End error in which a task
or program fails to
execute properly
(i.e., "abnormally
ends"). The term is
also used as the
name for a type of
error message that
indicates such a
failure has occurred.

Absent By Sent in e-mail
Enforced subject lines warning
Net friends and others of
Deprivation forced loss of
Internet access

7

19. ABI Application A set of specifications
20. ABLE Binary that enables an
Interface application written for
one target OS and
hardware platform to
run on a different OS
and platform, where
the two hardware
platforms share the
same processor type.

Agent A Java framework
Building and and toolkit for
Learning constructing and
Environment deploying intelligent
agents.

8

21. ABM Activity The use of ABC
22. ABME Based principles in the
Management ongoing
management of
costs and resources.

Asynchronous In communications,
Balanced an operational
Mode mode in which
Extended modulus 128
sequence numbers
are used.

29

23. ABR Automatic The process in which a
24. ABR Baud Rate receiving device
detection examines the first
character of an
incoming message to
determines its speed,
code level, and stop bits.

Available An ATM service
Bit Rate category. ABR service
is conceptually similar
to that of a frame relay
network - a minimal cell
rate is guaranteed, and
bursts can be supported
if the network resources
allow it.

10

25. ACA Australians The Australian
26. ACAP Communications government body
Authority that regulates the
nation's
communications
industries.

Application a standard for
Configuration accessing
Access Protocol program
configuration
information from
a remote server,
allowing a user to
use and change
their
configuration
from any
workstation by
reading or writing
the values on a
central server.
Defined in RFC
2244.

11

27. ACC Adaptive Adaptive Cruise
28. ACU Cruise Control
29. ACD Control Specification(JSR-
Authorization 115) that defines new
Contract for java.security.
Containers Permission classes to
satisfy the J2EE
authorization model

Association A worldwide
of C and C++ association of people
Users who are interested in
C, C++, and related
programming
languages.

Automatic Feature that allows
Call Delivery cellular & wireless
phones to receive
incoming calls when
roaming.

122

30. ACD Automatic Call specialized phone
distributor/ system that
distribution handles many
incoming calls.
31. ACDI Asynchronous ACDs are used for
Communications a variety of order-
Device Interface taking functions,
such as calls to
help desks or
dispatching of
service
technicians.

A software device
that permits
asynchronous
transmission, a
way of
transmitting data
in which one
character is sent at
a time, and there
may be uneven
amounts of time
between
characters.

13

32 ACE Access A set of identities and
Control permissions that are
33. ACE Entry directly associated with
34. ACE a particular resource.
Each access control
entry is directly
associated with only one
resource. More than one
ACE can be associated
with each resource.

Adobe A professional who has
Certified demonstrated
Expert proficiency with one or
more Adobe software
products.

Advanced A high-end processor
CMOS- technology introduced
ECL by Hitachi in the 1990s.

14

35. ACE Agile Nortel SIP-based
36. ACEE
Communications platform acquired

Environment by Avaya

Access Control In RACF, a
Environment control block
Element containing details
of the current
user, including
user ID, current
connect group,
user attributes,
and group
authorities.

15

37. ACF Access A family of IBM
Communications communications
Function programs that handle
tasks such as resource
38. ACF2 Access Control sharing and
Facility 2 distribution of
functions. They
include ACF/Virtual
Telecommunications
Access Method
(ACF/VTAM) and
ACF/Network
Control Program
(ACF/NCP).

A host-based security
subsystem from CA
(formerly Computer
Associates); also
known as CA-ACF2.

16

39. ACG Adaptive A technology that
40. ACH Code enables a program that
Generation uses processor features
of a given system model
to continue to work
correctly when the
program is moved to
another system model
that does not have all
the processor features of
the original model.

Automated A type of funds transfer
Clearing network that processes
House debit and credit
transactions between
accounts from
participating financial
institutions.

127

41. ACI Access Data that identifies the
42. ACID
Control access rights of a

Information group or principal.

Atomicity, Four well-established
Consistency, tests for verifying the
Isolation, integrity of business
Durability transactions in a data-
processing
environment.

18

43. ACK Acknow- When a modem
ledgement receives a data packet,
44. ACL it sends a signal back to
45. ACL the sending modem. If
all the data is present
and correct, it sends an
ACK signal, which acts
as a request for the next
data packet.

Access A list of authorised

Control List users, processes or

systems.

Activation A service that transmits
Connectivity out-of-band
Link information between
DirectTalk and the
Siemens Hicom 300
switch.

19

46. ACL Asianet An Indian media
47. ACL Communi- conglomerate jointly
48. ACM cations owned by STAR TV
Limited and Jupiter
49. ACM Entertainment.

Asynchronous Type of data packet
Connectionless (data only).
Link

Association A worldwide
for Computing association of
Machinery computer
professionals
headquartered in the
United States.
www.acm.org

Address Addresss Complete
Complete Messages
Messages

20

50. ACMS Application A transaction-
Control and processing monitor
51. ACP Manage- from Compaq (now
52. ACPI ment part of Hewlett-
System Packard); originally a
product of Digital
Equipment, which
Compaq acquired in
1998.

Array A type of processor
Control used in storage
Processor systems.

Advanced A standard developed
Configu- by Intel, Microsoft
ration and and Toshiba to
Power improve PC power
Interface management and plug-
and-play capabilities.

221

53. ACR Allowed An ABR service
Cell Rate parameter, ACR is the
54. ACR current rate in cells/sec
55. ACRI at which a source is
allowed to send.

Attenuation- A measure of signal

to-crosstalk quality in network

ration cabling.

Additional A specification that is
Coding required by an
Related encoding scheme to
Information complete its definition,
which extends beyond
the character set and
code page elements.

22

56. ACROSS Automated Automated Cargo
57. ACS Cargo Release and
58. ACSE Release Operations Service
and System
Operations
Service
System

Affiliated Xerox Corp.'s $6.4
Computer billion acquisition
Services, of Affiliated
Inc Computer Services
Inc.

Association The method used in
Control International
Service Organization for
Element Standardization's
OSI for establishing
a call between two
applications.

23

59. ACSLS Automated A Unix-based tape-
60. ACT Cartridge library-sharing
System system from Storage
Library Technology.
Software
Access A reusable named
Control authorization pattern
Template that you can apply to
multiple resources.
An access control
template consists of a
list of users and
groups and indicates,
for each user or
group, whether
permissions are
granted or denied.

24

61. ACU Abstract A measurement used by
62. AD Code Unit the z/OS XL C/C++
compiler for judging the
size of a function. The
number of ACUs that
comprise a function is
proportional to its size
and complexity.

Active The directory service
Directory portion of the Windows
2000 operating system.
AD manages the
identities and
relationships of the
distributed resources
that make up a network
environment.

225

63. AD Adminis- Defined in RFC
trative 1136. On the
64. ADAPT Domainn Internet, a group of
65. ADB networks, hosts, and
routers operated by
the same
organization.

Architecture, Architecture,
Design, Design, Analysis
Analysis and and Planning Tool.
Planning
Tool Port on the
Apple Macintosh for a
Desktop Bus keyboard, a mouse,
and other
peripherals.

26

66. ADC Advanced A peer-to-peer file-
67. ADC Direct sharing protocol, based
Connect on the topology of the
Direct Connect (DC)
Analog to protocol.
Digital
Converter Often referred to A/D,
the analog to digital
converter is an
electronic device that
transforms the analog
signal to digital signal,
helping interconnecting
the two kinds of
technology/gear.

27

68. ADC Automated The automated
69. ADCCP Data conversion of
Collection disparate types of
information into
computer records.
ADC devices and
technologies include
bar code systems,
optical character
recognition and
speech recognition.

Advanced A bit-oriented,
Data ANSI-standard
Communi- communications link-
cations layer protocol.
Control
Procedures

228

70. ADDM Application BMC's application
Discovery
and
Dependency
Mapping

29







1. b Bit The number of bits
1. ADJ Adjectva Exaumspeldetdoerfeinpirteisoennt a
Adwckhwaraadcktedrs.
: Sadawdawdsaca

2. B Byte Personal computers a
Exabmypteleisdeufsiunaitliloyn8 bits.
2. EXP Expire
akjdkasa awdkakwjds

3. B Bearer kasjAd wire used in ISDN

Channel Channel service that can carry

up to 64 Kbps of data

when operating at full

capacity. It is a clear

channel "pipe" that

carries voice, data, or

video over ISDN. The

BRI service offered to

home users has two B

channels.

320

4. B2B Business- B2B is also commonly
1. ADJ Atod-jBeuctsvinaess Euxsaemdpalse adnefaidnjieticotnive to

: Addewsckrwibaedakndys activity, be
SaitdBaw2Bdamwadrskaectaing, sales,
2. EXP
Expire or e-commerce, that
Eoxcacmuprslebdeetwfieneitnion

akbjudskianseassaews dakndakowthjders

kabsujsdinesses

5. B2C Business- B2C describes activities
to- of commercial
Consumer organizations serving the
end consumer with
products and/or services.
It is usually applied
exclusively to electronic
commerce.

321

6. B2E Business- The use and leverage of
1. ADJ Atod-jectva Exea-mbupslienedsesfianpitpiroonaches
Employee AdawndkwInatderkndest
: Satdeacwhndoalwogdiseasctao deliver a
Expire
2. EXP comprehensive set of
Exsaemrvpicleesdteofiannition
akejdnktearspariaswe'ds keamkpwlojdysees
kaasnjdd their managers. The

full term is sometimes

presented as "business-

to-enterprise."

7. B8ZS Binary 8ZS is a technique in T1
Eight Zero that modifies the AMI
Suppression encoding to ensure
minimum pulse density
without altering
customer data. When
eight "zeros" in a row
are detected, a pattern
with intentional bipolar
violations is substituted.

322

8. B- Behavioral Bitdefender
1. AHDAJVW AdjHecetuvraistic ExampTleecdhenfionliotgioyn
: Analyzer Aindwkwadkds
Virtual Sadawdawdsaca

Environments

2. EXP Expire Example definition

9. BAA Blanket akjdkasSaiganweddkbaykwjds
Authorizaktiaosnjd interconnectors

Agreement guaranteeing that

they have authority

of the end user

customer to request

CPNI and place

service orders on
the customer’s

behalf.

10. BAC BroadCast Business Objects
Agent broadcast agent

323


Click to View FlipBook Version