A L P H A B E Ts
27. SALS Simple An extensible
28. SAST Authentication authentication
and Security scheme that allows
Layer the Open Directory
Password Server to
support a variety of
network user
authentication
methods required.
Static Static application
application security testinga set
security of technologies
testing designed to analyze
application source
code, byte code and
binaries for coding
and design
conditions that are
indicative of
security
vulnerabilities.
430
A L P H A B E Ts
30. SAT Satellite software which finds
NAV navigation your physical
geographical location
31. SATA then gives you
directions on which
way to travel. This is
most commonly used
in specialist hand-held
devices as well as
mobile phones.
Serial ATA a disk-interface
technology developed
by a group of the
industry's leading
vendors to replace
parallel ATA. It is the
natural successor to
IDE. Serial ATA only
requires seven wires
per device (4 data and
3 ground) and the
cables can be up to 1m
long.
431
A L P H A B E Ts
32. SAV Symantec Previously called
33. SAX AntiVirus Norton AntiVirus
(NAV)
34. SB
Simple API A public-domain
for XML alternative to DOM for
enabling programming
languages to work with
XML documents. SAX
is API that uses "start
events" and "stop
events" to parse an
XML document so that
an application can
interact with it.
Sound Sound Blaster brand by
Blaster Creative Labs
432
A L P H A B E Ts
35. SBAS Satellite- systems broadcast
36. SBB Based free correction
Augmentation signals from geo-
System stationary satellites
to improve the
accuracy, integrity
and availability of
the GPS network
Storage specification created
Bridge Bay in March 2006 by a
nonprofit working
group, including
collaborative
vendors such as
Intel, Dell, EMC and
LSI, which defines
SBB as the
mechanical/electrical
interface between a
passive backplane
drive array and the
electronics packages
that give the array its
personality.
433
A L P H A B E Ts
37. SBC Session An appliance that
38. SBC Border simplifies handling of
Controller VoIP at the border of a
network
single- A complete computer
board that resides on a single
computer printed circuit board,
usually a small one.
39. SBCS Single- A coded character set
Byte in which each character
Character is represented by a 1-
Set byte code.
434
A L P H A B E Ts
40. SBCS Smart Cisco unified
Business communications
Commun- appliance that
ications provides voice and
System data communications,
voicemail, automated
41. SBL Spamhaus attendant, video,
Block List security, and wireless
capabilities while
integrating with
existing desktop
applications
Realtime database of
IP addresses of
verified spam sources
and spam operations,
maintained by the
Spamhaus Project
team and supplied as a
free service to help
email administrators
better manage
incoming email
streams.
435
A L P H A B E Ts
42. SBLOG Spam Blog a fake blog created
43. SBM solely to promote
affiliated Web sites,
with the intent of
skewing search
results and artificially
boosting traffic.
Subnet An IETF proposed
Bandwidth standard for handling
Manager resource reservations
on shared and
switched IEEE 802-
style local-area media
436
A L P H A B E Ts
44. SBS Small Taken to refer to Small
45. SBSD Business Business Server 2003
Server (or earlier versions)
46. SCA from Microsoft.
Slow But Term used by hardware
Sure Death repair people that
refers to the fact that
computers are not in
question as to IF they
will crash and die; it is
only a matter of when.
The three lethal factors
are heat, power that is
not clean and cigarette
smoke residue.
Service a collection of
component specifications
architecture (proposed and
published) by a
consortium of vendors.
437
A L P H A B E Ts
47. SCA- Supervisory Used extensively by
DA Control power, water, gas and
And Data other utility companies
48. SCAI Acquisition to monitor and manage
distribution facilities.
They are also used to
monitor and control end
user usage levels for
purposes such as
remote meter reading
and load shedding.
Switch-to- Protocol that allows
Computer subscriber’s computer
Appli- to interact with digital
cations switch, making it
Interface possible to coordinate
information in database
with incoming and
outgoing phone calls to
allow company
representative to
receive customer call
and simultaneously
receive customer's file
for viewing on desktop
workstation.
438
A L P H A B E Ts
49. SCAM SCSI This SCAM is
50. SCCM Configured actually a good
Auto- thing. It allows SCSI
Magically devices to
automatically be
configured with an
ID number, even if
they aren’t assigned
one.
Software SCCM tools are
change and products and suites
configuration that support the
management structured approval,
assignment,
monitoring,
execution and
reporting of changes
to software products
for teams and teams
of teams.
439
A L P H A B E Tt
1. T2l Transistor- A logic gate family
Transistor that provides higher-
2. T- Logic speed and higher-
commerce power than the
obsolete DTL logic
family.
Television Interactive TV
Commerce capabilitu, including
VOD movie rentals
and games
3. TACACS Terminal Developed by Cisco
Access Systems, it is
Controller standard security
Access protocol used in
Control authenticating the
System identity of a
computer or device
seeking remote
access to privileged
data (such as that
behind a firewall).
440
A L P H A B E Tt
4. TAE Text A software component
5. TAO Analysis that is responsible for
Engine discovering and
6. TAPI representing context and
semantic content in text.
Track at A method of writing
Once data to a CD-R or CD-
RW disc on a track by
track basis. Recording
can be paused between
writing tracks, unlike
Disc at Once, which
requires an uninterrupted
full-disc recording.
Telephony A number of IT
Application companies, led by
Program- Microsoft and Intel,
ming have collaborated to
Interface design a common
Windows graphical user
interface for telephony
and a Telephony
Application
Programming Interface
(TAPI).
441
A L P H A B E Tt
7. TAR Tape A compression format
8. TAXI ARchive commonly used in the
transfer and storage of
9. Tb files on UNIX
computers (.tar).
Transparent Encoding scheme
Asynchronous used for FDDI LANs
Transmitter- as well as for ATM.
Receiver Supports speeds of up
Interface to 100 Mbps over
multimode fiber.
TAXI is the chipset
that generates 4B/5B
encoding on
multimode fiber.
Terabit For processor storage,
real and virtual
storage, and channel
volume, 2 to the
power of 40 or 1 099
511 627 776 bits. For
disk storage capacity
and communications
volume, 1 000 000
000 000 bits.
442
A L P H A B E Tt
10. TB TeraByte 1024 gigabytes,
11. Tbps 1,099,511,627,776 bytes
12. TBR
Terabit per A trillion bits per
13. TCA
second second.
Technology specializes in providing
Business in-depth and timely
Research insights within the
computer, software,
telecom, mobility, and
professional services
industries.
Transaction Methodology that can
Cost be used to measure the
Analysis cost of individual
shopper operations such
as registering, browsing,
searching a catalog,
adding an item to a
shopping cart, checking
out, and so on
443
A L P H A B E Tt
14. TCAP Transaction From ITU-T
15. TCB Capabilities recommendations
Application Q.771-Q.775 or ANSI
Part T1.114 is a protocol
for SS 7 networks.
Trusted everything in a
Computing computing system that
Base provides a secure
environment. This
includes the operating
system and its
provided security
mechanisms, hardware,
physical locations,
network hardware and
software, and
prescribed procedures.
444
A L P H A B E Tt
16. TCG Trusted Group that develops and
17. TCL Computing promotes open, vendor-
Group neutral, industry
standard specifications
for trusted computing
building blocks and
software interfaces
across multiple
platforms.
Tool Portable interpreted
Command computer language
Language designed to be easy to
use.
18. TQC Tagged SCSI feature to allow
Command multiple I/O requests
Queuing
445
A L P H A B E Tt
19. TCO Total Cost the complete cost of
20. TCS of owning and using a
Ownership machine during its
useful life, including
not only the cost of the
machine itself, but also
maintenance, repairs,
and consumable
supplies such as ink and
paper.
Tata Inida-based IT services,
Consultancy business solutions, and
Services outsourcing company.
21. TCS Telecom- Wireless
munications communications
Systems provider in U.S.
446
A L P H A B E Tt
22. TCP Test Set of rules to
23. TCP Coordination coordinate test process
Procedure between lower tester
and upper tester.
Enables lower tester to
control operation of
upper tester. May, or
may not, be specified
in abstract test suite.
Transmission A connection-oriented
Control protocol that transmits
Protocol data in byte streams.
Data is transmitted in
packets called TCP
segments, which
contain TCP headers
and data.
447
A L P H A B E Tt
24. TCP/IP Trans- This is used for
25. TCU mission communications
Control/- across interconnected
Internet networks and is being
Protocol increasingly deployed
to connect diverse
Trans- computer architectures
mission and platforms, both
Control between enterprises
Unit and within enterprises.
TCP operates at Layer
4 (the transport layer)
of the OSI stack. IP
operates at Layer 3
(the network layer) of
the OSI stack.
A communication
control unit whose
operations are
controlled solely by
programmed
instructions from the
computing system to
which the unit is
attached.
448
A L P H A B E Tt
26. TD- Time China's home-
SCDMA division- grown 3G standard
synchronous for cellular
27. TDC code networks.
division
multiple
access
Tele- Former telecom
Denmark monopoly in
Communi- Denmark. It is now
cations privatized. Thus, it
is the biggest
company in all
aspects of
telecommunication
in Denmark with
landline, mobile,
Internet, VHF
maritime
borderline-radio etc.
449
A L P H A B E Tt
28. TDD/ Tone Dialing a method by which
TYY for the the hearing
Deaf/Teletype impaired can type
29. TDDM messages over
normal phone lines
using special
equipment. Many
ISPs have a
TDD/TTY for
technical support.
Target In a distributed data
Distributed management
Data Manager network,
programming
support that
translates the DDM
requests received
from a source
system into data
management or
SQL requests on the
target (or remote)
system.
450
A L P H A B E Tt
30. TDK Tokyo English: Tokyo
31. TDL Denki Electric and
Kagaku Chemicals. a Japanese
company which
manufactures
electronic materials,
electronic components,
and recording and
data-storage media
Time Software detecting
Differential account takeovers, new
Linking account fraud and e-
commerce fraud
32. TDM Time A data, voice and
Division video communications
Multiplexing technique that
multiplexes several
low-speed signals into
one high-speed
transmission channel
by allocating brief,
interleaved time
periods to each signal.
451
A L P H A B E Tt
33. TDR Time Domain Used to pinpoint
34. TE Reflectometry flaws and problems in
underground and
aerial wire, cabling,
and fiber optics.
Traffic TE is Cisco MPLS
Engineering term
35. TEC Tivoli An IBM system and
Enterprise network monitoring
Console product. TEC collects
event information
from a variety of
system and
application resources,
correlates the
information to
determine detect
problems and
performs automated
problem resolution.
452
A L P H A B E Tt
36. TEC Thermoelectric Thermoelectric
37. TED
Cooler Cooler
38. TED
39. TED Technology ED is a global set of
40. TED Entertainment conferences owned
and Design by the private non-
profit Sapling
Foundation, formed
to disseminate "ideas
worth spreading."
Tiered TED is Novell
Electronic ZENWorks term
Distribution
Torrent TED stands for
Episode Torrent Episode
Downloader Downloader
Tunnel TED is Cisco term
Endpoint
Discovery
453
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
454
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
455
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
456
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
457
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
458
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
459
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
460
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
461
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
462
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
463
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
464
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
465
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
466
A L P H A B E Tt
1. A11Y: Accessibility There are eleven
2. ADTA letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
467
A L P H A B E Tu
1. U2F Undetectable A major issue for
and information technology
Untraceable is fraud made possible
Fraud by technology and
electronic transactions,
especially crimes that
leave no trace and no
audit trail.
2. UA Upgrade A Microsoft software
Advantage license program.
3. UAC User A security technology
Account in Windows Vista that
Control reduces exposure to
attacks by running in
nonadministrative
mode, even when
logged on with an
administrative account
468
A L P H A B E Tu
3. UART universal A module composed
4. UAT asynchronous of a single integrated
receiver- circuit, which
transmitter contains both the
receiving and
transmitting circuits
required for
asynchronous serial
communication.
User Normally a suite of
Acceptance documented tests,
Test derived from a
requirements or
functional
specification and
agreed with a client,
that when
successfully
completed indicate
that a produced
product is acceptable
5. uauth user user authentication
authentication
469
A L P H A B E Tu
6. UBE unsolicited a formal term for spam.
bulk email The most common type
of UBE is UCE: bulk
email that is trying to
get the recipient to buy
some product or
service.
7. µBGA Micro Ball Next to bare die, uBGA
/ Grid Array is the smallest of the
uBGA chip-scale packaging
options.
8. UBR Undefined An economical class of
Bit Rate QoS on a moment-to-
moment basis, without
guaranteeing service
levels.
470
A L P H A B E Tu
9. UC Unified UC is a direct
10. UC2 communications result of the
11. UC&C convergence of
communications
and applications.
Differing forms
of
communications
historically have
been developed
Unified IBM portfolio
Communications based on Lotus
and Notes messaging,
Collaboration Sametime
collaboration
products and the
Eclipse client
framework
Anti-Aliasing Mashups,
consoles, APIs
471 and packaged
clients will
enable other
collaboration
services
toblended into
a mix
A L P H A B E Tu
12. UCB unit A control block in
control common storage that
block describes the
characteristics of a
particular I/O device
on the operating
system
13. UCC Uniform Data Model standard
Code
Council
14. UCCW Ultimate versatile Android
custom widgets
widget
472
A L P H A B E Tu
15. UCD Unicode Consists of a number
Character of data files listing
Database character properties
and related data along
with a documentation
file
16. UCE Unsolicited Electronic junk mail
Commercial advertising a product,
Email service, or web site,
where the recipient did
not request to receive
the message.
17. UCM Unified A Change
Change Management (CM)
Management concept implemented
by Rational Software
Corporation (acquired
by IBM)
473
A L P H A B E Tu
18. UCM Unified Cisco next-generation
Computing data center platform
System accelerates the delivery
of new services simply,
reliably, and securely
through end-to-end
provisioning and
migration support.
19. UCP Ubuntu first introduced in May
Certified 2006 is a computer
Professional based examination
about the Ubuntu
operating system. It is
administered by the
LPI foundation.
20. UCS Universal A character set using
Character 16-bit character codes,
Set also called ISO 10646.
UCS is a standard
defined by the ISO and
IEC
474