1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".
2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution
1
4. AA Automated A device,
Attendant typically attached
to a private
branch exchange
or voice mail
system, that
answers incoming
calls.
5. AAA Authentication, Also pronounced
authorization, "triple a." Refers
and accounting to a framework
for intelligently
controlling access
to computer
resources,
enforcing
policies, auditing
usage, and
providing the
information
necessary to bill
for services.
2
6. AAB All-to-all The process where
Broadcast every node
broadcasts its
information to all
other nodes.
7. AAC Advanced An audio
Audio compression format
Coding newer and more
efficient than MP3,
used internally by
iTunes and Nintendo
Wii
8. AAC ATM A device used to
Access concentrate a variety
Concentrator of services (such as
frame relay, Internet
Protocol and video)
over a single ATM
network access
connection.
3
9. AAL ATM The ATM layer
Adaptation where non-ATM
Layer data is converted to
ATM format. The
AAL serves as the
"glue" that connects
traditional packet
and frame structures
with short, fixed-
length ATM cells.
10. AARP AppleTalk Provides for the
Address dynamic
Resolution assignment of node
Protocol identifiers to nodes
within an
AppleTalk network.
4
11. AAS Auto Area Scanner
Segmentation technology which
detects and
optimizes text
and graphics on
the same page by
Epson.
12. AAT Average The average
Access Time amount of time it
takes for a storage
peripheral to
transfer data to
the CPU.
13. AAUI Apple A 14-position,
Attachment 0.050-inch-
Unit spaced ribbon
Interface contact
connector.
5
14. ABAP Advanced Powerful
Business programming
Application language created
Programming specifically for
developing SAP
applications. The
core
development tool
in SAP's R/3
system.
15. ABC Activity- An approach to
Based- understanding
Costing where and why
costs are incurred
within an
enterprise.
16. ABC Atanasoff- First digital
Berry calculating
Computer machine that
used vacuum
tubes
6
17. ABEND Abnormal A type of system
End error in which a
task or program
fails to execute
properly (i.e.,
"abnormally
ends"). The term
is also used as
the name for a
type of error
message that
indicates such a
failure has
occurred.
18. ABEND Absent By Sent in e-mail
Enforced subject lines
Net warning friends
Deprivation and others of
forced loss of
Internet access
7
19. ABI Application A set of
Binary specifications that
Interface enables an
application
written for one
target OS and
hardware platform
to run on a
different OS and
platform, where
the two hardware
platforms share
the same
processor type.
20. ABLE Agent A Java framework
Building and and toolkit for
Learning constructing and
Environment deploying
intelligent agents.
8
21. ABM Activity The use of ABC
Based principles in the
Management ongoing
management of
costs and
resources.
22. ABME Asynchronous In
Balanced communications,
Mode an operational
Extended mode in which
modulus 128
sequence
numbers are
used.
29
23. ABR Automatic The process in which
Baud Rate a receiving device
detection examines the first
character of an
incoming message to
determines its speed,
code level, and stop
bits.
24. ABR Available An ATM service
Bit Rate category. ABR
service is
conceptually similar
to that of a frame
relay network - a
minimal cell rate is
guaranteed, and
bursts can be
supported if the
network resources
allow it.
10
25. ACA Australians The Australian
Communications government
Authority body that
regulates the
nation's
communications
industries.
26. ACAP Application a standard for
Configuration accessing
Access Protocol program
configuration
11 information
from a remote
server, allowing
a user to use
and change their
configuration
from any
workstation by
reading or
writing the
values on a
central server.
Defined in RFC
2244.
27. ACC Adaptive Adaptive Cruise
Cruise Control
Control Specification(JSR-
Authorization 115) that defines
Contract for new java.security.
Containers Permission classes
to satisfy the
J2EE
authorization
model
28. ACU Association A worldwide
of C and C++ association of
Users people who are
interested in C,
C++, and related
programming
languages.
29. ACD Automatic Feature that allows
Call Delivery cellular & wireless
phones to receive
incoming calls
when roaming.
122
30. ACD Automatic Call specialized
distributor/ phone system
distribution that handles
many incoming
31. ACDI Asynchronous calls. ACDs are
Communications used for a
Device Interface variety of order-
taking functions,
13 such as calls to
help desks or
dispatching of
service
technicians.
A software
device that
permits
asynchronous
transmission, a
way of
transmitting data
in which one
character is sent
at a time, and
there may be
uneven amounts
of time between
characters.
32 ACE Access A set of identities and
Control permissions that are
Entry directly associated
with a particular
resource. Each access
control entry is
directly associated
with only one
resource. More than
one ACE can be
associated with each
resource.
33. ACE Adobe A professional who
Certified has demonstrated
Expert proficiency with one
or more Adobe
software products.
34. ACE Advanced A high-end processor
CMOS- technology
ECL introduced by Hitachi
in the 1990s.
14
35. ACE Agile Nortel SIP-
Communications based
Environment platform
acquired by
Avaya
36. ACEE Access Control In RACF, a
Environment control block
Element containing
details of the
current user,
including user
ID, current
connect
group, user
attributes, and
group
authorities.
15
37. ACF Access A family of IBM
Communications communications
Function programs that
handle tasks such as
resource sharing and
distribution of
functions. They
include ACF/Virtual
Telecommunications
Access Method
(ACF/VTAM) and
ACF/Network
Control Program
(ACF/NCP).
38. ACF2 Access Control A host-based
Facility 2 security subsystem
from CA (formerly
Computer
Associates); also
known as CA-
ACF2.
16
39. ACG Adaptive A technology that
Code enables a program
Generation that uses processor
features of a given
system model to
continue to work
correctly when the
program is moved to
another system
model that does not
have all the processor
features of the
original model.
40. ACH Automated A type of funds
Clearing transfer network that
House processes debit and
credit transactions
between accounts
from participating
financial institutions.
127
41. ACI Access Data that identifies
Control the access rights of
Information a group or
principal.
42. ACID Atomicity, Four well-
Consistency, established tests
Isolation, for verifying the
Durability integrity of
business
transactions in a
data-processing
environment.
18
43. ACK Acknow- When a modem
ledgement receives a data
packet, it sends a
signal back to the
sending modem. If
all the data is
present and correct,
it sends an ACK
signal, which acts
as a request for the
next data packet.
44. ACL Access A list of authorised
Control List users, processes or
systems.
45. ACL Activation A service that
Connectivity transmits out-of-
Link band information
between DirectTalk
and the Siemens
Hicom 300 switch.
19
46. ACL Asianet An Indian media
Communi- conglomerate
cations jointly owned by
Limited STAR TV and
Jupiter
Entertainment.
47. ACL Asynchronous Type of data
Connectionless packet (data
Link only).
48. ACM Association A worldwide
for Computing association of
Machinery computer
professionals
headquartered in
the United
States.
www.acm.org
49. ACM Address Addresss
Complete Complete
Messages Messages
20
50. ACMS Application A transaction-
Control processing monitor
and from Compaq
Manage- (now part of
ment Hewlett-Packard);
System originally a
product of Digital
Equipment, which
Compaq acquired
in 1998.
51. ACP Array A type of
Control processor used in
Processor storage systems.
52. ACPI Advanced A standard
Configu- developed by Intel,
ration and Microsoft and
Power Toshiba to
Interface improve PC power
management and
plug-and-play
capabilities.
221
53. ACR Allowed An ABR service
Cell Rate parameter, ACR is
the current rate in
cells/sec at which a
source is allowed
to send.
54. ACR Attenuation- A measure of
to-crosstalk signal quality in
ration network cabling.
55. ACRI Additional A specification that
Coding is required by an
Related encoding scheme
Information to complete its
definition, which
extends beyond the
character set and
code page
elements.
22
56. ACROSS Automated Automated
Cargo Cargo Release
Release and Operations
and Service System
Operations
Service
System
57. ACS Affiliated Xerox Corp.'s
Computer $6.4 billion
Services, acquisition of
Inc Affiliated
Computer
Services Inc.
58. ACSE Association The method
Control used in
Service International
Element Organization for
Standardization's
OSI for
establishing a
call between two
applications.
23
59. ACSLS Automated A Unix-based
Cartridge tape-library-
System sharing system
Library from Storage
Software Technology.
60. ACT Access A reusable named
Control authorization
Template pattern that you
can apply to
multiple resources.
An access control
template consists
of a list of users
and groups and
indicates, for each
user or group,
whether
permissions are
granted or denied.
24
61. ACU Abstract A measurement used
Code Unit by the z/OS XL
C/C++ compiler for
judging the size of a
function. The number
of ACUs that
comprise a function
is proportional to its
size and complexity.
62. AD Active The directory service
Directory portion of the
Windows 2000
operating system. AD
manages the
identities and
relationships of the
distributed resources
that make up a
network environment.
225
63. AD Adminis- Defined in RFC
trative 1136. On the
Domainn Internet, a group
of networks,
hosts, and
routers operated
by the same
organization.
64. ADAPT Architecture, Architecture,
Design, Design,
Analysis and Analysis and
Planning Planning Tool.
Tool
65. ADB Apple Port on the
Desktop Bus Macintosh for a
keyboard, a
mouse, and
other
peripherals.
26
66. ADC Advanced A peer-to-peer file-
Direct sharing protocol,
Connect based on the topology
of the Direct Connect
(DC) protocol.
67. ADC Analog to Often referred to
Digital A/D, the analog to
Converter digital converter is an
electronic device that
transforms the analog
signal to digital
signal, helping
interconnecting the
two kinds of
technology/gear.
27
68. ADC Automated The automated
Data conversion of
Collection disparate types of
information into
computer records.
ADC devices and
technologies
include bar code
systems, optical
character
recognition and
speech
recognition.
69. ADCCP Advanced A bit-oriented,
Data ANSI-standard
Communi- communications
cations link-layer
Control protocol.
Procedures
228
70. ADDM Application BMC's
Discovery application
and
Dependency
Mapping
29
1. b Bit The number of bits
1. ADJ Adjectva Examupseleddteofirneiptiroensent a
ExpiBreyte ASaddwacwkhwdaaarwdakcddtsesarc. a
: ExamPpelresodneafilncitoiomnputers
akjdkaabsaytaewidskuaskuwajldlys 8
22.. BEXP kasjdbits.
3. B Bearer A wire used in
Channel Channel ISDN service that
can carry up to 64
Kbps of data when
operating at full
capacity. It is a
clear channel "pipe"
that carries voice,
data, or video over
ISDN. The BRI
service offered to
home users has two
B channels.
320
4. B2B Business- B2B is also commonly
1. ADJ Atod-jectva Euxsaemdpales daenfianditjieocntive to
Business ASadbddeewasiwkctwrdBibaa2wdeBkdadsnmsaycaaarkcetitvinitgy,,
:
Expire Esxaalmesp,leordeef-icnoitmiomn erce,
2. EXP akthjdaktaoscacauwrsdkbaektwwjedesn
kabsujdsinesses and other
businesses
5. B2C Business- B2C describes
to- activities of
Consumer commercial
organizations serving
the end consumer with
products and/or
services. It is usually
applied exclusively to
electronic commerce.
321
6. B2E Business- The use and leverage
1. ADJ Atdoj-ectva Exaomfpele-bduesfiinneitsiosn
: Employee ASaddwIaanwkptwpderraaonwdaekdctdshtsaeeccsahannodlogies
2. EXP Expire Exatmopdleeldiveefirnaition
akjdckoamsaparwehdeknaskiwvejdsset
kasjodf services to an
enterprise's
employees and their
managers. The full
term is sometimes
presented as
"business-to-
enterprise."
7. B8ZS Binary 8ZS is a technique in
Eight Zero T1 that modifies the
Suppression AMI encoding to
ensure minimum
322 pulse density
without altering
customer data. When
eight "zeros" in a
row are detected, a
pattern with
intentional bipolar
violations is
8. B- Behavioral Bitdefender
1. AHDAJVWAdjeHctevuaristiEc xampleTdeecfihnnitoiolongy
: VAniratulyazleASradidnwawkwdaawdkddssaca
2. EXP ExpiErenvironEmxeanmtsple definition
9. BAA akjdkasa awdkakwjds
Blanket kasjd Signed by
Authorization interconnectors
Agreement guaranteeing
that they have
authority of the
end user
customer to
request CPNI
and place
service orders
on the
customer’s
behalf.
10. BAC BroadCast Business
Agent Objects
broadcast agent
323
11. BACNET Building A
1. ADJ AdjectvAautomEaxtaimonple defcinoimtiomnunications
: NanedtwCoASorandkdtwraowklwdaawdkddsbpsarucoialtdoicnogl for
2. EXP Expire protocEoxlample defainuittoiomnation and
akjdkasa awdckoanktrwojlds
networks.
kasjd
12. BAF Bellcore AMA Bellcore (Now
Format Telcordia
Technologies)
AMA Format.
13. BAI Bank File / report
Administration format used in
Institute financial
services
industry
324
14. ADJ Business A Gartner term that
1. A:DJ AAdjcetcitvviaty Exadmefpinleedsetfhienictioonncept of
1. A: DJ AEAMxddpjjeoiercnectivttvaoaringEAASSEaaAESxxddddaabapawwxdaammcdurawwkkocasmppwwevikwddllnspieeaaaawddsewwddlddesiaakktneeddsdwoddffgsskpiissedaacnndreccfrsiieisriaattantfaiicioooilcat-nnraitmoilmnanece
1. :ADJ EaakkkaaExjjskatieddxjnhmjdfkkadfdeaamepkissscclaaapeptasileaatdaveoewweearddfnddswienkkeatfdisnaaoitsnkkkidoiwwiaomtnkifjjoddpwnssrjodvse
EExxppiriree
:
2. EXP
22.. EEXXPP
kaksabjsdujsdiness operations.
At its broadest level,
BAM is the
convergence of
operational business
intelligence and real-
time application
integration.
325
15. BAN Body An emerging field of
1. ADJ AdAjercetava Exatemcphlneodleofginyittihoant has
Networks ASaddwrtahewkvewodplaaouwdttkeidodnssntaiicazaleto
:
Expire Exahmeaplltehdceafrieniatniodn
2. EXP akjdpkaathsabraewadkkinagkwjds
kasajdpplications in
sports,
communications and
security.
16. BAPI Business A set of documented,
Appli- server-side interfaces
cation to one or more R/3
Program- processes, from SAP.
ming BAPI packages
Interface multiple internal
functions to enable
326 programmatic access
to such higher-order
tasks as checking
customer numbers,
providing product
descriptions,
selecting products,
creating quotations.
17. Bar Broken The unit of
1. AFDilJe AdAjerccthviave Exadmepplloeydmefeinnittitoonthe
ASaddabwarbwkoawkdreaafrwdi;kldeads.lsasIcotackonnotwainnsas
: File
2. EXP Exaamnyplneudmefbineirtioofn
Expire akjcdokmaspaialewddkmaekswsajdgse
kasfjldows (.cmf),
message sets
(.dictionary), and a
single deployment
descriptor.
18. Basel Base A regulatory
II Capital framework for the
Accord banking sector,
developed by the
Basel Committee on
Banking Supervision.
This committee
meets every three
months at the Bank
for International
Settlements in Basel,
Switzerland.
326
19. BASH Bourne- An interactive
1. ADJ AdjeActgvaain ExamUplNeIdXefsinhietilol nbased
: SHell ASaddwawkoBwndoaautwdhrkneddestsarsachadeiltli,obnualt
2. EXP Expire Examwpliethdienfcinrietaiosned
akjdkfausnacatwiodnkaalkitwy.jds
kasjdBASH is the shell,
or command
language
interpreter, that will
appear in the GNU
operating system
20. BASIC Beginners A high-level
All- algebraic
purpose programming
Symbolic language developed
Instruction at Dartmouth
Code College in the
1960s and widely
taught to beginning
programmers. It is
simple to use but
lacks speed.
327
21. BAT Baby A type of system
1. ADJ AAdjdecvtavnaced Exambpolaerddefinition
1. A: DJ AATddjejeeccchtvtnvaoalogyEASaEAxddawxdamawkmpwkdlpeaawwdldeakedddfskiseandcfiisatnioitnion
1. :ADJ ASEaSxddaawamdwkIapnwwdleWaadwddakiedwndfsdisdanocsiwataicosan, a file
ExBpaitrceh EaakkkaEaxjjskaddxjmjdkkadicwaamnpkosshlanaap.eoBstlaadaaseAwweeiandfTddnwisenkkafadaiamitnnkkkilodwweiiatsnkijjtetoddhwnonssadjftdss
:
222. . EBXAPT EExxppiriree
22.. EEXXPP
kaksajsdjcdommands
23. BAT Baidu, China's top three
Alibaba, Internet companies,
Tencent 百度、腾讯、阿里
巴巴 in Chinese
24. BBC British The British
Broadcasting Broadcasting
Corporation Corporation (BBC)
Broadband is a British public
Bearer service broadcaster,
Capability headquartered at
Broadcasting
House in the City
of Westminster,
London
328
25. BBCs Buffer-to- Allow data
1. ADJ AdBjeucftvfear Exacmomplemduenfiincaittiioonn in a
: Credits ASaddwFwaiwkhbwedrreaaewdCktdhhdseasarnceanaerleSlAonNg
2. EXP Expire Exasmpapnles doeffifnibiteiornoptic
akjdckaabslae.aUwndkleaskswsjtdosrage
kasdjdistance extension is
employed, latency
imposes a distance
limitation of a few
kilometers between
the source and the
destination in the
network.
26. BBN Bolt, The last names of the
Beranek, three founders of
Newman BBN Technologies
and the original
name of the
company.
329