The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by afrizalharis302, 2022-12-07 04:19:23

Kamus A-B_merged

Kamus A-B_merged

27. BBP Business-to- A catalog-based
1. ADJ ABdjuescitnveass Examprpolecudreefmineitniotn

: ProcuremenAStaddwapwkrwoddaawdukcddtssafrcoam SAP.

228. . EBXBPS EBxpuilrleetin ExamApcleomdepfiuntietiroizned
Board akjdkmaeseatainwgdkaankdwjds
System kasjdannouncement

system that allows
people to carry on
discussions, upload
and download files,
and make
announcements
without the people
being connected to
the computer at the
same time.

329


29. BC4J Business Java 2 platform,
1. ADJ AdCjeocmtvpaonenEtxamEnptleerdperfiisneitEiodnition
1. A: DJ AAdFdjjeoecrctvJtvaaava EAASSEaaESAxxddddaaawwxdaamm(tddawhwkkJeampp2awwvwkddlltEpeeeaaaawdhEwwddllddoeaaekk)eeddwdplddffpssfkeiisserdaasnnrdaccfssiimisaattaniiqcooeiuatnnwiioconkrlky
1. :ADJ Expire EaakkkaEaxjjskaddxjmjcpadkkadpoeaampkrnpsslafaapeslositlcaadrarewwmaueadtfcddiawietonkknfhndiaaictinkkskiegowwiahtnJkijj2-oddwEnssjEds

:
2. EXP

22.. EEXXPP EExxppiriree

kaksajsfdojdllowing industry-

standard design

patterns.

30. BCB Buffer An opaque cache
Control manager structure
Block that is used to
maintain state as a
file system pins and
releases data (for
example, its volume
structure) in the
cache.

420


31. BCC Blind When you send an e-
1. ADJ ACdjaercbtvoan Exmamapilletodeofninlyitioonne
1. A: DJ AACddjojeepcctyvtvaa EAASSEaaAESxxddddtrpaaawwxhdeaammedacewwkkramippsww"pwkddollTpeeaaaaiwndewwddlodd,enaakk:eeddwdyt"ddff'ssoskiissedaafnnudiaccfsiieisaadttatnliiycddooiaptnn.rieeWosntshhieenn
1. :ADJ EaakkkaEaxjjsptykaddxjoomejdkkadrumaampskssolsaoaapeensrlaandae,ewwedyatdfddhowiaenkkaufdimaanithnkkkioeawwiatnsnvkijjsoeddewanssgtjhdees
Expire kaksoajpsdjtdion to enter
: EExxppiriree
2. EXP addresses in the "Cc:"
and "Bcc:" fields.
22.. EEXXPP

32. BCC Block A control character
Check added to a block in
Character character oriented
protocols (such as
Bisync) used for
determining if the
block was received in
error

421


33. BCD Binary- A format for
1. ADJ AdCjoecdtevda Exarmepprleesdeenftiinnigtiodnecimal
1. A: DJ AAdDdjjeeeccctivtmvaaal EAASSEaaEASxxddddaaawwnwrxdaammeduawwkkhpammppwwirwkddcllepeebaaaawhsdwwddleddeeaakkereenddwdsaddffsstkciisse(edaanndhidccfsniiisaattandtiibceooiiyatggnnieioftornsius)rin
1. :ADJ EaakkkaaExjjskaddnbexjmjdxkkiiadtbaampskbssmla(aapelnseplaada)eylww.eebadfS,ddbwienetkklfhdeieaaitenkkkiobowwianrtynkiujjtoddwemnss.jbFdesorr
Expire kaksa3jsd7jd5 would be
: EExxppiriree
2. EXP represented as: 0011
0111 0101.
22.. EEXXPP

34. BCE Bell Canada's Largest
Canada Communications
Enterprises Company
http://www.bce.ca

422


35. BCEL Byte Code Library intended to
1. ADJ AdjEenctgvianeeriEnxgamgpilveeduefsienristioan
1. A: DJ AAddjLjeeicbctvtrvaaary EAASSEaaESAxxddddaaawwxdaammdawwkkaacpmppwwwkonddollpeeaaaawnsdwwddllsvddeaayikkeeeddbwdzddnffssiekiissedaalinn,dieccfstiicisnaattyaniirtcooeitatnnoaioten,
1. :ADJ Expire EaakkkaEaxjjskaddxjmjdkkad(faaampkbinssllaaaipeednsslaadaaem.wweradfyaddwie)nnkkfdiiJaaitpankkkiuovwwiatnlakiajjoddwtcenssljadsss

:
2. EXP

22.. EEXXPP EExxppiriree

kaksajsdjd

36. BCI Business The BCI promotes

Continuity the highest

Institute standards of

professional

competence and

commercial ethics

in the provision,

maintenance and

services for

Business

Continuity

Management

(BCM).

423


37. BCM Business Automates the
1. ADJ AdjecCtvoantinuEtxitaymplecdoelflianbiotiroantive
1. A: DJ AEAxddpjjeiercMectvtvaaanageEAASSEmaaSAExxddddaaaewwxdaammdnawwkkatmppwwwkddllpeeaaaawdrawwwddlddeenaakkreesddwdaddieffsstkliisseadaaiynndnccfrssiiiscgaattainiishcooni,atnnaeinoednded
1. :ADJ EaakkkaaExjjskaddxjmjdkkadaampksslaaapestfrlaaodaeoewwecracdfoddcwrievnkkerfdiieaaaittnrkktkiieoycwwiatnakaipjjloddwlnassjnds

:
2. EXP

22.. EEXXPP EExxppiriree

kaksajsdjd business and IT

operations that

can be

published and

distributed to

the recovery

teams.

38. BCOCA Bar Code An architected
Object collection of
Content constructs used
Architecture to interchange
and present bar
code data.

424


39. BCP Best Means that a certain
1. ADJ ACdjuercrtevnat Exmamanpnleedr eoffinpitrioocneeding
1. A: DJ AAPddrjjeaecccttvtivcaae EAASSEaaSEAxxddilddaaawwxosdaammdagwwkkiamnppiwwcwkddllgpaeeaaaawdlewwddlddeaankkceeddwdddehffsskiirssoedaannadccfisiilcisaattaniitecoohi.atnneiomnost
1. :ADJ Expire
EEPBxxprupoilrigkreerCamopyEaakkkaEaxjjsAcpkaddxjoamjdkkadrppaamptkyrssloaaapedosglaadaaferwwetadaadfmddawibenkktafadiaauistbnkkkiseoawwieastnsdkijjoeoddwtsrnssojidns
:

2. EXP
40. BCP
22.. EEXXPP

kaksSajsydjbdase and Microsoft

SQL Server

environments.

41. BCP Business A broad approach to
Continuity planning for the
Planning recovery of an
enterprise's entire
business process in
event of a massive
disruption caused by
catastrophic event.

425


42. BCS Basic A broad approach to
1. ADJ AdjeCcotvnatent Examplpalnendinefginfiotirotnhe
1. A: DJ AAddjjeSecectrvtvvaiaces EAASSEaaESAxxddddaaawwxdaammrebdawewkknuamppcwwtwksddlloeipeeaaaawrnvdwwddlpddeeeaakkreeddswrdddiffsysskiissedaaennpdoccfs'iisrisaafttanoiiceooaicatnnnneitosisrnein
1. :ADJ Expire EaakkkaEaxjjskaddxjmcdejdkkadaviaampkstessarlaaanpeusstltpaadaerowwteoiadffoddpwieankkhfdiaaiimtccnkkkiaowwiaaeutnskivjjsosddweeinssvndjdet.bsy

: EExxppiriree
2. EXP

22.. EEXXPP

kaksajsdjd

43. BCUG Bilateral In data

Closed communication, two

User users who have

Group bilaterally agreed to

communicate with

each other, but not

with other users.

426


44. BCV Business EMC's name for the
1. ADJ AdCjoecnttvinauancEexamdpatlea dveofliunmitieosn
1. A: DJ AAdVdjjeoeclcutvtmvaae EAASSEaaASExxddddaaawwxdaammdacSTwwkkamrppywwiwkeddmllmpeeaaaaawdtwwddelmddeeaaFkkeedddwdddeiffsskniisstbedaannrddccfysiiiisxeaattaniiircootiasftnnieoanture.
1. :ADJ Expire EaakkkaaExjjskaddxjmjdkkaBatdhaamcpkCasstlaaaipetVvslaadaeesrwweeaddafddwiraesnkketfediaaaitpcnkkkiovaowwiatrnopkiajjoliddwtuenessmsjldyoesfs

: EExxppiriree
2. EXP

22.. EEXXPP

kaksajsdajdddressed from the

source volume.

45. BCX Basic To C An open source and
Translator free software,
translates BASIC to
C/C++ for
compilation on
various Win32
compilers. It is a
small command line
tool that takes a
BASIC source code
file and outputs a
C/C++ source code
file.

427


46. BD Blu-ray This is an optical
1. ADJ AdDjeiscktva Examdipslcefdoerfminaittiothnat was
1. A: DJ Adjectva EAASSEaaEASxxddddaaawwxdaammdradawwkkeneamppcwwdvwkdllopeeeaaaawrrdwwddlledddoeaakkweeddiwdpddnffsskeriissgedaanniddccft,siiiisaattaptnniiocoolgiaatnneiyoonbfnaaHbclDke,
1. :ADJ Adjectva EaakkkaEaxjjskaddxjmjvtsdkkadetiaamopckdsshlraeaapeansolgaadaoe.wweelTadofddcwihegnkkafiydipaasitnkkkiahowwiactankiijjstoddwynassjfdasr
kaksajsgdjrdeater than that of
: Expire
2. EXP EExxppiriree traditional DVDs.

22.. EEXXPP

47. BDC Backup Secondary to the
Domain PDC, provides
Controller user/computer
domain
authentication.

48. BDF Building The location in a
Distribution building where
Frame equipment attaches a
number of cables
from the LDF's.

428


49. BECN Backward A bit sent by a
1. ADJ AdjEecxtpvlaicit Examfprlaemdeefrinelitaiyon

: NCoontigfiecsatitioASonadndwawkanwdneaatiwwdnkdotdesrsrakfcataocendoetivfiyce

2. EXP Expire Exam(pDleTdEe)fitnhitaiton
akjdkacsoanagwesdtkioaknwjds
kasjd avoidance

procedures should

be initiated by the

sending device.

50. BEEP Block A framework for
Extensible creating network
Exchange application
Protocol protocols. It is
intended to
abstract-out the
common features
that have
traditionally been
duplicated in each
protocol
implementation

429


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

50


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

5


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

53


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

54


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

55


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

56


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

57


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

58


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

59


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

60


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

61


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

62


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

63


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

64


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

65


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

66


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

67


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

68


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

69


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

70


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

71


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

72


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

73


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. A2A Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

74


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. ADTA Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

75


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. ADTA Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

76


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. ADTA Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

77


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. ADTA Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

78


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. ADTA Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

79


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. ADTA Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

80


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. ADTA Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

81


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. ADTA Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

82


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. ADTA Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

83


1. A11Y: Accessibility There are eleven
letters between the
"a" and the "y".

2. ADTA Application- An approach to
to- enterprise
Application application
integration that
provides visibility
into internal
systems, so that
these systems can
share information
or business
processes.

3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing
a high-resolution
signal at a lower
resolution

84


Click to View FlipBook Version