1. A11Y: Accessibility There are eleven
2. A2A letters between the "a"
and the "y".
Application- An approach to
to- enterprise application
Application integration that
provides visibility into
internal systems, so
that these systems can
share information or
business processes.
3. AA Anti- The technique of
Aliasing minimizing the
distortion artifacts
known as aliasing
when representing a
high-resolution signal
at a lower resolution
1
1
4. AA Automated A device, typically
5. AAA Attendant attached to a private
branch exchange or
voice mail system,
that answers
incoming calls.
Authentication, Also pronounced
authorization, "triple a." Refers to a
and accounting framework for
intelligently
controlling access to
computer resources,
enforcing policies,
auditing usage, and
providing the
information
necessary to bill for
services.
2
2
6. AAB All-to-all The process where
7. AAC Broadcast every node broadcasts
8. AAC its information to all
other nodes.
Advanced An audio compression
Audio format newer and more
Coding efficient than MP3,
used internally by
iTunes and Nintendo
Wii
ATM A device used to
Access concentrate a variety of
Concentrator services (such as frame
relay, Internet Protocol
and video) over a single
ATM network access
connection.
3
3
9. AAL ATM The ATM layer where
10. AARP Adaptation non-ATM data is
Layer converted to ATM
format. The AAL
serves as the "glue"
that connects
traditional packet and
frame structures with
short, fixed-length
ATM cells.
AppleTalk Provides for the
Address dynamic assignment of
Resolution node identifiers to
Protocol nodes within an
AppleTalk network.
4
4
11. AAS Auto Area Scanner technology
12. AAT Segmentation which detects and
13. AAUI optimizes text and
graphics on the same
page by Epson.
Average The average amount
Access Time of time it takes for a
storage peripheral to
transfer data to the
CPU.
Apple A 14-position, 0.050-
Attachment inch-spaced ribbon
Unit contact connector.
Interface
5
5
14. ABAP Advanced Powerful
Business programming
15. ABC Application language created
16. ABC Programming specifically for
developing SAP
applications. The
core development
tool in SAP's R/3
system.
Activity- An approach to
Based- understanding where
Costing and why costs are
incurred within an
enterprise.
Atanasoff- First digital
Berry calculating machine
Computer that used vacuum
tubes
6
6
17. ABEND Abnormal A type of system
18. ABEND End error in which a task
or program fails to
execute properly
(i.e., "abnormally
ends"). The term is
also used as the
name for a type of
error message that
indicates such a
failure has occurred.
Absent By Sent in e-mail
Enforced subject lines warning
Net friends and others of
Deprivation forced loss of
Internet access
7
7
19. ABI Application A set of specifications
20. ABLE Binary that enables an
Interface application written for
one target OS and
hardware platform to
run on a different OS
and platform, where
the two hardware
platforms share the
same processor type.
Agent A Java framework
Building and and toolkit for
Learning constructing and
Environment deploying intelligent
agents.
8
8
21. ABM Activity The use of ABC
22. ABME Based principles in the
Management ongoing
management of
costs and resources.
Asynchronous In communications,
Balanced an operational
Mode mode in which
Extended modulus 128
sequence numbers
are used.
9
29
23. ABR Automatic The process in which a
24. ABR Baud Rate receiving device
detection examines the first
character of an
incoming message to
determines its speed,
code level, and stop bits.
Available An ATM service
Bit Rate category. ABR service
is conceptually similar
to that of a frame relay
network - a minimal cell
rate is guaranteed, and
bursts can be supported
if the network resources
allow it.
10
1
25. ACA Australians The Australian
26. ACAP Communications government body
Authority that regulates the
nation's
communications
industries.
Application a standard for
Configuration accessing
Access Protocol program
configuration
information from
a remote server,
allowing a user to
use and change
their
configuration
from any
workstation by
reading or writing
the values on a
central server.
Defined in RFC
2244.
11
1
27. ACC Adaptive Adaptive Cruise
28. ACU Cruise Control
29. ACD Control Specification(JSR-
Authorization 115) that defines new
Contract for java.security.
Containers Permission classes to
satisfy the J2EE
authorization model
Association A worldwide
of C and C++ association of people
Users who are interested in
C, C++, and related
programming
languages.
Automatic Feature that allows
Call Delivery cellular & wireless
phones to receive
incoming calls when
roaming.
12
21
30. ACD Automatic Call specialized phone
31. ACDI distributor/ system that
distribution handles many
incoming calls.
ACDs are used for
a variety of order-
taking functions,
such as calls to
help desks or
dispatching of
service
technicians.
Asynchronous A software device
Communications that permits
Device Interface asynchronous
transmission, a
way of
transmitting data
in which one
character is sent at
a time, and there
may be uneven
amounts of time
between
characters.
13
1
32 ACE Access A set of identities and
Control permissions that are
33. ACE Entry directly associated with
34. ACE a particular resource.
Each access control
entry is directly
associated with only one
resource. More than one
ACE can be associated
with each resource.
Adobe A professional who has
Certified demonstrated
Expert proficiency with one or
more Adobe software
products.
Advanced A high-end processor
CMOS- technology introduced
ECL by Hitachi in the 1990s.
14
1
35. ACE Agile Nortel SIP-based
36. ACEE
Communications platform acquired
Environment by Avaya
Access Control In RACF, a
Environment control block
Element containing details
of the current
user, including
user ID, current
connect group,
user attributes,
and group
authorities.
15
1
37. ACF Access A family of IBM
Communications communications
Function programs that handle
tasks such as resource
38. ACF2 Access Control sharing and
Facility 2 distribution of
functions. They
include ACF/Virtual
Telecommunications
Access Method
(ACF/VTAM) and
ACF/Network
Control Program
(ACF/NCP).
A host-based security
subsystem from CA
(formerly Computer
Associates); also
known as CA-ACF2.
16
1
39. ACG Adaptive A technology that
40. ACH Code enables a program that
Generation uses processor features
of a given system model
to continue to work
correctly when the
program is moved to
another system model
that does not have all
the processor features of
the original model.
Automated A type of funds transfer
Clearing network that processes
House debit and credit
transactions between
accounts from
participating financial
institutions.
17
21
41. ACI Access Data that identifies the
42. ACID
Control access rights of a
Information group or principal.
Atomicity, Four well-established
Consistency, tests for verifying the
Isolation, integrity of business
Durability transactions in a data-
processing
environment.
18
1
43. ACK Acknow- When a modem
ledgement receives a data packet,
44. ACL it sends a signal back to
45. ACL the sending modem. If
all the data is present
and correct, it sends an
ACK signal, which acts
as a request for the next
data packet.
Access A list of authorised
Control List users, processes or
systems.
Activation A service that transmits
Connectivity out-of-band
Link information between
DirectTalk and the
Siemens Hicom 300
switch.
19
1
46. ACL Asianet An Indian media
47. ACL Communi- conglomerate jointly
48. ACM cations owned by STAR TV
Limited and Jupiter
49. ACM Entertainment.
Asynchronous Type of data packet
Connectionless (data only).
Link
Association A worldwide
for Computing association of
Machinery computer
professionals
headquartered in the
United States.
www.acm.org
Address Addresss Complete
Complete Messages
Messages
20
20
50. ACMS Application A transaction-
Control and processing monitor
51. ACP Manage- from Compaq (now
52. ACPI ment part of Hewlett-
System Packard); originally a
product of Digital
Equipment, which
Compaq acquired in
1998.
Array A type of processor
Control used in storage
Processor systems.
Advanced A standard developed
Configu- by Intel, Microsoft
ration and and Toshiba to
Power improve PC power
Interface management and plug-
and-play capabilities.
21
22
563. ACROSS AlloAwuetdomatedAnAAuBtoRmsaetrevdicCeargo
CellCRaargteo parRameletaesre, AanCdR is the
Release curOrepnetrraattieonins Scelrlvsi/csec
and at wShyiscthema source is
Operations allowed to send.
Service
54. ACR AtteSnyusatteimon- A measure of signal
to-crosstalk quality in network
57. ACS ratioAnffiliated cabXlienrgo.x Corp.'s $6.4
Computer billion acquisition
55. ACRI AddSiteirovniacles, A sopfeAcifficilaiatitoend that is
CodIinncg reqCuiormedpbuytear nServices
Related encIondci.ng scheme to
Information complete its definition,
58. ACSE AssociationwhTichheemxteetnhdosdbuesyeodnidn
Control theIcnhtearrnaactieornsaelt and
Service codOerpgaagneizealteiomnenfotsr.
Element Standardization's
OSI for establishing
a call between two
applications.
223
1. b Bit The number of bits
1. ADJ Adjectva Exaumspeldetdoerfeinpirteisoennt a
Adwckhwaraadcktedrs.
: Sadawdawdsaca
2. B Byte Personal computers a
Exabmypteleisdeufsiunaitliloyn8 bits.
2. EXP Expire
akjdkasa awdkakwjds
3. B Bearer kasjAd wire used in ISDN
Channel Channel service that can carry
up to 64 Kbps of data
when operating at full
capacity. It is a clear
channel "pipe" that
carries voice, data, or
video over ISDN. The
BRI service offered to
home users has two B
channels.
22
23
4. B2B Business- B2B is also commonly
1. ADJ Atod-jBeuctsvinaess Euxsaemdpalse adnefaidnjieticotnive to
: Addewsckrwibaedakndys activity, be
SaitdBaw2Bdamwadrskaectaing, sales,
2. EXP
Expire or e-commerce, that
Eoxcacmuprslebdeetwfieneitnion
akbjudskianseassaews dakndakowthjders
kabsujsdinesses
5. B2C Business- B2C describes activities
to- of commercial
Consumer organizations serving the
end consumer with
products and/or services.
It is usually applied
exclusively to electronic
commerce.
23
23
6. B2E Business- The use and leverage of
1. ADJ Atod-jectva Exea-mbupslienedsesfianpitpiroonaches
Employee AdawndkwInatderkndest
: Satdeacwhndoalwogdiseasctao deliver a
Expire
2. EXP comprehensive set of
Exsaemrvpicleesdteofiannition
akejdnktearspariaswe'ds keamkpwlojdysees
kaasnjdd their managers. The
full term is sometimes
presented as "business-
to-enterprise."
7. B8ZS Binary 8ZS is a technique in T1
Eight Zero that modifies the AMI
Suppression encoding to ensure
minimum pulse density
without altering
customer data. When
eight "zeros" in a row
are detected, a pattern
with intentional bipolar
violations is substituted.
24
23
8. B- Behavioral Bitdefender
1. AHDAJVW AdjHecetuvraistic ExampTleecdhenfionliotgioyn
: Analyzer Aindwkwadkds
Virtual Sadawdawdsaca
Environments
2. EXP Expire Example definition
9. BAA Blanket akjdkasSaiganweddkbaykwjds
Authorizaktiaosnjd interconnectors
Agreement guaranteeing that
they have authority
of the end user
customer to request
CPNI and place
service orders on
the customer’s
behalf.
10. BAC BroadCast Business Objects
Agent broadcast agent
25
23
11. BACNET Building A
1. ADJ AdjecAtvuatomaEtixoanmple dceofminmitiuonnications
: and ConAtrdowl kwadpkrdostocol for
NetworSkadawdawbdusialdciang
protocol automation and
2. EXP Expire Example dceofnintriotilon
akjdkasa anwedtwkoakrkwsj.ds
kasjd
12. BAF Bellcore AMA Bellcore (Now
Format Telcordia
Technologies)
AMA Format.
13. BAI Bank File / report
Administration format used in
Institute financial
services
industry
26
23
14. ADJ Business A Gartner term that
1. A: DJ AAdcjeticvtivtay Exdaemfipnleesdtheefincoitniocnept of
1. A: DJ EAASSEaaSAExxddapbiddaanawwxcdruaammddocaswwkkieavimppcwwnswkddialldsepeeaaaawtdsiowwddltnddsoeaarkkgeeddswdpddcffsserktriissedaaoennridcctfafsiiiiiosaattlacmnii-rcaootmiiplatnnmiraooennvcee
1. :ADJ AAMddjojeenccittvtovaraing
Expire
:
2. EXP EExxppiriree EaakkkkaaaEkxibetjjsskaahtddxfjjusmjsddefkkasdejbaaimdspcknrssptloaeaapieeavssleaaddsaeedwweneoadsfeaddpwitesnnkkelsfddireaaitaonvkkkitofewwiiatonlki,jjnoddwBsnss.AjdAMst
22.. EEXXPP
is the convergence of
operational business
intelligence and real-
time application
integration.
27
23
15. BAN Body Area An emerging field of
1. ADJ ANdjeetcwtvoarks Extaemchpnloeldoegfyintihtaiot nhas the
: Adpwoktewntaidakl dtos
Sardeavwodluatwiodnsiazceahealthcare
2. EXP
Expire and pathbreaking
Exaapmpplilceadtieofnisniitniosnports,
akjcdokmasmauanwicdaktiaoknws jadnsd
kasjedcurity.
16. BAPI Business A set of documented,
Appli- server-side interfaces to
cation one or more R/3
Program- processes, from SAP.
ming BAPI packages multiple
Interface internal functions to
enable programmatic
access to such higher-
order tasks as checking
customer numbers,
providing product
descriptions, selecting
products, creating
quotations.
28
22
17. Bar Broken The unit of deployment
1. AFDileJ AAdjrecchtivvae Extaomthpelebdroekfienri;tiaolsno
Adkwnokwwnadaksdas bar file. It
: File Sacdoanwtadianws dasnaycanumber of
2. EXP
Expire compiled message flows
Ex(a.cmmpfl)e, dmeefsinsaitgioensets
ak(jd.dkiacstiaonawardyk),aaknwdjdas
kasijndgle deployment
descriptor.
18. Basel Base A regulatory framework
II Capital for the banking sector,
Accord developed by the Basel
Committee on Banking
Supervision. This
committee meets every
three months at the
Bank for International
Settlements in Basel,
Switzerland.
29
22
19. BASH Bourne- An interactive UNIX
1. ADJ AdjAecgtavian Examshpellel bdaesfeinditoionnthe
: SHell Adwtrkawdiatdiokndasl Bourne
Sadaswhedlal,wbdustawcaith
2. EXP Expire increased
Examfupnlcetidoenfailniittyi.oBn ASH
akjdiksatshaeaswhedlkl,aokrwjds
kasjdcommand language
interpreter, that will
appear in the GNU
operating system
20. BASIC Beginners A high-level algebraic
All- programming
purpose language developed at
Symbolic Dartmouth College in
Instruction the 1960s and widely
Code taught to beginning
programmers. It is
simple to use but lacks
speed.
30
22
21. BAT Baby A type of system board
1. ADJ AAddjevcatnvcaed Example definition
1. A: DJ AEdwxakmwpadlekdsefinition
1. :ADJ AATddejjecechctnvtovalaogy ESaAxdadamwpkdleawwdaeddfskiandcisation
22. :BAT
2. EXP Batch ASEaSxddaawIwamndwkhapWwowdlseaaiednwddadnkedwoadfsmwisdancseiat,aiecaonanfdislein
22.. EEXXPP Expire
23. BAT EExxppiriree EaakkkaEaxjjskaddxa.jmBjdkkadlaaAmipkssslTtaaapesolaaadaefwwnecaddfddowienkkmtfhdiaaitmankkkitowwiaatcnknijjoodddwnnssstjadisns
Baidu, kaksaCjsdhjdina's top three
Alibaba, Internet companies, 百
Tencent 度、腾讯、阿里巴巴
in Chinese
24. BBC British The British
Broadcasting Broadcasting
Corporation Corporation (BBC) is a
Broadband British public service
Bearer broadcaster,
Capability headquartered at
Broadcasting House in
the City of
Westminster, London
31
23
25. BBCs Buffer-to- Allow data
1. ADJ AdBjuefcftevra Excaommpmleudneifciantiitoinonin a
: Credits AdFwibkrweaCdhkadnsnel SAN
Sadwahwedreawthdesraecaare long
2. EXP
Expire spans of fiber optic
Excaambplele. Udenfliensistisotnorage
akjddikstaasnacaewedxkteankswiojndsis
kasejmd ployed, latency
imposes a distance
limitation of a few
kilometers between the
source and the
destination in the
network.
26. BBN Bolt, The last names of the
Beranek, three founders of BBN
Newman Technologies and the
original name of the
company.
32
23
27. BBP Business-to- A catalog-based
1. ADJ ABdujescintveass Exapmropclueredmefeinntitpioronduct
ProcurementAdfwrokmwaSdAkPds.
:
Sadawdawdsaca
28. BBS
2. EXP Bulletin A computerized
EBxopairred Exammepetliendgeafnindition
akjadnknaosaunacwedmkeanktwsyjdsstem
System kastjhdat allows people to
carry on discussions,
upload and download
files, and make
announcements without
the people being
connected to the
computer at the same
time.
33
23
29. BC4J Business Java 2 platform,
1. ADJ ACdjoemctpvoanent ExEamntperleprdiseefiEnidtiitoinon
1. A: DJ EAASSEaaESAxxdd(phqddaaawwxJdeueaammd2awrlwkkiaEpmfcppwwowkddksEllpreeaaaalwd)mdywwddlddeeaafkkacveerddwdddnaoeffsskmiicssnledaannodesccfseiiptisaattaJwrniie2ucooirocEatnnsirtEokhntihgaht-
1. :ADJ AAFddojjerecJctavtvvaaa
Expire
:
2. EXP EExxppiriree EaakkkkaakaExjjssdiakaaddxnjjpemsjddkkaddpsjaamudipklgssislacaanpetarslaaydptaeiww-eaosadtfnddttwieaenskknfrdiaafintdnokkkisaolwwia.rltnokdijjoddwwnssijndgs
22.. EEXXPP
Buffer An opaque cache
30. BCB Control manager structure that
Block is used to maintain state
as a file system pins and
releases data (for
example, its volume
structure) in the cache.
34
24
31. BCC Blind When you send an e-
1. ADJ ACdajerbctovna Exmamailptloe doenfliynoitnioenperson,
1. A: DJ AACddojjepecyctvtvaa EAASSEaaSEAxxddfmayddaaaiwwxdodeaammeddaulwwkksdamrppswwte.wkddayllspeeWaaaawgpsdwwddleddeeaaihkkeenddtwdteddoffhsskntiissedaaehnnmdccfyseiirisaattaooenii"croocuiTeaitnnpisotoeih:e"nnandnt'as
1. :ADJ EaakkkkaaakExoatajjsskahaddxndjjnmsjddekkddaedjaamrdopk"pessplBaesaapetssriclaasedoaecowwsen:and"fiddtwi,neonfkkyfiditaaeieothnkkklinuedowwiattsne"hki.jjrCoaddwvnsscje:d"s
Expire
: EExxppiriree
2. EXP
22.. EEXXPP
32. BCC Block A control character
Check added to a block in
Character character oriented
protocols (such as
Bisync) used for
determining if the block
was received in error
35
24
33. BCD Binary- A format for
1. ADJ ACdojedcetdva Exraemprpelseendteinfignidtieocnimal
1. A: DJ AADddejjececicmtvtvaala EAASSEaaSAExxddnr(wddaaaenwwxudaahmmpdyamwwkkirbamcppewwbwbkddhllspeeelaaaaweederwwddlnddseaakkoteeddcwde(rddffhssidkiinssnedaanndtbccifsiiebiisaayttaggniibcooeifiltatoennrisi)uos).rnSibneiets
1. :ADJ EaakkkkaaEakx0rbnjjsskaaeddxjjuy1msjddpkkat1mdjeraamd1pke.bsslsaFaa0peeesr1olnaadae0r3wwtee1a7defddd.wix5enkkaafwdiaamistnkkki:oopwwia0utnlki0lejjodddw1,nss1tbjhdees
Expire
: EExxppiriree
2. EXP
22.. EEXXPP
34. BCE Bell Canada's Largest
Canada Communications
Enterprises Company
http://www.bce.ca
36
24
35. BCEL Byte Code Library intended to
1. ADJ AdEjencgtivnaeeringExagmivpeleudseerfsinaitcioonnvenient
1. A: DJ EAASSEaaESAxxddddaaawwxdcp(faammdibarwowkklaeimeppswwnawkddssllatp.eeiaaaawedrbwwddl,yddeiaakkl)aeeddwdiddntffJsskyiissdedaaanndvccfstiimiosaattaniicaooacinatnnnliaiaopslnsuylzaet,e
1. :ADJ AAdLdjjeiebccrtavtvraya
Expire
:
2. EXP
3226... EEBXXCPPI EExxBppuirisreieness EaakkkkaaaEkxjjsskaaddxjjTphmsjddkkadirjhgaaomdpkesshflaeaapeeBssslaadCasetwwiesIoadftddnpwiaenkkarnfdioaalidtnkkkmiaowwiarotndkijjtosddewnsssojftdhse
Continuity
Institute
competence and
commercial ethics in
the provision,
maintenance and
services for Business
Continuity
Management (BCM).
37
24