The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by afrizalharis123, 2023-01-01 06:25:54

IT Pocket Dictionary

IT Pocket Dictionary

59. Junk Mail Unsolicited email.

60. Jython n implementation of

PYTHON based on JAVA.

179


1. k- knowledge A representation of
map map concepts and their
relationships (e.g.,
2. Kaid hierarchy, taxonomy and
network). A K-map is a
navigational aid that
enables a user to hone in
rapidly on the desired
concept, and then follow
links to relevant
knowledge sources
(information or people).

Kai console a service that provides
daemon tunneling for console
games that do not have
an inherent connection to
the Internet. Although
the label refers to
XBOX, the daemon
works well with PS2,
and Gamecube consoles
as well

180


3. Kb Kilobit One thousand bits (103)
or 1024 bits (210). A
unit of measurement of
the capacity of memory
integrated circuits.

4 kB Kilobyte One thousand bytes
(103) or 1024 (210)
bytes. A unit of
measurement used for
computer file sizes.

5 KBE knowledge- A system that
based encapsulates design
engineering knowledge that can be
recalled, reused and
extended to create
product designs.

181


6 Kbps Kilobits Per Don't confuse this with
Second Kilobytes per second
(which is 8 times more
data per second). This
term is commonly used
in describing data
transfer rates. For
example, two common
modem speeds are 33.6
Kbps and 56 Kbps.

7 KBS Knowledge- A computer system that
Based is programmed to imitate
System human problem-solving
by means of artificial
intelligence and
reference to a database
of knowledge on a
particular subject.

182


8 KBMS KeyBoard Connector. It's simply
9 KBW /MouSe a duplicate of the
PS/2 ports and it's
Application- used to connect other
to- devices that use the
Application PS/2 without having
to give up the
keyboard and mouse,
and also is convenient
for things that you
need to mount
internally

BW can be either a
software program or
an inserted hardware
device that translates
digital signals from a
barcode reader or
magnetic strip reader (
MSR ) into keyboard
strokes for a
computer.

183


10 KCC Knowledge A domain service that
Consistency creates and modifies the
Checker replication topology of
AD

11 KDC Key A network service that
Distribution provides tickets and
Center temporary session keys.
The KDC maintains a
database of principals
(users and services) and
their associated secret
keys

12 KDD Knowledge A branch of Artificial
Discovery Intelligence Artificial-
in Intelligence.
Databases

184


13 KDE K Desktop KDE is an open source
14 KDSI Environment graphical desktop
environment for Unix
thousand workstations. Initially
(K) called the Kool
Delivered Desktop Environment,
Source KDE is anongoing
Instructions project with
development taking
place on the Internet
and discussionsheld
through the official
KDE mailing list,
numerous newsgroups,
and IRC channels.
It is a measure of a
programmer's
productivity or a
project productivity.

185


15 keychan Key changer a small
program/software,
that can change a
software license
key to another
key. A key
changer is not
illegal, since it
only changes a
key

16 keygen Key Generator Refers to a
program that will
automatically
generate a
registration or
serial number. Its
usual purpose is
to eliminate
software piracy.

186


17 keylogging keystroke the act of recording
logging the keys that a
person presses as
he or she uses a
computer.
Keystroke logging is
often done
surreptitiously by
malicious SPYWARE
in an attempt to
capture passwords.

18 KGD Known a process where
Good Die customers can get
fully tested, bare-
die flash devices.
No additional
packaging, like a
TSOP, is provided.

19 KiB kibibyte 1024 bytes.

187


20 KIPS Thousands a unit used to measure
21. KIS of the speed at which a
instructions processor executes
per second instructions. See also
MIPS.

Knowbot A directory retrieval
Information service for Internet
Service addresses, that uses
intelligent agents to
process requests. Also
called netaddress.

22. KISS Keep It the KISS Principle is
Simple, sometimes cited on a
Stupid development project to
fend off feature creep.
The somewhat related
idea of Ockham's razor
is about always looking
for the simplest
explanation.

188


23 KLOC Thousands A traditional measure
of lines of of how large a
code computer program is or
how long or how many
people it will take to
write it. The code
measured is usually
source code . Since a
higher-level source
language compiles into
more lines of machine
code than a lower-level
language, a KLOC of
C++ statements would
generate a larger
program than a KLOC
of assembler language
statements.

189

3. AA Anti- The technique of


24 KM knowledge A business process that
25 KML management formalizes the
management and use of
an enterprise's
intellectual assets. KM
promotes a
collaborative and
integrative approach to
the creation, capture,
organization, access
and use of information
assets.

Keyhole KML is an XML-based
Markup markup language
Language designed to annotate
and overlay
visualizations on
various two-
dimensional, Web-
based online maps or
three-dimensional Earth
browsers (such as
Google Earth)..

190


26 KMS Key Mostly used in
27 KNI Management Microsoft
Server Exchange to issue
28 knowbot security certificates

Katmai New This is the original
Instructions code-name for
Intel’s SSE
Knowledge instruction set,
robots named after the
first Pentium III
processor core,
code-named
“Katmai.”
designed to search
files on the
Internet "a robotic
librarian." It is a
registered
trademark of the
Corporation for
national Research
Initiatives.

191


29 KOLs Key opinion more discerning in
30 KOLs leaders who they accept
31 KPN information from
32 KPI and with whom
they will work.

Key opinion more discerning in
leaders who they accept
information from
and with whom
they will work.

(formerly) a Dutch landline
Koninklijke and mobile
PTT telecommunications
Nederland company

key KPIs are applied in
performance BI to gauge business
indicator trends and advise
tactical courses of
action

192


33 KPO Knowledge KPO business entities
Processing provide typical
Outsourcing domain-based
processes, advanced
analytical skills and
business expertise,
rather than just
process expertise.

34 KSAM Keyed Accessing a flat file
Sequential using a simple or
Access compound key
Method

35 ksh Korn shell A command
interpreter for
UNIX.

An interactive
command interpreter
and a command
programming
language.

193


36. KSR Keyboard A teletypewriter
37 KTM Send/Receive transmitter and
receiver operated by
means of a keyboard,
with no monitor.

kernel A transaction
transaction management service
manager that enables you to
create a transaction
processing system
(TPS) in user mode or
kernel mode (or
both).

38 KUIP Kernel User the human interface
Interface to PAW PAW.
Package

194


39 KTS Key The KTS provides
40 KVM Telephone communications services
System to small businesses that
require typically
between 2 and 100
telephones and have a
large number of internal
intercom calls in relation
to the number of
inbound or outbound
calls. Unlike a PBX, a key
telephone system is not
a switch.

Keyboard, a KVM switch allows you
Video, to used multiple
and computers with the
Mouse same keyboard, video
display, and mouse..

195


41 KWH KiloWatt A measure of the
Hour amount of watts of
energy used. Electricity
42 kW kilowatt is measured in units of
power called watts.

A unit of electrical power,
equal to 1,000 watts.

43 KYC Know Your a broad variety of
Customer products designed to
help companies avoid
initiating or maintaining
commercial
relationships with
parties that are
regulatory-
inappropriate or
otherwise undesirable.

196


1. L2CAP Logical Link a Bluetooth Specific
2. LAC and Control Protocol
3. LACNIC Adaptation
Protocol
4. LADDR
L2tp Access Device attached to
Concentrator the switched
network or located
on an end system
supporting L2TP to
pass PPP traffic.

Latin one of four regional
American Internet registries
and that supply and
Caribbean administer IP
Internet addresses.
Addresses
Registry

Layered s SCSI device driver
Device architecture used in
Driver early versions of
OS/2.

197


5. LAI Location the information carried in
Area the SIM of GSM handsets
Identity that identify the
subscriber's home area.
This is used for billing
and sub-net operation
purposes.

6. LAMP Linux, Also defined as Linux,
Apache, Apache, MySQL and
MySQL Pythor or Perl. The term
and PHP LAMP is used to describe
a web based solution
produced using PHP
(scripting), MySQL
(database), Apache (web-
server) under Linux
(operating system), each
of which are free to
download. It therefore
describes a website using
free off-the-shelf
components.

198


7. LAN Local Area A network of
Network interconnected
workstations sharing
the resources of a single
processor or server
within a relatively small
geographic area.
Typically, this might be
within the area of a
small office building.

8. LANE Local Area A set of services and
Network protocols that provide
Emulation for the emulation of
LANs, using ATM as a
backbone to allow
connectivity among
LAN and ATM
attached end stations

199


9. LAPD Link Access specified in ITU-T
Procedures Q.920 and ITU-T
on the D Q.921, is the second
channel layer protocol on the
ISDN protocol stack
in the D channel.

10 laser light Analog transmission
11 LAT amplification device in which a
by suitable active
stimulated material is excited by
emission of an external stimulus to
radiation produce a narrow
beam of coherent light
that can be modulated
into pulses to carry
data. Networks based
on laser technology
are sometimes run
over SONET.

Local A table containing the
Address IP address range that
Table is inside a firewalled
network

200


12 LATA Local Denotes a geographical
13 LBA Access and area established for the
Transport provision and
Area administration of
communications
service. It encompasses
one or more designated
exchanges, which are
grouped to serve
common social,
economic, and other
purposes.

Logical a method of accessing
Block hard disk drives. It
Addressing allows IDE disks larger
than 504 megabytes
(1024 cylinders) in size
to be fully partitioned
using the MS-DOS
fdisk command.

201


14 LBAC label-based A security mechanism
access that uses security labels
control to restrict user access to
individual table rows
and columns.

15 LBS Location- Services or applications
16 LBG based that center around a
service user’s location in a
mobile environment.
load Services include finder
balancing applications that let
group mobile phone users
locate friends or family,
businesses or
landmarks.

A grouping of Fast Path
input messages that are
ready for balanced
processing by one or
more copies of a Fast
Path program.

202


17 LBO line Abbreviation for line
buildout buildout. Synonym
building out.
18 LCC / Leaded
LLCC Chip a type of packaging for
Carrier / integrated circuits
Leadless which has no "leads",
Chip but instead rounded
Carrier pins through the edges
of the ceramic package.

19 LCC Limited also called CMP-50
combustible cable, is fire-resistant
cable cable with insulation
made of a synthetic
material called
fluorinated ethylene
propylene (FEP).

203


20 LCD liquid A low-powered, flat-
21 LCI crystal panel display
display technology. LCD
displays create images
local using liquid crystal
component molecules controlled by
installer an electrical field.

In IBM Tivoli Kernel
Services, the
component that pulls
and runs native code,
shared libraries, and
installation scripts that
are needed for
deploying components.

22 LCM Life Cycle the management of the
Management entire life of a program
including the three
typical phases:
transition,
transformation & end-
state

204


23 LCN local A communication
24. LCO communication network within a
network TMN
(telecommunications
language management
context object network) that
supports data
communication
functions (DCFs)
normally at reference
points q1 and q2.
A context server
object that mediates
the routing of
inbound customer
interactions as well
as the supply of
outbound responses
in a language-
appropriate manner.

25 LCP Link Control Part of the PPP to
Protocol establish, configure,
and test data link
connections

205


26 LCR least cost Method for automatic
27 LD routing selection of the least
costly facility for
transmission of a call.
Synonyms: Most
Economical Route
Selection (MERS);
Route Optimization;
Automatic Route
Selection; Flexible
Route Selection.

Laser Disc An optical disc which
stores information that
can be read by a laser
beam. Laser discs can be
used to store data, but
are usually used for
video and audio
together. Laser discs
come in 8" and 12"
diameters.

206


28 LDA Local A mail service agent
29 LDAP delivery that transfers mail
agent
messages from
incoming mail storage
to the email recipient’s
inbox.

Lightweight If you want to make
Directory directory information
Access available over the
Protocol Internet, this is the way
to do it. LDAP is a
streamlined version of
an earlier directory
standard called X.500.
What makes LDAP so
useful is that it works
great over TCP/IP
networks, so
information can be
accessed through
LDAP by anyone with
an Internet connection.

207


30 LDCM LANDesk developed by Intel, is
31 LDIF Client a management tool
Manager that constantly
32 LDM monitors networked
personal computers
and workstations for
hardware problems.

LDAP Data a file format that is
Interchange widely used for
Format building a database of
directories that are
limited stored on multiple
distance servers, for adding
modem large numbers of
directories to a
directory database,
and for synchronizing
the contents of those
directories. The
servers on which the
directories are stored
must support the
LDAP protocol.
limited distance
modem

208


1. m- mobile A category of
commerce commerce; commerce that
includes any
2. MAC Media purchase transaction
Access completed using a
. Control wireless device,
Mid- such as a cellular
Atlantic phone, PC or
Crossing personal digital
assistant.
A MAC address is a
hardware
identification
number that
uniquely identifies
each device on a
network. The MAC
address is
manufactured into
every network card,
such as an Ethernet
card or Wi-Fi card,
and therefore cannot
be changed.

209 MAC cable system
in USA, St. Croix


3. MADM Multiple allows the same
Appearance directory number to
Directory appear on more than
Number one telephone.

4. MAGs Multichannel onsist of client- and
access server-side
gateways middleware,
accompanied by
tools or packaged as
plug-ins, that enable
mobile applications
to work well across a
diverse set of devices
and networks

5. mAH milliampere- a measurement of the
hour or amount of charge a
milliamp- battery can hold.
hour

210


6. Malware Malicious Programs with the
Software intent to cause
problems.

7. MAN Metropolitan A data network
8. MANET Area intended to serve an
Network area the size of a
city. Such networks
Mobile Ad are being
Hoc implemented by
Network innovative
techniques, such as
running optical
fibres through
subway tunnels.
A MANET is a type
of ad hoc network
that can change
locations and
configure itself on
the fly. Because
MANETS are
mobile, they use
wireless connections
to connect to various
networks.

211


9. MAPI Messaging The Microsoft-
10. MAPP Application developed
Programming programming
Interface interface
specification that
Microsoft enables an
Active application to send
Protections and receive mail
Program over an e-mail
messaging system,
such as Microsoft
Exchange. It was
designed to separate
the mail engine from
the mail client.
To improve security
protections for
customers, Microsoft
provides
vulnerability
information to major
security software
providers in advance
of each monthly
security update
release

212


11. MAPP Microsoft To improve security
12. ADTA Active protections for
Protections customers, Microsoft
Program provides vulnerability
information to major
security software
providers in advance
of each monthly
security update
release

Application- an experimental
to- computer algebra
Application system which
combines imperative
programming
facilities with
algebraic
specification
capabilities for the
design and study of
algebraic algorithms.

213


13. MASER Microwave A device designed
Amplification to generate a
by Simulated microwave signal
Emission of with low-noise
Radiation properties.

14. Mbps MegaBits Per In data
Second communications, a
common measure
of data speed for
computer modems
and transmission
carriers. One Mbps
is equal to
1,000,000 bps or
1,000 kbps.

15. MBR Master Boot Record located at
Record the beginning of a
bootable disk on
Intel based
systems,
containing the boot
loader.

214


16 MBS Maximum ATM network
17. MBSA Burst Size performance
parameter that defines
Microsoft the duration of
Baseline transmission at a peak
Security rate that would be
Analyzer accepted on a given
ATM virtual circuit.

Scans for missing
hotfixes and
vulnerabilities in some
Microsoft products

18. MBT MB MB Technologies'
Technology Bindows is the leading
SDK used for
developing zero-
footprint SOA client-
side applications.

215


19. MCA Micro A 32-bit standard
Channel developed by IBM
Architecture for expansion cards.
The standard offered
improvements over
16-bit ISA, but
never caught on
outside of IBM
computers.

20. MCCM multichannel processes enable
campaign companies to
management communicate offers
to customer
segments across a
multichannel
environment, such as
direct mail, call
centers, websites, e-
mail and
communities.

216


21. MCI Microwave Microwave
Communications, Communications,
Inc. Inc., acquired by
Verizon.

22. MCIF (IBM) Measured a set of guidelines
Capability and processes
Improvement developed to help
Framework companies more
effectively
manage, measure
and improve their
software delivery
process.

23. MCL Mesh a technology that
Connectivity allows a
Layer computer user to
connect to a
wireless mesh
network that uses
Wi-Fi or
WiMAX.

217


24. MCMP Multi- a circuit card that
channel enables the support of
Multi-point up to six independent
applications over a
single multipoint
digital facility.

25. MCP Microsoft refers to both an
Certified individual Microsoft
Professional certification and a
broader professional
certification program.
To be an MCP,
candidates must
complete any one
exam within the
program. The MCP
program offers
multiple
certifications, based
on different areas of
technical expertise.

218


26. MCR Maximum An Available Bit Rate
27. MDA Cell Rate (ABR) traffic parameter
(in cells per second)
Model- that gives the slowest
driven rate at which the
architecture network controls the
flow of the source on
an ABR Virtual
Channel (VC)
connection.

a software design
approach for the
development of
software systems. It
provides a set of
guidelines for the
structuring of
specifications, which
are expressed as
models.

219


28. MDB Message- part of the Java EE
Driven specifications
Beans

29. MDF Medium A type of particle
Density board that is often used
Fiberboard in the construction of
subwoofer enclosures.
It is used due to its
ability to absorb
vibration and its
sturdiness.

30. mdisk managed A SCSI logical unit
disk (LU) that a RAID
controller provides and
a cluster manages.

220


31. MDIX medium an Ethernet port
dependent connection that allows
interface networked end
crossover stations (i.e., PCs or
workstations) to
connect to each other
using a null-modem,
or crossover, cable.

32. MDM master data the set of processes to
management create and maintain a
single view of
reference data that is
shared across systems.

33. MDP Mobile Data Mobile Data
34. MDS Protection Protection

Master Data IBM MDM product
Service

221


35. MDX Multidimensional The querying
36. MEMS
Expressions language for OLAP

cubes.

micro- an emerging
electromechanical technology for
systems making
microscopic
machines. Using
microfabrication
technology, MEMS
integrates
actuators,
mechanical
elements, sensors
and electronics on
a common silicon
substrate.

37. MEO Medium/Middle A
Earth Orbit telecommunication
satellite system that
is mainly used for
geographical/global
positioning
systems.

222


38. MICR Accessibility a character
. recognition system
that uses special ink
and characters. When
a document that
contains this ink
needs to be read, it
passes through a
machine, which
magnetizes the ink
and then translates
the magnetic
information into
characters. The most
common use of the
technology is in the
financial world.
MICR technology is
used by banks.

223


39. MID- Management A collection of
II Information objects that can be
DataBase II accessed via a
network management
protocol such as
SNMP.

40. MIME Multipurpose Originally a standard
Internet Mail for defining the types
Extensions of files attached to
standard Internet
mail messages. The
MIME standard has
come to be used in
many situations
where one cmputer
programs needs to
communicate with
another program
about what kind of
file is being sent.

224


Click to View FlipBook Version