The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by afrizalharis123, 2023-01-01 06:25:54

IT Pocket Dictionary

IT Pocket Dictionary

1. NAB Not A Bug Used as a reason
2. NAC when rejecting a bug
report

network NAC process
access evaluates the security
control state of a system or
user as it connects to
the network;
monitors the security
state of systems that
are already
connected.

3. NACHA National A financial industry
Automated organization that
Clearing develops electronic
House solutions to improve
Association the payments system.
Although it has
225 retained the
"NACHA" acronym,
the organization now
uses "NACHA —
The Electronic
Payments
Association" as its
full name.


4. NAI Network A network
5. NAK Associates Inc. security vendor
headquartered in
Santa Clara,
California.
now McAfee

Negative The opposite of
acknowledgement the ACK signal. It
or not indicates a
acknowledged message was not
received correctly,
or that the
terminal is not
ready to send.

6. NAM Number The component of
Assignment a wireless phone
Module that holds its
telephone number
and electronic
serial number in
memory.

226


7. NaN Not a a value or symbol that
8. NANP Number is usually produced as
the result of an
operation on invalid
input operands,
especially in floating-
point calculations

Identifies The numbering plan
the used in the United
electrical States, Canada,
conditions Bermuda, Puerto Rico,
on the and certain Caribbean
circuit. Islands. The NANP
format is a 10-digit
number that consists of
a 3-digit NPA code
(Area Code), 3-digit
NXX code (Exchange),
and 4-digit code (Line).

227


9. NAP network a public network
/ access exchange facility
NAPs points where ISPs can connect
with one another in
10. NAP peering arrangements.
The NAPs are a key
component of the
Internet backbone
because the connections
within them determine
how traffic is routed.
They are also the points
of most Internet
congestion.

Network A client feature
Access supported by Windows
Protection Vista that provides for
monitoring and
isolation of computers
on a Longhorn server-
based network that do
not meet administrator-
defined health status
requirements.

228


11. NAS network also known as a "media
access gateway" or a "remote
server access server" (RAS), is
an access control point
for remote users
connecting to a
company's internal
network or to an ISP via
analog modems or
ISDN.

12. NAT Network NAT translates the IP
Address addresses of computers
Translation in a local network to a
single IP address. This
address is often used by
the router that connects
the computers to the
Internet.

13. NAV Norton Symantec AV brand

Anti Virus

229


14. NAVSTAR NAVigation the official
Satellite government
Timing and name for the
Ranging satellite system
that supports
GPS devices.

15. NBC National NBC is an
16. NC Broadcasting American
Company commercial
broadcasting
Network television
Computer network and
former radio
230 network
headquartered in
the GE Building
in New York
City's
Rockefeller
Center with
additional major
offices near Los
Angeles and in
Chicago.
An Internet PC
from Oracle,
designed for
Internet use
only.


17. NCC Norton Norton Utilities'
Control program by
Center Symantec

18. NCCM Network tools focus on
19. NCI Configuration discovering and
and Change documenting
Management network device
configuration files,
Network auditing changes,
Channel comparing
Interface configurations to
the policy or "gold
standard" for that
device, and
deploying
configuration
updates to
multivendor
network devices.
Identifies the
electrical conditions
on the circuit.

231


20. NCp Netware The set of procedures
Core that Novell NOSs use
Protocol to handle all network
client requests.

21. NDC networked A service that goes
22. NDM data center beyond making data
center functionality
available on a network.
An NDC employs
networking technology
to treat multiple data
centers and the network
as a single system to
efficiently access and
process applications.

Network File transmission
Data protocol software.
Mover

232


23. NDIS Network Windows
24. NDMP Driver specification for how
Interface communication
Specification protocol programs
(such as TCP/IP) and
Network network device
Data driver should
Management communicate with
Protocol each other.
A standard protocol
233 — proposed by
storage technology
vendors Network
Appliance and
Legato Systems —
that storage
management
applications can use
to back up data in a
network of
heterogeneous
servers. NDMP
defines a standard
agent that can
operate on any file
server, regardless of
hardware platform or
operating system.


25. NDP Neighbor a protocol in the Internet
Discovery Protocol Suite used with
Protocol IPv6

26. NDr Non- When an e-mail
Delivery message is composed
Receipt and sent to an invalid e-
mail address the
receiving, or in some
cases the sending, e-
mail server attempts to
send an NDR to the
sender of the e-mail
message, to inform them
that the e-mail address
used is invalid.

234


27. NDS Netware Novell's name for
Directory the tree structured
Services hierarchy within
Novell NOSs that
includes all network
resources and
services.

28. NEC National A leading
29. NEMs Electric Code manufacturer and
supplier in all
network commercial
equipment electronics industries
manufacturers worldwide. They
have several
International
manufacturing and
operations locations.

network equipment
manufacturers

235


30. NES Nintendo Nintendo is a
Entertainment Japanese company
System that produces very
popular arcade-like
video games that
require their own
dedicated game
equipment.

31. net-J Internet disc In addition to the
jockey development of VJ's
(video jockeys for
music television)
there is also the
performance position
of the Internet disc
jockey (or "net-J").
Many enterprising
webcasters have
begun their own radio
stations broadcasting
strictly over the
Internet.

236


32. NetApp Network NETAPP Inc. is a
Appliance major vendor in the
network attached
storage (NAS) arena

33. netbeui NetBios It is an enhanced
34. Netizen Enhanced version of the
User NetBIOS protocol
Interface used by network
operating
systems. Netbeui was
originally designed
by IBM for their Lan
Manager server and
later extended by
Microsoft and Novell.

citizen of someone who uses
the Internet networked resources.
The term connotes
civic responsibility
and participation.

237


35. NEXT Near-End an error condition that
Crosstalk can occur when
connectors are attached
to twisted pair cabling.
NEXT is usually
caused by crossed or
crushed wire pairs.

36. NF / Normal the structures and
NFs Forms algorithms to
normalize a relational
database. One can only
describe a database as
having a normal form
if the relationships
between quantities
have been rigorously
defined.

238


1. O2O: Online To The term O2O was
Offline first coined by Alex
Rampell, CEO and
founder of TrialPay, in
a 2010 TechCrunch
article.

2. OAAM Oracle Oracle entered the
3. OADM Adaptive Web fraud detection
Access market in July 2007,
Manager with the acquisition of
Bharosa, and has
integrated the renamed
product that consists of
fraud detection and
user authentication
software

Optical In telecom parlance, a
Add/Drop Single Channel
Multiplexer OADM is used for
utilised for adding or
dropping single
wavelength
in DWDM optical
networks.

239


4. OAM object access There are eleven
method letters between the
5. OAM / "a" and the "y".
OA&M /
OAM&P Operations, A set of network
Administation, management
and functions for
Management ATM similar to
(and those in OA&M
Provisioning) and OAM&P.
Special cells,
called OAM cells,
are used to carry
OAM related
information

6. OASIS Organization An international
for the nonprofit
Advancement consortium that
of Structured promotes open,
Information collaborative
Standards development of e-
business
240 specifications
based on public
standards such as
Extensible
Markup Language
(XML).


7. OAT Outside Air This is used in the
8. OATH Temperature electronics industry to
mean the ambient air
temperature of the air
mass surrounding the
unit in discussion.

Object- a class library for C++
oriented from Texas
Abstract Instruments.
Type
Hierarchy

9. OBDR One Button This allows the tape

Disaster drive to be switched

Recovery into disaster recovery

mode - where its

firmware emulates a

bootable CD-ROM

allowing the system to

boot from the tape

device and restore the

241 system from the last
backup.


10. OBEX: OBject Set of protocols
11. OBI EXchange allowing objects such
as vCard contact
12. OBIEE information and
vCalendar schedule
entries to be
exchanged using
either IrDA or
Bluetooth

Open A standard for
Buying on Internet-based
the Internet procurement created
by a U.S. consortium
of vendors formed in
October 1996, which
released v.1.0 of OBI
specification the
following year. In
1998, the consortium
placed the
management of the
specification under
CommerceNet.

Oracle BI Oracle BI product
Enterprise

Edition242


13. OBM On-board also known as Internal
14. OBOE modem modem, is installed on
an expansion board
inside a computer
chase. In contrast, an
external modem is a
box that attaches to a
computer's COM port
via cables.

Off-By- Logical error involving
One Error the discrete equivalent
of a boundary
condition. It often
occurs in computer
programming when an
iterative loop iterates
one time too many or
too few

15. OBU On Board In an electronic toll
Unit collection system, card
data of a payment card
is stored in an OBU
mounted in a vehicle.

243


16. OC overclock To run a
17. OCIA microprocessor faster
Optically than the speed for
Coupled which it has been tested
Interface and approved.
Adapter Overclocking is a
popular technique for
eking out a little more
performance from a
system.

Interface in many other
respects similar to
RS232. It is used
extensively on POS
equipments

18. OC-N Optical The range of

Carrier incremental rates

Level N defined for SONET

fiber-optic

transmission. The

number after "OC-"

represents the multiple

of the foundation OC-1

rate, which is

244 51.84Mbps. Above
OC-3, the level

numbers and their


19. OCL Object a declarative language
20. OCP Constraint for describing rules and
Language constraints that apply to
UML models
Open- Object-oriented
Closed principle that states that
Principle software entities should
be open for extensions
Oracle but closed for
Certified modifications
Professional
DBA certification is
designed to reflect
proficiency in Oracle
database architecture,
installation,
administration,
performance tuning and
troubleshooting.

21. OCR Optical The technique of

Character recognising printed text

Recognition and turning it into

computer input, so

avoiding the need for

keyboard entry. Widely

245 used now for avoiding
the retyping of

documents.


22. OCSP Online an Internet
23. OCTAVE Certificate protocol used for
Status obtaining the
24. OCX Protoco revocation status
of an X.509
digital certificate

Operationally Approach for
Critical self-directed risk
Threat, evaluations that
Asset, and puts
Vulnerability organizations in
Evaluation charge, balances
critical
information
assets, business
needs, threats,
and
vulnerabilities
and measures the
organization
against known or
accepted good
security practices

Custom Visual Basic add-
Controls on components
based on
246 Microsoft's OLE
set of interfaces.


25. ODA Open An ISO standard for
26. ODBC Document documents which
Architecture allows for the transfer
27. ODBO of text, graphics, and
facsimiles between
platforms.

Open With all the different
Database types of databases
Connectivity available, such as
Microsoft Access,
Filemaker, and
MySQL, it is
important to have a
standard way of
transferring data to
and from each kind
of database.

OLE DB for A Microsoft
OLAP specification for a
standard interface to
247 OLAP engines.
Published in 1997,
OBDO paralleled
Microsoft's ODBC
strategy for access to
relational databases.


28. ODC Offshore An operation set up
development for a specific
29. ODD center organization by a
30. ODF service provider,
which dedicates
assets and
resources
specifically to that
single client, in
exchange for
guarantees of
steady work.

optical disk A computer device
drive that reads from,
and stores
information on,
optical storage
media.

OpenDocument suite of open,
XML-based office
248 suite application
formats defined by
the OASIS
consortium. It
defines a platform-
neutral, non-
proprietary way of
storing documents.


31. ODI Open Data- an API developed
link Interface by Apple and
32. ODM Novell for writing
33. ODMR Original network
Design drivers.Like NDIS,
Manufacturer ODI provides rules
that establish a
vendor-neutral
interface between
the protocol stack
and the adapter
driver.
a company that
produces products
for another firm that
will sell them under
its brand name

On-Demand an e-mail service
Mail Relay that allows a user to
request e-mail from
249 any internet
connection by using
a dynamic IP
address as opposed
to a static IP
address.


34. ODOE on demand The technology
operating infrastructure needed
environment to support an on
demand business.

35. ODP Open Data Provide a way for
Path more than one
program in the same
job to share the same
file status information

36. ODPS On Demand Intranet Software

Packaging distribution solution

Service by IBM

250


37. OEM Oracle integrates multiple
Enterprise products into a
38. OEP Manager complete APM/BTM
39. OFB solution.
Original
Equipment A firm which makes
Manufacturer parts that other firms
incorporate into their
own gear or complete
equipment that these
other firms sell under
their own brand name.

Outlook a remote procedure
Exchange call instantiation of
Protocol the Microsoft
Messaging API
protocol

output In cryptography, OFB

feedback is a mode of operation

for a block cipher. It

has some similarities

to the ciphertext

feedback mode in that

it permits encryption

of differing block

251 sizes, but has the key
difference that the

output of the


40. OFCom Office of the official
Communications regulating body
41. OFDM / for TV, radio
OFDMA and other
'communication
42. OFM industries' in
the UK.

Orthogonal a frequency-
Frequency- division
Division multiplexing
multiplexing scheme used as
(/Multiple a digital multi-
Access) carrier
modulation
method.

Oracle Fusion Oracle Fusion
Middleware Middleware

252


43. OFX Open An open
Financial specification for
44. op-code Exchange online transfer of
45. OpenCL financial data,
combining
Microsoft's Open
Financial
Connectivity, Intuit's
OpenExchange, and
CheckFree's
electronic banking
and payment
protocols.

Operation Part of a computer
Code instruction word that
designates the
function performed
by a specific
instruction.

Open A standards-based
Computing technology for
Language performing general-
purpose
253 computations on a
computer’s graphics
processor.


46. OVF Open Standard format for
Virtualization packaging and
47. OWL Format describing virtual
48. OXE machines and
applications for
deployment across
heterogeneous
virtualization
platforms

Web WWW Consortium,
Ontology Standards for
Language semantic
reconciliation

OmniPCX Alcatel-Lucent's
Enterprise commercially
platform for
enterprise telephony

254


1. PA- Payment company approved by
QSA Application the PCI SSC to conduct
Qualified assessments on
2. PABX Security payment applications
/ PBX Assessor against the PA-DSS.

private a telephone switch on a
automatic
branch customer's premises
exchange
that primarily

establishes voice-grade
circuits — over access

lines to a telephone
company CO —

between individual

users and the PSTN.

3. PAE Physical Extension for Windows
Addressing 2000/2003 Advanced
Extension Server to address more
than 4 GB of memory

255


4. PAN Personal Experimental
Area technology in
5. PARC Network development at IBM, it
6.. PASV allows information
devices to discreetly
communicate and
synchronize with one
another when in close
proximity (using the
human body as an
antenna).

Palo Alto Xerox research center
Research famed for having
Center developed the first GUI
in the 1970s.

Passive a ftp command that
(command) requests that the server
"listen" on a data port
(which is not its default
data port) and to wait
for a connection rather
than initiate one upon
receipt of a transfer
command.

256


7. PB PetaByte 2 to the 50th power
bytes. Is equal to 1024
terabytes

8. PBN policy- The application of
9. PCB
based business rules to govern

networking network performance

Printed .
Circuit A substrate on which a
Board pre-determined
interconnect pattern has
been formed, used to
assemble and connect
together ICs and other
electronic components
into a subassembly

257


10. PCI Peripheral The industry standard
Component system bus architecture
11. PCI Interconnect that is used in most
DSS desktop and server
models. PCI provides
12. PCL faster communications
between the processor
and components (such
as memory, disk and
video) than the original
IBM bus, Industry
Standard Architecture
(ISA)

Payment A common industry
Card security standard
Industry developed from a
Data collaboration between
Security Visa and MasterCard.
Standard cf CISP.

Printer a command language

Command that was developed by

Language Hewlett-Packard for

controlling Hewlett-

Packard printers. Each

PCL command consists

of an escape key

258 followed by a series of

code numbers.


13. PDA Personal PDA are small portable
14. PDB Digital computers which can be
Assistant held in the hand and are
also referred to as
Program handheld or Pocket
DataBase computers.

Microsoft's format for
debug indormation, not
embedded in the object
file or executable

15. PDE possible A payment that has been
duplicate identified as a possible
emission duplicate of another
payment, because the
contents of certain fields
or combinations of
fields in both payments
are identical or similar.

259


16. PDN Primary The telephone number
17. PDQ Directory that the physical
18. PDU Number telephone set is
associated with.
Generally, the first
telephone number listed
on a multi-line set.

Product Oracle MDM term
Data (developed as a result of
Quality its acquisition in 2009
of Silver Creek
Systems, is licensed
based on the number of
processors)

Protocol Message of a given
Data Unit protocol comprising
payload and protocol-
specific control
information, typically
contained in header.
Passes over protocol
interfaces that exist
between layers of
protocols (per OSI
model).

260


19. Perl Practical Perl is a programming
20. PET Extraction language that is widely
and Report used for both very
Language simple, small tasks and
for very large complex
applications.

Personal an early (circa 1977-
Electronic 1980, around the same
Transactor time as the Apple][)
home computer
featuring a ROM-based
BASIC developed by
Microsoft which it uses
as a default "OS".

21. PFS Public-Key For a key agreement

Forward protocol based on

Secrecy asymmetric

cryptography, the

property that ensures

that a session key

derived from a set of

long-term public and

private keys will not be

compromised if one of

the private keys is

261 compromised in the

future.


22. PHB Per-Hop- The forwarding
Behavior treatment given to a
specific class of traffic,
23. PHS Personal based on criteria
Handy defined in the
Phone Differentiated Service
System field. Routers and
switches use PHBs to
determine priorities for
servicing various traffic
flows

Personal
communications system
used in Japan as both a
digital cordless phone
in homes and offices
and as a cellular phone
outdoors.

24. PIC Position- A file containing object

Independent code that is almost

Code ready for execution on

the target. The final

remaining step is to use

a locator or loader to fix

the remaining

262 relocatable addresses

within the code.


25. PIN personal A numeric code —
identification typed on an
number automated teller
machine or telephone
keypad, or a
computer keyboard
— used to gain access
to personal funds or
information.

26. PINE Program for a character-based E-
Internet News Mail client for UNIX
and E-Mail systems. Developed
at the University of
Washington, PINE
replaces an older E-
Mail program called
elm.

27. PIPE Private Extension of RFC
Internet 2003 (IP
Protocol Encapsulation within
Encapsulation IP) which allows to
encapsulate and
263 decapsulate private IP
addresses in the same
way as described in
RFC 2003, and to
transfer them across
the public Internet


28. PKI public-key The techniques
29. PLCP infrastructure necessary to manage
30. PLOGI public-key
cryptography (see
separate entry), as
well as the various
systems for
authentication,
nonrepudiation and
integrity that can be
built on top of a
public-key system.

Physical Defined by the IEEE
Layer 802.6 and used for
Convergence DS3 transmission of
Protocol ATM. ATM cells
are encapsulated in
125microsecond
frame defined by
PLCP, which is
defined inside DS3
M-frame.

port login The port-to-port
login process by
264 which initiators
establish sessions
with targets.


31. PLPA pageable An area of virtual
link pack storage containing
32. PMM area supervisor call (SVC)
33. PMML routines, access
methods, and other
read-only system and
user programs that can
be shared among users
of the system.

Post A mechanism used by
Memory option ROMs to
Manager allocate RAM
memory for use during
system startup

Predictive A standard developed
Model by the Data Mining
Markup Group (DMG) to
Language represent predictive
analytic models.
PMML is supported
by leading BI and
analytics vendors like
IBM, SAS,
MicroStrategy, Oracle
and SAP.

265


34. PMSM permanent permanent magnet
35. PNG magnet synchronous motors
synchronous
36. PNRP motors

Portable PNG is a graphics
Network format specifically
Graphics designed for use on
the World Wide Web.
PNG enable
compression of
images without any
loss of quality,
including high-
resolution images.
Another important
feature of PNG is that
anyone may create
software that works
with PNG images
without paying any
fees - the PNG
standard is free of
any licensing costs.

Peer Name Secure, scalable, and
Resolution dynamic name
Protocol registration and name
resolution protocol
266 first developed for


37. PoE Power PoE is also called
Over Power over LAN or in-
38. PON Ethernet line power. It allows
39. POST appliances such as IP
telephones and WLAN
access points to receive
power over suitable
LAN cabling. The
international standard
is known as IEEE
802.3af. However,
some vendors have
implemented
proprietary solutions.

passive a unique point-to-
optical multipoint
networking infrastructure that
allows for the sharing
of one optical fiber
among several
buildings

power-on Set of hardware

self test diagnostics that runs on

a hardware device

when that device is

powered up.

267


40. POTS Plain Old POTS is the standard
41. PPC Telephone telephone service that
42. PPD Service most homes use. It is
also referred to as the
PSTN or the Public
Switched Telephone
Network.

Pay-Per- Where a company (or
Click advertiser) pays (a
search engine or
affiliate site) for each
click-through on an
advertisement.

Postscript A file that contains
Printer information about the
Description capabilities of a
particular printer
model. The PPD file
provides the controls
you need to take
advantage of special
features such as
multiple paper trays,
special paper sizes, or
duplex printing.

268


43. PPE PowerPC In the Cell Broadband
44. PPN Processor Engine architecture, a
Element grouping of multiple
PowerPC Processor
Primary Units (PPUs).
Port
Network The main switching
module for the
Definity G3R or G3I
switch.

45. PPPoE Point-to- PPPoE is a
Point specification for
Protocol connecting multiple
over computer users on
Ethernet local network to a
remote site using a
modem, gateway or
router that supports the
appropriate protocol
layers and
authentication for the
point-to-point
connection to be
established.

269


1. QA Quality The practice of checking
Assurance hardware, software, or
systems for defects,
identifying such defects,
and then checking to
make sure that such
defects are corrected
when future revisions of
software or hardware are
ready for testing.

2. QAM quadrature QAM is a method of
amplitude combining two
modulation amplitude-modulated
(AM) signals into a
single channel, thereby
doubling the effective
bandwidth. QAM is
used with PAM in
digital systems,
especially in wireless
applications.

270


3. QAT Quantity The sum of itemized
Above call minutes that
Threshold exceeds the minimum
Indicator threshold of 1500
Minutes of Usage
(MOU) that is eligible
for a volume discount.

4. QB QuickBASIC a descendant of the
BASIC programming
language that was
developed by the
Microsoft Corporation
for use with the MS-
DOS operating system,
A general accounting
system from Intuit,
Inc.

271


Click to View FlipBook Version