The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by afrizalharis123, 2023-01-01 06:25:54

IT Pocket Dictionary

IT Pocket Dictionary

21. SAR Segmentation the process used to
22. SAS And fragment and rebuild
Reassembly packets that allows
them to be transported
across asynchronous
transfer mode (ATM)

Secure A key sequence that
Attention begins the process of
Sequence logging on or off. The
default sequence is
CTRL+ALT+DEL

23 SAS Serial A replacement for the
Attached Parallel SCSI physical
SCSI storage interface.
Serial Attached SCSI
offers much faster
communication and
easier configuration.

320

24. SAS Single Device attached only
25. SAS Attachment to the primary ring of
Station a FDDI ring. Also
26. SAS70 known as a Class B
station.

Statistical SAS Institute, a
Analysis business intelligence
System software vendor,
founded in 1976 and
headquartered in Cary,
North Carolina.
www.sas.com

Statement defines the standards
on an auditor must
Auditing employ in order to
Standards assess the contracted
No. 70 internal controls
www.sas70.com

321

27. SALS Simple An extensible
28. SAST Authentication authentication
and Security scheme that allows
Layer the Open Directory
Password Server to
support a variety of
network user
authentication
methods required.

Static Static application
application security testinga set
security of technologies
testing designed to analyze
application source
code, byte code and
binaries for coding
and design
conditions that are
indicative of
security
vulnerabilities.

322

30. SAT Satellite software which finds
NAV navigation your physical
geographical location
31. SATA then gives you
directions on which
way to travel. This is
most commonly used
in specialist hand-held
devices as well as
mobile phones.

Serial ATA a disk-interface
technology developed
by a group of the
industry's leading
vendors to replace
parallel ATA. It is the
natural successor to
IDE. Serial ATA only
requires seven wires
per device (4 data and
3 ground) and the
cables can be up to 1m
long.

323

32. SAV Symantec Previously called
33. SAX AntiVirus Norton AntiVirus
(NAV)
34. SB
Simple API A public-domain
for XML alternative to DOM for
enabling programming
languages to work with
XML documents. SAX
is API that uses "start
events" and "stop
events" to parse an
XML document so that
an application can
interact with it.

Sound Sound Blaster brand by
Blaster Creative Labs

324

35. SBAS Satellite- systems broadcast
36. SBB Based free correction
Augmentation signals from geo-
System stationary satellites
to improve the
accuracy, integrity
and availability of
the GPS network

Storage specification created
Bridge Bay in March 2006 by a
nonprofit working
group, including
collaborative
vendors such as
Intel, Dell, EMC and
LSI, which defines
SBB as the
mechanical/electrical
interface between a
passive backplane
drive array and the
electronics packages
that give the array its
personality.

325

37. SBC Session An appliance that
38. SBC Border simplifies handling of
Controller VoIP at the border of a
network

single- A complete computer
board that resides on a single
computer printed circuit board,
usually a small one.

39. SBCS Single- A coded character set
Byte in which each character
Character is represented by a 1-
Set byte code.

326

40. SBCS Smart Cisco unified
Business communications
Commun- appliance that
ications provides voice and
System data communications,
voicemail, automated
41. SBL Spamhaus attendant, video,
Block List security, and wireless
capabilities while
integrating with
existing desktop
applications

Realtime database of
IP addresses of
verified spam sources
and spam operations,
maintained by the
Spamhaus Project
team and supplied as a
free service to help
email administrators
better manage
incoming email
streams.

327



1. T2l Transistor- A logic gate family
Transistor that provides higher-
Logic speed and higher-
power than the
obsolete DTL logic
family.

2. T- Television Interactive TV
commerce Commerce capabilitu, including
VOD movie rentals
and games

3. TACACS Terminal Developed by Cisco
Access Systems, it is
Controller standard security
Access protocol used in
Control authenticating the
System identity of a
computer or device
seeking remote
access to privileged
data (such as that
behind a firewall).

328

4. TAE Text A software component
5. TAO Analysis that is responsible for
Engine discovering and
6. TAPI representing context and
semantic content in text.

Track at A method of writing
Once data to a CD-R or CD-
RW disc on a track by
track basis. Recording
can be paused between
writing tracks, unlike
Disc at Once, which
requires an uninterrupted
full-disc recording.

Telephony A number of IT
Application companies, led by
Program- Microsoft and Intel,
ming have collaborated to
Interface design a common
Windows graphical user
interface for telephony
and a Telephony
Application
Programming Interface
(TAPI).

329

7. TAR Tape A compression format
8. TAXI ARchive commonly used in the
transfer and storage of
9. Tb files on UNIX
computers (.tar).

Transparent Encoding scheme
Asynchronous used for FDDI LANs
Transmitter- as well as for ATM.
Receiver Supports speeds of up
Interface to 100 Mbps over
multimode fiber.
TAXI is the chipset
that generates 4B/5B
encoding on
multimode fiber.

Terabit For processor storage,
real and virtual
storage, and channel
volume, 2 to the
power of 40 or 1 099
511 627 776 bits. For
disk storage capacity
and communications
volume, 1 000 000
000 000 bits.

330

10. TB TeraByte 1024 gigabytes,
11. Tbps 1,099,511,627,776 bytes
12. TBR
Terabit per A trillion bits per
13. TCA
second second.

Technology specializes in providing
Business in-depth and timely
Research insights within the
computer, software,
telecom, mobility, and
professional services
industries.

Transaction Methodology that can
Cost be used to measure the
Analysis cost of individual
shopper operations such
as registering, browsing,
searching a catalog,
adding an item to a
shopping cart, checking
out, and so on

331

14. TCAP Transaction From ITU-T
15. TCB Capabilities recommendations
Application Q.771-Q.775 or ANSI
Part T1.114 is a protocol
for SS 7 networks.

Trusted everything in a
Computing computing system that
Base provides a secure
environment. This
includes the operating
system and its
provided security
mechanisms, hardware,
physical locations,
network hardware and
software, and
prescribed procedures.

332

16. TCG Trusted Group that develops and
17. TCL Computing promotes open, vendor-
Group neutral, industry
standard specifications
for trusted computing
building blocks and
software interfaces
across multiple
platforms.

Tool Portable interpreted
Command computer language
Language designed to be easy to
use.

18. TQC Tagged SCSI feature to allow
Command multiple I/O requests
Queuing

333

19. TCO Total Cost the complete cost of
20. TCS of owning and using a
Ownership machine during its
useful life, including
not only the cost of the
machine itself, but also
maintenance, repairs,
and consumable
supplies such as ink and
paper.

Tata Inida-based IT services,

Consultancy business solutions, and

Services outsourcing company.

21. TCS Telecom- Wireless

munications communications

Systems provider in U.S.

334

22. TCP Test Set of rules to
23. TCP Coordination coordinate test process
Procedure between lower tester
and upper tester.
Enables lower tester to
control operation of
upper tester. May, or
may not, be specified
in abstract test suite.

Transmission A connection-oriented
Control protocol that transmits
Protocol data in byte streams.
Data is transmitted in
packets called TCP
segments, which
contain TCP headers
and data.

335

24. TCP/IP Trans- This is used for
25. TCU mission communications
Control/- across interconnected
Internet networks and is being
Protocol increasingly deployed
to connect diverse
Trans- computer architectures
mission and platforms, both
Control between enterprises
Unit and within enterprises.
TCP operates at Layer
4 (the transport layer)
of the OSI stack. IP
operates at Layer 3
(the network layer) of
the OSI stack.

A communication
control unit whose
operations are
controlled solely by
programmed
instructions from the
computing system to
which the unit is
attached.

336

26. TD- Time China's home-
SCDMA division- grown 3G standard
synchronous for cellular
27. TDC code networks.
division
multiple
access

Tele- Former telecom
Denmark monopoly in
Communi- Denmark. It is now
cations privatized. Thus, it
is the biggest
company in all
aspects of
telecommunication
in Denmark with
landline, mobile,
Internet, VHF
maritime
borderline-radio etc.

337

28. TDD/ Tone Dialing a method by which
TYY for the the hearing
Deaf/Teletype impaired can type
29. TDDM messages over
normal phone lines
using special
equipment. Many
ISPs have a
TDD/TTY for
technical support.

Target In a distributed data
Distributed management
Data Manager network,
programming
support that
translates the DDM
requests received
from a source
system into data
management or
SQL requests on the
target (or remote)
system.

338

30. TDK Tokyo English: Tokyo
31. TDL Denki Electric and
Kagaku Chemicals. a Japanese
company which
manufactures
electronic materials,
electronic components,
and recording and
data-storage media

Time Software detecting
Differential account takeovers, new
Linking account fraud and e-
commerce fraud

32. TDM Time A data, voice and
Division video communications
Multiplexing technique that
multiplexes several
low-speed signals into
one high-speed
transmission channel
by allocating brief,
interleaved time
periods to each signal.

339

33. TDR Time Domain Used to pinpoint
34. TE Reflectometry flaws and problems in
underground and
aerial wire, cabling,
and fiber optics.

Traffic TE is Cisco MPLS

Engineering term

35. TEC Tivoli An IBM system and
Enterprise network monitoring
Console product. TEC collects
event information
from a variety of
system and
application resources,
correlates the
information to
determine detect
problems and
performs automated
problem resolution.

340

36. TEC Thermoelectric Thermoelectric
37. TED
Cooler Cooler
38. TED
39. TED Technology ED is a global set of
40. TED Entertainment conferences owned
and Design by the private non-
profit Sapling
Foundation, formed
to disseminate "ideas
worth spreading."

Tiered TED is Novell
Electronic ZENWorks term
Distribution

Torrent TED stands for
Episode Torrent Episode
Downloader Downloader

Tunnel TED is Cisco term
Endpoint
Discovery

341



1. U2F Undetectable A major issue for
and information technology
Untraceable is fraud made possible
Fraud by technology and
electronic transactions,
especially crimes that
leave no trace and no
audit trail.

2. UA Upgrade A Microsoft software

Advantage license program.

3. UAC User A security technology
Account in Windows Vista that
Control reduces exposure to
attacks by running in
nonadministrative
mode, even when
logged on with an
administrative account

342

3. UART universal A module composed
4. UAT asynchronous of a single integrated
receiver- circuit, which
transmitter contains both the
receiving and
transmitting circuits
required for
asynchronous serial
communication.

User Normally a suite of
Acceptance documented tests,
Test derived from a
requirements or
functional
specification and
agreed with a client,
that when
successfully
completed indicate
that a produced
product is acceptable

5. uauth user user authentication
authentication

343

6. UBE unsolicited a formal term for spam.
bulk email The most common type
of UBE is UCE: bulk
email that is trying to
get the recipient to buy
some product or
service.

7. µBGA Micro Ball Next to bare die, uBGA
/ Grid Array is the smallest of the

uBGA chip-scale packaging
options.

8. UBR Undefined An economical class of
Bit Rate QoS on a moment-to-
moment basis, without
guaranteeing service
levels.

344

9. UC Unified UC is a direct
10. UC2 communications result of the
11. UC&C convergence of
communications
and applications.
Differing forms
of
communications
historically have
been developed

Unified IBM portfolio
Communications based on Lotus
and Notes messaging,
Collaboration Sametime
collaboration
products and the
Eclipse client
framework

Anti-Aliasing Mashups,
consoles, APIs
345 and packaged
clients will
enable other
collaboration
services
toblended into
a mix

12. UCB unit A control block in
control common storage that
block describes the
characteristics of a
particular I/O device
on the operating
system

13. UCC Uniform Data Model standard
Code
Council

14. UCCW Ultimate versatile Android
custom widgets
widget

346

15. UCD Unicode Consists of a number
Character of data files listing
Database character properties
and related data along
with a documentation
file

16. UCE Unsolicited Electronic junk mail
Commercial advertising a product,
Email service, or web site,
where the recipient did
not request to receive
the message.

17. UCM Unified A Change
Change Management (CM)
Management concept implemented
by Rational Software
Corporation (acquired
by IBM)

347

18. UCM Unified Cisco next-generation
Computing data center platform
System accelerates the delivery
of new services simply,
reliably, and securely
through end-to-end
provisioning and
migration support.

19. UCP Ubuntu first introduced in May
Certified 2006 is a computer
Professional based examination
about the Ubuntu
operating system. It is
administered by the
LPI foundation.

20. UCS Universal A character set using
Character 16-bit character codes,
Set also called ISO 10646.
UCS is a standard
defined by the ISO and
IEC

348

21. uDAPL User Direct a specification and
22. UDF Access a library that
Programming defines a single set
Library of user APIs for all
RDMA-capable
transports.

Universal The volume
Disk Format format of DVD
disks.

23. UDLP UniDirectional This protocol is
Link Protocol used by
inexpensive,
receive only
antennas to receive
data via satellite.

349

24. UDMA Ultra A protocol developed
25. UDO DMA by Quantum
26. UDP (Ultra Corporation and Intel
Direct for disk drives that
Memory enables the computer
Access) to take advantage of
the fast Ultra ATA
Ultra disk drives.
Density
Optical Optical storage
technology that
User increases capacities by
Datagram using an extremely
Protocol focused blue laser to
write and read data.

It is part of the
TCP/IP suite of
protocols used for
data transferring. UDP
is a known as a
"stateless" protocol,
meaning it doesn't
acknowledge that the
packets being sent
have been received.

350

27. UDRP Uniform defines how disputes
Dispute over domain name
Resolution registrations are
policy resolved in the global
top-level domains
(.biz, .com, .info,
.name, .net, and .org as
well as .aero, .coop,
and .museum).

28. UFS Unix File The default disk-based
System file system under the
Unix operating system

29. UGC User UGC covers a range of
generated media content
content available in a range of
modern
communications
technologies.

351

30. UGS Unsolicited one of the five QoS
Grant service types defined in
Service the IEEE 802.16
WiMAX. The 802.16
protocol supports five
types of QoS.

31. UHF Ultra High Electromagnetic
Frequency frequencies in the range
of 300 to 3000
megaherz. Used for
some television and
radio transmission.

32. UHV Ultra High a term meaning any
Voltage amount of voltage in
excess of 800,000 volts.

352

33. UI user The connection
interface between the user and a
computer's hardware
or software that
permits the user to
work productively
with a system or a
program.

33. UIA Unified Information Access
Information provides total insight
Access based on aggregating
all types of data and
content in one
universal index

34. UL Underwriters a world leader in
Laboratories product safety testing
Inc. and certification, is
working with HP on a
two-year project to
standardize processes
and technologies.

353

35. ULH ultra-long- 100Gbps optical system
haul

36. ULV Ultra Low A class of processors
Voltage that are deliberately
under clocked to use
less power at the
expense of performance.

37. UM Unified UM is an extension of
messaging voice mail that enables
subscribers to access
and manage messages,
such as voice mail, fax
mail and e-mail, from a
single-user interface.

354

38. UMA Unified- rovides access to GSM
Memory and GPRS mobile
Architecture services over
unlicensed spectrum
technologies, including
Bluetooth and 802.11

39. UMA Upper In a PC, the memory
Memory area between 640K and
Area 1024K. Under DOS,
this memory area is
ordinarily designated
for use by the ROM
BIOS and display

40. UMB Ultra the brand name for the
Mobile project to improve the
Broadband CDMA2000 mobile
phone standard for next
generation applications
and requirements.

355

41. UMC ultra The radical adoption of
modular modular principles
computing based on using
commodity
components in a
standardized
architecture in order to
simplify

42. UMID Unique A methodology for
Material materials suppliers to
IDentifier code a material that
only THEY supply.

43. UML Unified A standardized visual
Modeling notation for
Language communication about
system specifications
and design details.

356

44. UMS Unfied a technology that
Messaging should allow users
Systems to access messages
sent in different
formats through one
single interface

45. UMTS Universal .
Mobile UMTS is envisioned
Telecommunic as the successor to
ation System Global System for
Mobile
Communications
(GSM).

46. UNI User-to- ATM User Network
Network Interface is an ATM
Interface Forum specification
of the interface
between an ATM
user device and the
ATM network.

357

47. Unicode UNIversal A 16-bit character set

CODE defined by ISO

10646.

48. UOL Universo UOL is a Brazilian
Online online service
provider and ISP.

49. UOW unit of In advanced program-
work to-program
communications, the
amount of processing
that is started directly
or indirectly by a
program on the
source system.

358

50. UPA user The area within the
printable valid printable area
area (VPA) where user-
generated data can print
without causing an
exception condition.

51. UPC Universal The bar code printed on
Product retail merchandise, it
Code contains the vendor's
identification number
and the product
number.

52. UPnP Universal Plug and Play describes
Plug and devices that work with
Play a computer system as
soon as they are
connected.

359

53. UPS Uninterruptib In the technology
le Power world, UPS is more
Supply than just a brown
shipping company.

54. UPT Universal a set of standards
Personal developed by the
Telecommun CCITT for wireline
ications personal
communications.

55. URC Utility Ready HP's integrated IT
Computing compute capacity
acquisition program
that includes a
portfolio of
deployment, support,
availability, and
management services.

360



1. V.35 An ITU interface
specification for data
transmitted at 48 kilobits
per second.

2. v- Video mail Sending video clips as
mail attachments to e-mail
messages.

3. VH Vertical used to determine
and straight-line mileage
horizontal between locations. The
grid points junction point is the
called V and H
coordinate.

361

4. V2P Virtual to refers to the migration
5. VA physical of an operating system
(OS), application
virtual programs and data from
assistant a virtual machine or
disk partition to a
computer's main hard
disk.

a conversational,
computer-generated
character that
simulates a
conversation to deliver
voice- or text-based
information to a user
via a Web, kiosk or
mobile interface.

6. VADP vStorage VMware's replacement
APIs for for VCB, integrates
Data backup functionality
Protection via vStorage APIs

362

7. VAIO Video Sony notebook brand
8. VAN Audio
Integrated VANs are public
9. VAR Operation networks that add value
Value- to the basic
Added communication
Network provided by common
carriers by offering
value- specialized services
added such as access to
reseller commercial data bases,
E-mail and video
conferencing.

An organization that
buys equipment from a
vendor at a discount,
adds value (such as
application software
packaged and sold with
underlying system
software) and remarkets
it.

363

10. VAROS VAriable Scanner technology
Refraction by Canon
Optical
System

11. VATH Visual, Modalities in Avatar-
Auditory, based Real Time
Tactile, Distributed Virtual
Haptic Environment.

12. VAX Virtual The Digital
Address architecture that was
Extension the company's
principal product line
prior to the Alpha.
VAX was
enormously
successful in DEC's
traditional
engineering and
scientific customer
base.

364

13. VB Visual software product
14. VBA Basic developed by
Microsoft. Its purpose
Virtual is to bring
backup programming down to
appliance a drag-and-drop level to
speed up development
cycles.

VBA is a virtual
machine used to back
up other virtual
machines

15. vBNS very high- The next generation
speed Internet. Sponsored by
Backbone the NSF and
Network implemented by MCI,
Service vBNS presently
supports data transfer
rates of 622Mbs and is
expected to eventually
support 2.5Gbs speeds.

365

16. VBR variable bit QoS class defined by
rate the ATM Forum for
ATM networks. VBR
is subdivided into a
real time (RT) class
and non-real time
(NRT) class.

17. VBUG Voice A group within the
Browser W3C developing voice
Usability portal usability
Group guidelines and best
practices.

18. VBX Visual A software module
Basic that can be used in
Custom many different
Control applications. VBXs
were originally created
to to make it easy to
develop Windows
applications with
Visual Basic

366


Click to View FlipBook Version