37. BCM Business Automates the
1. ADJ AdjeCctovnatinutiEtyxampcloeldlaebfoinraittiiovne
1. A: DJ AEAxddpjjeieMrcectvatvnaaagemEAASSEeaaSEAxxddnddaaawwxdtaammdawwkkamppwwatrpwkddlloenpleeaaaawsaddwwddlceddneaarkkaweeddewdfddrffssaockriissedaatinnrhdetccfsiii,cisaattnanraiigcooinirtatnneianiccloeayonelsvdieserdy
1. :ADJ
EExxppiriree EaakkkkaaEakxjjsskaaddxjjmsjddkkadjaamdpkobdbsslaaapeuipesseslaatpdaeirrwwnueiaabdefbtddwiiuselonkkistfsdnieaaitahndskkkineowwiattddtnhokijjaoddIawttTnnsshcjdedasn
:
2. EXP
22.. EEXXPP
recovery teams.
38. BCOCA Bar Code An architected
Object collection of
Content constructs used to
Architecture interchange and
present bar code
data.
38
24
39. BCP Best Means that a certain
1. ADJ ACdujercretvnat Exmamanpnleerdoeffipnrioticoeneding is
1. A: DJ EAASSEaaSEAxxddilAddaaonawwxdaammgdapgwwkkiamrppecwwowkddnallpeegaaaawledwwddrlrcddeaaaakkheeddmwdlddoffssktiissiedaahnnucdccfseiiseisaattaen.iimcoodiatnnotisootncopy
1. :ADJ AAPddrjajeecctctivtcvaea
EBxpulikreCopy
:
EEPxxrpopigrireream EaakkkkaakEaxdeMdjjsskaaddxnjjaamsjddkkiatvtdjcaaaamidpkrbbrssoloaaaaapesnsssloaadeeamefwwssetaedfioddSnwinenrkkQtfsdiSaapit.LnkkkiayowwirbaSttnkaisjjeosddwroenssvfjeadrnsd
420.. EBXCPP
22.. EEXXPP
41. BCP Business A broad approach to
Continuity planning for the
Planning recovery of an
enterprise's entire
business process in
event of a massive
disruption caused by
catastrophic event.
39
24
42. BCS Basic A broad approach to
1. ADJ AdCjeocntvteant Exapmlapnlneindgeffionrittihoen
1. A: DJ EAASSEaaSEAxxddddaaawwxberedaammedvnauwwkkcaetmsppwwoewkddnillrnvpeetaaaawpdeewwddlorddseraaikkfyseeddswdddeaffsspkoiiss'edaasnnrmfdccfosiieisaaattaacniinnsecooitssatinniisrvoeienn
1. :ADJ AAddSjjeeecrctvvtivacaes
Expire
:
2. EXP
22.. EEXXPP EExxppiriree EaakkkaaExjjskaddxdcjmjdkkaaidstaampkrassulsaaapetpsrlaatdaoeiwweopadfnhddwieinkkccfdiaaaitenkkkiuovwwisatneekijjndoddwtnss.bjyds
43. BCUG Bilateral kaksaIjsdnjddata
Closed communication, two
User users who have
Group bilaterally agreed to
communicate with
each other, but not
with other users.
40
24
44. BCV Business EMC's name for the
1. ADJ ACdojencttivnauanceExdamataplveodluefmineisticorneated
Volume AdbwykiwtsaSdykmdsmetrix
:
SadTaiwmdeaFwinddsearcfaeature.
2. EXP
Expire BCVs are copies of
Exaacmtipvlee ddaetfainviotilounmes
akjtdhkaatsaareawsedpkaarkatweljyds
kasajddressed from the
source volume.
45. BCX Basic To C An open source and
Translator free software, translates
BASIC to C/C++ for
compilation on various
Win32 compilers. It is a
small command line
tool that takes a BASIC
source code file and
outputs a C/C++ source
code file.
41
24
1. C- Chaos Game a handy
GREX: Representation Bioinformatics tool
Explorer for exploring the
2. C++ sequence
visualization and
pattern analysis of
biological
sequences
C Plus Plus Object-oriented
programming
language based on
C. Also, filename
extension.
3. C2A Click-to- A method for
Action implementing
cooperative portlets,
whereby users can
click an icon on a
source portlet to
transfer data to one
or more target
portlets
42
4. C&SI consulting and consulting & SI job
5. CaaS system or industry
integration
6. CAI
Communications The utilization of
as a Service enterprise-class
communications
applications and
technology (such as
IP telephony,
contact center
services and unified
communications) is
offered as a service.
Common Air A standard that
Interface defines technical
parameters for
control and
information signals
passed between a
radio transmitter
and receiver,
43
7. CAL Client A Microsoft software
8. CAMA Access license program.
License
centralized
automatic An automatic message
message accounting system that
accounting serves more than one
switch from a central
location.
9. CAPA CA a set of interactive
Productivity features and functions
Accelerator to help ease training,
navigation, use and
process adoption of
the product once it is
live and in use in the
field.
44
10. CAR committed A metric used in
11. CARP access rate network quality-of-
service agreements to
classify and limit
customer traffic and
manage excess traffic
according to the
network policy.
Common Allows multiple hosts
Address on the same local
Redundancy network to share a set
Protocol of IP addresses among
them
12. cB C Beautifier A tool for tidying the
syntax of source code.
45
13. CBC cipher A method of reducing
14. CBQ block repetitive patterns in
chaining ciphertext by
performing an
exclusive-OR operation
on each 8-byte block of
data
Class-Based A public domain QoS
Queuing methodology for
classifying packets and
queuing them according
to criteria defined by an
administrator
15. CBP Certifed IEEE program focuses
Biometrics on the relevant
Professional knowledge and
skills needed to apply
biometrics to real-world
challenges and
applications.
46
16. cbr Comic Book CBR files rarred file
files Archive archives with their
extension changed
17. CC from .rar to .cbr
18. CCA closed A service that
captioning transmits text captions
for a television
program and can be
displayed on any
modern television
with a display size
measuring greater
than 13 inches (33
cm) diagonally.
Citrix Entry to mid level
Certified certification for IT
Administrator professionals who
want to “demonstrate
product expertise on
Citrix platform
products
47
19. CCAs composite case management and
20. CCC content front-end access for
applications field personnel to
complex back-end
applications
Clear A characteristic of a
Channel transmission path in
Capability which the bit position
allocated for customer
data may represent any
combination of zeros
and ones.
21. CCD Charge a solid-state chip
Coupled containing a series of
Device tiny, light-sensitive
photosites and was
originally developed by
Honeywell .
48
22. CCF call control The network
23. CCL function intelligence that
provides
24. CCNA call/connection
processing and
control.
Communications a file that dialers
Control and browsers use
Language to control the
modem
connection.
These files
should not be
changed except
by the supplied
editor.
Cisco Certified Cisco Certified
Network Network
Associate Associate
49
25. CCP Certified The award for
26. CCPM Computer successful
Professional completion of a
comprehensive
examination on
computers. Also
Certificate in
Computer
Programming.
Critical Lean methodology
Chain for doing projects
Project
Management
27. CCSA common An arrangement in
control which switching for a
switching private network is
arrangement provided by one or
more common
50 control switching
systems.
28. CCSE Checkpoint Checkpoint
29. ccTLD Certified Certification. Stage 2
Security after completing the
Expert CCSA
country an Internet top-level
code Top- domain generally used
Level or reserved for a
Domain country or a dependent
territory.
30. CCTV Closed- A networked camera
Circuit used for surveillance,
Television process monitoring
and other purposes.
51
31. CD Compact An optical form of
32. CDC Disc storage media, typically
used for audio and
call data software programs.
channel
The logical link
between the device
performing an
electronic surveillance
access function and the
LEA (law enforcement
agency) that primarily
carries call-identifying
information.
33. CDDI Copper An American National
Distributed Standards Institute
Data specification for
Interface transmitting FDDI
signals over copper
media. CDDI runs on
both shielded and
unshielded twisted-pair
cabling.
52
34. CDE common popular commercial
35. CDFS desktop window manager
36. CDMA environment (and much more -- as
its name touts, it is
more of a desktop
environment) that
runs under X-
Windows. Free work-
alike versions are
also available.
compact Controls access to the
disc file contents of CD-ROM
system drives. Based on the
ISO 9660 Standard
(but extends it to
allow long and
double-byte
filenames).
Code A digital cellular
Division phone service that
Multiple offers up to 20 times
Access more call-handling
capacity than
53 conventional cellular
systems by assigning
a special electronic
code to each signal.
37. CDN content- A network
38. CDO delivery specializing in the
network delivery of streaming
39. CDPD audio and video.
care A category of
delivery enterprises that use
organization healthcare information
systems. CDOs are
Cellular organizations, such as
Digital hospitals and
Packet Data physician practices,
whose primary
mission is to deliver
healthcare-related
services.
A packet data protocol
standard for sending
wireless data, it was
developed for use on
cellular phone
frequencies. It
transmits data in
packets on unused
cellular channels (in
the 800MHz to 900
MHz range).
54
40. CD- compact A version of the
ROM disc read- standard CD intended
only to store general-purpose
41. CDV memory digital data. CD-ROMs
can store a wide variety
of data, such as music,
video and graphics.
Cell Delay A QoS parameter that
Variation measures the difference
between the transfer
delay of a single cell
transfer delay and the
expected transfer delay.
42. CE Customer A router that is part of a
router edge router customer network and
that interfaces to a
provider edge (PE)
router.
55
43. CEBP communication- key capability
44. cellphone enabled of UC is that it
45. CEM business offers a method
process to integrate
communication
functions
directly with
business
applications
Cellular A mobile,
Telephone wireless
telephone that
communicates
with a local
transmitter
using a short-
wave analog or
digital
transmission.
customer Aligning
experience executive
management involvement,
operational
56 processes,
organizational
structure, and
technology
infrastructure
46. CEMF Cisco Collects fault
Element information from
Management various
Framework sources.Network
elements, such as
routers or switches,
may report fault
conditions as SNMP
traps, Syslog
messages
47. CEPS Common A standard endorsed
Electronic by Visa and
Purse American Express for
Standard electronic purse (e-
purse) or stored-value
applications on smart
cards.
48. CER Corporate Tool that allows IT
Error Administrators to
Reporting manage error reports
and error messages
57 created by the
Windows Error
Reporting client
(WER) in Windows
XP and Windows
Server 2003
49. CEVA content- CEVAs typically help
50. CFB enabled to automate complex
51. CG vertical processes that
application previously required
workers to sort
through paper
documents and other
forms of content
manually.
Ciphertext a mode of operation
feedback for a block cipher. In
contrast to the CBC
mode, which encrypts
a set number of bits of
plaintext at a time, it is
at times desirable to
encrypt and transfer
some plaintext values
instantly one at a time
Computer graphics created using
Graphics computers and, more
generally, the
representation and
manipulation of
pictorial data
computer.
58
52. CGMP Cisco Group A form of IGMP
53. chat Multicast snooping that lets
54. CIDR Protocol the switch send
multicasts only to
the ports on a
VLAN that are
participating in the
multicast
conversational A form of
hypertext interactive online
access typewritten
technology communication that
allows participants
("members") to
engage in text-
message
conferencing, via
real-time computer
networking
Classless A protocol that
Internet allows for variable-
Domain length addresses
Routing that allows for
more- and less-
59 specific routing
information.
1. DA Destination Information sent in
2. DAA Address forward direction
indicating address of
called station or
customer.
Distributed under design by
Application Hewlett-Packard and
Architecture Sun. A distributed
object management
environment that will
allow applications to be
developed independent
of operating system,
network or windowing
system.
3. DAB Digital Digital radio broadcast,
Audio providing better quality
Broadcast and a greater number of
channels than traditional
(analogue) radio.
60
4.. DACS: Digital A time-slot switch
5.. DAE Access and that allows T1 or E1
Cross lines to be remapped
6. Daemon Connect electronically at the
System DS-0 (64 Kbps) level.
Also called DCS or
Disk Array DXS.
Enclosure The DAE is a JBOD
(Just a Bunch Of
Disk And Disk) enclosure
Execution without a storage
MONitor processor (SP). The
DAE supports up to
10 Fibre Channel
drives per enclosure
and is connected by
dual Fibre Channel
loops into the DPE.
Disk And Execution
MONitor software
61
7. DAFS Direct an advanced
Attached methodology of a
File particular network data
System storage method.
8. DAML DARPA A language currently in
Agent development for
Markup presenting information
Language on the that will allow
information objects to
be tagged in a way that
allows software
applications, computer
agents, and virtual
assistants.
9. DAP Directory A derivative of the
Access X.500 DAP standard,
Protocol postulated by the ISO
many years ago. DAP
and X.500 remained
unused for many years
because of the
complexity of the DAP
access protocol.
62
10. DARPA Defense the progenitor of the
Advanced Internet. DARPA is
Research where it all began.
Project
Agency
11. DASH Desktop Suite of specifications
12. DAST and mobile that takes full
Architecture advantage of the Web
for System Services for
Hardware Management (WS-
Management)
specificationdelivering
standards-based Web
services management
for desktop and
mobile client systems
Dynamic technologies designed
Application to detect conditions
Security indicative of a security
Testing vulnerability in an
application in its
running state
63
13. DAVID Digital Digital Audio Video
14. DB2 Audio Interactive Decoder
Video
15. DB9 Interactive
Decoder
Database 2 IBM's RDBMS
offering, originally
D sub- built for Multiple
miniature 9 Virtual Storage
(MVS) systems. It
uses SQL as its data
manipulation and
definition language.
IBM has released
versions of DB2 for
several other
operating systems,
such as Windows and
Unix.
Also called Dsub9, a
9 pin connector
shaped like the leter
‘D’. They are used to
connect serial devices
together with a serial
cable.
64
16. dBm decibels used to measure signal
milliwatt strength on telephone
lines
17. DCB Data a set of IEEE industry
18. DCBU Center standards that delivers
Bridging end-to-end congestion
notification and quality
D-channel of service throughout
backup the network which
allows customers to
configure traffic
classes and priorities to
deliver a lossless
Ethernet fabric such as
Open FCoE.
An ISDN NFAS
configuration where
two of the T1 facilities
have a D-channel, one
of which is used for
signaling, and the other
as a backup in case the
other fails.
65
19 DCCP Datagram a minimal general
20. DCO Congestion purpose transport-
Control layer protocol that
Protocol minimizes the
overhead of packet
header size or end-
node processing as
much as possible.
Device Allows system
Configuration vendors to purchase
Overlay HDDs from different
manufacturers with
potentially different
sizes, and then
configure all HDDs
to have the same
number of sectors
21. DDL Data A language for
Definition describing data and
Language its relationships in a
database.
66
22. DDN Digital A network service
Data established in China in
Network 1994, connecting
Beijing, Tianjin,
Shanghai and other
provincial capitals. Each
post and
telecommunications
administration in China
has a department
regulating DDN service
in its region.
23. DDP Datagram In AppleTalk networks,
Delivery a protocol that provides
Protocol network connectivity by
means of connectionless
socket-to-socket
delivery service on the
internet layer.
24. DEL DELETE the DELETE key on a
computer keyboard
67
25. Demarc Demarcation The point, jack or
26. DEN Point cross connect panel,
at which ownership
or responsibility for
operating and
maintaining facilities
passes from one
party to another.
Directory term used in
Enabled conjunction with an
Network architecture and
grouping of
networking
capabilities that are
developed and
driven by a central
directory.
27. DFI Design for DFI Inc. (Design for
Innovation Innovation)
68
28. DFL design for A product design
29. DHCP logistics approach that
considers logistical
30. DHX Dynamic issues, such the
Host manner in which the
Configuration product will be
Protocol stored or transported.
A network server
Diffie- uses this protocol to
Hellman dynamically assign
Exchange IP addresses to
networked
computers. The
DHCP server waits
for a computer to
connect to it, then
assigns it an IP
address from a
master list stored on
the server.
an authentication
method used by the
Apple file service of
Mac OS X Server.
69
31. DICOM: Digital Imaging a standard for
and handling, storing,
Communications printing, and
in Medicine transmitting
information in
medical imaging.
32. DID direct inward Allows a user
33. DIIOp dial outside a
company to dial
Dominio Internet an internal
Inter-Orb Protocol extension
number without
70 needing to pass
through an
operator or an
attendant. The
dialed digits are
passed to the
PBX, which then
completes the
call.
allows external
programs to
attach to, and
manipulate
Domino
databases
34. Dirid Directory A numeric identifier
35. DIT identifier used within INF files
to represent a disk
directory.
Directory A graphical display of
Information an organization's
Tree directory structure,
sites, and servers,
shown as a branching
structure. The top-
level (root) directory
usually represents the
organization level
36. DITTO Data An IBM licensed
Interfile program that provides
Transfer, file-to-file services for
Testing and card I/O, tape, and
Operations disk devices.
71
37. DIX Digital, The first letter of the
Intel , Digital Corp, the Intel
Xerox Corp, and the Xerox
Corp, which are the
leading vendors
defined the original
Ethernet standards.
38. DKI Driver An interface between
39. DLDP Kernel the UNIX system
Interface kernel and different
types of drivers. DKI
Device consists of a set of
Link driver-defined
Detection functions that are
Protocol called by the kernel.
These functions are
entry points into a
driver.
detect the link status of
a fiber cable or twisted
72
40. DLPBC Dual Loop routing circuitry that
41. DLT Port makes it possible to
Bypass add and remove nodes
Circuitry without disrupting the
network.
Digital A magnetic tape
Linear technology that uses
Tape half-inch, single-hub
cartridges,writes 128
or 208 linear tracks,
and provides
capacities from 40
to80GB. A technology
designed by DEC and
sold to Quantum
42. DMA Direct A technique of
Memory transferring data
Access between the computer
memory and a device
on the computer bus
without the
intervention of the
microprocessor.
73
43. DMAA Discrete Discrete
Mathematics, Mathematics,
Algorithms Algorithms and
and Applications
Applications
44. DML Data a family of
45. DMS Manipulation computer languages
Language used by computer
programs or
Digital database users to
Multiplex retrieve, insert,
Systems delete and update
data in a database.
The currently most
popular Data
manipulation
language is that of
SQL, which is used
to retrieve and
manipulate data in a
Relational database.
System that
combines number of
digital circuits.
74
46. DMT Discrete an ADSL modulation
47. DNIC Multi-Tone technique that splits
bandwidth usage
data network usage into sub-
identification channels for
code maximum data
transfer. A channel is
then optimized for
modulation if certain
channels cannot
transmit data.
A 4-digit code that
specifies the X.21
call format used by a
network in its
International Data
Number to call
another station.
48. DNLC Directory Unix file cache
Name
Lookup
Cache
75
1. E Emergency telecom slang.
Phone Phones.
2. E&M recEive and Trunking arrangement
transMit generally used for two-
(or ear and way switch-to-switch or
mouth) switch-to- network
connections. Cisco's
analog E&M interface
is an RJ-48 connector
that allows connections
to PBX trunk lines (tie
lines). E&M also is
available on E1 and T1
digital interfaces.
3. E2E End-to-End Also known as "soup-
to-nuts" it is an
acronym for a sector of
the industry that
specializes in providing
end-to-end solutions.
76
4. EAB Enterprise A collection of
5. EAI Address information about
Book people, departments,
and locations in an
enterprise. Information
about people may
include telephone
numbers, mailing
addresses, and the
department in which a
person works.
Enterprise EAI is a business
application computing term for the
integration plans, methods, and
tools aimed at
modernizing,
consolidating, and
coordinating the
computer applications
in an enterprise.
6.. EAM Event Tivoli Security
Aggregation Operations Manager
Module module
77
7. EAR Emergency usually an internal
8. EASDAQ Assistance request within a
Request company for
technical assistance
by their own support
staff to assist with
an end-user
problem. Most of
these problems are
termed as BUGS by
users and by the
programmers as
undocumented
features.
European An electronic pan-
Association European stock
of exchange founded
Securities by the Belgian
Dealers Banking and
Automated Finance
Quotations Commission,
closely modeled on
78 the NASDAQ
exchange in the
United States. In
2001, NASDAQ
acquired a 58
percent stake in
EASDAQ and
9. EAT End Around Also known as a
10. EAX Test wrap test, returns
output signal to input
11. EB line
Environmental A hardware and
Audio software audio
standard developed
by Creative Labs. It
was originally used
in SoundBlaster
sound boards, and is
supported by other
companies as well
now.
Exabyte This is 2^60 bytes or
1024 petabytes.
12. EBIF Enhanced TV standard under the
Binary SelecTV brand
Interchange announced in early
Format 2010
79
13. E- E-Business Oracle's order
Business
Suite Suite management hubs.
14. EC2 Elastic Amazon EC2 allows
Compute customers to rent
15. ECHS Cloud computers on which
to run their own
Extended computer
Cylinders, applications. EC2
Heads, allows scalable
Sectors deployment of
applications by
80 providing a web
services interface
through which a
customer can create
virtual machines, i.e.
server instances, on
which the customer
can load any
software of their
choice.
Enables use of hard
drives up to 8.4 GB
in size
16. eCI eCommerce A service provider that
17. ECP integrator offers strategy,
marketing, design, and
technical services for
eBusiness. Technical
services are custom
development, commerce
package
implementation, and
application integration,
not hosting or network
services.
electronic The electronic
check presentation of check
presentment data to processing
banks. In the first ECP
phase, one bank
presents a second bank
with electronic check
information based on
the check's MICR line,
which states the correct
customer account and
the amount of the
payment.
81
18. ECS Extended An industry
Character acronym for a
19.. Enterprise Set specialized ASCII
Computer character set. The
Telephony main differences
Forum are in the control
characters and the
20. edress decimal character
representations of
decimal 128-255.
Brings together the
best industry
thinkers on the
planet to deliver on
a shared vision in
the computer
telephony industry
to allow for open
access to a
diversity of
communications
products and
services.
e-mail edress
address
82
21. EDS Electronic A multibillion-
22. EGL Data Systems dollar system
23. EGNOS integration and IT
services firm,
founded in 1962
and headquartered
in Plano, Texas.
Acquired by HP.
Enterprise A high-level
Generation language that
Language allows developers
to focus on
European business logic as
Geostationary they create
Navigation complex business
Overlay applications for
Service deployment in any
of several
environments,
including the Web.
a satellite based
augmentation
system developed
by the European
Space Agency.
83
24. EGP Exterior A reachability routing
25. EHR Gateway protocol used by
Protocol gateways in a two-level
26.. EIRP internet. EGP is used in
. Electronic the Internet core
Health system.
Record n electronic record of
health-related
Effective information on an
Isotropic individual that
Radiated conforms to nationally
Power recognized
interoperability
standards and that can
be created, managed,
and consulted by
authorized clinicians
and staff across more
than one health care
organization.
The effective power
radiated from a
transmitting antenna
when an isotropic
radiator is used to
determine the gain of
the antenna
84