Louis handbags replica prints are gucci replica handbags, and recently have a hermes replica handbags. The early replica handbags prints were symmetrical on both hermes replica .
  Active TopicsActive Topics  Display List of Forum MembersMemberlist  Search The ForumSearch  HelpHelp
  RegisterRegister  LoginLogin
IT Encyclopedias (Forum Locked Forum Locked)
 Toronto Computer Forum : IT Encyclopedias
Subject Topic: Computer Word Dictionary Post ReplyPost New Topic
Message << Prev Topic | Next Topic >>
Admin Group
Admin Group

Joined: Oct 01 03
Online Status: Offline
Posts: 20359
Posted: Aug 12 04 at 8:15am | IP Logged Quote forumadmin

Last Updated: August-20-2004

AIS Automated Information System
ARP Address Resolution Protocol

BPM Business Process Modeling

CSS Content Storage Services

DMZ (pronounced as separate letters) Short for demilitarized zone, a computer or small subnetwork that sits between a trusted internal network, such as a corporate private LAN, and an untrusted external network, such as the public Internet.
Typically, the DMZ contains devices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers, SMTP (e-mail) servers and DNS servers.
The term comes from military use, meaning a buffer area between two enemies.
DTS Data Transformation Services
DVI (pronounced as separate letters) (1) Short for Digital Visual Interface, a digital interface standard created by the Digital Display Working Group (DDWG) to convert analog signals into digital signals to accommodate both analog and digital monitors. Data is transmitted using the transition minimized differential signaling (TMDS) protocol, providing a digital signal from the PC's graphics subsystem to the display. The standard specifies a single plug and connector that encompass both the new digital and legacy VGA interfaces, as well as a digital-only plug connector. DVI handles bandwidths in excess of 160 MHz and thus supports UXGA and HDTV with a single set of links. Higher resolutions can be supported with a dual set of links.
(2) Short for Digital Video Interactive, a now-defunct technology developed by General Electric that enables a computer to store and display moving video images like those on television. The most difficult aspect of displaying TV-like images on a computer is overcoming the fact that each frame requires an immense amount of storage. A single frame can require up to 2MB (megabytes) of storage. Televisions display 30 frames per second, which can quickly exhaust a computer's mass storage resources. It is also difficult to transfer so much data to a display screen at a rate of 30 frames per second.
DVI overcomes these problems by using specialized processors to compress and decompress the data. DVI is a hardware -only codec (compression/decompression) technology. A competing hardware codec, which has become much more popular, is MPEG. Intel has developed a software version of the DVI algorithms, which it markets under the name Indeo.
(3) Short for Device Independent, a file format used by the TeX typography system.

ERP Enterprise Resource Planning
ETL Extraction Transformation and Loading

GSM/GRPS Global system for Mobile Commubications/General Packet Radio Service

LEAP Lightweight Extensible Authentication Protocol

malware (malīwãr) (n.) Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse. 

ODBC (pronounced as separate letters) Short for Open DataBase Connectivity, a standard database access method developed by the SQL Access group in 1992. The goal of ODBC is to make it possible to access any data from any application, regardless of which database management system (DBMS) is handling the data. ODBC manages this by inserting a middle layer, called a database driver , between an application and the DBMS. The purpose of this layer is to translate the application's data queries into commands that the DBMS understands. For this to work, both the application and the DBMS must be ODBC-compliant -- that is, the application must be capable of issuing ODBC commands and the DBMS must be capable of responding to them. Since version 2.0, the standard supports SAG SQL. 

OEM (pronounced as separate letters) Short for original equipment manufacturer, which is a misleading term for a company that has a special relationship with computer producers. OEMs buy computers in bulk and customize them for a particular application. They then sell the customized computer under their own name. The term is really a misnomer because OEMs are not the original manufacturers -- they are the customizers. 
OMG Object Management Group
(1) (pronounced as separate letters) Short for Open System Interconnection, an ISO standard for worldwide communications that defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.
At one time, most vendors agreed to support OSI in one form or another, but OSI was too loosely defined and proprietary standards were too entrenched. Except for the OSI-compliant X.400 and X.500 e-mail and directory standards, which are widely used, what was once thought to become the universal communications standard now serves as the teaching model for all other protocols.
Most of the functionality in the OSI model exists in all communications systems, although two or three OSI layers may be incorporated into one.
OSI is also referred to as the OSI Reference Model or just the OSI Model.
See a breakdown of the seven OSI layers in the Quick Reference section of Webopedia.
(2) Abbreviation for the Open Source Initiative.

POE Power over Ethernet

RADIUS Remote Authentication Dial-in User Service
RAID Redundant Array of Independent (rād) Short for Redundant Array of Independent (or Inexpensive) Disks, a category of disk drives that employ two or more drives in combination for fault tolerance and performance. RAID disk drives are used frequently on servers but aren't generally necessary for personal computers.
 There are number of different RAID levels:
 Level 0 -- Striped Disk Array without Fault Tolerance: Provides data striping (spreading out blocks of each file across multiple disk drives) but no redundancy. This improves performance but does not deliver fault tolerance. If one drive fails then all data in the array is lost.
 Level 1 -- Mirroring and Duplexing: Provides disk mirroring. Level 1 provides twice the read transaction rate of single disks and the same write transaction rate as single disks.
 Level 2 -- Error-Correcting Coding: Not a typical implementation and rarely used, Level 2 stripes data at the bit level rather than the block level.
 Level 3 -- Bit-Interleaved Parity: Provides byte-level striping with a dedicated parity disk. Level 3, which cannot service simultaneous multiple requests, also is rarely used.
 Level 4 -- Dedicated Parity Drive: A commonly used implementation of RAID, Level 4 provides block-level striping (like Level 0) with a parity disk. If a data disk fails, the parity data is used to create a replacement disk. A disadvantage to Level 4 is that the parity disk can create write bottlenecks.
 Level 5 -- Block Interleaved Distributed Parity: Provides data striping at the byte level and also stripe error correction information. This results in excellent performance and good fault tolerance. Level 5 is one of the most popular implementations of RAID.
 Level 6 -- Independent Data Disks with Double Parity: Provides block-level striping with parity data distributed across all disks.
 Level 0+1 – A Mirror of Stripes: Not one of the original RAID levels, two RAID 0 stripes are created, and a RAID 1 mirror is created over them. Used for both replicating and sharing data among disks.
 Level 10 – A Stripe of Mirrors: Not one of the original RAID levels, multiple RAID 1 mirrors are created, and a RAID 0 stripe is created over these.
 Level 7: A trademark of Storage Computer Corporation that adds caching to Levels 3 or 4.
 RAID S: EMC Corporation's proprietary striped pairty RAID system used in its Symmetrix storage systems.
RFID Radio Frequency Identification
ROI Return On Investment
Runtime (runītīm erī&r) (n.) An error that occurs during the execution of a program. In contrast, compile-time errors occur while a program is being compiled. Runtime errors indicate bugs in the program or problems that the designers had anticipated but could do nothing about. For example, running out of memory will often cause a runtime error.
Note that runtime errors differ from bombs or crashes in that you can often recover gracefully from a runtime error.

SCSI (skuīzē) Short for small computer system interface, a parallel interface standard used by Apple Macintosh computers, PCs, and many UNIX systems for attaching peripheral devices to computers. Nearly all Apple Macintosh computers, excluding only the earliest Macs and the recent iMac, come with a SCSI port for attaching devices such as disk drives and printers.
SCSI interfaces provide for faster data transmission rates (up to 80 megabytes per second) than standard serial and parallel ports. In addition, you can attach many devices to a single SCSI port, so that SCSI is really an I/O bus rather than simply an interface.
Although SCSI is an ANSI standard, there are many variations of it, so two SCSI interfaces may be incompatible. For example, SCSI supports several types of connectors.
While SCSI has been the standard interface for Macintoshes, the iMac comes with IDE, a less expensive interface, in which the controller is integrated into the disk or CD-ROM drive. Other interfaces supported by PCs include enhanced IDE and ESDI for mass storage devices, and Centronics for printers. You can, however, attach SCSI devices to a PC by inserting a SCSI board in one of the expansion slots. Many high-end new PCs come with SCSI built in. Note, however, that the lack of a single SCSI standard means that some devices may not work with some SCSI boards.
The following varieties of SCSI are currently implemented:
SCSI-1: Uses an 8-bit bus, and supports data rates of 4 MBps
SCSI-2: Same as SCSI-1, but uses a 50-pin connector instead of a 25-pin connector, and supports multiple devices. This is what most people mean when they refer to plain SCSI.
Wide SCSI: Uses a wider cable (168 cable lines to 68 pins) to support 16-bit transfers.
Fast SCSI: Uses an 8-bit bus, but doubles the clock rate to support data rates of 10 MBps.
Fast Wide SCSI: Uses a 16-bit bus and supports data rates of 20 MBps.
Ultra SCSI: Uses an 8-bit bus, and supports data rates of 20 MBps.
SCSI-3: Uses a 16-bit bus and supports data rates of 40 MBps. Also called Ultra Wide SCSI.
Ultra2 SCSI: Uses an 8-bit bus and supports data rates of 40 MBps.
Wide Ultra2 SCSI: Uses a 16-bit bus and supports data rates of 80 MBps. 

(serīver) (n.) A computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files. Any user on the network can store files on the server. A print server is a computer that manages one or more printers, and a network server is a computer that manages network traffic. A database server is a computer system that processes database queries.
Servers are often dedicated, meaning that they perform no other tasks besides their server tasks. On multiprocessing operating systems, however, a single computer can execute several programs at once. A server in this case could refer to the program that is managing resources rather than the entire computer.

Also see the Server Types page in the Quick Reference section of Webopedia for a comparison of server types.

SIM Service Impact Manager
SMTP (pronounced as separate letters) Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application. 

SSL Secure Sockets Layer(pronounced as separate letters) Short for Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL works by using a private key to encrypt data that's transferred over the SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https: instead of http:.
Another protocol for transmitting data securely over the World Wide Web is Secure HTTP (S-HTTP). Whereas SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely, S-HTTP is designed to transmit individual messages securely. SSL and S-HTTP, therefore, can be seen as complementary rather than competing technologies. Both protocols have been approved by the Internet Engineering Task Force (IETF) as a standard.

TCP/IP (pronounced as separate letters) Short for Transmission Control Protocol/Internet Protocol, the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks. Even network operating systems that have their own protocols, such as Netware, also support TCP/IP. 
Telnet (telīnet) (n.) A terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. This enables you to control the server and communicate with other servers on the network. To start a Telnet session, you must log in to a server by entering a valid username and password. Telnet is a common way to remotely control Web servers. 

UML Unified Modeling Language

VOIP Voice Over IP
VPN (pronounced as separate letters) Short for virtual private network, a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. 

VSTS Visual studio Team system

World Wide Web Consortium (W3C)

Edited by forumadmin on Aug 20 04 at 7:06am
Back to Top View forumadmin's Profile Search for other posts by forumadmin

Sorry, you can NOT post a reply.
This forum has been locked by a forum administrator.

  Post ReplyPost New Topic
Printable version Printable version

Forum Jump
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot delete your posts in this forum
You cannot edit your posts in this forum
You cannot create polls in this forum
You cannot vote in polls in this forum

Powered by Web Wiz Forums version 7.7
Copyright ©2001-2011 Web Wiz Guide

This page was generated in 0.2656 seconds.