Glossary extracted starting with automatic seeds, with BOW for the domain com and language EN

p2xPhysical-to-anything
archival qualityA term used to describe materials that retain their original characteristics without loss of quality over an indefinite period of time
fault toleranceA design method that ensures continued systems operation in the event of individual failures by providing redundant system elements.
terminatorA small device designed to dampen electrical signals reflected from the ends of a SCSI cable
disaster preparedness and responseA range of activities aimed to reduce the risk of damage that might occur to records as a result of any disaster situation
migrationThe act of moving records from one system to another while maintaining their authenticity, integrity, reliability and usability
rain barrelA barrel used as a cistern to hold rainwater.
boolean searchA search formed by joining simple terms with 'and', 'or' and 'not' for the purpose of limiting or qualifying the search.
replicationThe act of creating a copy of a malicious program's code, usually in order to infect a new target, or distribute a copy to a new computer system
histogramA bar graph analysis tool that can be used to identify contrast and dynamic range image problems
foundationInformation that does not change from layer to layer
topList processes running on the system
cfmCubic feet per minute, the measure of air flow, representing how much air is displaced in 1 minute.
electronic data interchangeEDI is the structured transmission of data between organizations by electronic means
macro lensA lens that provides continuous focusing from infinity to extreme close-ups, often to a reproduction ratio of 1:2 (half life-size) or 1:1 (life-size).
hosting providerOffer various services to merchants and other service providers
on-demand scannerAn anti-virus program that is started manually or to a specific time schedule.
greenwashingGreenwashing is the practice of making an unsubstantiated or misleading claim about the environmental benefits of a product, service, technology or company practice
exStart Vim in ex mode
confidentialityA function of cryptography
i2vImage-to-virtual
retention periodThe length of time after the disposal trigger that a record must be maintained and accessible
organizationThe entity named or identified in a Certificate in the Organizational Name field that has purchased a Certificate
recipientn
availabilityThe percentage or amount of scheduled time that a computing system provides application service.
request for tenderA published notice inviting businesses that satisfy the conditions for participation to submit a tender in accordance with the requirements of the request for tender and other procurement documentation.
credit card processorsCompanies that provide online or real-time processing services.
adaptive space subdivisionSpace subdivision refers to the process of breaking up the scene space into many small regions
interchange feeIs the fee that a merchant's bank (the "acquiring bank") pays a customer's bank (the "issuing bank") when merchants accept payment cards.
merged thesaurusA single alphabetical list of both general administrative and organisation-specific terms that is used to classify records.
timelineGraphical display used in editing applications to display parts of a video or audio recording in relation to time
life-cycle records managementA model for the management of records modelling the life of a record on that of living organisms
p2iPhysical-to-image
annex ii countriesAnnex II of the UNFCCC includes all original OECD member countries, but not the countries with economies in transition
crontabSchedule a command to run at a later time
root certificateRoot Certificate is a self-signed certificate issued form root level Certificate Authority
social-norms marketingThe science of persuading people to go along with the crowd
cipherCipher is an algorithm of encryption- decryption.Back To Top
1024 and 2048-bit encryptionKey size or key length measured in bits
pointMove the mouse to place the arrow pointer on an item.
splash pageA glitzy entry page that offers few options to the user
semiconductorIntegrated circuit on a chip
splitSplit a file into fixed-size pieces
viewsSelective presentations of one or more tables (or other views), showing both their structure and their data.
glossaryTo access all the items in the course glossary, click the Show All Terms button, below.
propagation The act of creating a copy of a malicious program's code, usually in order to infect a new target, or distribute a copy to a new computer system
complianceThe act, specific to cap-and trade schemes, of surrendering the required amount of allowances, or some combination of allowances and offsets, to cover an entity’s emissions
packetSections in which message or data are divided to transfer it over a network.
dipole antennaA type of antenna commonly used with wireless networking devices
content filterContent filter is a type of screening mechanism based on analysis of the content to be passed, rather than its source, behavior or other criteria
dynamic attack surfaceincreasing an adversary
quotactlSet disk quotas
multi-functionalSomething that serves more than one purpose
fsckFilesystem consistency check and repair
digital repositoryA device on which digital records and their associated metadata are stored.
sittSummer Institute on Teaching and Technology
redactionIn an
guid(1) Globally Unique IDentifier
key/pen drivePortable memory device, designed to plug into a PC's USB port and act as a removable drive
adsl2+Asymmetric Digital Subscriber Line 2 plus (ADSL2+) is a revised version of ADSL2 that further increases speeds by increasing the frequencies used on the copper line.
permanent recordsSee: Archives (1)
record categoryA subdivision of the record classification scheme, which may be further subdivided into one or more lower-level record categories
rmagickA
certificate authorityA service that issues a certificate after verifying the identity of the person or entity the certificate is intended to identify
spywareA type of malware that gathers information from your computer activities and sends it to an unknown source without your knowledge
energy management systemAn energy management system (EMS) is a system of computer-aided tools used by operators of electric utility grids to monitor, control, and optimize the performance of the generation and/or transmission system
circular reasoningSee "reasoning, circular."
off-site storageA general term describing location arrangements for records
pathThe term "path" refers to the name of the location of something on your computer's hard drive
spline patchA curved surface which takes its shape from the placement of a set of control points.
merchant accountAn account established by contractual agreement between a merchant/business and a bank or payment gateway.
tnsnames.oraA file that contains connect descriptors mapped to net service names
accessionThe process of formally accepting and recording the receipt of records into archival custody
roleA named groups of related privileges
oracle_homeCorresponds to the environment in which Oracle Database products run
hybrid recordA set of related digital and physical components that are linked by metadata in a tight-knit relationship and managed as a single record.
sedStream editor
watermarksA faint marking on the back of some photographic papers indicating that the picture was taken by a professional photographer.
sectorThis is a section or area of a disk.
ihsA color space where colors are defined by their intensity, hue, and saturation attributes
public cloudA type of CrashPlan PROe deployment
8-bit imageA digital image that can include as many as 256 possible colors
netty’s world—www.nettysworld.com.auNetty’s World is a web site which helps young children learn about internet safety through a range of fun interactive activities.
resolutionThe number of pixels displayed at one time
physical recordA set of data which can be read or written as a unit by a storage device.
mitigationpreparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security
business rulesLogic that is specific to a given application, and often specific to a given business
touch and dragThis action moves the content on the screen in the corresponding direction
nodeEach device connected to a network
reviewAn assessment process undertaken to evaluate the effectiveness, appropriateness, relevance and efficiency of an identified system or systems.
fileAn organised unit of documents accumulated during current use and kept together because they deal with the same subject, activity or transaction.
isa/ipoAcronym for introductory slotting allowance/introductory pocket offer
resellerA reseller is a company that offers custom packages of Gandi products and services under their own name and brand
digital certificateA digital stamp that uses encryption to certify where an electronic document came from
vectorVector is used to describe an image that is made upof curves and lines described by mathematical equations
bandingStraight lines or bands across a printed picture caused blocked nozzles, poor alignment or design defects in the printer head, as it criss-crosses the paper
transmission protocolRules for what information is exchanged and in what order
pciPeripheral Component Interconnect - high-speed expansion/connector system used on most recent PCs for sound, video, and network adaptor cards, etc.
aspect ratioThis term describes the ratio of the width to the height of a TV screen independently of the screen size (x units wide by x units high)
cmykStands for the three subtractive primary ink colors and black: Cyan, Magenta, and Yellow and blacK.
adapterA part that connects two devices or systems, physically or electrically, and enables them to work together
color balanceThe ability to reproduce the colors of a scene to some acceptable standard.
symmetric key encryptionAlso known as Private Key Encryption, this uses the same private key shared by the sender and recipient for the encryption and decryption of information
csplitSplit a file into context-determined pieces
chipsetControl microchips on a PC motherboard or plug-in adaptor card
captureThe process of lodging a document or digital object into a recordkeeping system and assigning metadata to describe the record and place it in context, thus allowing the appropriate management of the record over time
recordA record is all information created, sent and received in the course of carrying out the business of your agency. Records have many formats, including paper and electronic
authorizationIn single-copy sales, a retailer's approval for a particular title to be carried in some or all of its stores
dinStands for Deutsche Industrinorm, the standards -setting organization for Germany
bankcardA payment card issued by a financial institution.
bboarda contraction of the term "bulletin board system," a Web-based site that allows users to post comments and questions to which other bboard readers can respond
mach bandsAn optical illusion caused by a sudden change in the rate of change of the brightness (discontinuities in the brightness' second derivative)
unset uidUser id change
rpmRevolutions Per Minute
otherThe Type designation 'Joke' was previously used by F-Secure to describe a program that does not easily fit into any other Type categorization
eavesdroppingSurreptitious interception of information sent over a network by an entity for which the information is not intended.
hpHewlett-Packard Corporation, a major manufacturer of computing equipment.
noiseElectronic interference that gets in the way of wanted signals.
coreMemory device consisting of small metal rings
pixelThe smallest indivisible unit of a digital image
unsentenced recordA record for which a value has not been determined and which consequently, has not been sentenced using a current records authority.
energy efficientProducts and systems that use less energy to perform as well or better than standard products
apertureAn opening made by an adjustable diaphragm, which permits light to enter the camera lens and reach the image sensor.
dual-band radioA radio device is dual-band if it can send and receive signals from two frequencies--in the case of wireless networking, both the 2.4GHz and 5GHz bands
decryptionenabling the operation of a symmetric key
virtual deviceA logical device in a ZFS pool, which can be a physical device, a file, or a collection of devices.
rcraThe Resource Conservation and Recovery Act or RCRA is the U.S
decryptionsymmetric key, asymmetric key
uk emissions trading schemeVoluntary domestic emissions trading scheme running from March 2002 to the end of 2007
seriesA group of records created and maintained by an agency or person that are in the same numerical, alphabetical, chronological or other identifiable sequence, or result from the same accumulation or filing process and have a similar function, format or informational content
domainA segment of Internet space, denoted by the function or type of information it includes; current domains include ".com" and ".net" for commercial sites, ".gov" for governmental sites, ".edu" for educational and ".org" for non-commercial organizations.
data redactionThe ability to mask data with different values.
assetn
spamThis was a significant event in that it brought about the age of mass spam, in the sense that they created the precedent for the current global unapologetic spamming practice.
disposal classA component of a records authority which acts as a set of rules within an electronic records management system
unauthorised termSee: Non-preferred term
user roleAn aggregation or standard set of electronic records managment system functional permissions that may be granted to a predefined subset of system users.
dialler boxA dialler box is a device that you connect to your telephone line,  to select the cheapest service provider for the call you are making
brute-forceBrute-force search is a trivial but very general problem-solving technique, that consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement.
copyrightThe exclusive right, granted by law, of the creator of a work (or his/her assignees or employers) to make or dispose of copies and otherwise control the use of a literary, dramatic, musical, artistic or other work
checkout displayIn newsstand sales, the coveted display space at the checkouts of supermarkets, convenience stores and other mass outlets
folioTo assign a number to a leaf or page.
thesaurus applicationA software application that can be used to create or manage a thesaurus.
registration authorityAn independent, third-party organization that processes payment card applications for multiple payment card brand associations and forwards applications to the appropriate financial institutions.
dynamic attack surfaceincreasing an adversary's work factor necessary to probe, attack, or maintain presence in a cyber target.
certificate authorityA certificate Authority is a third party organization that generates and manages SSL certificate
check scamA crime in which an unsuspecting victim deposits a check into a bank account then wires a portion of the money to a criminal
pre-certified emission reductionsA unit of GHG emission reductions that has been verified by an independent auditor but has not yet undergone the procedures and may not yet have met the requirements for registration, verification, certification and issuance of CERs or ERUs
registrationRegistration is the formal acceptance by the Executive Board of a validated project activity as a project activity
digital recordA record created and/or maintained by means of digital computer technology
bncShort form for British Naval Connector or Bayonet Nut Connector or Bayonet Neill Concelman
interoperabilityThe ability to transfer and use information in a uniform and efficient manner across multiple organisations and information technology systems
contrast ratioThe measurement of the difference in light intensity between the brightest white and the darkest black
initProcess control initialization
password-based software keystoreA
hd-pip functionIn order to be able to use a HD channel with the picture-in-picture function, the SD equivalent must be present in the channel list
root accountA special user account that has absolute power over all aspects of system operation.
cryptographyMathematical process used for encryption or authentication of information
duEstimate file space usage
archival valueThe attribute of Australian Government records appraised as being retain as national archives (RNA).
internetA global connection of computer networks, also referred to as the "Net," which share a common addressing scheme
access examinationThe process of examining records to identify any exempt information they may contain
amexAn abbreviation for American Express; a financial organization that is part of the Payment Card Industry that issues payment cards.
meaningfulSee: Full and accurate record
passiveHaving no active or electronically-controlled parts.
thesaurusContains synonyms for selected word
freedom of informationThe right of the public, granted by law (the Freedom of Information Act 1982 and the Freedom of Information Amendment (Reform) Act 2010), to inspect or otherwise have access to documents in the recordkeeping systems of government, subject to specified exclusions.
functional recordSee: Core record
p2vPhysical-to-virtual
normalisationThe process of changing records from one data format to an archival data format.
system administratorA user role with designated responsibility for configuring, monitoring and managing a system and its use
redacted dataIn an
front-projection systemA type of projection system in a home theater that includes two parts: a front projector unit and a separate screen
voluntary standardAny standard that aims to ensure the quality of carbon credits in the voluntary carbon market
encryptionThe translation of data into a secret code
naming principleThe rule for labelling digital records and other record plan entities
global environment facilityA global partnership among 178 countries, international institutions, non-governmental organizations (NGOs), and the private sector to address global environmental issues while financing national sustainable development initiatives.
reachUnique users that visited the site over the course of the reporting period, expressed as a percent of the universe for the demographic category; also called unduplicated audience; The total number of unique users who will be served a given ad.
comprehensiveSee: Full and accurate record
interocular separationThe distance between the centers of the pupils of the eyes when vision is at infinity
flowchartA graphic representation of an algorithm, often used in the design phase of programming to work out the logical flow of a program.
noise filterRemoves from a signal the interference caused by the magnetic fields of nearby devices
payment cardA term used in SET to collectively refer to the credit cards, debit cards and charge cards issued by a financial institution and reflects a relationship between cardholder and financial institution.
security categoryThe hierarchical designation in a recordkeeping system (such as ‘top secret' or ‘protected') allocated to a user, user role, digital record or other record plan entity to indicate the level of access allowed in accordance with the Australian Government Protective Security Framework (PSPF) issued by the Attorney-General's Department
cancelOn-screen button that appears in some boxes
binary searchBinary search searching a sorted list by looking at the middle item, and then searching the appropriate half recursively (used for phone books, dictionaries and computer algorithms).
private keyThe decryption key used in public-key encryption.
fips pubs 140-1Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US government standard for implementations of cryptographic modules--that is, hardware or software that encrypts and decrypts data or performs other cryptographic operations (such as creating or verifying digital signatures)
rmwsee Regulated Medical Waste
subnet maskA bit mask that is used to select bits from an Internet address for subnet addressing
parityA property of a data word or character which is even if the number of 1s in the data is even, and odd if the number of 1s in the data is odd.
transfer managerTransfer Manager is the place where you can define, modify, delete, and start all transfer activities.
topicA term used at the third level of classification
trust pointsTrust points or trusted certificates are third party identities that are qualified with a level of trust
renameAction whereby a file, directory or other element of a system is given a new name.
crashplan serviceThe CrashPlan service or engine that performs all backup operations in the background on a device running the CrashPlan app
cardholderCustomer to whom a card is issued or individual authorized to use the card
grepis used for filtering input lines and returning certain patterns to the output
aaoSee: Administrative Arrangements Order
interrupt request lineAs you may have discovered, it's possible for PC devices to live in the same virtual space, and when they do, they tend to interfere with each other
inviolateSee: Full and accurate record
genetically modified organismA GMO results from merging the genetic make-up of two organisms to create a desired byproduct that could otherwise not be found in nature
decryptionenabling the operation of a symmetric key cryptography scheme.
semi-active recordA record required so infrequently in the conduct of current business that it can be transferred from offices to separate storage areas.
sgaSee System Global Area.
pstnPublic Switched Telephone Network – conventional telephone system, operated by BT etc.
preferred termA term in a thesaurus or other classification tool that can be applied to a record.
pinA confidential number created in order for a system to be able to authenticate you as the proper user
downstream capA "downstream" cap and trade system is one in which where the entities emitting carbon dioxide are required to surrender allowances (also see: upstream cap)
flashA device on your camera that fires a burst of light when you take a picture to illuminate your subject.
manureLivestock excreta used to fertilize soil
lanLAN is an acronym for Local Area Network that spans small area
root certificateCertificate at the top of the certificate hierarchy.
ownershipSee: Transfer (of ownership)
login idThe unique identifier of a user that must be supplied in combination with a PIN/Password in order for the user to be authenticated.
web snapshotA full and accurate record of an agency's public web resources captured at a particular point in time.
hard offerA promotion that does not treat the first issue or first several issues as a no-obligation trial
tcp/ipTransmission Control Protocol/Internet Protocol
double-clickPoint to an item, then press the mouse button twice rapidly
secondary transactionA transaction where the seller is not the original owner (or issuer) of the carbon asset
integrityor availability
acquiring bankThe bank of financial institution that receives payment card transactions and settles with the issuing bank
destructionThe process of eliminating or deleting records beyond any possible reconstruction.
ip addressA computer’s “address,” it consists of a series of numbers separated by periods.
rules fileA text file that contains a rule for each group of systems or single systems that you want to install automatically
standard generalized markup languageSGML is mother of all markup languages
arithmetic functionOne of the arithmetic operations -- addition, subtraction, multiplication, or division -- included in most programming languages.
usersList users currently logged in
filtersThe term snowshoe spamming analogizes this practice to snowshoes, which are made to spread a person's weight onto a larger area of snow.
integrityand availability
half duplexA communications channel which transmits data in either direction, but only one direction at a time.
merchantAny University entity that participates in card processing activities.
merchantA seller of goods, services, and/or other information who accepts payment for these items electronically
v2vVirtual-to-virtual
electronic messagesAny communication using an electronic system for the conduct of official business internally, among Australian Government agencies, or with the outside world
subscriberEither the person, or the business entity and the person who acts on behalf of that business entity, that is in possession of or has control of the private authentication key and who uses that key to digitally sign/receive messages.
business information systemAn automated system that creates or manages information about an organisation's activities
message boardA message board is an online discussion site
asciiA code system for turning letters, numbers and symbols into digital data
hot swapTo pull out a component from a system and plug in a new one while the main power is still on
oracle call interfaceAn application programming interface that enables you to manipulate data and schema in an Oracle Database
g-commerceEcommerce applied to government
classification systemA set of terms and business rules that can be applied to records to facilitate capture, retrieval, maintenance and disposal.
degree of an operatorThe number of values associated with the evaluation (i.e., the use) of that operator
dehpDi(2-ethylhexyl) phthalate or DEHP is a plasticizer used to make PVC medical devices soft and flexible
crs systemSee: Series system
colour depthThe amount of data used to describe a colour, which determines the range and accuracy of colours in an image
i2pImage-to-physical
linksSee elinks
light domeA plastic dome that diffuses light and eliminates reflections in photographs
trackpadPressure-sensitive pad that moves the mouse pointer around the screen with light finger movements
pump and dumpThe term Pump and dump is a term used to define a particular type of stock fraud or stock market manipulation
field forceIn single-copy sales, a group of representatives maintained by a national distributor (see definition) or a large publisher
characterA single letter, digit, or symbol
credit card processorA company that performs authorization and settlement of credit card payments, usually handling several types of credit and payment cards (such as Visa, MasterCard, and American Express)
dacsDACS boxes, or DACS, are devices that were used by telephone providers to split one phone line into two or more lines
xinitStart Xserver
trueDo nothing, successfully
manifest sectionA section of a Solaris Flash archive that is used to validate a clone system
doexecRun an executable with an arbitrary argv
structured programmingA style programming in which a hierarchy of structures is used, each having a single entry and a single exit point.
immersiveA term used to describe a system that is designed to envelop the participant in a virtual world or experience
disclosureRefers to companies' practice of making your personal information available to third parties, e.g., marketing lists, other organizations that provide similar services, etc.
global positioning systemA space-based global navigation satellite system that provides location and time information in all weather, anywhere on or near the Earth, where there is an (almost) unobstructed sky view.
vpietOffice of the Vice Provost-Information and Educational Technology
lluLocal Loop Unbundling (LLU) is the process of making BT local telephone exchanges available to other companies, such as TalkTalk
concaveA property of a polygon that has at least one vertex bulge inward instead of outward
fmtReformat paragraph text
captureA transaction sent after the merchant has shipped the goods
riskand develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations.
password-based authenticationConfident identification by means of a name and password
influenceran individual knowledgeable in a specific subject, highly recognized in an online community, with the ability to sway others' opinions; key influencers are seen on an online community as references who can offer assistance on specific subjects
smart cardA small device, typically about the size of a credit card, that contains a microprocessor and is capable of storing cryptographic information (such as keys and certificates) and performing cryptographic operations
legacy recordA record that is not covered by a records authority or a general records authority
overclockingMaking a PC run faster by increasing the speed of the CPU beyond its rated design
renderProcess in desktop video editing where effects and transitions are generated by the editing software and added to clips
userUsers are people who have access to the Mahara site and can log in in with a personal account.
administrative changeThe process whereby agencies and departments are created, modified or abolished, and responsibility for legislation and functions (and records) is transferred from one jurisdiction, portfolio, department or agency to another.
auto-login software keystoreA
caSee certificate authority.
accessoriesSupporting devices (such as universal remote controls, touchpads, or digital media adapters) that make the content in your home theater accessible from another location.
ohmUnit of electrical resistance
subnet maskA 32-bit address used in conjunction with an IP address to segment network traffic; used to restrict transmissions to certain subnets.
recovery modeThis is the mode that you use when your phone is in desperate need of a restore
domainThe site's name that an organization uses; for example, Red Hat has a domain name of redhat.com.
dial-upA old-style internet connection through a standard phone line
wShow who is logged on and what they are doing
verboseAn optional mode when running a program that displays varying levels of status messages as it is processing.
pemPrivacy-Enhanced Electronic Mail
archivesRecords that are appraised as having archival value
confidentialitydata integrity, entity authentication, and data origin authentication.
fccFederal Communications Commission
inheritTo take on a metadata attribute from a parent entity.
host nameThe name by which a system is known to other systems on a network
patSee: Photographic Activity Test (PAT)
brominated flame retardantsBFRs are halogenated flame retardants containing bromine, and are used in products ranging from mattresses and cubicle curtains to pulse oximeters and foam packaging
inactive recordA record that is not required to be readily available for the business purposes of a department or agency and may therefore be transferred to intermediate storage, archival custody or be destroyed subject to applicable laws.
tweeter driverA type of speaker driver that handles the high-frequency treble range (above 2000 Hz).
native formatThe format in which the record was created or in which the originating application stores records.
digital assetn
integer overflowIn computer programming, an integer overflow is a type of arithmetic error in which a calculation produces a numeric value too large for the available storage space.
wianaWireless Internet Numbers Authority.  (Also see IANA.)
cryptographic algorithmA set of rules or directions used to perform cryptographic operations such as encryption and decryption
unaided recallThe percentage or number of consumers surveyed who are able to cite a products/services name after being requested to cite any and all product names within an advertised category
disintermediationIt means: "getting rid of the middle-men" but sounds more impressive.
scope noteThe definition of a particular term, or combination of terms, in a business classification scheme or a classification tool (such as a functions thesaurus or record classification scheme)
commonwealth personA significant individual such as a Governor-General, Prime Minister, Minister, Member of Parliament or senior public servant who has been associated with the Commonwealth and who has created personal records held by the National Archives is included in the CRS System as a Commonwealth Person.
failoverThe ability to reconfigure a computing system to utilize an alternate active component when a similar component fails.
fileThe action of placing documents in a predetermined location according to a scheme of control.
supply chainincluding acquisition processes.
controlled copyAn exact reproduction of a digital record, where there is no change to the content of the record
route predicateAn argument to a route configuration which implies a value that evaluates to
copyingThe production of an identical copy on the same type of medium (paper, microfilm or electronic), eg
root caThe certificate authority (CA) with a self-signed certificate at the top of a certificate chain
cybersecuritythe effect of a loss of confidentiality
entire solaris software groupA software group that contains the entire Solaris release.
ps2pkcreates a TeX pkfont from a type1 PostScript font
unset gidGroup id change
dimmedSee grayed out.
core recordA record unique to a particular agency, generated as the agency carries out its specific functions
key pairTwo mathematically related keys, having the following properties:
trTranslate, squeeze, and/or delete characters
clusterA set of track sectors which is the minimum space used by a read or write.
key pairA pair of asymmetric cryptographic keys (ie
actual dataIn
color depthA measure of the number of digital bits used to store the color information for a high-definition TV source.
substitution cipherA type of cipher that works simply by replacing each letter or combination of letters in a plain text with a certain other letter or combination of letters to make up the cipher text
v2pVirtual-to-physical
ronThe scheduling of Internet advertising whereby an ad network positions ads across the sites it represents at its own discretion, according to available inventor
agileA variety of software development techniques that tend to focus on smaller-scale iterative development rather than on top-down “waterfall” design and
reverse videoHighlights selected text with a background color and a change of text color.
original orderThe order in which records and archives were kept when in active use (ie
sandboxIn computer security, a sandbox generally refers to a tightly controlled virtual environment that replicates a normal computer system.
napSee: Normal administrative practice (NAP)
autofocusA camera setting that allows the camera to choose the correct focus distance for you, usually based on the contrast of an image or set by a mechanism, such as an infrared sensor, that measures the actual distance to the subject.
useraddCreate new user account
pkillLook up or signal processes based on name and other attributes
polarizing filmA film that turns or shifts light.
advance directiven
market transformation programmeThe MTP supports the development and implementation of UK Government policy on sustainable products
availabilityThe portion of time that a system can be used for productive work, expressed as a percentage.
transactionThe third level in a business classification scheme.
conversionThe process of changing records from one medium to another or from one format to another
nis+The SunOS 5.0 (minimum) Network Information Service
accessThe right, opportunity, means of finding, using or retrieving information, usually subject to rules and conditions.
binBank Identification Number consisting of the first six numbers on a Visa or MasterCard that identifies the issuing financial institution.
memeContagious ideas
transfer compoundChemical paste to ensure thermally efficient contact between a CPU chip and cooling fan 
repositoryA mechanism for storing user information under the control of the user agent.
integrationA tight-knit relationship between an electronic records management system and another application or mechanism
eulaEnd User Licence Agreement -- the lengthy document that no-one reads, which appears when you install a software application and you have to agree to before the installation will proceed
keyIt is an item of data that is being searched for or sorted, and therefore will be compared with other data.
bsdBSD is a type of UNIX operating system derived from the work done at Computer Science laboratories at the University of California at Berkeley
sopStandard Operating Procedure
accurateSee: Full and accurate record
ambient functionA high-level function that exists outside the boundaries of an organisation
convexA property of a polygon that bulges outward at all vertices
public key cryptographyPublic key cryptography involves information encryption and decryption using a shared public key paired with private keys
domainA segment of Internet space, denoted by the function or type of information it includes; current domains include ".com" for commercial sites, ".gov" for governmental ones, and ".org" for non-commercial organizations.
integrated risk managementrisk
ddeA breakdown product of the once-common pesticide DDT, which was banned in the US in 1972 but still enters the environment through use in other countries where it isn't banned
commentsreplies or opinions in reference to a specific topic; usually left on blog posts or on a bboard
skyscraperSkyscraper ads, which are tall and narrow
debit cardA plastic card issued by a financial institution that is connected to a consumer's bank account
trusted certificateA trusted certificate, sometimes called a root key certificate, is a third party identity that is qualified with a level of trust
antenna gainThis describes an antenna's transmission power as a ratio of its output (send) signal strength to its input (receive) signal strength
color saturationThe purity of color; the amount by which a pure color is diluated with white or gray.
renditionThe instance of a digital record made available in another format or on a different medium by a process entirely within an electronic records management system control, without loss of content
image sensorA digital camera’s solid-state capture device, made up of a grid-like arrangement of red-, green-, and blue-sensitive elements.
set uidSet user id
huidHUID is an acronym for Harvard University ID number.
nameiFollow a pathname until a terminal point is found
shutterThe device in a camera that opens and shuts to allow light into the camera.
physical controlThe responsibility for the custody of records based on their physical possession but not necessarily implying legal title
ism bandA theoretical, ideal antenna whose signal range is 360 degrees in all directions
zoneSee non-global zone
wanA network of interconnected computers over a large geographical area, connected via telephone, radio or satellite.
clientThe customer side of a client/server setup
custodyThe responsibility for the care of records and archives, usually based on their physical possession
duplex printingPrinting on both sides of a sheet of paper.
registration authorityThe registration Authority is responsible for identification and authentication of requestor before issuing certificate but it does not right to sign or issue the certificate
records disposal authoritySee: Records authority
jack retaskingThe technology that allows audio jack functionality to be reassigned depending on the type of device that is connected
cableA flexible wire or bundle of wires, usually metal (glass or silica in fiber optic cable), insulated with plastic or rubber, and having connectors on the ends
ip addressA computer's "address," it consists of a series of numbers separated by periods.
scan-based tradingRefers to the practice of basing retail sales figures for magazines solely on the number of sales recorded through checkout scanning, as opposed to the traditional system of returning unsold magazine covers
crosstalkIncomplete isolation of the left and right image channels so that one leaks (leakage) or bleeds into the other
infraredUsing film, a filter, or a censor that is sensitive to infrared light and also blocks visible light
cardmember agreementContract with a customer which sets forth the customer's responsibilities and governs which security process will be used in the conduct of business between the institution (Bank of America) and customer.
real time systemA system which must respond in real time to changing conditions.
energy savings certificateAn ESC, also referred to as a white certificate, Energy Efficiency Credit (EEC), or white tag, is an instrument issued by an authorized body guaranteeing that a specified amount of energy savings has been achieved
resolutionA measure of the precision and sharpness of a video display's picture, based on the pixels or lines of resolution available on the screen
skimmingThieves implant a data storage device at an ATM or retail checkout terminal that reads (or "skims") the magnetic strip on your credit or debit card as you swipe it
ledLight-emitting diode, or LED
motoprintMotoPrint is an application designed for Motorola devices to print directly from Motorola devices using Wi-Fi
cacheA temporary storage area for frequently-accessed or recently-accessed data
ssfpA Service-Specific Faceplate (SSFP) is a telephone socket that filters broadband and voice data down a telephone line without using a DSL filter
computer forensicsforensics
bitThe smallest element of computerized data
repro graphicsA full-service campus printing department affiliated with the Office of Administration
digital certificatesElectronic affidavit issued by a certification authority, like a bank, that validates the identity of an individual or business
digitalDigital systems represent data in binary form, encoding it as a series of zeroes and ones
set gidSet group id
importTo receive digital records and associated metadata into one system from another, either from within the organisation or from elsewhere.
convolutionA mathematical operation that applies a weighted average defined by one function onto another function
dither patternThe particular pattern of threshold values used in dithering
admissibilityThe quality of being permitted to serve as evidence in a trial, hearing or other proceeding
soreSmall Off-Road Engines or Equipment Spring Water - Derived from an underground formation from which water flows naturally to the earth's surface, spring water must be collected only at the spring or through a borehole tapping the underground formation feeding the spring.
pl/sqlPL/SQL is Oracle's proprietary extension to the SQL language
digital certificateA nontransferable, nonforgeable, digital file issued from a third party that both communicating parties already trust.
dispositionSee: Disposal
constraintA rule of an inverse kinematics or inverse dynamics animation system that must be adhered to in solving the motion of all the objects
unix hostingUnix hosting is when an ISP or hosting facility runs your site on some variety of a Unix operating system
v2iVirtual-to-image
frequency rangeA specification for a receiver that is measured in Hertz (Hz)
blogA blog (made from the words 'web log') is a website with regular articles often focused on a particular subject or person
bpsBits per Second - The term used for measuring modem data transmission speed.  A modem rated at less than 56 kbps is no longer sufficient to accomodate today's performance requirements.  (See Bit.)
diff3Show differences among three files
appraisal criteriaThe criteria used to determine the value of a record for future business, accountability or community needs.
interpolationA software technique that basically fills in the gaps between the ‘dots' on a printed picture by analysing the surrounding dots and taking an educated guess at what should be there
private keysIn public key cryptography, these are the secret keys
administrative arrangements orderA formal document issued by the Federal Executive Council (and generally published in the Commonwealth Gazette), which assigns responsibility for legislation and functions to departments of State
bizoppsShorthand for “business opportunity;” some schemes involve extravagant and unfounded earnings claims and are actually fraudulent business ventures.
control pointA point used in defining a spline.
digital divideThe gap in opportunities experienced by those with limited accessibility to technology especially, the Internet.
retrievalThe processor service of making records in the National Archives' custody available to the agencies that control them
social mediaWeb-based technologies used for social interaction that enable the creation of user-generate content
latencyLatency is the time it takes information to travel between two devices
audit trailData that allows the reconstruction of a previous activity, or which enables attributes of a change (such as date, time or operator) to be stored so that a sequence of events can be determined in the correct chronological order
uniform resource locatorA type of URI that identifies a resource via a representation of its primary access mechanism (ie
framesMultiple, independent sections used to create a single Web page
ad notersA person who has noticed an advertisement in a publication
privacyThe interest that individuals have in sustaining a 'personal space,' free from interference by other people and organizations.
cookieinformation which a website places on your harddrive so that it can remember something about you at a later date.  Typically, a cookie records your preferences when using a particular site
ermsee Electronic Records Management
light tentA white cloth teepee-shaped tent that diffuses light and eliminates reflections in photographs
rootThe top level of a hierarchy of items
desData Encryption Standard
sell-throughAlso called efficiency or efficiency level
business classification schemeA conceptual representation of the functions and activities performed by an organisation
backgroundThe color or pattern that sits behind the images in the composite.
ethernetIndustry standard networking system that allows the transfer of data over cables at speeds up to 100 megabits per second
shooting modeRange of options that gives you limited or total control of picture-taking settings.
housekeeping recordSee: Administrative record
electronic funds transferTechnology that transfers funds from the bank account of one person or organization to that of another.
suSubstitute user identity
compensating controlsCompensating controls may be considered when an entity cannot meet a requirement explicitly as stated, due to legitimate technical or documented business constraints but has sufficiently mitigated the risk associated with the requirement through implementation of other controls
componentA single element within a larger system; it can be hardware- or software-based and performs essential functions needed by the system.
digital certificatesITU X.509 v3 standard data structures that securely bind an identity to a public key
subject thesaurusA controlled vocabulary that relates to a common theme for the purposes of describing the content of a resource.
ping6Ping
trustConfident reliance on a person or other entity
m-commerceMobile commerce using wireless devices
cleartextUnencrypted plain text.
electronic commerceThe exchange of goods and services for payment between a cardholder and merchant when some or all of the transaction is performed via electronic communication.
backup frequencyThe setting that determines how often CrashPlan backs up to your destinations
digital documentA document created and/or maintained by means of digital computer technology.
bandwidthThe rate at which information travels through a network connection, usually measured in bits per second, kilobits (thousand bits) per second, or megabits (million bits) per second.
account numberPayment card number (credit or debit) that identifies the issuer and the particular cardholder account
race conditionA situation where the (uncontrolled) ordering of events can affect the outcome of the situation.
private keyA cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and not made public
tarTape Archiver
subnet maskPart of a code used by network administrators to identify sections of a network
informationAny type of knowledge that can be exchanged
listener.ora fileA configuration file for the listener that identifies the:
atrArea Telephone Representative
focal lengthThe distance between the film and the optical center of the lens when the lens is focused on infinity, usually measured in millimeters.
uucpUUCP subsystem
encryptiondecryption, symmetric key, asymmetric key
midrange driverA type of speaker driver that handles midrange frequencies (200 Hz to 2000 Hz).
public-key cryptographyA set of well-established techniques and standards that allow an entity (such as a person, an organization, or hardware such as a router) to verify its identity electronically or to sign and encrypt electronic data
digital direct marketingDirect digital marketing, also known as "DDM," is a type of marketing that is done exclusively through digital means
constructive solid geometryA modeling technique where complex shapes are built by combinations of simple shapes
security classification systemA set of procedures for identifying and protecting official information whose disclosure could have adverse consequences for the Commonwealth
snrSignal-to-noise ratio (SNR or S/N) is defined as the ratio of the signal to the noise or interference corrupting the signal.
chdirChange working directory
smart cardA plastic card containing a computer chip that holds large amounts of information, performs some processing and is tamper resistant
archPrint machine architecture
gatewayA network device or machine that connects a local private network to another network or the Internet.
revegetationA direct human-induced activity to increase carbon stocks on sites through the establishment of vegetation that covers a minimum area of 0.05 hectares and does not meet the definitions of afforestation and reforestation
circulation-drivenA magazine that yields most of its revenue from circulation
yamlYet Another Markup Language, YAML was originally developed as a more
tagsa keyword or term associated and assigned to an item of content (i.e
coalescenceThe combination of two (or more) physically adjacent unused spaces into a single unused space.
d-link dsl-2640r and dsl-2740rThe D-Link DSL-2640R and DSL-2740R are broadband routers with wireless capability
conservationThe treatment of items (including records and objects) to stabilise them chemically or strengthen them physically so that they can be maintained for as long as possible in their original form
message digestRepresentation of text as a string of single digits
nanoAn enhanced free Pico clone
falseDo nothing, unsuccessfully
bandwidthGenerally, the amount of data that can be passed through any point on the internet at a specific time
electronic data interchangeThe exchange of standardized documents between computer systems for business use.
rsaA public-key encryption technology developed by RSA Data Security
modem commandsInstructions issued by the PC to tell the modem to do things like open the line and dial a number
ecometricsInterface’s quantification of the company’s environmental performance over time
distinguished nameThe unique name of a directory entry
non-current recordSee: Inactive record
archives act 1983The Archives Act 1983 officially established the Australian Archives (now the National Archives of Australia) and defines its powers
power spikeA huge jump that lasts for fractions of a second.
toleranceThe range of color or tonal values that will be selected with a tool such as an image editor’s Magic Wand, or filled with paint when using a tool such as the Paint Bucket.
firewallA firewall is an application that helps an user or administrator to have a control over how the system should be connected with other network/systems or over the Internet.
smart cardA plastic card about the size of a credit card with an embedded microchip where information and applications are stored
stereoscopyThe art and science of creating images with the depth sense stereopsis
information systemSee: Business information system (BIS)
master keyA symmetric key used by Certificate Manager to encrypt information
unit vectorA vector of length, or magnitude, one.
ghgsee Greenhouse Gasses
high gain projection screenMaterial that reflects more light than matte material
provenanceThe office of origin of records, (ie
nonnetworked systemsSystems that are not connected to a network or do not rely on other systems.
affiliate marketingAn agreement between two sites in which one site (the affiliate) agrees to feature content or an ad designed to drive traffic to another site
function creep...how Information Age surveillance and monitoring systems, built and bought for a benign use, can subtly be shifted to sinister purposes
text nodeThe area in the layout where text goes
record classification schemeA hierarchical classification tool that, when applied to a business information system, can facilitate the capture, titling, retrieval, maintenance and disposal of records and other information
surgeSee power surge
disposal freezeA mechanism within an electronic records management system that can prevent any disposal action from taking place, even if the retention period for a digital record has elapsed
dirBriefly list directory contents
pci-dssPayment Card Industry Data Security Standards.
extractionThe act of creating an extract.
joystickA device which controls cursor motion with a vertical stick
unattended modeOne of two PIE operating modes
extantRecords that remain or have survived to the present, ie
headworks similarly
sgc ssl certificateSGC SSL certificate means Server Gated Cryptography SSL certificate
passThe number of times that the source text has to be scanned or rescanned in order to compile the program
storage sprawlA term used to describe the high rate of data volume growth on a network.
extensionThe last part of an internet address, after the final dot
universal groupsUniversal groups are available in Windows 2000, but not in Windows NT
digital watermarkA complex visible or invisible pattern denoting provenance or ownership information
managed applianceCode42-manufactured equipment (including its physical components) purchased from Code42 or a Code42-authorized agent
lightweight directory access protocolA standard, extensible directory access protocol
cryptographyThe art and practice of scrambling (encrypting) and unscrambling (decrypting) information
progressPIE command that lets you see Imaging Engine's current status.
personal identifying informationIn 2009, state law changed nomenclature
keywordThe highest-level term in Keyword AAA: A Thesaurus of General Terms.
credit cardPayment method that allows the cardholder to make payments for goods and services and receive cash through credit from the card-issuing bank.
disposal triggerThe point from which the disposal action is calculated
sgid permissionThe SGID permission sets a process's group ID on execution.
myinfovaultFaculty merit and promotion system.
accommodationThe refocusing of the eyes as their vision shifts from one distance plane to another.
emulationA digital record preservation approach that involves keeping digital records in their original format and recreating the operating environment to enable the original performance of the software to be recreated on current computers
initThe init process is the first process to run on a system
risk assessmentrisk
economizerAn economizer is a mechanical device used to reduce energy consumption
ocpOperator Control Panel
as iso 15489AS ISO 15489 replaced AS 4390 as the code for records management practice in Australia in March 2002
authenticationProcess which seeks to validate identity (merchants and cardholders) or to prove the integrity of a transaction
e-commerceElectronic Commerce - Refers to the ability to sell products through your Web site.
parityAdding an extra bit to a set of bits to make it so that there is an even number of 1’s
remote code executionIn computer security, remote code execution means that an outside party being able to run arbitrary commands on a target machine or in a target process, almost always with malicious intent.  
digital signatureInformation encrypted with an entity's private key, which is appended to a message to assure the recipient of the authenticity and integrity of the message
light-shelfUsually consisting of reflective white or metal eaves or shelves that redirect light into a building and protect occupants from direct solar glare
white paperThis is a document that explains how a certain technology or product works
registration authorityAn entity that performs services in relation to the registration and verification of the identity of applicants for public key certificates, as described in the registration authority accreditation criteria.
energy efficiency creditAn EEC, also referred to as a white certificate, Energy Savings Certificate (ESC), or white tag, is an instrument issued by an authorized body guaranteeing that a specified amount of energy savings has been achieved
digital certificateDigital Certificates are used to prove your identity electronically while doing transaction on the web
forkingForking is the mechanism by which the system starts a new process, waits for it to finish, then generates a new output prompt and waits for the next command.
shutter speedThe length of time that the camera shutter remains open, thereby allowing light to enter the camera and expose the photograph.
eco-chicA product or good that is both eco-friendly and hip
originThe point in a coordinate space where all coordinates are zero.
willn
ppePersonal Protective Equipment Public Comment Period - see Validation Publicly Owned Utility (POU) - A public utility (usually just a utility) is a company that maintains the infrastructure for a public service, usually referring to power, natural gas and water delivery
emissionsEmissions are particles and gases released into the air as byproducts
samplingA form of appraisal or disposal used especially in connection with large series or other groups of records
suid permissionThe SUID permission sets a process's user ID on execution.
digital preservationThe series of managed activities necessary to ensure continued access to digital materials for as long as necessary
freemiumAlso called a love gift
directional antennaThis term defines several types of antennae that redirect the signal received from a transmitter to enhance its strength in a certain direction, unlike an omnidirectional antenna
throughputHow much data is moved in a certain amount of time
nohupRun a command immune to hangups
memory card/module/stickRemovable non-volatile (i.e
bit depthRefers to the number of bits available to store color information
tonal resolutionThe number of levels of gray in a black and white image.
transactionThe smallest unit of a business activity.
ruleA series of values that assigns one or more system attributes to a profile
nisThe SunOS 4.0 (minimum) Network Information Service
public key certificatePublic key and identification data signed by a trusted third party to provide authentication and integrity of the key.
redundancyThe provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.
intellectual controlThe control established through the arrangement and description process over the informational content of records and archives, and the administrative and recordkeeping contexts in which they were created and used.
iphoneThough “iPhone” is an Apple Computers product, the term is becoming generic for any phone with a touch screen that functions as a phone, camera, portable media player and internet connection.
conditioningSmoothes out variations in power by pumping up the voltage when it drops and stepping it down when it's too high
closed-loop recyclingThe process of utilizing a recycled product in the manufacturing of a similar product or the remanufacturing of the same product
bass and treble controlsSeparate on-screen controls provide for a wide range of Bass and Treble sound adjustments.
vulnerabilityIn computer security, the word vulnerability refers to a weakness in a system or PC that allows an attacker to violate the confidentiality, integrity or availability of a system or PC.
signing certificateA certificate whose corresponding private key is used to sign transmitted data, so that the receiver can verify the identity of the sender
syntaxA feature of a language that denotes the grammatical structure of the language
tamper detectionA mechanism ensuring that data received in electronic form has not been tampered with; that is, that the data received corresponds entirely with the original version of the same data.
routerAs the name indicates, this piece of hardware routes data from one local-area network to another or to a phone line's long-distance line
records managementThe field of management responsible for the efficient and systematic control of the creation, receipt, maintenance, use and disposal of records, including processes for capturing and maintaining evidence of and information about business activities and transactions in the form of records.
nielson’s heuristicsA widely used set of heuristics for evaluating computer interfaces that was devised by Jakob Nielson (available from http://useit.com).
dcDesk Calculator
data matchingComparing different sets of personal data collected for unrelated purposes
virtual terminalAllows merchants who have internet access to take orders over the phone or mail and manually enter credit card information without the need for an internet storefront.
cagingIn fulfillment, the process in which subscription orders and their enclosed payments are separated and then recorded
certificate fingerprintA unique number associated with a certificate
accessAccess to Commonwealth records for agencies and the public is governed by the Archives Act 1983
hackerHacker is a person who is skilled at subverting technological systems and making them do things they were not originally created to do
ormObject-Relational Mapping, the hard part of getting object-oriented languages and relational databases to work together
record typeThe definition of a record object that specifies particular management requirements, metadata attributes and forms of behaviour
one-time tailoringRefers to a site's or a service provider's use of personal data to tailor or modify content or design of the site not affirmatively selected by the particular individual, where the information is used only for a single visit to the site and not used for any kind of future customization
file planSee: Record plan
cti/ltiColour Transient Improvement/Luminance Transient Improvement – for the reproduction of clear contour edges which are lost during transmission of the television picture.
water coolingVery similar to the cooling system in a car with heat drawn from the CPU chip inside liquid filled pipes to a miniature radiator and fan.
authorizationThis is a process that assesses transaction risk, confirms that a given transaction does not raise the account holder's debt above the account's credit limit, and reserves the specified amount of credit
domainA segment of Internet space, denoted by the function or type of information it includes; current domains include “.com” for commercial sites, “.gov” for governmental ones, and “.org” for non-commercial organizations.
conversionThe process of adding depth to a shot previously filmed or created in without depth.
plaintextAlso called cleartext
brute forceRefers to a programming style that does not include any shortcuts to improve performance, but instead relies on sheer computing power to try all possibilities until the solution to a problem is found
join lines optionFeature that lets you specify that people's names appear on one line instead of two.
quick sortQuick sort pick an item at random, put all the smaller items in a group on its left and the larger items in a group on its right
tableA set of rows and columns
maintainTo retain records in identifiable recordkeeping systems over time in accordance with disposal decisions
subordinate caA certificate authority (CA) whose certificate is signed by another subordinate CA or by the root CA
headThe part of the disk drive that does the reading and writing of data
keyIn cryptography, a key is complex mathematical algorithm applied to clear text, readable information, to produce encrypted unreadable information, or applied to encrypted information to change it back to the original readable format
dircolorsColour setup for `ls'
records authorityA records authority is an instrument issued by the National Archives of Australia to give its approval to Australian Government agencies or other organisations or persons to dispose of Commonwealth records
database access descriptorA database access descriptor (DAD) is a set of values that specify how an application connects to an Oracle database to fulfill an HTTP request
registrationA number of websites require registration
binocular visionVision as a result of both eyes working as a team; when both eyes work together smoothly, accurately, equally and simultaneously.
cyberspaceand encompass[ing] the full range of threat
digital certificateAn electronic document signed by the Certification Authority that identifies a key holder and the business entity he/she represents
shift-clickStandard MACINTOSH key combination you can use to select multiple items in Composite Editor layouts.
saver socketA saver socket is similar to a dialler box, and were designed to choose the cheapest service provider for phone calls
digital certificateSee certificate.
small businessA company that employs under 100 people and is usually a privately owned corporation
bcsSee: Business classification scheme (BCS)
cropTo size and position an image in order to use a specific portion of the image
clipboardA section of computer memory used to temporarily hold data that has been cut or copied for transfer to another document or location within a document
mtaThis is an organized mail system that receives messages and distributes them to the recipients
recordkeepingThe making and maintaining of complete, accurate and reliable evidence of business transactions in the form of recorded information
histogramA graph that maps out brightness values in a digital image; usually found inside exposure-correction filter dialog boxes.
availabilityintegrity, and confidentiality.
emvAn abbreviation of Europay, MasterCard, and Visa
ofaSee Optimal Flexible Architecture.
merchantUniversity unit that accepts credit card payment for goods, services, or gifts.
uddiUniversal Description, Discovery, and Integration, a supposedly magical but now largely forgotten piece of the
rainforest alliance certifiedProducts are produced using farm and forestry methods that are derived from farms and forests where water, soil and wildlife habitat are conserved, where workers are treated well, where families have access to education and healthcare, and where communities benefit.
atscAdvanced Television System Committee technical standard
foldWrap text to fit a specified width
xs-stereo soundThis type of audio system is a pseudo or Quasi-stereo sound
binaryA number system based on two
verifiern
haute greenAn annual contemporary design event in New York that showcases sustainable modern design
business validation ssl certificateBusiness Validation SSL certificate contains your company details
ghz(Gigahertz) A unit of frequency equal to 1,000,000,000 cycles per second
energy starEnergy Star is a government-backed labeling program that helps people and organizations save money and reduce greenhouse gas emissions by identifying factories, office equipment, home appliances and electronics that have superior energy efficiency
non-repudiationPrevents an individual or entity from denying having performed a particular action related to electronic data (such as origin, intent or ownership).
protocolIn simple terms, a protocol stands for special set of rules
removable batteryUseful if you want to bring a secondary charged battery with you when out and about to swap in when your tablet PC battery runs out of charge
x2iAnything-to-image
histsizeChange history size
directory naming contextA subtree which is of significance within a directory server
option returnKey combination you press to indicate that a new line of text should begin.
health informationPersonal data, which may be collected by a site or a service provider, about an individual's physical or mental health, sexual orientation, use or inquiry into health care services or products, and purchase of health care services or products.
prConvert text files for printing
core businessA core business is a key area of responsibility carried out by an agency
flamingFlaming is the sending of messages that include bad language or repeat messaging especially of undesirable or obscene text
administrative recordA record that an agency creates in the course of administrative activities which are generally common to all agencies.
iecThe International Electrotechnical Commission provides a wide range of worldwide standards
descriptionThe process of recording information about the nature and content of records
dematerializationThe reduction of mass in a product that does not diminish quality or intended service for the consumer.
windows hostingWindows hosting is when an ISP or hosting facility runs your site on a Microsoft Windows server
byteByte a group of 8 bits, able to represent numbers from 0 to 255, can store one ASCII character (also known as an octet).
shakeThe act of moving your device back and forth
personalizationGenerating custom content or presentations for web users
system servicesApplications which normally run independently when a system is started up and which close, also independently, on shutting down the system
disposal classThe descriptor of a group of records which document similar activities
advance renewalGenerally, a renewal generated by a promotional effort that goes out well in advance of the rest of the renewal promotional series
thesaurusA classification tool comprising an alphabetical presentation of a controlled list of terms linked together by semantic, hierarchical, associative or equivalence relationships
certifiedAcknowledging that a product is genuine to what it claims, typically having gone through a process similar to obtaining a license
sentencingThe process of identifying the disposal class a record belongs to and applying the disposal action specified in the relevant records authority
exempt informationSensitive information in Commonwealth records as defined in Section 33 of the Archives Act 1983 (eg
non-repudiationIncontestable proof of the origin, delivery, submission, or transmission of a message.
keyWhen encrypting data, a key is a value which determines the ciphertext that a given algorithm will produce from given plaintext
certificate authority(CA) A trusted third-party organization or company that issues digital certificates that are used to create digital signatures and public-private key pairs
fiber opticsThe transmission of data in the form of pulses of light
scsiPronounced, "scuzzy" it provides a way of chaining a number of devices together
form factorSet of standards defining the size and layout of a PC motherboard
xmlXML is the Extensible Markup Language, a system for defining specialized markup languages that are used to transmit formatted data
ellipsisThree dots enclosed in parentheses (...)
pstnPublic Switched Telephone Network (PSTN) is a general term referring to the worldwide telephone network based on copper wires carrying analog voice data, as opposed to newer telephone networks, which are based on digital technologies.
bio-based productA product (other than food or feed) that is produced from renewable, agricultural (plant, animal and marine), or forestry materials.
personal informationInformation that can identify you, like your bank and credit card account numbers; your income; your Social Security number (SSN); or your name, address, and phone numbers.
behavioral analysisSee: heuristic analysis.
thread localA thread-local variable is one which is essentially a global variable in terms of how it is accessed and treated, however, each thread used by the application may have a different value for this same “global” variable.
mainlineA large magazine rack or reading center displayed within interior aisles of supermarkets and other retail outlets
sortSort puts keys (numbers, names or other values) in order from smallest to largest (outside computer science this is usually called ordering).
afdaSee: Administrative Functions Disposal Authority (AFDA)
windows system trayArea in the Windows taskbar (usually in the bottom right corner of the screen), which contains the system clock, icons for changing system settings, viewing the status of the antivirus protection, etc.
computer crime or cybercrimeThe term 'computer crime' encompasses forms of crime relating to computer systems or the people working with them.
public key infrastructureInformation security technology utilizing the principles of public key cryptography
public keyIn public key cryptography, this key is made public to all
e-commerceElectronic Commerce, allowing customers to purchase items and conduct financial transactions over the Internet safely and securely.
exportA disposal process whereby copies of a digital record (or group of records) are passed with their metadata from one system to another, either within the organisation or elsewhere
guid(1) Globally Unique Identifier
grepThe grep command searches the named input files for lines containing a match to the given pattern
extractA copy of a digital record from which some material has been removed or permanently masked
data typeA set of values
legacyn
pineEmail program used by The University of Washington
critical infrastructure2008
print headDevice that squirts microscopic droplets of ink onto the paper as the print head passes over the paper
tracking cookie  A plain text file containing a unique ID and browsing information related to the user, which is constantly updated during an active browsing session, in order to track the user's browsing habits
internal speakerSmall loudspeaker inside a PC case, used for warning or error sounds during boot-up
energy starUS Government backed initiative to promote energy saving and protect the environment
exposureThe amount of light allowed to reach the film or sensor, determined by the intensity of the light, the amount admitted by the iris of the lens, and the length of time determined by the shutter speed.
carnivoreFBI's Internet surveillance system for monitoring e-mail.
system vSystem V is a type of UNIX operating system that arose from an alliance of ATT and Sun
chat roomThe name given to a place or page in a website or online service where people can type messages which are displayed almost instantly on the screens of others who are in the “chat room.”
fieldA single attribute of the entity which the record describes.
factorDisplay prime factors of a number
censusSee: File census
normal administrative practiceIs a provision under s.24 of the Archives Act that provides for the destruction of Commonwealth records whose destruction is not otherwise covered by a specific law or an authorized records authority
continuityA type of offer in which the consumer agrees to review new editions of or variations on a product and purchase a contracted number of these over a specified time period
electronic commerceThe use of communications technology for business transactions and activities.
clean computingClean computing is when an organization's manufacture, use and disposal of IT equipment does not produce any harmful waste at any stage
digitised recordRecords transformed into a digital form from an analog form eg
uc davis cyber-safety programCampus policy requires devices connected to the UC Davis electronic communications network to meet UC Davis security standards or get an authorized exception
iso 14001ISO 14001 was first published in 1996 and specifies the actual requirements for an environmental management system
records management systemSee: Recordkeeping system
scamAny illegal plot or fraud in which a person or group of persons are tricked into giving money, under false promises of economic gain (trips, vacations, lottery prizes, etc.).
archival information unitAn archival information package whose content information is not further broken down into other content information components, each of which has its own complete preservation description information.
beneficiaryn
decryptionencryption, signature generation, or signature verification.
hot spotA bright area in a photograph that come from reflections on eyeglasses or unevenly spread lighting.
oracle pkiOracle Advanced Security includes Oracle PKI (public key infrastructure) integration for authentication and single sign-on
local auto-login software keystoreA
networkNetworking is the scientific and engineering discipline concerned with communication between computer systems
full hdtvDenotes resolution of 1080p, ...1080 lines progressively scanned from top to bottom of the screen
secure hash algorithmSecure Hash Algorithm assures data integrity by generating a 160-bit cryptographic message digest value from given data
tcp/ip TCP/IP is an acronym for Transmission Control Protocol/Internet Protocol
uriSee: Uniform resource indicator (URI)
forwardable ticket-granting ticketIn Kerberos
ciphertextData that has been encrypted
zero-vocA term used to indicate paint containing no volatile organic compounds - a healthier alternative to conventional paints
rnaSee: Retain as national archives (RNA)
fieldHalf of a complete video frame when interlacing is used
brownoutPeriod of lower voltage
portalA site that the owner positions as an entrance to other sites on the internet
greenhouse gasesGreenhouse gases (GHGs) are trace gases that control energy flows in the Earth's atmosphere by absorbing infra-red radiation
dot widthThe width of a point, or dot, primitive
calligraphicAn early type of computer graphics display that could only draw lines, not filled in areas
sortSort text files
photonA particle of light.
smart cardA plastic card (like a credit card) with an embedded integrated circuit for storing information, including such information as user names and passwords, and also for performing computations associated with authentication exchanges
content management systemA tool used to organize data
authenticSee: Full and accurate record
disaster planA written procedure setting out the measures to be taken to minimise the risks and effects of disasters such as fire, flood or earthquake, and to recover, save and secure the vital records should such a disaster occur.
security tokenSee security device.
dun & bradstreet numberAlso known as a D & B number; a unique nine digit code that identifies millions of companies worldwide.
security controlsA scheme of protective markings that may be allocated to users, digital records and record plan entities to restrict access in accordance with the Australian Government Protective Security Framework (PSPF)
bandwidthThe range of frequencies assigned to a broadcast channel
e-crimeE-crime is where computers or other electronic communications devices, for example mobile phones, are used to commit an offence, are the target of an offence or act as a storage device in an offence.
hybrid recordkeeping systemA recordkeeping system containing records in a combination of paper, electronic or other formats.
authorised termSee: Preferred term
sha1(Secure Hashing Algorithm) The algorithm that operates on any input length less than 264 to produce a message digest.
templateA template is something that already has a pre-defined structure
take control1
online child groomingThe efficiency of child groomers is becoming increasingly professional, partly as a result of the Internet
cleartextSee plaintext.
preference dataData, which may be collected by a site or a service provider, about an individual's likes and dislikes -- such as favorite color or musical tastes.
top numberingThe practice of amending numbers (or other identifiers) of records when their control is transferred from one recordkeeping system to another to bring them into line with the new control system.
control recordA record created and maintained to help identify and retrieve other records
testEvaluate a conditional expression
mail order/ telephone orderA type of payment card transaction where the order and payment information is transmitted to the merchant either by mail or by telephone in contrast to a "card present" or face-to-face transaction when a
privacy policyThis is the document that sets out the procedures, rules, and data security practices of a company to guarantee the integrity, confidentiality and availability of data collected from clients and other interested parties in accordance with applicable legislation, IT security needs and business objectives.
rcpCopy files between two machines
debit cardPayment method that allows the cardholder to make payments through direct withdrawal from the cardholder's bank account.
i2xImage-to-anything
pathogenicCausing or capable of causing disease.
third-party ad serverIndependent outsourced companies that specialize in managing,maintaining, serving, tracking, and analyzing the results of online ad campaigns
climate security actLegislation proposed in the US Senate in October 2007 by Senators Lieberman and Warner
alternate sourceIn strict terms, an alternate source is any subscription source other than direct mail
script.aculo.usA JavaScript library, built on top of
tsortTopological sort
organisationSee: Agency
egrepPrint lines matching a pattern
shuffleTo reorganize a number of items so that they appear in the correct order.
mailidThe part of an email address before the @ symbol; usually the first and middle initial of a user's name, followed by the last name
controlled vocabularyAn alphabetical list containing terms or headings that are authorised or controlled so that only one heading or form of heading is allowed to represent a particular concept or name.
infoHelp info
optrsOn-line Time Reporting System (a component of Payroll Personnel System used by the campus).
colour matchingTechnique to ensure that the colours displayed on a PC monitor are as close as possible to the finished printed picture
private cloudA type of CrashPlan PROe deployment
caveatA non-hierarchical qualifier (such as commercial-in-confidence) attached to a security category to limit access to particular records
financial institutionAn establishment responsible for facilitating customer-initiated transactions or transmission of funds for the extension of credit or the custody, loan, exchange, or issuance of money.
wrlSee
volatileDepending on the maintenance of power for the retention of information.
downstream data useRefers to companies' practice of disclosing personal information collected from users to other parties "downstream to facilitate a transaction
classificationThe systematic identification and arrangement of business activities and/or records into categories according to logically structured conventions, methods and procedural rules represented in a classification system.
home_nameRepresents the name of an Oracle home
mailmail system
distributed custodyThe arrangement whereby archival records are held in a controlling agency beyond the period where they would normally be transferred to the archives, by agreement between the archival authority and the controlling agency.
software keystoreA container that stores a Transparent Data Encryption
bitA bit is a binary digit, the smallest increment of data on a computer.  It can hold only one of two values:  0 or 1, corresponding to the electrical values of Off or On, respectively.  (Also see Byte and Kilobyte.)
vduVisual display unit – old name for a computer monitor
business process re-engineeringThe analysis and redesign of business processes and management systems required by new technology, such as electronic commerce.
tessellationThe act of tiling a surface with individual surface patches.
gdaSee: General records authority (GRA)
encapsulated objectA digital record that has been ‘packaged' with enough metadata to preserve its content and context, and to support their reconstruction at some time in the future
cybersecuritythe effect of a loss of confidentiality, integrity or availability of information or an information system on an organization's operations, its assets, on individuals, other organizations, or on national interests.
arrangementThe intellectual and physical process of putting archives and records into order in accordance with accepted archival principles, particularly those of provenance and original order.
periodic processA periodic process is any process that runs at a specified time.
vendorA person or company selling or supplying goods and services.
electronic recordA record created, communicated and/or maintained by means of electronic equipment
associative relationshipUsed when describing terms from a functional analysis
agency controllingThe agency with responsibility for the functions or legislation to which a series of records relates
data integrityentity authentication
ps2epsiGenerate conforming Encapsulated PostScript
disposal actionAn action stipulated in a record authority indicating the minimum retention period for a record and the event in relation to which the disposal date should be calculated.
subwooferA speaker in a home theater surround sound system that is designed to play low-frequency (bass) sounds
stubA skeleton function (i.e., one that performs little or no processing) created to stand in for one function (the target) to allow the testing of a second function that is designed to call the target function
system access controlAny mechanism used to prevent access to the system by unauthorised users
sedStream Editor
online profilingCompiling information about consumers' preferences and interests by tracking their online movements and actions in order to create targeted ads.
sequential searchA programming strategy of searching for an item in a data file by examining items in the order in which they are stored, often not the most efficient searching method.
user profileA summary of all attributes allocated to a user of the electronic records managment system
topicDiscussion forums are made up of topics that represent a discussion around a particular theme each.
point sizeMeasures the height of letters where one point is 1/72 inch
freeDisplay free memory G  
demographic and socioeconomic dataData about an individual's characteristics -- such as gender, age, and income.
sleepDelay for a specified time
ecologoThird party certification program based in Canada that certifies cleaning products (among other product categories).
debit cardATM card for accessing personal bank accounts.
evaluation criteriaThe criteria used to evaluate the compliance and/or relative ranking of submissions received in response to a procurement process.
forced free trialA short-term, free subscription sent without request to targeted prospects with the goal of converting them to paid subscribers, most frequently used by newsletters
public key cryptographyA field of cryptography invented in 1976 by Whitfield Diffie and Martin Hellman that depends on a matched pair of inverse keys
frequently asked questionsA set of answers to frequently asked questions.
cacheA temporary storage area for currently-used or recently-accessed data
bandwidthThe amount of data that can be transmitted at a given moment to a server.  The higher your bandwidth, the larger amount of traffic your site can handle at one time.
biodiversityBiological diversity in an environment as indicated by numbers of different species of plants and animals
moderatorPerson in charge of a chat-room monitoring for undesirable content or behaviour
privileged accessAccess to more than one card number at a time, as opposed to access to a single card number for purposes of completing a transaction (Thus, the term describes positions such as database administrators of systems that house cardholder data, but not cashiers handling one card at a time).
open standardsThe recognised national or international platform-independent standards
uncontrolled recordRecords that have not been documented or brought under a system of control or arrangement.
gifA lossless image compression system typically used for small images with few colours in them (in practice it can be lossy because it has only 256 colours, and if the original has more colours then some will be lost).
mtControl magnetic tape drive operation
riskand develops and/or recommends appropriate mitigation
trackingCreating, capturing and maintaining information about the movement and uses of records.
usermodModify user account
zifZero Insertion Force – socket for microchips, designed to prevent damage with a simple lever mechanism to securely grip the connecting pins.
destructionThe National Archives authorises disposal of Commonwealth records (including destruction) for the purposes of the Archives Act 1983
business activityAn umbrella term covering all the functions, activities and transactions of an organisation and its employees
makegoodA publication that misses rate base (see definition) over a period of time or prints a poor reproduction of an ad will generally offer to republish the ad at no extra cost to the advertiser, or reduce or cancel the fee for the affected advertising.
expungeTo delete exempt information from a copy of a record in order to make the remainder of the record available for public access.
system rulesThe policies internal to system software that may be established and/or configured by a system administrator in order to govern the functionality of a given system and determine the nature of operational processes applied by that system.
privilege elevationMost user accounts on a computer system have a limited set of privileges that allow them to perform a specified range of actions, such as viewing or editing files or making certain system changes.
certificate-based authenticationVerification of identity based on certificates and public-key cryptography
functions thesaurusAn alphabetical classification tool that reflects the business activities of an agency and their relationships
nitrogen fixingThe process by which bacteria that live in root nodules take nitrogen from the air and convert it to a form that plants can absorb
time zoneAny of the 24 longitudinal divisions of the earth's surface for which a standard time is kept.
adversarywith specified expertise and resources, to overcome a protective measure.
collaborative filteringSelecting content based on the preferences of people with similar interests.
service nameSee net service name.
gpsGPS- Global Positioning System is a satellite based navigation system that provides information about weather, location and time from anywhere across the globe using an Internet connection.
durable goodsGoods, such as appliances and furniture, that are not consumed in use and can be used for a period of time, usually several years.
budgetA magazine's projected circulation numbers and revenues for the year
socket testerDevice that plugs into a normal mains socket and checks the status of the wiring
commonwealth recordA record that is the property of the Commonwealth or of a Commonwealth institution; or a record that is deemed to be a Commonwealth record by virtue of a regulation under the Archives Act 1983, but does not include a record that is exempt material or is a register or guide maintained in accordance with the Act.
unitsConvert units from one scale to another
legacy lockboxn
chargebackA reversal of a payment card transaction initiated by the consumer who holds the card or the bank that issued the card used in the purchase.
layerVariable items that will change, for example, people's images and names
basecampA collaboration tool (http://www.basecamphq.com/) developed by
personal recordsThe records of a person who is, or has been, associated with the Commonwealth (eg prime ministers, ministers or judges)
ghg protocol corporate standardThe GHG Protocol Corporate Standard provides standards and guidance for companies and other organizations preparing a GHG emissions inventory
kbpsYour modem's speed is measured in the number of bits it can transfer in a second
recordA subdivision of a file, containing data related to a single entity.
formatThe physical form (such as paper or microfilm) or computer file format in which a record is maintained.
modemA modem (modulator/demodulator) converts the digital information in your computer to sounds that can be sent over the telephone line
design specificationA document detailing requirements for functionality, performance and design to be incorporated within a system to be built
series systemA method of describing records and their contexts of creation and management over time
styleIt's special effects such as boldface, italic, outline, etc
contextThe background information that enhances understanding of technical and business environments to which the records relate, eg
snap-insAdministrative tools that run within Microsoft Management Console.
pop-up menuList of options that is displayed when clicking on a certain item or area of a window in a program with the secondary mouse button (usually the right)
sidSee system identifier.
defractionThe breaking up of a ray of light into dark and light bands or into the colors of the spectrum, caused by the interference of one part of a beam with another.
archivesAn organisation (or part of an organisation) responsible for appraising, acquiring, preserving and making available archival material.
uploadWhen you upload, you are sending a file from your system to another system, as opposed to downloading, where you retrieve a file from another system.
hashA number that is produced by taking some input and generating a number that is significantly shorter than the input
structured dataA record created from data that has been collated and managed in a structured environment, often in a database-type business information system
data lossdata theft, data leak
compressionSpecial encoding of data to reduce byte size; useful in storing and archiving large (or multiple) files or for transmission of data over a network.
general records authorityA records authority that covers functions common to all or most government agencies, usually produced by the National Archives on behalf of the Australian Government.
freeDisplay memory usage
maskingIn an image editor, selecting an area of an image to prevent that area from being modified accidentally.
audiovisual recordA record that has sound and pictorial attributes
open periodOnce a set closed period has elapsed since a record came into existence, it comes into the open period
browsingA method of finding a record by starting at a known point and following linked terms and other identified paths to locate required information.
vectorA value that has a direction and a magnitude (length)
archivesA place such as a building, room or storage area where archival material is kept.
resample & resizeTwo techniques for altering the dimensions of an image, in general resampling is better for photographic images, resizing works better with simple graphics
unbilled usageYour unbilled usage generally refers to calls that you have made for which you have not yet been billed
white balancingAdjusting the camera to compensate for the type of light hitting the photographic subject
switchA device that facilitates transmissions between nodes on a private network and regulates internal network traffic.
x2vAnything-to-virtual
csvText file where items of information – i.e
compliantSee: Full and accurate record
linear interpolationInterpolation is the process of determining plausible in-between values, given explicit values at particular points
wireless technologyIncludes any technology used to transmit data without a physical connection.
nlNumber lines and write files
confidence levelThe likelihood that the sampling error in a survey result will fall within a specified range, usually expressed in terms of standard errors (e.g
dcvDCV stands for Domain Control Validation.
bandwidthA measure of the “speed” of an Internet connection.
operational entityAn independent entity, accredited by the CDM Executive Board, which validates CDM project activities, verifies and certified emission reductions generated by such projects
form factorsThe name for the illumination coupling factors between polygons used in radiosity
central wiring panelA place in your home where you locate the infrastructure devices that enable you to connect your home theater to other parts of the house in a whole-home theater system.
sysdbaA special database administration role that contains all system privileges with the ADMIN OPTION, and the SYSOPER system privilege
qnx osQNX RTOS is a Real Time Operating System built for high reliability and performance in the embedded space which was developed by QNX Software systems and later taken over by Research in Motion- a Canadian based Smart Phone (BlackBerry) manufacturer
systemA set of interrelated components that work together to achieve some common purpose.
certificate chainA hierarchical series of certificates signed by successive certificate authorities
usleepSleep a given number of microseconds
merchant accountAn arrangement with a bank that enables merchants to accept credit card payments.
recordkeeping metadataStructured or semi-structured information that enables the creation, management and use of records through time and across domains
caSee certificate authority (CA).
downgradeTo convert the data in Oracle Database to an earlier Oracle release
disposal authoritySee: Records authority
convergenceThe degree to which all three electron beams of a color CRT meet at the same spot on the screen
short message service  A communication protocol for transmission of short text messages between one mobile devices connected to a telecommunications network
ditheringA technique for increasing an image's apparent color (or gray scale) resolution without increasing the number of color (or gray) levels actually used, at the cost of adding a "grainy" look to the image.
folderAn aggregation of records allocated to a records category within the records classification scheme
ecosystemA place having unique physical features, encompassing air, water, and land, and habitats supporting plant and animal life, including humans.
driverSee Device driver
sourcesLocations from which you send files to be backed up or stored
dnSee distinguished name.
sulfur hexafloride or sf6One of six GHGs curbed under the Kyoto Protocol
booleanExpression-based system that uses the operators AND, OR, and NOT; operations are based on variables which can be 1 (true) or 0 (false).
physical folderAn entry in the record plan for a hardcopy folder, usually paper
bluetoothA physical wireless communications standard for exchanging data over short distances from fixed and mobile devices
subjectThe entity (such as a person, organization, or router) identified by a certificate
displacementA distance in a particular direction
routerA device that finds the best path for a data packet to be sent from one network to another
brightnessDifferences in the intensity of light reflected from or transmitted through an image independent of its hue and saturation
symlinkMake a new name for a file
coaxial cableRound insulated wire with single wire in center
fortranFrom Formula Translation
temporary recordA record that has value for a finite period of time only to the Australian community, the individuals and organisations that do business with the Commonwealth and Australian Government agencies themselves
spectrumA continuous band of frequencies...
spamUnsolicited, commercial e-mail messages that are sent out in bulk, often to millions of users in hopes that one person may actually reply
to the querying user.See also
certificate chainA base certificate plus a sequence of all digital certificates up to but not including the Root Certificate.
passive modePassive mode is the data connection established by the client computer
active recordA record that has not been closed and which is required for the day-to-day functioning of an agency or person.
ditSee directory information tree.
hubThe centralized connection point for the audio and video equipment in a home theater, which is typically the A/V receiver.
red-eyeDemonic effect, giving people (and animals) bright red (or green) pupils, caused by camera flash reflecting back from the subject's retina
certificate revocation listA time-stamped list of revoked Certificates that has been digitally signed by the CA
usb modemA type of broadband modem that connects to a USB port on your computer
view-masterProprietary name of a commercial stereo transparency image display and viewing system utilizing stereo pairs (7 in total) mounted in a circular rotating holder, and viewed with a purpose-made stereo viewer.
analogAnalog systems represent data as a series of variations in some measurable, physical quantity, such as voltage or waveform
integrityand confidentiality
ereader(Electronic Publication) An open standard for electronic books and Web publishing from the International Digital Publishing Forum
sharewareSoftware distributed for evaluation without cost, but that requires payment to the author for full rights
deselectTo act on, typically by clicking somewhere else, a selected item so that it is no longer selected or highlighted.
filter kernelThe function that defines the relative weight of a point depending on its position
post transactionThis is a transaction that allows a merchant to submit a previously authorized transaction to the Acquirer for payment.
greenhouse effectThe trapping of heat within the Earth’s atmosphere by greenhouse gases such as carbon dioxide, which accumulate in Earth’s atmosphere and act as a blanket keeping heat in
spama processed meat product of (dubious) quality; a registered trademark of Hormel; e-mail promoting products, services, or ideas sent to hundreds (thousands, or even millions) of recipients who have not asked to receive it (
rpmRemote Package Manager
electronic business  Business activity that is conducted online.
lendingSee: Retrieval
check digitAn extra digit that is added onto the end of a number such as an ISBN, credit card number, or barcode number
addressA number given to a location in memory
cableA broadband transmission technology using coaxial cable or fiber-optic lines
repositoryThe building or room, or part thereof, set aside for storing records
mktempMake temporary filename (unique)
certification authorityA body that generates, signs and issues public key certificates that bind subscribers to their public key.
multimedia ebookA multimedia ebook is media and book content that utilizes a combination of different book content formats
konqueror: The file manager typically used on a
fsckThe fsck command checks a filesystem for consistency.
rbgh-freeRecombinant Bovine Growth Hormone or rBGH (also known as rBST or recombinant bovine somatotropin) is a synthetic hormone used to increase milk production in cattle
clickPoint to an item and then quickly press and release the mouse button.
public keyA cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and which is available publicly
data encryption standardThe U.S
hard driveThe most common form of permanent data storage for your system, it consists of special magnetically-coated platters designed to store mass quantities of data
scalarA regular, single number, as opposed to a vector.
routerA device that connects two or more networks
linear complexityLinear complexity grows in proportion to the size of the problem - if the problem is twice as big, it will take roughly twice as long to solve.
issuerA financial institution or its agent that issues the payment card to the cardholder identified by the primary account number (PAN).
straceTrace system calls and signals
social networkIt was coded initially in large part by current CEO Mark Zuckerberg, but credit for its creation is generally given to Mark Zuckerberg, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz, and Chris Hughes.
beacon intervalWhen a wirelessly networked device sends a beacon, it includes with it a beacon interval, which specifies the period of time before it will send the beacon again
drawAlso termed an allotment
kplKodak Professional Language
ppm 200-45The administrative computing policy PPM 200-45 establishes oversight and accountability for existing and proposed campus administrative computing systems
iesna’s lighting handbookThe Illuminating Engineering Society of North America or IESNA has produced a Lighting Handbook used as reference standard by the 2008 Professional Engineer’s Guide to the ENERGY STAR® Label for Commercial Buildings
openTo make available.
ccdShort for charge-coupled device
clipboardAreas in which the most recently cut or copied item is temporarily stored
quadratic complexityQuadratic complexity grows with the square of the size of the problem - if the problem is twice as big, it will take roughly 4 times as long to solve.
checksumAn algorithm-based method of determining the integrity and authenticity of a digital data object
fixpsTry to fix common PostScript problems that break postprocessing
repeat visitorRefers to a person who visits a given Web site multiple times
recoverable errorThe type of error that the operator can resolve.
led technologyIn LED LCD televisions, light-emitting diodes provide the necessary illumination of the screen
roll-outThe process of implementing a system or software application within an organisation
certificate chainAn ordered list of certificates containing an end-user or subscriber certificate and its certificate authority certificates.
24-bit imageA digital image that can include as many as 16.7 million possible colors
web serverThe term Web server can mean one of two things:
transferThe transfer of ownership of a Commonwealth record is subject to section 24 of the Archives Act 1983
voxelA unit of subdivided space
saturationThe amount of gray in a color
hierarchical relationshipA relationship based on degrees or levels of superordination and subordination, where the superordinate term represents a class or whole and the subordinate terms refer to its members or parts
access controlsThe scheme of non-hierarchical mechanisms, which may be applied to records and record plan entities, to prevent access by unauthorised users
fair tradeA social movement that promotes standards for international labor and gives workers a sense of economic self sufficiency through fair wages and good employment opportunities to economically disadvantaged populations.
certificateA record that, at a minimum:
pieKodak Professional Imaging Engine
tariffYour tariff or price plan is the monthly amount you pay on top of your line rental to receive services and benefits from your ISP and/or voice provider.
loggingA record of the time and date of a set of actions or activities
sortSort lines of a text file
ohmA unit of electrical resistance; the resistance of a conductor in which a potential difference of one volt produces a current of one ampere
shaSee Secure Hash Algorithm.
root privilegesWhen one has root privileges, one has the powers associated with the root account.
signalA mechanism by which a process may be notified by the kernel of an event occurring in the system.
records continuumSee: Continuum
acid freePaper and other materials with a pH of 7 (neutral) or higher (alkaline)
pkcs #11The public-key cryptography standard that governs security devices such as smart cards
spamnestA company or a place that generates and allows the production and sending of spam.
completeSee: Full and accurate record
snootA tube-like device that focuses the flash’s light to a very small area.
retrospective inheritanceThe process whereby a subordinate (or child) entity automatically takes on a metadata attribute from its superior (or parent) entity when the metadata of the parent entity is changed or the child entity is moved from one parent entity to another.
keystoning/keystone distortionTerm used to describe the result arising when the film plane in a camera or projector is not parallel to the view or screen
visitMeasurement which has been filtered for robotic activity of one or more text and/or graphics downloads from a site without 30 consecutive minutes of inactivity and which can be reasonably attributed to a single browser for a single session
rs-232Short for Recommended Standard 232
cctldccTLD stands for "country code Top Level Domain", which are the domains that pertain to a certain country or similar entity
cable modemA modem designed to operate over cable TV lines
brightness resolutionThe intensity of light reflected from or transmitted through an image.
secure hash algorithmAn algorithm that assures data integrity by generating a 160-bit cryptographic message digest value from given data
manHelp manual
as 4390AS 4390 is the original Australian Records Management standard released in 1996
contactsAn address book or a name and address book (NAB) is a book or a database used for storing entries called contacts
insertAdd text at location without overwriting existing text
os serverA system that provides services to systems on a network
distinguished nameA specially formatted name that uniquely identifies the subject of a certificate.
usermodModify a user account
above the foldNewspapers: The most valuable space is the portion that appears at the top of a folded newspaper
corrective action requestA request raised by the Designated Operational Entity (DOE) during the validation process, in the case where a mistake has been made, the CDM requirements have not been met or there is a risk the emissions cannot be monitored or calculated
privacy breachA privacy breach is a situation in which sensitive information that is controlled by Bank of America (or a third party acting on our behalf) is lost, misused (including inappropriately accessed) or disclosed to an unauthorized third party
networkA set of computers which are linked together on a permanent basis
smart cardCredit card type card which has an embedded computer chip that updates your account values with each use.
living willn
localeA geographic or political region or community that shares the same language, customs, or cultural conventions (English for the U.S
current recordSee: Active record
exprEvaluate expressions
"do-good" networksonline philanthropic communities.
criCarpet and Rug Institute
confidentialityand integrity
aesAdvanced Encryption Standard (AES), also known as US FIPS PUB 197, is a block cipher, which has been adopted as an encryption standard by the U.S
jpeg/mpegJoint Photographic Experts Group/Motion Picture Experts Group (part of the International Standards Organisation)
connect identifierA net service name or service name, that maps to a connect descriptor
lcdA panel based on liquid crystals
rviVi / Vim editor S  
san ssl certificateSAN stands for Subject Alternative Name
certificationThe process of ascertaining that a set of requirements or criteria has been fulfilled and attesting to the fact to others usually with some written instrument
densitometer toolIt measures the amount of light that is reflected or transmitted by an object, and is used to correct color in a composite image
protocolProtocol refers to a set of rules that are followed by two devices while interacting with each other.
data dictionaryA formal repository of terms used to describe data.
archprint machine architecture
enterprise risk managementintegrated risk management, risk
e-mail aliasAn alternative name for a more complex email address
ntpNTP subsystem
diff3Determine difference between 3 files
walletAlso called a digital wallet
wirelessThe condition of functioning without a wire or cable attached
attenuationA term used to describe how much of a signal is lost as it is sent down a line
disposal scheduleSee: Records authority
assuranceSSL is not only about encryption but also about assurance
ociSee Oracle Call Interface.
gatekeeperThe Australian Government strategy to develop public key infrastructure to facilitate government online service delivery and e-procurement.
change managementThe proactive development of strategies and action plans to manage the impact of changes in work practices and business processes on an organisation
edmsAn automated system that supports the creation, use and maintenance of electronically-created documents for the purpose of improving an organisation's workflow
expandConvert tabs to spaces
about detection namesA quick guide to Detections - why they are important, how they work and how to read them
featured phonesA cellphone that contains a fixed set of functions beyond voice calling; however, it is not in the smartphone category
smartsiteA course-management system that can help UC Davis faculty, staff and students teach, research, and collaborate online
ciphertextor create a message authentication code and to verify the code.
connect stringSee net service name.
mtsSee Microsoft Transaction Server
aggregationAny accumulation of record entities at a level above record object (document, digital document) eg
macro-appraisalA whole-of-government approach to identifying society's needs for public records
hybrid cloudA type of CrashPlan PROe deployment
public key infrastructureAllows users to encrypt sensitive information, so as to exchange it over the Internet in a private manner using special "keys", a public and private key pair that is obtained through a certification authority
riskcompliance, and assurance from internal and external perspectives.
subnetA working scheme that divides a single logical network into smaller physical networks to simplify routing.
ipmIntegrated Pest Management
contactless paymentAlso known as "touch and go" are credit cards, debit cards, key fobs, smart cards, or other devices that use radio frequency for making secure payments
bioinsecticideAn insecticide derived from natural materials such as animals, plants, bacteria, and certain minerals
rgb colorA color model in which red, green, and blue values are used to reproduce a set of standard colors
pro-rataPro-rata, or part-month, charge may be added to your first bill, or to your first bill after a chargeable feature has been added to your account
transfer deviceThe medium used to transfer electronic records from an agency to the National Archives, eg
cookieA simple data file containing information related to a website visitor’s activities
epaEnvironmental Protection Agency EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes
bracketingTaking a series of photographs of the same subject at different settings to help ensure that one setting will be the correct one.
baudUsed to indicate the speed of a modem
blogShort for “web log” this is a kind of website comprised mostly of article entries updated on a regular basis.
interoperabilityThe ability to exchange keys, both manually and in an automated environment, with any other party implementing this standard, providing that both implementations use compatible options of this standard and compatible communications facilities.
carbon credit noteA fully underwritten obligation (in the form of a note or bond) to deliver a carbon credit (Certified Emission Reduction) to the purchaser at a specified future date
fatThis is a section of a disk that defines the structure and organization of the disk itself
dongleA type of electronic key (‘dangling' on the end of short wire) used to unlock some types of software or any small device that plugs into a PC
borrowingA mechanism under a cap and trade system that allows entities to use allowances designated for a future compliance period to meet current compliance period requirements
power supplyA Power Supply converts wall outlet AC power into DC power, which is the type of power required by a computer
indoor air qualityIAQ refers to the contents of interior air that could affect the health and comfort of occupants
amblyopiaA visual defect that affects approximately 2 or 3 out of every 100 children in the United States
viStart the vi editor W  
cshC Shell
3d viewingThe act of viewing a 3D image with both eyes in order to experience stereoscopic vision and binocular depth perception.
clusteringGroup of independent systems working together as a single system
temporary affiliate formA process to grant temporary campus computing privileges to guest faculty and staff, visiting scholars and others
edrmsee Electronic Records Management
aliasingThe phenomenon that makes smooth lines and edges appear stair stepped or jagged
biomassLiving or recently-dead organic material that can be used as an energy source, excludes organic material that has been transformed by geological processes (such as coal or petroleum).
charge cardA credit card which requires payment in full upon receipt of the statement.
oshaThe Occupational Safety and Health Administration (US) or OSHA has promulgated regulations that oversee the management of hazardous materials in commercial entities
procurement documentationDocumentation provided to vendors to enable them to understand and assess the requirements of the procuring agency and to prepare appropriate submissions
misrepresentationPresentation of an entity as a person or organization that it is not
binaryA code system that uses 2 as its base and 0s and 1s for its notation
taxonomyThe classification of entities in an ordered system that indicates natural relationships.
palDuring the early days of color television in North America, European broadcasters developed a competing system called Phase Alternation by Line
fingerprintSee certificate fingerprint.
gpsGlobal Positioning by Satellite – fleet of low earth orbit satellites that broadcast highly accurate timing signals that can be picked up by small hand-held receivers, giving the user's location anywhere on the planet to within a few metres
lprline printer subsystem
information packageAn information packaging concept that distinguishes content information from associated preservation description information (PDI) where it applies to the content information and is needed to aid in the preservation of the content information
magnetic tapeA plastic, paper or metal tape that is coated or impregnated with magnetisable iron oxide particles on which information is stored as a pattern of polarised spots
viewA selective presentation of the structure and data of one or more tables
bitBit short for “binary digit” - a digit that is either 0 or 1.
convergenceThe ability of both eyes to turn inwards together, enabling both eyes to be looking at the exact same point in space
adoptTerm that describes the process of having one device take over for another device that has been lost, stolen, sold, or reformatted
external addressThe device's public IP address as seen by the CrashPlan.
pa-dssPayment Application Data Security Standard
secure shellSecure Shell (SSH) is a well known protocol and has widely available implementation that provide a secure connection tunneling solution
vanity domainAn Internet domain created for no other reason than to boost the creator's ego
payment cardsCredit cards, debit cards, and charge cards issued by a financial institution.
naming conventionsThe glue that holds Rails together, letting applications figure out which pieces connect to which pieces without requiring a formal mapping table
impedanceMeasurement of resistance in relation to an alternating current
lprOff line print
operatorThe person who is responsible for maintaining and running a Web site.
skimmingCaptures the track data from the magnetic stripe on a credit card, Debit Card or ATM card via a device that is illegally added to the ATM swiper.
certificate revocation listA list of revoked certificates that is generated and signed by a certificate authority (CA)
vinegar syndromeA characteristic of the decomposition of acetate-based magnetic tape where acetic acid is a substantial by-product that gives the tape a vinegar-like odour
tracepath6See tracepath
technewsA free campus tech news and information service for faculty, staff and students, from Information and Educational Technology
attended modeA PIE operating mode
key pairA
control symbolThe numbers or letters imposed on an item to identify it in order to provide a system for facilitating control
managed private cloudA private cloud deployment strategy of CrashPlan PROe or SharePlan for Enterprise where Code42 managed appliances are utilized.
digital walletSee wallet.
ledAn LED (light-emitting diode) is a small electronic light that is used as the backlight for computer screens and televisions, camera flashes, flashlights, light bulbs and also as indicator lights in devices.
subject nameA distinguished name (DN) that uniquely describes the subject of a certificate.
cscShort numeric numbers (typically 4-6 digits) to which text messages can be sent from a mobile phone
aspect ratioThe width of a video display compared to its height and defined as a ratio, such as 16:9 for widescreen and 4:3 for a traditional TV.
instantiateProduce a more defined version of some object by replacing variables with values (or other variables).
touchChange file timestamps
normal vectorA vector pointing straight our from (at right angles to) a surface.
inlistFile-based whitelisting and blacklisting.
inherited recordA record that has been passed from one agency to another when responsibility for the relevant function is transferred or one agency is absorbed by another, including when state agencies are absorbed by Australian Government agencies.
spamThe legal definition of spam varies from one country to another
tip-onA single-sheet subscription renewal or new-business promotion glued or affixed to the front of a subscriber or sample copy
dioxinsA family of toxic made-man organic chemicals, found in products such as bleached paper and formed from the burning and manufacturing of chemicals containing chlorine, with a toxicity level ranking just below radioactive waste
extension tubeA camera attachment that moves your camera lens farther from the sensor, enlarging the image captured by the camera
registrationThe act of giving a record or file a unique identity in a recordkeeping system to provide evidence that it was created or captured
adequateSee: Full and accurate record
physical recordA record in hardcopy form, such as a folio, paper file, bound volume or photograph.
instant messagingA form of real-time communication between two or more people based on typed text
architectureThe design, organization, and integration of components within a computer system, primarily determined by the central processing unit that the system employs.
fqdnFQDN stands for Fully Qualified Domain Name
calren-2California Research and Education Network
itemA discrete unit in a recordkeeping system or, in the archival context, within a series, such as a document or file, that is treated as a unit for control and retrieval.
swap fileA file on your computer to which information, some of which may be sensitive, is occasionally saved in order to improve performance
micropaymentsSee digital cash
primary account numberThe assigned number that identifies the card issuer and card holder
equivalence relationshipThe relationship between preferred and non-preferred terms in a thesaurus where two or more terms are regarded, for indexing purposes, as referring to the same concept
risk analysisrisk
ledLight-Emitting Diode
master socketThe master socket is the primary phone socket in a home
hot swappableA device or component that can be safely removed and replaced whilst the equipment it is connected to continues to operate
power densityThe amount of energy a battery can store in relation to its physical size and weight
repeaterA device that amplifies or refreshes a stream of data transmitted over a network, so it can travel to more remote computers
peer-to-peerA workload portability operation in which both the source and the target are bootable workloads, either physical or virtual (as opposed to operations in which either the source or the target is a static PlateSpin Image)
stakeholderAn individual or group potentially affected by the activities of a company or organization; in sustainable business models the term includes financial shareholders as well as those affected by environmental or social factors such as suppliers, consumers, employees, the local community, and the natural environment.
networkA means of hooking a number of computers together in order to share data and/or peripherals
contents date rangeThe contents start date and contents end date, which are usually the dates on the first and last folios of a record.
private keyIn public-key cryptography, this key is the secret key
optical codesPrinted bar codes on products, envelopes, etc.
markerThe metadata profile of a record physically held outside an electronic records management system
contrastThe range of difference in the light to dark areas of a photo.
preservation description informationThe information that is necessary for adequate preservation of the content information and which can be categorised as provenance, reference, fixity and context information.
semanticsA feature of a language that denotes the meaning associated with various syntactic constructs of the language.
propertyFor the purposes of the Archives Act 1983, property is derived from delivery (ie
synchronisation speedThe speed of your broadband connection depends on a number of factors
v2xVirtual-to-anything
newsgroupsNewsgroups are also known as online forums and are places on the internet where people can contribute to a discussion by leaving a message of interest
ransomwareA malicious application that steal or encrypts the user’s data or system, then demands payment (a ransom) to restore the data or system access, is known as ‘ransomware’.
pvsee Photo Voltaic
offsiteA location that is outside the facility that contains the devices being backed up.
pay-upA calculation to express the number of prospects who responded to a promotion and then paid for the magazine or product
error detectionDetecting when an error has occurred in some data, such as a number getting typed incorrectly or a bit getting flipped
xssCross-site scripting
real-time scannerA anti-virus program that operates in the background, allowing you to continue working at normal speed, with no significant slowing of the system.
x.509In cryptography, X.509 is an ITU-T (international telecommunication union) standard for public key infrastructure (PKI)
noiseAn outside signal that interferes with a communications transmission
daisy chainA type of cabling configuration in which devices are connected along a continuous line.
viewStart vim in read-only mode
post-consumer wasteMeans there is some percentage of pulp made from paper once used by consumers that was recycled
epaperA generic term for an extremely thin flexible display that can be rolled up
factorPrint prime factors
non-preferred termA term in a thesaurus or other classification tool that cannot be applied to a record.
goods and services orderThe price, currency, payment method, and other terms of the transaction (also referred to as the Order Description in SET).
digital signatureLike a hand-written signature, this can be added to electronic documents or transactions to provide: authentication (proof that you are who you say you are); non-repudiation (proof that an exchange or transaction took place); and integrity (so that any attempt to alter information would be detected).
mkfifoMake FIFOs (named pipes)
x2pAnything-to-physical
transactionA sequence of one or more messages between two or more parties.  One example of a transaction is the process that takes place when a cardholder makes a purchase with a credit card.
process idA process ID (PID) is a unique number associated with each process on the system
dynamic typingSee
functional requirementsA description of the requirements of a system for it to fulfil its responsibilities and to support users in performing tasks relating to those responsibilities.
electronic commerceAll business transactions that are conducted by electronic means.
online profilingCompiling information about consumers’ preferences and interests by tracking their online movements and actions in order to create targeted ads.
bluetoothThis wireless technology enables communication between Bluetooth-compatible devices
database aliasSee net service name.
statisticsA sample of malware has statistics whenever its infection percentage is among the 50 most active threats.
sshSee Secure Shell.
selectAccept keyboard input
upgrade optionAn option that is presented by the Solaris installation program
bufferLocation for temporary data storage while processing is going on
bandwidthThe speed at which data can be sent across a network
systemCommonly used to describe computer software applications
createTo make a record (evidence) of business transactions.
oracle servicesWindows services that are associated with particular Oracle Database components.
extensionThe addition of letters, numbers, etc
carbon baselineAn amount of CO2 produced by an entity which serves as a begining point for carbon management
audit bureauAn independent organization that audits the claimed circulations of its publisher members for purposes of verifying those claims for advertisers
egovernmentThe use of technology by government to interact with citizens, improve services and streamline operations
folioA leaf of paper or page in a file, usually numbered on one side only.
tlsTLS stands for Transport Layer Security
monopoleA pole position of speakers in which all the drivers are on one face of the enclosure
javaA computer programming language invented by Sun Microsystems that enables web pages to include animations, calculators, scrolling text, sound effects, and games.
busA bus is a set of wires that enables flow of data from one location of the computer to another.
cardholderA person or company that holds a valid payment card account and uses software supporting online commerce.
cpCopy one or more files to another location
confidentialityintegrity, or availability of an information system.
analyzeand report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.
archival information packageAn information package consisting of the content information and associated preservation description information (PDI), which is preserved within an open archival information system (OAIS).
certification authorityA trusted third party that issues certificates that can be used by individuals or organizations to verify their identity or credentials
analogA type of telecommunications signal (audio or video) that is translated into electronic pulses with varying strength or frequency.
/var file systemA file system or directory (on standalone systems) that contains system files that are likely to change or grow over the life of the system
records managerA user role with designated responsibility for undertaking, monitoring and managing records processes
directory / folderDivisions or sections used to structure and organize information contained on a disk
credit card issuerA credit card issuer is a bank or credit union who offers credit cards
resliveringFor a ZFS storage pool, the process of transferring data from one device to another device is known as resilvering
bluetoothA wireless technology that enables devices to talk to each other without cables
self-mailerA piece of promotion mail that is not enclosed in an envelope and is designed so that a portion of it can be used for a reply
checksumThe result of adding a group of data items that are used for checking the group
heat sinkFinned metal plate or casting bonded or attached to electronic components, designed to dissipate heat
phThe measured acidity of soil
recurring paymentsA type of payment transaction initiated by the cardholder that permits the merchant to process multiple authorizations
primary account numberThe payment card number (credit or debit) that identifies the issuer and the particular cardholder account
cyber cafeA public place offering Internet access for a fee.
microfilterThis is the small box that connects to a phone socket used to separate telephone signals from broadband signals
mipsMillions of instructions per second
analogA term describing any device that represents a variable by a continuously moving or varying entity such as a clock, the hands of which move to represent time, or a UV meter, the needle of which moves to represent varying amplifier output energy.
fallbackA reversion to the environment that ran previously
activityThe second level of a business classification scheme
latchA simple, low-level serialization mechanism to protect shared data structures in the System Global Area.
identityThe combination of the public key and any other public information for an entity
interpolationThe mathematical process of determining plausible in-between values, given explicit values at particular points
file partA part of a file (or item) that has no independent intellectual existence or control apart from the other part(s) of the file.
deletionThe process of removing, erasing or obliterating recorded information from a medium outside the disposal process
cursorSymbol marking where text will appear when you type
lensOne or more elements of optical glass or similar material designed to collect and focus rays of light to form a sharp image on the film, paper, sensor, or screen.
tmdsTransition Modulated Differential Signaling, a technology for transmitting serial data at very high speeds
rule of thirdsA way of mentally dividing your picture horizontally and vertically into thirds, then placing important subject matter where these lines intersect.
renewable resourcesA resource that can be replenished at a rate equal to or greater than its rate of depletion
information architectureThe interrelationships of systems in place in an organisation
pinterestPinterest is an online pinboard
aspect ratioThe ratio of screen width to screen height
rfiRequest for information, also called request for proposals (RFP) or request for quotation (RFQ)
optical mark recognitionMachine reads special marks, for example to score a test
standardsGovernmental or privately-created lists of criteria used to regulate or evaluate the products or behavior or corporations
lsmodList loaded kernel modules
disposalThe National Archives authorises the disposal of Commonwealth records for the purposes of the Archives Act 1983, generally by issuing a records authority (RA), previously referred to as a records disposal authority (RDA), or a general records authority (GRA), previously referred to as a general disposal authority (GDA).
cryptographyThis represents a set of mathematical techniques to encode information so as to make it unreadable by anyone who does not have the correct key
dot matrix printerThe workhorse of the computer industry, the dot matrix printer has been around for years and years
midtonesParts of an image with tones of an intermediate value, usually in the 25 to 75 percent range.
layerA way of managing elements of an image in stackable overlays that can be manipulated separately, moved to a different stacking order, or made partially or fully transparent.
probe keywordA syntactical element that extracts attribute information about a system when using the custom JumpStart method to install
sanitizeA process intended to reduce, but not necessarily eliminate, microorganisms from the inanimate environment to levels considered safe as determined by public health codes or regulations.
monitorA synchronization mechanism which encapsulates the representation of a shared resource and provides operations that are the only way of manipulating it.
chpsee Combined Heat and Power