Glossary extracted starting with automatic seeds, with BOW for the domain com and language EN
p2x | Physical-to-anything |
archival quality | A term used to describe materials that retain their original characteristics without loss of quality over an indefinite period of time |
fault tolerance | A design method that ensures continued systems operation in the event of individual failures by providing redundant system elements. |
terminator | A small device designed to dampen electrical signals reflected from the ends of a SCSI cable |
disaster preparedness and response | A range of activities aimed to reduce the risk of damage that might occur to records as a result of any disaster situation |
migration | The act of moving records from one system to another while maintaining their authenticity, integrity, reliability and usability |
rain barrel | A barrel used as a cistern to hold rainwater. |
boolean search | A search formed by joining simple terms with 'and', 'or' and 'not' for the purpose of limiting or qualifying the search. |
replication | The act of creating a copy of a malicious program's code, usually in order to infect a new target, or distribute a copy to a new computer system |
histogram | A bar graph analysis tool that can be used to identify contrast and dynamic range image problems |
foundation | Information that does not change from layer to layer |
top | List processes running on the system |
cfm | Cubic feet per minute, the measure of air flow, representing how much air is displaced in 1 minute. |
electronic data interchange | EDI is the structured transmission of data between organizations by electronic means |
macro lens | A lens that provides continuous focusing from infinity to extreme close-ups, often to a reproduction ratio of 1:2 (half life-size) or 1:1 (life-size). |
hosting provider | Offer various services to merchants and other service providers |
on-demand scanner | An anti-virus program that is started manually or to a specific time schedule. |
greenwashing | Greenwashing is the practice of making an unsubstantiated or misleading claim about the environmental benefits of a product, service, technology or company practice |
ex | Start Vim in ex mode |
confidentiality | A function of cryptography |
i2v | Image-to-virtual |
retention period | The length of time after the disposal trigger that a record must be maintained and accessible |
organization | The entity named or identified in a Certificate in the Organizational Name field that has purchased a Certificate |
recipient | n |
availability | The percentage or amount of scheduled time that a computing system provides application service. |
request for tender | A published notice inviting businesses that satisfy the conditions for participation to submit a tender in accordance with the requirements of the request for tender and other procurement documentation. |
credit card processors | Companies that provide online or real-time processing services. |
adaptive space subdivision | Space subdivision refers to the process of breaking up the scene space into many small regions |
interchange fee | Is the fee that a merchant's bank (the "acquiring bank") pays a customer's bank (the "issuing bank") when merchants accept payment cards. |
merged thesaurus | A single alphabetical list of both general administrative and organisation-specific terms that is used to classify records. |
timeline | Graphical display used in editing applications to display parts of a video or audio recording in relation to time |
life-cycle records management | A model for the management of records modelling the life of a record on that of living organisms |
p2i | Physical-to-image |
annex ii countries | Annex II of the UNFCCC includes all original OECD member countries, but not the countries with economies in transition |
crontab | Schedule a command to run at a later time |
root certificate | Root Certificate is a self-signed certificate issued form root level Certificate Authority |
social-norms marketing | The science of persuading people to go along with the crowd |
cipher | Cipher is an algorithm of encryption- decryption.Back To Top |
1024 and 2048-bit encryption | Key size or key length measured in bits |
point | Move the mouse to place the arrow pointer on an item. |
splash page | A glitzy entry page that offers few options to the user |
semiconductor | Integrated circuit on a chip |
split | Split a file into fixed-size pieces |
views | Selective presentations of one or more tables (or other views), showing both their structure and their data. |
glossary | To access all the items in the course glossary, click the Show All Terms button, below. |
propagation | The act of creating a copy of a malicious program's code, usually in order to infect a new target, or distribute a copy to a new computer system |
compliance | The act, specific to cap-and trade schemes, of surrendering the required amount of allowances, or some combination of allowances and offsets, to cover an entity’s emissions |
packet | Sections in which message or data are divided to transfer it over a network. |
dipole antenna | A type of antenna commonly used with wireless networking devices |
content filter | Content filter is a type of screening mechanism based on analysis of the content to be passed, rather than its source, behavior or other criteria |
dynamic attack surface | increasing an adversary |
quotactl | Set disk quotas |
multi-functional | Something that serves more than one purpose |
fsck | Filesystem consistency check and repair |
digital repository | A device on which digital records and their associated metadata are stored. |
sitt | Summer Institute on Teaching and Technology |
redaction | In an |
guid | (1) Globally Unique IDentifier |
key/pen drive | Portable memory device, designed to plug into a PC's USB port and act as a removable drive |
adsl2+ | Asymmetric Digital Subscriber Line 2 plus (ADSL2+) is a revised version of ADSL2 that further increases speeds by increasing the frequencies used on the copper line. |
permanent records | See: Archives (1) |
record category | A subdivision of the record classification scheme, which may be further subdivided into one or more lower-level record categories |
rmagick | A |
certificate authority | A service that issues a certificate after verifying the identity of the person or entity the certificate is intended to identify |
spyware | A type of malware that gathers information from your computer activities and sends it to an unknown source without your knowledge |
energy management system | An energy management system (EMS) is a system of computer-aided tools used by operators of electric utility grids to monitor, control, and optimize the performance of the generation and/or transmission system |
circular reasoning | See "reasoning, circular." |
off-site storage | A general term describing location arrangements for records |
path | The term "path" refers to the name of the location of something on your computer's hard drive |
spline patch | A curved surface which takes its shape from the placement of a set of control points. |
merchant account | An account established by contractual agreement between a merchant/business and a bank or payment gateway. |
tnsnames.ora | A file that contains connect descriptors mapped to net service names |
accession | The process of formally accepting and recording the receipt of records into archival custody |
role | A named groups of related privileges |
oracle_home | Corresponds to the environment in which Oracle Database products run |
hybrid record | A set of related digital and physical components that are linked by metadata in a tight-knit relationship and managed as a single record. |
sed | Stream editor |
watermarks | A faint marking on the back of some photographic papers indicating that the picture was taken by a professional photographer. |
sector | This is a section or area of a disk. |
ihs | A color space where colors are defined by their intensity, hue, and saturation attributes |
public cloud | A type of CrashPlan PROe deployment |
8-bit image | A digital image that can include as many as 256 possible colors |
netty’s world—www.nettysworld.com.au | Netty’s World is a web site which helps young children learn about internet safety through a range of fun interactive activities. |
resolution | The number of pixels displayed at one time |
physical record | A set of data which can be read or written as a unit by a storage device. |
mitigation | preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security |
business rules | Logic that is specific to a given application, and often specific to a given business |
touch and drag | This action moves the content on the screen in the corresponding direction |
node | Each device connected to a network |
review | An assessment process undertaken to evaluate the effectiveness, appropriateness, relevance and efficiency of an identified system or systems. |
file | An organised unit of documents accumulated during current use and kept together because they deal with the same subject, activity or transaction. |
isa/ipo | Acronym for introductory slotting allowance/introductory pocket offer |
reseller | A reseller is a company that offers custom packages of Gandi products and services under their own name and brand |
digital certificate | A digital stamp that uses encryption to certify where an electronic document came from |
vector | Vector is used to describe an image that is made upof curves and lines described by mathematical equations |
banding | Straight lines or bands across a printed picture caused blocked nozzles, poor alignment or design defects in the printer head, as it criss-crosses the paper |
transmission protocol | Rules for what information is exchanged and in what order |
pci | Peripheral Component Interconnect - high-speed expansion/connector system used on most recent PCs for sound, video, and network adaptor cards, etc. |
aspect ratio | This term describes the ratio of the width to the height of a TV screen independently of the screen size (x units wide by x units high) |
cmyk | Stands for the three subtractive primary ink colors and black: Cyan, Magenta, and Yellow and blacK. |
adapter | A part that connects two devices or systems, physically or electrically, and enables them to work together |
color balance | The ability to reproduce the colors of a scene to some acceptable standard. |
symmetric key encryption | Also known as Private Key Encryption, this uses the same private key shared by the sender and recipient for the encryption and decryption of information |
csplit | Split a file into context-determined pieces |
chipset | Control microchips on a PC motherboard or plug-in adaptor card |
capture | The process of lodging a document or digital object into a recordkeeping system and assigning metadata to describe the record and place it in context, thus allowing the appropriate management of the record over time |
record | A record is all information created, sent and received in the course of carrying out the business of your agency. Records have many formats, including paper and electronic |
authorization | In single-copy sales, a retailer's approval for a particular title to be carried in some or all of its stores |
din | Stands for Deutsche Industrinorm, the standards -setting organization for Germany |
bankcard | A payment card issued by a financial institution. |
bboard | a contraction of the term "bulletin board system," a Web-based site that allows users to post comments and questions to which other bboard readers can respond |
mach bands | An optical illusion caused by a sudden change in the rate of change of the brightness (discontinuities in the brightness' second derivative) |
unset uid | User id change |
rpm | Revolutions Per Minute |
other | The Type designation 'Joke' was previously used by F-Secure to describe a program that does not easily fit into any other Type categorization |
eavesdropping | Surreptitious interception of information sent over a network by an entity for which the information is not intended. |
hp | Hewlett-Packard Corporation, a major manufacturer of computing equipment. |
noise | Electronic interference that gets in the way of wanted signals. |
core | Memory device consisting of small metal rings |
pixel | The smallest indivisible unit of a digital image |
unsentenced record | A record for which a value has not been determined and which consequently, has not been sentenced using a current records authority. |
energy efficient | Products and systems that use less energy to perform as well or better than standard products |
aperture | An opening made by an adjustable diaphragm, which permits light to enter the camera lens and reach the image sensor. |
dual-band radio | A radio device is dual-band if it can send and receive signals from two frequencies--in the case of wireless networking, both the 2.4GHz and 5GHz bands |
decryption | enabling the operation of a symmetric key |
virtual device | A logical device in a ZFS pool, which can be a physical device, a file, or a collection of devices. |
rcra | The Resource Conservation and Recovery Act or RCRA is the U.S |
decryption | symmetric key, asymmetric key |
uk emissions trading scheme | Voluntary domestic emissions trading scheme running from March 2002 to the end of 2007 |
series | A group of records created and maintained by an agency or person that are in the same numerical, alphabetical, chronological or other identifiable sequence, or result from the same accumulation or filing process and have a similar function, format or informational content |
domain | A segment of Internet space, denoted by the function or type of information it includes; current domains include ".com" and ".net" for commercial sites, ".gov" for governmental sites, ".edu" for educational and ".org" for non-commercial organizations. |
data redaction | The ability to mask data with different values. |
asset | n |
spam | This was a significant event in that it brought about the age of mass spam, in the sense that they created the precedent for the current global unapologetic spamming practice. |
disposal class | A component of a records authority which acts as a set of rules within an electronic records management system |
unauthorised term | See: Non-preferred term |
user role | An aggregation or standard set of electronic records managment system functional permissions that may be granted to a predefined subset of system users. |
dialler box | A dialler box is a device that you connect to your telephone line, to select the cheapest service provider for the call you are making |
brute-force | Brute-force search is a trivial but very general problem-solving technique, that consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement. |
copyright | The exclusive right, granted by law, of the creator of a work (or his/her assignees or employers) to make or dispose of copies and otherwise control the use of a literary, dramatic, musical, artistic or other work |
checkout display | In newsstand sales, the coveted display space at the checkouts of supermarkets, convenience stores and other mass outlets |
folio | To assign a number to a leaf or page. |
thesaurus application | A software application that can be used to create or manage a thesaurus. |
registration authority | An independent, third-party organization that processes payment card applications for multiple payment card brand associations and forwards applications to the appropriate financial institutions. |
dynamic attack surface | increasing an adversary's work factor necessary to probe, attack, or maintain presence in a cyber target. |
certificate authority | A certificate Authority is a third party organization that generates and manages SSL certificate |
check scam | A crime in which an unsuspecting victim deposits a check into a bank account then wires a portion of the money to a criminal |
pre-certified emission reductions | A unit of GHG emission reductions that has been verified by an independent auditor but has not yet undergone the procedures and may not yet have met the requirements for registration, verification, certification and issuance of CERs or ERUs |
registration | Registration is the formal acceptance by the Executive Board of a validated project activity as a project activity |
digital record | A record created and/or maintained by means of digital computer technology |
bnc | Short form for British Naval Connector or Bayonet Nut Connector or Bayonet Neill Concelman |
interoperability | The ability to transfer and use information in a uniform and efficient manner across multiple organisations and information technology systems |
contrast ratio | The measurement of the difference in light intensity between the brightest white and the darkest black |
init | Process control initialization |
password-based software keystore | A |
hd-pip function | In order to be able to use a HD channel with the picture-in-picture function, the SD equivalent must be present in the channel list |
root account | A special user account that has absolute power over all aspects of system operation. |
cryptography | Mathematical process used for encryption or authentication of information |
du | Estimate file space usage |
archival value | The attribute of Australian Government records appraised as being retain as national archives (RNA). |
internet | A global connection of computer networks, also referred to as the "Net," which share a common addressing scheme |
access examination | The process of examining records to identify any exempt information they may contain |
amex | An abbreviation for American Express; a financial organization that is part of the Payment Card Industry that issues payment cards. |
meaningful | See: Full and accurate record |
passive | Having no active or electronically-controlled parts. |
thesaurus | Contains synonyms for selected word |
freedom of information | The right of the public, granted by law (the Freedom of Information Act 1982 and the Freedom of Information Amendment (Reform) Act 2010), to inspect or otherwise have access to documents in the recordkeeping systems of government, subject to specified exclusions. |
functional record | See: Core record |
p2v | Physical-to-virtual |
normalisation | The process of changing records from one data format to an archival data format. |
system administrator | A user role with designated responsibility for configuring, monitoring and managing a system and its use |
redacted data | In an |
front-projection system | A type of projection system in a home theater that includes two parts: a front projector unit and a separate screen |
voluntary standard | Any standard that aims to ensure the quality of carbon credits in the voluntary carbon market |
encryption | The translation of data into a secret code |
naming principle | The rule for labelling digital records and other record plan entities |
global environment facility | A global partnership among 178 countries, international institutions, non-governmental organizations (NGOs), and the private sector to address global environmental issues while financing national sustainable development initiatives. |
reach | Unique users that visited the site over the course of the reporting period, expressed as a percent of the universe for the demographic category; also called unduplicated audience; The total number of unique users who will be served a given ad. |
comprehensive | See: Full and accurate record |
interocular separation | The distance between the centers of the pupils of the eyes when vision is at infinity |
flowchart | A graphic representation of an algorithm, often used in the design phase of programming to work out the logical flow of a program. |
noise filter | Removes from a signal the interference caused by the magnetic fields of nearby devices |
payment card | A term used in SET to collectively refer to the credit cards, debit cards and charge cards issued by a financial institution and reflects a relationship between cardholder and financial institution. |
security category | The hierarchical designation in a recordkeeping system (such as ‘top secret' or ‘protected') allocated to a user, user role, digital record or other record plan entity to indicate the level of access allowed in accordance with the Australian Government Protective Security Framework (PSPF) issued by the Attorney-General's Department |
cancel | On-screen button that appears in some boxes |
binary search | Binary search searching a sorted list by looking at the middle item, and then searching the appropriate half recursively (used for phone books, dictionaries and computer algorithms). |
private key | The decryption key used in public-key encryption. |
fips pubs 140-1 | Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US government standard for implementations of cryptographic modules--that is, hardware or software that encrypts and decrypts data or performs other cryptographic operations (such as creating or verifying digital signatures) |
rmw | see Regulated Medical Waste |
subnet mask | A bit mask that is used to select bits from an Internet address for subnet addressing |
parity | A property of a data word or character which is even if the number of 1s in the data is even, and odd if the number of 1s in the data is odd. |
transfer manager | Transfer Manager is the place where you can define, modify, delete, and start all transfer activities. |
topic | A term used at the third level of classification |
trust points | Trust points or trusted certificates are third party identities that are qualified with a level of trust |
rename | Action whereby a file, directory or other element of a system is given a new name. |
crashplan service | The CrashPlan service or engine that performs all backup operations in the background on a device running the CrashPlan app |
cardholder | Customer to whom a card is issued or individual authorized to use the card |
grep | is used for filtering input lines and returning certain patterns to the output |
aao | See: Administrative Arrangements Order |
interrupt request line | As you may have discovered, it's possible for PC devices to live in the same virtual space, and when they do, they tend to interfere with each other |
inviolate | See: Full and accurate record |
genetically modified organism | A GMO results from merging the genetic make-up of two organisms to create a desired byproduct that could otherwise not be found in nature |
decryption | enabling the operation of a symmetric key cryptography scheme. |
semi-active record | A record required so infrequently in the conduct of current business that it can be transferred from offices to separate storage areas. |
sga | See System Global Area. |
pstn | Public Switched Telephone Network – conventional telephone system, operated by BT etc. |
preferred term | A term in a thesaurus or other classification tool that can be applied to a record. |
pin | A confidential number created in order for a system to be able to authenticate you as the proper user |
downstream cap | A "downstream" cap and trade system is one in which where the entities emitting carbon dioxide are required to surrender allowances (also see: upstream cap) |
flash | A device on your camera that fires a burst of light when you take a picture to illuminate your subject. |
manure | Livestock excreta used to fertilize soil |
lan | LAN is an acronym for Local Area Network that spans small area |
root certificate | Certificate at the top of the certificate hierarchy. |
ownership | See: Transfer (of ownership) |
login id | The unique identifier of a user that must be supplied in combination with a PIN/Password in order for the user to be authenticated. |
web snapshot | A full and accurate record of an agency's public web resources captured at a particular point in time. |
hard offer | A promotion that does not treat the first issue or first several issues as a no-obligation trial |
tcp/ip | Transmission Control Protocol/Internet Protocol |
double-click | Point to an item, then press the mouse button twice rapidly |
secondary transaction | A transaction where the seller is not the original owner (or issuer) of the carbon asset |
integrity | or availability |
acquiring bank | The bank of financial institution that receives payment card transactions and settles with the issuing bank |
destruction | The process of eliminating or deleting records beyond any possible reconstruction. |
ip address | A computer’s “address,” it consists of a series of numbers separated by periods. |
rules file | A text file that contains a rule for each group of systems or single systems that you want to install automatically |
standard generalized markup language | SGML is mother of all markup languages |
arithmetic function | One of the arithmetic operations -- addition, subtraction, multiplication, or division -- included in most programming languages. |
users | List users currently logged in |
filters | The term snowshoe spamming analogizes this practice to snowshoes, which are made to spread a person's weight onto a larger area of snow. |
integrity | and availability |
half duplex | A communications channel which transmits data in either direction, but only one direction at a time. |
merchant | Any University entity that participates in card processing activities. |
merchant | A seller of goods, services, and/or other information who accepts payment for these items electronically |
v2v | Virtual-to-virtual |
electronic messages | Any communication using an electronic system for the conduct of official business internally, among Australian Government agencies, or with the outside world |
subscriber | Either the person, or the business entity and the person who acts on behalf of that business entity, that is in possession of or has control of the private authentication key and who uses that key to digitally sign/receive messages. |
business information system | An automated system that creates or manages information about an organisation's activities |
message board | A message board is an online discussion site |
ascii | A code system for turning letters, numbers and symbols into digital data |
hot swap | To pull out a component from a system and plug in a new one while the main power is still on |
oracle call interface | An application programming interface that enables you to manipulate data and schema in an Oracle Database |
g-commerce | Ecommerce applied to government |
classification system | A set of terms and business rules that can be applied to records to facilitate capture, retrieval, maintenance and disposal. |
degree of an operator | The number of values associated with the evaluation (i.e., the use) of that operator |
dehp | Di(2-ethylhexyl) phthalate or DEHP is a plasticizer used to make PVC medical devices soft and flexible |
crs system | See: Series system |
colour depth | The amount of data used to describe a colour, which determines the range and accuracy of colours in an image |
i2p | Image-to-physical |
links | See elinks |
light dome | A plastic dome that diffuses light and eliminates reflections in photographs |
trackpad | Pressure-sensitive pad that moves the mouse pointer around the screen with light finger movements |
pump and dump | The term Pump and dump is a term used to define a particular type of stock fraud or stock market manipulation |
field force | In single-copy sales, a group of representatives maintained by a national distributor (see definition) or a large publisher |
character | A single letter, digit, or symbol |
credit card processor | A company that performs authorization and settlement of credit card payments, usually handling several types of credit and payment cards (such as Visa, MasterCard, and American Express) |
dacs | DACS boxes, or DACS, are devices that were used by telephone providers to split one phone line into two or more lines |
xinit | Start Xserver |
true | Do nothing, successfully |
manifest section | A section of a Solaris Flash archive that is used to validate a clone system |
doexec | Run an executable with an arbitrary argv |
structured programming | A style programming in which a hierarchy of structures is used, each having a single entry and a single exit point. |
immersive | A term used to describe a system that is designed to envelop the participant in a virtual world or experience |
disclosure | Refers to companies' practice of making your personal information available to third parties, e.g., marketing lists, other organizations that provide similar services, etc. |
global positioning system | A space-based global navigation satellite system that provides location and time information in all weather, anywhere on or near the Earth, where there is an (almost) unobstructed sky view. |
vpiet | Office of the Vice Provost-Information and Educational Technology |
llu | Local Loop Unbundling (LLU) is the process of making BT local telephone exchanges available to other companies, such as TalkTalk |
concave | A property of a polygon that has at least one vertex bulge inward instead of outward |
fmt | Reformat paragraph text |
capture | A transaction sent after the merchant has shipped the goods |
risk | and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations. |
password-based authentication | Confident identification by means of a name and password |
influencer | an individual knowledgeable in a specific subject, highly recognized in an online community, with the ability to sway others' opinions; key influencers are seen on an online community as references who can offer assistance on specific subjects |
smart card | A small device, typically about the size of a credit card, that contains a microprocessor and is capable of storing cryptographic information (such as keys and certificates) and performing cryptographic operations |
legacy record | A record that is not covered by a records authority or a general records authority |
overclocking | Making a PC run faster by increasing the speed of the CPU beyond its rated design |
render | Process in desktop video editing where effects and transitions are generated by the editing software and added to clips |
user | Users are people who have access to the Mahara site and can log in in with a personal account. |
administrative change | The process whereby agencies and departments are created, modified or abolished, and responsibility for legislation and functions (and records) is transferred from one jurisdiction, portfolio, department or agency to another. |
auto-login software keystore | A |
ca | See certificate authority. |
accessories | Supporting devices (such as universal remote controls, touchpads, or digital media adapters) that make the content in your home theater accessible from another location. |
ohm | Unit of electrical resistance |
subnet mask | A 32-bit address used in conjunction with an IP address to segment network traffic; used to restrict transmissions to certain subnets. |
recovery mode | This is the mode that you use when your phone is in desperate need of a restore |
domain | The site's name that an organization uses; for example, Red Hat has a domain name of redhat.com. |
dial-up | A old-style internet connection through a standard phone line |
w | Show who is logged on and what they are doing |
verbose | An optional mode when running a program that displays varying levels of status messages as it is processing. |
pem | Privacy-Enhanced Electronic Mail |
archives | Records that are appraised as having archival value |
confidentiality | data integrity, entity authentication, and data origin authentication. |
fcc | Federal Communications Commission |
inherit | To take on a metadata attribute from a parent entity. |
host name | The name by which a system is known to other systems on a network |
pat | See: Photographic Activity Test (PAT) |
brominated flame retardants | BFRs are halogenated flame retardants containing bromine, and are used in products ranging from mattresses and cubicle curtains to pulse oximeters and foam packaging |
inactive record | A record that is not required to be readily available for the business purposes of a department or agency and may therefore be transferred to intermediate storage, archival custody or be destroyed subject to applicable laws. |
tweeter driver | A type of speaker driver that handles the high-frequency treble range (above 2000 Hz). |
native format | The format in which the record was created or in which the originating application stores records. |
digital asset | n |
integer overflow | In computer programming, an integer overflow is a type of arithmetic error in which a calculation produces a numeric value too large for the available storage space. |
wiana | Wireless Internet Numbers Authority. (Also see IANA.) |
cryptographic algorithm | A set of rules or directions used to perform cryptographic operations such as encryption and decryption |
unaided recall | The percentage or number of consumers surveyed who are able to cite a products/services name after being requested to cite any and all product names within an advertised category |
disintermediation | It means: "getting rid of the middle-men" but sounds more impressive. |
scope note | The definition of a particular term, or combination of terms, in a business classification scheme or a classification tool (such as a functions thesaurus or record classification scheme) |
commonwealth person | A significant individual such as a Governor-General, Prime Minister, Minister, Member of Parliament or senior public servant who has been associated with the Commonwealth and who has created personal records held by the National Archives is included in the CRS System as a Commonwealth Person. |
failover | The ability to reconfigure a computing system to utilize an alternate active component when a similar component fails. |
file | The action of placing documents in a predetermined location according to a scheme of control. |
supply chain | including acquisition processes. |
controlled copy | An exact reproduction of a digital record, where there is no change to the content of the record |
route predicate | An argument to a route configuration which implies a value that evaluates to |
copying | The production of an identical copy on the same type of medium (paper, microfilm or electronic), eg |
root ca | The certificate authority (CA) with a self-signed certificate at the top of a certificate chain |
cybersecurity | the effect of a loss of confidentiality |
entire solaris software group | A software group that contains the entire Solaris release. |
ps2pk | creates a TeX pkfont from a type1 PostScript font |
unset gid | Group id change |
dimmed | See grayed out. |
core record | A record unique to a particular agency, generated as the agency carries out its specific functions |
key pair | Two mathematically related keys, having the following properties: |
tr | Translate, squeeze, and/or delete characters |
cluster | A set of track sectors which is the minimum space used by a read or write. |
key pair | A pair of asymmetric cryptographic keys (ie |
actual data | In |
color depth | A measure of the number of digital bits used to store the color information for a high-definition TV source. |
substitution cipher | A type of cipher that works simply by replacing each letter or combination of letters in a plain text with a certain other letter or combination of letters to make up the cipher text |
v2p | Virtual-to-physical |
ron | The scheduling of Internet advertising whereby an ad network positions ads across the sites it represents at its own discretion, according to available inventor |
agile | A variety of software development techniques that tend to focus on smaller-scale iterative development rather than on top-down “waterfall” design and |
reverse video | Highlights selected text with a background color and a change of text color. |
original order | The order in which records and archives were kept when in active use (ie |
sandbox | In computer security, a sandbox generally refers to a tightly controlled virtual environment that replicates a normal computer system. |
nap | See: Normal administrative practice (NAP) |
autofocus | A camera setting that allows the camera to choose the correct focus distance for you, usually based on the contrast of an image or set by a mechanism, such as an infrared sensor, that measures the actual distance to the subject. |
useradd | Create new user account |
pkill | Look up or signal processes based on name and other attributes |
polarizing film | A film that turns or shifts light. |
advance directive | n |
market transformation programme | The MTP supports the development and implementation of UK Government policy on sustainable products |
availability | The portion of time that a system can be used for productive work, expressed as a percentage. |
transaction | The third level in a business classification scheme. |
conversion | The process of changing records from one medium to another or from one format to another |
nis+ | The SunOS 5.0 (minimum) Network Information Service |
access | The right, opportunity, means of finding, using or retrieving information, usually subject to rules and conditions. |
bin | Bank Identification Number consisting of the first six numbers on a Visa or MasterCard that identifies the issuing financial institution. |
meme | Contagious ideas |
transfer compound | Chemical paste to ensure thermally efficient contact between a CPU chip and cooling fan |
repository | A mechanism for storing user information under the control of the user agent. |
integration | A tight-knit relationship between an electronic records management system and another application or mechanism |
eula | End User Licence Agreement -- the lengthy document that no-one reads, which appears when you install a software application and you have to agree to before the installation will proceed |
key | It is an item of data that is being searched for or sorted, and therefore will be compared with other data. |
bsd | BSD is a type of UNIX operating system derived from the work done at Computer Science laboratories at the University of California at Berkeley |
sop | Standard Operating Procedure |
accurate | See: Full and accurate record |
ambient function | A high-level function that exists outside the boundaries of an organisation |
convex | A property of a polygon that bulges outward at all vertices |
public key cryptography | Public key cryptography involves information encryption and decryption using a shared public key paired with private keys |
domain | A segment of Internet space, denoted by the function or type of information it includes; current domains include ".com" for commercial sites, ".gov" for governmental ones, and ".org" for non-commercial organizations. |
integrated risk management | risk |
dde | A breakdown product of the once-common pesticide DDT, which was banned in the US in 1972 but still enters the environment through use in other countries where it isn't banned |
comments | replies or opinions in reference to a specific topic; usually left on blog posts or on a bboard |
skyscraper | Skyscraper ads, which are tall and narrow |
debit card | A plastic card issued by a financial institution that is connected to a consumer's bank account |
trusted certificate | A trusted certificate, sometimes called a root key certificate, is a third party identity that is qualified with a level of trust |
antenna gain | This describes an antenna's transmission power as a ratio of its output (send) signal strength to its input (receive) signal strength |
color saturation | The purity of color; the amount by which a pure color is diluated with white or gray. |
rendition | The instance of a digital record made available in another format or on a different medium by a process entirely within an electronic records management system control, without loss of content |
image sensor | A digital camera’s solid-state capture device, made up of a grid-like arrangement of red-, green-, and blue-sensitive elements. |
set uid | Set user id |
huid | HUID is an acronym for Harvard University ID number. |
namei | Follow a pathname until a terminal point is found |
shutter | The device in a camera that opens and shuts to allow light into the camera. |
physical control | The responsibility for the custody of records based on their physical possession but not necessarily implying legal title |
ism band | A theoretical, ideal antenna whose signal range is 360 degrees in all directions |
zone | See non-global zone |
wan | A network of interconnected computers over a large geographical area, connected via telephone, radio or satellite. |
client | The customer side of a client/server setup |
custody | The responsibility for the care of records and archives, usually based on their physical possession |
duplex printing | Printing on both sides of a sheet of paper. |
registration authority | The registration Authority is responsible for identification and authentication of requestor before issuing certificate but it does not right to sign or issue the certificate |
records disposal authority | See: Records authority |
jack retasking | The technology that allows audio jack functionality to be reassigned depending on the type of device that is connected |
cable | A flexible wire or bundle of wires, usually metal (glass or silica in fiber optic cable), insulated with plastic or rubber, and having connectors on the ends |
ip address | A computer's "address," it consists of a series of numbers separated by periods. |
scan-based trading | Refers to the practice of basing retail sales figures for magazines solely on the number of sales recorded through checkout scanning, as opposed to the traditional system of returning unsold magazine covers |
crosstalk | Incomplete isolation of the left and right image channels so that one leaks (leakage) or bleeds into the other |
infrared | Using film, a filter, or a censor that is sensitive to infrared light and also blocks visible light |
cardmember agreement | Contract with a customer which sets forth the customer's responsibilities and governs which security process will be used in the conduct of business between the institution (Bank of America) and customer. |
real time system | A system which must respond in real time to changing conditions. |
energy savings certificate | An ESC, also referred to as a white certificate, Energy Efficiency Credit (EEC), or white tag, is an instrument issued by an authorized body guaranteeing that a specified amount of energy savings has been achieved |
resolution | A measure of the precision and sharpness of a video display's picture, based on the pixels or lines of resolution available on the screen |
skimming | Thieves implant a data storage device at an ATM or retail checkout terminal that reads (or "skims") the magnetic strip on your credit or debit card as you swipe it |
led | Light-emitting diode, or LED |
motoprint | MotoPrint is an application designed for Motorola devices to print directly from Motorola devices using Wi-Fi |
cache | A temporary storage area for frequently-accessed or recently-accessed data |
ssfp | A Service-Specific Faceplate (SSFP) is a telephone socket that filters broadband and voice data down a telephone line without using a DSL filter |
computer forensics | forensics |
bit | The smallest element of computerized data |
repro graphics | A full-service campus printing department affiliated with the Office of Administration |
digital certificates | Electronic affidavit issued by a certification authority, like a bank, that validates the identity of an individual or business |
digital | Digital systems represent data in binary form, encoding it as a series of zeroes and ones |
set gid | Set group id |
import | To receive digital records and associated metadata into one system from another, either from within the organisation or from elsewhere. |
convolution | A mathematical operation that applies a weighted average defined by one function onto another function |
dither pattern | The particular pattern of threshold values used in dithering |
admissibility | The quality of being permitted to serve as evidence in a trial, hearing or other proceeding |
sore | Small Off-Road Engines or Equipment Spring Water - Derived from an underground formation from which water flows naturally to the earth's surface, spring water must be collected only at the spring or through a borehole tapping the underground formation feeding the spring. |
pl/sql | PL/SQL is Oracle's proprietary extension to the SQL language |
digital certificate | A nontransferable, nonforgeable, digital file issued from a third party that both communicating parties already trust. |
disposition | See: Disposal |
constraint | A rule of an inverse kinematics or inverse dynamics animation system that must be adhered to in solving the motion of all the objects |
unix hosting | Unix hosting is when an ISP or hosting facility runs your site on some variety of a Unix operating system |
v2i | Virtual-to-image |
frequency range | A specification for a receiver that is measured in Hertz (Hz) |
blog | A blog (made from the words 'web log') is a website with regular articles often focused on a particular subject or person |
bps | Bits per Second - The term used for measuring modem data transmission speed. A modem rated at less than 56 kbps is no longer sufficient to accomodate today's performance requirements. (See Bit.) |
diff3 | Show differences among three files |
appraisal criteria | The criteria used to determine the value of a record for future business, accountability or community needs. |
interpolation | A software technique that basically fills in the gaps between the ‘dots' on a printed picture by analysing the surrounding dots and taking an educated guess at what should be there |
private keys | In public key cryptography, these are the secret keys |
administrative arrangements order | A formal document issued by the Federal Executive Council (and generally published in the Commonwealth Gazette), which assigns responsibility for legislation and functions to departments of State |
bizopps | Shorthand for “business opportunity;” some schemes involve extravagant and unfounded earnings claims and are actually fraudulent business ventures. |
control point | A point used in defining a spline. |
digital divide | The gap in opportunities experienced by those with limited accessibility to technology especially, the Internet. |
retrieval | The processor service of making records in the National Archives' custody available to the agencies that control them |
social media | Web-based technologies used for social interaction that enable the creation of user-generate content |
latency | Latency is the time it takes information to travel between two devices |
audit trail | Data that allows the reconstruction of a previous activity, or which enables attributes of a change (such as date, time or operator) to be stored so that a sequence of events can be determined in the correct chronological order |
uniform resource locator | A type of URI that identifies a resource via a representation of its primary access mechanism (ie |
frames | Multiple, independent sections used to create a single Web page |
ad noters | A person who has noticed an advertisement in a publication |
privacy | The interest that individuals have in sustaining a 'personal space,' free from interference by other people and organizations. |
cookie | information which a website places on your harddrive so that it can remember something about you at a later date. Typically, a cookie records your preferences when using a particular site |
erm | see Electronic Records Management |
light tent | A white cloth teepee-shaped tent that diffuses light and eliminates reflections in photographs |
root | The top level of a hierarchy of items |
des | Data Encryption Standard |
sell-through | Also called efficiency or efficiency level |
business classification scheme | A conceptual representation of the functions and activities performed by an organisation |
background | The color or pattern that sits behind the images in the composite. |
ethernet | Industry standard networking system that allows the transfer of data over cables at speeds up to 100 megabits per second |
shooting mode | Range of options that gives you limited or total control of picture-taking settings. |
housekeeping record | See: Administrative record |
electronic funds transfer | Technology that transfers funds from the bank account of one person or organization to that of another. |
su | Substitute user identity |
compensating controls | Compensating controls may be considered when an entity cannot meet a requirement explicitly as stated, due to legitimate technical or documented business constraints but has sufficiently mitigated the risk associated with the requirement through implementation of other controls |
component | A single element within a larger system; it can be hardware- or software-based and performs essential functions needed by the system. |
digital certificates | ITU X.509 v3 standard data structures that securely bind an identity to a public key |
subject thesaurus | A controlled vocabulary that relates to a common theme for the purposes of describing the content of a resource. |
ping6 | Ping |
trust | Confident reliance on a person or other entity |
m-commerce | Mobile commerce using wireless devices |
cleartext | Unencrypted plain text. |
electronic commerce | The exchange of goods and services for payment between a cardholder and merchant when some or all of the transaction is performed via electronic communication. |
backup frequency | The setting that determines how often CrashPlan backs up to your destinations |
digital document | A document created and/or maintained by means of digital computer technology. |
bandwidth | The rate at which information travels through a network connection, usually measured in bits per second, kilobits (thousand bits) per second, or megabits (million bits) per second. |
account number | Payment card number (credit or debit) that identifies the issuer and the particular cardholder account |
race condition | A situation where the (uncontrolled) ordering of events can affect the outcome of the situation. |
private key | A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and not made public |
tar | Tape Archiver |
subnet mask | Part of a code used by network administrators to identify sections of a network |
information | Any type of knowledge that can be exchanged |
listener.ora file | A configuration file for the listener that identifies the: |
atr | Area Telephone Representative |
focal length | The distance between the film and the optical center of the lens when the lens is focused on infinity, usually measured in millimeters. |
uucp | UUCP subsystem |
encryption | decryption, symmetric key, asymmetric key |
midrange driver | A type of speaker driver that handles midrange frequencies (200 Hz to 2000 Hz). |
public-key cryptography | A set of well-established techniques and standards that allow an entity (such as a person, an organization, or hardware such as a router) to verify its identity electronically or to sign and encrypt electronic data |
digital direct marketing | Direct digital marketing, also known as "DDM," is a type of marketing that is done exclusively through digital means |
constructive solid geometry | A modeling technique where complex shapes are built by combinations of simple shapes |
security classification system | A set of procedures for identifying and protecting official information whose disclosure could have adverse consequences for the Commonwealth |
snr | Signal-to-noise ratio (SNR or S/N) is defined as the ratio of the signal to the noise or interference corrupting the signal. |
chdir | Change working directory |
smart card | A plastic card containing a computer chip that holds large amounts of information, performs some processing and is tamper resistant |
arch | Print machine architecture |
gateway | A network device or machine that connects a local private network to another network or the Internet. |
revegetation | A direct human-induced activity to increase carbon stocks on sites through the establishment of vegetation that covers a minimum area of 0.05 hectares and does not meet the definitions of afforestation and reforestation |
circulation-driven | A magazine that yields most of its revenue from circulation |
yaml | Yet Another Markup Language, YAML was originally developed as a more |
tags | a keyword or term associated and assigned to an item of content (i.e |
coalescence | The combination of two (or more) physically adjacent unused spaces into a single unused space. |
d-link dsl-2640r and dsl-2740r | The D-Link DSL-2640R and DSL-2740R are broadband routers with wireless capability |
conservation | The treatment of items (including records and objects) to stabilise them chemically or strengthen them physically so that they can be maintained for as long as possible in their original form |
message digest | Representation of text as a string of single digits |
nano | An enhanced free Pico clone |
false | Do nothing, unsuccessfully |
bandwidth | Generally, the amount of data that can be passed through any point on the internet at a specific time |
electronic data interchange | The exchange of standardized documents between computer systems for business use. |
rsa | A public-key encryption technology developed by RSA Data Security |
modem commands | Instructions issued by the PC to tell the modem to do things like open the line and dial a number |
ecometrics | Interface’s quantification of the company’s environmental performance over time |
distinguished name | The unique name of a directory entry |
non-current record | See: Inactive record |
archives act 1983 | The Archives Act 1983 officially established the Australian Archives (now the National Archives of Australia) and defines its powers |
power spike | A huge jump that lasts for fractions of a second. |
tolerance | The range of color or tonal values that will be selected with a tool such as an image editor’s Magic Wand, or filled with paint when using a tool such as the Paint Bucket. |
firewall | A firewall is an application that helps an user or administrator to have a control over how the system should be connected with other network/systems or over the Internet. |
smart card | A plastic card about the size of a credit card with an embedded microchip where information and applications are stored |
stereoscopy | The art and science of creating images with the depth sense stereopsis |
information system | See: Business information system (BIS) |
master key | A symmetric key used by Certificate Manager to encrypt information |
unit vector | A vector of length, or magnitude, one. |
ghg | see Greenhouse Gasses |
high gain projection screen | Material that reflects more light than matte material |
provenance | The office of origin of records, (ie |
nonnetworked systems | Systems that are not connected to a network or do not rely on other systems. |
affiliate marketing | An agreement between two sites in which one site (the affiliate) agrees to feature content or an ad designed to drive traffic to another site |
function creep | ...how Information Age surveillance and monitoring systems, built and bought for a benign use, can subtly be shifted to sinister purposes |
text node | The area in the layout where text goes |
record classification scheme | A hierarchical classification tool that, when applied to a business information system, can facilitate the capture, titling, retrieval, maintenance and disposal of records and other information |
surge | See power surge |
disposal freeze | A mechanism within an electronic records management system that can prevent any disposal action from taking place, even if the retention period for a digital record has elapsed |
dir | Briefly list directory contents |
pci-dss | Payment Card Industry Data Security Standards. |
extraction | The act of creating an extract. |
joystick | A device which controls cursor motion with a vertical stick |
unattended mode | One of two PIE operating modes |
extant | Records that remain or have survived to the present, ie |
head | works similarly |
sgc ssl certificate | SGC SSL certificate means Server Gated Cryptography SSL certificate |
pass | The number of times that the source text has to be scanned or rescanned in order to compile the program |
storage sprawl | A term used to describe the high rate of data volume growth on a network. |
extension | The last part of an internet address, after the final dot |
universal groups | Universal groups are available in Windows 2000, but not in Windows NT |
digital watermark | A complex visible or invisible pattern denoting provenance or ownership information |
managed appliance | Code42-manufactured equipment (including its physical components) purchased from Code42 or a Code42-authorized agent |
lightweight directory access protocol | A standard, extensible directory access protocol |
cryptography | The art and practice of scrambling (encrypting) and unscrambling (decrypting) information |
progress | PIE command that lets you see Imaging Engine's current status. |
personal identifying information | In 2009, state law changed nomenclature |
keyword | The highest-level term in Keyword AAA: A Thesaurus of General Terms. |
credit card | Payment method that allows the cardholder to make payments for goods and services and receive cash through credit from the card-issuing bank. |
disposal trigger | The point from which the disposal action is calculated |
sgid permission | The SGID permission sets a process's group ID on execution. |
myinfovault | Faculty merit and promotion system. |
accommodation | The refocusing of the eyes as their vision shifts from one distance plane to another. |
emulation | A digital record preservation approach that involves keeping digital records in their original format and recreating the operating environment to enable the original performance of the software to be recreated on current computers |
init | The init process is the first process to run on a system |
risk assessment | risk |
economizer | An economizer is a mechanical device used to reduce energy consumption |
ocp | Operator Control Panel |
as iso 15489 | AS ISO 15489 replaced AS 4390 as the code for records management practice in Australia in March 2002 |
authentication | Process which seeks to validate identity (merchants and cardholders) or to prove the integrity of a transaction |
e-commerce | Electronic Commerce - Refers to the ability to sell products through your Web site. |
parity | Adding an extra bit to a set of bits to make it so that there is an even number of 1’s |
remote code execution | In computer security, remote code execution means that an outside party being able to run arbitrary commands on a target machine or in a target process, almost always with malicious intent. |
digital signature | Information encrypted with an entity's private key, which is appended to a message to assure the recipient of the authenticity and integrity of the message |
light-shelf | Usually consisting of reflective white or metal eaves or shelves that redirect light into a building and protect occupants from direct solar glare |
white paper | This is a document that explains how a certain technology or product works |
registration authority | An entity that performs services in relation to the registration and verification of the identity of applicants for public key certificates, as described in the registration authority accreditation criteria. |
energy efficiency credit | An EEC, also referred to as a white certificate, Energy Savings Certificate (ESC), or white tag, is an instrument issued by an authorized body guaranteeing that a specified amount of energy savings has been achieved |
digital certificate | Digital Certificates are used to prove your identity electronically while doing transaction on the web |
forking | Forking is the mechanism by which the system starts a new process, waits for it to finish, then generates a new output prompt and waits for the next command. |
shutter speed | The length of time that the camera shutter remains open, thereby allowing light to enter the camera and expose the photograph. |
eco-chic | A product or good that is both eco-friendly and hip |
origin | The point in a coordinate space where all coordinates are zero. |
will | n |
ppe | Personal Protective Equipment Public Comment Period - see Validation Publicly Owned Utility (POU) - A public utility (usually just a utility) is a company that maintains the infrastructure for a public service, usually referring to power, natural gas and water delivery |
emissions | Emissions are particles and gases released into the air as byproducts |
sampling | A form of appraisal or disposal used especially in connection with large series or other groups of records |
suid permission | The SUID permission sets a process's user ID on execution. |
digital preservation | The series of managed activities necessary to ensure continued access to digital materials for as long as necessary |
freemium | Also called a love gift |
directional antenna | This term defines several types of antennae that redirect the signal received from a transmitter to enhance its strength in a certain direction, unlike an omnidirectional antenna |
throughput | How much data is moved in a certain amount of time |
nohup | Run a command immune to hangups |
memory card/module/stick | Removable non-volatile (i.e |
bit depth | Refers to the number of bits available to store color information |
tonal resolution | The number of levels of gray in a black and white image. |
transaction | The smallest unit of a business activity. |
rule | A series of values that assigns one or more system attributes to a profile |
nis | The SunOS 4.0 (minimum) Network Information Service |
public key certificate | Public key and identification data signed by a trusted third party to provide authentication and integrity of the key. |
redundancy | The provision of multiple interchangeable components to perform a single function in order to cope with failures and errors. |
intellectual control | The control established through the arrangement and description process over the informational content of records and archives, and the administrative and recordkeeping contexts in which they were created and used. |
iphone | Though “iPhone” is an Apple Computers product, the term is becoming generic for any phone with a touch screen that functions as a phone, camera, portable media player and internet connection. |
conditioning | Smoothes out variations in power by pumping up the voltage when it drops and stepping it down when it's too high |
closed-loop recycling | The process of utilizing a recycled product in the manufacturing of a similar product or the remanufacturing of the same product |
bass and treble controls | Separate on-screen controls provide for a wide range of Bass and Treble sound adjustments. |
vulnerability | In computer security, the word vulnerability refers to a weakness in a system or PC that allows an attacker to violate the confidentiality, integrity or availability of a system or PC. |
signing certificate | A certificate whose corresponding private key is used to sign transmitted data, so that the receiver can verify the identity of the sender |
syntax | A feature of a language that denotes the grammatical structure of the language |
tamper detection | A mechanism ensuring that data received in electronic form has not been tampered with; that is, that the data received corresponds entirely with the original version of the same data. |
router | As the name indicates, this piece of hardware routes data from one local-area network to another or to a phone line's long-distance line |
records management | The field of management responsible for the efficient and systematic control of the creation, receipt, maintenance, use and disposal of records, including processes for capturing and maintaining evidence of and information about business activities and transactions in the form of records. |
nielson’s heuristics | A widely used set of heuristics for evaluating computer interfaces that was devised by Jakob Nielson (available from http://useit.com). |
dc | Desk Calculator |
data matching | Comparing different sets of personal data collected for unrelated purposes |
virtual terminal | Allows merchants who have internet access to take orders over the phone or mail and manually enter credit card information without the need for an internet storefront. |
caging | In fulfillment, the process in which subscription orders and their enclosed payments are separated and then recorded |
certificate fingerprint | A unique number associated with a certificate |
access | Access to Commonwealth records for agencies and the public is governed by the Archives Act 1983 |
hacker | Hacker is a person who is skilled at subverting technological systems and making them do things they were not originally created to do |
orm | Object-Relational Mapping, the hard part of getting object-oriented languages and relational databases to work together |
record type | The definition of a record object that specifies particular management requirements, metadata attributes and forms of behaviour |
one-time tailoring | Refers to a site's or a service provider's use of personal data to tailor or modify content or design of the site not affirmatively selected by the particular individual, where the information is used only for a single visit to the site and not used for any kind of future customization |
file plan | See: Record plan |
cti/lti | Colour Transient Improvement/Luminance Transient Improvement – for the reproduction of clear contour edges which are lost during transmission of the television picture. |
water cooling | Very similar to the cooling system in a car with heat drawn from the CPU chip inside liquid filled pipes to a miniature radiator and fan. |
authorization | This is a process that assesses transaction risk, confirms that a given transaction does not raise the account holder's debt above the account's credit limit, and reserves the specified amount of credit |
domain | A segment of Internet space, denoted by the function or type of information it includes; current domains include “.com” for commercial sites, “.gov” for governmental ones, and “.org” for non-commercial organizations. |
conversion | The process of adding depth to a shot previously filmed or created in without depth. |
plaintext | Also called cleartext |
brute force | Refers to a programming style that does not include any shortcuts to improve performance, but instead relies on sheer computing power to try all possibilities until the solution to a problem is found |
join lines option | Feature that lets you specify that people's names appear on one line instead of two. |
quick sort | Quick sort pick an item at random, put all the smaller items in a group on its left and the larger items in a group on its right |
table | A set of rows and columns |
maintain | To retain records in identifiable recordkeeping systems over time in accordance with disposal decisions |
subordinate ca | A certificate authority (CA) whose certificate is signed by another subordinate CA or by the root CA |
head | The part of the disk drive that does the reading and writing of data |
key | In cryptography, a key is complex mathematical algorithm applied to clear text, readable information, to produce encrypted unreadable information, or applied to encrypted information to change it back to the original readable format |
dircolors | Colour setup for `ls' |
records authority | A records authority is an instrument issued by the National Archives of Australia to give its approval to Australian Government agencies or other organisations or persons to dispose of Commonwealth records |
database access descriptor | A database access descriptor (DAD) is a set of values that specify how an application connects to an Oracle database to fulfill an HTTP request |
registration | A number of websites require registration |
binocular vision | Vision as a result of both eyes working as a team; when both eyes work together smoothly, accurately, equally and simultaneously. |
cyberspace | and encompass[ing] the full range of threat |
digital certificate | An electronic document signed by the Certification Authority that identifies a key holder and the business entity he/she represents |
shift-click | Standard MACINTOSH key combination you can use to select multiple items in Composite Editor layouts. |
saver socket | A saver socket is similar to a dialler box, and were designed to choose the cheapest service provider for phone calls |
digital certificate | See certificate. |
small business | A company that employs under 100 people and is usually a privately owned corporation |
bcs | See: Business classification scheme (BCS) |
crop | To size and position an image in order to use a specific portion of the image |
clipboard | A section of computer memory used to temporarily hold data that has been cut or copied for transfer to another document or location within a document |
mta | This is an organized mail system that receives messages and distributes them to the recipients |
recordkeeping | The making and maintaining of complete, accurate and reliable evidence of business transactions in the form of recorded information |
histogram | A graph that maps out brightness values in a digital image; usually found inside exposure-correction filter dialog boxes. |
availability | integrity, and confidentiality. |
emv | An abbreviation of Europay, MasterCard, and Visa |
ofa | See Optimal Flexible Architecture. |
merchant | University unit that accepts credit card payment for goods, services, or gifts. |
uddi | Universal Description, Discovery, and Integration, a supposedly magical but now largely forgotten piece of the |
rainforest alliance certified | Products are produced using farm and forestry methods that are derived from farms and forests where water, soil and wildlife habitat are conserved, where workers are treated well, where families have access to education and healthcare, and where communities benefit. |
atsc | Advanced Television System Committee technical standard |
fold | Wrap text to fit a specified width |
xs-stereo sound | This type of audio system is a pseudo or Quasi-stereo sound |
binary | A number system based on two |
verifier | n |
haute green | An annual contemporary design event in New York that showcases sustainable modern design |
business validation ssl certificate | Business Validation SSL certificate contains your company details |
ghz | (Gigahertz) A unit of frequency equal to 1,000,000,000 cycles per second |
energy star | Energy Star is a government-backed labeling program that helps people and organizations save money and reduce greenhouse gas emissions by identifying factories, office equipment, home appliances and electronics that have superior energy efficiency |
non-repudiation | Prevents an individual or entity from denying having performed a particular action related to electronic data (such as origin, intent or ownership). |
protocol | In simple terms, a protocol stands for special set of rules |
removable battery | Useful if you want to bring a secondary charged battery with you when out and about to swap in when your tablet PC battery runs out of charge |
x2i | Anything-to-image |
histsize | Change history size |
directory naming context | A subtree which is of significance within a directory server |
option return | Key combination you press to indicate that a new line of text should begin. |
health information | Personal data, which may be collected by a site or a service provider, about an individual's physical or mental health, sexual orientation, use or inquiry into health care services or products, and purchase of health care services or products. |
pr | Convert text files for printing |
core business | A core business is a key area of responsibility carried out by an agency |
flaming | Flaming is the sending of messages that include bad language or repeat messaging especially of undesirable or obscene text |
administrative record | A record that an agency creates in the course of administrative activities which are generally common to all agencies. |
iec | The International Electrotechnical Commission provides a wide range of worldwide standards |
description | The process of recording information about the nature and content of records |
dematerialization | The reduction of mass in a product that does not diminish quality or intended service for the consumer. |
windows hosting | Windows hosting is when an ISP or hosting facility runs your site on a Microsoft Windows server |
byte | Byte a group of 8 bits, able to represent numbers from 0 to 255, can store one ASCII character (also known as an octet). |
shake | The act of moving your device back and forth |
personalization | Generating custom content or presentations for web users |
system services | Applications which normally run independently when a system is started up and which close, also independently, on shutting down the system |
disposal class | The descriptor of a group of records which document similar activities |
advance renewal | Generally, a renewal generated by a promotional effort that goes out well in advance of the rest of the renewal promotional series |
thesaurus | A classification tool comprising an alphabetical presentation of a controlled list of terms linked together by semantic, hierarchical, associative or equivalence relationships |
certified | Acknowledging that a product is genuine to what it claims, typically having gone through a process similar to obtaining a license |
sentencing | The process of identifying the disposal class a record belongs to and applying the disposal action specified in the relevant records authority |
exempt information | Sensitive information in Commonwealth records as defined in Section 33 of the Archives Act 1983 (eg |
non-repudiation | Incontestable proof of the origin, delivery, submission, or transmission of a message. |
key | When encrypting data, a key is a value which determines the ciphertext that a given algorithm will produce from given plaintext |
certificate authority | (CA) A trusted third-party organization or company that issues digital certificates that are used to create digital signatures and public-private key pairs |
fiber optics | The transmission of data in the form of pulses of light |
scsi | Pronounced, "scuzzy" it provides a way of chaining a number of devices together |
form factor | Set of standards defining the size and layout of a PC motherboard |
xml | XML is the Extensible Markup Language, a system for defining specialized markup languages that are used to transmit formatted data |
ellipsis | Three dots enclosed in parentheses (...) |
pstn | Public Switched Telephone Network (PSTN) is a general term referring to the worldwide telephone network based on copper wires carrying analog voice data, as opposed to newer telephone networks, which are based on digital technologies. |
bio-based product | A product (other than food or feed) that is produced from renewable, agricultural (plant, animal and marine), or forestry materials. |
personal information | Information that can identify you, like your bank and credit card account numbers; your income; your Social Security number (SSN); or your name, address, and phone numbers. |
behavioral analysis | See: heuristic analysis. |
thread local | A thread-local variable is one which is essentially a global variable in terms of how it is accessed and treated, however, each thread used by the application may have a different value for this same “global” variable. |
mainline | A large magazine rack or reading center displayed within interior aisles of supermarkets and other retail outlets |
sort | Sort puts keys (numbers, names or other values) in order from smallest to largest (outside computer science this is usually called ordering). |
afda | See: Administrative Functions Disposal Authority (AFDA) |
windows system tray | Area in the Windows taskbar (usually in the bottom right corner of the screen), which contains the system clock, icons for changing system settings, viewing the status of the antivirus protection, etc. |
computer crime or cybercrime | The term 'computer crime' encompasses forms of crime relating to computer systems or the people working with them. |
public key infrastructure | Information security technology utilizing the principles of public key cryptography |
public key | In public key cryptography, this key is made public to all |
e-commerce | Electronic Commerce, allowing customers to purchase items and conduct financial transactions over the Internet safely and securely. |
export | A disposal process whereby copies of a digital record (or group of records) are passed with their metadata from one system to another, either within the organisation or elsewhere |
guid | (1) Globally Unique Identifier |
grep | The grep command searches the named input files for lines containing a match to the given pattern |
extract | A copy of a digital record from which some material has been removed or permanently masked |
data type | A set of values |
legacy | n |
pine | Email program used by The University of Washington |
critical infrastructure | 2008 |
print head | Device that squirts microscopic droplets of ink onto the paper as the print head passes over the paper |
tracking cookie | A plain text file containing a unique ID and browsing information related to the user, which is constantly updated during an active browsing session, in order to track the user's browsing habits |
internal speaker | Small loudspeaker inside a PC case, used for warning or error sounds during boot-up |
energy star | US Government backed initiative to promote energy saving and protect the environment |
exposure | The amount of light allowed to reach the film or sensor, determined by the intensity of the light, the amount admitted by the iris of the lens, and the length of time determined by the shutter speed. |
carnivore | FBI's Internet surveillance system for monitoring e-mail. |
system v | System V is a type of UNIX operating system that arose from an alliance of ATT and Sun |
chat room | The name given to a place or page in a website or online service where people can type messages which are displayed almost instantly on the screens of others who are in the “chat room.” |
field | A single attribute of the entity which the record describes. |
factor | Display prime factors of a number |
census | See: File census |
normal administrative practice | Is a provision under s.24 of the Archives Act that provides for the destruction of Commonwealth records whose destruction is not otherwise covered by a specific law or an authorized records authority |
continuity | A type of offer in which the consumer agrees to review new editions of or variations on a product and purchase a contracted number of these over a specified time period |
electronic commerce | The use of communications technology for business transactions and activities. |
clean computing | Clean computing is when an organization's manufacture, use and disposal of IT equipment does not produce any harmful waste at any stage |
digitised record | Records transformed into a digital form from an analog form eg |
uc davis cyber-safety program | Campus policy requires devices connected to the UC Davis electronic communications network to meet UC Davis security standards or get an authorized exception |
iso 14001 | ISO 14001 was first published in 1996 and specifies the actual requirements for an environmental management system |
records management system | See: Recordkeeping system |
scam | Any illegal plot or fraud in which a person or group of persons are tricked into giving money, under false promises of economic gain (trips, vacations, lottery prizes, etc.). |
archival information unit | An archival information package whose content information is not further broken down into other content information components, each of which has its own complete preservation description information. |
beneficiary | n |
decryption | encryption, signature generation, or signature verification. |
hot spot | A bright area in a photograph that come from reflections on eyeglasses or unevenly spread lighting. |
oracle pki | Oracle Advanced Security includes Oracle PKI (public key infrastructure) integration for authentication and single sign-on |
local auto-login software keystore | A |
network | Networking is the scientific and engineering discipline concerned with communication between computer systems |
full hdtv | Denotes resolution of 1080p, ...1080 lines progressively scanned from top to bottom of the screen |
secure hash algorithm | Secure Hash Algorithm assures data integrity by generating a 160-bit cryptographic message digest value from given data |
tcp/ip | TCP/IP is an acronym for Transmission Control Protocol/Internet Protocol |
uri | See: Uniform resource indicator (URI) |
forwardable ticket-granting ticket | In Kerberos |
ciphertext | Data that has been encrypted |
zero-voc | A term used to indicate paint containing no volatile organic compounds - a healthier alternative to conventional paints |
rna | See: Retain as national archives (RNA) |
field | Half of a complete video frame when interlacing is used |
brownout | Period of lower voltage |
portal | A site that the owner positions as an entrance to other sites on the internet |
greenhouse gases | Greenhouse gases (GHGs) are trace gases that control energy flows in the Earth's atmosphere by absorbing infra-red radiation |
dot width | The width of a point, or dot, primitive |
calligraphic | An early type of computer graphics display that could only draw lines, not filled in areas |
sort | Sort text files |
photon | A particle of light. |
smart card | A plastic card (like a credit card) with an embedded integrated circuit for storing information, including such information as user names and passwords, and also for performing computations associated with authentication exchanges |
content management system | A tool used to organize data |
authentic | See: Full and accurate record |
disaster plan | A written procedure setting out the measures to be taken to minimise the risks and effects of disasters such as fire, flood or earthquake, and to recover, save and secure the vital records should such a disaster occur. |
security token | See security device. |
dun & bradstreet number | Also known as a D & B number; a unique nine digit code that identifies millions of companies worldwide. |
security controls | A scheme of protective markings that may be allocated to users, digital records and record plan entities to restrict access in accordance with the Australian Government Protective Security Framework (PSPF) |
bandwidth | The range of frequencies assigned to a broadcast channel |
e-crime | E-crime is where computers or other electronic communications devices, for example mobile phones, are used to commit an offence, are the target of an offence or act as a storage device in an offence. |
hybrid recordkeeping system | A recordkeeping system containing records in a combination of paper, electronic or other formats. |
authorised term | See: Preferred term |
sha1 | (Secure Hashing Algorithm) The algorithm that operates on any input length less than 264 to produce a message digest. |
template | A template is something that already has a pre-defined structure |
take control | 1 |
online child grooming | The efficiency of child groomers is becoming increasingly professional, partly as a result of the Internet |
cleartext | See plaintext. |
preference data | Data, which may be collected by a site or a service provider, about an individual's likes and dislikes -- such as favorite color or musical tastes. |
top numbering | The practice of amending numbers (or other identifiers) of records when their control is transferred from one recordkeeping system to another to bring them into line with the new control system. |
control record | A record created and maintained to help identify and retrieve other records |
test | Evaluate a conditional expression |
mail order/ telephone order | A type of payment card transaction where the order and payment information is transmitted to the merchant either by mail or by telephone in contrast to a "card present" or face-to-face transaction when a |
privacy policy | This is the document that sets out the procedures, rules, and data security practices of a company to guarantee the integrity, confidentiality and availability of data collected from clients and other interested parties in accordance with applicable legislation, IT security needs and business objectives. |
rcp | Copy files between two machines |
debit card | Payment method that allows the cardholder to make payments through direct withdrawal from the cardholder's bank account. |
i2x | Image-to-anything |
pathogenic | Causing or capable of causing disease. |
third-party ad server | Independent outsourced companies that specialize in managing,maintaining, serving, tracking, and analyzing the results of online ad campaigns |
climate security act | Legislation proposed in the US Senate in October 2007 by Senators Lieberman and Warner |
alternate source | In strict terms, an alternate source is any subscription source other than direct mail |
script.aculo.us | A JavaScript library, built on top of |
tsort | Topological sort |
organisation | See: Agency |
egrep | Print lines matching a pattern |
shuffle | To reorganize a number of items so that they appear in the correct order. |
mailid | The part of an email address before the @ symbol; usually the first and middle initial of a user's name, followed by the last name |
controlled vocabulary | An alphabetical list containing terms or headings that are authorised or controlled so that only one heading or form of heading is allowed to represent a particular concept or name. |
info | Help info |
optrs | On-line Time Reporting System (a component of Payroll Personnel System used by the campus). |
colour matching | Technique to ensure that the colours displayed on a PC monitor are as close as possible to the finished printed picture |
private cloud | A type of CrashPlan PROe deployment |
caveat | A non-hierarchical qualifier (such as commercial-in-confidence) attached to a security category to limit access to particular records |
financial institution | An establishment responsible for facilitating customer-initiated transactions or transmission of funds for the extension of credit or the custody, loan, exchange, or issuance of money. |
wrl | See |
volatile | Depending on the maintenance of power for the retention of information. |
downstream data use | Refers to companies' practice of disclosing personal information collected from users to other parties "downstream to facilitate a transaction |
classification | The systematic identification and arrangement of business activities and/or records into categories according to logically structured conventions, methods and procedural rules represented in a classification system. |
home_name | Represents the name of an Oracle home |
mail system | |
distributed custody | The arrangement whereby archival records are held in a controlling agency beyond the period where they would normally be transferred to the archives, by agreement between the archival authority and the controlling agency. |
software keystore | A container that stores a Transparent Data Encryption |
bit | A bit is a binary digit, the smallest increment of data on a computer. It can hold only one of two values: 0 or 1, corresponding to the electrical values of Off or On, respectively. (Also see Byte and Kilobyte.) |
vdu | Visual display unit – old name for a computer monitor |
business process re-engineering | The analysis and redesign of business processes and management systems required by new technology, such as electronic commerce. |
tessellation | The act of tiling a surface with individual surface patches. |
gda | See: General records authority (GRA) |
encapsulated object | A digital record that has been ‘packaged' with enough metadata to preserve its content and context, and to support their reconstruction at some time in the future |
cybersecurity | the effect of a loss of confidentiality, integrity or availability of information or an information system on an organization's operations, its assets, on individuals, other organizations, or on national interests. |
arrangement | The intellectual and physical process of putting archives and records into order in accordance with accepted archival principles, particularly those of provenance and original order. |
periodic process | A periodic process is any process that runs at a specified time. |
vendor | A person or company selling or supplying goods and services. |
electronic record | A record created, communicated and/or maintained by means of electronic equipment |
associative relationship | Used when describing terms from a functional analysis |
agency controlling | The agency with responsibility for the functions or legislation to which a series of records relates |
data integrity | entity authentication |
ps2epsi | Generate conforming Encapsulated PostScript |
disposal action | An action stipulated in a record authority indicating the minimum retention period for a record and the event in relation to which the disposal date should be calculated. |
subwoofer | A speaker in a home theater surround sound system that is designed to play low-frequency (bass) sounds |
stub | A skeleton function (i.e., one that performs little or no processing) created to stand in for one function (the target) to allow the testing of a second function that is designed to call the target function |
system access control | Any mechanism used to prevent access to the system by unauthorised users |
sed | Stream Editor |
online profiling | Compiling information about consumers' preferences and interests by tracking their online movements and actions in order to create targeted ads. |
sequential search | A programming strategy of searching for an item in a data file by examining items in the order in which they are stored, often not the most efficient searching method. |
user profile | A summary of all attributes allocated to a user of the electronic records managment system |
topic | Discussion forums are made up of topics that represent a discussion around a particular theme each. |
point size | Measures the height of letters where one point is 1/72 inch |
free | Display free memory G |
demographic and socioeconomic data | Data about an individual's characteristics -- such as gender, age, and income. |
sleep | Delay for a specified time |
ecologo | Third party certification program based in Canada that certifies cleaning products (among other product categories). |
debit card | ATM card for accessing personal bank accounts. |
evaluation criteria | The criteria used to evaluate the compliance and/or relative ranking of submissions received in response to a procurement process. |
forced free trial | A short-term, free subscription sent without request to targeted prospects with the goal of converting them to paid subscribers, most frequently used by newsletters |
public key cryptography | A field of cryptography invented in 1976 by Whitfield Diffie and Martin Hellman that depends on a matched pair of inverse keys |
frequently asked questions | A set of answers to frequently asked questions. |
cache | A temporary storage area for currently-used or recently-accessed data |
bandwidth | The amount of data that can be transmitted at a given moment to a server. The higher your bandwidth, the larger amount of traffic your site can handle at one time. |
biodiversity | Biological diversity in an environment as indicated by numbers of different species of plants and animals |
moderator | Person in charge of a chat-room monitoring for undesirable content or behaviour |
privileged access | Access to more than one card number at a time, as opposed to access to a single card number for purposes of completing a transaction (Thus, the term describes positions such as database administrators of systems that house cardholder data, but not cashiers handling one card at a time). |
open standards | The recognised national or international platform-independent standards |
uncontrolled record | Records that have not been documented or brought under a system of control or arrangement. |
gif | A lossless image compression system typically used for small images with few colours in them (in practice it can be lossy because it has only 256 colours, and if the original has more colours then some will be lost). |
mt | Control magnetic tape drive operation |
risk | and develops and/or recommends appropriate mitigation |
tracking | Creating, capturing and maintaining information about the movement and uses of records. |
usermod | Modify user account |
zif | Zero Insertion Force – socket for microchips, designed to prevent damage with a simple lever mechanism to securely grip the connecting pins. |
destruction | The National Archives authorises disposal of Commonwealth records (including destruction) for the purposes of the Archives Act 1983 |
business activity | An umbrella term covering all the functions, activities and transactions of an organisation and its employees |
makegood | A publication that misses rate base (see definition) over a period of time or prints a poor reproduction of an ad will generally offer to republish the ad at no extra cost to the advertiser, or reduce or cancel the fee for the affected advertising. |
expunge | To delete exempt information from a copy of a record in order to make the remainder of the record available for public access. |
system rules | The policies internal to system software that may be established and/or configured by a system administrator in order to govern the functionality of a given system and determine the nature of operational processes applied by that system. |
privilege elevation | Most user accounts on a computer system have a limited set of privileges that allow them to perform a specified range of actions, such as viewing or editing files or making certain system changes. |
certificate-based authentication | Verification of identity based on certificates and public-key cryptography |
functions thesaurus | An alphabetical classification tool that reflects the business activities of an agency and their relationships |
nitrogen fixing | The process by which bacteria that live in root nodules take nitrogen from the air and convert it to a form that plants can absorb |
time zone | Any of the 24 longitudinal divisions of the earth's surface for which a standard time is kept. |
adversary | with specified expertise and resources, to overcome a protective measure. |
collaborative filtering | Selecting content based on the preferences of people with similar interests. |
service name | See net service name. |
gps | GPS- Global Positioning System is a satellite based navigation system that provides information about weather, location and time from anywhere across the globe using an Internet connection. |
durable goods | Goods, such as appliances and furniture, that are not consumed in use and can be used for a period of time, usually several years. |
budget | A magazine's projected circulation numbers and revenues for the year |
socket tester | Device that plugs into a normal mains socket and checks the status of the wiring |
commonwealth record | A record that is the property of the Commonwealth or of a Commonwealth institution; or a record that is deemed to be a Commonwealth record by virtue of a regulation under the Archives Act 1983, but does not include a record that is exempt material or is a register or guide maintained in accordance with the Act. |
units | Convert units from one scale to another |
legacy lockbox | n |
chargeback | A reversal of a payment card transaction initiated by the consumer who holds the card or the bank that issued the card used in the purchase. |
layer | Variable items that will change, for example, people's images and names |
basecamp | A collaboration tool (http://www.basecamphq.com/) developed by |
personal records | The records of a person who is, or has been, associated with the Commonwealth (eg prime ministers, ministers or judges) |
ghg protocol corporate standard | The GHG Protocol Corporate Standard provides standards and guidance for companies and other organizations preparing a GHG emissions inventory |
kbps | Your modem's speed is measured in the number of bits it can transfer in a second |
record | A subdivision of a file, containing data related to a single entity. |
format | The physical form (such as paper or microfilm) or computer file format in which a record is maintained. |
modem | A modem (modulator/demodulator) converts the digital information in your computer to sounds that can be sent over the telephone line |
design specification | A document detailing requirements for functionality, performance and design to be incorporated within a system to be built |
series system | A method of describing records and their contexts of creation and management over time |
style | It's special effects such as boldface, italic, outline, etc |
context | The background information that enhances understanding of technical and business environments to which the records relate, eg |
snap-ins | Administrative tools that run within Microsoft Management Console. |
pop-up menu | List of options that is displayed when clicking on a certain item or area of a window in a program with the secondary mouse button (usually the right) |
sid | See system identifier. |
defraction | The breaking up of a ray of light into dark and light bands or into the colors of the spectrum, caused by the interference of one part of a beam with another. |
archives | An organisation (or part of an organisation) responsible for appraising, acquiring, preserving and making available archival material. |
upload | When you upload, you are sending a file from your system to another system, as opposed to downloading, where you retrieve a file from another system. |
hash | A number that is produced by taking some input and generating a number that is significantly shorter than the input |
structured data | A record created from data that has been collated and managed in a structured environment, often in a database-type business information system |
data loss | data theft, data leak |
compression | Special encoding of data to reduce byte size; useful in storing and archiving large (or multiple) files or for transmission of data over a network. |
general records authority | A records authority that covers functions common to all or most government agencies, usually produced by the National Archives on behalf of the Australian Government. |
free | Display memory usage |
masking | In an image editor, selecting an area of an image to prevent that area from being modified accidentally. |
audiovisual record | A record that has sound and pictorial attributes |
open period | Once a set closed period has elapsed since a record came into existence, it comes into the open period |
browsing | A method of finding a record by starting at a known point and following linked terms and other identified paths to locate required information. |
vector | A value that has a direction and a magnitude (length) |
archives | A place such as a building, room or storage area where archival material is kept. |
resample & resize | Two techniques for altering the dimensions of an image, in general resampling is better for photographic images, resizing works better with simple graphics |
unbilled usage | Your unbilled usage generally refers to calls that you have made for which you have not yet been billed |
white balancing | Adjusting the camera to compensate for the type of light hitting the photographic subject |
switch | A device that facilitates transmissions between nodes on a private network and regulates internal network traffic. |
x2v | Anything-to-virtual |
csv | Text file where items of information – i.e |
compliant | See: Full and accurate record |
linear interpolation | Interpolation is the process of determining plausible in-between values, given explicit values at particular points |
wireless technology | Includes any technology used to transmit data without a physical connection. |
nl | Number lines and write files |
confidence level | The likelihood that the sampling error in a survey result will fall within a specified range, usually expressed in terms of standard errors (e.g |
dcv | DCV stands for Domain Control Validation. |
bandwidth | A measure of the “speed” of an Internet connection. |
operational entity | An independent entity, accredited by the CDM Executive Board, which validates CDM project activities, verifies and certified emission reductions generated by such projects |
form factors | The name for the illumination coupling factors between polygons used in radiosity |
central wiring panel | A place in your home where you locate the infrastructure devices that enable you to connect your home theater to other parts of the house in a whole-home theater system. |
sysdba | A special database administration role that contains all system privileges with the ADMIN OPTION, and the SYSOPER system privilege |
qnx os | QNX RTOS is a Real Time Operating System built for high reliability and performance in the embedded space which was developed by QNX Software systems and later taken over by Research in Motion- a Canadian based Smart Phone (BlackBerry) manufacturer |
system | A set of interrelated components that work together to achieve some common purpose. |
certificate chain | A hierarchical series of certificates signed by successive certificate authorities |
usleep | Sleep a given number of microseconds |
merchant account | An arrangement with a bank that enables merchants to accept credit card payments. |
recordkeeping metadata | Structured or semi-structured information that enables the creation, management and use of records through time and across domains |
ca | See certificate authority (CA). |
downgrade | To convert the data in Oracle Database to an earlier Oracle release |
disposal authority | See: Records authority |
convergence | The degree to which all three electron beams of a color CRT meet at the same spot on the screen |
short message service | A communication protocol for transmission of short text messages between one mobile devices connected to a telecommunications network |
dithering | A technique for increasing an image's apparent color (or gray scale) resolution without increasing the number of color (or gray) levels actually used, at the cost of adding a "grainy" look to the image. |
folder | An aggregation of records allocated to a records category within the records classification scheme |
ecosystem | A place having unique physical features, encompassing air, water, and land, and habitats supporting plant and animal life, including humans. |
driver | See Device driver |
sources | Locations from which you send files to be backed up or stored |
dn | See distinguished name. |
sulfur hexafloride or sf6 | One of six GHGs curbed under the Kyoto Protocol |
boolean | Expression-based system that uses the operators AND, OR, and NOT; operations are based on variables which can be 1 (true) or 0 (false). |
physical folder | An entry in the record plan for a hardcopy folder, usually paper |
bluetooth | A physical wireless communications standard for exchanging data over short distances from fixed and mobile devices |
subject | The entity (such as a person, organization, or router) identified by a certificate |
displacement | A distance in a particular direction |
router | A device that finds the best path for a data packet to be sent from one network to another |
brightness | Differences in the intensity of light reflected from or transmitted through an image independent of its hue and saturation |
symlink | Make a new name for a file |
coaxial cable | Round insulated wire with single wire in center |
fortran | From Formula Translation |
temporary record | A record that has value for a finite period of time only to the Australian community, the individuals and organisations that do business with the Commonwealth and Australian Government agencies themselves |
spectrum | A continuous band of frequencies... |
spam | Unsolicited, commercial e-mail messages that are sent out in bulk, often to millions of users in hopes that one person may actually reply |
to the querying user. | See also |
certificate chain | A base certificate plus a sequence of all digital certificates up to but not including the Root Certificate. |
passive mode | Passive mode is the data connection established by the client computer |
active record | A record that has not been closed and which is required for the day-to-day functioning of an agency or person. |
dit | See directory information tree. |
hub | The centralized connection point for the audio and video equipment in a home theater, which is typically the A/V receiver. |
red-eye | Demonic effect, giving people (and animals) bright red (or green) pupils, caused by camera flash reflecting back from the subject's retina |
certificate revocation list | A time-stamped list of revoked Certificates that has been digitally signed by the CA |
usb modem | A type of broadband modem that connects to a USB port on your computer |
view-master | Proprietary name of a commercial stereo transparency image display and viewing system utilizing stereo pairs (7 in total) mounted in a circular rotating holder, and viewed with a purpose-made stereo viewer. |
analog | Analog systems represent data as a series of variations in some measurable, physical quantity, such as voltage or waveform |
integrity | and confidentiality |
ereader | (Electronic Publication) An open standard for electronic books and Web publishing from the International Digital Publishing Forum |
shareware | Software distributed for evaluation without cost, but that requires payment to the author for full rights |
deselect | To act on, typically by clicking somewhere else, a selected item so that it is no longer selected or highlighted. |
filter kernel | The function that defines the relative weight of a point depending on its position |
post transaction | This is a transaction that allows a merchant to submit a previously authorized transaction to the Acquirer for payment. |
greenhouse effect | The trapping of heat within the Earth’s atmosphere by greenhouse gases such as carbon dioxide, which accumulate in Earth’s atmosphere and act as a blanket keeping heat in |
spam | a processed meat product of (dubious) quality; a registered trademark of Hormel; e-mail promoting products, services, or ideas sent to hundreds (thousands, or even millions) of recipients who have not asked to receive it ( |
rpm | Remote Package Manager |
electronic business | Business activity that is conducted online. |
lending | See: Retrieval |
check digit | An extra digit that is added onto the end of a number such as an ISBN, credit card number, or barcode number |
address | A number given to a location in memory |
cable | A broadband transmission technology using coaxial cable or fiber-optic lines |
repository | The building or room, or part thereof, set aside for storing records |
mktemp | Make temporary filename (unique) |
certification authority | A body that generates, signs and issues public key certificates that bind subscribers to their public key. |
multimedia ebook | A multimedia ebook is media and book content that utilizes a combination of different book content formats |
konqueror | : The file manager typically used on a |
fsck | The fsck command checks a filesystem for consistency. |
rbgh-free | Recombinant Bovine Growth Hormone or rBGH (also known as rBST or recombinant bovine somatotropin) is a synthetic hormone used to increase milk production in cattle |
click | Point to an item and then quickly press and release the mouse button. |
public key | A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and which is available publicly |
data encryption standard | The U.S |
hard drive | The most common form of permanent data storage for your system, it consists of special magnetically-coated platters designed to store mass quantities of data |
scalar | A regular, single number, as opposed to a vector. |
router | A device that connects two or more networks |
linear complexity | Linear complexity grows in proportion to the size of the problem - if the problem is twice as big, it will take roughly twice as long to solve. |
issuer | A financial institution or its agent that issues the payment card to the cardholder identified by the primary account number (PAN). |
strace | Trace system calls and signals |
social network | It was coded initially in large part by current CEO Mark Zuckerberg, but credit for its creation is generally given to Mark Zuckerberg, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz, and Chris Hughes. |
beacon interval | When a wirelessly networked device sends a beacon, it includes with it a beacon interval, which specifies the period of time before it will send the beacon again |
draw | Also termed an allotment |
kpl | Kodak Professional Language |
ppm 200-45 | The administrative computing policy PPM 200-45 establishes oversight and accountability for existing and proposed campus administrative computing systems |
iesna’s lighting handbook | The Illuminating Engineering Society of North America or IESNA has produced a Lighting Handbook used as reference standard by the 2008 Professional Engineer’s Guide to the ENERGY STAR® Label for Commercial Buildings |
open | To make available. |
ccd | Short for charge-coupled device |
clipboard | Areas in which the most recently cut or copied item is temporarily stored |
quadratic complexity | Quadratic complexity grows with the square of the size of the problem - if the problem is twice as big, it will take roughly 4 times as long to solve. |
checksum | An algorithm-based method of determining the integrity and authenticity of a digital data object |
fixps | Try to fix common PostScript problems that break postprocessing |
repeat visitor | Refers to a person who visits a given Web site multiple times |
recoverable error | The type of error that the operator can resolve. |
led technology | In LED LCD televisions, light-emitting diodes provide the necessary illumination of the screen |
roll-out | The process of implementing a system or software application within an organisation |
certificate chain | An ordered list of certificates containing an end-user or subscriber certificate and its certificate authority certificates. |
24-bit image | A digital image that can include as many as 16.7 million possible colors |
web server | The term Web server can mean one of two things: |
transfer | The transfer of ownership of a Commonwealth record is subject to section 24 of the Archives Act 1983 |
voxel | A unit of subdivided space |
saturation | The amount of gray in a color |
hierarchical relationship | A relationship based on degrees or levels of superordination and subordination, where the superordinate term represents a class or whole and the subordinate terms refer to its members or parts |
access controls | The scheme of non-hierarchical mechanisms, which may be applied to records and record plan entities, to prevent access by unauthorised users |
fair trade | A social movement that promotes standards for international labor and gives workers a sense of economic self sufficiency through fair wages and good employment opportunities to economically disadvantaged populations. |
certificate | A record that, at a minimum: |
pie | Kodak Professional Imaging Engine |
tariff | Your tariff or price plan is the monthly amount you pay on top of your line rental to receive services and benefits from your ISP and/or voice provider. |
logging | A record of the time and date of a set of actions or activities |
sort | Sort lines of a text file |
ohm | A unit of electrical resistance; the resistance of a conductor in which a potential difference of one volt produces a current of one ampere |
sha | See Secure Hash Algorithm. |
root privileges | When one has root privileges, one has the powers associated with the root account. |
signal | A mechanism by which a process may be notified by the kernel of an event occurring in the system. |
records continuum | See: Continuum |
acid free | Paper and other materials with a pH of 7 (neutral) or higher (alkaline) |
pkcs #11 | The public-key cryptography standard that governs security devices such as smart cards |
spamnest | A company or a place that generates and allows the production and sending of spam. |
complete | See: Full and accurate record |
snoot | A tube-like device that focuses the flash’s light to a very small area. |
retrospective inheritance | The process whereby a subordinate (or child) entity automatically takes on a metadata attribute from its superior (or parent) entity when the metadata of the parent entity is changed or the child entity is moved from one parent entity to another. |
keystoning/keystone distortion | Term used to describe the result arising when the film plane in a camera or projector is not parallel to the view or screen |
visit | Measurement which has been filtered for robotic activity of one or more text and/or graphics downloads from a site without 30 consecutive minutes of inactivity and which can be reasonably attributed to a single browser for a single session |
rs-232 | Short for Recommended Standard 232 |
cctld | ccTLD stands for "country code Top Level Domain", which are the domains that pertain to a certain country or similar entity |
cable modem | A modem designed to operate over cable TV lines |
brightness resolution | The intensity of light reflected from or transmitted through an image. |
secure hash algorithm | An algorithm that assures data integrity by generating a 160-bit cryptographic message digest value from given data |
man | Help manual |
as 4390 | AS 4390 is the original Australian Records Management standard released in 1996 |
contacts | An address book or a name and address book (NAB) is a book or a database used for storing entries called contacts |
insert | Add text at location without overwriting existing text |
os server | A system that provides services to systems on a network |
distinguished name | A specially formatted name that uniquely identifies the subject of a certificate. |
usermod | Modify a user account |
above the fold | Newspapers: The most valuable space is the portion that appears at the top of a folded newspaper |
corrective action request | A request raised by the Designated Operational Entity (DOE) during the validation process, in the case where a mistake has been made, the CDM requirements have not been met or there is a risk the emissions cannot be monitored or calculated |
privacy breach | A privacy breach is a situation in which sensitive information that is controlled by Bank of America (or a third party acting on our behalf) is lost, misused (including inappropriately accessed) or disclosed to an unauthorized third party |
network | A set of computers which are linked together on a permanent basis |
smart card | Credit card type card which has an embedded computer chip that updates your account values with each use. |
living will | n |
locale | A geographic or political region or community that shares the same language, customs, or cultural conventions (English for the U.S |
current record | See: Active record |
expr | Evaluate expressions |
"do-good" networks | online philanthropic communities. |
cri | Carpet and Rug Institute |
confidentiality | and integrity |
aes | Advanced Encryption Standard (AES), also known as US FIPS PUB 197, is a block cipher, which has been adopted as an encryption standard by the U.S |
jpeg/mpeg | Joint Photographic Experts Group/Motion Picture Experts Group (part of the International Standards Organisation) |
connect identifier | A net service name or service name, that maps to a connect descriptor |
lcd | A panel based on liquid crystals |
rvi | Vi / Vim editor S |
san ssl certificate | SAN stands for Subject Alternative Name |
certification | The process of ascertaining that a set of requirements or criteria has been fulfilled and attesting to the fact to others usually with some written instrument |
densitometer tool | It measures the amount of light that is reflected or transmitted by an object, and is used to correct color in a composite image |
protocol | Protocol refers to a set of rules that are followed by two devices while interacting with each other. |
data dictionary | A formal repository of terms used to describe data. |
arch | print machine architecture |
enterprise risk management | integrated risk management, risk |
e-mail alias | An alternative name for a more complex email address |
ntp | NTP subsystem |
diff3 | Determine difference between 3 files |
wallet | Also called a digital wallet |
wireless | The condition of functioning without a wire or cable attached |
attenuation | A term used to describe how much of a signal is lost as it is sent down a line |
disposal schedule | See: Records authority |
assurance | SSL is not only about encryption but also about assurance |
oci | See Oracle Call Interface. |
gatekeeper | The Australian Government strategy to develop public key infrastructure to facilitate government online service delivery and e-procurement. |
change management | The proactive development of strategies and action plans to manage the impact of changes in work practices and business processes on an organisation |
edms | An automated system that supports the creation, use and maintenance of electronically-created documents for the purpose of improving an organisation's workflow |
expand | Convert tabs to spaces |
about detection names | A quick guide to Detections - why they are important, how they work and how to read them |
featured phones | A cellphone that contains a fixed set of functions beyond voice calling; however, it is not in the smartphone category |
smartsite | A course-management system that can help UC Davis faculty, staff and students teach, research, and collaborate online |
ciphertext | or create a message authentication code and to verify the code. |
connect string | See net service name. |
mts | See Microsoft Transaction Server |
aggregation | Any accumulation of record entities at a level above record object (document, digital document) eg |
macro-appraisal | A whole-of-government approach to identifying society's needs for public records |
hybrid cloud | A type of CrashPlan PROe deployment |
public key infrastructure | Allows users to encrypt sensitive information, so as to exchange it over the Internet in a private manner using special "keys", a public and private key pair that is obtained through a certification authority |
risk | compliance, and assurance from internal and external perspectives. |
subnet | A working scheme that divides a single logical network into smaller physical networks to simplify routing. |
ipm | Integrated Pest Management |
contactless payment | Also known as "touch and go" are credit cards, debit cards, key fobs, smart cards, or other devices that use radio frequency for making secure payments |
bioinsecticide | An insecticide derived from natural materials such as animals, plants, bacteria, and certain minerals |
rgb color | A color model in which red, green, and blue values are used to reproduce a set of standard colors |
pro-rata | Pro-rata, or part-month, charge may be added to your first bill, or to your first bill after a chargeable feature has been added to your account |
transfer device | The medium used to transfer electronic records from an agency to the National Archives, eg |
cookie | A simple data file containing information related to a website visitor’s activities |
epa | Environmental Protection Agency EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes |
bracketing | Taking a series of photographs of the same subject at different settings to help ensure that one setting will be the correct one. |
baud | Used to indicate the speed of a modem |
blog | Short for “web log” this is a kind of website comprised mostly of article entries updated on a regular basis. |
interoperability | The ability to exchange keys, both manually and in an automated environment, with any other party implementing this standard, providing that both implementations use compatible options of this standard and compatible communications facilities. |
carbon credit note | A fully underwritten obligation (in the form of a note or bond) to deliver a carbon credit (Certified Emission Reduction) to the purchaser at a specified future date |
fat | This is a section of a disk that defines the structure and organization of the disk itself |
dongle | A type of electronic key (‘dangling' on the end of short wire) used to unlock some types of software or any small device that plugs into a PC |
borrowing | A mechanism under a cap and trade system that allows entities to use allowances designated for a future compliance period to meet current compliance period requirements |
power supply | A Power Supply converts wall outlet AC power into DC power, which is the type of power required by a computer |
indoor air quality | IAQ refers to the contents of interior air that could affect the health and comfort of occupants |
amblyopia | A visual defect that affects approximately 2 or 3 out of every 100 children in the United States |
vi | Start the vi editor W |
csh | C Shell |
3d viewing | The act of viewing a 3D image with both eyes in order to experience stereoscopic vision and binocular depth perception. |
clustering | Group of independent systems working together as a single system |
temporary affiliate form | A process to grant temporary campus computing privileges to guest faculty and staff, visiting scholars and others |
edrm | see Electronic Records Management |
aliasing | The phenomenon that makes smooth lines and edges appear stair stepped or jagged |
biomass | Living or recently-dead organic material that can be used as an energy source, excludes organic material that has been transformed by geological processes (such as coal or petroleum). |
charge card | A credit card which requires payment in full upon receipt of the statement. |
osha | The Occupational Safety and Health Administration (US) or OSHA has promulgated regulations that oversee the management of hazardous materials in commercial entities |
procurement documentation | Documentation provided to vendors to enable them to understand and assess the requirements of the procuring agency and to prepare appropriate submissions |
misrepresentation | Presentation of an entity as a person or organization that it is not |
binary | A code system that uses 2 as its base and 0s and 1s for its notation |
taxonomy | The classification of entities in an ordered system that indicates natural relationships. |
pal | During the early days of color television in North America, European broadcasters developed a competing system called Phase Alternation by Line |
fingerprint | See certificate fingerprint. |
gps | Global Positioning by Satellite – fleet of low earth orbit satellites that broadcast highly accurate timing signals that can be picked up by small hand-held receivers, giving the user's location anywhere on the planet to within a few metres |
lpr | line printer subsystem |
information package | An information packaging concept that distinguishes content information from associated preservation description information (PDI) where it applies to the content information and is needed to aid in the preservation of the content information |
magnetic tape | A plastic, paper or metal tape that is coated or impregnated with magnetisable iron oxide particles on which information is stored as a pattern of polarised spots |
view | A selective presentation of the structure and data of one or more tables |
bit | Bit short for “binary digit” - a digit that is either 0 or 1. |
convergence | The ability of both eyes to turn inwards together, enabling both eyes to be looking at the exact same point in space |
adopt | Term that describes the process of having one device take over for another device that has been lost, stolen, sold, or reformatted |
external address | The device's public IP address as seen by the CrashPlan. |
pa-dss | Payment Application Data Security Standard |
secure shell | Secure Shell (SSH) is a well known protocol and has widely available implementation that provide a secure connection tunneling solution |
vanity domain | An Internet domain created for no other reason than to boost the creator's ego |
payment cards | Credit cards, debit cards, and charge cards issued by a financial institution. |
naming conventions | The glue that holds Rails together, letting applications figure out which pieces connect to which pieces without requiring a formal mapping table |
impedance | Measurement of resistance in relation to an alternating current |
lpr | Off line print |
operator | The person who is responsible for maintaining and running a Web site. |
skimming | Captures the track data from the magnetic stripe on a credit card, Debit Card or ATM card via a device that is illegally added to the ATM swiper. |
certificate revocation list | A list of revoked certificates that is generated and signed by a certificate authority (CA) |
vinegar syndrome | A characteristic of the decomposition of acetate-based magnetic tape where acetic acid is a substantial by-product that gives the tape a vinegar-like odour |
tracepath6 | See tracepath |
technews | A free campus tech news and information service for faculty, staff and students, from Information and Educational Technology |
attended mode | A PIE operating mode |
key pair | A |
control symbol | The numbers or letters imposed on an item to identify it in order to provide a system for facilitating control |
managed private cloud | A private cloud deployment strategy of CrashPlan PROe or SharePlan for Enterprise where Code42 managed appliances are utilized. |
digital wallet | See wallet. |
led | An LED (light-emitting diode) is a small electronic light that is used as the backlight for computer screens and televisions, camera flashes, flashlights, light bulbs and also as indicator lights in devices. |
subject name | A distinguished name (DN) that uniquely describes the subject of a certificate. |
csc | Short numeric numbers (typically 4-6 digits) to which text messages can be sent from a mobile phone |
aspect ratio | The width of a video display compared to its height and defined as a ratio, such as 16:9 for widescreen and 4:3 for a traditional TV. |
instantiate | Produce a more defined version of some object by replacing variables with values (or other variables). |
touch | Change file timestamps |
normal vector | A vector pointing straight our from (at right angles to) a surface. |
inlist | File-based whitelisting and blacklisting. |
inherited record | A record that has been passed from one agency to another when responsibility for the relevant function is transferred or one agency is absorbed by another, including when state agencies are absorbed by Australian Government agencies. |
spam | The legal definition of spam varies from one country to another |
tip-on | A single-sheet subscription renewal or new-business promotion glued or affixed to the front of a subscriber or sample copy |
dioxins | A family of toxic made-man organic chemicals, found in products such as bleached paper and formed from the burning and manufacturing of chemicals containing chlorine, with a toxicity level ranking just below radioactive waste |
extension tube | A camera attachment that moves your camera lens farther from the sensor, enlarging the image captured by the camera |
registration | The act of giving a record or file a unique identity in a recordkeeping system to provide evidence that it was created or captured |
adequate | See: Full and accurate record |
physical record | A record in hardcopy form, such as a folio, paper file, bound volume or photograph. |
instant messaging | A form of real-time communication between two or more people based on typed text |
architecture | The design, organization, and integration of components within a computer system, primarily determined by the central processing unit that the system employs. |
fqdn | FQDN stands for Fully Qualified Domain Name |
calren-2 | California Research and Education Network |
item | A discrete unit in a recordkeeping system or, in the archival context, within a series, such as a document or file, that is treated as a unit for control and retrieval. |
swap file | A file on your computer to which information, some of which may be sensitive, is occasionally saved in order to improve performance |
micropayments | See digital cash |
primary account number | The assigned number that identifies the card issuer and card holder |
equivalence relationship | The relationship between preferred and non-preferred terms in a thesaurus where two or more terms are regarded, for indexing purposes, as referring to the same concept |
risk analysis | risk |
led | Light-Emitting Diode |
master socket | The master socket is the primary phone socket in a home |
hot swappable | A device or component that can be safely removed and replaced whilst the equipment it is connected to continues to operate |
power density | The amount of energy a battery can store in relation to its physical size and weight |
repeater | A device that amplifies or refreshes a stream of data transmitted over a network, so it can travel to more remote computers |
peer-to-peer | A workload portability operation in which both the source and the target are bootable workloads, either physical or virtual (as opposed to operations in which either the source or the target is a static PlateSpin Image) |
stakeholder | An individual or group potentially affected by the activities of a company or organization; in sustainable business models the term includes financial shareholders as well as those affected by environmental or social factors such as suppliers, consumers, employees, the local community, and the natural environment. |
network | A means of hooking a number of computers together in order to share data and/or peripherals |
contents date range | The contents start date and contents end date, which are usually the dates on the first and last folios of a record. |
private key | In public-key cryptography, this key is the secret key |
optical codes | Printed bar codes on products, envelopes, etc. |
marker | The metadata profile of a record physically held outside an electronic records management system |
contrast | The range of difference in the light to dark areas of a photo. |
preservation description information | The information that is necessary for adequate preservation of the content information and which can be categorised as provenance, reference, fixity and context information. |
semantics | A feature of a language that denotes the meaning associated with various syntactic constructs of the language. |
property | For the purposes of the Archives Act 1983, property is derived from delivery (ie |
synchronisation speed | The speed of your broadband connection depends on a number of factors |
v2x | Virtual-to-anything |
newsgroups | Newsgroups are also known as online forums and are places on the internet where people can contribute to a discussion by leaving a message of interest |
ransomware | A malicious application that steal or encrypts the user’s data or system, then demands payment (a ransom) to restore the data or system access, is known as ‘ransomware’. |
pv | see Photo Voltaic |
offsite | A location that is outside the facility that contains the devices being backed up. |
pay-up | A calculation to express the number of prospects who responded to a promotion and then paid for the magazine or product |
error detection | Detecting when an error has occurred in some data, such as a number getting typed incorrectly or a bit getting flipped |
xss | Cross-site scripting |
real-time scanner | A anti-virus program that operates in the background, allowing you to continue working at normal speed, with no significant slowing of the system. |
x.509 | In cryptography, X.509 is an ITU-T (international telecommunication union) standard for public key infrastructure (PKI) |
noise | An outside signal that interferes with a communications transmission |
daisy chain | A type of cabling configuration in which devices are connected along a continuous line. |
view | Start vim in read-only mode |
post-consumer waste | Means there is some percentage of pulp made from paper once used by consumers that was recycled |
epaper | A generic term for an extremely thin flexible display that can be rolled up |
factor | Print prime factors |
non-preferred term | A term in a thesaurus or other classification tool that cannot be applied to a record. |
goods and services order | The price, currency, payment method, and other terms of the transaction (also referred to as the Order Description in SET). |
digital signature | Like a hand-written signature, this can be added to electronic documents or transactions to provide: authentication (proof that you are who you say you are); non-repudiation (proof that an exchange or transaction took place); and integrity (so that any attempt to alter information would be detected). |
mkfifo | Make FIFOs (named pipes) |
x2p | Anything-to-physical |
transaction | A sequence of one or more messages between two or more parties. One example of a transaction is the process that takes place when a cardholder makes a purchase with a credit card. |
process id | A process ID (PID) is a unique number associated with each process on the system |
dynamic typing | See |
functional requirements | A description of the requirements of a system for it to fulfil its responsibilities and to support users in performing tasks relating to those responsibilities. |
electronic commerce | All business transactions that are conducted by electronic means. |
online profiling | Compiling information about consumers’ preferences and interests by tracking their online movements and actions in order to create targeted ads. |
bluetooth | This wireless technology enables communication between Bluetooth-compatible devices |
database alias | See net service name. |
statistics | A sample of malware has statistics whenever its infection percentage is among the 50 most active threats. |
ssh | See Secure Shell. |
select | Accept keyboard input |
upgrade option | An option that is presented by the Solaris installation program |
buffer | Location for temporary data storage while processing is going on |
bandwidth | The speed at which data can be sent across a network |
system | Commonly used to describe computer software applications |
create | To make a record (evidence) of business transactions. |
oracle services | Windows services that are associated with particular Oracle Database components. |
extension | The addition of letters, numbers, etc |
carbon baseline | An amount of CO2 produced by an entity which serves as a begining point for carbon management |
audit bureau | An independent organization that audits the claimed circulations of its publisher members for purposes of verifying those claims for advertisers |
egovernment | The use of technology by government to interact with citizens, improve services and streamline operations |
folio | A leaf of paper or page in a file, usually numbered on one side only. |
tls | TLS stands for Transport Layer Security |
monopole | A pole position of speakers in which all the drivers are on one face of the enclosure |
java | A computer programming language invented by Sun Microsystems that enables web pages to include animations, calculators, scrolling text, sound effects, and games. |
bus | A bus is a set of wires that enables flow of data from one location of the computer to another. |
cardholder | A person or company that holds a valid payment card account and uses software supporting online commerce. |
cp | Copy one or more files to another location |
confidentiality | integrity, or availability of an information system. |
analyze | and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats. |
archival information package | An information package consisting of the content information and associated preservation description information (PDI), which is preserved within an open archival information system (OAIS). |
certification authority | A trusted third party that issues certificates that can be used by individuals or organizations to verify their identity or credentials |
analog | A type of telecommunications signal (audio or video) that is translated into electronic pulses with varying strength or frequency. |
/var file system | A file system or directory (on standalone systems) that contains system files that are likely to change or grow over the life of the system |
records manager | A user role with designated responsibility for undertaking, monitoring and managing records processes |
directory / folder | Divisions or sections used to structure and organize information contained on a disk |
credit card issuer | A credit card issuer is a bank or credit union who offers credit cards |
reslivering | For a ZFS storage pool, the process of transferring data from one device to another device is known as resilvering |
bluetooth | A wireless technology that enables devices to talk to each other without cables |
self-mailer | A piece of promotion mail that is not enclosed in an envelope and is designed so that a portion of it can be used for a reply |
checksum | The result of adding a group of data items that are used for checking the group |
heat sink | Finned metal plate or casting bonded or attached to electronic components, designed to dissipate heat |
ph | The measured acidity of soil |
recurring payments | A type of payment transaction initiated by the cardholder that permits the merchant to process multiple authorizations |
primary account number | The payment card number (credit or debit) that identifies the issuer and the particular cardholder account |
cyber cafe | A public place offering Internet access for a fee. |
microfilter | This is the small box that connects to a phone socket used to separate telephone signals from broadband signals |
mips | Millions of instructions per second |
analog | A term describing any device that represents a variable by a continuously moving or varying entity such as a clock, the hands of which move to represent time, or a UV meter, the needle of which moves to represent varying amplifier output energy. |
fallback | A reversion to the environment that ran previously |
activity | The second level of a business classification scheme |
latch | A simple, low-level serialization mechanism to protect shared data structures in the System Global Area. |
identity | The combination of the public key and any other public information for an entity |
interpolation | The mathematical process of determining plausible in-between values, given explicit values at particular points |
file part | A part of a file (or item) that has no independent intellectual existence or control apart from the other part(s) of the file. |
deletion | The process of removing, erasing or obliterating recorded information from a medium outside the disposal process |
cursor | Symbol marking where text will appear when you type |
lens | One or more elements of optical glass or similar material designed to collect and focus rays of light to form a sharp image on the film, paper, sensor, or screen. |
tmds | Transition Modulated Differential Signaling, a technology for transmitting serial data at very high speeds |
rule of thirds | A way of mentally dividing your picture horizontally and vertically into thirds, then placing important subject matter where these lines intersect. |
renewable resources | A resource that can be replenished at a rate equal to or greater than its rate of depletion |
information architecture | The interrelationships of systems in place in an organisation |
Pinterest is an online pinboard | |
aspect ratio | The ratio of screen width to screen height |
rfi | Request for information, also called request for proposals (RFP) or request for quotation (RFQ) |
optical mark recognition | Machine reads special marks, for example to score a test |
standards | Governmental or privately-created lists of criteria used to regulate or evaluate the products or behavior or corporations |
lsmod | List loaded kernel modules |
disposal | The National Archives authorises the disposal of Commonwealth records for the purposes of the Archives Act 1983, generally by issuing a records authority (RA), previously referred to as a records disposal authority (RDA), or a general records authority (GRA), previously referred to as a general disposal authority (GDA). |
cryptography | This represents a set of mathematical techniques to encode information so as to make it unreadable by anyone who does not have the correct key |
dot matrix printer | The workhorse of the computer industry, the dot matrix printer has been around for years and years |
midtones | Parts of an image with tones of an intermediate value, usually in the 25 to 75 percent range. |
layer | A way of managing elements of an image in stackable overlays that can be manipulated separately, moved to a different stacking order, or made partially or fully transparent. |
probe keyword | A syntactical element that extracts attribute information about a system when using the custom JumpStart method to install |
sanitize | A process intended to reduce, but not necessarily eliminate, microorganisms from the inanimate environment to levels considered safe as determined by public health codes or regulations. |
monitor | A synchronization mechanism which encapsulates the representation of a shared resource and provides operations that are the only way of manipulating it. |
chp | see Combined Heat and Power |