Glossary extracted starting with automatic seeds, with PTM for the domain com and language EN

mtaThis is an organized mail system that receives messages and distributes them to the recipients
environment variableA setting that only applies to the current working environment
footprintAmount of physical space something uses
parity bitAn extra bit (either 0 or 1) that is added to a group of bits to make it either even or odd, depending on whether even parity or odd parity is used
influenceran individual knowledgeable in a specific subject, highly recognized in an online community, with the ability to sway others' opinions; key influencers are seen on an online community as references who can offer assistance on specific subjects
power supplyConverts the electricity from the wall outlet into the flavor that the computer can digest
cfmCubic feet per minute, the measure of air flow, representing how much air is displaced in 1 minute.
threadsa group of related posts on a bboard or forum.
fair share schedulingA scheduling policy which assigns tasks to groups, and allocates a percentage of CPU time to each group.
connection itemAn item representing a pcAnywhere file, which contains connection device information and security settings to be used during a session.
systemA set of related elements that work together to accomplish a task or provide a service
landscape modeThe orientation of an image in which the longest dimension is horizontal; also called wide orientation.
affiliateWebsite affiliates are what drive Internet marketing
sessionIn communications, the time during which two computers maintain a connection and are usually engaged in transferring information.
epochA period of history; in Unix, “The Epoch” begins at 00:00:00 UTC January 1, 1970
bi-cubic patchA particular type of surface patch
animationAny method that can make an image appear to change over time
dual recordA function provided by many
switched lineA standard dial-up telephone connection; the type of line that is established when a call is routed through a switching station
digitalUsing a limited, predetermined numbering system to measure or represent the flow of data
adobe photoshop elementsA less expensive version of Photoshop with fewer of the ultra-high-end features the professional version includes.
windowA graphical representation of a program displayed on the screen
basis vectorA vector that defines one axis of a coordinate system
workgroupA collection of individual computer users that are logically connected, usually by a single project or by a department within an organization
static priorityA priority which is not automatically adjusted by the system.
dvd1
cpu cacheA memory bank between the main memory and the CPU, which lets the computer read data and execute instructions faster.
internet protocol addressIdentifies a workstation on a TCP/IP network and specifies routing information
blogsa contraction of "Web log", a Website where individual(s) provide entries of any type of content from video and podcasts to traditional text and photos to inform or entertain an audience and create online and offline discussions; presented in reverse chronological order.
logA file that contains status information collected from services and daemons
notch filterSeparates the color and brightness parts of a video signal into their component parts and sends them to the appropriate internal circuitry
web-based enterprise managementA set of management and Internet standard technologies developed to unify the management of enterprise computing environments
iso-9660Standard governed by the ISO for the file structure of CD-ROM.
optical diskA storage medium which uses tiny lasers to create peaks and valleys in a plastic layer on a circular disk
suspended processA process which has been frozen until killed or resumed.
physical occupancyThe amount of space used by physical files in a storage pool
prosumerA digital camera model that includes many features on professional cameras but also offers automatic settings.
vgaVideo Graphics Array
run levelThe operating mode of a UNIX system; for example, single-user, multi-user without networking, or multi-user with networking.
spammerSomeone who sends unsolicited commercial email, often in bulk quantities.
authentication policyAn authentication policy in
circular reasoningSee "reasoning, circular."
windowA rectangular area of the screen which displays a program's user interface, a document, or a system message
active versionThe most recent backup copy of a file stored by IBM Tivoli Storage Manager
xRefer to XFree86.
occurrence measureThe likelihood that a threat will manifest itself within an organization.
pciThe term "PCI" stands for Payment Card Industry.
security patchSet of additional files applied to a software program or application to resolve certain problems, vulnerabilities or flaws.
dynamicThe state or quality of an object that is frequently changed or modified
gbRefer to gigabyte.
communications sessionThe time during which two computers maintain a connection and are usually engaged in transferring information.
privacy policyA privacy policy outlines the terms by which a company or website handles personal information from its visitors to the site
piracyIllegally copying copyrighted software, music, or movies.
static filesFiles (such as system configuration files and binaries), that do not change without an action from the system administrator or an agent that the system administrator has allowed to accomplish the task.
ihsA color space where colors are defined by their intensity, hue, and saturation attributes
compressionThe process of saving storage space by eliminating empty fields or unnecessary data in a file
initializeTo prepare for use
ppmPages per minutes
confirmation or order confirmationA Web page and/or email that is delivered to a consumer toconfirm their purchase decision
geographic distributionThis measures the range of separate geographic locations where infections have been reported
hidden dialersPrograms that you may unknowingly download that can use your computer to silently dial expensive phone calls which later show up on your phone bill.
aclAn access control list
boot loaderx86 only: The boot loader is the first software program that runs after you turn on a system
isa/ipoAcronym for introductory slotting allowance/introductory pocket offer
ad-hocA wireless networking architecture in which there is no central access point
conductorA material through which electrical current can flow.
single-clickTo tap a mouse button one time.
vectorVector is used to describe an image that is made upof curves and lines described by mathematical equations
device classA named set of characteristics applied to a group of storage devices
msdeA server for storing data, which is compatible with SQL Server 2000.
joe jobA Joe Job is the act of forging spam mail headers to make it look like it comes from someone whom the spammer will hurt
hacktoolA utility designed to access remote computers
concatenationA RAID-0 volume
muteFor fast silencing of the sound.
controllerShort for A/V controller
banker trojanA malicious program, which using different techniques, steals confidential information to the customers of online payment banks and/or platforms.
constantA data object whose value cannot change during the execution of a program.
sequence numberOnly the Norton AntiVirus Corporate products use the sequence numbers, which are an alternate method of representing the date of the latest definitions or required definitions
skinThis is a term that refers to the actual look of a program
multimediaCombination of sound and images with text and graphics
anti-aliasingA process that smoothes the rough edges or jaggies in images by creating partially transparent pixels along the boundaries that are merged into a smoother line by our eyes.
ribbon cableA wide flat connection cable
cipher textText which has been encrypted.
shared staticA value for serialization that specifies that a file must not be backed up or archived if it is being modified during the operation
lookat pointA point in the scene that will project to the center of the image
view nameThe “URL name” of a view, e.g
authorizationIn single-copy sales, a retailer's approval for a particular title to be carried in some or all of its stores
battery packA device that holds multiple batteries with which you can power your digital camera.
gigabyteGB - 1,024 megabytes or 1 billion characters of information.
mach bandsAn optical illusion caused by a sudden change in the rate of change of the brightness (discontinuities in the brightness' second derivative)
httpHyperText Transfer Protocol
rpmRevolutions Per Minute
shutter-priority autoexposureA semi-automatic exposure mode in which the photographer sets the shutter speed and the camera selects the appropriate aperture.
fanny packA small bag worn around the waist like a belt.
memoryAlso called main memory
coreMemory device consisting of small metal rings
inactiveA status indicating that a program, job, policy, or scan is not currently running
virtual serverThe part of a server that functions as if it were a separate, dedicated server
fsidSee file space ID.
netprowler managerA component that coordinates the work of NetProwler agents, provides communication between the agents and the user interfaces, and stores security data gathered by the agents.
quadratic complexityQuadratic complexity grows with the square of the size of the problem - if the problem is twice as big, it will take roughly 4 times as long to solve.
xblAn
exposureWhen sensitive data is released to someone without authorization.
session factoryA callable, which, when called with a single argument named
security life cycleA method of initiating and maintaining a security plan
localeA geographic or political region or community that shares the same language, customs, or cultural conventions (English for the U.S
byteThe standard measurement of storage capacity
txTransmitter
event classA predefined event category used for sorting reports and configuring alerts.
trackwareTrackware is any software package that tracks system activity, gathers system information, or tracks customer habits and relays this information to third-party organizations
wide-screenUsed to describe a 16:9 or greater aspect ratio
demand fetch strategyA strategy which fetches items only when requested.
gridComputing: The set of separate computers uses in distributed computing.
shellA command interpreter that allows a user to run executable code
twitter searcha search engine that filters out real-time tweets.
signatureThe name of a function together with the sequence of its parameter types
pyramid_jinja2Jinja2 templating system bindings for Pyramid, documented at http://docs.pylonsproject.org/projects/pyramid_jinja2/dev/
trusteAn online seal program
internal threatA threat that originates within an organization.
differential archiveA Solaris Flash archive that contains only the differences between two system images, an unchanged master image and an updated master image
target of infectionSystems, files, or media (for example, hard drives), that a threat attempts to infect or otherwise disrupt.
brute-forceBrute-force search is a trivial but very general problem-solving technique, that consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement.
discAn optical disc, as opposed to a magnetic disk, which recognizes the common spelling that is used in the compact disc (CD) market
checkout displayIn newsstand sales, the coveted display space at the checkouts of supermarkets, convenience stores and other mass outlets
binaryA code system that uses 2 as its base and 0s and 1s for its notation
blue screenA background often used for photographs or video that are to be matted, or composited, over other images
artifactingDistortion that is introduced into audio or video by the compression algorithm (codec)
soft real time schedulingA scheduling policy which attempts to meet deadlines.
wireless fidelityRefer to 802.11.
substitution cipherA type of cipher that works simply by replacing each letter or combination of letters in a plain text with a certain other letter or combination of letters to make up the cipher text
portA type of data connection used by computer systems to transfer data directly between two or more computers or resources
inverse kinematicsA method for specifying motion in an animation
special charactersNon-alphanumeric characters such as !, @, ^, and *.
guiGraphical User Interface
internet 2Internet 2 is a nationwide project to develop an advanced network of applications to support research and education at universities
ps/2 portA six-pin socket for connecting keyboards and mice to computer systems.
gmshA free and Open Source 3D (and 2D!) finite element grid generator
linear video adA linear video ad is experienced in-stream, which is presented before, between, or after the video content is consumed by the user
translation stringAn instance of
rubya dynamic, reflective, general purpose object-oriented programming language that combines syntax inspired by Perl
rogueAn antivirus or antispyware application that does not provide the functionality claimed, and may not work at all.
driverSee Device driver
atAdvanced Technology
keyloggerA program or hardware component that surreptitiously monitors and stores all the strokes typed into a keyboard
alertable eventAny event or member of an event set configured to trigger an alert.
agent nodeA client node that has been granted proxy authority to perform operations on behalf of another client node, which is the target node.
bugError in a program that cause problems.
spacingSpace between letters or lines of text
epki managerEnterprise Public Key Infrastructure Manager
variantA program that bears sufficient similarity to a previously identified program to be categorized as a member of the same “family” of programs.
blu-rayBlu-ray is an optical disc format such as CD and DVD
bhoA plugin that is automatically runs long with the Internet browser, adding to its functionality
monitorThe Type designation 'Monitor' was previously used by F-Secure to identify a program that can monitor and record all computer activities, including each keystroke typed on the keyboard
ps/2 portSmall connection port used by some mice and keyboards
subnet maskA bit mask that is used to select bits from an Internet address for subnet addressing
printer resolutionA measure of print quality
ageA rating used to calculate the vulnerability based on the relative amount of time since the discovery of the vulnerability
nameserverA DNS information server
destructorA member function of an object that is executed whenever that object goes out of existence
fastening pointA position, represented by a square, where an image-editing program anchors a magnetic selection outline.
algorithmA process that can be applied multiple times to a digital file.
working directoryThe directory in which a program considers itself to be while running.
gplGNU General Public Licence
slaveIn hard drive technology, a non-bootable drive that is used mostly for system and file storage; is controlled by the master drive.
multithreadingThe incorporation of multiple threads of execution within a process.
.encRefers to a file that is encrypted or encoded
parental controlsTools that allow parents to prevent their children from accessing certain Internet content that they might find inappropriate.
octalBase-8 number system, with digits 0-7.
lanLAN is an acronym for Local Area Network that spans small area
grubx86 only: GNU GRand Unified Bootloader (GRUB) is an open source boot loader with a simple menu interface
hard offerA promotion that does not treat the first issue or first several issues as a no-obligation trial
scannerA peripheral that uses light receptors for reading printed material and digitally transferring the information as objects into a computer system for processing.
dateutilThe dateutil library provides extensions to the standard datetime module
modifies filesThis payload changes the contents of files on the computer and may corrupt files.
mouseAn input device consisting of 2 or more buttons with a rolling ball underneath
metering modeRefers to the way a camera’s autoexposure mechanism reads the light in a scene.
mountTo access a storage device or medium on a directory within a computer file system.
risk measureA quantitative measurement of risk
gisGeographic Information System
matchdictThe dictionary attached to the request object as
main memoryWhere the computer stores the data and commands that are currently being used.
serverA computer system that manages files, services, and access to resources on a network.
polymorphismThe ability to use the same identifier to name two or more functions within the same scope of a program; gives the appearance that a single function exhibits different behavior depending on the nature (i.e., classes/types and number) of its parameters.
short message serviceA communication protocol for transmission of short text messages between one mobile devices connected to a telecommunications network
rules fileA text file that contains a rule for each group of systems or single systems that you want to install automatically
desktop enterprise solutionsA unit of IET that sells computing consultation and repair services to campus departments and students, usually at less cost than charged off campus
page faultAn interrupt generated when a program references a page that is not currently resident.
jokeA program with an annoying or funny functionality
pop-up menuList of options that is displayed when clicking on a certain item or area of a window in a program with the secondary mouse button (usually the right)
message boardA message board is an online discussion site
affiliate marketingAn agreement between two sites in which one site (the affiliate) agrees to feature content or an ad designed to drive traffic to another site
packageA file that contains a set of related files that can be installed as a unit.
degree of an operatorThe number of values associated with the evaluation (i.e., the use) of that operator
capacityAmount of data that can be stored
deadline schedulingA scheduling policy which schedules tasks based on the timing needs of the tasks.
busy waitA situation in which a process, while not blocked, continuously checks for a condition which will allow it to proceed.
dsmserv.optSee server options file.
foreground taskA task of high priority
node1
topologyThe physical or logical architecture of a private computer network.
field forceIn single-copy sales, a group of representatives maintained by a national distributor (see definition) or a large publisher
libraryA collection of routines that perform commonly required operations.
floppy diskRefer to diskette.
lanA network of interconnected computers in a reasonably small geographical area (generally in the same city or town or even building).
profilingThe process of scanning a network for live systems to monitor and of associating attack signatures with those particular systems
chat roomThe name given to a place or page in a website or online service where people can type messages which are displayed almost instantly on the screens of others who are in the “chat room.”
intruder alert agentIn Intruder Alert, the agent monitors the hosts and responds to events, by performing defined actions based on applied security policies.
distributionA Distribution is a version of an operating system that contains its own applications and characteristics.
storage hierarchyA logical ordering of primary storage pools, as defined by an administrator
command interpreterA program that accepts commands and executes (interprets) them.
communications portAlso called a serial port
current riskThe remaining risk after safeguards have been applied.
wi-fiWireless Fidelity
archiveTo collect files into one large file for storage or backup purposes
can-spam actA federal law that established standards for sending out promotional e-mail.
scratch volumeA labeled volume that is either blank or contains no valid data, that is not currently defined to IBM Tivoli Storage Manager, and that is available for use.
symbosSymbOS is the platform designator for the popular Symbian operating system (OS) used to run data-enabled phones (also known as smartphones)
dual-bootThe concept of two operating systems installed on a single computer system.
number of infectionsMeasures the number of computers known to be infected.
concaveA property of a polygon that has at least one vertex bulge inward instead of outward
alarmA sound or visual signal triggered by an error condition.
parameterA variable piece of data indicating how a program should behave in any given situation.
belady's anomalyA counterintuitive effect in which increasing the number of page frames may increase the number of page faults.
tweetThe post/entry made on Twitter (see social networking sites).
case-sensitiveThe discrimination between lowercase and uppercase characters.
secure shellAn encrypted (thus secure) method of logging in remotely to a computer
shellA command interpreter.
vector additionThe process of adding two vectors, which results in another vector.
architectureThe design, organization, and integration of components within a computer system, primarily determined by the central processing unit that the system employs.
data templateA template that defines files or registry entries to be included in a backup.
file space idA unique numeric identifier that the server assigns to a file space when it is stored in server storage.
bufferA reserved area of memory for temporarily holding data
prototypeA function declaration
media serverSee install server.
unstructured internal threatAn individual inside your organization who may be a threat
nonnetworked systemsSystems that are not connected to a network or do not rely on other systems.
pptpPoint-to-Point Tunneling Protocol
slaService level agreement
utf-8/unicodeStandard for unique and internationalized character encoding; allows for plain text files and other data to be represented in several languages and dialects.
recovery modeThis is the mode that you use when your phone is in desperate need of a restore
paid during serviceA source in which the agency sells a subscription to a group of magazines to a consumer, who agrees to be billed monthly for the life of the subscription
domainThe site's name that an organization uses; for example, Red Hat has a domain name of redhat.com.
windows registry keyThese are sections of the Windows Registry that store information regarding the system's settings and configuration.
dsssDirect Sequence Spread Spectrum
verboseAn optional mode when running a program that displays varying levels of status messages as it is processing.
begin scriptA user-defined Bourne shell script, specified within the rules file, that performs tasks before the Solaris software is installed on the system
integratedTwo or more commonly separate components, objects, or applications that are developed to work together
interpreterA program expressed in one language which executes programs expressed in another language.
vulnerability managementThe practice of identifying and removing weaknesses that can be used to compromise the confidentiality, integrity, or availability of a computer information asset
mount retention periodA device class attribute that specifies the maximum number of minutes that the server retains a mounted sequential access media volume that is not being used before it dismounts the sequential access media volume.
cgi(Common Gateway Interface) An interface by which external programs communicate with the HTTP server
current vulnerability measureThe danger posed by a vulnerability after accounting for the safeguards you use to secure it
booleanAn expression, the value of which is either true or false.
scriptA type of program that consists of a set of instructions for an application
tweeter driverA type of speaker driver that handles the high-frequency treble range (above 2000 Hz).
certificateCryptographic systems use this file as proof of identity
ndmpNetwork Data Management Protocol.
incident response cycleThe sequence of phases that a security event goes through from the time it is identified as a security compromise or incident to the time it is resolved and reported.
virus definitionsLiveUpdate Plus definitions are available for enterprise customers with Platinum Support entitlements
unaided recallThe percentage or number of consumers surveyed who are able to cite a products/services name after being requested to cite any and all product names within an advertised category
global positioning systemA space-based global navigation satellite system that provides location and time information in all weather, anywhere on or near the Earth, where there is an (almost) unobstructed sky view.
routing tableThe set of information the kernel uses in “routing” network data around
online communitya group of like-minded people using social media tools and Internet sites to communicate
time-outA predetermined period of time during which a given task must be completed
ecommerce safety threatsSuspicious ecommerce activities, such as selling counterfeit goods.
switchA device that facilitates transmissions between nodes on a private network and regulates internal network traffic.
registrantThe person or organisation to whom a domain name is registered
tapTopfield Application
stringA sequence of characters (letters, numbers, punctuation marks etc.).
bitShort for binary digit
entire solaris software groupA software group that contains the entire Solaris release.
access timeThe time from a data transfer request to the completion of the transfer of the data.
heuristically-detected virusA heuristically-detected virus is found based on the malicious behaviors that it exhibits
webinara seminar delivered online, either live or recorded and archived for replay
user managerA Windows NT utility that enables users with administrative privileges to edit and define individual user accounts and privileges for the local workstation.
dvd-aDVD-Audio
patch analyzerA script that you can run manually or as part of the Solaris installation program
structured internal threatAn individual inside your organization who may be a threat
parallaxApparent change in the position of an object when viewed from different points
severityA level assigned to an incident
navigation and click-stream dataRefers to user data passively generated by browsing the Internet
ronThe scheduling of Internet advertising whereby an ad network positions ads across the sites it represents at its own discretion, according to available inventor
archive retention grace periodThe number of days that IBM Tivoli Storage Manager retains an archived file when the server is unable to rebind the file to an appropriate management class.
notificationA predefined response triggered by a system condition, such as an event or error condition
administrative privilege classSee privilege class.
odfOpenDocument (or
encryptionA way of scrambling information so that data can stay secure.
polarizing filmA film that turns or shifts light.
academic technology servicesAlso known as ATS (formerly Mediaworks)
communications deviceAlso called the connection device
dbDatabase.
post-mortemIn information security terms, a method of data analysis and investigation performed after an intrusion has already occurred.
nis+The SunOS 5.0 (minimum) Network Information Service
benefitThe effectiveness of a safeguard in terms of vulnerability measure
licensed productSee Compliant Product.
vector thicknessThe width of a vector, or line segment, primitive
memoryMemory is the internal storage location where data and information is stored on a computer.
boardreadera Web-based aggregator of message boards and forum discussions
authenticationThis security process determines whether someone is who they say they are
dot productA mathematical operation of two vectors that produces a scalar
common nameThe name by which a virus is generally known.
losslessA compression method that does not cause any loss of data
imInstant messaging
management classA policy object that users can bind to each file to specify how the server manages the file
convexA property of a polygon that bulges outward at all vertices
sugarThe window manager used by the
hard copyPrinted on paper or other permanent media
cpuCentral Processing Unit
bulletin boardA dial-up computer network site typically offering news and programs that may be downloaded to one's computer.
band printerUses characters on a chain that is moved into place before striking the characters onto the paper.
utilityA standard program, usually furnished at no charge with the purchase of a computer, that does the computer's housekeeping.
skyscraperSkyscraper ads, which are tall and narrow
drmA short name for disaster recovery manager.
dvrDigital video recorder
unstructured threatA threat that tends to be technically unskilled or unsophisticated.
moduleIn IT parlance, this is a set or group of macros in a Word document or Excel spreadsheet, etc.
pixelOne dot on a screen
3dVersions 1.4 and 1.4a of the HDMI Specification add support for three-dimensional (3D) video formats, establishing a foundation for 3D broadcast, movie, and gaming applications
zoneSee non-global zone
clientThe customer side of a client/server setup
anti-debug / anti-debuggerThese are techniques used by viruses to avoid being detected.
mecavisionhdA collective term for a whole range of picture optimisation features
stereoscopic 3dTwo photographs taken from slightly different angles that appear three-dimensional when viewed together.
checking for meaningThis is an alternative phrase for semantic analysis.
smshingSMS text Phishing
withholdsShipped single copies that never reach the racks
number of sitesMeasures the number of locations with infected computers
oecd guidelinesPrivacy Guidelines issued in late 1980 by the Organization for Economic Cooperation and Development
signalA mechanism by which a process may be notified by the kernel of an event occurring in the system.
causes system instabilityThis payload may cause the computer to crash or to behave in an unexpected fashion.
spoofingSpoofing is when a spammer or scammer fakes his origin or pretends to be someone else i.e
exclude-include listSee include-exclude list.
policy setA policy object that contains a group of management classes that exist for a policy domain
soft boxAn attachment that mounts on the head of the flash and extends out about 6 to 8 inches, with a frosted white panel at the end, which softens the light.
groomingThis is the process predators use to manipulate minors into sexual relationships or into producing sexual images of themselves
personal informationInformation that can identify you, like your bank and credit card account numbers; your income; your Social Security number (SSN); or your name, address, and phone numbers.
even fieldSee "field, even."
lnbAn acronym for Low Noise Blocker
mp3MPEG-3
pirated softwarePrograms that have been copied illegally rather than purchased legally.
repro graphicsA full-service campus printing department affiliated with the Office of Administration
ppsPayroll Personnel System
ucs-2An ISO/IEC 10646 encoding form, Universal Character Set coded in 2 octets
cipherAn algorithm used to encrypt a piece of plain text.
install serverA server that provides the Solaris DVD or CD images from which other systems on a network can install Solaris (also called a media server)
speakersIf your system has a sound card, it needs a pair of speakers
hoaxThis is not a virus, but a trick message warning of a virus that doesn't actually exist.
secondary storageSecondary storage technology refers to storage devices and storage media that are not always directly accessible by a computer
proprietaryUnique to a given manufacturer
dynamic loaderWhen programs are compiled under Linux, they usually use pieces of code (functions) from external libraries
mathmlThe Math Mark-up Language is a subset of
subnet maskA 32-bit address used in conjunction with an IP address to segment network traffic; used to restrict transmissions to certain subnets.
commentsreplies or opinions in reference to a specific topic; usually left on blog posts or on a bboard
throughputHow much data is moved in a certain amount of time
digital certificateA nontransferable, nonforgeable, digital file issued from a third party that both communicating parties already trust.
connectivityRefers to the input and output ports and wireless ability of the product  
storage classProperty of an object that determines when the object comes into existence and goes out of existence (i.e., its lifetime), and any default initial value of that object
contactsAn address book or a name and address book (NAB) is a book or a database used for storing entries called contacts
pathA list of locations for the computer to look for commands if the full path is not given.
algorithmA predetermined series of instructions for carrying out a task in a finite number of steps.
ghzGigahertz
backupTo periodically archive data on a system to mitigate risk the of permanent data loss in the event of system or component malfunction or destruction.
root factoryThe “root factory” of a
safeguard assessmentA process identifying the safeguards that best support the risk-reduction strategy formed during the risk assessment phase.
databaseA database is a collection of data ordered into tables of relevant information
storageThe media and methods used to keep information available for later use
bizoppsShorthand for “business opportunity;” some schemes involve extravagant and unfounded earnings claims and are actually fraudulent business ventures.
text fieldArea in a program or application for typing a word or group of words.
aes(Advanced Encryption Standard) A symmetric 128-bit block data encryption technique
foregroundA foreground program runs and interacts with the user
wordAmount of data the CPU can process at one time
superuserA special user who has privileges to perform all administrative tasks on the system
definition statementA declaration statement that is implemented (i.e., causes the allocation of memory).
extensible markup languageThe common language of the Web used to exchange information.
expirationThe process by which files are identified for deletion because their expiration date or retention period has passed
coaxial cableA cable consisting of a single conductor which is surrounded by insulation and a conductive shield
system clockElectronic pulse used to synchronize processing
ad notersA person who has noticed an advertisement in a publication
boot packageA file, bootable disk, Ghost image, or Preboot Execution Environment (PXE) image of a bootable disk that contains the Symantec Ghost executable and any drivers required to start a client computer and Symantec Ghost.
certificate authorityAn office or bureau that issues security certificates.
cme initiativeThe CME initiative is an effort headed by the United States Computer Emergency Readiness Team (US-CERT), in collaboration with key organizations within the security community
uidUser Identifier
ramRAM is an acronym for Random Access Memory
rootThe top level of a hierarchy of items
startup windowA time period during which a schedule must be initiated.
sell-throughAlso called efficiency or efficiency level
tutorialA set of lessons that walks you through the use of hardware or software
payload triggerThe condition that causes the virus to activate or drop its destructive payload
touch and dragThis action moves the content on the screen in the corresponding direction
jobA user-defined task to be completed by a computer system.
activateTo validate the contents of a policy set and then make it the active policy set.
vulnerability safeguardA process, procedure, technique, or feature that assists in securing a vulnerability, by reducing the risk linked to the system's vulnerability measure.
ignoreA condition that prevents an action from being executed on a rule.
ruleA logical statement that lets you respond to an event, based on predetermined criteria.
invitationYou can invite any other users to your groups if you are the group administrator, or you may be able to invite your friends into groups where you are a member
encryptionThe act of using a cipher or algorithm to transform data, such as a program’s code, into an unintelligible form
basicBeginners All-purpose Symbolic Instruction Code A simple but powerful computer language that can act as a good introduction to more powerful languages like C, C++, et al
urlUniform Resource Locater
snmpSimple Network Management Protocol
edgeAn area where neighboring image pixels are significantly different in color; in other words, an area of high contrast.
readera web-based tool that aggregates information from an RSS feed
fileA piece of data stored as a single addressable object on a file system
man sectionPages in the standard Unix online manual ("man") are grouped into sections for easy reference
anti-aliasingThe process of reducing aliasing, or jaggies, in creating an image.
synchronous transmissionA form of data transmission in which information is sent in blocks of bits separated by equal time intervals
chain letterA chain letter is a letter that is sent successively to several people
firewallThe firewall is all about prevention
race conditionA situation where the (uncontrolled) ordering of events can affect the outcome of the situation.
backward compatibleThe quality of software to be able to work properly with older versions of the software that may be installed on a machine or communicating with another machine with a lower version of the software.
multicastTo simultaneously send the same message to a list of recipients on a network.
linear shadingSee "bi-linear interpolation."
directional lightA light source that shines from the same direction at every point in the scene
replaceReplace specific word(s) or character(s) with stated text
thumbnailThis term is used to describe a small image meant to represent a larger one
midrange driverA type of speaker driver that handles midrange frequencies (200 Hz to 2000 Hz).
lockA temporary file that keeps data and applications from being used by multiple processes or users, which may cause data collisions and/or corruption.
retentionThe amount of time, in days, that inactive backed-up or archived files are kept in the storage pool before they are deleted
databaseA generic term for any large, organized amount of data
mbrThe Master Boot Record
deadlockA situation in which two or more processes are prevented from continuing while each waits for resources to be freed by the continuation of the other.
databaseA collection of persistently accessed data that is typically stored for fast and/or arbitrary access
cairoThe Cairo graphics engine
gifA file format for storing images
modeA copy group attribute that specifies whether to back up a file that has not been modified since the last time the file was backed up
flat projectionA method of projecting a 3D scene onto a 2D image such that the resulting object sizes are not dependent on their position
circulation-drivenA magazine that yields most of its revenue from circulation
platform groupA vendor-defined grouping of hardware platforms for the purpose of distributing specific software
coalescenceThe combination of two (or more) physically adjacent unused spaces into a single unused space.
introspectorAn object with the methods described by
deployTo perform a remote installation.
website verificationThe better security packages offer an up-to-date list of suspected fraudulent websites
crash recoveryA file transfer option that directs pcAnywhere to continue transferring files where it left off when computers are reconnected after a broken connection, instead of restarting the transfer.
vga resolutionVideo Graphics Array resolution
darkstarThe default hostname in Slackware; your computer will be called darkstar if you do not specify some other name.
upgradeAn installation that merges files with existing files and preserves modifications where possible.
coaxial1
analogA type of telecommunications signal (audio or video) that is translated into electronic pulses with varying strength or frequency.
toleranceThe range of color or tonal values that will be selected with a tool such as an image editor’s Magic Wand, or filled with paint when using a tool such as the Paint Bucket.
source codeThe (more or less) human-readable code in which most programs are written
stereoscopyThe art and science of creating images with the depth sense stereopsis
pluginA program that adds new functionality to an existing system.
sectorThe primary measuring unit of a storage disk upon which data is stored.
text mode installationKeyboard-oriented installation of a program or operating system, normally non-graphical.
serial transmissionThe transmission of discrete signals one after the other
text interfaceUser interface that uses only text commands, no graphics.
unit vectorA vector of length, or magnitude, one.
rs-232-c standardAn industry standard for serial communication connections
event recordA database record that describes actual status and results for events.
signalUnix programs can communicate between each other using simple “signals”, which are enumerated and usually have specific meanings
blockA logical division of data on magnetic tape.
postPower On Self Test
tape libraryA term used to refer to a collection of drives and tape cartridges
boot archivex86 only: A boot archive is a collection of critical files that is used to boot the Solaris OS
multimediaInformation presented in more than one format, such as text, audio, video, graphics, and images.
vector scalingAn operation of a vector and a scalar
surgeSee power surge
threat measureA quantitative measurement of a threat
bootBoot is the platform designator for boot sector, the dedicated area of a storage device such as a CD, floppy disk, or hard drive that contains critical information for starting the main operating system (OS)
attack signatureThe features of network traffic, either in the heading of a packet or in the pattern of a group of packets, which distinguish attacks from legitimate traffic.
security assessment toolsPrograms used primarily to perform security related network or local system administrative tasks that contain functionality that may provide information for unauthorized access to computer systems or render them inoperable.
cctvClosed Circuit Television
external objectAn object that is defined outside of all functions.
decryptionThe process of converting coded data to plain text
templatePages and collections can be offered as templates to other users
exploitA program or piece of code that is specifically written to take advantage of a vulnerability, in order to provide an attacker with access to a vulnerable computer system, program or network.
wwwWWW stands for World Wide Web
motifA popular programming toolkit used in many older X programs.
motivationThe relative amount of incentive that a threat has to compromise or damage the assets of an organization.
emissive colorAn object surface property sometimes used with the Phong lighting model
safeguardA process, procedure, technique, or feature intended to mitigate the effects of risk
rootThe specially privileged userid used to perform Unix system administration.
accommodationThe refocusing of the eyes as their vision shifts from one distance plane to another.
tape volume prefixA device class attribute that is the high-level-qualifier of the file name or the data set name in the standard tape label.
scsiA popular standard for internal and external hard drives and other peripherals.
itInformation Technology.
3:2 pull downFilm is usually recorded at 24 frames per second
country of originThis generally refers to the country where the first incidence of virus was first recorded.
fat3232-bit File Allocation Table
certstore fileA file that contains a digital certificate for a specific client system
fractalSomething that has infinite detail
settling timeTime for read/write head to lower to the storage disk and cease vibrating, allowing reliable reading and writing
atmAsynchronous Transfer Model
white paperThis is a document that explains how a certain technology or product works
temporary affiliate formA process to grant temporary campus computing privileges to guest faculty and staff, visiting scholars and others
event normalizationThe process by which events from disparate sources are mapped to a consistent framework.
micro-blogginga form of blogging where the entries/posts are limited to a certain amount of characters or words, i.e
wmlWireless markup language
bufferBuffer is a location, especially in RAM, for storage of temporary data to speed up an operation such as disk access or printing.
masterTerm for a hard drive that controls other drives on the same connection
marqueeThe dotted outline that results when you select a portion of your image; sometimes referred to as marching ants.
public keyA shared data file that is distributed to any interested recipient for the secure transmission of data
security servicesThe security management, monitoring, and response services that let organizations leverage the knowledge of Internet security experts to protect the value of their networked assets and infrastructure.
semAcronym for search engine marketing, by which a marketer can invest in key words and phrases in order for their products and services to be displayed in response to prospective customers who search the Web using those same key words or phrases
freeview playbackFreeview Playback is a branding mark for
raid-z storage poolA virtual device that stores data and parity on multiple disks that can be used as a ZFS storage pool
platform nameThe output of the uname -i command
romThis is a type of memory which under normal circumstances cannot be written on, and therefore its content is permanent.
color wheelA circular diagram of colors
searchFind a key in a large amount of data.
wuxgaThe projected image is made up of 1920 x 1200 pixels  
freemiumAlso called a love gift
wanboot.conf fileA text file in which you specify the configuration information and security settings that are required to perform a WAN boot installation.
internetA network of independent computer systems that communicate with each other through various communications protocols and standards
wireless networkA method of accessing high speed Internet without the computer being linked by cables.
console1
sectorA numbered wedge-shaped area of a storage disk
client computerA computer that runs a client program
include-exclude listA group of include and exclude option statements that IBM Tivoli Storage Manager uses
ruleA series of values that assigns one or more system attributes to a profile
nisThe SunOS 4.0 (minimum) Network Information Service
banner grabA client receives this readable string immediately following a connection to a server
streamingUsually, when you download something, you have to wait for it to finish before you can open or use the file
cmykThe print color model in which cyan, magenta, yellow, and black inks are mixed to produce colors.
peer-to-peer fundraisingthe act of soliciting nonprofit donations directly from one's online contacts using Web-based tools like email or social networks
payloadThe effects of a virus.
litewareA free version of a program which is missing some high-end or desirable features
conditioningSmoothes out variations in power by pumping up the voltage when it drops and stepping it down when it's too high
keystoning/keystone distortionTerm used to describe the result arising when the film plane in a camera or projector is not parallel to the view or screen
bass and treble controlsSeparate on-screen controls provide for a wide range of Bass and Treble sound adjustments.
environmentEnvironment refers to the interaction among all factors external to a physical platform
contrastThe level of white that you see on a video display
authenticationThe assurance that a party to some computerized transaction is not an impostor
self-mailerA piece of promotion mail that is not enclosed in an envelope and is designed so that a portion of it can be used for a reply
tunnelingA technique used by some viruses to foil antivirus protection.
os xThe Macintosh operating system
rebindingThe process of associating a backed-up file with a new management class name
afeAnalog Front End
arrow keysOne of the four directional keys on the numeric keypad.
quad-coreA processor that combines four independent cores in a single package
cagingIn fulfillment, the process in which subscription orders and their enclosed payments are separated and then recorded
monitoring toolA program that can monitor and record all computer activities, including each keystroke typed on the keyboard.
applicationAn application is a set of codes designed to allow specific tasks to happen
administrative domainAn environment or context defined by a security policy, security model, or security architecture.
incident responseThe ability to deliver the event or set of events to an incident management system or a HelpDesk system to resolve and track incidents.
compositionThe arrangement of the main subject, other objects in a scene, and/or the foreground and background.
dnsDomain Name Service
server options fileA file that contains settings that control various server operations
ramThis is a computer's main memory, in which files or programs are stored when they are in use.
backgroundA background program is temporarily suspended from execution and does not interact with the user
upgrade optionAn option that is presented by the Solaris installation program
access modeAn attribute of a storage pool or a storage volume that specifies whether the server can write to or read from the storage pool or storage volume
transferProgramming statements, like the "go-to" in nonstructured programming languages, that allow program code to be transferred into and out of modules.
cti/ltiColour Transient Improvement/Luminance Transient Improvement – for the reproduction of clear contour edges which are lost during transmission of the television picture.
front curtain syncThe default kind of electronic flash synchronization technique
main frameComputer that is the heart of a network of computers or terminals which allows hundreds of people to work at the same time on the same data
quarantineTo isolate files suspected to contain a virus, so that the files cannot be opened or executed
annoyance factorsItems that don't necessarily do harm, but are a nuisance, such as joke programs or a site that isn't what it seems.
consoleScreen or station at which an administrator operates a computer system
conversionThe process of adding depth to a shot previously filmed or created in without depth.
quick sortQuick sort pick an item at random, put all the smaller items in a group on its left and the larger items in a group on its right
tableA set of rows and columns
pixelsThe individual points (or picture elements) that combined, form an image on a display.
nsfNational Science Foundation.
serverA powerful computer with a fast connection, which is set up purely to provide information
/var file systemA file system or directory (on standalone systems) that contains system files that are likely to change or grow over the life of the system
os serverA system that provides services to systems on a network
confidence levelThe likelihood that the sampling error in a survey result will fall within a specified range, usually expressed in terms of standard errors (e.g
hyper-local communitya group of people from a specific location who interact in online communities using social media tools
receiverA/V receiver
appletA small application, usually a utility or other simple program, that can be executed on a graphical desktop panel.
unique identifiersNon-financial identifiers issued for purposes of consistently identifying the individual
cnSee Common Name
moduleA collection of routines that perform a system-level function
remoteA computer that connects with a host computer and takes control of it in a remote control session.
eventA significant occurrence in a system or application that a program detects
pageA unit of space allocation within IBM Tivoli Storage Manager database volumes.
thumbnailAn image that has been scaled down to a size suitable for previewing only.
dashboardApple introduced single panel on the home screen of a tablet that provides simple visual status information pulled from a variety of sources
volume managerA program that provides a mechanism to administer and obtain access to the data on DVD-ROMs, CD-ROMs, and diskettes.
liloThe LInux LOader
dslDigital Subscriber Line: A type of high speed internet using standard phone lines and the local telephone network
shakeThe act of moving your device back and forth
triggerThis is the condition which causes the
firewall rulesA security system that uses rules to block or allow connections and data transmission between your computer and the Internet.
esm agentA software component that performs security assessment on a host system and returns the results to the ESM Manager
ghz(Gigahertz) A unit of frequency equal to 1,000,000,000 cycles per second
keyUnique identifier used to encrypt or decrypt secure data
transmission control protocolA networking standard, typically used with the Internet Protocol (IP) standard
keyboardComputer system peripheral that users operate by tapping buttons to display characters on a monitor or other output.
removable batteryUseful if you want to bring a secondary charged battery with you when out and about to swap in when your tablet PC battery runs out of charge
killTo terminate a process.
hot spotIn wireless networking, a hot spot is a specific part of an access point's range in which the general public can walk up and use the network
multimediaThe combination of audio, video, animation, text, and graphics.
binary space partitionSee "BSP tree."
primary storageMain memory, which holds what is currently being processed.
ebcdicA code system for turning letters, numbers and symbols into digital data
multimediathe use of multiple media in a single computer application or on a single Website
parityThe quality of an integer being odd or even
windows hostingWindows hosting is when an ISP or hosting facility runs your site on a Microsoft Windows server
callbackA security feature that lets a host disconnect a remote caller after a successful connection and then recall the remote computer, either for security verification or financial responsibility.
keyThe code for encrypting or decrypting data
advance renewalGenerally, a renewal generated by a promotional effort that goes out well in advance of the rest of the renewal promotional series
dispatcherThe operating system component which transitions a process to the running state.
limitation collectionThe established principle that collection of personal data should be limited to information that is necessary to complete a transaction
profile serverA server that contains all the essential custom JumpStart files in a JumpStart directory.
hubLike the hub of a wheel, a central device that connects several computers together or several networks together
request typeAn attribute of a request that allows for specialization of view invocation based on arbitrary categorization
actionA predefined response to an event or alert by a system or application.
kernelThe critical piece of an operating system; performs the basic functions that more advanced functions depend on
certificate authority(CA) A trusted third-party organization or company that issues digital certificates that are used to create digital signatures and public-private key pairs
diopter adjustmentA viewfinder feature that corrects for common eyeglass prescriptions so eyeglass wearers can use the viewfinder without wearing their glasses.
type a hdmi connectorSee Standard HDMI Connector.
nasNetwork-attached storage.
joe jobJoe job is a spammed smear campaign
mainlineA large magazine rack or reading center displayed within interior aisles of supermarkets and other retail outlets
sortSort puts keys (numbers, names or other values) in order from smallest to largest (outside computer science this is usually called ordering).
buffer overflowA vulnerability in programs which do not adequately manage memory allocation
gidGroup Identifier
e-commerceElectronic Commerce, allowing customers to purchase items and conduct financial transactions over the Internet safely and securely.
keystroke loggerA program or hardware component that surreptitiously monitors and stores all the strokes typed into a keyboard
statisticsA sample of malware has statistics whenever its infection percentage is among the 50 most active threats.
address barAn address bar is a text field near the top of a Web browser window that displays the URL of the current webpage
technical descriptionThis section describes the specific details of the infection, such as registry entry modifications and files that are manipulated by the virus.
sramStatic Random Access Memory
unsecure pageIf transfer of information over the Internet is not secure, it means that encryption software is not being used to protect the information and prevent it being read or tampered with.
memoryMemory is where data is stored
time stamp of attachmentThis field indicates the date and time of the file attachment.
command-line interfaceA utility providing an alternate way to execute the ESM commands in UNIX and Windows NT environments
maximum utilizationThe highest percentage of assigned capacity used by the database or the recovery log.
quotaValue limits set to manage access to system and network resources or the amount of storage used by a particular user or group.
organizational unitA group of associated systems whose hierarchy generally reflects the network topology
htmlHypertext Markup Language
hlsAnother name frequently used for the same thing as IHS
continuityA type of offer in which the consumer agrees to review new editions of or variations on a product and purchase a contracted number of these over a specified time period
ipchainsThe name of the program and associated technology used to create rules controlling network access to and from a particular machine or network
scamAny illegal plot or fraud in which a person or group of persons are tricked into giving money, under false promises of economic gain (trips, vacations, lottery prizes, etc.).
logA record of actions and events that take place on a computer
protocolProtocol refers to a set of rules that are followed by two devices while interacting with each other.
backup regimeA group of settings that determines which computer to include in a backup task, as well as other details such as scheduling.
replicaAmong other things, the action by which a virus propagates or makes copies of itself, with the aim of furthering the spread of the virus.
hot swapTo pull out a component from a system and plug in a new one while the main power is still on
polygon primitiveA graphic primitive that is an area enclosed by a loop of straight edges
tuner keyThis key is used to toggle from one tuning system to another, digital channels and analog channels.
init scriptShorthand for initialization script, scripts that are typically run at system boot time
policy domainA grouping of policy users with one or more policy sets, which manage data or storage resources for the users
full hdtvDenotes resolution of 1080p, ...1080 lines progressively scanned from top to bottom of the screen
asset measureA quantitative measurement of an asset
archive copy groupA policy object containing attributes that control the generation, destination, and expiration of archived files
platterA round magnetic plate that makes up part of a hard drive
hesiodName service for network authentication and access
brownoutPeriod of lower voltage
telephoto lensA lens that magnifies an image.
parsingReading some input (typically a computer program) and making sense of it by breaking it into parts according to their function.
single-sided diskOnly one surface of the storage disk is used.
dot widthThe width of a point, or dot, primitive
photonA particle of light.
clip artPre-drawn pictures to add to documents
riskA threat that exploits a vulnerability that may cause harm to one or more assets.
releases confidential informationThis payload may attempt to gain access to important data stored on the computer, such as credit card numbers.
javaA computer programming language invented by Sun Microsystems that enables web pages to include animations, calculators, scrolling text, sound effects, and games.
scsiSmall Computer System Interface
wan boot minirootA miniroot that has been modified to perform a WAN boot installation
bluetoothA physical wireless communications standard for exchanging data over short distances from fixed and mobile devices
disabledA status indicating that a program, job, policy, or scan is not available
predictive risk assessmentA process that consists of risk assessment, business objectives, business objective risk, business task, business task risk, and Business Impact Assessment (BIA).
rj-11Registered Jack 11
threatA circumstance, event, or person with the potential to cause harm to a system in the form of destruction, disclosure, data modification, and/or Denial of Service (DoS).
security policyA written document that describes how your organization can best protect itself from various threats, including a list of steps to be taken should certain security-related events take place
cacheA form of computer memory that allows you to access stored information, such as web addresses you’ve recently typed into your browser, more quickly
cenicCorporation for Education Network Initiatives in California
bbsA system or service on the Internet that allows subscribed users to read and respond to messages written by other users (e.g
automountTo automatically access a storage medium such as CD-ROMs and make its contents available to a computer system.
light sourceA scene object that illuminates other objects.
processA running program.
process stateThe status of a process as running, ready, blocked, etc.
database marketingUsing relational computer systems that allow for maintaining multi-product purchasing history and all other data on a customer
aggregateA collection of information in which no individual information can be distinguished or identified
assetA physical item, informational item, or capability required by an organization to maintain productivity
argumentA parameter that controls the operation of a program or command.
operator precedenceA property of an operator that is used to specify its order of evaluation relative to other operators that are included within the same set of parentheses in an expression
connectionThe successful establishment of a communications link.
printPutting the document on paper with a printer
hotspotAn area in which wireless service is available.
open access labA campus computer room available to students during all normal operating hours
accessRefers to the user's ability to view the data collected about him or her, and to challenge its accuracy and completeness
templateA template is something that already has a pre-defined structure
logic programming languagesA category of languages like Prolog very similar to symbolic logic, especially applicable to artificial intelligence research and expert systems.
risk assessmentThe computation of risk
menuPart of a user interface which lists the available commands
memberA data or function component of an object.
firewallAn access system that keeps unauthorized users from accessing resources on a local private network.
berBit Error Rate
system privilege classA privilege class that allows an administrator to issue all server commands
cat-5eA long-run Ethernet cabling system most commonly used in homes to carry audio and video signals for computer networks and a whole-home theater network.
rptvRear-projection TV.
upconversionA scaling of the resolution of a video signal to a higher resolution
monitoring softwarePrograms that allow a parent or caregiver to monitor the websites a child visits or email messages he or she reads, without blocking access.
arrayA collection of objects, referred to as elements, all of which are of the same class and are associated with the same identifier
haltTo stop all running processes on a system cleanly
rangefinder cameraA type of camera that includes a focusing mechanism which allows the photographer to measure the subject distance and take photographs in sharp focus.
adwareAdware is a software package that facilitates the delivery of advertising content to the user.
third-party ad serverIndependent outsourced companies that specialize in managing,maintaining, serving, tracking, and analyzing the results of online ad campaigns
stereographyThe art and practice of three-dimensional image making.
letterboxingAn approach used to display widescreen (16:9) content (such as movies) on a standard (4:3) television
irInfrared
fatFile Allocation Table
executableA file which runs a program
server migrationThe process of moving data from one storage pool to the next storage pool defined in the hierarchy, based on the migration thresholds defined for the storage pools
target nodeA client node for which other client nodes (called agent nodes) have been granted proxy authority
alternate sourceIn strict terms, an alternate source is any subscription source other than direct mail
on-access scannerA virus scanner that runs as a real-time, background process while the user performs other tasks, in order to provide constant protection against malware.
vector unitizeSee "unitize."
xbaseA collection of practical and how-to information articles maintained by the IT Express Campus Computing Services Help Desk.
shopping cartAllows you to create and implement an online storefront
lpLong playing
nonvolatileHaving the ability to retain information in the absence of power.
http exceptionThe set of exception classes defined in
intendedA program that contains bugs, or other problems, which prevent it from functioning as the author intended
bus widthAmount of data that the bus can carry at one time
spline patchA curved surface which takes its shape from the placement of a set of control points.
software packageA program and its associated files, archived and compressed into a single file along with any necessary scripts or information to aid in managing the installation, upgrade, and removal of those files.
telnetA protocol for establishing a login session via TCP/IP on a remote system.
function keyOne of the 10 or more keyboard keys that are labeled F1, F2, F3, and so on that are mapped to particular tasks.
probe keywordA syntactical element that extracts attribute information about a system when using the custom JumpStart method to install
premigrationFor a space manager client, the process of copying files that are eligible for migration to server storage, while leaving the original file intact on the local system.
trackballThis is a popular alternative to a mouse
submirrorSee RAID-0 volume.
view mapperA view mapper is a class which implements the
macroSmall program to automate actions within a major application
tessellationThe act of tiling a surface with individual surface patches.
rules.ok fileA generated version of the rules file
justificationThe positioning of text along the document margins in a word processing application.
pcsPersonal communications services
commandAn instruction to execute a process given to a computer via a keyboard, mouse, or voice request
bridgeConnects networks of the same type
x serverA program that implements X for some platform and type of video hardware.
magnetic ink character recognitionMachine reads characters printed with a special ink with magnetic properties
recoveryThe restoration of file data after its loss.
asset valueThe perceived or intrinsic worth of an asset.
passive polarized3D glasses made with polarizing filters
internal objectAn object that is defined inside of a function.
marginSpace at the borders of the page or other document object
bsp treeA hierarchical method of subdividing a volume
dynamic ipThe procedure of allocating temporary IP addresses as they are needed
mhpMultimedia Home Platform
point sizeMeasures the height of letters where one point is 1/72 inch
lift note/lift letterRefers to a folded promotional device (note or letter) found in a direct mail package that often helps lift response by providing more information or sell copy about the magazine
cutRemove selection from document and store temporarily on the Clipboard, which is a section of computer memory.
diskettePortable storage medium using a magnetic disk of 3 1/2" or 5 1/4" in size and usually storing between 740KB to 1.44MB of data.
dolby pro logicAn older surround-sound format developed by Dolby Laboratories that includes four channels and five speakers of matrixed (intermixed) multichannel surround sound
macro keysKey codes assigned to sets of specific instructions
chain printerUses characters on a chain that is moved into place before striking the characters onto the paper.
technical nameThe real name of a virus, which also defines its class or family.
services appletAn applet in Windows XP/2000/NT, which configures and monitors system services.
imageAn archive file usually with the extension .iso, .img, or .raw, that is used to create a CD-ROM, DVD, or diskette.
copyDuplicate selection onto Clipboard
hdmi"High-Definition Multimedia Interface." HDMI is a digital interface for transmitting audio and video data in a single cable
just-in-time compilationA cross between a compiler and an interpreter
autofocusA camera setting that allows the camera to choose the correct focus distance for you, usually based on the contrast of an image or set by a mechanism, such as an infrared sensor, that measures the actual distance to the subject.
versionA revision of software or hardware as specified by a name or value assigned by the vendor, such as Red Hat Enterprise Linux 4.
capabilityThe measure of a threat's technical expertise or knowledge of a system's connectivity.
operating systemSystem software that contains the instructions for coordinating all of the activities of hardware devices and other software programs
wi-fiWireless fidelity
prependingThis is a technique used by viruses for infecting files by adding their code to the beginning of the file
pull-down menuA menu of command options that is hidden from view until revealed by a combination of keystrokes or depression of a mouse.
fanA cooling device that circulates air in a computer; fans are necessary to keep the computer from overheating.
homogeneousConstant throughout.
chordingThe simultaneous pressing of two or more buttons or keys on an input device such as a keyboard or mouse that produces one set action.
makegoodA publication that misses rate base (see definition) over a period of time or prints a poor reproduction of an ad will generally offer to republish the ad at no extra cost to the advertiser, or reduce or cancel the fee for the affected advertising.
riskwareA program that is not malicious in nature, but may pose or introduce a security risk if improperly used
time zoneAny of the 24 longitudinal divisions of the earth's surface for which a standard time is kept.
data transferThe movement of information from one location to another
virtual deviceA logical device in a ZFS pool, which can be a physical device, a file, or a collection of devices.
budgetA magazine's projected circulation numbers and revenues for the year
validateTo check a policy set for conditions that can cause problems if that policy set becomes the active policy set
available spaceThe amount of space, in megabytes, that is available to the database or the recovery log
pciPeripheral Component Interconnect
802.11Standard protocol for radio-frequency wireless data transmission and networking
backgroundAny process that is running without accepting or controlling the input of a terminal is said to be running in the background.
mount limitA device class attribute that specifies the maximum number of volumes that can be simultaneously accessed from the same device class
networkA group of interconnected computers and their connecting cables and hardware.
metadeviceSee volume.
end user  The person who uses a program after it's been compiled and distributed.
monochromeOne color text on one color background, like white letters on blue or green characters on black
displacement vectorOne of the vectors that defines a new coordinate system in terms of an old
headersHeaders are used to identify the sender and recipient of a message
pinchIn a touchscreen device like the iPad or iPhone, pinching is when you place two fingers on the screen and move them either closer or farther from each other.
hashA number that is produced by taking some input and generating a number that is significantly shorter than the input
digital direct marketingDirect digital marketing, also known as "DDM," is a type of marketing that is done exclusively through digital means
thresholdThe number of events that satisfy certain criteria
light attenuationThe property of light to get dimmer with distance from the light source
daemonA program that runs continuously in the background until activated by a particular event
mass storageSets of cartridges containing data
faqFrequently Asked Questions
vectorA value that has a direction and a magnitude (length)
spatial localityA condition in which references to addresses in a given period are close tegether
middlewareAn application connecting two otherwise separate applications.
spot light sourceA light source that does not shine in all directions, usually in a cone
logical deviceA group of physical slices on one or more disks that appear to the system as a single device
site mapHierarchical diagram, or outline, of all the pages on a Web site
informationData that has been processed into useful form
web forumA Web forum is a website or section of a website that allows visitors to communicate with each other by posting messages
authorization policyAn authorization policy in
numarrayAn archaic predecessor to NumPy.
online profilingCompiling information about consumers’ preferences and interests by tracking their online movements and actions in order to create targeted ads.
communications protocolA set of rules designed to enable computers to exchange data
ethernetA standard for sending data packets across networks, focused on the electronic signaling issues.
non-volatileDescribes memory which retains data even when the power goes off.
terminalA human-computer interface consisting of at least a screen (or virtual screen) and some method of input (almost always at least a keyboard).
.drRefers to a file that is considered a dropper
bandwidthA measure of the “speed” of an Internet connection.
parametric animationAn animation control method where scene state is determined by mathematical functions or computer procedures that take animation time as an input parameter.
analyst privilege classA privilege class that allows an administrator to reset statistics
x.509An internationally recognized standard for certificates that defines their required parts
dotted python nameA reference to a Python object by name using a string, in the form
macroA set of keystrokes and instructions that are recorded, saved, and assigned to a short key code
interrupt requestsAlso called hardware interrupts
filterA filter manages access to online content
function overloading- see polymorphism
ip numberA number that identifies a host, corresponding to a network interface associated with the host.
analog signalVariations (modulations) in a signal used to convey information
autoinstall packageAn executable created by AI Snapshot and AI Builder that contains one or more applications distributed to client computers using the Symantec Ghost Console.
personal urlMany websites that host online communities allow you to create you own personal URL within the website
low-level formatThe first formatting step for a hard disk drive (HDD)
hostA computer attached to a network.
suspicious applicationA suspicious application is one with behavior that represents a potential risk to a computer
snapshotA read-only image of a ZFS file system or volume at a given point in time.
displacementA distance in a particular direction
ftpThe File Transfer Protocol
fortranFrom Formula Translation
virus definitions fileA file that provides information to antivirus software to find and repair risks
software seriesA collection of related software packages in Slackware
common information modelA common data model of an implementation-neutral schema for describing overall management information in a network/enterprise environment
spectrumA continuous band of frequencies...
directory treeHierarchy of directories
first appeared on…The date when a particular virus was first discovered.
threat safeguardA process, procedure, technique, or feature that deters one or more threats to the network, by reducing the risk linked to a system's threat measure.
scanThe term used by
direct connectionA form of data communication in which one computer is directly connected to another, usually via a null modem cable.
symbolic linkA filesystem entity that lets you associate an alternative name with a file or directory.
fraudAn act that occurs when someone uses your account to make unauthorized purchases
external threatA threat that originates outside of an organization.
desktop computer1
blankTo clear or not show an image on the computer screen
voice firstA functionality that allows the host and remote users have a voice conversation before beginning a data session
view-masterProprietary name of a commercial stereo transparency image display and viewing system utilizing stereo pairs (7 in total) mounted in a circular rotating holder, and viewed with a purpose-made stereo viewer.
cdCompact Disc
ereader(Electronic Publication) An open standard for electronic books and Web publishing from the International Digital Publishing Forum
wrapper programA program whose sole purpose is to run other programs, but change their behavior in some way by altering their environments or filtering their input.
isoInternational Organization for Standardization
jump driveAlso known as flash drives.
filter kernelThe function that defines the relative weight of a point depending on its position
client/server programA program in which one portion of the program is installed on a computer that acts as a server for that particular program; and, another portion is installed on one or more client computers.
distributionThis component measures how quickly a threat is able to spread.
showviewThe name used in some other countries for
cpu utilizationMeasures the time the CPU is working and when it is idle.
xulAn
uninterruptable power supplyA piece of equipment that allows your critical computing hardware to continue operating, or to shut down gracefully, in the event of a brief loss of power
booleanExpression-based system that uses the operators AND, OR, and NOT; operations are based on variables which can be 1 (true) or 0 (false).
audit bureauAn independent organization that audits the claimed circulations of its publisher members for purposes of verifying those claims for advertisers
dependenciesThe proper functionality of one package may rely on the existence of another package, meaning there is a dependency
attributeA property of an object, such as a file or display device.
bigbuzznessThe Social Media Management company dedicated to helping small and new businesses make the most of limited marketing budgets.
administrator rightsThese rights allow certain people to carry out actions or operations on networked computers.
introspectableAn object which implements the attributes and methods described in
multimedia ebookA multimedia ebook is media and book content that utilizes a combination of different book content formats
volumeA group of physical slices or other volumes that appear to the system as a single logical device
scalarA regular, single number, as opposed to a vector.
httpHypertext Transfer Protocol
programmerWrites the actual code for a computer program
drawAlso termed an allotment
hangA situation where a computer system has ceased interactivity due to resource limitation or software/hardware failure
security architectureA plan and set of principles that describe the security services that a system is required to provide to meet the needs of its users, the system elements required to implement the services, and the performance levels required in the elements to deal with the threat environment.
hspHosting Service Provider
standaloneA computer that does not require support from any other machine.
warningA message that informs the user that performing an action can or will result in data loss on the user's system.
justificationAlignment of text: left, center, right, justify (or full) = both left and right edges are straight.
blockBlocks exist on pages
hard to uninstallThese programs are difficult to uninstall
pending signalA signal which has not yet been delivered.
shellShells provide a commandline interface to the user
circular bufferA fixed capacity buffer which wraps around from one end to the other, simulating a circle.
tspTechnology Support Program
scan-based tradingRefers to the practice of basing retail sales figures for magazines solely on the number of sales recorded through checkout scanning, as opposed to the traditional system of returning unsold magazine covers
page viewsThe number of times a user requests a page; indicative of the number of times an ad was potentially seen, or "gross impressions." Note: this is not measurable today; the best approximation today is provided by page displays.
priority schedulingA scheduling policy which schedules tasks in descending order of priority.
renderingThe process of deriving an 2D image from the 3D scene description
failsafe boot archivex86 only: A boot archive that is used for recovery when the primary boot archive is damaged
serial printer cableSends data only 1 bit at a time
.damIndicates a detection for files that have been corrupted by a threat or that may contain inactive remnants of a threat, causing the files to fail to properly execute or produce reliable results.
hoaxAn application that does not perform as claimed.
nfsThe Network Filesystem
ext2/ext3ext2 file systems support large drive and disk partitions, along with added speed and reliability enhancements over previous UNIX file systems
formal parameterA parameter that is specified as part of a function definition.
active policy setThe activated policy set that contains the policy rules currently in use by all client nodes assigned to the policy domain
focusTo adjust the lens to produce a sharp image.
data transmissionThe electronic transfer of information from a sending device to a receiving device.
rubyRuby is an object-oriented programming language.
featherTo fade the borders of an image element so that it blends more smoothly with another layer.
sleeping stateA blocked thread state which can be transitioned to ready when notified of a timeout event.
hdcpHigh-Bandwidth Digital Content Protection
launchTo start a program or application
content filteringA subcategory of a security policy that pertains to the semantic meaning of words in text (such as email messages)
binary number systemThe base 2 number system, i.e
brute force attackA type of attack that is carried out by trying every possible key.
qwertyStandard English-language keyboard arrangement; name represents the first six alphabetical keys on the top left corner of the keyboard.
terminal windowApplication screen for typing system commands
wirelessThe condition of functioning without a wire or cable attached
bitThis is the smallest unit of digital information with which computers operate.
unstructured external threatAn individual outside your organization who may be a threat
cable modemA modem designed to operate over cable TV lines
credit card fraudThe trade in illegal and stolen credit card details is thriving like never before
insertAdd text at location without overwriting existing text
layoutArrangement of text and graphics
quantumThe maximum amount of time that a task is allowed to run before being preempted.
gaze directionThe direction the virtual camera is pointed in the scene description
2d display controllerA type of display controller that is intended for 2D operations, like windows, popup menus, text, etc
opacityThe degree to which a layer allows layers beneath it to show through.
social networking sitesWebsites that host multiple communities of individuals with similar interests that have set up personal profiles on that site
fetch strategyThe method used to determine which block is to be obtained next.
point-of-sale terminalA special-purpose terminal
composite videoComposite video uses a single cable (often with yellow plugs) to carry a video signal, and is sometimes used to link set top boxes and televisions
hashingThe process of changing a string of characters into a value or key that represents the original string.
structured threatAn individual who may be a threat to your organization
runlevelThe overall system state as defined by init
alertAn automatic notification that an event or error has occurred.
skinRefers to the appearance of a program's interface
logon proceduresThe process of identifying oneself to a computer after connecting to it over a communications line
known dependenciesThese programs have been known to install the security risk as a component, and will therefore not function as intended if the security risk is removed from the computer.
complexityComplexity how long it takes to solve a problem
"do-good" networksonline philanthropic communities.
decibel/dbA mathematical (specifically, logarithmic) ratio that indicates the relative strength of a device's electric or acoustic signal to that of another
imap"Internet Message Access Protocol" It is a method of accessing e-mail messages on a server without having to download them to your local hard drive
policy libraryA repository of all of the policies (preconfigured and user-defined) in ITA.
message identifierA string used as a translation lookup key during localization
upsampleAdd pixels to a digital image.
wanA network of interconnected computers over a large geographical area, connected via telephone, radio or satellite.
backlightingA lighting effect produced when the main light source is located behind the subject
jumpstart directoryWhen you use a profile diskette for custom JumpStart installations, the JumpStart directory is the root directory on the diskette that contains all the essential custom JumpStart files
low migration thresholdA percentage of the storage pool capacity that specifies when the server can stop the migration of files to the next storage pool
e-mail aliasAn alternative name for a more complex email address
traversalThe act of descending “up” a tree of resource objects from a root resource in order to find a context resource
syntax errorAn error made by an author when creating a script, such as not enclosing a string in quotes or specifying the wrong number of parameters
recordTo capture and store a set of data that consists of a series of actions and events.
responseAn object that has three attributes:
svgaThe projected image is made up of 800 x 600 pixels
botA contraction of the word ‘robot’
netprowler agentA component that monitors the traffic on a network segment to detect, identify, and respond to intrusion attacks.
baseline riskThe risk that exists before safeguards are considered.
packerA program that compresses, or reduces, the size of a program’s code, often by re-coding it to a smaller size
zfsA file system using storage pools to manage physical storage.
signatureA sufficiently unique section of code that can be used as a program’s identifying marker
featured phonesA cellphone that contains a fixed set of functions beyond voice calling; however, it is not in the smartphone category
foregroundA program that is accepting or controlling a terminal's input is said to be running in the foreground.
plasma screenScreen type used for very large screen involving a gas plasma for creating characters.
multimediaMultimedia is a broad term that refers to the delivery of text, images, sound and interactivity in an integrated manner from a computer.
dvdDigital Versatile Disc
componentA single element within a larger system; it can be hardware- or software-based and performs essential functions needed by the system.
mac addressMedia Access Control address
digital nicam soundTypes of audio reception, e.g
microsoft management consoleAn extensible, common console framework for management applications
activity logA type of report in which all the recorded events are sequentially organized.
sacdSuper Audio CD
policyThe method of action selected from alternatives, given specific conditions to guide and determine present and future decisions.
rollbackTo remove changes that were made to database files since the last commit point.
algorithmAlgorithm a process for achieving an outcome, normally for a general problem such as searching, sorting, finding an optimal path through a map and so on.
rapid release virus definitionsRapid release definitions are most valuable during a high-level outbreak when users are unable to wait for definitions to undergo full quality assurance testing
deleteRemove selected object (not saved anywhere)
archiveTo copy one or more files to a storage pool for long-term storage
base classsee inheritance
mount pointAn empty directory in a filesystem where another filesystem is to be “mounted”, or grafted on.
processA program or service running on a UNIX or UNIX-compatible computer system
loopA
networked systemsA group of systems (called hosts) that are connected through hardware and software so that they can communicate and share information
baudUsed to indicate the speed of a modem
material propertiesSee "surface properties."
shell promptAn application that offers interactive console or terminal access to a computer system.
adwareA program that displays advertising material to computer users, potentially in a manner or context that is unexpected or unwanted.
compound statementA sequence of one or more statements that are syntactically equivalent to a single statement.
enabledA status indicating that a program, job, policy, or scan is available
skimmingStealing credit card information during an otherwise legitimate transaction
densityHow close bits may be placed on magnetic tape
amblyopiaA visual defect that affects approximately 2 or 3 out of every 100 children in the United States
default permissionA permission which is registered as the default for an entire application
classA group of objects having same operations and attributes is defined as a class.
activeA status that indicates that a program, job, policy, or scan is running
mirrorSee RAID-1 volume.
logical occupancyThe space used by logical files in a storage pool
dmzDemilitarized Zone
drmDepending upon whom you ask,
clientA program that makes requests of, or transmits data to, a parent server program.
telnetProtocol for interactive terminal access to remote machines
magnetic tapeA storage medium using a long tape with magnetic properties.
hciHCI human computer interaction; an area of computer science looking at how people interact with a digital device, with an emphasis on the quality of the experience to complete tasks.
multimedia message serviceA standard used by telecommunications networks for transmitting multimedia content between mobile devices
exposure value evEV settings are a way of adding or decreasing exposure without the need to reference f-stops or shutter speeds
temporal localityA condition in which reference to a single address are close together in time.
snootA tube-like device that focuses the flash’s light to a very small area.
resourceAn object representing a node in the resource tree of an application
24p24p refers to the most common format for cinema films where film material is shown at 24 frames per second
retrieveTo copy archived information from the storage pool to the client node for use
shared dynamicA value for serialization that specifies that a file must not be backed up or archived if it is being modified during the operation
parameterA value that is assigned to a variable
icmpInternet Control Message Protocol
bufferThis is an
remote accessA program that allows one computer to gain access to another computer without authorisation or a visible presence.
aliasingThe phenomenon that makes smooth lines and edges appear stair stepped or jagged
memory managementProgram to handle where in RAM programs put their data
compile-timeThe period during which a program is being compiled, as distinct from run-time when a program is actually running
rootThe object at which traversal begins when
sha1(Secure Hashing Algorithm) The algorithm that operates on any input length less than 264 to produce a message digest.
file transferThe process of using communications to send a file from one computer to another
dosThe acronym formed from the words Disk Operating System refers to an early operating system (OS) created by Microsoft for IBM and IBM-compatible computers; the OS was also used for Windows 3.1, 95, 98, and ME.
encryptionA method of encoding information so that it cannot be read by unwanted parties.
fieldA single attribute of the entity which the record describes.
primary boot archiveA boot archive that is used to boot the Solaris OS on a system
spikeSee power spike
removalMeasures the skill level required to remove the threat from a given computer
power managementSoftware that automatically saves the state of a system and turns it off after it is idle for 30 minutes
borderLine around a page, table, or image
floodingPrograms that repeatedly send a large message or text to a computer through messaging systems like MSN Messenger in order to saturate, collapse or flood the system.
b splineA particular type of spline, the mathematical details of which are beyond the scope of this book.
convergenceThe ability of both eyes to turn inwards together, enabling both eyes to be looking at the exact same point in space
structured programmingA style programming in which a hierarchy of structures is used, each having a single entry and a single exit point.
master boot recordMaster Boot Record
surround soundA feature in a home theater system that enables you to take full advantage of all the audio signals in your source content (such as television programs and DVD or Blu-ray movies).
processIt’s a series of commands that changes data values.
arpanetAdvanced Research Projects Agency Network
structured external threatAn individual outside of your organization who may be a threat
mount wait periodA device class attribute that specifies the maximum number of minutes that the server waits for a sequential access volume mount request to be satisfied before canceling the request.
terminatorA small device designed to dampen electrical signals reflected from the ends of a SCSI cable
high level languageA language that conceptually closer the problems to be solved than to the hardware on which it runs.
flamingFlaming is the act of posting or sending offensive messages over the Internet
session resource usageThe amount of wait time, CPU time, and space used or retrieved during a client session.
solaris live upgradeAn upgrade method that enables a duplicate boot environment to be upgraded while the active boot environment is still running, thus eliminating downtime of the production environment.
groupYou can create groups and invite other users into your groups to work collaboratively on projects
printerA printer prints data
migrateTo move data from one storage location to another
blogThe word blog is derived from the combination of the two words, web and log
message boards/forumsan online discussion site; people looking to discuss particular issues or needing support post a message on the forum or message board to get more information or start a conversation with other forum members
footerThe bottom part of a page that is repeated on every page of the document
x3dExtensible
campus data warehouseIt archives current and historical snapshots plus statistics of student, course, instructor and employment pay data
operatorThe person who is responsible for maintaining and running a Web site.
image file definitionA description of the properties of an image file, including the image file name, location, and status
aspect ratioThe ratio of screen width to screen height
technewsA free campus tech news and information service for faculty, staff and students, from Information and Educational Technology
targeted attackAttacks aimed specifically at a person, company or group and which are normally perpetrated silently and imperceptibly
data-hiding- see encapsulation
g codeAnother name for
telnetAllows a server to be controlled remotely by any computer connected to the internet running a Telnet program.
predicateA test which returns
shutterThe device in a camera that opens and shuts to allow light into the camera.
constraintA rule of an inverse kinematics or inverse dynamics animation system that must be adhered to in solving the motion of all the objects
cscShort numeric numbers (typically 4-6 digits) to which text messages can be sent from a mobile phone
gbRefer to gigabit.
normal vectorA vector pointing straight our from (at right angles to) a surface.
parityA method of checking for errors in digital data
hostThis refers to any computer that acts as a source of information.
information privacyThe interest an individual has in controlling, or at least significantly influencing, the handling of data about themselves.
dipole antennaA type of antenna commonly used with wireless networking devices
sdramSynchronous Dynamic Random Access Memory
bi-quadratic patchA particular type of surface patch
keystrokeEquivalent to one tap of a keyboard or keypad.
drive modeSetting that determines whether a camera takes a single picture or a series of pictures.
instant messagingA form of real-time communication between two or more people based on typed text
lens shiftDisplacement of the lens with the prism (horizontal or vertical) or vice versa, resulting in the center of the image being offset from the center of the lens
fallbackA reversion to the environment that ran previously
derived profileA profile that is dynamically created by a begin script during a custom JumpStart installation.
hecSee HDMI Ethernet Channel.
editionSub-versions within a given magazine issue's print run and distribution
formatDefine the structure of a disk, removing any information that was previously stored on it.
panoramaA broad view, usually scenic
rotational delayTime to rotate a storage disk under the read/write head of the drive to the correct sector
contrastThe range of difference in the light to dark areas of a photo.
frequencyA copy group attribute that specifies the minimum interval, in days, between incremental backups.
dvdDigital video disc
dot matrix printerForms characters using row(s) of pins, 9, 18, or 24 which impact the ribbon on top of the paper
storage pool volumeA volume that has been assigned to a storage pool
hd - high definitionTelevision formats that have a higher resolution than their contemporary counterparts
intrusion detectionA security service that monitors and analyzes system events to find and provide real-time or near real-time attempt warnings to access system resources in an unauthorized manner
clienta program that works by interacting with a server;
payloadThis is the malicious activity that the virus performs
registerA register is a piece of high-speed memory located directly on the processor
scientificpythonA collection of useful utilities for scientists
virtual realityA name loosely applied to systems that attempt to immerse the user in a virtual world generated by the computer
apiThis is a function used by
demographic and socioeconomic dataData about an individual's characteristics -- such as gender, age, and income.
bssBasic Service Set
defaultThe original settings; what will happen if you don't change anything
modular belt systemA belt that can hold a variety of photography equipment.
pay-upA calculation to express the number of prospects who responded to a promotion and then paid for the magazine or product
portPort is a connecting component mainly a hardware that enables two computers to allow data sharing physically
uudecodeSee UUcoding
taskTasks are created as part of a plan to provide more details on it
grub edit menux86 only: A boot menu that is a submenu of the GRUB main menu
signal handlerCode that is executed in response to a particular signal type.
vrmlA Virtual Reality Modeling Language file is used to represent
soft copyDisplayed on screen or by other non-permanent means
epaperA generic term for an extremely thin flexible display that can be rolled up
seek timeTime it takes to move the read/write head of a drive to the proper track on the storage disk
bayPlace in a computer case to put drives and other devices
drivers1
cmyk color systemCyan, Magenta, Yellow, and Black
device driverRefer to device module.
persistent cookiesCookies that are discarded when they reach their defined expiration time.
a-vAudio-Visual.
tip-onA single-sheet subscription renewal or new-business promotion glued or affixed to the front of a subscriber or sample copy
wuxga resolutionFacilitates pixel-perfect display of signal sources up to a resolution of 1,920 x 1,080
channelIn communications, a medium for transferring information, which is also called a line or circuit
caesar cipherA very simple cipher that offsets each letter in the alphabet by a certain amount, specified by the key
filteringThis is a broad word which can mean the removal of coffee grinds from the coffee
spxSequenced Packet Exchange
svgaSuper VGA, a video type allowing several large resolutions and 16 million colors.
single endedThe most common type of SCSI signal
motdMessage of the Day
dolby digital plusAn all-digital surround-sound format developed by Dolby Laboratories that is an improvement on the older Dolby Digital and Dolby Digital Surround EX systems
reportA set of data that is organized and formatted according to specific criteria.
defragmentationThe process of relocating broken or separated files from random, non-contiguous locations on a physical disk platter to contiguous locations, which improves the speed and reliability of the disk.
usability heuristicSee Heuristic.
requestAn object that represents an HTTP request, usually an instance of the
truststore fileA file that contains one or more digital certificates
power surgeMore electricity through the line than normal for several seconds
beacon intervalWhen a wirelessly networked device sends a beacon, it includes with it a beacon interval, which specifies the period of time before it will send the beacon again
bufferLocation for temporary data storage while processing is going on
master systemA system that you use to create a Solaris Flash archive
rewritableCD disk which can be erased and written on again.
package definitionA link from the console to an AI package, either on an attached drive or on a Web server.
mountTo make a filesystem available for use.
attachmentThis is a file of information that is sent with an email
monopoleA pole position of speakers in which all the drivers are on one face of the enclosure
widgetA standardized on-screen representation of a control that may be manipulated by the user
joystickA device which controls cursor motion with a vertical stick
residual riskThe risk that remains after the application of selected safeguards.
incidentThe actualization of a risk
propagationThe act of creating a copy of a malicious program's code, usually in order to infect a new target, or distribute a copy to a new computer system
utf-8Unicode transformation format - 8
translation domainA string representing the “context” in which a translation was made
natural language5th Generation Languages
event listenerIt is an interface of JAVA responsible for handling events.
semantic analysisThe function of semantic analysis is to check that the source program is meaningful
device driverSometimes just called a “Driver”
checksumThe result of adding a group of data items that are used for checking the group
joke programsPrograms that alter or interrupt the normal behavior of your computer, creating a general distraction or nuisance.
rigDual camera heads in a properly engineered mounting used to shoot stereo movies.
hook-and-loop tapeA kind of tape whose two sides adhere to each other, with one having rough hooks and the other soft, fuzzy material.
libraryA collection of functions which can be shared between programs.
number of countriesA measure of the number of countries where infections are known to have occurred.
read-onlyA piece of data or a storage device that can be accessed and read but cannot be modified.
blogrollan assembly of blog URLs—blogs that the blogger reads regularly—displayed at the sidebar of their blog
back upTo copy information to another location to ensure against loss of data
siswebStudent Information System on the Web
error correctionCorrecting an error that has been detected in some data
grammar checkerLooks for grammar/style errors
raid-0 volumeA class of volume that can be a stripe or a concatenation
portBasically it's a place where you plug in a device, be it parallel, serial, IDE, SCSI, etc.
webpageA page that contains text, images, and multimedia presentations and is viewable in a Web browser.
in the wildThis is an official list drawn up every month of the viruses reported causing incidents.
subscriptionIn a Tivoli environment, the process of identifying the subscribers that the profiles are distributed to
serviceThe suite of features offered by one computer or system to others that are connected to it.
pinterestPinterest is an online pinboard
algorithmA process or set of rules for calculating or problem-solving.
cyberspaceUsed to distinguish the physical world from the digital, or computer-based world.
computerAn electronic device that executes the instructions in a program
midtonesParts of an image with tones of an intermediate value, usually in the 25 to 75 percent range.
layerA way of managing elements of an image in stackable overlays that can be manipulated separately, moved to a different stacking order, or made partially or fully transparent.
eco-modeA menu function to extend Lamp life and reduce energy consumption by slightly reducing brightness
minirootA minimal, bootable root (/) file system that is included in Solaris installation media
tcpTCP stands for Transmission Control Protocol