Glossary extracted starting with automatic seeds, with PTM for the domain com and language EN
mta | This is an organized mail system that receives messages and distributes them to the recipients |
environment variable | A setting that only applies to the current working environment |
footprint | Amount of physical space something uses |
parity bit | An extra bit (either 0 or 1) that is added to a group of bits to make it either even or odd, depending on whether even parity or odd parity is used |
influencer | an individual knowledgeable in a specific subject, highly recognized in an online community, with the ability to sway others' opinions; key influencers are seen on an online community as references who can offer assistance on specific subjects |
power supply | Converts the electricity from the wall outlet into the flavor that the computer can digest |
cfm | Cubic feet per minute, the measure of air flow, representing how much air is displaced in 1 minute. |
threads | a group of related posts on a bboard or forum. |
fair share scheduling | A scheduling policy which assigns tasks to groups, and allocates a percentage of CPU time to each group. |
connection item | An item representing a pcAnywhere file, which contains connection device information and security settings to be used during a session. |
system | A set of related elements that work together to accomplish a task or provide a service |
landscape mode | The orientation of an image in which the longest dimension is horizontal; also called wide orientation. |
affiliate | Website affiliates are what drive Internet marketing |
session | In communications, the time during which two computers maintain a connection and are usually engaged in transferring information. |
epoch | A period of history; in Unix, “The Epoch” begins at 00:00:00 UTC January 1, 1970 |
bi-cubic patch | A particular type of surface patch |
animation | Any method that can make an image appear to change over time |
dual record | A function provided by many |
switched line | A standard dial-up telephone connection; the type of line that is established when a call is routed through a switching station |
digital | Using a limited, predetermined numbering system to measure or represent the flow of data |
adobe photoshop elements | A less expensive version of Photoshop with fewer of the ultra-high-end features the professional version includes. |
window | A graphical representation of a program displayed on the screen |
basis vector | A vector that defines one axis of a coordinate system |
workgroup | A collection of individual computer users that are logically connected, usually by a single project or by a department within an organization |
static priority | A priority which is not automatically adjusted by the system. |
dvd | 1 |
cpu cache | A memory bank between the main memory and the CPU, which lets the computer read data and execute instructions faster. |
internet protocol address | Identifies a workstation on a TCP/IP network and specifies routing information |
blogs | a contraction of "Web log", a Website where individual(s) provide entries of any type of content from video and podcasts to traditional text and photos to inform or entertain an audience and create online and offline discussions; presented in reverse chronological order. |
log | A file that contains status information collected from services and daemons |
notch filter | Separates the color and brightness parts of a video signal into their component parts and sends them to the appropriate internal circuitry |
web-based enterprise management | A set of management and Internet standard technologies developed to unify the management of enterprise computing environments |
iso-9660 | Standard governed by the ISO for the file structure of CD-ROM. |
optical disk | A storage medium which uses tiny lasers to create peaks and valleys in a plastic layer on a circular disk |
suspended process | A process which has been frozen until killed or resumed. |
physical occupancy | The amount of space used by physical files in a storage pool |
prosumer | A digital camera model that includes many features on professional cameras but also offers automatic settings. |
vga | Video Graphics Array |
run level | The operating mode of a UNIX system; for example, single-user, multi-user without networking, or multi-user with networking. |
spammer | Someone who sends unsolicited commercial email, often in bulk quantities. |
authentication policy | An authentication policy in |
circular reasoning | See "reasoning, circular." |
window | A rectangular area of the screen which displays a program's user interface, a document, or a system message |
active version | The most recent backup copy of a file stored by IBM Tivoli Storage Manager |
x | Refer to XFree86. |
occurrence measure | The likelihood that a threat will manifest itself within an organization. |
pci | The term "PCI" stands for Payment Card Industry. |
security patch | Set of additional files applied to a software program or application to resolve certain problems, vulnerabilities or flaws. |
dynamic | The state or quality of an object that is frequently changed or modified |
gb | Refer to gigabyte. |
communications session | The time during which two computers maintain a connection and are usually engaged in transferring information. |
privacy policy | A privacy policy outlines the terms by which a company or website handles personal information from its visitors to the site |
piracy | Illegally copying copyrighted software, music, or movies. |
static files | Files (such as system configuration files and binaries), that do not change without an action from the system administrator or an agent that the system administrator has allowed to accomplish the task. |
ihs | A color space where colors are defined by their intensity, hue, and saturation attributes |
compression | The process of saving storage space by eliminating empty fields or unnecessary data in a file |
initialize | To prepare for use |
ppm | Pages per minutes |
confirmation or order confirmation | A Web page and/or email that is delivered to a consumer toconfirm their purchase decision |
geographic distribution | This measures the range of separate geographic locations where infections have been reported |
hidden dialers | Programs that you may unknowingly download that can use your computer to silently dial expensive phone calls which later show up on your phone bill. |
acl | An access control list |
boot loader | x86 only: The boot loader is the first software program that runs after you turn on a system |
isa/ipo | Acronym for introductory slotting allowance/introductory pocket offer |
ad-hoc | A wireless networking architecture in which there is no central access point |
conductor | A material through which electrical current can flow. |
single-click | To tap a mouse button one time. |
vector | Vector is used to describe an image that is made upof curves and lines described by mathematical equations |
device class | A named set of characteristics applied to a group of storage devices |
msde | A server for storing data, which is compatible with SQL Server 2000. |
joe job | A Joe Job is the act of forging spam mail headers to make it look like it comes from someone whom the spammer will hurt |
hacktool | A utility designed to access remote computers |
concatenation | A RAID-0 volume |
mute | For fast silencing of the sound. |
controller | Short for A/V controller |
banker trojan | A malicious program, which using different techniques, steals confidential information to the customers of online payment banks and/or platforms. |
constant | A data object whose value cannot change during the execution of a program. |
sequence number | Only the Norton AntiVirus Corporate products use the sequence numbers, which are an alternate method of representing the date of the latest definitions or required definitions |
skin | This is a term that refers to the actual look of a program |
multimedia | Combination of sound and images with text and graphics |
anti-aliasing | A process that smoothes the rough edges or jaggies in images by creating partially transparent pixels along the boundaries that are merged into a smoother line by our eyes. |
ribbon cable | A wide flat connection cable |
cipher text | Text which has been encrypted. |
shared static | A value for serialization that specifies that a file must not be backed up or archived if it is being modified during the operation |
lookat point | A point in the scene that will project to the center of the image |
view name | The “URL name” of a view, e.g |
authorization | In single-copy sales, a retailer's approval for a particular title to be carried in some or all of its stores |
battery pack | A device that holds multiple batteries with which you can power your digital camera. |
gigabyte | GB - 1,024 megabytes or 1 billion characters of information. |
mach bands | An optical illusion caused by a sudden change in the rate of change of the brightness (discontinuities in the brightness' second derivative) |
http | HyperText Transfer Protocol |
rpm | Revolutions Per Minute |
shutter-priority autoexposure | A semi-automatic exposure mode in which the photographer sets the shutter speed and the camera selects the appropriate aperture. |
fanny pack | A small bag worn around the waist like a belt. |
memory | Also called main memory |
core | Memory device consisting of small metal rings |
inactive | A status indicating that a program, job, policy, or scan is not currently running |
virtual server | The part of a server that functions as if it were a separate, dedicated server |
fsid | See file space ID. |
netprowler manager | A component that coordinates the work of NetProwler agents, provides communication between the agents and the user interfaces, and stores security data gathered by the agents. |
quadratic complexity | Quadratic complexity grows with the square of the size of the problem - if the problem is twice as big, it will take roughly 4 times as long to solve. |
xbl | An |
exposure | When sensitive data is released to someone without authorization. |
session factory | A callable, which, when called with a single argument named |
security life cycle | A method of initiating and maintaining a security plan |
locale | A geographic or political region or community that shares the same language, customs, or cultural conventions (English for the U.S |
byte | The standard measurement of storage capacity |
tx | Transmitter |
event class | A predefined event category used for sorting reports and configuring alerts. |
trackware | Trackware is any software package that tracks system activity, gathers system information, or tracks customer habits and relays this information to third-party organizations |
wide-screen | Used to describe a 16:9 or greater aspect ratio |
demand fetch strategy | A strategy which fetches items only when requested. |
grid | Computing: The set of separate computers uses in distributed computing. |
shell | A command interpreter that allows a user to run executable code |
twitter search | a search engine that filters out real-time tweets. |
signature | The name of a function together with the sequence of its parameter types |
pyramid_jinja2 | Jinja2 templating system bindings for Pyramid, documented at http://docs.pylonsproject.org/projects/pyramid_jinja2/dev/ |
truste | An online seal program |
internal threat | A threat that originates within an organization. |
differential archive | A Solaris Flash archive that contains only the differences between two system images, an unchanged master image and an updated master image |
target of infection | Systems, files, or media (for example, hard drives), that a threat attempts to infect or otherwise disrupt. |
brute-force | Brute-force search is a trivial but very general problem-solving technique, that consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement. |
disc | An optical disc, as opposed to a magnetic disk, which recognizes the common spelling that is used in the compact disc (CD) market |
checkout display | In newsstand sales, the coveted display space at the checkouts of supermarkets, convenience stores and other mass outlets |
binary | A code system that uses 2 as its base and 0s and 1s for its notation |
blue screen | A background often used for photographs or video that are to be matted, or composited, over other images |
artifacting | Distortion that is introduced into audio or video by the compression algorithm (codec) |
soft real time scheduling | A scheduling policy which attempts to meet deadlines. |
wireless fidelity | Refer to 802.11. |
substitution cipher | A type of cipher that works simply by replacing each letter or combination of letters in a plain text with a certain other letter or combination of letters to make up the cipher text |
port | A type of data connection used by computer systems to transfer data directly between two or more computers or resources |
inverse kinematics | A method for specifying motion in an animation |
special characters | Non-alphanumeric characters such as !, @, ^, and *. |
gui | Graphical User Interface |
internet 2 | Internet 2 is a nationwide project to develop an advanced network of applications to support research and education at universities |
ps/2 port | A six-pin socket for connecting keyboards and mice to computer systems. |
gmsh | A free and Open Source 3D (and 2D!) finite element grid generator |
linear video ad | A linear video ad is experienced in-stream, which is presented before, between, or after the video content is consumed by the user |
translation string | An instance of |
ruby | a dynamic, reflective, general purpose object-oriented programming language that combines syntax inspired by Perl |
rogue | An antivirus or antispyware application that does not provide the functionality claimed, and may not work at all. |
driver | See Device driver |
at | Advanced Technology |
keylogger | A program or hardware component that surreptitiously monitors and stores all the strokes typed into a keyboard |
alertable event | Any event or member of an event set configured to trigger an alert. |
agent node | A client node that has been granted proxy authority to perform operations on behalf of another client node, which is the target node. |
bug | Error in a program that cause problems. |
spacing | Space between letters or lines of text |
epki manager | Enterprise Public Key Infrastructure Manager |
variant | A program that bears sufficient similarity to a previously identified program to be categorized as a member of the same “family” of programs. |
blu-ray | Blu-ray is an optical disc format such as CD and DVD |
bho | A plugin that is automatically runs long with the Internet browser, adding to its functionality |
monitor | The Type designation 'Monitor' was previously used by F-Secure to identify a program that can monitor and record all computer activities, including each keystroke typed on the keyboard |
ps/2 port | Small connection port used by some mice and keyboards |
subnet mask | A bit mask that is used to select bits from an Internet address for subnet addressing |
printer resolution | A measure of print quality |
age | A rating used to calculate the vulnerability based on the relative amount of time since the discovery of the vulnerability |
nameserver | A DNS information server |
destructor | A member function of an object that is executed whenever that object goes out of existence |
fastening point | A position, represented by a square, where an image-editing program anchors a magnetic selection outline. |
algorithm | A process that can be applied multiple times to a digital file. |
working directory | The directory in which a program considers itself to be while running. |
gpl | GNU General Public Licence |
slave | In hard drive technology, a non-bootable drive that is used mostly for system and file storage; is controlled by the master drive. |
multithreading | The incorporation of multiple threads of execution within a process. |
.enc | Refers to a file that is encrypted or encoded |
parental controls | Tools that allow parents to prevent their children from accessing certain Internet content that they might find inappropriate. |
octal | Base-8 number system, with digits 0-7. |
lan | LAN is an acronym for Local Area Network that spans small area |
grub | x86 only: GNU GRand Unified Bootloader (GRUB) is an open source boot loader with a simple menu interface |
hard offer | A promotion that does not treat the first issue or first several issues as a no-obligation trial |
scanner | A peripheral that uses light receptors for reading printed material and digitally transferring the information as objects into a computer system for processing. |
dateutil | The dateutil library provides extensions to the standard datetime module |
modifies files | This payload changes the contents of files on the computer and may corrupt files. |
mouse | An input device consisting of 2 or more buttons with a rolling ball underneath |
metering mode | Refers to the way a camera’s autoexposure mechanism reads the light in a scene. |
mount | To access a storage device or medium on a directory within a computer file system. |
risk measure | A quantitative measurement of risk |
gis | Geographic Information System |
matchdict | The dictionary attached to the request object as |
main memory | Where the computer stores the data and commands that are currently being used. |
server | A computer system that manages files, services, and access to resources on a network. |
polymorphism | The ability to use the same identifier to name two or more functions within the same scope of a program; gives the appearance that a single function exhibits different behavior depending on the nature (i.e., classes/types and number) of its parameters. |
short message service | A communication protocol for transmission of short text messages between one mobile devices connected to a telecommunications network |
rules file | A text file that contains a rule for each group of systems or single systems that you want to install automatically |
desktop enterprise solutions | A unit of IET that sells computing consultation and repair services to campus departments and students, usually at less cost than charged off campus |
page fault | An interrupt generated when a program references a page that is not currently resident. |
joke | A program with an annoying or funny functionality |
pop-up menu | List of options that is displayed when clicking on a certain item or area of a window in a program with the secondary mouse button (usually the right) |
message board | A message board is an online discussion site |
affiliate marketing | An agreement between two sites in which one site (the affiliate) agrees to feature content or an ad designed to drive traffic to another site |
package | A file that contains a set of related files that can be installed as a unit. |
degree of an operator | The number of values associated with the evaluation (i.e., the use) of that operator |
capacity | Amount of data that can be stored |
deadline scheduling | A scheduling policy which schedules tasks based on the timing needs of the tasks. |
busy wait | A situation in which a process, while not blocked, continuously checks for a condition which will allow it to proceed. |
dsmserv.opt | See server options file. |
foreground task | A task of high priority |
node | 1 |
topology | The physical or logical architecture of a private computer network. |
field force | In single-copy sales, a group of representatives maintained by a national distributor (see definition) or a large publisher |
library | A collection of routines that perform commonly required operations. |
floppy disk | Refer to diskette. |
lan | A network of interconnected computers in a reasonably small geographical area (generally in the same city or town or even building). |
profiling | The process of scanning a network for live systems to monitor and of associating attack signatures with those particular systems |
chat room | The name given to a place or page in a website or online service where people can type messages which are displayed almost instantly on the screens of others who are in the “chat room.” |
intruder alert agent | In Intruder Alert, the agent monitors the hosts and responds to events, by performing defined actions based on applied security policies. |
distribution | A Distribution is a version of an operating system that contains its own applications and characteristics. |
storage hierarchy | A logical ordering of primary storage pools, as defined by an administrator |
command interpreter | A program that accepts commands and executes (interprets) them. |
communications port | Also called a serial port |
current risk | The remaining risk after safeguards have been applied. |
wi-fi | Wireless Fidelity |
archive | To collect files into one large file for storage or backup purposes |
can-spam act | A federal law that established standards for sending out promotional e-mail. |
scratch volume | A labeled volume that is either blank or contains no valid data, that is not currently defined to IBM Tivoli Storage Manager, and that is available for use. |
symbos | SymbOS is the platform designator for the popular Symbian operating system (OS) used to run data-enabled phones (also known as smartphones) |
dual-boot | The concept of two operating systems installed on a single computer system. |
number of infections | Measures the number of computers known to be infected. |
concave | A property of a polygon that has at least one vertex bulge inward instead of outward |
alarm | A sound or visual signal triggered by an error condition. |
parameter | A variable piece of data indicating how a program should behave in any given situation. |
belady's anomaly | A counterintuitive effect in which increasing the number of page frames may increase the number of page faults. |
tweet | The post/entry made on Twitter (see social networking sites). |
case-sensitive | The discrimination between lowercase and uppercase characters. |
secure shell | An encrypted (thus secure) method of logging in remotely to a computer |
shell | A command interpreter. |
vector addition | The process of adding two vectors, which results in another vector. |
architecture | The design, organization, and integration of components within a computer system, primarily determined by the central processing unit that the system employs. |
data template | A template that defines files or registry entries to be included in a backup. |
file space id | A unique numeric identifier that the server assigns to a file space when it is stored in server storage. |
buffer | A reserved area of memory for temporarily holding data |
prototype | A function declaration |
media server | See install server. |
unstructured internal threat | An individual inside your organization who may be a threat |
nonnetworked systems | Systems that are not connected to a network or do not rely on other systems. |
pptp | Point-to-Point Tunneling Protocol |
sla | Service level agreement |
utf-8/unicode | Standard for unique and internationalized character encoding; allows for plain text files and other data to be represented in several languages and dialects. |
recovery mode | This is the mode that you use when your phone is in desperate need of a restore |
paid during service | A source in which the agency sells a subscription to a group of magazines to a consumer, who agrees to be billed monthly for the life of the subscription |
domain | The site's name that an organization uses; for example, Red Hat has a domain name of redhat.com. |
windows registry key | These are sections of the Windows Registry that store information regarding the system's settings and configuration. |
dsss | Direct Sequence Spread Spectrum |
verbose | An optional mode when running a program that displays varying levels of status messages as it is processing. |
begin script | A user-defined Bourne shell script, specified within the rules file, that performs tasks before the Solaris software is installed on the system |
integrated | Two or more commonly separate components, objects, or applications that are developed to work together |
interpreter | A program expressed in one language which executes programs expressed in another language. |
vulnerability management | The practice of identifying and removing weaknesses that can be used to compromise the confidentiality, integrity, or availability of a computer information asset |
mount retention period | A device class attribute that specifies the maximum number of minutes that the server retains a mounted sequential access media volume that is not being used before it dismounts the sequential access media volume. |
cgi | (Common Gateway Interface) An interface by which external programs communicate with the HTTP server |
current vulnerability measure | The danger posed by a vulnerability after accounting for the safeguards you use to secure it |
boolean | An expression, the value of which is either true or false. |
script | A type of program that consists of a set of instructions for an application |
tweeter driver | A type of speaker driver that handles the high-frequency treble range (above 2000 Hz). |
certificate | Cryptographic systems use this file as proof of identity |
ndmp | Network Data Management Protocol. |
incident response cycle | The sequence of phases that a security event goes through from the time it is identified as a security compromise or incident to the time it is resolved and reported. |
virus definitions | LiveUpdate Plus definitions are available for enterprise customers with Platinum Support entitlements |
unaided recall | The percentage or number of consumers surveyed who are able to cite a products/services name after being requested to cite any and all product names within an advertised category |
global positioning system | A space-based global navigation satellite system that provides location and time information in all weather, anywhere on or near the Earth, where there is an (almost) unobstructed sky view. |
routing table | The set of information the kernel uses in “routing” network data around |
online community | a group of like-minded people using social media tools and Internet sites to communicate |
time-out | A predetermined period of time during which a given task must be completed |
ecommerce safety threats | Suspicious ecommerce activities, such as selling counterfeit goods. |
switch | A device that facilitates transmissions between nodes on a private network and regulates internal network traffic. |
registrant | The person or organisation to whom a domain name is registered |
tap | Topfield Application |
string | A sequence of characters (letters, numbers, punctuation marks etc.). |
bit | Short for binary digit |
entire solaris software group | A software group that contains the entire Solaris release. |
access time | The time from a data transfer request to the completion of the transfer of the data. |
heuristically-detected virus | A heuristically-detected virus is found based on the malicious behaviors that it exhibits |
webinar | a seminar delivered online, either live or recorded and archived for replay |
user manager | A Windows NT utility that enables users with administrative privileges to edit and define individual user accounts and privileges for the local workstation. |
dvd-a | DVD-Audio |
patch analyzer | A script that you can run manually or as part of the Solaris installation program |
structured internal threat | An individual inside your organization who may be a threat |
parallax | Apparent change in the position of an object when viewed from different points |
severity | A level assigned to an incident |
navigation and click-stream data | Refers to user data passively generated by browsing the Internet |
ron | The scheduling of Internet advertising whereby an ad network positions ads across the sites it represents at its own discretion, according to available inventor |
archive retention grace period | The number of days that IBM Tivoli Storage Manager retains an archived file when the server is unable to rebind the file to an appropriate management class. |
notification | A predefined response triggered by a system condition, such as an event or error condition |
administrative privilege class | See privilege class. |
odf | OpenDocument (or |
encryption | A way of scrambling information so that data can stay secure. |
polarizing film | A film that turns or shifts light. |
academic technology services | Also known as ATS (formerly Mediaworks) |
communications device | Also called the connection device |
db | Database. |
post-mortem | In information security terms, a method of data analysis and investigation performed after an intrusion has already occurred. |
nis+ | The SunOS 5.0 (minimum) Network Information Service |
benefit | The effectiveness of a safeguard in terms of vulnerability measure |
licensed product | See Compliant Product. |
vector thickness | The width of a vector, or line segment, primitive |
memory | Memory is the internal storage location where data and information is stored on a computer. |
boardreader | a Web-based aggregator of message boards and forum discussions |
authentication | This security process determines whether someone is who they say they are |
dot product | A mathematical operation of two vectors that produces a scalar |
common name | The name by which a virus is generally known. |
lossless | A compression method that does not cause any loss of data |
im | Instant messaging |
management class | A policy object that users can bind to each file to specify how the server manages the file |
convex | A property of a polygon that bulges outward at all vertices |
sugar | The window manager used by the |
hard copy | Printed on paper or other permanent media |
cpu | Central Processing Unit |
bulletin board | A dial-up computer network site typically offering news and programs that may be downloaded to one's computer. |
band printer | Uses characters on a chain that is moved into place before striking the characters onto the paper. |
utility | A standard program, usually furnished at no charge with the purchase of a computer, that does the computer's housekeeping. |
skyscraper | Skyscraper ads, which are tall and narrow |
drm | A short name for disaster recovery manager. |
dvr | Digital video recorder |
unstructured threat | A threat that tends to be technically unskilled or unsophisticated. |
module | In IT parlance, this is a set or group of macros in a Word document or Excel spreadsheet, etc. |
pixel | One dot on a screen |
3d | Versions 1.4 and 1.4a of the HDMI Specification add support for three-dimensional (3D) video formats, establishing a foundation for 3D broadcast, movie, and gaming applications |
zone | See non-global zone |
client | The customer side of a client/server setup |
anti-debug / anti-debugger | These are techniques used by viruses to avoid being detected. |
mecavisionhd | A collective term for a whole range of picture optimisation features |
stereoscopic 3d | Two photographs taken from slightly different angles that appear three-dimensional when viewed together. |
checking for meaning | This is an alternative phrase for semantic analysis. |
smshing | SMS text Phishing |
withholds | Shipped single copies that never reach the racks |
number of sites | Measures the number of locations with infected computers |
oecd guidelines | Privacy Guidelines issued in late 1980 by the Organization for Economic Cooperation and Development |
signal | A mechanism by which a process may be notified by the kernel of an event occurring in the system. |
causes system instability | This payload may cause the computer to crash or to behave in an unexpected fashion. |
spoofing | Spoofing is when a spammer or scammer fakes his origin or pretends to be someone else i.e |
exclude-include list | See include-exclude list. |
policy set | A policy object that contains a group of management classes that exist for a policy domain |
soft box | An attachment that mounts on the head of the flash and extends out about 6 to 8 inches, with a frosted white panel at the end, which softens the light. |
grooming | This is the process predators use to manipulate minors into sexual relationships or into producing sexual images of themselves |
personal information | Information that can identify you, like your bank and credit card account numbers; your income; your Social Security number (SSN); or your name, address, and phone numbers. |
even field | See "field, even." |
lnb | An acronym for Low Noise Blocker |
mp3 | MPEG-3 |
pirated software | Programs that have been copied illegally rather than purchased legally. |
repro graphics | A full-service campus printing department affiliated with the Office of Administration |
pps | Payroll Personnel System |
ucs-2 | An ISO/IEC 10646 encoding form, Universal Character Set coded in 2 octets |
cipher | An algorithm used to encrypt a piece of plain text. |
install server | A server that provides the Solaris DVD or CD images from which other systems on a network can install Solaris (also called a media server) |
speakers | If your system has a sound card, it needs a pair of speakers |
hoax | This is not a virus, but a trick message warning of a virus that doesn't actually exist. |
secondary storage | Secondary storage technology refers to storage devices and storage media that are not always directly accessible by a computer |
proprietary | Unique to a given manufacturer |
dynamic loader | When programs are compiled under Linux, they usually use pieces of code (functions) from external libraries |
mathml | The Math Mark-up Language is a subset of |
subnet mask | A 32-bit address used in conjunction with an IP address to segment network traffic; used to restrict transmissions to certain subnets. |
comments | replies or opinions in reference to a specific topic; usually left on blog posts or on a bboard |
throughput | How much data is moved in a certain amount of time |
digital certificate | A nontransferable, nonforgeable, digital file issued from a third party that both communicating parties already trust. |
connectivity | Refers to the input and output ports and wireless ability of the product |
storage class | Property of an object that determines when the object comes into existence and goes out of existence (i.e., its lifetime), and any default initial value of that object |
contacts | An address book or a name and address book (NAB) is a book or a database used for storing entries called contacts |
path | A list of locations for the computer to look for commands if the full path is not given. |
algorithm | A predetermined series of instructions for carrying out a task in a finite number of steps. |
ghz | Gigahertz |
backup | To periodically archive data on a system to mitigate risk the of permanent data loss in the event of system or component malfunction or destruction. |
root factory | The “root factory” of a |
safeguard assessment | A process identifying the safeguards that best support the risk-reduction strategy formed during the risk assessment phase. |
database | A database is a collection of data ordered into tables of relevant information |
storage | The media and methods used to keep information available for later use |
bizopps | Shorthand for “business opportunity;” some schemes involve extravagant and unfounded earnings claims and are actually fraudulent business ventures. |
text field | Area in a program or application for typing a word or group of words. |
aes | (Advanced Encryption Standard) A symmetric 128-bit block data encryption technique |
foreground | A foreground program runs and interacts with the user |
word | Amount of data the CPU can process at one time |
superuser | A special user who has privileges to perform all administrative tasks on the system |
definition statement | A declaration statement that is implemented (i.e., causes the allocation of memory). |
extensible markup language | The common language of the Web used to exchange information. |
expiration | The process by which files are identified for deletion because their expiration date or retention period has passed |
coaxial cable | A cable consisting of a single conductor which is surrounded by insulation and a conductive shield |
system clock | Electronic pulse used to synchronize processing |
ad noters | A person who has noticed an advertisement in a publication |
boot package | A file, bootable disk, Ghost image, or Preboot Execution Environment (PXE) image of a bootable disk that contains the Symantec Ghost executable and any drivers required to start a client computer and Symantec Ghost. |
certificate authority | An office or bureau that issues security certificates. |
cme initiative | The CME initiative is an effort headed by the United States Computer Emergency Readiness Team (US-CERT), in collaboration with key organizations within the security community |
uid | User Identifier |
ram | RAM is an acronym for Random Access Memory |
root | The top level of a hierarchy of items |
startup window | A time period during which a schedule must be initiated. |
sell-through | Also called efficiency or efficiency level |
tutorial | A set of lessons that walks you through the use of hardware or software |
payload trigger | The condition that causes the virus to activate or drop its destructive payload |
touch and drag | This action moves the content on the screen in the corresponding direction |
job | A user-defined task to be completed by a computer system. |
activate | To validate the contents of a policy set and then make it the active policy set. |
vulnerability safeguard | A process, procedure, technique, or feature that assists in securing a vulnerability, by reducing the risk linked to the system's vulnerability measure. |
ignore | A condition that prevents an action from being executed on a rule. |
rule | A logical statement that lets you respond to an event, based on predetermined criteria. |
invitation | You can invite any other users to your groups if you are the group administrator, or you may be able to invite your friends into groups where you are a member |
encryption | The act of using a cipher or algorithm to transform data, such as a program’s code, into an unintelligible form |
basic | Beginners All-purpose Symbolic Instruction Code A simple but powerful computer language that can act as a good introduction to more powerful languages like C, C++, et al |
url | Uniform Resource Locater |
snmp | Simple Network Management Protocol |
edge | An area where neighboring image pixels are significantly different in color; in other words, an area of high contrast. |
reader | a web-based tool that aggregates information from an RSS feed |
file | A piece of data stored as a single addressable object on a file system |
man section | Pages in the standard Unix online manual ("man") are grouped into sections for easy reference |
anti-aliasing | The process of reducing aliasing, or jaggies, in creating an image. |
synchronous transmission | A form of data transmission in which information is sent in blocks of bits separated by equal time intervals |
chain letter | A chain letter is a letter that is sent successively to several people |
firewall | The firewall is all about prevention |
race condition | A situation where the (uncontrolled) ordering of events can affect the outcome of the situation. |
backward compatible | The quality of software to be able to work properly with older versions of the software that may be installed on a machine or communicating with another machine with a lower version of the software. |
multicast | To simultaneously send the same message to a list of recipients on a network. |
linear shading | See "bi-linear interpolation." |
directional light | A light source that shines from the same direction at every point in the scene |
replace | Replace specific word(s) or character(s) with stated text |
thumbnail | This term is used to describe a small image meant to represent a larger one |
midrange driver | A type of speaker driver that handles midrange frequencies (200 Hz to 2000 Hz). |
lock | A temporary file that keeps data and applications from being used by multiple processes or users, which may cause data collisions and/or corruption. |
retention | The amount of time, in days, that inactive backed-up or archived files are kept in the storage pool before they are deleted |
database | A generic term for any large, organized amount of data |
mbr | The Master Boot Record |
deadlock | A situation in which two or more processes are prevented from continuing while each waits for resources to be freed by the continuation of the other. |
database | A collection of persistently accessed data that is typically stored for fast and/or arbitrary access |
cairo | The Cairo graphics engine |
gif | A file format for storing images |
mode | A copy group attribute that specifies whether to back up a file that has not been modified since the last time the file was backed up |
flat projection | A method of projecting a 3D scene onto a 2D image such that the resulting object sizes are not dependent on their position |
circulation-driven | A magazine that yields most of its revenue from circulation |
platform group | A vendor-defined grouping of hardware platforms for the purpose of distributing specific software |
coalescence | The combination of two (or more) physically adjacent unused spaces into a single unused space. |
introspector | An object with the methods described by |
deploy | To perform a remote installation. |
website verification | The better security packages offer an up-to-date list of suspected fraudulent websites |
crash recovery | A file transfer option that directs pcAnywhere to continue transferring files where it left off when computers are reconnected after a broken connection, instead of restarting the transfer. |
vga resolution | Video Graphics Array resolution |
darkstar | The default hostname in Slackware; your computer will be called darkstar if you do not specify some other name. |
upgrade | An installation that merges files with existing files and preserves modifications where possible. |
coaxial | 1 |
analog | A type of telecommunications signal (audio or video) that is translated into electronic pulses with varying strength or frequency. |
tolerance | The range of color or tonal values that will be selected with a tool such as an image editor’s Magic Wand, or filled with paint when using a tool such as the Paint Bucket. |
source code | The (more or less) human-readable code in which most programs are written |
stereoscopy | The art and science of creating images with the depth sense stereopsis |
plugin | A program that adds new functionality to an existing system. |
sector | The primary measuring unit of a storage disk upon which data is stored. |
text mode installation | Keyboard-oriented installation of a program or operating system, normally non-graphical. |
serial transmission | The transmission of discrete signals one after the other |
text interface | User interface that uses only text commands, no graphics. |
unit vector | A vector of length, or magnitude, one. |
rs-232-c standard | An industry standard for serial communication connections |
event record | A database record that describes actual status and results for events. |
signal | Unix programs can communicate between each other using simple “signals”, which are enumerated and usually have specific meanings |
block | A logical division of data on magnetic tape. |
post | Power On Self Test |
tape library | A term used to refer to a collection of drives and tape cartridges |
boot archive | x86 only: A boot archive is a collection of critical files that is used to boot the Solaris OS |
multimedia | Information presented in more than one format, such as text, audio, video, graphics, and images. |
vector scaling | An operation of a vector and a scalar |
surge | See power surge |
threat measure | A quantitative measurement of a threat |
boot | Boot is the platform designator for boot sector, the dedicated area of a storage device such as a CD, floppy disk, or hard drive that contains critical information for starting the main operating system (OS) |
attack signature | The features of network traffic, either in the heading of a packet or in the pattern of a group of packets, which distinguish attacks from legitimate traffic. |
security assessment tools | Programs used primarily to perform security related network or local system administrative tasks that contain functionality that may provide information for unauthorized access to computer systems or render them inoperable. |
cctv | Closed Circuit Television |
external object | An object that is defined outside of all functions. |
decryption | The process of converting coded data to plain text |
template | Pages and collections can be offered as templates to other users |
exploit | A program or piece of code that is specifically written to take advantage of a vulnerability, in order to provide an attacker with access to a vulnerable computer system, program or network. |
www | WWW stands for World Wide Web |
motif | A popular programming toolkit used in many older X programs. |
motivation | The relative amount of incentive that a threat has to compromise or damage the assets of an organization. |
emissive color | An object surface property sometimes used with the Phong lighting model |
safeguard | A process, procedure, technique, or feature intended to mitigate the effects of risk |
root | The specially privileged userid used to perform Unix system administration. |
accommodation | The refocusing of the eyes as their vision shifts from one distance plane to another. |
tape volume prefix | A device class attribute that is the high-level-qualifier of the file name or the data set name in the standard tape label. |
scsi | A popular standard for internal and external hard drives and other peripherals. |
it | Information Technology. |
3:2 pull down | Film is usually recorded at 24 frames per second |
country of origin | This generally refers to the country where the first incidence of virus was first recorded. |
fat32 | 32-bit File Allocation Table |
certstore file | A file that contains a digital certificate for a specific client system |
fractal | Something that has infinite detail |
settling time | Time for read/write head to lower to the storage disk and cease vibrating, allowing reliable reading and writing |
atm | Asynchronous Transfer Model |
white paper | This is a document that explains how a certain technology or product works |
temporary affiliate form | A process to grant temporary campus computing privileges to guest faculty and staff, visiting scholars and others |
event normalization | The process by which events from disparate sources are mapped to a consistent framework. |
micro-blogging | a form of blogging where the entries/posts are limited to a certain amount of characters or words, i.e |
wml | Wireless markup language |
buffer | Buffer is a location, especially in RAM, for storage of temporary data to speed up an operation such as disk access or printing. |
master | Term for a hard drive that controls other drives on the same connection |
marquee | The dotted outline that results when you select a portion of your image; sometimes referred to as marching ants. |
public key | A shared data file that is distributed to any interested recipient for the secure transmission of data |
security services | The security management, monitoring, and response services that let organizations leverage the knowledge of Internet security experts to protect the value of their networked assets and infrastructure. |
sem | Acronym for search engine marketing, by which a marketer can invest in key words and phrases in order for their products and services to be displayed in response to prospective customers who search the Web using those same key words or phrases |
freeview playback | Freeview Playback is a branding mark for |
raid-z storage pool | A virtual device that stores data and parity on multiple disks that can be used as a ZFS storage pool |
platform name | The output of the uname -i command |
rom | This is a type of memory which under normal circumstances cannot be written on, and therefore its content is permanent. |
color wheel | A circular diagram of colors |
search | Find a key in a large amount of data. |
wuxga | The projected image is made up of 1920 x 1200 pixels |
freemium | Also called a love gift |
wanboot.conf file | A text file in which you specify the configuration information and security settings that are required to perform a WAN boot installation. |
internet | A network of independent computer systems that communicate with each other through various communications protocols and standards |
wireless network | A method of accessing high speed Internet without the computer being linked by cables. |
console | 1 |
sector | A numbered wedge-shaped area of a storage disk |
client computer | A computer that runs a client program |
include-exclude list | A group of include and exclude option statements that IBM Tivoli Storage Manager uses |
rule | A series of values that assigns one or more system attributes to a profile |
nis | The SunOS 4.0 (minimum) Network Information Service |
banner grab | A client receives this readable string immediately following a connection to a server |
streaming | Usually, when you download something, you have to wait for it to finish before you can open or use the file |
cmyk | The print color model in which cyan, magenta, yellow, and black inks are mixed to produce colors. |
peer-to-peer fundraising | the act of soliciting nonprofit donations directly from one's online contacts using Web-based tools like email or social networks |
payload | The effects of a virus. |
liteware | A free version of a program which is missing some high-end or desirable features |
conditioning | Smoothes out variations in power by pumping up the voltage when it drops and stepping it down when it's too high |
keystoning/keystone distortion | Term used to describe the result arising when the film plane in a camera or projector is not parallel to the view or screen |
bass and treble controls | Separate on-screen controls provide for a wide range of Bass and Treble sound adjustments. |
environment | Environment refers to the interaction among all factors external to a physical platform |
contrast | The level of white that you see on a video display |
authentication | The assurance that a party to some computerized transaction is not an impostor |
self-mailer | A piece of promotion mail that is not enclosed in an envelope and is designed so that a portion of it can be used for a reply |
tunneling | A technique used by some viruses to foil antivirus protection. |
os x | The Macintosh operating system |
rebinding | The process of associating a backed-up file with a new management class name |
afe | Analog Front End |
arrow keys | One of the four directional keys on the numeric keypad. |
quad-core | A processor that combines four independent cores in a single package |
caging | In fulfillment, the process in which subscription orders and their enclosed payments are separated and then recorded |
monitoring tool | A program that can monitor and record all computer activities, including each keystroke typed on the keyboard. |
application | An application is a set of codes designed to allow specific tasks to happen |
administrative domain | An environment or context defined by a security policy, security model, or security architecture. |
incident response | The ability to deliver the event or set of events to an incident management system or a HelpDesk system to resolve and track incidents. |
composition | The arrangement of the main subject, other objects in a scene, and/or the foreground and background. |
dns | Domain Name Service |
server options file | A file that contains settings that control various server operations |
ram | This is a computer's main memory, in which files or programs are stored when they are in use. |
background | A background program is temporarily suspended from execution and does not interact with the user |
upgrade option | An option that is presented by the Solaris installation program |
access mode | An attribute of a storage pool or a storage volume that specifies whether the server can write to or read from the storage pool or storage volume |
transfer | Programming statements, like the "go-to" in nonstructured programming languages, that allow program code to be transferred into and out of modules. |
cti/lti | Colour Transient Improvement/Luminance Transient Improvement – for the reproduction of clear contour edges which are lost during transmission of the television picture. |
front curtain sync | The default kind of electronic flash synchronization technique |
main frame | Computer that is the heart of a network of computers or terminals which allows hundreds of people to work at the same time on the same data |
quarantine | To isolate files suspected to contain a virus, so that the files cannot be opened or executed |
annoyance factors | Items that don't necessarily do harm, but are a nuisance, such as joke programs or a site that isn't what it seems. |
console | Screen or station at which an administrator operates a computer system |
conversion | The process of adding depth to a shot previously filmed or created in without depth. |
quick sort | Quick sort pick an item at random, put all the smaller items in a group on its left and the larger items in a group on its right |
table | A set of rows and columns |
pixels | The individual points (or picture elements) that combined, form an image on a display. |
nsf | National Science Foundation. |
server | A powerful computer with a fast connection, which is set up purely to provide information |
/var file system | A file system or directory (on standalone systems) that contains system files that are likely to change or grow over the life of the system |
os server | A system that provides services to systems on a network |
confidence level | The likelihood that the sampling error in a survey result will fall within a specified range, usually expressed in terms of standard errors (e.g |
hyper-local community | a group of people from a specific location who interact in online communities using social media tools |
receiver | A/V receiver |
applet | A small application, usually a utility or other simple program, that can be executed on a graphical desktop panel. |
unique identifiers | Non-financial identifiers issued for purposes of consistently identifying the individual |
cn | See Common Name |
module | A collection of routines that perform a system-level function |
remote | A computer that connects with a host computer and takes control of it in a remote control session. |
event | A significant occurrence in a system or application that a program detects |
page | A unit of space allocation within IBM Tivoli Storage Manager database volumes. |
thumbnail | An image that has been scaled down to a size suitable for previewing only. |
dashboard | Apple introduced single panel on the home screen of a tablet that provides simple visual status information pulled from a variety of sources |
volume manager | A program that provides a mechanism to administer and obtain access to the data on DVD-ROMs, CD-ROMs, and diskettes. |
lilo | The LInux LOader |
dsl | Digital Subscriber Line: A type of high speed internet using standard phone lines and the local telephone network |
shake | The act of moving your device back and forth |
trigger | This is the condition which causes the |
firewall rules | A security system that uses rules to block or allow connections and data transmission between your computer and the Internet. |
esm agent | A software component that performs security assessment on a host system and returns the results to the ESM Manager |
ghz | (Gigahertz) A unit of frequency equal to 1,000,000,000 cycles per second |
key | Unique identifier used to encrypt or decrypt secure data |
transmission control protocol | A networking standard, typically used with the Internet Protocol (IP) standard |
keyboard | Computer system peripheral that users operate by tapping buttons to display characters on a monitor or other output. |
removable battery | Useful if you want to bring a secondary charged battery with you when out and about to swap in when your tablet PC battery runs out of charge |
kill | To terminate a process. |
hot spot | In wireless networking, a hot spot is a specific part of an access point's range in which the general public can walk up and use the network |
multimedia | The combination of audio, video, animation, text, and graphics. |
binary space partition | See "BSP tree." |
primary storage | Main memory, which holds what is currently being processed. |
ebcdic | A code system for turning letters, numbers and symbols into digital data |
multimedia | the use of multiple media in a single computer application or on a single Website |
parity | The quality of an integer being odd or even |
windows hosting | Windows hosting is when an ISP or hosting facility runs your site on a Microsoft Windows server |
callback | A security feature that lets a host disconnect a remote caller after a successful connection and then recall the remote computer, either for security verification or financial responsibility. |
key | The code for encrypting or decrypting data |
advance renewal | Generally, a renewal generated by a promotional effort that goes out well in advance of the rest of the renewal promotional series |
dispatcher | The operating system component which transitions a process to the running state. |
limitation collection | The established principle that collection of personal data should be limited to information that is necessary to complete a transaction |
profile server | A server that contains all the essential custom JumpStart files in a JumpStart directory. |
hub | Like the hub of a wheel, a central device that connects several computers together or several networks together |
request type | An attribute of a request that allows for specialization of view invocation based on arbitrary categorization |
action | A predefined response to an event or alert by a system or application. |
kernel | The critical piece of an operating system; performs the basic functions that more advanced functions depend on |
certificate authority | (CA) A trusted third-party organization or company that issues digital certificates that are used to create digital signatures and public-private key pairs |
diopter adjustment | A viewfinder feature that corrects for common eyeglass prescriptions so eyeglass wearers can use the viewfinder without wearing their glasses. |
type a hdmi connector | See Standard HDMI Connector. |
nas | Network-attached storage. |
joe job | Joe job is a spammed smear campaign |
mainline | A large magazine rack or reading center displayed within interior aisles of supermarkets and other retail outlets |
sort | Sort puts keys (numbers, names or other values) in order from smallest to largest (outside computer science this is usually called ordering). |
buffer overflow | A vulnerability in programs which do not adequately manage memory allocation |
gid | Group Identifier |
e-commerce | Electronic Commerce, allowing customers to purchase items and conduct financial transactions over the Internet safely and securely. |
keystroke logger | A program or hardware component that surreptitiously monitors and stores all the strokes typed into a keyboard |
statistics | A sample of malware has statistics whenever its infection percentage is among the 50 most active threats. |
address bar | An address bar is a text field near the top of a Web browser window that displays the URL of the current webpage |
technical description | This section describes the specific details of the infection, such as registry entry modifications and files that are manipulated by the virus. |
sram | Static Random Access Memory |
unsecure page | If transfer of information over the Internet is not secure, it means that encryption software is not being used to protect the information and prevent it being read or tampered with. |
memory | Memory is where data is stored |
time stamp of attachment | This field indicates the date and time of the file attachment. |
command-line interface | A utility providing an alternate way to execute the ESM commands in UNIX and Windows NT environments |
maximum utilization | The highest percentage of assigned capacity used by the database or the recovery log. |
quota | Value limits set to manage access to system and network resources or the amount of storage used by a particular user or group. |
organizational unit | A group of associated systems whose hierarchy generally reflects the network topology |
html | Hypertext Markup Language |
hls | Another name frequently used for the same thing as IHS |
continuity | A type of offer in which the consumer agrees to review new editions of or variations on a product and purchase a contracted number of these over a specified time period |
ipchains | The name of the program and associated technology used to create rules controlling network access to and from a particular machine or network |
scam | Any illegal plot or fraud in which a person or group of persons are tricked into giving money, under false promises of economic gain (trips, vacations, lottery prizes, etc.). |
log | A record of actions and events that take place on a computer |
protocol | Protocol refers to a set of rules that are followed by two devices while interacting with each other. |
backup regime | A group of settings that determines which computer to include in a backup task, as well as other details such as scheduling. |
replica | Among other things, the action by which a virus propagates or makes copies of itself, with the aim of furthering the spread of the virus. |
hot swap | To pull out a component from a system and plug in a new one while the main power is still on |
polygon primitive | A graphic primitive that is an area enclosed by a loop of straight edges |
tuner key | This key is used to toggle from one tuning system to another, digital channels and analog channels. |
init script | Shorthand for initialization script, scripts that are typically run at system boot time |
policy domain | A grouping of policy users with one or more policy sets, which manage data or storage resources for the users |
full hdtv | Denotes resolution of 1080p, ...1080 lines progressively scanned from top to bottom of the screen |
asset measure | A quantitative measurement of an asset |
archive copy group | A policy object containing attributes that control the generation, destination, and expiration of archived files |
platter | A round magnetic plate that makes up part of a hard drive |
hesiod | Name service for network authentication and access |
brownout | Period of lower voltage |
telephoto lens | A lens that magnifies an image. |
parsing | Reading some input (typically a computer program) and making sense of it by breaking it into parts according to their function. |
single-sided disk | Only one surface of the storage disk is used. |
dot width | The width of a point, or dot, primitive |
photon | A particle of light. |
clip art | Pre-drawn pictures to add to documents |
risk | A threat that exploits a vulnerability that may cause harm to one or more assets. |
releases confidential information | This payload may attempt to gain access to important data stored on the computer, such as credit card numbers. |
java | A computer programming language invented by Sun Microsystems that enables web pages to include animations, calculators, scrolling text, sound effects, and games. |
scsi | Small Computer System Interface |
wan boot miniroot | A miniroot that has been modified to perform a WAN boot installation |
bluetooth | A physical wireless communications standard for exchanging data over short distances from fixed and mobile devices |
disabled | A status indicating that a program, job, policy, or scan is not available |
predictive risk assessment | A process that consists of risk assessment, business objectives, business objective risk, business task, business task risk, and Business Impact Assessment (BIA). |
rj-11 | Registered Jack 11 |
threat | A circumstance, event, or person with the potential to cause harm to a system in the form of destruction, disclosure, data modification, and/or Denial of Service (DoS). |
security policy | A written document that describes how your organization can best protect itself from various threats, including a list of steps to be taken should certain security-related events take place |
cache | A form of computer memory that allows you to access stored information, such as web addresses you’ve recently typed into your browser, more quickly |
cenic | Corporation for Education Network Initiatives in California |
bbs | A system or service on the Internet that allows subscribed users to read and respond to messages written by other users (e.g |
automount | To automatically access a storage medium such as CD-ROMs and make its contents available to a computer system. |
light source | A scene object that illuminates other objects. |
process | A running program. |
process state | The status of a process as running, ready, blocked, etc. |
database marketing | Using relational computer systems that allow for maintaining multi-product purchasing history and all other data on a customer |
aggregate | A collection of information in which no individual information can be distinguished or identified |
asset | A physical item, informational item, or capability required by an organization to maintain productivity |
argument | A parameter that controls the operation of a program or command. |
operator precedence | A property of an operator that is used to specify its order of evaluation relative to other operators that are included within the same set of parentheses in an expression |
connection | The successful establishment of a communications link. |
Putting the document on paper with a printer | |
hotspot | An area in which wireless service is available. |
open access lab | A campus computer room available to students during all normal operating hours |
access | Refers to the user's ability to view the data collected about him or her, and to challenge its accuracy and completeness |
template | A template is something that already has a pre-defined structure |
logic programming languages | A category of languages like Prolog very similar to symbolic logic, especially applicable to artificial intelligence research and expert systems. |
risk assessment | The computation of risk |
menu | Part of a user interface which lists the available commands |
member | A data or function component of an object. |
firewall | An access system that keeps unauthorized users from accessing resources on a local private network. |
ber | Bit Error Rate |
system privilege class | A privilege class that allows an administrator to issue all server commands |
cat-5e | A long-run Ethernet cabling system most commonly used in homes to carry audio and video signals for computer networks and a whole-home theater network. |
rptv | Rear-projection TV. |
upconversion | A scaling of the resolution of a video signal to a higher resolution |
monitoring software | Programs that allow a parent or caregiver to monitor the websites a child visits or email messages he or she reads, without blocking access. |
array | A collection of objects, referred to as elements, all of which are of the same class and are associated with the same identifier |
halt | To stop all running processes on a system cleanly |
rangefinder camera | A type of camera that includes a focusing mechanism which allows the photographer to measure the subject distance and take photographs in sharp focus. |
adware | Adware is a software package that facilitates the delivery of advertising content to the user. |
third-party ad server | Independent outsourced companies that specialize in managing,maintaining, serving, tracking, and analyzing the results of online ad campaigns |
stereography | The art and practice of three-dimensional image making. |
letterboxing | An approach used to display widescreen (16:9) content (such as movies) on a standard (4:3) television |
ir | Infrared |
fat | File Allocation Table |
executable | A file which runs a program |
server migration | The process of moving data from one storage pool to the next storage pool defined in the hierarchy, based on the migration thresholds defined for the storage pools |
target node | A client node for which other client nodes (called agent nodes) have been granted proxy authority |
alternate source | In strict terms, an alternate source is any subscription source other than direct mail |
on-access scanner | A virus scanner that runs as a real-time, background process while the user performs other tasks, in order to provide constant protection against malware. |
vector unitize | See "unitize." |
xbase | A collection of practical and how-to information articles maintained by the IT Express Campus Computing Services Help Desk. |
shopping cart | Allows you to create and implement an online storefront |
lp | Long playing |
nonvolatile | Having the ability to retain information in the absence of power. |
http exception | The set of exception classes defined in |
intended | A program that contains bugs, or other problems, which prevent it from functioning as the author intended |
bus width | Amount of data that the bus can carry at one time |
spline patch | A curved surface which takes its shape from the placement of a set of control points. |
software package | A program and its associated files, archived and compressed into a single file along with any necessary scripts or information to aid in managing the installation, upgrade, and removal of those files. |
telnet | A protocol for establishing a login session via TCP/IP on a remote system. |
function key | One of the 10 or more keyboard keys that are labeled F1, F2, F3, and so on that are mapped to particular tasks. |
probe keyword | A syntactical element that extracts attribute information about a system when using the custom JumpStart method to install |
premigration | For a space manager client, the process of copying files that are eligible for migration to server storage, while leaving the original file intact on the local system. |
trackball | This is a popular alternative to a mouse |
submirror | See RAID-0 volume. |
view mapper | A view mapper is a class which implements the |
macro | Small program to automate actions within a major application |
tessellation | The act of tiling a surface with individual surface patches. |
rules.ok file | A generated version of the rules file |
justification | The positioning of text along the document margins in a word processing application. |
pcs | Personal communications services |
command | An instruction to execute a process given to a computer via a keyboard, mouse, or voice request |
bridge | Connects networks of the same type |
x server | A program that implements X for some platform and type of video hardware. |
magnetic ink character recognition | Machine reads characters printed with a special ink with magnetic properties |
recovery | The restoration of file data after its loss. |
asset value | The perceived or intrinsic worth of an asset. |
passive polarized | 3D glasses made with polarizing filters |
internal object | An object that is defined inside of a function. |
margin | Space at the borders of the page or other document object |
bsp tree | A hierarchical method of subdividing a volume |
dynamic ip | The procedure of allocating temporary IP addresses as they are needed |
mhp | Multimedia Home Platform |
point size | Measures the height of letters where one point is 1/72 inch |
lift note/lift letter | Refers to a folded promotional device (note or letter) found in a direct mail package that often helps lift response by providing more information or sell copy about the magazine |
cut | Remove selection from document and store temporarily on the Clipboard, which is a section of computer memory. |
diskette | Portable storage medium using a magnetic disk of 3 1/2" or 5 1/4" in size and usually storing between 740KB to 1.44MB of data. |
dolby pro logic | An older surround-sound format developed by Dolby Laboratories that includes four channels and five speakers of matrixed (intermixed) multichannel surround sound |
macro keys | Key codes assigned to sets of specific instructions |
chain printer | Uses characters on a chain that is moved into place before striking the characters onto the paper. |
technical name | The real name of a virus, which also defines its class or family. |
services applet | An applet in Windows XP/2000/NT, which configures and monitors system services. |
image | An archive file usually with the extension .iso, .img, or .raw, that is used to create a CD-ROM, DVD, or diskette. |
copy | Duplicate selection onto Clipboard |
hdmi | "High-Definition Multimedia Interface." HDMI is a digital interface for transmitting audio and video data in a single cable |
just-in-time compilation | A cross between a compiler and an interpreter |
autofocus | A camera setting that allows the camera to choose the correct focus distance for you, usually based on the contrast of an image or set by a mechanism, such as an infrared sensor, that measures the actual distance to the subject. |
version | A revision of software or hardware as specified by a name or value assigned by the vendor, such as Red Hat Enterprise Linux 4. |
capability | The measure of a threat's technical expertise or knowledge of a system's connectivity. |
operating system | System software that contains the instructions for coordinating all of the activities of hardware devices and other software programs |
wi-fi | Wireless fidelity |
prepending | This is a technique used by viruses for infecting files by adding their code to the beginning of the file |
pull-down menu | A menu of command options that is hidden from view until revealed by a combination of keystrokes or depression of a mouse. |
fan | A cooling device that circulates air in a computer; fans are necessary to keep the computer from overheating. |
homogeneous | Constant throughout. |
chording | The simultaneous pressing of two or more buttons or keys on an input device such as a keyboard or mouse that produces one set action. |
makegood | A publication that misses rate base (see definition) over a period of time or prints a poor reproduction of an ad will generally offer to republish the ad at no extra cost to the advertiser, or reduce or cancel the fee for the affected advertising. |
riskware | A program that is not malicious in nature, but may pose or introduce a security risk if improperly used |
time zone | Any of the 24 longitudinal divisions of the earth's surface for which a standard time is kept. |
data transfer | The movement of information from one location to another |
virtual device | A logical device in a ZFS pool, which can be a physical device, a file, or a collection of devices. |
budget | A magazine's projected circulation numbers and revenues for the year |
validate | To check a policy set for conditions that can cause problems if that policy set becomes the active policy set |
available space | The amount of space, in megabytes, that is available to the database or the recovery log |
pci | Peripheral Component Interconnect |
802.11 | Standard protocol for radio-frequency wireless data transmission and networking |
background | Any process that is running without accepting or controlling the input of a terminal is said to be running in the background. |
mount limit | A device class attribute that specifies the maximum number of volumes that can be simultaneously accessed from the same device class |
network | A group of interconnected computers and their connecting cables and hardware. |
metadevice | See volume. |
end user | The person who uses a program after it's been compiled and distributed. |
monochrome | One color text on one color background, like white letters on blue or green characters on black |
displacement vector | One of the vectors that defines a new coordinate system in terms of an old |
headers | Headers are used to identify the sender and recipient of a message |
pinch | In a touchscreen device like the iPad or iPhone, pinching is when you place two fingers on the screen and move them either closer or farther from each other. |
hash | A number that is produced by taking some input and generating a number that is significantly shorter than the input |
digital direct marketing | Direct digital marketing, also known as "DDM," is a type of marketing that is done exclusively through digital means |
threshold | The number of events that satisfy certain criteria |
light attenuation | The property of light to get dimmer with distance from the light source |
daemon | A program that runs continuously in the background until activated by a particular event |
mass storage | Sets of cartridges containing data |
faq | Frequently Asked Questions |
vector | A value that has a direction and a magnitude (length) |
spatial locality | A condition in which references to addresses in a given period are close tegether |
middleware | An application connecting two otherwise separate applications. |
spot light source | A light source that does not shine in all directions, usually in a cone |
logical device | A group of physical slices on one or more disks that appear to the system as a single device |
site map | Hierarchical diagram, or outline, of all the pages on a Web site |
information | Data that has been processed into useful form |
web forum | A Web forum is a website or section of a website that allows visitors to communicate with each other by posting messages |
authorization policy | An authorization policy in |
numarray | An archaic predecessor to NumPy. |
online profiling | Compiling information about consumers’ preferences and interests by tracking their online movements and actions in order to create targeted ads. |
communications protocol | A set of rules designed to enable computers to exchange data |
ethernet | A standard for sending data packets across networks, focused on the electronic signaling issues. |
non-volatile | Describes memory which retains data even when the power goes off. |
terminal | A human-computer interface consisting of at least a screen (or virtual screen) and some method of input (almost always at least a keyboard). |
.dr | Refers to a file that is considered a dropper |
bandwidth | A measure of the “speed” of an Internet connection. |
parametric animation | An animation control method where scene state is determined by mathematical functions or computer procedures that take animation time as an input parameter. |
analyst privilege class | A privilege class that allows an administrator to reset statistics |
x.509 | An internationally recognized standard for certificates that defines their required parts |
dotted python name | A reference to a Python object by name using a string, in the form |
macro | A set of keystrokes and instructions that are recorded, saved, and assigned to a short key code |
interrupt requests | Also called hardware interrupts |
filter | A filter manages access to online content |
function overloading | - see polymorphism |
ip number | A number that identifies a host, corresponding to a network interface associated with the host. |
analog signal | Variations (modulations) in a signal used to convey information |
autoinstall package | An executable created by AI Snapshot and AI Builder that contains one or more applications distributed to client computers using the Symantec Ghost Console. |
personal url | Many websites that host online communities allow you to create you own personal URL within the website |
low-level format | The first formatting step for a hard disk drive (HDD) |
host | A computer attached to a network. |
suspicious application | A suspicious application is one with behavior that represents a potential risk to a computer |
snapshot | A read-only image of a ZFS file system or volume at a given point in time. |
displacement | A distance in a particular direction |
ftp | The File Transfer Protocol |
fortran | From Formula Translation |
virus definitions file | A file that provides information to antivirus software to find and repair risks |
software series | A collection of related software packages in Slackware |
common information model | A common data model of an implementation-neutral schema for describing overall management information in a network/enterprise environment |
spectrum | A continuous band of frequencies... |
directory tree | Hierarchy of directories |
first appeared on… | The date when a particular virus was first discovered. |
threat safeguard | A process, procedure, technique, or feature that deters one or more threats to the network, by reducing the risk linked to a system's threat measure. |
scan | The term used by |
direct connection | A form of data communication in which one computer is directly connected to another, usually via a null modem cable. |
symbolic link | A filesystem entity that lets you associate an alternative name with a file or directory. |
fraud | An act that occurs when someone uses your account to make unauthorized purchases |
external threat | A threat that originates outside of an organization. |
desktop computer | 1 |
blank | To clear or not show an image on the computer screen |
voice first | A functionality that allows the host and remote users have a voice conversation before beginning a data session |
view-master | Proprietary name of a commercial stereo transparency image display and viewing system utilizing stereo pairs (7 in total) mounted in a circular rotating holder, and viewed with a purpose-made stereo viewer. |
cd | Compact Disc |
ereader | (Electronic Publication) An open standard for electronic books and Web publishing from the International Digital Publishing Forum |
wrapper program | A program whose sole purpose is to run other programs, but change their behavior in some way by altering their environments or filtering their input. |
iso | International Organization for Standardization |
jump drive | Also known as flash drives. |
filter kernel | The function that defines the relative weight of a point depending on its position |
client/server program | A program in which one portion of the program is installed on a computer that acts as a server for that particular program; and, another portion is installed on one or more client computers. |
distribution | This component measures how quickly a threat is able to spread. |
showview | The name used in some other countries for |
cpu utilization | Measures the time the CPU is working and when it is idle. |
xul | An |
uninterruptable power supply | A piece of equipment that allows your critical computing hardware to continue operating, or to shut down gracefully, in the event of a brief loss of power |
boolean | Expression-based system that uses the operators AND, OR, and NOT; operations are based on variables which can be 1 (true) or 0 (false). |
audit bureau | An independent organization that audits the claimed circulations of its publisher members for purposes of verifying those claims for advertisers |
dependencies | The proper functionality of one package may rely on the existence of another package, meaning there is a dependency |
attribute | A property of an object, such as a file or display device. |
bigbuzzness | The Social Media Management company dedicated to helping small and new businesses make the most of limited marketing budgets. |
administrator rights | These rights allow certain people to carry out actions or operations on networked computers. |
introspectable | An object which implements the attributes and methods described in |
multimedia ebook | A multimedia ebook is media and book content that utilizes a combination of different book content formats |
volume | A group of physical slices or other volumes that appear to the system as a single logical device |
scalar | A regular, single number, as opposed to a vector. |
http | Hypertext Transfer Protocol |
programmer | Writes the actual code for a computer program |
draw | Also termed an allotment |
hang | A situation where a computer system has ceased interactivity due to resource limitation or software/hardware failure |
security architecture | A plan and set of principles that describe the security services that a system is required to provide to meet the needs of its users, the system elements required to implement the services, and the performance levels required in the elements to deal with the threat environment. |
hsp | Hosting Service Provider |
standalone | A computer that does not require support from any other machine. |
warning | A message that informs the user that performing an action can or will result in data loss on the user's system. |
justification | Alignment of text: left, center, right, justify (or full) = both left and right edges are straight. |
block | Blocks exist on pages |
hard to uninstall | These programs are difficult to uninstall |
pending signal | A signal which has not yet been delivered. |
shell | Shells provide a commandline interface to the user |
circular buffer | A fixed capacity buffer which wraps around from one end to the other, simulating a circle. |
tsp | Technology Support Program |
scan-based trading | Refers to the practice of basing retail sales figures for magazines solely on the number of sales recorded through checkout scanning, as opposed to the traditional system of returning unsold magazine covers |
page views | The number of times a user requests a page; indicative of the number of times an ad was potentially seen, or "gross impressions." Note: this is not measurable today; the best approximation today is provided by page displays. |
priority scheduling | A scheduling policy which schedules tasks in descending order of priority. |
rendering | The process of deriving an 2D image from the 3D scene description |
failsafe boot archive | x86 only: A boot archive that is used for recovery when the primary boot archive is damaged |
serial printer cable | Sends data only 1 bit at a time |
.dam | Indicates a detection for files that have been corrupted by a threat or that may contain inactive remnants of a threat, causing the files to fail to properly execute or produce reliable results. |
hoax | An application that does not perform as claimed. |
nfs | The Network Filesystem |
ext2/ext3 | ext2 file systems support large drive and disk partitions, along with added speed and reliability enhancements over previous UNIX file systems |
formal parameter | A parameter that is specified as part of a function definition. |
active policy set | The activated policy set that contains the policy rules currently in use by all client nodes assigned to the policy domain |
focus | To adjust the lens to produce a sharp image. |
data transmission | The electronic transfer of information from a sending device to a receiving device. |
ruby | Ruby is an object-oriented programming language. |
feather | To fade the borders of an image element so that it blends more smoothly with another layer. |
sleeping state | A blocked thread state which can be transitioned to ready when notified of a timeout event. |
hdcp | High-Bandwidth Digital Content Protection |
launch | To start a program or application |
content filtering | A subcategory of a security policy that pertains to the semantic meaning of words in text (such as email messages) |
binary number system | The base 2 number system, i.e |
brute force attack | A type of attack that is carried out by trying every possible key. |
qwerty | Standard English-language keyboard arrangement; name represents the first six alphabetical keys on the top left corner of the keyboard. |
terminal window | Application screen for typing system commands |
wireless | The condition of functioning without a wire or cable attached |
bit | This is the smallest unit of digital information with which computers operate. |
unstructured external threat | An individual outside your organization who may be a threat |
cable modem | A modem designed to operate over cable TV lines |
credit card fraud | The trade in illegal and stolen credit card details is thriving like never before |
insert | Add text at location without overwriting existing text |
layout | Arrangement of text and graphics |
quantum | The maximum amount of time that a task is allowed to run before being preempted. |
gaze direction | The direction the virtual camera is pointed in the scene description |
2d display controller | A type of display controller that is intended for 2D operations, like windows, popup menus, text, etc |
opacity | The degree to which a layer allows layers beneath it to show through. |
social networking sites | Websites that host multiple communities of individuals with similar interests that have set up personal profiles on that site |
fetch strategy | The method used to determine which block is to be obtained next. |
point-of-sale terminal | A special-purpose terminal |
composite video | Composite video uses a single cable (often with yellow plugs) to carry a video signal, and is sometimes used to link set top boxes and televisions |
hashing | The process of changing a string of characters into a value or key that represents the original string. |
structured threat | An individual who may be a threat to your organization |
runlevel | The overall system state as defined by init |
alert | An automatic notification that an event or error has occurred. |
skin | Refers to the appearance of a program's interface |
logon procedures | The process of identifying oneself to a computer after connecting to it over a communications line |
known dependencies | These programs have been known to install the security risk as a component, and will therefore not function as intended if the security risk is removed from the computer. |
complexity | Complexity how long it takes to solve a problem |
"do-good" networks | online philanthropic communities. |
decibel/db | A mathematical (specifically, logarithmic) ratio that indicates the relative strength of a device's electric or acoustic signal to that of another |
imap | "Internet Message Access Protocol" It is a method of accessing e-mail messages on a server without having to download them to your local hard drive |
policy library | A repository of all of the policies (preconfigured and user-defined) in ITA. |
message identifier | A string used as a translation lookup key during localization |
upsample | Add pixels to a digital image. |
wan | A network of interconnected computers over a large geographical area, connected via telephone, radio or satellite. |
backlighting | A lighting effect produced when the main light source is located behind the subject |
jumpstart directory | When you use a profile diskette for custom JumpStart installations, the JumpStart directory is the root directory on the diskette that contains all the essential custom JumpStart files |
low migration threshold | A percentage of the storage pool capacity that specifies when the server can stop the migration of files to the next storage pool |
e-mail alias | An alternative name for a more complex email address |
traversal | The act of descending “up” a tree of resource objects from a root resource in order to find a context resource |
syntax error | An error made by an author when creating a script, such as not enclosing a string in quotes or specifying the wrong number of parameters |
record | To capture and store a set of data that consists of a series of actions and events. |
response | An object that has three attributes: |
svga | The projected image is made up of 800 x 600 pixels |
bot | A contraction of the word ‘robot’ |
netprowler agent | A component that monitors the traffic on a network segment to detect, identify, and respond to intrusion attacks. |
baseline risk | The risk that exists before safeguards are considered. |
packer | A program that compresses, or reduces, the size of a program’s code, often by re-coding it to a smaller size |
zfs | A file system using storage pools to manage physical storage. |
signature | A sufficiently unique section of code that can be used as a program’s identifying marker |
featured phones | A cellphone that contains a fixed set of functions beyond voice calling; however, it is not in the smartphone category |
foreground | A program that is accepting or controlling a terminal's input is said to be running in the foreground. |
plasma screen | Screen type used for very large screen involving a gas plasma for creating characters. |
multimedia | Multimedia is a broad term that refers to the delivery of text, images, sound and interactivity in an integrated manner from a computer. |
dvd | Digital Versatile Disc |
component | A single element within a larger system; it can be hardware- or software-based and performs essential functions needed by the system. |
mac address | Media Access Control address |
digital nicam sound | Types of audio reception, e.g |
microsoft management console | An extensible, common console framework for management applications |
activity log | A type of report in which all the recorded events are sequentially organized. |
sacd | Super Audio CD |
policy | The method of action selected from alternatives, given specific conditions to guide and determine present and future decisions. |
rollback | To remove changes that were made to database files since the last commit point. |
algorithm | Algorithm a process for achieving an outcome, normally for a general problem such as searching, sorting, finding an optimal path through a map and so on. |
rapid release virus definitions | Rapid release definitions are most valuable during a high-level outbreak when users are unable to wait for definitions to undergo full quality assurance testing |
delete | Remove selected object (not saved anywhere) |
archive | To copy one or more files to a storage pool for long-term storage |
base class | see inheritance |
mount point | An empty directory in a filesystem where another filesystem is to be “mounted”, or grafted on. |
process | A program or service running on a UNIX or UNIX-compatible computer system |
loop | A |
networked systems | A group of systems (called hosts) that are connected through hardware and software so that they can communicate and share information |
baud | Used to indicate the speed of a modem |
material properties | See "surface properties." |
shell prompt | An application that offers interactive console or terminal access to a computer system. |
adware | A program that displays advertising material to computer users, potentially in a manner or context that is unexpected or unwanted. |
compound statement | A sequence of one or more statements that are syntactically equivalent to a single statement. |
enabled | A status indicating that a program, job, policy, or scan is available |
skimming | Stealing credit card information during an otherwise legitimate transaction |
density | How close bits may be placed on magnetic tape |
amblyopia | A visual defect that affects approximately 2 or 3 out of every 100 children in the United States |
default permission | A permission which is registered as the default for an entire application |
class | A group of objects having same operations and attributes is defined as a class. |
active | A status that indicates that a program, job, policy, or scan is running |
mirror | See RAID-1 volume. |
logical occupancy | The space used by logical files in a storage pool |
dmz | Demilitarized Zone |
drm | Depending upon whom you ask, |
client | A program that makes requests of, or transmits data to, a parent server program. |
telnet | Protocol for interactive terminal access to remote machines |
magnetic tape | A storage medium using a long tape with magnetic properties. |
hci | HCI human computer interaction; an area of computer science looking at how people interact with a digital device, with an emphasis on the quality of the experience to complete tasks. |
multimedia message service | A standard used by telecommunications networks for transmitting multimedia content between mobile devices |
exposure value ev | EV settings are a way of adding or decreasing exposure without the need to reference f-stops or shutter speeds |
temporal locality | A condition in which reference to a single address are close together in time. |
snoot | A tube-like device that focuses the flash’s light to a very small area. |
resource | An object representing a node in the resource tree of an application |
24p | 24p refers to the most common format for cinema films where film material is shown at 24 frames per second |
retrieve | To copy archived information from the storage pool to the client node for use |
shared dynamic | A value for serialization that specifies that a file must not be backed up or archived if it is being modified during the operation |
parameter | A value that is assigned to a variable |
icmp | Internet Control Message Protocol |
buffer | This is an |
remote access | A program that allows one computer to gain access to another computer without authorisation or a visible presence. |
aliasing | The phenomenon that makes smooth lines and edges appear stair stepped or jagged |
memory management | Program to handle where in RAM programs put their data |
compile-time | The period during which a program is being compiled, as distinct from run-time when a program is actually running |
root | The object at which traversal begins when |
sha1 | (Secure Hashing Algorithm) The algorithm that operates on any input length less than 264 to produce a message digest. |
file transfer | The process of using communications to send a file from one computer to another |
dos | The acronym formed from the words Disk Operating System refers to an early operating system (OS) created by Microsoft for IBM and IBM-compatible computers; the OS was also used for Windows 3.1, 95, 98, and ME. |
encryption | A method of encoding information so that it cannot be read by unwanted parties. |
field | A single attribute of the entity which the record describes. |
primary boot archive | A boot archive that is used to boot the Solaris OS on a system |
spike | See power spike |
removal | Measures the skill level required to remove the threat from a given computer |
power management | Software that automatically saves the state of a system and turns it off after it is idle for 30 minutes |
border | Line around a page, table, or image |
flooding | Programs that repeatedly send a large message or text to a computer through messaging systems like MSN Messenger in order to saturate, collapse or flood the system. |
b spline | A particular type of spline, the mathematical details of which are beyond the scope of this book. |
convergence | The ability of both eyes to turn inwards together, enabling both eyes to be looking at the exact same point in space |
structured programming | A style programming in which a hierarchy of structures is used, each having a single entry and a single exit point. |
master boot record | Master Boot Record |
surround sound | A feature in a home theater system that enables you to take full advantage of all the audio signals in your source content (such as television programs and DVD or Blu-ray movies). |
process | It’s a series of commands that changes data values. |
arpanet | Advanced Research Projects Agency Network |
structured external threat | An individual outside of your organization who may be a threat |
mount wait period | A device class attribute that specifies the maximum number of minutes that the server waits for a sequential access volume mount request to be satisfied before canceling the request. |
terminator | A small device designed to dampen electrical signals reflected from the ends of a SCSI cable |
high level language | A language that conceptually closer the problems to be solved than to the hardware on which it runs. |
flaming | Flaming is the act of posting or sending offensive messages over the Internet |
session resource usage | The amount of wait time, CPU time, and space used or retrieved during a client session. |
solaris live upgrade | An upgrade method that enables a duplicate boot environment to be upgraded while the active boot environment is still running, thus eliminating downtime of the production environment. |
group | You can create groups and invite other users into your groups to work collaboratively on projects |
printer | A printer prints data |
migrate | To move data from one storage location to another |
blog | The word blog is derived from the combination of the two words, web and log |
message boards/forums | an online discussion site; people looking to discuss particular issues or needing support post a message on the forum or message board to get more information or start a conversation with other forum members |
footer | The bottom part of a page that is repeated on every page of the document |
x3d | Extensible |
campus data warehouse | It archives current and historical snapshots plus statistics of student, course, instructor and employment pay data |
operator | The person who is responsible for maintaining and running a Web site. |
image file definition | A description of the properties of an image file, including the image file name, location, and status |
aspect ratio | The ratio of screen width to screen height |
technews | A free campus tech news and information service for faculty, staff and students, from Information and Educational Technology |
targeted attack | Attacks aimed specifically at a person, company or group and which are normally perpetrated silently and imperceptibly |
data-hiding | - see encapsulation |
g code | Another name for |
telnet | Allows a server to be controlled remotely by any computer connected to the internet running a Telnet program. |
predicate | A test which returns |
shutter | The device in a camera that opens and shuts to allow light into the camera. |
constraint | A rule of an inverse kinematics or inverse dynamics animation system that must be adhered to in solving the motion of all the objects |
csc | Short numeric numbers (typically 4-6 digits) to which text messages can be sent from a mobile phone |
gb | Refer to gigabit. |
normal vector | A vector pointing straight our from (at right angles to) a surface. |
parity | A method of checking for errors in digital data |
host | This refers to any computer that acts as a source of information. |
information privacy | The interest an individual has in controlling, or at least significantly influencing, the handling of data about themselves. |
dipole antenna | A type of antenna commonly used with wireless networking devices |
sdram | Synchronous Dynamic Random Access Memory |
bi-quadratic patch | A particular type of surface patch |
keystroke | Equivalent to one tap of a keyboard or keypad. |
drive mode | Setting that determines whether a camera takes a single picture or a series of pictures. |
instant messaging | A form of real-time communication between two or more people based on typed text |
lens shift | Displacement of the lens with the prism (horizontal or vertical) or vice versa, resulting in the center of the image being offset from the center of the lens |
fallback | A reversion to the environment that ran previously |
derived profile | A profile that is dynamically created by a begin script during a custom JumpStart installation. |
hec | See HDMI Ethernet Channel. |
edition | Sub-versions within a given magazine issue's print run and distribution |
format | Define the structure of a disk, removing any information that was previously stored on it. |
panorama | A broad view, usually scenic |
rotational delay | Time to rotate a storage disk under the read/write head of the drive to the correct sector |
contrast | The range of difference in the light to dark areas of a photo. |
frequency | A copy group attribute that specifies the minimum interval, in days, between incremental backups. |
dvd | Digital video disc |
dot matrix printer | Forms characters using row(s) of pins, 9, 18, or 24 which impact the ribbon on top of the paper |
storage pool volume | A volume that has been assigned to a storage pool |
hd - high definition | Television formats that have a higher resolution than their contemporary counterparts |
intrusion detection | A security service that monitors and analyzes system events to find and provide real-time or near real-time attempt warnings to access system resources in an unauthorized manner |
client | a program that works by interacting with a server; |
payload | This is the malicious activity that the virus performs |
register | A register is a piece of high-speed memory located directly on the processor |
scientificpython | A collection of useful utilities for scientists |
virtual reality | A name loosely applied to systems that attempt to immerse the user in a virtual world generated by the computer |
api | This is a function used by |
demographic and socioeconomic data | Data about an individual's characteristics -- such as gender, age, and income. |
bss | Basic Service Set |
default | The original settings; what will happen if you don't change anything |
modular belt system | A belt that can hold a variety of photography equipment. |
pay-up | A calculation to express the number of prospects who responded to a promotion and then paid for the magazine or product |
port | Port is a connecting component mainly a hardware that enables two computers to allow data sharing physically |
uudecode | See UUcoding |
task | Tasks are created as part of a plan to provide more details on it |
grub edit menu | x86 only: A boot menu that is a submenu of the GRUB main menu |
signal handler | Code that is executed in response to a particular signal type. |
vrml | A Virtual Reality Modeling Language file is used to represent |
soft copy | Displayed on screen or by other non-permanent means |
epaper | A generic term for an extremely thin flexible display that can be rolled up |
seek time | Time it takes to move the read/write head of a drive to the proper track on the storage disk |
bay | Place in a computer case to put drives and other devices |
drivers | 1 |
cmyk color system | Cyan, Magenta, Yellow, and Black |
device driver | Refer to device module. |
persistent cookies | Cookies that are discarded when they reach their defined expiration time. |
a-v | Audio-Visual. |
tip-on | A single-sheet subscription renewal or new-business promotion glued or affixed to the front of a subscriber or sample copy |
wuxga resolution | Facilitates pixel-perfect display of signal sources up to a resolution of 1,920 x 1,080 |
channel | In communications, a medium for transferring information, which is also called a line or circuit |
caesar cipher | A very simple cipher that offsets each letter in the alphabet by a certain amount, specified by the key |
filtering | This is a broad word which can mean the removal of coffee grinds from the coffee |
spx | Sequenced Packet Exchange |
svga | Super VGA, a video type allowing several large resolutions and 16 million colors. |
single ended | The most common type of SCSI signal |
motd | Message of the Day |
dolby digital plus | An all-digital surround-sound format developed by Dolby Laboratories that is an improvement on the older Dolby Digital and Dolby Digital Surround EX systems |
report | A set of data that is organized and formatted according to specific criteria. |
defragmentation | The process of relocating broken or separated files from random, non-contiguous locations on a physical disk platter to contiguous locations, which improves the speed and reliability of the disk. |
usability heuristic | See Heuristic. |
request | An object that represents an HTTP request, usually an instance of the |
truststore file | A file that contains one or more digital certificates |
power surge | More electricity through the line than normal for several seconds |
beacon interval | When a wirelessly networked device sends a beacon, it includes with it a beacon interval, which specifies the period of time before it will send the beacon again |
buffer | Location for temporary data storage while processing is going on |
master system | A system that you use to create a Solaris Flash archive |
rewritable | CD disk which can be erased and written on again. |
package definition | A link from the console to an AI package, either on an attached drive or on a Web server. |
mount | To make a filesystem available for use. |
attachment | This is a file of information that is sent with an email |
monopole | A pole position of speakers in which all the drivers are on one face of the enclosure |
widget | A standardized on-screen representation of a control that may be manipulated by the user |
joystick | A device which controls cursor motion with a vertical stick |
residual risk | The risk that remains after the application of selected safeguards. |
incident | The actualization of a risk |
propagation | The act of creating a copy of a malicious program's code, usually in order to infect a new target, or distribute a copy to a new computer system |
utf-8 | Unicode transformation format - 8 |
translation domain | A string representing the “context” in which a translation was made |
natural language | 5th Generation Languages |
event listener | It is an interface of JAVA responsible for handling events. |
semantic analysis | The function of semantic analysis is to check that the source program is meaningful |
device driver | Sometimes just called a “Driver” |
checksum | The result of adding a group of data items that are used for checking the group |
joke programs | Programs that alter or interrupt the normal behavior of your computer, creating a general distraction or nuisance. |
rig | Dual camera heads in a properly engineered mounting used to shoot stereo movies. |
hook-and-loop tape | A kind of tape whose two sides adhere to each other, with one having rough hooks and the other soft, fuzzy material. |
library | A collection of functions which can be shared between programs. |
number of countries | A measure of the number of countries where infections are known to have occurred. |
read-only | A piece of data or a storage device that can be accessed and read but cannot be modified. |
blogroll | an assembly of blog URLs—blogs that the blogger reads regularly—displayed at the sidebar of their blog |
back up | To copy information to another location to ensure against loss of data |
sisweb | Student Information System on the Web |
error correction | Correcting an error that has been detected in some data |
grammar checker | Looks for grammar/style errors |
raid-0 volume | A class of volume that can be a stripe or a concatenation |
port | Basically it's a place where you plug in a device, be it parallel, serial, IDE, SCSI, etc. |
webpage | A page that contains text, images, and multimedia presentations and is viewable in a Web browser. |
in the wild | This is an official list drawn up every month of the viruses reported causing incidents. |
subscription | In a Tivoli environment, the process of identifying the subscribers that the profiles are distributed to |
service | The suite of features offered by one computer or system to others that are connected to it. |
Pinterest is an online pinboard | |
algorithm | A process or set of rules for calculating or problem-solving. |
cyberspace | Used to distinguish the physical world from the digital, or computer-based world. |
computer | An electronic device that executes the instructions in a program |
midtones | Parts of an image with tones of an intermediate value, usually in the 25 to 75 percent range. |
layer | A way of managing elements of an image in stackable overlays that can be manipulated separately, moved to a different stacking order, or made partially or fully transparent. |
eco-mode | A menu function to extend Lamp life and reduce energy consumption by slightly reducing brightness |
miniroot | A minimal, bootable root (/) file system that is included in Solaris installation media |
tcp | TCP stands for Transmission Control Protocol |