Browse Definitions :
Definition

anacronym

An anacronym is an acronym or an abbreviation so old or familiar that no one remembers what its letters stand for, such as BASIC or COBOL . By the way, an "acronym" is not just any abbreviation. It's a word that is short for other words, usually using their initial letters. An abbreviation formed of letters that don't form a word is sometimes known as an "initialism." Our Webster's cites "snafu" and "radar" as examples of acronyms. (Good examples of anacronyms, too!) But "snafu" and " RADAR " seem like acronyms that have passed into general usage (notice the all lower case). Most of today's acronyms are still all upper case; only a few will ever become generic. An example of an acronym that probably won't become lower-cased is WINS (Windows Internet Naming Service).

The Webster's definition does raise a question (and begs one, too). Is the "word" an acronym forms a real, already existing word, or intended to be accepted as a new "word," or just something easily pronounceable? If the first case, then "snafu" and "radar" really aren't acronyms. If the second or third case, they are. However, since any initialism can be thought of as a word and certainly has to be pronounceable so you can say it out loud, one could argue that any initialism is an acronym. We don't think anyone has looked at this issue squarely (and we're not planning to ourselves, but just wanted to demonstrate the ambiguous kind of world we live in...which is why most people frankly don't care whether an acronym is a word or not).

But getting back to anacronyms, they seem to be forming at an alarming rate. Do you remember what this mixture of acronyms and initialisms stand for?

This was last updated in September 2005
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

  • promiscuous mode

    In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close