Browse Definitions :

Browse Definitions by Alphabet

COM - CON

  • CompTIA Network+ - The CompTIA Network+ is an IT certification exam that confirms an individual possesses the skills in networking required to develop a career in IT infrastructure.
  • CompTIA Project+ - CompTIA Project + is the Computing Technology Industry Association’s certification program designed to demonstrate validated learning and skills in project management.
  • CompTIA Security+ - CompTIA Security+ is a certification that demonstrates a person's competency with core security practices and functions that are carried out in IT security roles.
  • computational creativity (artificial creativity) - Computational creativity (artificial creativity), is the application of computer technologies to emulate, study, stimulate and enhance human creativity.
  • computational economics - Computational economics is a field of economic study at the intersection of computer science, economics and management science.
  • computational fluid dynamics (CFD) - Computational fluid dynamics (CFD) is the use of applied mathematics, physics and computational software to visualize how a gas or liquid flows -- as well as how the gas or liquid affects objects as it flows past.
  • computational grid - Grid computing uses small, distributed resources from servers and PCs to solve big problems.
  • computational law - Computational law is the area of legal informatics focusing on the automation of formerly manual processes and the integration of legal information with other applications and systems.
  • computational linguistics (CL) - Computational linguistics is the application of computer science to the analysis, synthesis, and comprehension of written and spoken language.
  • computational photography - Computational photography is the use of computer processing capabilities in cameras to produce an enhanced image beyond what the lens and sensor pics up in a single shot.
  • computational storage - Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to reduce the amount of data that has to move between the storage plane and the compute plane.
  • Compute Card (Intel Compute Card) - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • compute-intensive - Compute-intensive is a term that applies to any computer application that demands a lot of computation, such as meteorology programs and other scientific applications.
  • Computed Dental Radiography - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
  • Computed Dental Radiography (CDR) - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
  • computer - A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.
  • computer aided design - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • computer aided design - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • computer aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • Computer aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • computer aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer assisted coding system - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer cracker - A computer cracker is an outdated term used to describe someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
  • Computer Emergency Readiness Team - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • Computer Emergency Response Team (CERT) - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • computer exploit - A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders.
  • computer file - In data processing, using an office metaphor, a file is a related collection of records.
  • computer forensics - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • computer forensics (cyber forensics) - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • Computer Fraud and Abuse Act (CFAA) - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • computer hallucination - Computer hallucinations are interpretation errors in artificial intelligence (AI) machine vision and machine learning technology.
  • computer hardware - Computer hardware is a collective term used to describe any of the physical components of an analog or digital computer.
  • computer network - A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
  • computer numerical control (CNC) - Computer numerical control (CNC) is a method for automating control of machine tools through the use of software embedded in a microcomputer attached to the tool.
  • computer operator - A computer operator is the person responsible for monitoring and controlling computer systems especially mainframe computer systems in a company or organization.
  • Computer Output to Laser Disk - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
  • computer room air conditioning unit - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • computer room air conditioning unit (CRAC) - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • computer room air handler - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • computer room air handler (CRAH) - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • computer security incident response team (CSIRT) - A computer security incident response team, or CSIRT, is a group of IT professionals that provides an organization with services and support surrounding the assessment, management and prevention of cybersecurity-related emergencies, as well as coordination of incident response efforts.
  • Computer to computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • computer worm - A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  • computer-aided design - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • computer-aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • Computer-aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • Computer-aided process planning (CAPP) - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • computer-aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-aided software engineering (CASE) - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-assisted software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • Computer-based Discovery - Electronic discovery -- also called e-discovery or ediscovery -- refers to any process of obtaining and exchanging evidence in a civil or criminal legal case.
  • computer-based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer-based training (CBT) - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • Computer-Supported Cooperative Work - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • Computer-to-computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • computerized maintenance management system (CMMS) - A computerized maintenance management system (CMMS) is software that helps operations and maintenance staff identify and track the status of maintenance tasks and availability of replacement parts.
  • computerized physician order entry - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • computerized physician order entry (CPOE) - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • computing arbitrage - Computing arbitrage is a cloud services business model in which a company purchases computing resources -- typically a large block of bandwidth – at wholesale rates and offers it in smaller packages, with a greater cumulative value, to other companies.
  • COMSEC (communications security) - Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic, or to any information that is transmitted or transferred.
  • concatenate - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenating - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenation - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenation (concatenate, concatenating) - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concentrated solar power (CSP) - Concentrated solar power (CSP) is an approach to generating electricity in which mirrors are used to reflect, concentrate and focus sunlight onto a specific point.
  • concentration ratio (CR) - A concentration ratio (CR) is a metric used in economics to express the distribution of companies in a particular industry relative to the size of the market.
  • concept map - A concept map is a graphical tool for organizing and representing knowledge.
  • concept mining - Concept mining is the process of searching documents or unstructured text for ideas and topics.
  • concurrent processing - Concurrent processing is a computing model in which multiple processors execute instructions simultaneously for better performance.
  • Concurrent Versions System - CVS also is an abbreviation for Computer Vision Syndrome.
  • Concurrent Versions System (CVS) - CVS also is an abbreviation for Computer Vision Syndrome.
  • conduct risk - Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's administrators and employees.
  • conductance - Conductance is an expression of the ease with which electric current flows through materials like metals and nonmetals.
  • conductor - ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage.
  • Conduit browser hijacker - Conduit is a browser hijacker that is usually installed without the user’s knowledge through a drive-by download.
  • cone of uncertainty - The cone of uncertainty is a project management tool that explains why estimates become more accurate over the span of a project's lifecycle.
  • conferencing over Internet Protocol - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • confidential computing - Confidential computing is a concept that prioritizes software and hardware-based security -- specifically pertaining to data in the cloud.
  • confidentiality - Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.
  • confidentiality, integrity and availability (CIA triad) - Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.
  • CONFIG.SYS - CONFIG.SYS is a text file containing DOS (Disk Operating System) commands that tell the operating system how the computer is initially set up.
  • configuration - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • configuration drift - Configuration drift occurs naturally in data center environments when changes to software and hardware are not recorded or tracked in a comprehensive and systematic fashion.
  • configuration file - A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.
  • configuration item - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • configuration management - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
  • configuration management database - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • configuration management software - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • configuration profile (CP) - A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device.
  • configuration service provider (CSP) - A configuration service provider (CSP) is a component of the Windows client operating system that shows IT professionals potential device configuration choices and allows them to apply the settings across multiple Windows OSes.
  • configure - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • confirmation bias - Confirmation bias is a cognitive error in which information that supports a pre-existing belief is assigned more value than other information.
  • conformance testing - Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards.
  • conformed dimension - In data warehousing, a conformed dimension is a dimension that has the same meaning to every fact with which it relates.
  • confusion matrix - A confusion matrix is a table that outlines different predictions and test results and contrasts them with real world values.
  • conglomerate - A conglomerate is a company that comprises multiple different corporations.
  • conjunction - A conjunction is a word used to connect words, phrases and clauses.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close