Browse Definitions :

Browse Definitions by Alphabet

COM - CON

  • Component Object Model - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • Component Object Model (COM) - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • Component Object Model + - COM+ is an extension of Component Object Model (COM), Microsoft's strategic building block approach for developing application programs.
  • component video - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
  • componentization (component-based development) - Componentization is an approach to software development that involves breaking software down into identifiable pieces that application developers independently write and deploy.
  • composable infrastructure - A composable infrastructure is a framework that decouples device resources in order to treat them as services.
  • composite video - Composite video, also called baseband video or RCA video, is the analog waveform that conveys the image data in a conventional National Television Standards Committee (NTSC) television signal.
  • compositing - Compositing used to create layered images and video in advertisements, memes and other content for print publications, websites and apps.
  • composition - Here is a list of the seven elementary rules of English usage and 11 elementary principles of composition from William Strunk, Jr.
  • compound - In chemistry, a compound is a substance that results from a combination of two or more different chemical elements, in such a way that the atoms of the different elements are held together by chemical bonds that are difficult to break.
  • compound document - In information technology, a compound document is an organized collection of user interfaces that form a single integrated perceptual environment.
  • compressed - Data compression is a reduction in the number of bits needed to represent data.
  • compressed air - Compressed air is a gas, or a combination of gases, that has been put under greater pressure than the air in the general environment.
  • compressed air energy storage - Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers.
  • compressed air energy storage (CAES) - Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers.
  • CompTIA (Computing Technology Industry Association) - CompTIA is a non-profit trade association known for its IT certification exams and test preparation courses.
  • CompTIA Cloud Essentials - CompTIA Cloud Essentials is an entry-level, vendor-neutral cloud certification.
  • CompTIA Network+ - The CompTIA Network+ is an IT certification exam that confirms an individual possesses the skills in networking required to develop a career in IT infrastructure.
  • CompTIA Project+ - CompTIA Project + is the Computing Technology Industry Association’s certification program designed to demonstrate validated learning and skills in project management.
  • CompTIA Security+ - CompTIA Security+ is a certification that demonstrates a person's competency with core security practices and functions that are carried out in IT security roles.
  • computational creativity (artificial creativity) - Computational creativity (artificial creativity), is the application of computer technologies to emulate, study, stimulate and enhance human creativity.
  • computational economics - Computational economics is a field of economic study at the intersection of computer science, economics and management science.
  • computational fluid dynamics (CFD) - Computational fluid dynamics (CFD) is the use of applied mathematics, physics and computational software to visualize how a gas or liquid flows -- as well as how the gas or liquid affects objects as it flows past.
  • computational grid - Grid computing uses small, distributed resources from servers and PCs to solve big problems.
  • computational law - Computational law is the area of legal informatics focusing on the automation of formerly manual processes and the integration of legal information with other applications and systems.
  • computational linguistics (CL) - Computational linguistics is the application of computer science to the analysis, synthesis, and comprehension of written and spoken language.
  • computational origami - Computational origami is a type of computer program for modeling the ways in which various materials, including paper, can be folded.
  • computational photography - Computational photography is the use of computer processing capabilities in cameras to produce an enhanced image beyond what the lens and sensor pics up in a single shot.
  • computational storage - Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to reduce the amount of data that has to move between the storage plane and the compute plane.
  • Compute Card (Intel Compute Card) - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • Compute Intensive Workload - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • compute-intensive - Compute-intensive is a term that applies to any computer application that demands a lot of computation, such as meteorology programs and other scientific applications.
  • Computed Dental Radiography - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
  • Computed Dental Radiography (CDR) - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
  • computer - A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.
  • computer aided design - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • computer aided design - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • computer aided engineering - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • computer aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • Computer aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • computer aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • Computer Aided Test Tool - CATT (Computer Aided Test Tool) is a test tool in the ABAP Workbench package from SAP, part of its popular R/3 system.
  • computer assisted coding system - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer barnacle - In a computer, a barnacle is unwanted programming, such as adware or spyware, that is downloaded and installed along with a user-requested program.
  • computer based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer cracker - A computer cracker is an outdated term used to describe someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
  • Computer Emergency Readiness Team - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • Computer Emergency Response Team (CERT) - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • computer exploit - A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders.
  • computer file - In data processing, using an office metaphor, a file is a related collection of records.
  • computer forensics - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • computer forensics (cyber forensics) - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • Computer Fraud and Abuse Act (CFAA) - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • computer hallucination - Computer hallucinations are interpretation errors in artificial intelligence (AI) machine vision and machine learning technology.
  • computer hardware - Computer hardware is a collective term used to describe any of the physical components of an analog or digital computer.
  • computer hardware chart - This handy computer hardware quick look-up was designed by Sonic84.
  • Computer history museum guide - Computer history museum guide.
  • Computer Intensive Workload - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • Computer Misuse Act 1990 - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
  • Computer Misuse Act 1990 (CMA) - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
  • computer network - A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
  • computer numerical control (CNC) - Computer numerical control (CNC) is a method for automating machine tools through software embedded in an attached microcomputer.
  • computer operator - A computer operator is the person responsible for monitoring and controlling computer systems especially mainframe computer systems in a company or organization.
  • Computer Output to Laser Disk - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
  • computer pidgin language - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
  • computer pidgin language (CPL) - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
  • computer room air conditioning unit - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • computer room air conditioning unit (CRAC) - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • computer room air handler - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • computer room air handler (CRAH) - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • computer security incident response team (CSIRT) - A computer security incident response team, or CSIRT, is a group of IT professionals that provides an organization with services and support surrounding the assessment, management and prevention of cybersecurity-related emergencies, as well as coordination of incident response efforts.
  • computer telephony integration - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • Computer to computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • computer worm - A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  • computer-aided design - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • computer-aided engineering - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • computer-aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • computer-aided manufacturing - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • Computer-aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • Computer-aided process planning (CAPP) - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • computer-aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-aided software engineering (CASE) - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-assisted software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • Computer-based Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • computer-based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer-based training (CBT) - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • Computer-Supported Cooperative Work - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • computer-telephony integration - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • Computer-to-computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • computerized maintenance management system (CMMS) - A computerized maintenance management system (CMMS) is software that helps operations and maintenance staff identify and track the status of maintenance tasks and availability of replacement parts.
  • computerized physician order entry - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • computerized physician order entry (CPOE) - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • computing arbitrage - Computing arbitrage is a cloud services business model in which a company purchases computing resources -- typically a large block of bandwidth – at wholesale rates and offers it in smaller packages, with a greater cumulative value, to other companies.
  • Computing Basics Quizzes - We've gathered quizzes to test your knowledge of computing fundamentals.
  • COMSEC (communications security) - Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic, or to any information that is transmitted or transferred.
  • concatenate - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenating - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenation - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenation (concatenate, concatenating) - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close