Browse Definitions :

Browse Definitions by Alphabet

COM - CON

  • computer file - In data processing, using an office metaphor, a file is a related collection of records.
  • computer forensics - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • computer forensics (cyber forensics) - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • Computer Fraud and Abuse Act (CFAA) - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • computer hallucination - Computer hallucinations are interpretation errors in artificial intelligence (AI) machine vision and machine learning technology.
  • computer hardware - Computer hardware is a collective term used to describe any of the physical components of an analog or digital computer.
  • computer hardware chart - This handy computer hardware quick look-up was designed by Sonic84.
  • Computer history museum guide - Computer history museum guide.
  • Computer Intensive Workload - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • Computer Misuse Act 1990 - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
  • Computer Misuse Act 1990 (CMA) - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
  • computer network - A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
  • computer numerical control (CNC) - Computer numerical control (CNC) is a method for automating machine tools through software embedded in an attached microcomputer.
  • computer operator - A computer operator is the person responsible for monitoring and controlling computer systems especially mainframe computer systems in a company or organization.
  • Computer Output to Laser Disk - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
  • computer pidgin language - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
  • computer pidgin language (CPL) - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
  • computer room air conditioning unit - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • computer room air conditioning unit (CRAC) - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • computer room air handler - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • computer room air handler (CRAH) - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • computer security incident response team (CSIRT) - A computer security incident response team, or CSIRT, is a group of IT professionals that provides an organization with services and support surrounding the assessment, management and prevention of cybersecurity-related emergencies, as well as coordination of incident response efforts.
  • computer telephony integration - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • Computer to computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • computer worm - A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining active on infected systems.
  • computer-aided design - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • computer-aided engineering - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • computer-aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • computer-aided manufacturing - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • Computer-aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • Computer-aided process planning (CAPP) - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • computer-aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-aided software engineering (CASE) - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-assisted software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • Computer-based Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • computer-based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer-based training (CBT) - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer-intensive - Computer-intensive is a term that applies to any computing application that requires the resources of a lot of computers, such as grid computing.
  • Computer-Supported Cooperative Work - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • computer-telephony integration - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • Computer-to-computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • computerized maintenance management system (CMMS) - A computerized maintenance management system (CMMS) is software that helps operations and maintenance staff identify and track the status of maintenance tasks and availability of replacement parts.
  • computerized physician order entry - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • computerized physician order entry (CPOE) - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • computing arbitrage - Computing arbitrage is a cloud services business model in which a company purchases computing resources -- typically a large block of bandwidth – at wholesale rates and offers it in smaller packages, with a greater cumulative value, to other companies.
  • Computing Basics Quizzes - We've gathered quizzes to test your knowledge of computing fundamentals.
  • COMSEC (communications security) - Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic, or to any information that is transmitted or transferred.
  • concatenate - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenating - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenation - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenation (concatenate, concatenating) - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concentrated solar power (CSP) - Concentrated solar power (CSP) is an approach to generating electricity in which mirrors are used to reflect, concentrate and focus sunlight onto a specific point.
  • concentration - Amount of substance concentration, often called simply concentration, is a quantitative measure of the number of atoms per unit volume in a sample of a matter.
  • concentration ratio (CR) - A concentration ratio (CR) is a metric used in economics to express the distribution of companies in a particular industry relative to the size of the market.
  • concentrator - As generally used, a concentrator is a device that acts as an efficient forwarder of data transmission signals.
  • concept map - A concept map is a graphical tool for organizing and representing knowledge.
  • concept mining - Concept mining is the process of searching documents or unstructured text for ideas and topics.
  • concurrent processing - Concurrent processing is a computing model in which multiple processors execute instructions simultaneously for better performance.
  • Concurrent Versions System - CVS also is an abbreviation for Computer Vision Syndrome.
  • Concurrent Versions System (CVS) - CVS also is an abbreviation for Computer Vision Syndrome.
  • conditional access - Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.
  • conduct risk - Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's administrators and employees.
  • conductance - Conductance is an expression of the ease with which electric current flows through a substance.
  • conductive metal oxide technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductive metal-oxide (CMOx) technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductive metal-oxide technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductor - ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage.
  • Conduit browser hijacker - Conduit is a browser hijacker that is usually installed without the user’s knowledge through a drive-by download.
  • cone of uncertainty - The cone of uncertainty is a project management tool that explains why estimates become more accurate over the span of a project's lifecycle.
  • conferencing over Internet Protocol - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • confidential computing - Confidential computing is a concept that prioritizes software and hardware-based security -- specifically pertaining to data in the cloud.
  • confidentiality - Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.
  • confidentiality, integrity and availability (CIA triad) - Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.
  • CONFIG.SYS - CONFIG.SYS is a text file containing DOS (Disk Operating System) commands that tell the operating system how the computer is initially set up.
  • configuration - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • configuration drift - Configuration drift occurs naturally in data center environments when changes to software and hardware are not recorded or tracked in a comprehensive and systematic fashion.
  • configuration file - A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.
  • configuration item - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • configuration management - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
  • configuration management database - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • configuration management software - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • configuration profile (CP) - A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device.
  • configuration service provider (CSP) - A configuration service provider (CSP) is a component of the Windows client operating system that shows IT professionals potential device configuration choices and allows them to apply the settings across multiple Windows OSes.
  • configure - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • confirmation bias - Confirmation bias is a cognitive error in which information that supports a pre-existing belief is assigned more value than other information.
  • conformance testing - Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards.
  • conformed dimension - In data warehousing, a conformed dimension is a dimension that has the same meaning to every fact with which it relates.
  • confusion matrix - A confusion matrix is a table that outlines different predictions and test results and contrasts them with real world values.
  • conglomerate - A conglomerate is a company that comprises multiple different corporations.
  • conjunction - A conjunction is a word used to connect words, phrases and clauses.
  • connection - In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance.
  • connection broker - In desktop virtualization, a connection broker is a software program that allows the end-user to connect to an available desktop.
  • connection-oriented - In telecommunications, connection-oriented describes a means of transmitting data in which the devices at the end points use a preliminary protocol to establish an end-to-end connection before any data is sent.
  • connectionless - In telecommunication, connectionless describes communication between two network end points in which a message can be sent from one end point to another without prior arrangement.
  • Connector ODBC - MySQL Connector/ODBC (sometimes called just Connector ODBC or MyODBC) is a driver for connecting to a MySQL database server through the Open Database Connectivity (ODBC) application program interface (API), which is the standard means of connecting to any database.
  • Connector/ODBC - MySQL Connector/ODBC (sometimes called just Connector ODBC or MyODBC) is a driver for connecting to a MySQL database server through the Open Database Connectivity (ODBC) application program interface (API), which is the standard means of connecting to any database.
  • Conseil Europeen pour la Recherche Nucleaire - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
  • consensus algorithm - A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
  • conservation of angular momentum - Conservation of angular momentum is a physical property of a spinning system such that its spin remains constant unless it is acted upon by an external torque; put another way, the speed of rotation is constant as long as net torque is zero.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close