Browse Definitions :

Browse Definitions by Alphabet

COM - CON

  • Computed Dental Radiography (CDR) - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
  • computer - A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.
  • computer aided design - CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
  • computer aided design - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • computer aided engineering - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • computer aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • Computer aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • computer aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • Computer Aided Test Tool - CATT (Computer Aided Test Tool) is a test tool in the ABAP Workbench package from SAP, part of its popular R/3 system.
  • computer assisted coding system - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer barnacle - In a computer, a barnacle is unwanted programming, such as adware or spyware, that is downloaded and installed along with a user-requested program.
  • computer based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • Computer Emergency Readiness Team - CERT (pronounced SUHRT), officially called the CERT Coordination Center, is the Internet's official emergency team.
  • Computer Emergency Response Team (CERT) - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • computer exploit - A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders.
  • computer file - In data processing, using an office metaphor, a file is a related collection of records.
  • computer forensics - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • computer forensics (cyber forensics) - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • Computer Fraud and Abuse Act (CFAA) - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • computer hallucination - Computer hallucinations are interpretation errors in artificial intelligence (AI) machine vision and machine learning technology.
  • computer hardware - Computer hardware is a collective term used to describe any of the physical components of an analog or digital computer.
  • computer hardware chart - This handy computer hardware quick look-up was designed by Sonic84.
  • Computer History Museum - The Computer History Museum is an institution dedicated to the preservation of artifacts and information related to the development of computers.
  • Computer history museum guide - Computer history museum guide.
  • Computer Intensive Workload - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • Computer Misuse Act 1990 - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
  • Computer Misuse Act 1990 (CMA) - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
  • computer network - A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
  • computer numerical control (CNC) - Computer numerical control (CNC) is a method for automating machine tools through software embedded in an attached microcomputer.
  • computer operator - A computer operator is the person responsible for monitoring and controlling computer systems especially mainframe computer systems in a company or organization.
  • Computer Output to Laser Disk - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
  • computer pidgin language - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
  • computer pidgin language (CPL) - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
  • computer room air conditioning unit - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • computer room air conditioning unit (CRAC) - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • computer room air handler - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • computer room air handler (CRAH) - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • Computer Security Incident Response Team (CSIRT) - A Computer Security Incident Response Team (CSIRT) is a group of IT professionals that provides an organization with services and support surrounding the prevention, management and coordination of potential cybersecurity-related emergencies.
  • computer telephony integration - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • Computer to computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • computer-aided design - CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
  • computer-aided engineering - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • computer-aided manufacturing - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • computer-aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • Computer-aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • Computer-aided process planning (CAPP) - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • computer-aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-aided software engineering (CASE) - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-assisted software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • Computer-based Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • computer-based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer-based training (CBT) - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer-intensive - Computer-intensive is a term that applies to any computing application that requires the resources of a lot of computers, such as grid computing.
  • Computer-Supported Cooperative Work - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • computer-telephony integration - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • Computer-to-computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • computerized maintenance management system (CMMS) - A computerized maintenance management system (CMMS) is software that helps operations and maintenance staff identify and track the status of maintenance tasks and availability of replacement parts.
  • computerized physician order entry - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • computerized physician order entry (CPOE) - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • computing arbitrage - Computing arbitrage is a cloud services business model in which a company purchases computing resources -- typically a large block of bandwidth – at wholesale rates and offers it in smaller packages, with a greater cumulative value, to other companies.
  • COMSEC (communications security) - Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic, or to any information that is transmitted or transferred.
  • concatenate - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenating - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenation - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenation (concatenate, concatenating) - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concentrated solar power (CSP) - Concentrated solar power (CSP) is an approach to generating electricity in which mirrors are used to reflect, concentrate and focus sunlight onto a specific point.
  • concentration - Amount of substance concentration, often called simply concentration, is a quantitative measure of the number of atoms per unit volume in a sample of a matter.
  • concentration ratio (CR) - A concentration ratio (CR) is a metric used in economics to express the distribution of companies in a particular industry relative to the size of the market.
  • concentrator - As generally used, a concentrator is a device that acts as an efficient forwarder of data transmission signals.
  • concept map - A concept map is a graphical tool for organizing and representing knowledge.
  • concept mining - Concept mining is the process of searching documents or unstructured text for ideas and topics.
  • concurrent processing - Concurrent processing is a computing model in which multiple processors execute instructions simultaneously for better performance.
  • Concurrent Versions System - CVS also is an abbreviation for Computer Vision Syndrome.
  • Concurrent Versions System (CVS) - CVS also is an abbreviation for Computer Vision Syndrome.
  • conditional access - Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.
  • conditional access (CA) - Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.
  • conduct risk - Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's administrators and employees.
  • conductance - Conductance is an expression of the ease with which electric current flows through a substance.
  • conductive metal oxide technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductive metal-oxide (CMOx) technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductive metal-oxide technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductor - ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage.
  • Conduit browser hijacker - Conduit is a browser hijacker that is usually installed without the user’s knowledge through a drive-by download.
  • cone of uncertainty - The cone of uncertainty is a project management tool that illustrates the fact that the accuracy of estimates increases over the span of the project.
  • conferencing over Internet Protocol - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • confidential computing - Confidential computing is a concept that prioritizes software and hardware-based security -- specifically pertaining to data in the cloud.
  • confidentiality - Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.
  • confidentiality, integrity, and availability (CIA triad) - Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.
  • CONFIG.SYS - CONFIG.SYS is a text file containing DOS (Disk Operating System) commands that tell the operating system how the computer is initially set up.
  • configuration - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • configuration drift - Configuration drift occurs naturally in data center environments when changes to software and hardware are not recorded or tracked in a comprehensive and systematic fashion.
  • configuration file - A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.
  • configuration item - A configuration management database (CMDB) is a database that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships between those components.
  • configuration management - Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.
  • configuration management (CM) - Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.
  • configuration management database - A configuration management database (CMDB) is a database that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships between those components.
  • configuration management software - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • configuration profile (CP) - A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close