Browse Definitions :

Browse Definitions by Alphabet

COM - CON

  • computational origami - Computational origami is a type of computer program for modeling the ways in which various materials, including paper, can be folded.
  • computational photography - Computational photography is the use of computer processing capabilities in cameras to produce an enhanced image beyond what the lens and sensor pics up in a single shot.
  • computational reflection - Computational reflection (sometimes just called reflection) is a computer process involving self-awareness.
  • computational storage - Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to reduce the amount of data that has to move between the storage plane and the compute plane.
  • Compute Card (Intel Compute Card) - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • Compute Intensive Workload - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • compute-intensive - Compute-intensive is a term that applies to any computer application that demands a lot of computation, such as meteorology programs and other scientific applications.
  • Computed Dental Radiography - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
  • Computed Dental Radiography (CDR) - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
  • computer - A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.
  • computer aided design - CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
  • computer aided design - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • computer aided engineering - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • computer aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • Computer aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • computer aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • Computer Aided Test Tool - CATT (Computer Aided Test Tool) is a test tool in the ABAP Workbench package from SAP, part of its popular R/3 system.
  • computer assisted coding system - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer barnacle - In a computer, a barnacle is unwanted programming, such as adware or spyware, that is downloaded and installed along with a user-requested program.
  • computer based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • Computer Emergency Readiness Team - CERT (pronounced SUHRT), officially called the CERT Coordination Center, is the Internet's official emergency team.
  • Computer Emergency Response Team (CERT) - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • computer exploit - A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders.
  • computer file - In data processing, using an office metaphor, a file is a related collection of records.
  • computer forensics - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • computer forensics (cyber forensics) - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • Computer Fraud and Abuse Act (CFAA) - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • computer hallucination - Computer hallucinations are interpretation errors in artificial intelligence (AI) machine vision and machine learning technology.
  • computer hardware - Computer hardware is a collective term used to describe any of the physical components of an analog or digital computer.
  • computer hardware chart - This handy computer hardware quick look-up was designed by Sonic84.
  • Computer History Museum - The Computer History Museum is an institution dedicated to the preservation of artifacts and information related to the development of computers.
  • Computer history museum guide - Computer history museum guide.
  • Computer Intensive Workload - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • Computer Misuse Act 1990 - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
  • Computer Misuse Act 1990 (CMA) - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
  • computer network - A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
  • computer numerical control (CNC) - Computer numerical control (CNC) is a method for automating machine tools through software embedded in an attached microcomputer.
  • computer operator - A computer operator is the person responsible for monitoring and controlling computer systems especially mainframe computer systems in a company or organization.
  • Computer Output to Laser Disk - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
  • computer pidgin language - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
  • computer pidgin language (CPL) - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
  • computer room air conditioning unit - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • computer room air conditioning unit (CRAC) - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • computer room air handler - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • computer room air handler (CRAH) - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • Computer Security Incident Response Team (CSIRT) - A Computer Security Incident Response Team (CSIRT) is a group of IT professionals that provides an organization with services and support surrounding the prevention, management and coordination of potential cybersecurity-related emergencies.
  • computer telephony integration - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • Computer to computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • computer worm - A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining active on infected systems.
  • computer-aided design - CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
  • computer-aided engineering - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • computer-aided manufacturing - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • computer-aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • Computer-aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • Computer-aided process planning (CAPP) - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • computer-aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-aided software engineering (CASE) - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-assisted software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • Computer-based Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • computer-based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer-based training (CBT) - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer-intensive - Computer-intensive is a term that applies to any computing application that requires the resources of a lot of computers, such as grid computing.
  • Computer-Supported Cooperative Work - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • computer-telephony integration - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • Computer-to-computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • computerized maintenance management system (CMMS) - A computerized maintenance management system (CMMS) is software that helps operations and maintenance staff identify and track the status of maintenance tasks and availability of replacement parts.
  • computerized physician order entry - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • computerized physician order entry (CPOE) - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • computing arbitrage - Computing arbitrage is a cloud services business model in which a company purchases computing resources -- typically a large block of bandwidth – at wholesale rates and offers it in smaller packages, with a greater cumulative value, to other companies.
  • Computing Basics Quizzes - We've gathered quizzes to test your knowledge of computing fundamentals.
  • COMSEC (communications security) - Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic, or to any information that is transmitted or transferred.
  • concatenate - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenating - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenation - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concatenation (concatenate, concatenating) - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concentrated solar power (CSP) - Concentrated solar power (CSP) is an approach to generating electricity in which mirrors are used to reflect, concentrate and focus sunlight onto a specific point.
  • concentration - Amount of substance concentration, often called simply concentration, is a quantitative measure of the number of atoms per unit volume in a sample of a matter.
  • concentration ratio (CR) - A concentration ratio (CR) is a metric used in economics to express the distribution of companies in a particular industry relative to the size of the market.
  • concentrator - As generally used, a concentrator is a device that acts as an efficient forwarder of data transmission signals.
  • concept map - A concept map is a graphical tool for organizing and representing knowledge.
  • concept mining - Concept mining is the process of searching documents or unstructured text for ideas and topics.
  • concurrent processing - Concurrent processing is a computing model in which multiple processors execute instructions simultaneously for better performance.
  • Concurrent Versions System - CVS also is an abbreviation for Computer Vision Syndrome.
  • Concurrent Versions System (CVS) - CVS also is an abbreviation for Computer Vision Syndrome.
  • conditional access - Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.
  • conditional access (CA) - Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.
  • conduct risk - Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's administrators and employees.
  • conductance - Conductance is an expression of the ease with which electric current flows through a substance.
  • conductive metal oxide technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductive metal-oxide (CMOx) technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductive metal-oxide technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductor - ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage.
  • Conduit browser hijacker - Conduit is a browser hijacker that is usually installed without the user’s knowledge through a drive-by download.
  • cone of uncertainty - The cone of uncertainty is a project management tool that illustrates the fact that the accuracy of estimates increases over the span of the project.
  • conferencing over Internet Protocol - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • confidential computing - Confidential computing is a concept that prioritizes software and hardware-based security -- specifically pertaining to data in the cloud.
  • confidentiality - Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.
  • confidentiality, integrity and availability (CIA triad) - Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close