Browse Definitions :

Browse Definitions by Alphabet

COU - CRO

  • courseware - Courseware is educational material intended as kits for teachers or trainers or as tutorials for students, usually packaged for use with a computer.
  • courtesy copy - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • covert redirect - Covert redirect is a security flaw that allows attackers to exploit an open redirect vulnerability.
  • COVID-19 Glossary for Employers and HR Managers - We will be updating this pandemic glossary frequently over the next few weeks to help you use consistent vocabulary in your crisis communication emails, newsletters, phone scripts and telecommuter updates.
  • cow power - Cow power is a term for the conversion of manure to usable energy.
  • cow power (biogas) - Cow power is a term for the conversion of manure to usable energy.
  • cowboy coding - Cowboy coding describes an undisciplined approach to software development.
  • coworking - Coworking is a business services provision model that involves individuals working independently or collaboratively in shared office space.
  • cPanel (cPanel Control Panel) - cPanel is a Unix-based control panel that automates and simplifies the website hosting process.
  • CPCA - The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state.
  • CPE - Customer premises equipment (CPE) is telephone or other service provider equipment that is located on the customer's premises (physical location) rather than on the provider's premises or in between.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • CPI - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • CPIO - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
  • CPL - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
  • CPM - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
  • CPM - Corporate performance management (CPM) is the area of business intelligence involved with monitoring and managing an organization's performance.
  • CPNI - In the United States, CPNI (Customer Proprietary Network Information) is information that telecommunications services such as local, long distance, and wireless telephone companies acquire about their subscribers.
  • CPNI (Customer Proprietary Network Information) - In the United States, CPNI (Customer Proprietary Network Information) is information that telecommunications services such as local, long distance, and wireless telephone companies acquire about their subscribers.
  • CPOE - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • CPQ software (configure price quote software) - CPQ (configure, price, quote) is programming that helps sales representatives and self-service customers quickly generate accurate quotes for configurable products and services.
  • CPRI (Common Public Radio Interface) - CPRI (Common Public Radio Interface) is a specification for wireless communication networks in the interface between radio equipment and radio equipment control.
  • CPRM - Content Protection for Removable Media (CPRM) is a hardware-based technology designed to enforce copy protection restrictions through built-in mechanisms in storage media that would prevent unauthorized file copying.
  • CPS - Cps (cycles per second) is the measure of how frequently an alternating current changes direction.
  • CPT - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
  • CPU - CPU (central processing unit) is an older term for processor and microprocessor, the central unit in a computer containing the logic circuitry that performs the instructions of a computer's programs.
  • CPW - CPW (Commercial Processing Workload) is a measure used in IBM's AS/400 and iSeries line of computers to compare computer system models in terms of how efficiently each system processes a typical workload of commercial applications involving frequent database access.
  • CPW (Commercial Processing Workload) - CPW (Commercial Processing Workload) is a measure used in IBM's AS/400 and iSeries line of computers to compare computer system models in terms of how efficiently each system processes a typical workload of commercial applications involving frequent database access.
  • CQRS (command query responsibility segregation) - Command query responsibility segregation (CQRS) is a programming design pattern that treats retrieving data and changing data differently.
  • CR - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones.
  • CRAC - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • CrackBerry - CrackBerry is a nickname for the BlackBerry handheld device.
  • cracker - A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
  • cracking - Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
  • CRAH - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • CRAM - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • CRAM (challenge-response authentication mechanism) - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • cramming - Cramming is the addition of unexpected or unauthorized charges to a bill for landline or mobile telephone service.
  • crapware - Definition - What is crapware?Crapware is an unflattering name for unwanted software or software that doesn't perform as expected.
  • crash - A crash is the sudden failure of a software application or operating system or of a hardware device such as a hard disk.
  • Crash Course: Spyware - In general, spyware is any technology that aids in gathering information about a person or organization without their knowledge.
  • CrashPlan - Code42 Software's CrashPlan data protection software comes in home, small business and enterprise versions.
  • crawl depth - Crawl depth is the extent to which a search engine indexes pages within a website.
  • crawler - A crawler is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • Cray Inc. - Cray Inc. is a pioneering computer company that was founded as Cray Research in 1972 by Seymour Cray, who is known as the father of the supercomputer.
  • CRC - Cyclic redundancy checking is a method of checking for errors in data that has been transmitted on a communications link.
  • CRC - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
  • CRC 4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking (a method of checking for errors in transmitted data) that is used on E-1 trunk lines.
  • CRC-4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking (a method of checking for errors in transmitted data) that is used on E-1 trunk lines.
  • CRC-4 (Cyclic Redundancy Check 4) - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking (a method of checking for errors in transmitted data) that is used on E-1 trunk lines.
  • create read update delete - The CRUD cycle describes the elemental functions of a persistent database in a computer.
  • Creative Commons - Creative Commons is a nonprofit organization that offers copyright licenses for digital work.
  • creative destruction - Creative destruction is a process through which something new brings about the demise of whatever existed before it.
  • credential prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • credential session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • credential stuffing - Credential stuffing is the practice of using stolen login information from one account to gain access to accounts on a number of sites through automated login.
  • credential/session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • Credit Card Accountability, Responsibility, and Disclosure Act - The Credit CARD Act is legislation governing the behavior of credit card companies in the United States.
  • Credit CARD Act - The Credit CARD Act is legislation governing the behavior of credit card companies in the United States.
  • Credit CARD Act (Credit Card Accountability, Responsibility, and Disclosure Act of 2009) - The Credit CARD Act is legislation governing the behavior of credit card companies in the United States.
  • creeping featuritis - Feature creep (sometimes known as requirements creep or scope creep) is a tendency for product or project requirements to increase during development beyond those originally foreseen, leading to features that weren't originally planned and resulting risk to product quality or schedule.
  • creepy whisper - Directional sound is a technology that concentrates acoustic energy into a narrow beam so that it can be projected to a discrete area, much as a laser focuses light.
  • crimeware - Crimeware is programming that is designed to facilitate illegal online activity.
  • crimeware kit - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
  • crippleware - Crippleware is any software program that cannot be fully utilized until the user registers or, in the case of shareware, purchases the program.
  • crisis communication - Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with the information they need to respond to the situation.
  • crisis management - Crisis management is the application of strategies designed to help an organization deal with a sudden and significant negative event.
  • crisis management plan (CMP) - A crisis management plan (CMP) outlines how to respond to a critical situation that would negatively affect an organization's profitability, reputation or ability to operate.
  • critical infrastructure - Critical infrastructure is the body of systems, networks and assets that are so essential that their continued operation is required to ensure the security of a given nation, its economy, and the public’s health and/or safety.
  • critical infrastructure and key resources (CIKR) - Critical infrastructure and key resources (CIKR) is the collective of natural and man-made resources, along with the systems for their processing and delivery, upon which a nation depends on for functioning.
  • critical infrastructure security - Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or safety.
  • critical path - The critical path is the longest sequence of tasks in a project plan.
  • critical path method - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
  • critical path method (CPM) - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
  • critical section routine - In computers, a critical section routine is an approach to the problem of two or more programs competing for the same resource at the same time.
  • critical success factors - Critical success factors are a limited number of key variables or conditions that have a tremendous impact on how successfully and effectively an organization meets its mission or the strategic goals or objectives of a program or project.
  • critical thinking - Critical thinking is the capacity to be objective, rational and analytical about subjects, situations and cognitive problems.
  • CRL - A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority and should not be trusted.
  • CRM (customer relationship management) - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
  • CRM analytics - CRM (customer relationship management) analytics comprises all programming that analyzes data about customers and presents it to help facilitate and streamline better business decisions.
  • CRM Quizzes - We've gathered quizzes to test your knowledge of customer relationship management and related issues.
  • CRO - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • CRON script - A CRON script is a list of one or more commands to a computer operating system or application server that are to be executed at a specified time.
  • crontab - crontab is a UNIX command that creates a table or list of commands, each of which is to be executed by the operating system at a specified time.
  • crop insurance - Crop insurance is a type of protection policy that covers agricultural producers against unexpected loss of projected crop yields or profits from produce sales at market.
  • cross engineering - X-engineering (sometimes called cross-engineering) is a collaborative and process-oriented approach to change management in the business world.
  • cross section - A cross section is a cut through something (such as a coaxial cable) at an angle perpendicular to its axis in order to view its interior structure.
  • cross site scripting - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
  • cross site tracing - Cross-site tracing (XST) is a sophisticated form of cross-site scripting (XSS) that can bypass security countermeasures already put in place to protect against XSS.
  • cross-bar switch - In a network, a cross-bar switch is a device that is capable of channeling data between any two devices that are attached to it up to its maximum number of ports.
  • cross-browser testing - Cross-browser testing, also called browser testing, is a quality assurance (QA) process that checks whether a web-based application, site or page functions as intended for end users across multiple browsers and devices.
  • cross-channel analytics - Cross-channel analytics is a strategy used by marketing professionals to study the methods by which customers are influenced to buy a product or service, especially when those methods are combined.
  • cross-docking - Cross-docking is the practice of unloading goods from inbound delivery vehicles and loading them directly onto outbound vehicles.
  • cross-engineering - X-engineering (sometimes called cross-engineering) is a collaborative and process-oriented approach to change management in the business world.
  • cross-functional team - A cross-functional team is a workgroup made up of employees from different functional areas within an organization who collaborate to reach a stated objective.
  • cross-media ownership - Media cross-ownership is a situation in which a single corporate entity owns multiple types of media companies.
  • cross-media queuing - In a call center, cross-media queuing describes the process of receiving and routing all incoming queries in the same way, whether the query comes in the form of a phone call, e-mail message, instant message, Web site submission, fax or interactive voice response (IVR) message.
  • cross-platform mobile development - Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.
  • cross-post - On a Web or bulletin board discussion list or a Usenet newsgroup, a cross-post is the posting (submission) of an article to more than one discussion list or newsgroup at a time.
  • cross-sell - Cross-sell is a marketing term for the practice of suggesting related products or services to a customer who is considering buying something.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close