Browse Definitions :

Browse Definitions by Alphabet

EXP - WHA

  • expansion card - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • expansion slot - In computers, a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinholes (typically, in the range of 16 to 64 closely-spaced holes) and a place to fit an expansion card containing the circuitry that provides some specialized capability, such as video acceleration, sound, or disk drive control.
  • expense report software - Expense report software is a computer program or suite that provides enterprise administrators with a clear picture of the organization's spending through automated analytics and reporting.
  • expert system - An expert system is a program that uses artificial intelligence (AI) technologies to simulate the knowledge and judgment of humans.
  • explainable AI (XAI) - Explainable AI (XAI) is artificial intelligence that is programmed to describe its purpose, rationale and decision-making process in a way that can be understood by the average person.
  • explicit data - Explicit data is data that is provided intentionally and taken at face value rather than analyzed or interpreted for further meaning.
  • Explicitly Parallel Instruction Computing - (EPIC also stand for Electronic Privacy Information Center.
  • exploit kit (crimeware kit) - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
  • exploratory testing - Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes.
  • exponential function - An exponential function is a mathematical function of the following form:f (x) = a xwhere x is a variable, and a is a constant called the base of the function.
  • exponential key exchange - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • export - In a personal computer application, to export is to convert a file into another format than the one it is currently in.
  • Express Bay - Express Bay is an externally accessible storage slot that is designed to accept a high-performance PCI Express (PCIe) solid-state drive (SSD),.
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • Express Wi-Fi - Express Wi-Fi by Facebook is the social media company's effort to bring wireless internet via public Wi-Fi hot spots to areas of the world without available or reliable connections to the internet.
  • extended architecture - CD-ROM XA (Compact Disc - read-only-memory, extended architecture) is a modification of CD-ROM that defines two new types of sectors that enable it to read and display data, graphics, video, and audio at the same time.
  • Extended Binary Coded Decimal Interchange Code� - EBCDIC (Extended Binary Coded Decimal Interchange Code ) (pronounced either "ehb-suh-dik" or "ehb-kuh-dik") is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems.
  • extended binary-coded decimal interchange code - EBCDIC (Extended Binary Coded Decimal Interchange Code ) (pronounced either "ehb-suh-dik" or "ehb-kuh-dik") is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems.
  • extended data output RAM - EDO (extended data output) RAM is a type of random access memory (RAM) chip that improves the time to read from memory on faster microprocessors such as the Intel Pentium.
  • extended enterprise - Extended enterprise is the concept that a company does not operate in isolation because its success is dependent upon a network of partner relationships.
  • Extended Graphics Array - XGA (Extended Graphics Array) is a high-resolution video display mode that provides screen pixel resolution of 1,024 by 768 in 256 colors or 640 by 480 in high (16-bit) color.
  • Extended Industry Standard Architecture - EISA is a standard bus (computer interconnection) architecture that extends the ISA standard to a 32-bit interface.
  • extended intelligence (EI) - Extended intelligence (EI) is the use of artificial intelligence (AI) to enhance human intelligence.
  • extended memory - Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.
  • Extended Simple Mail Transfer Protocol - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • Extended System Configuration Data - In personal computers with Windows, ESCD (Extended System Configuration Data) is data that provides a computer's BIOS and the operating system with information for communicating with plug and play (PnP) devices.
  • Extended Turn - ETRN (Extended Turn) is an extension to the Simple Mail Transfer Protocol (SMTP) that allows an SMTP server to send a request to another SMTP server to send any e-mail messages it has.
  • Extensible Access Control Markup Language - XACML (Extensible Access Control Markup Language) is an open standard XML-based language designed to express security policies and access rights to information for Web services, digital rights management (DRM), and enterprise security applications.
  • extensible application markup language - XAML, Extensible Application Markup Language, is Microsoft's XML-based language for creating a rich GUI, or graphical user interface.
  • Extensible Authentication Protocol - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.
  • Extensible Authentication Protocol (EAP) - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.
  • Extensible Business Reporting Language - XBRL (Extensible Business Reporting Language) is an XML-based computer language for the electronic transmission of business and financial data.
  • Extensible Configuration Checklist Description Format - XCCDF (Extensible Configuration Checklist Description Format) is a specification language for writing security checklists, benchmarks and related types of documents.
  • Extensible Hypertext Markup Language - As the World Wide Web Consortium (W3C) describes it, XHTML (Extensible Hypertext Markup Language) is "a reformulation of HTML 4.
  • Extensible Markup Language - Extensible Markup Language (XML) is a text-based format that allows for the structuring of electronic documents and is not limited to a set of labels.
  • Extensible Messaging and Presence Protocol - XMPP (Extensible Messaging and Presence Protocol) is a protocol based on Extensible Markup Language (XML) and intended for instant messaging (IM) and online presence detection.
  • Extensible Name Service - Extensible Name Service (XNS) is an open Extensible Markup Language (XML)-based protocol that specifies a way to establish and manage a universal addressing system.
  • Extensible Public Relations Language - XPRL (Extensible Public Relations Language) is an open specification for an XML-based language being developed for the public relations sector.
  • Extensible Rights Markup Language - XrML (Extensible Rights Markup Language) is a proposed standard digital rights management (DRM) markup language.
  • Extensible Stylesheet Language - XSL (Extensible Stylesheet Language), formerly called Extensible Style Language, is a language for creating a style sheet that describes how data sent over the Web using the Extensible Markup Language (XML) is to be presented to the user.
  • Extensible User interface Language - XUL (Extensible User-interface Language) is a standard way to exchange data that describes a program's user interface, or at least the portion of it that can be controlled by programming.
  • Extensible User-interface Language - XUL (Extensible User-interface Language) is a standard way to exchange data that describes a program's user interface, or at least the portion of it that can be controlled by programming.
  • extension - In computer operating systems, a file name extension is an optional addition to the file name in a suffix of the form ".
  • extension strategy - An extension strategy is a practice used to increase profitability for a given product or service and thus keep it in the maturity phase of the marketing product lifecycle rather than going into decline.
  • Exterior Gateway Protocol - Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
  • Exterior Gateway Protocol (EGP) - Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
  • external drive enclosure (disk enclosure, disk caddy, drive caddy) - An external drive enclosure is a metal or plastic casing that holds and powers a disk drive.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • external storage device - An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the addressable data storage that is not inside a computer's main storage or memory.
  • extract transform load - Extract, transform, load (ETL) is a process for writing data values to a target database with a single programming tool.
  • Extract, Load, Transform (ELT) - Extract, Load, Transform (ELT) is a data integration process for transferring raw data from a source server to a data system (such as a data warehouse or data lake) on a target server and then preparing the information for downstream uses.
  • extract, transform, load (ETL) - Extract, transform, load (ETL) is a process for writing data values to a target database with a single programming tool.
  • extranet - An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
  • extrapolation and interpolation - Extrapolation is an estimation of a value based on extending a known sequence of values or facts beyond the area that is certainly known.
  • Extreme Programming - Extreme Programming (XP) is a pragmatic approach to program development that emphasizes business results first and takes an incremental, get-something-started approach to building the product, using continual testing and revision.
  • Extreme Programming (XP) - Extreme Programming (XP) is a pragmatic approach to program development that emphasizes business results first and takes an incremental, get-something-started approach to building the product, using continual testing and revision.
  • extreme ultraviolet lithography - Extreme ultraviolet lithography (EUVL) is an advanced technology for making microprocessors a hundred times more powerful than those made today.
  • extreme ultraviolet lithography (EUVL) - Extreme ultraviolet lithography (EUVL) is an advanced technology for making microprocessors a hundred times more powerful than those made today.
  • extremely low frequency - ELF (extremely low frequency) refers to an electromagnetic field having a frequency much lower than the frequencies of signals typically used in communications.
  • extrusion prevention - Extrusion prevention, also called exfiltration prevention, is the practice of stopping data leaks by filtering outbound network traffic and preventing unauthorized packets from moving outside the network.
  • eye tracking (gaze tracking) - Eye tracking is the process of electronically locating the point of a person's gaze, or following and recording the movement of the point of gaze.
  • ezine - The term ezine is short for "electronic magazine.
  • ezine (electronic magazine) - The term ezine is short for "electronic magazine.
  • EZPass - E-ZPass is a toll collection system in the northeastern U.
  • Oracle extents - Oracle extents are a set of contiguous blocks allocated in an Oracle database.
  • What is edge computing? Everything you need to know - Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.
  • What is enterprise content management? Guide to ECM - Enterprise content management (ECM) is a set of defined processes, strategies and tools that allows a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close