Browse Definitions by Alphabet
K - KIC
- K - The kelvin (abbreviation K), less commonly called the degree Kelvin (symbol, o K), is the Standard International (SI) unit of thermodynamic temperature.
- K Desktop Environment - K Desktop Environment (KDE) is an Open Source graphical desktop environment for UNIX workstations.
- K Desktop Environment (KDE) - K Desktop Environment (KDE) is an Open Source graphical desktop environment for UNIX workstations.
- K map - A Karnaugh map (K-map) is a pictorial method used to minimize Boolean expressions without having to use Boolean algebra theorems and equation manipulations.
- K scale for Internet addiction - K-scale (Korea scale) is a checklist for diagnosing and evaluating Internet addiction.
- K-12 - K-12, a term used in education and educational technology in the United States, Canada, and possibly other countries, is a short form for the publicly-supported school grades prior to college.
- k-business - Knowledge management is a concept in which an enterprise consciously and comprehensively gathers, organizes, shares and analyzes its knowledge in terms of resources, documents, and people skills.
- K-map - A Karnaugh map (K-map) is a pictorial method used to minimize Boolean expressions without having to use Boolean algebra theorems and equation manipulations.
- K-scale - K-scale (Korea scale) is a checklist for diagnosing and evaluating Internet addiction.
- K-scale for Internet addiction - K-scale (Korea scale) is a checklist for diagnosing and evaluating Internet addiction.
- K-scale for Internet addiction (Korea scale for Internet addiction) - K-scale (Korea scale) is a checklist for diagnosing and evaluating Internet addiction.
- K/P - Commonly used by a company within its private automatic branch exchange (PABX) telephone system, a keyphone (abbreviated as K/P, sometimes called a key station) is a telephone with the extra buttons and the intelligence to allow incoming calls to be transferred to other extensions.
- K56flex - Rockwell Corporation's K56flex modem chipset gave users the capability to receive data on ordinary phone lines at 56 Kbps (thousand bits per second).
- K6 - K6 (referred to by its manufacturer as AMD-K6) is a line of microprocessors from AMD that compete with Intel's Pentium series of microprocessors.
- K6 (AMD-K6) - K6 (referred to by its manufacturer as AMD-K6) is a line of microprocessors from AMD that compete with Intel's Pentium series of microprocessors.
- K7 - K7 was the development name for the Athlon personal computer microprocessor from AMD, the microprocessor and flash memory maker.
- kaizen - Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap major improvements.
- Kaizen (continuous improvement) - Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap significant improvements.
- kanban - Kanban is a visual system used to manage and keep track of work as it moves through a process.
- Kano Model - The Kano Model is a product development theory which is centered on customer satisfaction.
- Kapow - Kapow is a company that provides an API (application program interface) called Katalyst to migrate digital content in the cloud between diverse applications or databases.
- Kaptoxa - Kaptoxa (pronounced kar-toe-sha) is a type of point-of-sale (POS) malware designed to compromise payment information systems.
- Kari's law - Kari's law is legislation in the United States that requires multi-line telephone systems (MLTS) to route 9-1-1 emergency service calls through the phone system automatically.
- Karnaugh map - A Karnaugh map (K-map) is a pictorial method used to minimize Boolean expressions without having to use Boolean algebra theorems and equation manipulations.
- Karnaugh map (K-map) - A Karnaugh map (K-map) is a pictorial method used to minimize Boolean expressions without having to use Boolean algebra theorems and equation manipulations.
- karōshi - Karōshi is a Japanese term that translates to "death from overwork.
- Kaspersky Lab - Kaspersky Lab is a security software and services company with a presence in 200 countries and territories around the world.
- Katmai - The Pentium III is a microprocessor designed by Intel as a successor to its Pentium II.
- Kazaa Media Desktop - Kazaa (its full name is Kazaa Media Desktop or KMD) is a decentralized Internet peer-to-peer (P2P) file-sharing program owned by Sharman Networks.
- Kazaa Media Desktop (KMD) - Kazaa (its full name is Kazaa Media Desktop or KMD) is a decentralized Internet peer-to-peer (P2P) file-sharing program owned by Sharman Networks.
- KB - As a measure of computer memory or storage, a kilobyte (KB or Kbyte*) is approximately a thousand bytes (actually, 2 to the 10th power, or decimal 1,024 bytes).
- KBA - In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password.
- Kbps - In the U.S.
- Kbps (kilobits per second) - In the U.S.
- KBW - A keyboard wedge can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader (MSR) into keyboard strokes for a computer.
- Kbyte - As a measure of computer memory or storage, a kilobyte (KB or Kbyte*) is approximately a thousand bytes (actually, 2 to the 10th power, or decimal 1,024 bytes).
- KDE - K Desktop Environment (KDE) is an Open Source graphical desktop environment for UNIX workstations.
- Kebab case - Kebab case -- or kebab-case -- is a programming variable naming convention where a developer replaces the spaces between words with a dash.
- keep it simple stupid - The KISS Principle (Keep It Simple, Stupid) is self-descriptive and recognizes two things: 1.
- Keep It Simple, Stupid - The KISS Principle (Keep It Simple, Stupid) is self-descriptive and recognizes two things: 1.
- keiretsu - Keiretsu is a business network composed of manufacturers, supply chain partners, distributors and financiers who remain financially independent but work closely together to ensure each other's success.
- keiretsu - In corporate culture, keiretsu refers to a uniquely Japanese form of corporate organization.
- keitai - Keitai (pronounced k-tie) is a Japanese word meaning "portable.
- kelvin - The kelvin (abbreviation K), less commonly called the degree Kelvin (symbol, o K), is the Standard International (SI) unit of thermodynamic temperature.
- kelvin (K) - The kelvin (abbreviation K), less commonly called the degree Kelvin (symbol, o K), is the Standard International (SI) unit of thermodynamic temperature.
- Ken Burns effect - Ken Burns effect is the use of still photographs along with zooming, panning and transitions such as fading as the base for video content.
- Kerberos - Kerberos is the authentication protocol used by most operating systems.
- Kerckhoff's principle - Kerckhoff's principle is the concept that a cryptographic system should be secure, even if all its details are public knowledge except for the key.
- Kermit - Kermit is a popular file transfer and management protocol and suite of communications software programs with advantages over existing Internet protocols such as File Transfer Protocol and Telnet.
- kernel - The kernel is the essential center of a computer operating system (OS).
- kernel panic - A kernel panic is a computer error from which the operating system (OS) cannot quickly or easily recover.
- kernel virtualization - Kernel virtualization is any one of a number of methods in which an operating system (OS) kernel is adapted to support different users running applications simultaneously on a single machine.
- kernel-based Virtual Machine (KVM) - Kernel-based Virtual Machine (KVM) is a free, open source virtualization architecture for Linux distributions.
- Kessler Syndrome - The Kessler Syndrome is a theoretical scenario in which Earth's orbit is overpopulated with objects and debris, preventing the use of satellites in certain sections of Earth's orbit.
- key - In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text.
- key chain - A key chain is a series of keys that can be created to help ensure secure communication between routers in a network.
- key chain drive - A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash memory and can attach to a keychain.
- key fob - A key fob is a small, programmable hardware device that provides access to a physical object.
- key lifetime - A cryptoperiod (sometimes called a key lifetime or a validity period) is a specific time span during which a cryptographic key setting remains in effect.
- key logger - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
- key performance indicator - Key performance indicators (KPIs) are business metrics used by corporate executives and other managers to track and analyze factors deemed crucial to the success of an organization.
- key performance indicators (KPIs) - Key performance indicators (KPIs) are business metrics used by corporate executives and other managers to track and analyze factors deemed crucial to the success of an organization.
- key results indicator (KRI) - A key result indicator (KRI) is a metric that measures the quantitative results of business actions to help companies track progress and reach organizational goals.
- key risk indicator (KRI) - A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be successful.
- key station - Commonly used by a company within its private automatic branch exchange (PABX) telephone system, a keyphone (abbreviated as K/P, sometimes called a key station) is a telephone with the extra buttons and the intelligence to allow incoming calls to be transferred to other extensions.
- key string - A key string is the authentication code included in each key in a key chain, which is a series of keys that can be created to help ensure secure communication between routers in a network.
- key value pair - A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.
- key-value pair - A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.
- key-value pair (KVP) - A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.
- keyboard - On most computers, a keyboard is the primary text input device.
- keyboard shortcut - A keyboard shortcut is a combination of keys that, when pressed simultaneously, perform some task that ordinarily requires use of a mouse or other input device and may take longer to do.
- keyboard vibration attack - Although there have been no reports of keyboard vibration attacks in the wild, Georgia Tech researchers found a method to exploit the accelerometer in an iPhone to record keystrokes.
- keyboard video mouse switch - A KVM (keyboard, video, mouse) switch is a hardware device that allows a user to control multiple computers from a single keyboard, video display monitor and mouse.
- keyboard wedge - A keyboard wedge can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader (MSR) into keyboard strokes for a computer.
- keyboard wedge (KBW) - A keyboard wedge can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader (MSR) into keyboard strokes for a computer.
- keychain drive - A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash memory and can attach to a keychain.
- Keyhole Markup Language - Keyhole Markup Language (KML) is an XML-based markup language designed to annotate and overlay visualizations on various two-dimensional, Web-based online maps or three-dimensional Earth browsers (such as Google Earth).
- Keyhole Markup Language (KML) - Keyhole Markup Language (KML) is an XML-based markup language designed to annotate and overlay visualizations on various two-dimensional, Web-based online maps or three-dimensional Earth browsers (such as Google Earth).
- keylogger - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
- keylogger (keystroke logger or system monitor) - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
- keylogging software - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
- keyphone - Commonly used by a company within its private automatic branch exchange (PABX) telephone system, a keyphone (abbreviated as K/P, sometimes called a key station) is a telephone with the extra buttons and the intelligence to allow incoming calls to be transferred to other extensions.
- keyphone (K/P or key station) - Commonly used by a company within its private automatic branch exchange (PABX) telephone system, a keyphone (abbreviated as K/P, sometimes called a key station) is a telephone with the extra buttons and the intelligence to allow incoming calls to be transferred to other extensions.
- keystone jack - A keystone jack is a female connector used in data communications, particularly local area networks (LANs).
- keystone plug - A keystone jack is a female connector used in data communications, particularly local area networks (LANs).
- keystroke dynamics - Keystroke dynamics are the patterns of rhythm and timing created when a person types.
- keystroke ID (keystroke identification) - The use of an individual's distinctive typing dynamics can be used as a non-intrusive and reliable form of biometric authentication.
- keystroke logger - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
- keyword (in SEO) - A keyword is a term chosen to describe the content of a web page.
- keyword density - Keyword density is the percentage of incidences of a given keyword on a web page relative to the total word count on that page.
- keyword stuffing - Keyword stuffing is the practice of inserting a large number of keywords into Web page content and meta tags in the attempt to artificially increase the page's ranking in search results.
- kg - The kilogram (abbreviation, kg) is the Standard International (SI) System of Units unit of mass.
- kg�m/s - The newton-second is the standard unit of impulse.
- Khan Academy - The Khan Academy is a non-profit educational organization that provides free video tutorials and interactive exercises.
- kHz - The kilohertz, abbreviated kHz, is a unit of alternating current (AC) or electromagnetic (EM) wave frequency equal to one thousand hertz (1,000 Hz).
- kHz (kilohertz) - The kilohertz, abbreviated kHz, is a unit of alternating current (AC) or electromagnetic (EM) wave frequency equal to one thousand hertz (1,000 Hz).
- Kibana - Kibana is an open source data visualization and exploration platform from Elastic that is specialized for large volumes of streaming and real-time data.
- kibi - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.
- Kibi, mebi, gibi, tebi, pebi, and all that - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.
- kickstand - A kickstand, in a computing context, is an accessory or an attachment that props up a mobile device up so it stands and the user doesn't have to hold it.