mNo edit summary |
m 1 revision imported |
(No difference)
|
Revision as of 16:58, 28 October 2023
Archived at: https://termhotel.com/archives/goldendict/ (.dsl files can be used in GoldenDict)
ASCII | American Standard Code for Information Interchange | |
Bit | Binary digit | |
CASE | Computer-aided system engineering | |
CCTV | Closed-circuit television | |
CPU | Central processing unit | |
DBA | Database administrator | |
DBMS | Database management system | |
EDI | Electronic data interchange | |
FTP | File Transfer Protocol | |
HTTP | Hypertext Transmission Protocol | |
HTTPS | Secured Hypertext Transmission Protocol | |
ID | Identification | |
IDS | Intrusion detection system | |
IP | Internet protocol | |
IS | Information systems | |
ISO | International Organization for Standardization | |
IT | Information technology | |
LAN | Local area network | |
PBX | Private branch (business) exchange | |
PC | Personal computer/microcomputer | |
PCR | Program change request | |
PDA | Personal digital assistant | |
PERT | Program Evaluation Review Technique | |
PIN | Personal identification number | |
PKI | Public key infrastructure | |
RAID | Redundant Array of Inexpensive Disks | |
RFID | Radio frequency identification | |
SDLC | System development life cycle | |
SSL | Secure Sockets Layer | |
TCP | Transmission Control Protocol | |
UPS | Uninterruptible power supply | |
VoIP | Voice-over Internet Protocol | |
WAN | Wide area network | |
Additional Acronyms | ||
4GL | Fourth-generation language | |
ACID | Atomicity, consistency, isolation and durability | |
ACL | Access control list | |
AES | Advanced Encryption Standard | |
AH | Authentication header | |
AI | Artificial intelligence | |
AICPA | American Institute of Certified Public Accountants | |
ALE | Annual loss expectancy | |
ALU | Arithmetic-logic unit | |
ANSI | American National Standards Institute | |
API | Application programming interface | |
ARP | Address Resolution Protocol | |
ASIC | Application-specific integrated circuit | |
ATDM | Asynchronous time division multiplexing | |
ATM | Asynchronous Transfer Mode or automated teller machine | |
B-to-B | Business-to-business | |
B-to-C | Business-to-consumer | |
B-to-E | Business-to-employee | |
B-to-G | Business-to-government | |
BCI | Business Continuity Institute | |
BCM | Business continuity management | |
BCP | Business continuity planning | |
BI | Business intelligence | |
BIA | Business impact analysis | |
BIMS | Biometric Information Management and Security | |
BIOS | Basic Input/Output System | |
BIS | Bank for International Settlements | |
BLP | Bypass label process | |
BNS | Backbone network services | |
BOM | Bill of materials | |
BOMP | Bill of materials processor | |
BPR | Business process reengineering | |
BRP | Business recovery (or resumption) plan | |
BSC | Balanced scorecard | |
CA | Certificate authority | |
CAAT | Computer-assisted audit technique | |
CAD | Computer-assisted design | |
CAE | Computer-assisted engineering | |
CAM | Computer-aided manufacturing | |
CASE | Computer-aided software engineering | |
CCK | Complimentary Code Keying | |
CCM | Constructive Cost Model | |
CD | Compact disk | |
CD-R | Compact disk-recordable | |
CD-RW | Compact disk-rewritable | |
CDDF | Call Data Distribution Function | |
CDPD | Cellular Digital Packet Data | |
CEO | Chief executive officer | |
CERT | Computer emergency response team | |
CGI | Common gateway interface | |
CIAC | Computer Incident Advisory Capability | |
CICA | Canadian Institute of Chartered Accountants | |
CIM | Computer-integrated manufacturing | |
CIO | Chief information officer | |
CIS | Continuous and intermittent simulation | |
CISO | Chief information security officer | |
CMDB | Configuration management database | |
CMM | Capability Maturity Model | |
CMMI | Capability Maturity Model Integration | |
CNC | Computerized Numeric Control | |
COBIT | Control Objectives for Information and related Technology | |
COCOMO2 | Constructive Cost Model | |
CODASYL | Conference on Data Systems Language | |
COM | Component Object Model | |
COM/DCOM | Component Object Model/Distributed Component Object Model | |
COOP | Continuity of operations plan | |
CORBA | Common Object Request Broker Architecture | |
CoS | Class-of-service | |
COSO | Committee of Sponsoring Organizations of the Treadway Commission | |
CPM | Critical Path Methodology | |
CPO | Chief privacy officer | |
CPS | Certification practice statement | |
CRC | Cyclic redundancy check | |
CRL | Certificate revocation list | |
CRM | Customer relationship management | |
CSA | Control self-assessment | |
CSF | Critical success factor | |
CSIRT | Computer security incident response team | |
CSMA/CD | Carrier-sense Multiple Access/Collision Detection | |
CSO | Chief security officer | |
CSU-DSU | Channel service unit/digital service unit | |
DAC | Discretionary access controls | |
DASD | Direct access storage device | |
DAT | Digital audio tape | |
DCE | Data communications equipment | |
DCE | Distributed computing environment | |
DCOM | Distributed Component Object Model (Microsoft) | |
DCT | Discrete Cosine Transform | |
DD/DS | Data dictionary/directory system | |
DDL | Data Definition Language | |
DDN | Digital Divide Network | |
DDoS | Distributed denial of service | |
DECT | Digital Enhanced Cordless Telecommunications | |
DES | Data Encryption Standard | |
DFD | Data flow diagram | |
DHCP | Dynamic Host Configuration Protocol | |
DID | Direct inward dial | |
DIP | Document image processing | |
DLL | Dynamic link library | |
DMS | Disk management system | |
DMZ | Demilitarized zone | |
DNS | Domain name server | |
DoS | Denial of service | |
DOSD | Data-oriented system development | |
DRII | Disaster Recovery Institute International | |
DRP | Disaster recovery planning | |
DSL | Digital subscriber lines | |
DSS | Decision support systems | |
DSSS | Direct-sequence spread spectrum (DSSS) | |
DTE | Data terminal equipment | |
DTR | Data terminal ready | |
DVD | Digital video disc | |
DVD-HD | Digital video disc-high definition/high density | |
DW | Data warehouse | |
EA | Enterprise architecture | |
EAC | Estimates at completion | |
EAI | Enterprise application integration | |
EAM | Embedded audit module | |
EAP | Extensible Authentication Protocol | |
EBCDIC | Extended Binary-coded for Decimal Interchange Code | |
EC | Electronic commerce | |
ECC | Elliptical curve cryptography | |
EDFA | Enterprise data flow architecture | |
EER | Equal-error rate | |
EFT | Electronic funds transfer | |
EIGRP | Enhanced Interior Gateway Routing Protocol | |
EJB | Enterprise java beans | |
EMI | Electromagnetic interference | |
EMRT | Emergency response time | |
ERD | Entity relationship diagram | |
ERP | Enterprise resource planning | |
ESP | Encapsulating security payload | |
EVA | Earned value analysis | |
FAR | False-acceptance rate | |
FAT | File allocation table | |
FC | Fibre channels | |
FDDI | Fiber-Distributed Data Interface | |
FDM | Frequency division multiplexing | |
FEA | Federal enterprise architecture | |
FEMA | Federal Emergency Management Association (USA) | |
FER | Failure-to-enroll rate | |
FERC | Federal Energy Regulatory Commission (USA) | |
FFIEC | Federal Financial Institutions Examination Council (USA) | |
FFT | Fast Fourier Transform | |
FHSS | Frequency-hopping spread spectrum | |
FIPS | Federal Information Processing Standards | |
FP | Function point | |
FPA | Function point analysis | |
FRAD | Frame relay assembler/disassembler | |
FRB | Federal Reserve Board (USA) | |
FRR | False-rejection rate | |
GAS | Generalized audit software | |
GB | Gigabyte | |
GID | Group ID | |
GIS | Geographic information systems | |
GPS | Global position system | |
GSM | Global system for mobile communications | |
GUI | Graphical user interface | |
HA | High availability | |
HD-DVD | High definition/high density-digital video disc | |
HDLC | High-level data link control | |
HIPAA | Health Insurance Portability and Accountability Act (USA) | |
HIPO | Hierarchy input-process-output | |
HTML | Hypertext Markup Language | |
HW/SW | Hardware/software | |
I/O | Input/output | |
I&A | Identification and authentication | |
ICMP | Internet Control Message Protocol | |
ICT | Information and communication technologies | |
IDE | Integrated development environment | |
IDEF1X | Integration Definition for Information Modeling | |
IETF | Internet Engineering Task Force | |
IPF | Information processing facility | |
IPL | Initial program load | |
IPMA | International Project Management Association | |
IPRs | Intellectual property rights | |
IPS | Intrusion prevention system | |
IPSec | IP Security | |
IPX | Internetwork Packet Exchange | |
IR | Incident response | |
IR | Infrared | |
IRC | Internet relay chat | |
IrDA | Infrared Data Association | |
IRM | Incident response management | |
IS/ORP | IS disaster recovery planning | |
ISAKMP/Oakley | Internet Security Association and Key Management Protocol/Oakley | |
ISAM | Indexed Sequential Access Method | |
ISDN | Integrated services digital network | |
ISP | Internet service provider | |
ITF | Integrated test facility | |
ITGI | IT Governance Institute | |
ITIL | Information Technology Infrastructure Library | |
ITSM | IT service management | |
ITT | Invitation to tender | |
ITU | International Telecommunications Union | |
JIT | Just in time | |
Kb | Kilobit | |
KB | Kilobyte | |
KB | Knowledge base | |
KDSI | Thousand delivered source instructions | |
KGI | Key goal indicator | |
KLOC | Kilo lines of code | |
KPI | Key performance indicator | |
L2TP | Layer 2 Tunneling Protocol | |
LCP | Link Control Protocol | |
M&A | Mergers and acquisition | |
MAC | Mandatory Access Control | |
MAC address | Media Access Control address | |
MAN | Metropolitan area network | |
MAP | Manufacturing accounting and production | |
MIS | Management information system | |
MODEM | Modulator/demodulator | |
MOS | Maintenance out of service | |
MPLS | Multiprotocol label switching | |
MRP | Manufacturing resources planning | |
MSAUs | Multistation access units | |
MTBF | Mean time between failures | |
MTS | Microsoft’s Transaction Server | |
MTTR | Mean time to repair | |
NAP | Network access point | |
NAS | Network access server or Network attached storage | |
NAT | Network address translation | |
NCP | Network Control Protocol | |
NDA | Nondisclosure agreement | |
NFPA | National Fire Protection Agency (USA) | |
NFS | Network file system | |
NIC | Network interface card | |
NIST | National Institute of Standards and Technology (USA) | |
NNTP | Network News Transfer Protocol | |
NSP | Name Server Protocol or Network service provider | |
NT | New technology | |
NTFS | NT file system | |
NTP | Network Time Protocol | |
OBS | Object Breakdown Structure | |
OCSP | Online Certificate Status Protocol | |
OECD | Organization for Economic Cooperation and Development | |
OEP | Occupant emergency plan | |
OFDM | Orthogonal frequency division multiplexing | |
OLAP | Online analytical processing | |
OO | Object-oriented | |
OOSD | Object-oriented system development | |
ORB | Object request broker (ORB) | |
OS | Operating system | |
OSI | Open Systems Interconnection | |
OSPF | Open Shortest Path First | |
PAD | Packet assembler/disassembler | |
PAN | Personal area network | |
PBX | Private branch exchange | |
PDCA | Plan-Do-Check-Act | |
PDN | Public data network | |
PER | Package-enabled reengineering | |
PHY | Physical layer | |
PICS | Platform for Internet content selection | |
PID | Process ID | |
PID | Project Initiation Document | |
PMBOK | Project Management Body of Knowledge | |
PMI | Project Management Institute | |
POC | Proof of concept | |
POP | Proof of possession | |
POS | Point of sale or Point-of-sale systems | |
POTS | Plain old telephone service | |
PPP | Point-to-point Protocol | |
PPPoE | Point-to-point Protocol Over Ethernet | |
PPTP | Point-to-Point Tunneling Protocol | |
PR | Public relations | |
PRD | Project request document | |
PRINCE2 | Projects in Controlled Environments 2 | |
PROM | Programmable Read-Only Memory | |
PSTN | Public switched telephone network | |
PVC | Permanent virtual circuit | |
QA | Quality assurance | |
QAT | Quality assurance testing | |
RA | Registration authority | |
RAD | Rapid application development | |
RADIUS | Remote Access Dial-in User Service | |
RAID | Redundant Array of Inexpensive Disks | |
RAM | Random access memory | |
RAS | Remote access service | |
RBAC | Role-based access control | |
RDBMS | Relational database management system | |
RF | Radio frequency | |
RFI | Request for information | |
RFP | Request for proposal | |
RIP | Routing Information Protocol | |
RMI | Remote method invocation | |
ROI | Return on investment | |
ROLAP | Relational online analytical processing | |
ROM | Read-only memory | |
RPC | Remote procedure call | |
RPO | Recovery point objective | |
RST | Reset | |
RTO | Recovery time objective | |
RW | Rewritable | |
S/HTTP | Secure Hypertext Transfer Protocol | |
S/MIME | Secure Multipurpose Internet Mail Extensions | |
SA | Security Association | |
SAN | Storage area network | |
SANS | The SANS Institute | |
SAS | Statement on Auditing Standards | |
SBC | Session border controller | |
SCADA | Supervisory Control and Data Acquisition | |
SCARF | Systems Control Audit Review File | |
SCARF/EAM | Systems Control Audit Review File and Embedded Audit Modules | |
SCM | Supply Chain Management | |
SCOR | Supply Chain Operations Reference | |
SD/MMC | Secure digital multimedia card | |
SDLC | System development life cycle | |
SDO | Service delivery objective | |
SEC | Securities and Exchange Commission (USA) | |
SET | Secure electronic transactions | |
SLA | Service level agreement | |
SLIP | Serial Line Internet Protocol | |
SLM | Service level management | |
SLOC | Source lines of code | |
SMART | Specific, measurable, achievable, relevant, time-bound | |
SME | Subject matter expert | |
SMF | System management facility | |
SMTP | Simple Mail Transport Protocol | |
SNA | Systems network architecture | |
SNMP | Simple Network Management Protocol | |
SO | Security officer | |
SOA | Service-oriented architecture | |
SOAP | Simple Object Access Protocol | |
SOHO | Small office-home office | |
SPI | Security parameter index | |
SPICE | Software Process Improvement and Capability Determination | |
SPOC | Single point of contact | |
SPOOL | Simultaneous peripheral operations online | |
SQL | Structured Query Language | |
SSH | Secure Shell | |
SSID | Set services identifiers | |
SSO | Single sign-on | |
SVC | Switched virtual circuits | |
SYSGEN | System generation | |
TACACS | Terminal Access Control Access Control System | |
TCO | Total cost of ownership | |
TCP/IP | Transmission Control Protocol/Internet Protocol | |
TCP/UDP | Transmission Control Protocol/User Datagram Protocol | |
TDM | Time-division multiplexing | |
TELNET | Teletype network | |
TES | Terminal emulation software | |
TFTP | Trivial File Transport Protocol | |
TKIP | Temporal Key Integrity Protocol | |
TLS | Transport layer security | |
TMS | Tape management system | |
TP monitors | Transaction processing (TP) monitors | |
TQM | Total quality management | |
TR | Technical report | |
UAT | User acceptance testing | |
UBE | Unsolicited bulk e-mail | |
UDDI | Description, discovery and integration | |
UDP | User Datagram Protocol | |
UID | User ID | |
UML | Unified Modeling Language | |
URI | Uniform resource identifier | |
URL | Universal resource locator | |
URN | Uniform resource name | |
USB | Universal Serial Bus | |
VLAN | Virtual local area network | |
VoIP | Voice-Over IP | |
VPN | Virtual private network | |
WAP | Wireless Application Protocol | |
WBS | Work breakdown structure | |
WEP | Wired Equivalent Privacy | |
WLAN | Wireless local area network | |
WML | Wireless Markup Language | |
WORM | Write-once and read many | |
WP | Work packages | |
WPA | Wi-Fi Protected Access | |
WPAN | Wireless personal area network | |
WSDL | Web Services Description Language | |
WWAN | Wireless wide area network | |
WWW | World Wide Web | |
X-to-X | Exchange-to-Exchange | |
XBRL | Extensible Business Reporting Language | |
XML | Extensible Markup Language | |
Xquery | XML query | |
XSL | Extensible Stylesheet Language |