Glossary of IT Terms
A
Absence Management:
Absence management is a strategy used by employers to minimize employee absenteeism, prevent workforce disturbance, and increase employee productivity. It entails establishing a balance between assisting workers absent from their jobs due to illness, accidents, or other unanticipated events and penalizing those whose absences are dubious or excessive.
Absorption Chillers:
In contrast to conventional chillers, absorption chillers are powered by heat rather than electricity, which could lead to significant efficiency increases. The reliquification is different, but the cooling mechanism is still evaporative—a liquid turning into a vapor. The vapor is absorbed into another liquid rather than crushed. Here, ammonia, absorbed into the water, is used in the traditional cycle.
Access point:
An access point, also known as a pico base station or network access point, allows WLAN clients to access network resources connected to a home or business network. It comprises a radio (typically more than one) and a network connection.
Accredited Standards Committee (ASC):
The American National Standards Institute has granted accreditation to the Accredited Standards Committee (ASC), which creates uniform communication protocols for electronic data exchange.
Accessibility:
All persons, including those with visual, hearing, motor, or cognitive impairments, can navigate and understand the process of building and developing Web sites and other technology, according to Section 508 of the 1998 Rehabilitation Act. People who use older/slower software and hardware can also benefit from this design style.
Account Executive (AE):
Account executives (AEs) are salespeople who are primarily in charge of managing ongoing client relationships daily. With the primary goal of maintaining and fostering client connections, AEs have a thorough awareness of a customer firm’s goals, solutions, and products.
Access method:
- The portion of a computer’s operating system is responsible for formatting data sets and their direction to specific storage devices. Examples from the mainframe world include the Virtual Storage Access Method (VSAM) and Indexed Sequential Access Method (ISAM).
- In local-area networks, the technique or program code is used to arbitrate the use of the communications medium by granting access selectively to individual stations.
Account Growth:
The capacity of a provider to raise the share of the wallet with an existing client is known as account growth.
Account Management:
Account management is giving customers opportunities for service, support, and improvement so that they use a good or service more and so that there are more chances to keep customers, cross-sell to them, and upsell to them.
Account Manager:
An account manager is a worker who creates and upholds client relationships that encourage retention and satisfaction. Account managers are responsible for overseeing the entire customer life cycle. In addition to collaborating with clients to ensure the use and satisfaction of the products or services, they also research and present novel solutions to help customers create more profitable business outcomes.
Account Planning:
Account planning outlines key information about potential customers or current clients, such as their decision-making process, the businesses vying for their business, and your overall strategy to win them over.
Account Team:
The group in charge of determining customer needs, connecting supplier solutions to those needs, representing the customer’s interests to the supplier organization, and managing the client relationship is known as an account team.
Accountable Care Organization (ACO):
The phrase “accountable care organization” (ACO) refers to a significant change in how providers and public or private payers enter into contracts. In an ACO model, a group of providers acting as a legal organization agrees to take on a portion of the cost and quality risk for a panel of beneficiaries throughout various value-based payment models. ACOs offer primary care services. One example of this strategy is the US CMS Distributed Shared Savings Program, which went into operation in 2012.
Accounting Reconciliation:
Comparing two financial records ensures they agree it is the accounting reconciliation process. Reconciliation enables businesses to validate their internal records’ accuracy, consistency, and completeness.
Accounting Standards Certification 606:
The Revenue from Contracts with Customers rule, also known as Accounting Standards Certification 606 (ASC 606), is intended to recognize revenue consistently across all businesses. This US Federal Accounting Standards Board regulation offers a five-step structure to enhance uniformity in financial reporting and comparative analysis and reporting, making financial statement preparation easier.
Accounting Standards Certification 842:
Accounting Standards Certification 842 (ASC 842) aims to increase the comparability and openness of lease-using public, corporate, and non-profit entities. Whether or not the lease is categorized as an operational or financing lease, businesses are required by this US Federal Accounting Standards Board rule to disclose lease assets and obligations in their financial statements.
Accounts Receivable:
The sum of money that clients owe a business for supplied goods or services is known as accounts receivable. The company’s balance sheet lists account receivable as a current asset.
Accrual Accounting:
Accrual accounting tracks revenues and expenses as they are incurred regardless of when cash transactions occur.
Active Data Dictionary:
A tool for active data dictionaries that stores dynamically available and editable data on the definitions and descriptions of midrange-system data.
Active Directory:
The “directory service” component of the Windows 2000 OS is called Active Directory. The identities and connections between the dispersed resources that make up a network environment are managed by Active Directory. It offers a uniform approach to naming, describing, locating, accessing, managing, and securing information about network-based resources, including programs, files, printers, and people. It also saves information about these resources. For these distributed resources to cooperate, a central authority administers their identities and mediates their connections.
Active Matrix Organic Light-emitting Diodes (AMOLED):
The pixels of electroluminescent organic compounds used in active matrix organic light-emitting diodes (AMOLEDs) are “printed” in a matrix onto a base layer. Currently made of glass, this foundation layer will eventually incorporate flexible polymers. OLED displays are suitable for battery-powered gadgets since they don’t need a backlight and use a tiny amount of electricity, unlike liquid crystal displays. A thin film transistor manages the pixels of AMOLEDs (TFT).
ActiveX:
The ActiveX application programming interface (API) improves the OLE protocol used by Microsoft. ActiveX, which is sometimes likened to Java, makes it possible for different Internet applications, thereby extending and enhancing the capabilities of Microsoft’s Internet Explorer browser. ActiveX permits the creation of interactive content, much like Java does. An ActiveX-aware browser immediately installs the necessary programs so that a feature can be used when it meets a Web page with an unexpected feature.
Activity Stream:
A publish-and-subscribe notification system and chat area known as an “activity stream” are frequently seen in social networking. It lists events or actions important to a specific individual, group, subject, or environment. To keep track of connected activities, a participant “follows” or subscribes to entities (such as other participants or business application objects). A project management application, for instance, might add status updates, or a physical object connected to the Internet might report its condition (e.g., tunnel lane closure).
Activity-based Costing (ABC):
An enhanced method for determining how and why expenditures are incurred inside a business is activity-based costing (ABC). It offers the data necessary for activity-based management, concentrating on the choices and steps required to save expenses and boost income. By expressly recognizing that not all cost objects exert an equal demand on support resources, ABC varies from standard cost accounting.
Account-Based Marketing (ABM):
Account-based marketing (ABM) is a go-to-market approach that uses a coordinated, ongoing series of marketing and sales operations to target specific accounts. Those accounts and people are involved in ABM activities throughout the buying process.
Ad Ops:
Ad Ops uses programmatic approaches to measure and optimize advertising while managing investments in paid media, such as search, display, and video across the Internet, mobile, and social destinations.
Ad Targeting:
Ad targeting is a strategy used by advertisers to target particular audiences, frequently based on demographics, psychographics, and browsing and purchasing patterns.
Ad Tech:
Ad Tech refers to a group of technologies used to handle digital advertising across channels such as search, display, video, mobile, and social. These technologies include functionalities for targeting, design, bid management, analytics, optimization, and automation.
Adapters:
Adapters are compact, targeted programs that make a legacy application’s data and/or functionality available. We use this term to refer to both the programs and the framework used to create adapter programs. Adapters are capable of being deceptively complicated. “Thick” adapters can recognize events, gather and transform data, and exchange data with a platform, integration suite, or other middleware, among other tasks. However, “thin” adapters may just “wrap” a native program interface, making a different, more commonplace interface accessible to the application. Additionally, adapters can deal with special circumstances and frequently dynamically (or with just modest reconfiguration) accommodate updates to source or target applications.
Adapters are frequently offered as stand-alone solutions, such as an adapter suite, or in packages with other integration middleware products, such as ESBs, integration suites, or portal servers. High-level categories of the many adapters include technical and application adapters.
Adaptive Learning:
Fundamentally speaking, adaptive learning is a style of instruction that modifies a student’s pedagogical approach based on their input and a predetermined reaction. A subtype of personalized learning that encompasses strategies like affective and somatic computing, adaptive learning is more recently being linked to a large-scale collection of learning data and statistically based pedagogical responses.
Additive Manufacturing:
Additive manufacturing refers to the ability to produce a physical product using 3D printing technology and a digitally encoded design.
Addressable TV Advertising:
Using addressable TV advertising technologies, advertisers can show various commercials or ad pods (groups of ads) within a single program or navigation screen and selectively segment TV viewers. Segmentation can occur at the regional, demographic, behavioral, and (in certain circumstances) self-selected individual household levels using set-top boxes, cable, satellite, and IPTV delivery systems (STBs).
Ad hoc IT support:
Ad hoc IT support activates after a problem arises by contacting IT support. Then the Information Technology team will propose a resolution or repair the Issue. Ad hoc IT support solutions in a similar form like calling out a repair service when your water heater breaks down. It’s also referred to as Reactive IT Support or On-demand IT Support.
Advanced Analytics:
To get deeper insights, create forecasts, or come up with suggestions, advanced analytics examines data or content autonomously or partially autonomously using sophisticated tools and methodologies, often beyond those of traditional business intelligence (BI). Data/text mining, machine learning, pattern matching, forecasting, visualization, sentiment analysis, semantic analysis, network, and cluster analysis, multivariate statistics, graph analysis, simulation, complex event processing, and neural networks are examples of advanced analytical approaches.
Address:
Locates a particular Internet resource. Examples include a web address (https://www.ITAdOn.com), an email address (info@ITAdOn.com), or an internet address (192.168.100.1).
Advanced Clinical Research Information Systems (ACRIS):
A complex constellation of capabilities known as an advanced clinical research information system (ACRIS) can help patient management during clinical trials and quickly gather data assets for research queries. It also offers data mining and research process support to support clinical and translational research, biostatistics, and biocomputation. It contains open-source elements.
Advanced Distribution Management Systems (ADMS):
The software platform that enables the complete range of distribution management and optimization is an advanced distribution management system (ADMS). An ADMS has features that automate outage restoration and enhance the distribution grid’s efficiency. The fault location, isolation, and restoration, volt/volt-ampere reactive optimization, voltage reduction for energy saving, peak demand management, and support for microgrids and electric cars are some of the ADMS services being developed for electric utilities.
Advanced Distribution Protection And Restoration Devices:
Modern distributed control and communication technologies are used to construct advanced distribution protection and restoration systems. They can operate independently or in tandem with substation automation systems, communicating over peer-to-peer networks or high-speed fiber-optic networks. To effectively safeguard distribution assets, advanced distribution protection must also be able to connect with distributed generation, storage technologies, and other distributed resources.
Advanced Driver Assistance Systems (ADAS):
The primary focus of advanced driving assistance systems (ADAS) is on driver aids like night vision, driver awareness, and adaptive cruise control, as well as collision avoidance technologies like lane departure warning and blind-spot applications. Most ADAS features are integrated into the car; however, suppliers are starting to sell aftermarket products. To provide better value, next-generation ADASs will increasingly rely on wireless network connectivity (by using car-to-car data).
Advanced Fraud Detection And Analysis Technologies:
Instead of waiting for a later batch run once a transaction is complete, advanced fraud detection and analysis solutions use sophisticated analytics and predictive modeling to spot suspected fraud in real-time during data entry. Both claims and underwriting fraud are subject to it.
Advanced Message Queuing Protocol (AMQP):
AMQP (Advanced Message Queuing Protocol) (MOM) is a new standard for message-oriented middleware. Asynchronous, high-quality-of-service communication between two or more applications or between two or more components of an application is supported by MOM. Messages can be transmitted between software components provided by various suppliers without gateways or adapters, thanks to the wire protocol specified by AMQP.
Advanced Metering Infrastructure (AMI):
AMI is a composite technology comprising various components, including consumption meters, a two-way communications channel, and a data store (meter data management). Together, they assist at every stage of the meter data life cycle, from data collection to the ultimate distribution of energy consumption statistics to end users (for example, for load profile presentation) or an IT application (such as revenue protection, demand response, or outage management).
Advanced Planning And Scheduling (APS):
The term “advanced planning and scheduling” (APS) refers to manufacturing planning and scheduling within the supply chain framework.
Advanced Research Projects Agency Network (ARPANET):
The US Department of Defense’s Advanced Research Projects Agency financed the development of the Internet’s ancestor, the Advanced Research Projects Agency Network (ARPANET) (ARPA). It acted as the main backbone while the Internet was developing and served as the test bed for various aspects of internetworking technology development and testing. Using packet-switching computers connected by leased lines, the ARPANET was constructed.
Advanced Server Energy Monitoring Tools:
Each data center’s energy usage rises quickly, between 8% and 12% annually. The facility’s components and IT systems (such as servers, storage, and networking equipment) are powered by energy (for example, air-conditioning systems, power distribution units, and uninterruptible power supply systems). Users installing more equipment and the rising power needs of high-density server architectures are to blame for the rise in energy usage. While server-based energy management software products are specifically made to evaluate the energy use within server units, data center infrastructure management (DCIM) technologies are used to monitor and model energy use throughout the data center. They are typically an improvement over current server administration tools like IBM Systems Director or HP Systems Insight Manager (HP SIM). These software tools are essential for obtaining precise and timely measurements of the energy consumption of a specific server. This data can be entered into a reporting tool or a larger collection of DCIM tools. The data will serve as a crucial catalyst for the real-time adjustments that will power real-time infrastructure. As a result, for instance, a procedure to migrate an application from one server to another may be driven by a change in energy consumption.
Advanced Shipment Notice (ASN):
Before the shipment leaves the shipper’s facility, the shipper sends the receiver an electronic data interchange (EDI) message known as an advanced shipment notification (ASN). Complete details on the cargo and its contents are included in the message. In the current setting, this communication is most frequently an “as shipped note” issued after the shipment has left.
Advanced Technology:
A technology that is either technically developed but has just a small user base or is still in its infancy but promises to have a huge impact. Some examples of modern technologies include artificial intelligence, agents, handwriting and speech recognition, virtual reality and 3D visualization, smart cards, real-time collaboration, improved user authentication, data mining, and knowledge management.
Advanced Technology Group (ATG):
The advanced technology group’s (ATG) responsibility continuously provides the firm with new technological opportunities. Usually, it is in charge of prototype and pilot projects.
Advanced Threat Detection (ATD) Appliances:
All communications allowed to pass through regular layers of security controls are examined using advanced threat detection (ATD) appliances as an additional layer of security. These appliances use a combination of executable analysis, source reputation, and threat-level protocols to find advanced targeted attacks that other security measures miss.
Advanced Web Services:
Advanced Web services employ Web services standard functionality that goes beyond that which has been the norm. Any Web-services-related standards that go beyond the fundamental capabilities of SOAP, WSDL, and UDDI were included in the original definition. However, those features, long thought to be advanced, are now a part of the fundamental Web services package because of the emergence of the Web Services Interoperability (WS-I) Organization profiles and the widespread acceptance of standards like WS-Security, BPEL, and associated components. Basic Web services are widely and regularly used in various contexts and have reached the Plateau of Productivity. The most sophisticated Web services can handle asynchronous activity like WS-ReliableMessaging and complex security interactions like WS-Trust and WS-Federation. Because many interactions using Web services don’t require these capabilities or use other methods to achieve them, Web services using these advanced standards have been adopted more slowly. This is partly due to the slow pace of the ratification of the standards and rollout of their behavior (see “‘That’s All’ for Web Services” G00209765). This definition of advanced Web services differs from the one used in past Hype Cycles, and better reflects the capabilities’ current condition. The position and rate of adoption have also changed due to this adjustment.
Advertisement Action:
Any activity connected to advertising that permits engagement and communication between the advertiser and the audience is referred to as an advertisement action. Examples include clicking on a phone number to call the advertiser or utilizing a hyperlink to go to the advertiser’s website.
Advocacy Marketing:
Advocacy marketing is a field for mobilizing brand advocates on the social Web at a scale never before possible. Given the exponential growth of social networks, endorsements and recommendations are amplified to potentially millions of individuals when digital tools and advocate tales support advocacy marketing. However, loyalty and retention programs are increasingly aggressively utilizing advocacy marketing, which has previously been utilized successfully to attract new customers.
Aerial And Digital Imagery:
Aerial and digital imagery refers to the methods used by home and property insurers to inspect properties using digital photographs, including those in 3D, as well as the software that uses the photos to calculate the size, closeness to hazards, and location of physical sites or properties. It is typically provided through a data as a service (DaaS) on the Internet, where customers, such as homeowners or commercial property insurers, pay monthly membership fees or per usage to obtain data on the risks they are underwriting or claims they are investigating.
Affective Computing:
Through sensors, microphones, cameras, and/or software logic, effective computing technologies can detect a user’s emotional state and react by implementing certain predetermined product/service features, such as altering a quiz or suggesting a selection of videos to suit the learner’s mood. One of the main disadvantages of online learning compared to classroom learning is the teacher’s inability to quickly adjust the educational situation to the student’s emotional state in the classroom. Affective computing aims to address this issue.
Affiliate Marketing:
Commission-based affiliate marketing is used. Affiliates promote a company’s goods and have compensated a commission based on the leads or sales generated by their promotion.
Affirmative Action:
Affirmative action is a set of guidelines intended to give members of underrepresented groups equitable access to opportunities. Affirmative action policies aim to reduce employment, education, and income disparities between demographic groups and foster workplace diversity. Regional differences in affirmative action laws continue to be a source of legal and political debate.
Ageism:
Ageism, often known as age discrimination, is treating someone unfairly because of their age. In the workplace, this could manifest as a person being passed over for a job or promotion, older workers being denied benefits, or early termination of employment. Ageist beliefs can harm a victim’s health and cause people to be marginalized in their community. Anti-discrimination laws are intended to shield individuals from unfair practices like ageism.
Agency Balanced Scorecard:
Marketers use an agency-balanced scorecard to assess their agency partners’ performance and offer useful criticism for development. These scorecards should give each agency a numerical rating based on a clearly defined set of critical characteristics and metrics relevant to the organization’s marketing strategy. For marketing leaders to be able to audit, monitor, and analyze the effectiveness of their agency relationships, balanced scorecards should emphasize the agency’s talents and collaborative abilities.
Agent Collaboration Tools:
Using secure email, document sharing, communication tools, and secure instant messaging, agents and customers can cooperate in an electronic virtual workspace provided by agent collaboration solutions. When dealing with complicated life insurance cases or planning scenarios, these technologies facilitate communication between agents and specialists in the home office, clients, or other parties (including accountants and attorneys). The ability to make customer financial planning and account information available via agent websites is one of the cooperation options available to agents.
Agent Portal Solutions:
Agent portal capabilities, such as workflow and transaction capabilities, including quoting, binding, and service, are delivered by agent portal systems. Solutions enable upload and download capabilities to serve distributor needs in complicated product lines like specialized and commercial property and casualty (P&C) insurance. They also include advanced features like collaboration and case management.
Agile:
Agile is a development approach that delivers software in increments by following the principles of the Manifesto for Agile Software Development.
Agile Marketing Project Management:
Making marketing programs more relevant, adaptable, and effective through applying tools, procedures, and organizational design principles influenced by software development methodology is known as agile marketing project management.
Agile NeoRAD:
Extreme programming is an agile approach in this kind of project strategy. Models are not high-quality development artifacts; they are sketches. Standardization raises relatively few difficulties regarding the reuse of frameworks and analysis and design patterns. Model-based code generation isn’t very common.
AIM (AOL Instant Messenger):
A pioneering, free, and open instant messaging service. A wide range of free client software supports Windows and Macintosh PCs, the Palm OS, Microsoft’s Pocket PC, and Symbian mobile phones. Likewise, see instant messaging (IM).
AIOps (Artificial Intelligence for IT Operations):
To automate IT operations procedures like event correlation, anomaly detection, and causality determination, AIOps blends big data with machine learning.
AIOps Platform:
Through the scalable ingestion and analysis of the ever-increasing volume, variety, and velocity of data created by IT, an AIOps platform integrates big data and machine learning functionality to support all key IT operations functions. The platform allows for the simultaneous use of many data sources, data collection techniques, analysis tools, and presentation software.
Algorithmic Business:
Algorithmic business is the industrialized application of sophisticated mathematical algorithms essential for enhancing business judgment or automating processes to gain a competitive edge.
All-in-one (AIO) PCs:
According to Gartner, all-in-one (AIO) PCs are desktop computers with integrated monitors. The monitor has a flat screen that is touch-sensitive. Examples include the iMac from Apple, the HP TouchSmart, the Lenovo ThinkCentre Edge, the Dell Inspiron One, the Acer Z5801, the Asus E-Top, and the Sony VAIO VPC.
Alias:
A short, easy-to-remember name generated to replace a longer, more difficult name; is widely used in email programs. Also known as a “nickname.”
Alliance And Relationship Management:
A set of processes and tools known as alliance and partnership management is necessary to strengthen alliances/relationships with partners, outsource functions or activities, and retain visibility into a relationship with another corporate entity. Entities that contribute to developing and delivering an organization’s value proposition are included in relationships.
Alternative Card Networks:
For authorization, clearing, and settlement procedures, an alternative card network sends payment messaging (or payment instructions) through a communications network (for instance, an IP-based network) using its protocol (arrangements among participating entities, such as issuers, acquirers, processors and operators of the payment system network).
Alternative Delivery Models:
Alternative delivery methods are strategies for acquiring, delivering, and packaging IT in unconventional ways. Traditional IT development and delivery approaches are encased in finely tuned internal procedures whereby the IT organization develops or acquires technology (hardware or software), deploys it, supports it, and retires it. New channels for use, payment, and acquisition are a part of alternative distribution and acquisition strategies. Alternative models, which omit the IT department, may be used in some businesses and just involve users and business units.
Ambient And Glanceable Displays:
A special class of information appliances intended to be integrated into the home and workplace are ambient and glanceable displays and devices. They communicate only the essential details in a way that uses the brain’s “preattentive” processing capacity. This allows users to take in the information without diverting their focus from foreground tasks.
AMD (Architected, Model-driven Development):
AMD represents the most advanced SOA modeling. It emphasizes reliability, efficiency, and reusability. It is offered in the AMD composition and AMD development “flavors.” AMD composition assumes that the required services are already available and can be “assembled” into a business service or application, maybe with a new user interface (generally portal-based, using Web services). The specifications needed by workflow orchestration systems in the runtime environment can typically be generated by organizations using AMD composition models.
AMD development is predicated on the notion that new organizations must create software services before composition. AMD development tools can reuse the same business models created by people who do AMD composition. However, depending on the sort of service, IT staff typically refines these into more intricate models to generate anywhere from 70% to 100% of the code. AMD also consists of a group of techniques that provide “executable” models (where there is no explicit transformation to implementation).
American National Standards Institute (ANSI):
The American National Standards Institute (ANSI), which represents US stakeholders in international standardization forums, manages the creation and application of voluntary consensus standards in the United States. ANSI is actively involved in accrediting initiatives that evaluate standard compliance.
American Standard Code For Information Interchange (ASCII):
For the digital representation of uppercase and lowercase Roman letters, numbers, and special control characters in teletype, computer, and word processing systems, the American Standard Code for Information Interchange (ASCII) standard table of seven-bit designations is used. Similar coding, known as Extended Binary-Coded Decimal Interchange Code, is used by some IBM systems (EBCDIC). Many hardware and software vendors have created their own nonstandard and incompatible extensions of the official ASCII 128-character set into a 256-character set because most computer systems need a whole byte to communicate an ASCII character.
Americans With Disabilities Act:
A US law known as the Americans with Disabilities Act of 1990 (ADA) forbids discrimination based on physical or mental handicaps. Because the ADA recognizes disability as a protected class, it offers disabled individuals the same anti-discrimination protections as the Civil Rights Act of 1964. The ADA also established accessibility standards for public facilities and required companies to make reasonable accommodations for workers with disabilities. Many other nations have passed legislation extending safeguards to those with impairments.
AMG (Access Media Gateways):
A circuit-based voice switch and a packet-based IP or ATM access network are connected via an access media gateway (AMG). An AMG is connected to the local exchange or an access node and manages the PSTN to packet network transition at the local loop level. It can support VoIP and/or VoATM and has Class 5 switch interfaces.
Inverse AMGs, which connect a PSTN Class 5 local exchange to a packet-access domain (such as DSL, cable hybrid fiber-coax, power line, and local multipoint distribution service) using a Generic Requirement (GR)-303, V5.x interface, Primary Rate Interface (PRI) (Q.931) V5.2 access node (AN), and GR-303 remote digital terminal, are included in the AMG segment (RDT).
AMIA (American Medical Informatics Association):
A non-profit organization devoted to advancing and applying medical informatics in patient care, education, research, and healthcare administration. The AMIA serves as an authoritative body in medical informatics and represents the United States in international forums in the informational arena of medical systems and informatics.
AMIS (Audio Messaging Interchange Specification):
Enterprise locations can transfer and forward voice messages between systems thanks to a major system function that has been improved for voice/call processing. Regardless of who makes the system, it is a voice processing standard that outlines the steps to network voice processing systems.
AMO (Application Management Outsourcing):
The continuing management, conversion, improvement, and support of a portfolio of applications by a third party. AMO is a subset of application outsourcing (see separate item). It contains modifications that typically take less time to implement than a certain amount of time (e.g., ten days or 30 days). Maintenance tasks include updating software, installing new releases, changing regulations, and “repairing it if it breaks” troubleshooting. Transferring personnel and application software to the vendor may be part of AMO.
Amortization:
An accounting method called amortization is used to spread payments out over a predetermined time. Amortization allows businesses to either spread out the cost of an intangible asset over time for accounting and tax purposes or to pay off the debt in equal monthly installments over time (also known as loan amortization) (also known as asset amortization).
AMPS (Advanced Mobile Phone Service):
U.S.-originated analog cellular standard, now largely obsolete.
AMR (Adaptive Multirate):
With a GSM codec that decreases the codec rate in reaction to interference, operators may save money on capital expenses by lowering the number of cell sites required to support the user base.
Analytic Applications:
Business intelligence (BI) capabilities for a certain domain or business issue are bundled as analytical applications. Traditional, adaptable BI systems frequently lack the “packaging” necessary to promote acceptance across most employees. A user interface designed for informal users, predetermined integration with common business process applications, issue-specific data models, and best-practice templates or wizards are a few examples of packing.
Analytical Hierarchy Process (AHP):
Creating the hierarchy of characteristics relevant to choosing the IT vendor.
Determining the traits’ relative relevance. Evaluating the performance of the alternatives with each hierarchy component.
The AHP, which Thomas Saaty created while a professor at the Wharton School of Business at the University of Pennsylvania, is acknowledged as the most influential theory in multicriteria decision-making.
Analytics:
The term “analytics” has come to be used generically to refer to many business intelligence (BI) and application-related projects. Some define it as analyzing data from a certain domain, like website analytics. Others focus on utilizing the depth of BI capabilities in a particular subject area (for example, sales, service, or supply chain). BI providers, in particular, utilize the term “analytics” to set their products apart from the competition. The term “analytics” is increasingly used to refer to statistical and mathematical data analysis that groups, segments, scores, and forecasts the most likely outcomes of various scenarios. Regardless of the application cases, the term “analytics” has become more prevalent in corporate jargon. Business and IT workers interested in utilizing massive amounts of internally generated data are increasingly interested in analytics.
Analytics and Business Intelligence (ABI):
ABI is an umbrella word that refers to the software, infrastructure, tools, and best practices that make it possible to access and analyze information to enhance and optimize actions and decisions.
Anonymous FTP:
Archive sites where Internet users can log in and download files and programs without a special username or password. Typically, you enter anonymous as a username and your email address as a password.
Answer Marketplace:
In a social setting known as an answer marketplace, a participant can ask a question, and other participants can add to and improve the responses. Answer marketplaces are feasible in almost every social media setting. Still, they are especially created to make the activity more convenient by providing frameworks that allow an exchange of value, such as money or points. For instance, people who ask a question may provide payment in exchange for an answer, and those who supply the answer may provide a “price” for their knowledge. Both sides may make offers and counteroffers. Reviewing several offers and credentials allows users to select the most appealing one. The method may be open or closed (meaning anonymity is managed as part of the marketplace process). The interaction’s outcomes may also be made public or private.
Anti-Spam:
Both end users and administrators of email systems employ numerous anti-spam strategies to stop email spam. Several of these strategies have been included in goods, services, and software to make things easier for users and administrators. Each method contains trade-offs between mistakenly rejecting good emails and not rejecting any spam, as well as the time and effort expenses involved. No method is a perfect solution to the spam problem. The issue is virtually fully solved by ITAdOn Cloud-Based Anti-SPAM email service. Our cutting-edge solution enables users to view only the email they desire while removing all viruses and unsolicited email before it reaches their PCs and mobile devices.
API Management:
An organization’s ability to publish APIs safely and securely, either internally or externally, depends on a combination of people, processes, and technology known as API management. An API gateway, developer portal, and administrative user interface with reporting and analytics features are examples of common components. Some API management programs provide monetization features.
Applet:
A tiny application-running program known as an applet. Applets are frequently used to add interactivity to static Web sites. Examples include games, customizable bar charts, moving images, and scrolling messaging. Applets are also crucial in network computers (NCs). They strengthen an NC’s independence from the server since. Once the NC has received the applet, they don’t require communication with the operating system (residential on the server) to work.
Appliances:
Appliances are a broad category of integrated systems and related solutions that span the data center, the personal computer, and software delivery. The market, suppliers with relevant market initiatives, and derivatives can interpret it in various ways. On the other hand, Appliances offer shared technology, hardware, software administration, and services; they are more than just IT bundles with marketing.
Applicant Tracking Systems (ATS):
The hiring process is automated using applicant tracking systems (ATSs). Vendors can now increase the functionality of their solutions for candidate acquisition and self-service thanks to the Internet. The software-as-a-service (SaaS) model continues to be the most popular distribution method in this industry. The vendor environment has continued to consolidate as the market has grown older.
Many e-recruitment suppliers have recently implemented social software capabilities, and practically all of them have it on their roadmaps for future products. The range of functionality offered by different providers differs greatly. Many vendors are attempting to take advantage of social networks like Facebook, LinkedIn, and Twitter due to social software’s influence. The user experience of hiring managers and candidates needs to be improved to effectively handle several issues. We are addressing social recruitment as a whole.
Application Architecture:
The field of study known as application architecture directs the design of applications.
Application architecture paradigms include principles that affect design choices and patterns that offer tried-and-true design solutions, such as service-oriented architecture (SOA).
Application Control:
Under the more general heading of host-based intrusion prevention systems, application control solutions fall under endpoint (such as desktop and server) security. Advanced application control solutions offer increasing degrees of control over what an application may do while running as it interacts with system resources. Basic application control solutions determine whether a given executable code is authorized to execute.
Application Data Management (ADM):
Application data management (ADM) is a business discipline supported by technology in which business and IT collaborate to guarantee consistency, accuracy, stewardship, governance, semantic consistency, and accountability for data in a business application or suite, such as ERP, custom software, or core banking. Application data is the organized collection of extended attributes and identifiers kept and/or used by an application or suite. These entities include, for instance, clients, vendors, goods, assets, websites, and prices.
Application Delivery Controller (ADC):
By unloading servers, offering comprehensive payload inspection, and making the most of intricate protocols, application delivery controllers (ADC) are used in data centers to increase application performance, security, and resource efficiency. They were initially intended to deliver services for Web applications with an external facing, but they are today used to supply services for many different business applications and protocols. More deployment flexibility is now possible thanks to recent advancements in software-based and virtual ADC systems, particularly in cloud services and virtual environments.
Application Development (AD):
Application Lifecycle Management (ALM), design, construction, automated software quality, and other Application Development software are among the technologies represented in the Application Development (AD) software market.
Application Infrastructure:
Application infrastructure is software platforms for delivering business applications, including development and runtime enablers.
Application Infrastructure Suite (AIS):
Due to the market’s evolution, products that were once referred to as integration suites within this segment are now included with ESB suites. Only application platform suite features are presently available for application infrastructure suites. Application platform suites are collections of portals, middleware for integration, business component engineering, and BPM. They are designed to accommodate numerous project styles, such as process integration, new SOA applications, and composite applications.
Application Integration:
The process of allowing separately created programs to cooperate is called application integration. Frequently needed abilities include:
- maintaining consistency between various copies of the data (in independently built programs)
- coordinating the coordinated flow of numerous actions carried out by various applications
- giving users access to information and features from various programs that were each independently created using what seems to be a single user interface or application service
Application Life Cycle Management Platform as a Service (ALM PaaS):
ALM PaaS (application life cycle management platform as a service) solutions are cloud-delivered technologies created to control the creation and distribution of software. These technologies integrate fundamental ALM features with Web service-based flexibility and cloud infrastructure delivery. ALM PaaS tools can support both on-premises and cloud apps.
Application Management:
To manage custom applications, packaged software applications, or network-delivered apps, application management offers a wide range of application services, procedures, and approaches.
Application Modernization Services:
Application modernization services deal with transferring legacy applications to new platforms or applications and integrating new functionality to give the business the newest features. Several modernization alternatives are available, including re-platforming, re-hosting, recoding, rearchitecting, re-engineering, interoperability, replacement, and retirement. The application architecture may also be modified to help choose the best action.
Application Obfuscation:
Application obfuscation refers to a group of technologies used to defend against application-level attacks, reverse engineering, and hacking efforts on an application and its embedded intellectual property (IP). Application obfuscation solutions shield the application code from hackers who can readily reverse-engineer IP included in software thanks to the rising use of intermediate language representations (like Java and.NET).
Application Outsourcing:
A wide range of application services is covered under application outsourcing arrangements, including new development, legacy system maintenance, offshore programming, management of packaged applications, and staff augmentation. Although personnel transfers are typically included in this type of outsourcing, the phrase has recently been expanded to cover situations when they are not, such as staff augmentation. Activities involving system integration are excluded.
Application Performance Monitoring (APM):
Digital experience monitoring (DEM), application discovery, tracing, and diagnostics, as well as specially developed artificial intelligence for IT operations, are all parts of the monitoring software suite known as “application performance monitoring” (APM).
Application Platform as a Service (PaaS):
service-based application platforms A cloud service called (PaaS) provides environments for developing and deploying application services.
Application Program:
Often known as system software, software programs can be either supervisory or application programs. Application programs include directives that delegate execution to the system software to carry out input/output operations and other rudimentary tasks via the application programming interface (API).
Application Programming Interface (API):
A database or application’s data can be accessed programmatically through an application programming interface (API), which is an interface. It can be a foundation for creating novel interactions with people, other apps, or intelligent gadgets. Companies launch a platform business model using APIs to meet the demands of a digital transformation or ecosystem.
Application Release Automation (ARA):
Often used for Java Platform, Enterprise Edition (Java EE), and.NET applications, application release automation (ARA) tools concentrate on the modeling and deployment of bespoke application software releases and their associated customizations. Versioning is a feature provided by these tools to support best practices for integrating related artifacts, applications, configurations, and data throughout the application life cycle. Deploying continuous releases is supported by ARA tools. Workflow engines are frequently incorporated to aid in automating and monitoring human tasks.
Application Server:
Business applications are delivered by a high-end application server designed for online transaction processing with guaranteed performance, availability, and integrity levels. Following the nature of the business application and the standards in the specific industry for which the application has been created, an application server also supports a variety of application design patterns. Although most have a special preference for one or two, it normally supports various programming languages and deployment platforms. Some application servers, like Java Enterprise Edition (Java EE), that implement common application interfaces and protocols, are wholly proprietary. Currently, proprietary application servers are not available as stand-alone products; instead, they are frequently included in operating systems, packaged programs (such as portals and e-commerce solutions), or other goods. Business applications are delivered by a high-end application server designed for online transaction processing with guaranteed performance, availability, and integrity levels. Following the nature of the business application and the standards in the specific industry for which the application has been created, an application server also supports a variety of application design patterns. Although most have a special preference for one or two, it normally supports various programming languages and deployment platforms. Some application servers, like Java Enterprise Edition (Java EE), that implement common application interfaces and protocols, are wholly proprietary. Currently, proprietary application servers are not available as stand-alone products; instead, they are frequently included in operating systems, packaged programs (such as portals and e-commerce solutions), or other goods..
Application Service Provider (ASP):
An organization is referred to as an application service provider (ASP) if it uses a rental or usage-based transaction-pricing model to supply application functionality and related services to many customers across a network. The supply of standardized application software across a network, though not specifically or only the Internet, via an outsourcing agreement based on usage-based transaction pricing is what Gartner refers to as the application service provider (ASP) market. The ASP industry comprises a variety of service providers (including independent software suppliers, network/telecommunications providers, and Web hosting and IT outsourcing).
Application Sharing:
Application sharing allows two or more users to simultaneously and equally control the contents of a document within an application (such as a word processing document, spreadsheet, or presentation slide) across a local area network, wide-area network, or modem connection. Enables people to collaborate on the same documents remotely with shared editing and control rights. one of the data conferencing components.
Application Software Services:
Back-office, ERP, and supply chain management (SCM) software services and collaborative and individual software services are all included in the application software services segment. It also includes front-office CRM software services and engineering software.
Application, Channel, Technology, And Industry (ACT I):
The “survival locations” for vendors of integrated document management (IDM) are referred to by the Gartner term ACT I. A survival location is a market sector where a vendor may create a long-lasting competitive advantage. For a vendor to succeed in the long run in any market, there must be a critical mass of sustainable competitive advantage.
Application-Specific Integrated Circuit (ASIC):
An application-specific integrated circuit (ASIC) is a chip on which the pattern of connections has been set up exclusively for a specific function.
Application-Specific Standard Product (ASSP):
An integrated circuit (IC) offered to multiple users and devoted to a particular application market is known as an application-specific standard product (ASSP). ASSPs, a subclass of embedded programmable logic, integrate digital, mixed-signal, and analog products. Gartner refers to such ICs as “application-specific integrated circuits” when sold to a single user.
Application:
A program designed for a specific purpose, such as word processing or graphic design.
Applications Portfolio Analysis (APA):
Applications portfolio analysis (APA) is a tool for classifying existing and planned applications into three groups based on how much they improve the performance of the enterprise: utility, enhancement, and frontier. Payroll is an example of a utility category that is necessary but does not improve the performance of the enterprise; enhancement category applications are those that enhance the performance of the enterprise through the use of established technology, and frontier category applications aim to significantly improve the enterprise performance but typically carry a high level of risk. Cost, chance identification, and innovation are the respective management concerns for each category. The three areas should be balanced as best as possible to achieve the best possible performance in the future and the right value from the planning process.
Architected Rapid Application Development (ARAD):
Architected rapid application development (ARAD), which integrates design and analysis patterns and frameworks, evolved from object-oriented analysis and design tools. Typically, patterns, frameworks, and (optional) models can help businesses produce 50% to 70% of their source artifacts. Organizations are increasingly using a hybrid strategy that combines agile concepts and practices with conventional iterative methodologies like ARAD.
Architecture:
The general layout of a computing system and the logical and physical connections between its parts as it relates to computers, software, or networks. The system’s hardware, software, access procedures, and protocol usage are all outlined in the design.
A plan and set of rules for creating new systems. IT architecture is a set of guiding principles, norms, or regulations that an organization uses to steer the process of acquiring, constructing, altering, and integrating IT resources across the firm. These resources are a few examples of equipment, software, communications, development processes, modeling tools, and organizational structures.
Artificial Intelligence (AI):
Artificial intelligence (AI) applies advanced analysis and logic-based techniques, including machine learning, to interpret events, support and automate decisions, and take action.
Artificial Intelligence Model Operationalization (ModelOps):
A set of skills called “artificial intelligence (AI) model operationalization” (ModelOps) focuses on the governance and total life cycle management of all AI and decision models. This encompasses artificial intelligence (AI), knowledge graphs, rules, optimization, natural language processing, and agent-based models. Models focus on operationalizing all AI and decision models, as opposed to MLOps (which exclusively focuses on the operationalization of ML models) and AIOps (AI for IT operations).
Assemble To Order:
A product or service can be created to a specific order using the “assemble-to-order” technique, which enables many items to be put together from standard parts in different ways. This necessitates sophisticated planning procedures concentrating on mass customizing final goods to individual consumers while anticipating changing demand for internal components or accessories.
Asset Performance Management (APM):
The capabilities of data capture, integration, visualization, and analytics are all included in asset performance management (APM), specifically designed to increase the availability and dependability of physical assets. Condition monitoring, predictive forecasting, and reliability-centered maintenance are all concepts included in APM (RCM).
Asynchronous Transfer Mode (ATM)
Asynchronous transfer mode (ATM), a wide-area network (WAN) technology, is a switching and transmission transfer method that effectively and flexibly arranges information into cells. It is asynchronous in that the recurrence of cells relies on the needed or instantaneous bit rate. Thus, when data is waiting, empty cells do not pass past. The key to ATM’s strong versatility is its potential to offer a protocol-, speed-, and distance-independent, high-capacity, low-latency switching fabric for all forms of information, including data, video, image, and voice. ATM offers virtual data circuits with speeds ranging from 45 Mbps to 622 Mbps and fixed-length cells with a 53-byte length. Cells from numerous sources are multiplexed onto a single physical circuit via statistical multiplexing. Faster processing rates can be achieved with straightforward hardware circuits thanks to the fixed-length fields in the cell that include routing information utilized by the network. The major advantage of ATM is its capacity to handle a variety of communications services while maintaining transport independence.
ASCII file:
A file that practically any computer can open and read using a typical text editor tool (like Notepad or Simple Text). Additionally known as “plain text files.” Examples include ASCII-formatted texts saved in word processors like Microsoft Word or WordPerfect, HTML files, and emails produced by programs like Outlook.
Asynchronous Transmission:
Each information character, and occasionally each word or short block, is separately synchronized during an asynchronous transmission process, often accomplished using start and stop elements.
Attenuation:
Attenuation is a signal’s magnitude reduction during transmission between two sites due to the transmission medium. Decibels are typically used to express attenuation.
Attrition:
Employee attrition is when workers leave a company for whatever cause (voluntarily or involuntarily), such as retirement, termination, death, or resignation. The attrition rate is calculated by dividing the rate at which employees depart a business by the typical number of employees over a specific time.
AT command set:
An established set of commands for operating modems that start with the letters “AT.” As an illustration, ATDT instructs the modem to dial (D) via touch-tone dialing (T). Pulse dialing is specified by ATDP (P). additionally known as the “Hayes Command Set.”
Attachment:
A file that is transmitted with an email message in this situation. Other files must be encoded and sent individually; ASCII (plain text) files may be attached to the message content (common formats that can be selected include MIME, BinHex, and Uuencode).
Audio Mining/speech Analytics:
Audio mining and speech analytics use tools such as transcription, phonetic analysis, and keyword mining to glean information from prerecorded voice streams. This knowledge may then be applied to categorize calls, start workflows and alerts, and improve personnel and operational performance throughout the company.
Augmented Analytics:
To improve how people explore and understand data in analytics and BI systems, enhanced analytics enables technologies like machine learning. It AI to help with data preparation, insight production, and explanation. By automating numerous steps in the development, management, and deployment of data science, machine learning, and AI model, it also supports the work of expert and citizen data scientists.
Augmented Intelligence:
A design pattern for a human-centered partnership model called augmented intelligence envisions people and artificial intelligence (AI) cooperating to improve cognitive function, including learning, decision-making, and novel experiences.
Augmented Reality (AR):
The utilization of information in the form of text, pictures, music, and other virtual upgrades that are combined with physical items is known as augmented reality (AR). This “real world” component sets augmented reality apart from virtual reality. Unlike a simulation, augmented reality (AR) integrates and enhances the user’s engagement with the real environment.
Authentication Service:
An authentication service is a method for securely authenticating the identities of network clients by servers and vice versa without assuming the integrity of any party’s operating system. It is equivalent to using passwords on time-sharing systems (e.g., Kerberos).
Authentication Technologies:
Products and services that use various authentication techniques in place of outdated password-based authentication are referred to as authentication technologies.
Automated Document Factory (ADF):
The Gartner term refers to an architecture and set of procedures to control the production and distribution of high-volume, mission-critical digital documents. Raw resources, such as data and preparation instructions, enter the ADF, where they are converted into digital documents and made ready for delivery. The ADF uses factory production concepts in the document manufacturing process.
Automated Payment Tracking And Reconciliation Services:
The tracking of payments and related documents (invoices and collections) and the release of payments are all made possible by automated payment tracking and reconciliation systems. Reconciliation of transactions, cash application, liquidity analysis, and updating of credit positions are all made possible by the bank’s connection to the customer’s general ledger. Items that are exceptions are marked for more investigation.
Automated System Operations (ASO):
Automated system operations (ASO), sometimes known as “lights-out operations,” is a mix of hardware and software that enables a computer installation to run unattended or without the requirement for a human operator to be present at the installation’s location.
Automated Teller Machine (ATM):
An automated teller machine (ATM) is public banking equipment typically connected to a central computer through multiplexed data networks and leased local lines.
Authentication:
The procedure for identifying yourself and having your identity confirmed. You should enter your username and password on computers to access restricted information.
Are you looking for Result oriented SEO Service?
You came to the right place. The majority of internet users start by searching for a need. People utilize the internet to find the information they need or locate a nearby restaurant, the right article of apparel, or the best contractor for a home renovation.
Our toSEO strategy has evolved over the years to keep up with every algorithm change and change in the digital environment. Thanks to new tactics, hours (more like days) of keyword research, and a team that makes it a point to stay up to date on industry trends, we’ve continually improved our specialist SEO services and built strategies customized to each organization’s needs.
Our staff has the resources, knowledge, and experience you need in your corner to grow your business, whether you’re a new startup attempting to establish yourself, updating outdated optimization tactics, or improving the performance of your present website.
B
Backbone:
A backbone is a high-speed line or network of lines that creates the network’s quickest (in terms of bandwidth) path. Often, it serves as a metanetwork.
Bandwidth:
Bandwidth can be defined as follows:
- The frequency range that can travel across a specific transmission channel. The circuit’s bandwidth governs the speed at which data can be carried through it; the more bandwidth, the more data can be sent in a given time. Bits per second are generally used to gauge bandwidth. Network planners now prioritize expanding bandwidth capacity due to the proliferation of multimedia, particularly videoconferencing, and the rise in Internet usage.
- A modulated signal’s signal-to-noise ratio (SNR) is evaluated over a range of frequencies on either side of the carrier frequency. Another name for this range is bandwidth. Video discs frequently use 15 kilohertz (kHz) on either side.
BCP:
whereby businesses prepare for the restoration of their complete operational system. This includes a strategy for any other resources needed in the business process, as well as workspaces, phones, workstations, servers, software, network connections, and other resources.
BI:
Organizational analytics, encompassing historical, present, and predictive perspectives of business operations, are referred to as “business intelligence” in the industry. Business intelligence (BI) services are provided to design, develop, and deploy business processes and integrate, maintain, and manage the associated platforms and applications. These include data warehousing infrastructure, analytics requirements, and business and infrastructure applications for BI platforms. Along with the standard BI platform, data warehouse/data infrastructure, and data quality sectors, solutions also cover corporate performance management (CPM) and analytics.
Binary file:
A file is incompatible with common text editors like Notepad or Simple Text. Examples include documents produced by programs like Word or WordPerfect or DOS files with the “.com” or “.exe” extension.
BinHex:
A typical Macintosh file format that facilitates the delivery of binary files over the Internet as ASCII files. A file can be encoded and renamed with a “.hqx” extension using a tool like Stuffit. The file is decoded by the recipient using a similar application.
Bit:
The most elementary piece of data a computer can recognize and the process is a binary digit, which can be either 0 or 1.
Blended learning:
Instruction that incorporates elements of both in-person (F2P) and online learning situations. At OSU, this mixture is now offered in an expanding number of courses.
Blog:
A blog, a shortened version of “weblog,” is a website that makes it simple for visitors to add entries in the past tense. The entries are typically archived regularly and then shown in reverse chronological order (the most recent entry is shown first). Although blogs are typically used to express thoughts on current affairs like sports, music, fashion, or politics, they have evolved over the past three years as trusted platforms for business and personal communication. “Microblogging” has developed because of social media sites like Twitter, which not only let people exchange 140-character updates with the world but also operate as an impressive platform for news and taste-sharing because a blogger or journalist can utilize it to convey information.
Bluetooth:
A low-power wireless networking technology called Bluetooth uses the unlicensed 2.4 GHz Industrial, Scientific, and Medical (ISM) band for operation. Bluetooth devices fall into two categories: Class 1 and Class 2. Class 1 devices have a higher output power and a range of approximately 100 meters, whereas Class 2 devices have lesser power and a range of approximately 10 meters. Up to eight devices can network ad hoc via Bluetooth (supporting voice and data). Established by IBM, Intel, Ericsson, Nokia, and Toshiba in 1998, the Bluetooth Special Interest Group (SIG) is more than 2,500 organizations that support it. The Bluetooth v.1.0 specification, which enabled data rates up to 1Mbps, was approved and released in 1999. The enhanced data rate (EDR) specification for Bluetooth Version 2.1 was approved in March 2007. It supports communication rates of up to 3 Mbps and streamlines “pairing,” the procedure for securely connecting two Bluetooth devices. Additionally, it decreased power consumption, doubling the battery life of mobile devices such as headsets, for which Bluetooth radio accounts for a significant portion of the power budget. In April 2009, the SIG approved Version 3.0 (“Seattle”), which integrated Wi-Fi as a substitute transport layer for large amounts of data and supported data rates of up to 24 Mbps.
BMP:
A typical image format on Windows computers is the bitmap file. This type of file’s name typically includes the extension “.bmp.”
Bookmark:
A function found in several applications, such as Internet Explorer, Firefox, and Acrobat Reader, allows you to quickly access a specific online page or point inside a document (PDF).
Boolean logic:
A type of algebra where every value is simplified to one of the following: true, false, yes, no, on, off, or 1/0.
Bounce:
When an email message is returned to you as undeliverable, this phrase is used to describe it. The percentage of sessions where a person loads a webpage but instantly leaves without taking any further action is known as the bounce rate.
Bridge:
Bridges are devices that join two Local Area Networks (LANs) or two sections of a single LAN. They simply forward packets without inspecting or rerouting them.
Broadband connection:
A high-speed Internet connection; at the moment, the two technologies that are most widely used to enable such access are cable modems and DSL (Digital Subscriber Lines). Broadband channels can simultaneously transmit speech, data, and video because they are carried via coaxial or fiber-optic cables with greater bandwidth than traditional telephone lines. Broadband connectivity uses digital subscriber lines (DSL) and cable modems as examples.
Browser:
A browser is a software used to search for and present data on the Internet or an intranet. Web pages are most frequently accessed through browsers. The majority can show text, graphics, and images; however, some multimedia content (such as sound and video) may need additional software, also known as “plug-ins.”
Buffer:
When sending data from one device to another, a buffer is a storage device that helps make up for differences in the pace of data flow or the timing of events.
Buffered:
Data that is gathered but not immediately made accessible. As opposed to offering a word-for-word translation, a language translator would listen to the entire statement before repeating what the speaker had said. A tool like Real Media Player can display streaming media data that is buffered.
Business continuity:
Business continuity refers to the activity carried out by an organization to guarantee that essential business functions will be accessible to clients, suppliers, regulators, and other entities that require those functions to be available. Numerous daily tasks like project management, system backups, change control, and help desk is included in these operations. Business continuity refers to the everyday activities to sustain service, consistency, and recoverability. It is not something that is implemented at the time of a disaster. Please click here to learn more.
Business continuity plan:
Businesses plan to recover their entire business process through business continuity planning (BCP), a comprehensive catastrophe recovery strategy. This includes a strategy for any other resources needed in the business process, as well as workspaces, phones, workstations, servers, software, network connections, and other resources. Please click here to learn more.
BYOD:
Bring your device (BYOD) is an alternate method that enables users to run enterprise apps and access data on a client device they have personally chosen and purchased. Typically, it covers tablets and smartphones, although the approach can also be used on PCs. A subsidy could be part of it.
Byte:
A collection of nearby binary numbers that a computer combines to create a character, like the letter “C,” in a single operation. Eight bits make up a byte. The intermediate code created and run by a virtual machine is known as “byte code” (VM). Any platform on which the VM runs supports the use of byte code in the same manner.
C
Cable modem:
A unique kind of modem that attaches to a nearby cable TV line to offer constant access to the Internet. A cable modem sends and receives data similar to an analog modem but with substantially quicker transfer rates. A cable modem can achieve roughly 1.5 Mbps, although a 56 Kbps modem can only receive data at about 53 Kbps (about 30 times faster). A 10Base-T Ethernet card inside your computer is where cable modems are connected.
Cache:
An instruction and temporary data storage space close to a computer’s central processing unit (CPU), typically implemented in high-speed memory, is referred to as a cache. It uses fewer resources than the source to copy data from main memory or storage to speed up access. Data can be retrieved faster since it is nearer to the CPU.
Captcha:
To ascertain if the user is a person or an automated bot, a challenge-response test in the form of an image of distorted text must be completed.
Carrier services:
ITAdOn will offer your business the most suitable and affordable carrier solutions because they are accredited agents for the top names in the telecoms sector. All of your voice, data, Internet, and conferencing solutions will be designed, implemented, and supported by ITAdOn.
Case-sensitive:
Usually refers to a data input field; case-sensitive restrictions prevent lower-case letters from having the same meaning as their upper-case counterparts. As an illustration, “data” is not recognized as the same word as “Data” or “DATA.”
CBT:
Computer-based training is a style of instruction where students use specialized computer software to learn a particular application. A computer application used to support a teacher or trainer in the classroom may also be referred to as “CAI” (Computer-Assisted Instruction) or “CBI” (Computer-Based Instruction), or both.
CD-R drive:
A kind of disk drive that can burn both audio CDs and CD-ROMs. Multi-session CD-R drives enable you to keep adding data to a compact disk, which is crucial if you intend to use the drive for backup.
CD-ROM:
Compact Disk, Read-Only Memory; a secondary storage device with a large capacity. A CD only allows for read-only access to the data. For the creation of fresh CDs, the OIT Multimedia Lab has specialized CD-ROM mastering equipment that can be reserved.
CD-RW, CD-R disk:
You can add data to a CD-RW disk more than once instead of simply one (a CD-R disk). With a CD-R drive, you can use a CD-RW disk to create CD-ROMs and audio CDs and back up data in the same way you would a floppy or zip disk.
CGI:
When a Web server needs to communicate or receive data from an application, such as a database, the Common Gateway Interface (CGI) standard is utilized. The Web server sends the request to a database, where a CGI script retrieves the results and sends them back to the Web client.
Chat:
Real-time interaction between two or more users using computers connected to a network. Any user may type a message that will appear on the monitors of all other participants after entering a discussion (or chat room). Although most ISPs provide chat, OIT does not support it. However, the campus CMS (Carmen) that TELR supports does enable live chat amongst students enrolled in online courses.
Client:
A software or system that asks one or more servers, sometimes known as other systems or programs, to do certain tasks. Typically, the client is the workstation in a client/server setup.
Client-server technology:
Refers to a connection between two networked computers where one computer (the server) receives a request from the other for its services (the client). The client computer then locally processes the information that was retrieved.
Cloud:
The Cloud is a common abbreviation for a cloud computing service offered (or perhaps an accumulation of all current cloud services). For further information, please check here.
Cloud computing:
A broad phrase for Internet services includes social networking services (like Facebook and Twitter), online backup services, and browser-based applications. Computer networks connected via the Internet for server redundancy or cluster computing are also considered a part of cloud computing.
CMS:
Marketing professionals and their agents (such as webmasters) can create and manage text, graphics, pictures, audio, and video for use in Web landing pages, blogs, document repositories, campaigns, or any other marketing activity requiring single or multimedia content with the help of content management systems, which are made up of a set of templates, procedures, and standard format software.
Compress:
The technique of reducing a file’s size to save disk space and speed up network transport. The most popular compression tools are Winrar (.zip files) for PCs and compatible devices and Stuffit (.sit files) for Macs.
Connect:
A phrase frequently used to describe connecting to a remote computer, it’s also the name of the message that appears when two modems recognize one another.
Cookie:
A piece of code that is permanently stored in a file on a computer’s hard drive by a website that the user has visited. The code “registers,” or uniquely identifies, that person and can be used for various marketing and website tracking reasons.
Coordinated Vulnerability Disclosure (CVD)
Coordinated Vulnerability Disclosure (CVD) is a process where security researchers and software vendors work together to responsibly report and address vulnerabilities. It involves sharing information about the vulnerability in a coordinated manner, allowing the vendor to develop patches and protect users from potential security risks. An example of this is when Microsoft’s researchers were able to identify and disclose the Migraine vulnerability, leading to Apple promptly addressing and patching the security flaw.
Courseware:
Software created especially for use in a school environment.
CPU:
The part of a computer system in charge of command interpretation and execution. A PC’s central processing unit (CPU) consists of a single microprocessor. In contrast, a mainframe’s more powerful CPU comprises many processing units—in some cases, hundreds. Often, a CPU is referred to as a “processor.”
CSP:
A business model for offering cloud services is the cloud service provider. Please click here to learn more.
CSS:
CSS is a set of guidelines that specify how web pages should be shown. With the use of CSS, designers may establish guidelines that specify how the page
Cursor:
A unique symbol shows you where the next character you type will display on your screen. The pointer on your screen can be moved around using either your mouse or the arrow keys on your keyboard.
Cyberspace:
A phrase used to describe the usage of computers in society.
D
DaaS:
Desktop as a Service (DaaS) is a service that offers consumers a virtualized desktop experience that is given on demand from a remote hosting site. It entails allocating resources to host workloads and provisioning, patching, and maintaining the management plane.
Daemon:
A unique, little program that carries out a particular function; it may run continuously, watching a system, or operate just when a function is required. For instance, you might get a notification from the mailer daemon if an email message is returned to you as undeliverable.
Database:
It can be compared to an electronic file system in that data collection is arranged so that a computer application can easily retrieve certain data. In conventional databases, fields, records (a complete set of fields), and files are structured (a collection of records). As an alternative, any object (such as text, a photograph, or a movie) in a hypertext database can be connected to any other object.
Datacenter:
The division of an organization responsible for housing and maintaining the organization’s mainframes, servers, and databases is known as the data center. When big, centralized IT operations were prevalent, this division and all of the systems were housed in a single physical location, giving rise to the moniker “data center.”
Due to today’s more dispersed computing techniques, single data center facilities are still widespread but are dwindling in number. No matter how far out these systems are, the phrase is still used to describe the department in charge.
The way businesses approach their data center strategy is evolving due to market and sector dynamics. Several forces are compelling enterprises to look beyond traditional technological infrastructure silos and change how they see their data center environments and operational procedures. These include ongoing cost sensitivity, the need for greater energy efficiency, and aging data center infrastructures that run the danger of not fulfilling future business requirements.
Decompress:
Restoring a file to its original size and format is the opposite of compressing a file. The most popular tools for decompressing files are Stuffit Expander (.sit files) for Macintosh computers and Winrar (.zip files) for PCs and related devices.
Defragmentation:
The technique of rewriting bits of a file to contiguous sectors on a hard disk boosts access and retrieval speed.
Degauss:
A procedure used to eliminate magnetism from a computer display. Note that flat-panel displays do not have a degauss button, as magnetism doesn’t build up.
Desktop:
The background where windows, disk icons, and program icons live on IBM PCs and Macs.
DHCP:
Dynamic Host Configuration Protocol assigns temporary IP addresses to computers and other network devices on a local network.
Degaussing:
A way to remove the magnetism from a computer monitor. Flat-panel displays don’t have a degauss button because magnetic fields don’t build up inside them.
Desktop:
On computers like IBM PCs and Macintoshes, the screen behind which windows and icons for drives and programs are located.
DHCP:
In a local area network, a server may use the Dynamic Host Configuration Protocol to assign a computer or other network device a temporary IP address (DHCP).
Dialog box:
On a graphical user interface system, a program or process may display what is sometimes referred to as a window to prompt a user to enter data into one or more boxes (fields).
Dial-Up Adapter:
A Windows network component that supports modem connections to dial-up servers. A Dial-Up Adapter must be installed and correctly configured before users may use dial-up connections with Windows computers.
Dial-up connection:
A connection is made from your computer using a standard phone line. You utilize specialized communications software to tell your modem to call a number to connect to another computer system or network. Alternatively known as “dial-up networking.”
Digital asset:
Anything uniquely recognized kept digitally and used by companies to realize value is considered a digital asset. Documents, music, video, logos, slide shows, spreadsheets, and websites are a few digital assets.
Digitize:
Digitize is to change from analog into digital form. The process of converting an image, a sound, or a video clip into a digital format for usage on a computer; is sometimes known as digital imaging. Also used to describe how coordinates on a map are transformed into x and y coordinates for computer input. A series of zeros and ones must be used to digitally encode all data that a computer processes.
DIMM:
A tiny circuit board that can house a collection of memory chips is called a dual in-line memory module. Instead of the 32 bits that each SIMM can manage, a DIMM can transfer 64 bits. SIMMs must be installed two at a time rather than one at a time when installing DIMMs because Pentium processors need a 64-bit path to memory.
Directory:
A location on a disk that houses files or extra groups of folders or subdirectories. When files are sorted into distinct categories, such as by application, category, or usage, directories can help.
Disaster recovery
The process, policies and processes involved in being ready for the restoration or continuance of the technological infrastructure that is essential to an organization following a natural or man-made disaster are known as disaster recovery measures. Business continuity is a subcategory of disaster recovery. While disaster recovery focuses on the IT or technology systems that support company processes, business continuity entails planning for keeping all areas of an organization operating even in the face of disruptive occurrences. You may have complete peace of mind knowing that your crucial systems and processes are protected and/or that you can recover from any potential data loss situation with the support of ITAdOn’s expert Disaster Recovery Consulting Team. Please click here to learn more.
Disaster recovery planning:
Making preparations to ensure the prompt restoration of information technology assets and services in the event of a disaster like a fire, flood, or hardware malfunction.
Discussion group:
Another term for an online newsgroup or forum.
Distance education:
The terms “online learning” and “eLearning” are also acceptable. A method of instruction suggests a teacher and pupils are separated by time and/or space during the course. Asynchronous or synchronous interactions are both possible (self-paced). Students might use various course materials or platforms like chat or discussion groups to collaborate on assignments.
Distance learning:
The purpose of distance learning; the terms distance learning and distance education are frequently used synonymously.
Dither:
A technique for changing the pattern of dots to provide the appearance of different hues and shades; the more dither patterns a device or application can support, the more shades of gray it can represent, in the context of printing, also known as halftoning.
DNS:
Domain Name System is a service that allows users to access networked computers using their names rather than their (IP) addresses.
Domain:
An Internet address’s first part. There are domains and subdomains in the network structure. Major categories like com, edu, and government are shown at the top, followed by domains that fall under those categories like Ohio-state and subdomains. In the hierarchy, the computer name is at the bottom. A domain name, which consists of at least two segments separated by periods, is a distinctive identifier for an Internet site or Internet Protocol (IP) network address. The Web Internet Registry, where top-level domains are registered, charges an annual operating fee.
Download:
Transferring a file from a server or other computing device to a computer through a network. The way you connect to the network can have a big impact on how long downloads take.
Dpi:
The resolution of a printer is measured in dots per inch. The print quality improves as the number rises. A resolution of at least 300 dpi is typically needed for professional-quality printing.
DRaaS:
In a natural disaster or server failure, disaster recovery as a service aids data recovery.
Drag and drop:
Selecting one icon and placing it on top of another to start a particular activity. As an illustration, drag a file over a folder to copy it to a different location.
DSL:
A method for voice lines to access high-speed networks or the Internet. There are several types, including symmetric DSL (SDSL), very-high-bit-rate DSL, high-bit-rate DSL (HDSL), and asymmetric DSL (ADSL) (VDSL). The term “xDSL” is sometimes used to describe the entire group.
DVD:
Digital video disks are a type of compact disc that can store far more data than CD-ROMs, typically used to store music files. A DVD can store at least 4.7 GB, sufficient for a feature-length film. Video data is compressed using MPEG-2 for DVD storage. DVD drives can play CD-ROMs and are backward-compatible.
DVD-RW, DVD-R disk:
Instead of only allowing you to write data onto a DVD-R disk once, a DVD-RW disk allows you to write data onto it several times. A full-length movie can be stored on a DVD with a minimum storage capacity of 4.7GB. Storage for multimedia presentations with sound and graphics is another purpose for DVDs.
E
EAP:
Extensible authentication protocol (EAP) is A framework, and transport for other network access authentication protocols, the extensible authentication protocol (EAP) is extensible. By utilizing the Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol, the original dial-up Point-To-Point Protocol (PPP) only offered minimal security (CHAP). EAP was added to facilitate more complex authentication, especially on wireless networks.
EGA:
An extended Graphics Adapter, a card (or board) that allows the monitor to display 640 pixels horizontally and 350 pixels vertically, is typically seen in older PCs.
eLearning:
Web-based learning, computer-based training, virtual classrooms, and online collaboration are just a few examples of activities under the umbrella term “electronic learning.” Content can be distributed in many other ways, including the Internet, satellite broadcast, interactive TV, and DVD- or CD-ROMs.
Email:
Electronic mail is sending and receiving messages between users linked to the same system or over a network (often the Internet). A new message is kept for later retrieval if a user is not logged on when it arrives.
Email archiving:
In most cases, email archiving is a standalone IT solution that works with a business email server like Microsoft Exchange. These programs use various technical implementation techniques to do more than just collect email messages; they index stored messages and offer rapid, searchable access independent of system users. The protection of mission-critical data, record keeping for legal or regulatory needs, and decreased production email server load are just a few reasons a business could decide to implement an email archiving system. The most recent storage technologies are provided to you by ITAdOn’s cloud-based email archiving service in a safe, redundant, and simple manner. From setting up our archiving software to automatically transferring the files to our secure remote servers, we take care of all the little details.
Emoticon:
A string of keyboard symbols intended to depict a facial emotion. Similar to how voice tone is utilized in spoken conversations, this is frequently employed in electronic communications to communicate a specific meaning. Examples are the symbols for a wink or a happy face.
Emulation:
Emulation is the ability of a program or device to act like another program or device. For example, drivers for terminal emulation are often included with communications software, which lets you connect to a mainframe. Some programs can make a Mac work like a PC.
Encryption:
A bit stream is usually encrypted before it is sent so that people who shouldn’t be able to read it can’t.
EPS:
Encapsulated PostScript is a graphics format that describes a picture using the PostScript language.
Ethernet:
Xerox invented the baseband local area network (LAN), later backed by Hewlett-Packard, Digital Equipment (now Compaq Computer), and Intel. It has a bus topology with CSMA/CD access control or carrier sense multiple access with collision detection. IEEE (Institute of Electrical and Electronics Engineers) 802.3 differs from Ethernet. Related terms consist of:
Ethernet address, commonly known as a MAC address, is a 48-bit Layer 2 networking code maintained by the IEEE and hardwired into network adapters.
Ethernet coaxial thick cable is appropriate for medium- to large-sized networks or those with widely dispersed nodes.
- Ethernet, thin: Only appropriate for small networks with closely spaced nodes. Ethernet coaxial wire.
Ethernet card:
An adapter card that connects to Ethernet cabling and fits inside of computers; different types of adaptor cards fit different types of computers. All laptops connected to the campus network contain an Ethernet card of some description. An illustration would be computers connected to ResNet in university offices or dorm rooms. Additionally known as an “Ethernet adaptor.”
Expansion card:
A circuit board that you can plug into a slot within your computer to offer new capabilities is also known as an expansion board. A card can be inserted into an empty slot or used to replace an existing one. Examples include internal modem cards, sound, graphics, USB, and Firewire.
Extension:
The file type is indicated by a suffix followed by a period at the end of a filename. A file with the ending “.exe” is an executable file on a Windows computer.
F
Female connector:
A cable connection with holes that inserts into a port or interface to connect two devices.
Field:
A single piece of data is stored in a database (e.g., an entry for name or address). A distinct region within a dialog box or window where information can be input is also referred to as.
File:
A nameless collection of data (called the filename). Almost all data on a computer is saved in some sort of file. Examples: data file (contains data, such as a set of records); executable file (contains an executable program or commands); text file (contains data that can be read using a standard text editor).
Filter:
A program that converts data into another format (such as a program used to import or export data or a specific file); 2) a pattern that prevents non-matching data from passing through (such as email filters); and 3) a special effect that can be applied to a bit map in paint programs and image editors.
Finger:
One of many UNIX systems’ varieties of directory services. The format for queries is a first name, last name (for example, jane doe), or for extra information, =firstname.last name (for example, =jane doe).
Firewall:
A firewall is a program or a complete computer (such as an Internet gateway server) that manages network access and keeps an eye on network traffic movement. An external incursion into a private network can be prevented using a firewall, which can filter and block undesirable network traffic. When a local network connects to the Internet, this is very crucial. With the growth of Internet usage, firewalls have emerged as essential software.
FireWire:
A method of connecting various pieces of technology to enable quick and simple information sharing. Like USB, FireWire is known as the IEEE1394 High-Performance Serial Bus. When Apple first developed it in 1995, it came before the advent of USB. As long as the power is on, FireWire devices can be connected and unplugged at any moment since they are hotly pluggable. The term “plug-and-play” refers to how an operating system automatically recognizes a new FireWire device when it is attached to a computer and requests the driver disk.
Flash-drive:
A little gadget connects to a computer’s USB port and works as a portable hard drive.
Flash-memory:
An information-preserving form of memory is frequently found in memory cards and USB flash drives for storing and transferring data between computers and other digital products.
Folder:
A hard drive location that houses a group of related files or the icon for a directory or subdirectory.
Font:
An entire set of characters in different sizes and styles, including letters, numerals, and symbols. A huge variety of fonts are available, from formal typefaces for business to those made up of unique characters like math symbols or tiny images.
Frames:
A function of some web browsers that allows the presentation of a page in independent scrollable windows. Frames can be challenging to translate for text-only reading following ADA rules; hence their use is becoming less and less common.
Freeware:
Free, unlimited personal use is allowed with copyrighted software available for download; anything else requires the author’s written consent. Unlike shareware, copyrighted software necessitates registration and a nominal cost to the author if you choose to keep using a downloaded program.
Fragmentation:
Fragmentation is the scattering of pieces of a single disk file over a disk’s surface due to the addition and deletion of files.
FTP:
An Internet Protocol (TCP/IP) standard for listing directories, copying files, and logging into networks. In other words, it allows users to transfer files, list directories, delete and rename files on the foreign host, and perform wild-card transfers in addition to providing user authentication.
G
GIF:
Graphics Interchange Format is a file format for images and graphics. This type of file’s name typically includes the extension “.gif.” GIF files are commonly used as images on websites.
Gigabyte (Gig or GB):
It is usually adequate to think of a gigabyte as roughly one billion bytes or 1000 megabytes. A gigabyte is equal to 1024 × 1024 x 1024 (2 to the 30th power) bytes.
GPS:
Satellites in the Global Positioning System orbiting the Earth. In a more general sense, GPS refers to a GPS receiver that uses the mathematical concept of “trilateration” to pinpoint your location at any given time.
Greyware:
A harmful program or code thought to exist in the “grey area” between legitimate software and a virus is called grey ware (or grayware). All other unwanted or bothersome software, including adware, spyware, trackware, other malicious code, and harmful shareware, is called greyware.
GUI:
A graphic user interface is a mouse-based system with icons, drop-down menus, and windows where you can point and click to indicate what you want to do. This technology is present in every new Windows and Macintosh computer being marketed.
H
Handshaking:
The initial round of negotiation takes place when two modems have connected. When the modems understand the data transmission protocol (e.g., error correction, packet size, etc.). The protocol is the set of guidelines they decide upon.
Hard disk:
A storage device that can accommodate vast amounts of data, typically in the hundreds of gigabytes to thousands. Some types of hard disk devices are connected independently for usage as extra disk space, even though they are typically internal to the computer. Although the terms “hard disk” and “hard drive” are frequently used interchangeably, the term “hard drive” actually refers to the device that reads data from the disk.
Hardware:
The keyboard, display, disk drive, internal chips, and cables make up a computer’s physical parts. The opposite of software is hardware.
Header:
The part of an email or a network newsgroup posting that comes before the message’s content and includes details like the sender, the message’s subject, and the time. Additionally, a header is the part of a packet that comes before the contents and contains extra information the recipient will need.
Help desk:
A help desk is a place where people may go for information and support when they have issues with computers or other comparable devices. Businesses frequently offer toll-free support, a website, and/or email to consumers and employees who need help. ITAdOn provides three different help desk services: private-labeled, outsourced, and 24-7 Support365. Please click here to learn more about our services.
Helper application:
A tool for viewing multimedia files that your web browser can’t handle, the contents must be downloaded to your computer before they can be viewed or played. Comparatively speaking, a plug-in lets you see the file online without first downloading it.
Home page:
A file you access with a web browser, such as Firefox or Internet Explorer. It typically refers to a website’s home page, which also happens to be the page that loads when a browser is launched.
Host:
A machine that a user uses a remote connection to access. Also describes a particular computer linked to a TCP/IP network, such as the Internet.
HTML:
A language used mostly to prepare documents evolved from the Standard Generalized Markup Language (SGML). The user’s browser decodes HTML instructions and formats the screen’s fonts, graphics, and page layout. One of HTML’s more potent features is the ability to construct hyperlinks that let users switch between pages and files with a single click. Additionally, HTTP is occasionally utilized for message attachments to provide rich text formatting across different product boundaries.
The term “dynamically generated HTML,” sometimes mistaken with the Netscape and Microsoft technology known as dynamic HTML, refers to HTML produced by a software or service (DHTML). These technologies provide client-side tools for increasing HTML documents’ and Web browsers’ functionality.
HTTP:
The HyperText Transfer Protocol is a collection of guidelines that spells out how a web server and browser should communicate with one another. An HTTP instruction instructing the webserver to fetch and provide the requested web page is delivered when you open a location (for example, input a URL) in your browser.
Hyperlink:
A spot on a website where clicking with the mouse will take you to another website. Hyperlinks, often known as “links” or “hot links,” are comparable to hypertext. On the Web, hyperlinks are frequently utilized to fill in the navigational, referencing, and depth gaps left by published material. A graphic or text can be used to generate a hyperlink.
Hypertext:
Information that links to additional information; is frequently seen on web pages and online help files. Typically, important words are italicized or underlined. An illustration of a connected topic is when you look up information on “Cats” in a reference book and come across the notation, “Refer also to Mammals.” A link in a hypertext file allows you to jump to the relevant information by clicking on it.
Hypervisor:
One of the various hardware virtualization methods that enable multiple operating systems, known as guests, to run concurrently on a host computer is a hypervisor, also known as virtual machine management (VMM). It is conceptually one level higher than a supervisory program, hence its name. The hypervisor controls the execution of the guest operating systems and provides the guest operating systems with a virtual operating platform. Multiple instances of different operating systems may share the physical resources that have been virtualized. Hypervisors are installed on server hardware with the sole purpose of running guest operating systems. Similar activities can be performed using non-hypervisor virtualization solutions on dedicated server hardware and frequently on desktop, laptop, and even mobile devices.
I
IaaS:
IaaS is a standardized, highly automated service model in which computing resources held by a service provider are made available to consumers on demand, together with storage and networking capabilities. Resources are fluid and scalable in almost real-time, metered by consumption. Customers have direct access to self-service interfaces, such as an API and a graphical user interface (GUI). Resources are hosted by the service provider or on-site in a customer’s data center and can be single-tenant or multitenant.
Icon:
A little image or symbol that symbolizes a certain object or function on a system like Windows or Macintosh that uses a GUI. A file folder for a directory, a rectangle with a rounded corner for a file, or a little graphic for a program are a few examples.
ICS:
Internet Connection Sharing (ICS) is a Windows feature that lets you connect a single computer on your home network to the Internet when turned on.
IEEE-1394 port:
The IEEE-1394-port is a plug-and-play interface connecting high-speed serial devices to your computer.
Image-map:
A graphic overlay with many clickable areas (or hot spots) that point to different web pages or anchors. An alternative to text links for pointing users to more information is an image map.
IMAP:
Access Protocol for Internet Messages. IMAP and POP3, which need messages to be transferred to a user’s hard drive before the message can be viewed, differ significantly in this regard. A means of reading email messages on a server without downloading them to your hard drive.
Internet:
A global network built on the TCP/IP protocol that can link practically every major computer brand or model, from microcomputers to supercomputers. Users with a network connection can perform tasks like processing email or browsing the Web using the accustomed desktop computer interface thanks to specialized software called “clients.”
Internet Explorer:
You can surf the World Wide Web using a client program from Microsoft that is pre-installed on most new PCs or comparable systems.
Internet radio:
Using embedded wireless networking technology (such as a connected “infotainment” head unit) or a wireless consumer device that is connected to the vehicle (such as a user’s smartphone), Internet radio transmits music that is stored on a server to an Internet-connected vehicle. Without keeping any music files on the consumer device or head unit of the car, music is accessible online in both scenarios. In some cases, the streaming service provider permits caching music for the user to listen to when they are offline.
IP address:
A special number that distinguishes a computer on the Internet and is given out by an Internet authority. The number is made up of four sets of 0 to 255-digit numbers that are separated by periods (dots). A good example of an IP address is 195.112.56.75.
IRC:
A system that permits two or more Internet users to have real-time online conversations is known as Internet Relay Chat.
IRQ:
Refers to a number connected to a serial port on a PC or other compatible computer; interrupt request. Typically, changing it requires flicking a dip switch. The IRQ number allocated to the serial port that links the modem may occasionally need to be changed to avoid conflicts with other devices, such as your mouse, when you’re using a modem to connect to the Internet.
ISP:
A business that offers its clients access to the Internet. Most ISPs are too tiny to obtain access directly from the network access point (NAP); therefore, they typically purchase bits of bandwidth from bigger ISPs. A modem or a direct connection, which gives far faster rates, can be used to access the Internet.
Although they occasionally offer Internet access, online services differ from Internet service providers. Online services give users access to special databases, forums, and content unavailable elsewhere.
IT Assessment:
Information on a portion of the entire IT network infrastructure is gathered through an IT assessment, which is then presented in a thorough report. Typically, this report assesses the present condition of technology or services, suggests areas for improvement, or makes preparations for a system or application upgrade. IT assessments can be carried out internally or contracted to an IT provider. ITAdOn has created a complete assessment approach that involves doing in-depth, detailed inspections of all of your essential technology areas, comparing them to best practices, and then giving you a plan for better utilizing your IT as a competitive advantage.
IV&V:
The process of ensuring that a project, service, or system adheres to specifications and serves its intended purpose is known as independent verification and validation (IV&V). You might want a third party to evaluate the work’s quality if you recently introduced a new technology solution.
J
Java:
Sun’s Java platform and its Java programming language are called “Java.” A collection of technologies known as the Java platform offer cross-platform, network-centric computing solutions. The Java platform’s programming language is but one component. The Java programming language, which offers a powerful, object-oriented language for building Java components and applications, the Java Virtual Machine (JVM), which provides a uniform Java byte code emulator for Java’s cross-platform runtime environment, the standard Java-class library packages, which offer sets of reusable services that encourage consistency among components and applications, and the Java platform are the components of the Java platform.
The fundamental features of HTML are expanded and complemented by the Java