abbreviation.id,abbreviation.ts,abbreviation.initial,abbreviation.meaning 101,"2018-04-19 01:25:16",B,"Susceptance (symbolized B ) is an expression of the ease with which alternating current ( AC ) passes through a capacitance or inductance ." 102,"2018-04-19 01:25:22","B channel","In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data. (The ""B"" stands for ""bearer"" channel.)" 103,"2018-04-19 01:25:27",B-channel,"In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data. (The ""B"" stands for ""bearer"" channel.)" 104,"2018-04-19 01:25:28","B-channel (bearer channel)","In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data. (The ""B"" stands for ""bearer"" channel.)" 105,"2018-04-19 01:25:35",B-tree,"A B-tree is a method of placing and locating files (called records or keys) in a database. (The meaning of the letter B has not been explicitly defined.) The B-tree algorithm minimizes the number of times a medium must be accessed to locate a desired record, thereby speeding up the process." 106,"2018-04-19 01:25:40",B2B,"On the Internet, B2B (business-to-business), also known as e-biz, is the exchange of products, services or information (aka e-commerce) between businesses, rather than between businesses and consumers." 107,"2018-04-19 01:25:42","B2B (business-to-business)","On the Internet, B2B (business-to-business), also known as e-biz, is the exchange of products, services or information (aka e-commerce) between businesses, rather than between businesses and consumers." 108,"2018-04-19 01:25:49","B2B2C (business-to-business-to-consumer)","B2B2C (business-to-business-to-consumer) extends the B2B (business-to-business) model to include e-commerce for consumers. The goal is to create a mutually beneficial relationship between suppliers of goods and services and online retailers." 109,"2018-04-19 01:25:55",B2C,"B2C is short for business-to-consumer, or the retailing part of e-commerce on the Internet. It is often contrasted to B2B or business-to-business." 110,"2018-04-19 01:25:58","B2C (Business2Consumer or ...","B2C is short for business-to-consumer, or the retailing part of e-commerce on the Internet. It is often contrasted to B2B or business-to-business." 111,"2018-04-19 01:26:10",B2E,"B2E is business-to-employee, an approach in which the focus of business is the employee, rather than the consumer (as it is in business-to-consumer, or B2C) or other businesses (as it is in business-to-business, or B2B). The B2E approach grew out of the ongoing shortage of information technology (IT) workers. In a broad sense, B2E encompasses everything that businesses do to attract and retain well-qualified staff in a competitive market, such as aggressive recruiting tactics, benefits, education opportunities, flexible hours, bonuses, and employee empowerment strategies." 112,"2018-04-19 01:26:11","B2E (Business2Employee or ...","B2E is business-to-employee, an approach in which the focus of business is the employee, rather than the consumer (as it is in business-to-consumer, or B2C) or other businesses (as it is in business-to-business, or B2B). The B2E approach grew out of the ongoing shortage of information technology (IT) workers. In a broad sense, B2E encompasses everything that businesses do to attract and retain well-qualified staff in a competitive market, such as aggressive recruiting tactics, benefits, education opportunities, flexible hours, bonuses, and employee empowerment strategies." 113,"2018-04-19 01:26:18",B2G,"On the Internet, B2G is business-to-government (a variation of the term B2B or business-to-business), the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web. For example, a Web site offering B2G services could provide businesses with a single place to locate applications and tax forms for one or more levels of government (city, state or province, country, and so forth); provide the ability to send in filled-out forms and payments; update corporate information; request answers to specific questions; and so forth. B2G may also include e-procurement services, in which businesses learn about the purchasing needs of agencies and agencies request proposal responses. B2G may also support the idea of a virtual workplace in which a business and an agency could coordinate the work on a contracted project by sharing a common site to coordinate online meetings, review plans, and manage progress. B2G may also include the rental of online applications and databases designed especially for use by government agencies." 114,"2018-04-19 01:26:19","B2G (Business2Government or ...","On the Internet, B2G is business-to-government (a variation of the term B2B or business-to-business), the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web. For example, a Web site offering B2G services could provide businesses with a single place to locate applications and tax forms for one or more levels of government (city, state or province, country, and so forth); provide the ability to send in filled-out forms and payments; update corporate information; request answers to specific questions; and so forth. B2G may also include e-procurement services, in which businesses learn about the purchasing needs of agencies and agencies request proposal responses. B2G may also support the idea of a virtual workplace in which a business and an agency could coordinate the work on a contracted project by sharing a common site to coordinate online meetings, review plans, and manage progress. B2G may also include the rental of online applications and databases designed especially for use by government agencies." 115,"2018-04-19 01:26:25",B8ZS,"B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted. The device receiving the signal interprets the bipolar violation as a timing mark, which keeps the transmitting and receiving devices synchronized. Ordinarily, when successive ones are transmitted, one has a positive voltage and the other has a negative voltage." 116,"2018-04-19 01:26:27","B8ZS (bipolar 8-zero substitution, ...","B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted. The device receiving the signal interprets the bipolar violation as a timing mark, which keeps the transmitting and receiving devices synchronized. Ordinarily, when successive ones are transmitted, one has a positive voltage and the other has a negative voltage." 117,"2018-04-19 01:26:32",BA,"Business analytics (BA) is the practice of iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis. Business analytics is used by companies committed to data-driven decision-making." 118,"2018-04-19 01:26:37",BAA,"A broad agency announcement (BAA) is a notice from the government that requests scientific or research proposals from private firms concerning certain areas of interest to the government. The proposals submitted by the private firms may lead to contracts." 119,"2018-04-19 01:26:40",Babbage,"If John von Neumann is the father of modern computing, then the English mathematician and inventor Charles Babbage can be considered its grandfather. Babbage designed, though never built, a Difference Engine and an Analytical Engine, the world's first computing machines." 120,"2018-04-19 01:26:47","Baby Bluetooth","Wibree, also called ""Baby Bluetooth,"" is a low-power wireless local area network (WLAN) technology that facilitates interoperability among mobile and portable consumer devices such as pagers, personal digital assistants (PDAs), wireless computer peripherals, entertainment devices and medical equipment. Originally conceived by Nokia and developed in conjunction with Broadcom, CSR and others, Wibree is similar to Bluetooth but consumes a small fraction of the battery power. Wibree operates at a range of 5 to 10 meters (about 16.5 to 33 feet) with a data rate of up to 1 megabit per second (Mbps) in the 2.4-GHz radio-frequency (RF) band. Wibree may be deployed on a stand-alone chip or on a dual-mode chip along with conventional Bluetooth." 121,"2018-04-19 01:26:53","baby botnet","A micro-botnet, also called a mini-botnet or baby botnet, is a small network of Internet-connected computers that have been hijacked to attack specific companies or individuals within a company. Micro-botnets are often used in corporate espionage. Typically, the bots will monitor the enterprise network to identify key individuals and assets and target them for attack. The bots are used to seek out information like financial authentication passwords or data that can be sold to competitors." 122,"2018-04-19 01:27:01","Back Orifice","Back Orifice is a rootkit program designed to expose the security deficiencies of Microsoft's Windows operating systems. The program's name is inspired by the name of Microsoft's BackOffice product. Created by a group of hackers called the Cult of the Dead Cow, Back Orifice allows someone at one computer to control everything on another, remote computer running Windows. Back Orifice can sniff passwords, record keystrokes, access a desktop's file system and more, while remaining undetected." 123,"2018-04-19 01:27:09",back-end,"Front-end and back-end are terms used to characterize program interfaces and services relative to the initial user of these interfaces and services. (The ""user"" may be a human being or a program.) A ""front-end"" application is one that application users interact with directly. A ""back-end"" application or program serves indirectly in support of the front-end services, usually by being closer to the required resource or having the capability to communicate with the required resource. The back-end application may interact directly with the front-end or, perhaps more typically, is a program called from an intermediate program that mediates front-end and back-end activities." 124,"2018-04-19 01:27:15","back-pressure sensor","A back-pressure sensor is a transducer that detects and measures the instantaneous torque that a robot motor applies. The sensor produces a variable signal, usually a voltage , that changes in a linear manner as the torque varies." 125,"2018-04-19 01:27:25",Backblaze,"Backblaze is a provider of online backup services and cloud storage. The vendor, which was founded in 2007 and is based in San Mateo, Calif., offers personal and business cloud backup." 126,"2018-04-19 01:27:33",backbone,"A backbone is a larger transmission line that carries data gathered from smaller lines that interconnect with it." 127,"2018-04-19 01:27:42",backdoor,"A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms." 128,"2018-04-19 01:27:43","backdoor (computing)","A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms." 129,"2018-04-19 01:27:50","backdoor selling","Backdoor selling is a social engineering practice used by a supplier or seller to gain a competitive advantage prior to negotiations or competition for a contract or sale. The practice reduces the buyer’s leverage and the need for negotiation, thereby often assuring a contract or getting a better price for the seller." 130,"2018-04-19 01:28:00","backfire effect","The backfire effect is the tendency of some people to resist accepting evidence that conflicts with their beliefs. The effect is demonstrated when people presented with that conflicting information become even more convinced of their original beliefs rather than questioning them." 131,"2018-04-19 01:28:07",backhaul,"Backhaul, a term probably derived from the trucking industry, has several usages in information technology." 132,"2018-04-19 01:28:12",backlink,"In Hyper-G and possibly other hypertext systems, a backlink is a link back to the page or one of the pages that currently link to the page you're using. Backlinks are already supported to some extent in the present Web system. Using JavaScript or a similar technique, you can add a button to your page that, when clicked, results in a request to the Alta Vista search engine to locate all the Web sites that link to your page (that is, to your home page backlinks)." 133,"2018-04-19 01:28:16",Backoff,"Backoff is point-of-sale malware that uses memory scraping to steal credit card data from Windows-based retail machines on which it is installed." 134,"2018-04-19 01:28:24",backplane,"A backplane is an electronic circuit board containing circuitry and sockets into which additional electronic devices on other circuit boards or cards can be plugged; in a computer, generally synonymous with or part of the motherboard." 135,"2018-04-19 01:28:30","backpropagation algorithm","Backpropagation (backward propagation) is an important mathematical tool for improving the accuracy of predictions in data mining and machine learning. Essentially, backpropagation is an algorithm used to calculate derivatives quickly." 136,"2018-04-19 01:28:39",backronym,"An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a pronounceable word. The word may already exist or it can be a new word. Webster's cites snafu and radar, two terms of World War Two vintage, as examples of acronyms that were created." 137,"2018-04-19 01:28:45",backscatter,"Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing to reveal concealed objects. The process involved is sometimes referred to as ""backscatting."" Backscatter devices have been used for several years in prisons, diamond mines, and customs searches, and are used in some airports as an alternative to metal-detection and pat-downs for security." 138,"2018-04-19 01:28:47","backscatter body scanning","Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing to reveal concealed objects. The process involved is sometimes referred to as ""backscatting."" Backscatter devices have been used for several years in prisons, diamond mines, and customs searches, and are used in some airports as an alternative to metal-detection and pat-downs for security." 139,"2018-04-19 01:28:54","backscatter spam","Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender if the recipient's email address is invalid." 140,"2018-04-19 01:28:58",backscatting,"Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing to reveal concealed objects. The process involved is sometimes referred to as ""backscatting."" Backscatter devices have been used for several years in prisons, diamond mines, and customs searches, and are used in some airports as an alternative to metal-detection and pat-downs for security." 141,"2018-04-19 01:29:06","backside bus","In a personal computer with an Intel processor chipset that includes a Dual Independent Bus (DIB), the frontside bus is the data path and physical interface between the processor and the main memory (RAM). The backside bus is the data path and physical interface between the processor and the L1 and L2 memory. Both the frontside bus and the backside bus can be in use at the same time, meaning that the processor gets more done in a given number of pulses per second (see clock speed)." 142,"2018-04-19 01:29:13",backslash,"The backslash ( \ ) is a typographic and/or keyboard mark that is used in some programming languages and other computing contexts." 143,"2018-04-19 01:29:20",backtracking,"Directory traversal is a form of HTTP exploit in which a hacker uses the software on a Web server to access data in a directory other than the server's root directory. If the attempt is successful, the hacker can view restricted files or even execute commands on the server. Directory traversal attacks are commonly performed using Web browsers. Any server in which input data from Web browsers is not validated is vulnerable to this type of attack." 144,"2018-04-19 01:29:25",backup,"Backup refers to the copying of physical or virtual files or databases to a secondary site for preservation in case of equipment failure or other catastrophe. The process of backing up data is pivotal to a successful disaster recovery (DR) plan." 145,"2018-04-17 04:08:15","Backup and recovery glossary", 146,"2018-04-17 04:08:15","Backup and Recovery Guides and Tutorials", 147,"2018-04-19 01:29:52","Backup and Recovery Quizzes","We've gathered a collection of quizzes to test your knowledge of backup and recovery. You'll find quizzes about backup technologies and strategies as well as the nitty-gritty aspects, such as specific commands." 148,"2018-04-19 01:29:55","backup and recovery testing","A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise." 149,"2018-04-19 01:30:02","Backup and recovery: Do you speak geek?","1. In a data context, this is the activity of copying files ordatabases so that they will be preserved in case of equipment failureor other catastrophe.Answer" 150,"2018-04-19 01:30:08","backup as a service (BaaS)","Backup as a service (BaaS) is an approach to backing up data that involves purchasing backup and recovery services from an online data backup provider. Instead of performing backup with a centralized, on-premises IT department, BaaS connects systems to a private, public or hybrid cloud managed by the outside provider. Backup as a service is easier to manage than other offsite services. Instead of worrying about rotating and managing tapes or hard disks at an offsite location, data storage administrators can offload maintenance and management to the provider." 151,"2018-04-19 01:30:16","backup domain controller","Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system. Windows NT uses the idea of a domain to manage access to a set of network resources (applications, printers, and so forth) for a group of users. The user need only to log in to the domain to gain access to the resources, which may be located on a number of different servers in the network. One server, known as the primary domain controller, manages the master user database for the domain. One or more other servers are designated as backup domain controllers. The primary domain controller periodically sends copies of the database to the backup domain controllers. A backup domain controller can step in as primary domain controller if the PDC server fails and can also help balance the workload if the network is busy enough." 152,"2018-04-19 01:30:22","backup domain controller (Windows NT)","A backup domain controller (BDC) is a role a Windows NT computer takes on to help manage access to network resources. The BDC maintains a read-only copy of a user accounts database and verifies logons from users. The read-only copy of the database is automatically synchronized with primary domain controllers (PDCs)." 153,"2018-04-19 01:30:25","backup log","Backup log is a feature of backup applications that records the events that occur during a backup process." 154,"2018-04-19 01:30:33","backup on the Web","Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a service provider." 155,"2018-04-19 01:30:39","backup robot","Backup refers to the copying of physical or virtual files or databases to a secondary site for preservation in case of equipment failure or other catastrophe. The process of backing up data is pivotal to a successful disaster recovery (DR) plan." 156,"2018-04-19 01:30:47","backup storage device","In computer technologies, a backup storage device is used to make copies of data that is actively in use. Backup machines provide redundancy of data residing on primary storage. Should the storage medium, such as a hard disk drive (HDD), fail or become corrupted, the original data is recovered from copies on the backup hardware. The use of backup storage is imperative in enterprise environments, in which the loss of business data is potentially catastrophic." 157,"2018-04-19 01:30:57","backup utility (BU)","Data backup software is an application used to create a duplicate copy of data to safeguard it and enable recovery in the event it is lost, corrupted or infected by malware." 158,"2018-04-19 01:31:05","backup with DAT USB","A DAT USB drive is a tape drive with digital audio tape (DAT) that can be plugged into a Universal Serial Bus (USB) connection as a simple and relatively low-cost way to back up data, especially data on servers. DAT USB makes tape backup for small businesses available in the hundreds (rather than thousands) of dollars for the first time. Tape is currently the most popular backup medium." 159,"2018-04-19 01:31:10","backward combatible","Backward compatible (or sometimes backward-compatible or backwards compatible) refers to a hardware or software system that can successfully use interfaces and data from earlier versions of the system or with other systems. For example, Perl, the scripting language, was designed to be backward compatible with awk, an earlier language that Perl was designed to replace." 160,"2018-04-19 01:31:14","backward compatibility","Backward compatible (or sometimes backward-compatible or backwards compatible) refers to a hardware or software system that can successfully use interfaces and data from earlier versions of the system or with other systems. For example, Perl, the scripting language, was designed to be backward compatible with awk, an earlier language that Perl was designed to replace." 161,"2018-04-19 01:31:17","backward compatible","Backward compatible (or sometimes backward-compatible or backwards compatible) refers to a hardware or software system that can successfully use interfaces and data from earlier versions of the system or with other systems. For example, Perl, the scripting language, was designed to be backward compatible with awk, an earlier language that Perl was designed to replace." 162,"2018-04-19 01:31:20","backward compatible (backward ...","Backward compatible (or sometimes backward-compatible or backwards compatible) refers to a hardware or software system that can successfully use interfaces and data from earlier versions of the system or with other systems. For example, Perl, the scripting language, was designed to be backward compatible with awk, an earlier language that Perl was designed to replace." 163,"2018-04-19 01:31:25","backward explicit congestion ...","In a frame relay network, FECN (forward explicit congestion notification) is a header bit transmitted by the source (sending) terminal requesting that the destination (receiving) terminal slow down its requests for data. BECN (backward explicit congestion notification) is a header bit transmitted by the destination terminal requesting that the source terminal send data more slowly. FECN and BECN are intended to minimize the possibility that packets will be discarded (and thus have to be resent) when more packets arrive than can be handled." 164,"2018-04-19 01:31:32","backward mapping","Backward mapping (also known as inverse mapping or screen order ) is a technique used in texture mapping to create a 2D image from 3D data. Because a texel (the smallest graphical element in a texture map) does not correspond exactly to a screen pixel , the developer must apply a filter computation to map the texels to the screen. Forward mapping steps through the texture map and computes the screen location of each texel. In comparison, backward mapping steps through the screen pixels and computes a pixel's color according to the texels that map to it." 165,"2018-04-19 01:31:33","backward mapping (inverse mapping or ...","Backward mapping (also known as inverse mapping or screen order ) is a technique used in texture mapping to create a 2D image from 3D data. Because a texel (the smallest graphical element in a texture map) does not correspond exactly to a screen pixel , the developer must apply a filter computation to map the texels to the screen. Forward mapping steps through the texture map and computes the screen location of each texel. In comparison, backward mapping steps through the screen pixels and computes a pixel's color according to the texels that map to it." 166,"2018-04-19 01:31:41",bacn,"Bacn (pronounced as ""bacon"") is Internet slang for email that a user wants to read, but not right away." 167,"2018-04-19 01:31:43",bacon,"Bacn (pronounced as ""bacon"") is Internet slang for email that a user wants to read, but not right away." 168,"2018-04-19 01:31:51","bad block","A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically damaged or corrupted. Bad blocks are also referred to as bad sectors." 169,"2018-04-19 01:31:58","bad neighborhood","A bad neighborhood, in an SEO context, is a group of linked websites with poor reputations and search rankings. Search engines often lower the search result ranks of pages deemed bad neighbors, so they don’t affect the quality of search results by appearing higher in the results than they deserve." 170,"2018-04-19 01:32:05",BadBIOS,"BadBIOS is a BIOS-level Trojan that can affect Windows, Macintosh, Linux and BSD systems." 171,"2018-04-19 01:32:11","baffle (data center hot aisle ...","In data center hot aisle containment, a baffle is anything that disturbs the flow of air through a room, rack or system. A baffle changes the course of airflow or re-directs it. Any device that directs airflow to another location to keep heated parts cooler can be considered a baffle." 172,"2018-04-19 01:32:16","bag of words model (BoW model)","The bag of words model (BoW model) is a reduced and simplified representation of a text document from selected parts of the text, based on specific criteria, such as word frequency." 173,"2018-04-19 01:32:23","BAI2 file format","BAI2 file format is a specialized and standardized set of codes used for cash management by the Bank Administration Institute (BAI). BAI2 files come to an account holder from a bank. The account holder then imports the files to a bookkeeping application and performs bank reconciliation if necessary." 174,"2018-04-19 01:32:29","bait and switch","Bait and switch is a fraudulent practice in which a seller advertises a special deal but makes only a very small number of the items available for purchase." 175,"2018-04-19 01:32:40","baklava code","Baklava code is programming that is unnecessarily complicated by the inclusion of too many abstraction layers." 176,"2018-04-19 01:32:44",BAL,"1) BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating systems. An assembler language consists of computer instructions to the processor, each specifying a specific processor operation and input or output registers or data areas. Most programs are written in higher-level languages. However, assembler language may be needed for programs that must run using little memory or that must execute very quickly." 177,"2018-04-19 01:32:51",BAL,"1) BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating system. An assembler language consists of computer instruction to the processor, each specifying a specific processor operation and input or output registers or data areas. Most programs are written in higher-level languages. However, assembler language may be needed for programs that must run using little memory or that must execute very quickly." 178,"2018-04-19 01:32:51","BAL (Basic Assembler Language or ...","1) BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating systems. An assembler language consists of computer instructions to the processor, each specifying a specific processor operation and input or output registers or data areas. Most programs are written in higher-level languages. However, assembler language may be needed for programs that must run using little memory or that must execute very quickly." 179,"2018-04-19 01:32:59","balanced scorecard","The balanced scorecard is a management system aimed at translating an organization's strategic goals into a set of performance objectives that, in turn, are measured, monitored and changed if necessary to ensure that the organization's strategic goals are met." 181,"2018-04-19 01:33:06","balloon for wireless","A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks. Stratellites, classified as both unmanned aerial vehicles (UAVs) and high altitude airships (HAAs), are the brainchild of Bob Jones, a former NASA scientist. Other companies have proposed similar airships, including Advanced Technologies Group, SkyLINK and SkyTower." 182,"2018-04-19 01:33:12",balun,"A balun is a device that joins a balanced line (one that has two conductors, with equal currents in opposite directions, such as a twisted pair cable) to an unbalanced line (one that has just one conductor and a ground, such as a coaxial cable). A balun is a type of transformer: it's used to convert an unbalanced signal to a balanced one or vice versa. Baluns isolate a transmission line and provide a balanced output. A typical use for a balun is in a television antenna. The term is derived by combining balanced and unbalanced." 183,"2018-04-19 01:33:22",BAM,"Business activity monitoring (BAM), also called business activity management, is the use of technology to proactively define and analyze critical opportunities and risks in an enterprise to maximize profitability and optimize efficiency. The BAM paradigm can be used to evaluate external as well as internal factors." 184,"2018-04-19 01:33:29",band,"In telecommunication, a band - sometimes called a frequency band - is a specific range of frequencies in the radio frequency (RF) spectrum, which is divided among ranges from very low frequencies (vlf) to extremely high frequencies (ehf). Each band has a defined upper and lower frequency limit." 185,"2018-04-19 01:33:35","bandpass filter","A bandpass filter is an electronic device or circuit that allows signals between two specific frequencies to pass, but that discriminates against signals at other frequencies. Some bandpass filters require an external source of power and employ active components such as transistors and integrated circuits; these are known as active bandpass filters. Other bandpass filters use no external source of power and consist only of passive components such as capacitors and inductors; these are called passive bandpass filters." 186,"2018-04-19 01:33:44","bandwagon effect","The bandwagon effect is a psychological phenomenon whereby people do something mostly because others are doing it, often ignoring their personal principles or underlying evidence. It derives from the term “hop on the bandwagon,” in which people become interested in or follow an activity or cause that has recently gained popularity, often to gain acceptance by or recognition from others." 187,"2018-04-19 01:33:48",bandwidth,"Bandwidth is the capacity of a wired or wireless network communications link to transmit the maximum amount of data from one point to another over a computer network or internet connection in a given amount of time -- usually one second. Synonymous with capacity, bandwidth describes the data transfer rate. Bandwidth is not a measure of network speed -- a common misconception." 188,"2018-04-19 01:33:54","bandwidth test","A bandwidth test is a program that sends one or more files of known size over a network to a distant computer (for example, your own computer), measures the time required for the file(s) to successfully download at the destination, and thereby obtains a theoretical figure for the data speed between two or more points, usually in kilobits per second (Kbps) or megabits per second (Mbps)." 189,"2018-04-19 01:33:58","bandwidth test (testing your bandwidth)","A bandwidth test is a program that sends one or more files of known size over a network to a distant computer (for example, your own computer), measures the time required for the file(s) to successfully download at the destination, and thereby obtains a theoretical figure for the data speed between two or more points, usually in kilobits per second (Kbps) or megabits per second (Mbps)." 190,"2018-04-19 01:34:03","bang-bang (bang-bang control)","Bang-bang control is a type of control system that mechanically or electronically turns something on or off when a desired target (setpoint) has been reached. Bang–bang controllers, which are also known as two-step controllers, on-off controllers or hysteresis controllers, are used in many types of home and industrial control systems (ICS)." 191,"2018-04-19 01:34:10","bank identifier code","A bank identifier code (BIC) is a unique identifier for a specific financial institution." 192,"2018-04-19 01:34:17","Bank Secrecy Act","The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.S. financial institutions to collaborate with the U.S. government in cases of suspected money laundering and fraud. The purpose of the BSA, aside from making money laundering more difficult to propagate, is to prevent banks from becoming unknowing intermediaries in illicit activity." 193,"2018-04-19 01:34:17","Bank Secrecy Act (BSA)","The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.S. financial institutions to collaborate with the U.S. government in cases of suspected money laundering and fraud. The purpose of the BSA, aside from making money laundering more difficult to propagate, is to prevent banks from becoming unknowing intermediaries in illicit activity." 194,"2018-04-19 01:34:23",banner,"Depending on how it's used, a banner is either a graphic image that announces the name or identity of a site (and often is spread across the width of the Web page) or is an advertising image. Advertisers sometimes count banner ""views,"" or the number of times a banner graphic image was downloaded over a period of time." 195,"2018-04-19 01:34:30","banner blindness","Banner blindness is the tendency of people to ignore banner ads on Web sites. In 1998, Benway and Lane, a research team, reported the results of studies requiring users to find information located in banner ads. Contrary to the prevailing marketing philosophy that the larger an item on a Web page, the greater its perceived visual importance and likelihood of attracting attention, Benway and Lane found that users had more difficulty finding information when it was located in a banner ad. Benway and Lane called this phenomenon ""banner blindness."" Experts believe that banner blindness occurs because experienced Web users are in ""search mode"" and tend to ignore banner ads as irrelevant for their search." 196,"2018-04-19 01:34:38","banner grabbing","Banner grabbing is the act of capturing the information provided by banners, configurable text-based welcome screens from network hosts that generally display system information. Banners are intended for network administration." 197,"2018-04-19 01:34:44","banner screen","A banner screen is a configurable text “welcome” display from a network host system. The text generally provides system information, such as data about the operating system (OS) and service packs, software versions and web services." 198,"2018-04-19 01:34:47",banner-blind,"Banner blindness is the tendency of people to ignore banner ads on Web sites. In 1998, Benway and Lane, a research team, reported the results of studies requiring users to find information located in banner ads. Contrary to the prevailing marketing philosophy that the larger an item on a Web page, the greater its perceived visual importance and likelihood of attracting attention, Benway and Lane found that users had more difficulty finding information when it was located in a banner ad. Benway and Lane called this phenomenon ""banner blindness."" Experts believe that banner blindness occurs because experienced Web users are in ""search mode"" and tend to ignore banner ads as irrelevant for their search." 199,"2018-04-19 01:34:52",BAPI,"BAPI (Business Application Programming Interface) is a set of interfaces to object-oriented programming methods that enable a programmer to integrate third-party software into the proprietary R/3 product from SAP. For specific business tasks such as uploading transactional data, BAPIs are implemented and stored in the R/3 system as remote function call (RFC) modules." 200,"2018-04-19 01:34:52","BAPI (Business Application Programming ...","BAPI (Business Application Programming Interface) is a set of interfaces to object-oriented programming methods that enable a programmer to integrate third-party software into the proprietary R/3 product from SAP. For specific business tasks such as uploading transactional data, BAPIs are implemented and stored in the R/3 system as remote function call (RFC) modules." 201,"2018-04-19 01:34:59",C,"C is a structured, procedural programming language that has been widely used both for operating systems and applications and that has had a wide following in the academic community. Many versions of UNIX-based operating systems are written in C. C has been standardized as part of the Portable Operating System Interface (POSIX)."