category_1_x_abbreviation.id,category_1.id,category_1.ts,category_1.title,abbreviation.id,abbreviation.ts,abbreviation.initial,abbreviation.meaning 2726,1,"2018-04-17 04:02:28",A,2726,"2018-04-19 04:47:39","acceptance test","Download this free guide Instant Download: Your guide to introducing and maintaining continuous testing The pace of application development has been increasing rapidly. Continuous testing is the only way to avoid bottlenecks. Download this PDF to introduce continuous testing in your organization." 2727,1,"2018-04-17 04:02:28",A,2727,"2018-04-19 04:47:43","acceptance testing","Download this free guide Instant Download: Your guide to introducing and maintaining continuous testing The pace of application development has been increasing rapidly. Continuous testing is the only way to avoid bottlenecks. Download this PDF to introduce continuous testing in your organization." 2728,1,"2018-04-17 04:02:28",A,2728,"2018-04-19 04:47:50",access,"Access is simply being able to get to what you need. Data access is being able to get to (usually having permission to use) particular data on a computer. Web access means having a connection to the World Wide Web through an access provider or an online service provider such as America Online." 2729,1,"2018-04-17 04:02:28",A,2729,"2018-04-19 04:47:56","access control","Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment." 2730,1,"2018-04-17 04:02:28",A,2730,"2018-04-19 04:48:00","Access Control Facility","ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes. ACF2 prevents accidental or deliberate modification, corruption, mutilation, deletion, or viral infection of files. With ACF2, access to a system is denied to unauthorized personnel. Any authorized or unauthorized attempt to gain access is logged. System status can be monitored on a continuous basis, and a permanent usage log can be created. The logging feature, besides helping to identify potential intruders, makes it possible to identify and analyze changes and trends in the use of the system. Settings can be changed on a moment's notice, according to current or anticipated changes in the security or business requirements of the organization using the system." 2731,1,"2018-04-17 04:02:28",A,2731,"2018-04-19 04:48:03","access control list","An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file, or program). Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and UNIX-based systems are among the operating systems that use access control lists. The list is implemented differently by each operating system." 2732,1,"2018-04-17 04:02:28",A,2732,"2018-04-19 04:48:05","access control list (ACL)","An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file, or program). Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and UNIX-based systems are among the operating systems that use access control lists. The list is implemented differently by each operating system." 2733,1,"2018-04-17 04:02:28",A,2733,"2018-04-19 04:48:09","access governance (AG)","Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with end users who have unnecessary access privileges. The need for access governance has grown in significance as organizations seek to comply with regulatory compliance mandates and manage risk in a more a strategic manner." 2734,1,"2018-04-17 04:02:28",A,2734,"2018-04-19 04:48:12","access layer","In the Cisco hierarchial model, also known as the hierarchial internetworking model, the access layer is responsible for providing end user devices with a connection to network resources." 2735,1,"2018-04-17 04:02:28",A,2735,"2018-04-19 04:48:15","access list (AL)","An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset. The asset can be a building, a room or a computer file." 2736,1,"2018-04-17 04:02:28",A,2736,"2018-04-19 04:48:20","access log","An access log is a list of all the requests for individual files that people have requested from a Web site. These files will include the HTML files and their imbedded graphic images and any other associated files that get transmitted. The access log (sometimes referred to as the ""raw data"") can be analyzed and summarized by another program." 2737,1,"2018-04-17 04:02:28",A,2737,"2018-04-19 04:48:23","access method","1) In computing, an access method is a program or a hardware mechanism that moves data between the computer and an outlying device such as a hard disk (or other form of storage) or a display terminal. The term is sometimes used to refer to the mechanics of placing or locating specific data at a particular place on a storage medium and then writing the data or reading it. It is also used to describe the way that data is located within a larger unit of data such as a data set or file." 2738,1,"2018-04-17 04:02:28",A,2738,"2018-04-19 04:48:28","access network","An access network is a user network that connects subscribers to a particular service provider and, through the carrier network, to other networks such as the Internet." 2739,1,"2018-04-17 04:02:28",A,2739,"2018-04-19 04:48:32","Access Network Query Protocol (ANQP)","The Access Network Query Protocol (ANQP) is a query and response protocol that defines services offered by an access point (AP), typically at a Wi-Fi hot spot." 2740,1,"2018-04-17 04:02:28",A,2740,"2018-04-19 04:48:38","access point","In a wireless local area network (WLAN), an access point is a station that transmits and receives data (sometimes referred to as a transceiver). An access point connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network. Each access point can serve multiple users within a defined network area; as people move beyond the range of one access point, they are automatically handed over to the next one. A small WLAN may only require a single access point; the number required increases as a function of the number of network users and the physical size of the network." 2741,1,"2018-04-17 04:02:28",A,2741,"2018-04-19 04:48:41","access point base station","Download this free guide Optical Network Design and Transport 101 Gain best practices for optical network design – including access, metro and core network issues affecting fiber deployment – as well as 3-part overview of DWDM optical network transport." 2742,1,"2018-04-17 04:02:28",A,2742,"2018-04-19 04:48:44","access point mapping","War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere. To do war driving, you need a vehicle, a computer (which can be a laptop), a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be mounted on top of or positioned inside the car. Because a wireless LAN may have a range that extends beyond an office building, an outside user may be able to intrude into the network, obtain a free Internet connection, and possibly gain access to company records and other resources." 2743,1,"2018-04-17 04:02:28",A,2743,"2018-04-19 04:48:47","access provider","An access provider is any organization that arranges for an individual or an organization to have access to the Internet. Access providers are generally divided into two classes: Internet access providers (ISPs) and online service providers (OSPs). ISPs can be local businesses that pay for a high-speed connection to one of the companies (such as AT&T, Sprint, or MCI in the U.S.) that are part of the Internet. They can also be national or international companies that have their own networks (such as AT&T's WorldNet or IBM's Global Services). OSPs, sometimes just called ""online services,"" also have their own networks but provide additional information services not available to non-subscribers. America Online is the most successful example of an OSP." 2744,1,"2018-04-17 04:02:28",A,2744,"2018-04-19 04:48:53","access recertification","Access recertification is an IT control that involves auditing user access privileges to determine if they are correct and adhere to the organization’s internal policies and compliance regulations. Access recertification is typically the responsibility of the organization’s Chief Information Security Officer (CISO) or Chief Compliance Officer (CCO) and may also be known as access attestation or entitlements review." 2745,1,"2018-04-17 04:02:28",A,2745,"2018-04-19 04:48:57","access time","Access time is the time from the start of one storage device access to the time when the next access can be started. Access time consists of latency (the overhead of getting to the right place on the device and preparing to access it) and transfer time." 2746,1,"2018-04-17 04:02:28",A,2746,"2018-04-19 04:49:02",accessability,"Section 508, an amendment to the United States Workforce Rehabilitation Act of 1973, is a federal law mandating that all electronic and information technology developed, procured, maintained, or used by the federal government be accessible to people with disabilities. Technology is deemed to be ""accessible"" if it can be used as effectively by people with disabilities as by those without. To demonstate that a product or Web service is in compliance with Section 508, the creator completes a Voluntary Product Accessibility Template (VPAT), an ""informational tool"" that describes exactly how the product or service does or does not meet Section 508 standards. The completed VPAT gets posted on the creator's Web site to provide government officials and consumers with access to the information." 2747,1,"2018-04-17 04:02:28",A,2747,"2018-04-19 04:49:06",AccessChk,"AccessChk is a free Sysinternals command-line utility that shows what access a user or group of users has to a particular service, file, folder or registry key. It returns deeper results than what's available through access control lists, showing rights associated with every file and directory within a given system in order to identify permissions errors." 2748,1,"2018-04-17 04:02:28",A,2748,"2018-04-19 04:49:10",AccessEnum,"AccessEnum is a free Sysinternals tool that offers administrators a view of the full file system and registry security settings to ensure that users have appropriate permissions to access files and directories. It uses standard Windows security APIs to show permissions information, offering more granular results than standard access control lists." 2749,1,"2018-04-17 04:02:28",A,2749,"2018-04-19 04:49:15","accessibility testing","Accessibility testing is a type of systems testing designed to determine whether individuals with disabilities will be able to use the system in question, which could be software, hardware, or some other type of system. Disabilities encompass a wide range of physical problems, including learning disabilities as well as difficulties with sight, hearing and movement." 2750,1,"2018-04-17 04:02:28",A,2750,"2018-04-19 04:49:20","Accessible Transportation Technologies ...","The Accessible Transportation Technologies Research Initiative (ATTRI) is a five-year, multi-agency research and development (R&D) program aimed at help United States citizens and visitors with visual, hearing, cognitive and mobility challenges to use technology to improve how they plan and execute their travel. Launched in 2013, the objective of the initiative is to help disabled persons, including injured veterans and older adults, to take advantage of advances in intelligent transportation services -- including advances in vehicle and transportation infrastructure technologies, innovations in navigation, data accessibility, artificial intelligence, and object recognition." 2751,1,"2018-04-17 04:02:28",A,2751,"2018-04-19 04:49:25",account,"Download this free guide Download: ERP Updates: AI, Cloud & HCM Find out how you can use ERP reporting to maximize valuable data. Also see how an ERP cloud provider is turning to ADP for core HR services and is integrating Salesforces’ AI Einstein." 2752,1,"2018-04-17 04:02:28",A,2752,"2018-04-19 04:49:30","account-based marketing (ABM)","Account-based marketing (ABM) is a business-to-business (B2B) strategy that focuses sales and marketing resources on targeted accounts within a specific market. Instead of broad-reaching marketing campaigns that touch the largest possible number of prospective customers, an ABM strategy focuses resources for the book of business on a defined set of named accounts. An important goal of ABM is to identify employees at a specific company who are researching products and services and then customize sales programs and marketing messages to meet the needs of buyers and influencers at that company." 2753,1,"2018-04-17 04:02:28",A,2753,"2018-04-19 04:49:35",accountability,"Accountability is an assurance that an individual or an organization will be evaluated on their performance or behavior related to something for which they are responsible." 2754,1,"2018-04-17 04:02:28",A,2754,"2018-04-19 04:49:41","accountable care organization (ACO)","An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties voluntarily assume financial and medical responsibility for Medicare patients. The purpose of an ACO is to enable care coordination that allows a patient to receive the right care at the right time while reducing the risk of medical errors and duplicate services." 2755,1,"2018-04-17 04:02:28",A,2755,"2018-04-19 04:49:47","accounting error","What is an accounting error?" 2756,1,"2018-04-17 04:02:28",A,2756,"2018-04-19 04:49:53","accounts payable","Accounts payable is a liability account in the general ledger (GL). Accounts payable documents money the business owes for purchases of goods or services." 2757,1,"2018-04-17 04:02:28",A,2757,"2018-04-19 04:49:58","accounts receivable (AR)","Accounts receivable (AR) is an item in the general ledger (GL) that shows money owed to a business by customers who have purchased goods or services on credit." 2758,1,"2018-04-17 04:02:28",A,2758,"2018-04-19 04:50:03",accumulator,"An accumulator is a register for short-term, intermediate storage of arithmetic and logic data in a computer's CPU (central processing unit). The term ""accumulator"" is rarely used in reference to contemporary CPUs, having been replaced around the turn of the millennium by the term ""register."" In a modern computers, any register can function as an accumulator." 2759,1,"2018-04-17 04:02:28",A,2759,"2018-04-19 04:50:10",ACD,"An Automatic Call Distributor (ACD) is a telephone facility that manages incoming calls and handles them based on the number called and an associated database of handling instructions. Many companies offering sales and service support use ACDs to validate callers, make outgoing responses or calls, forward calls to the right party, allow callers to record messages, gather usage statistics, balance the use of phone lines, and provide other services." 2760,1,"2018-04-17 04:02:28",A,2760,"2018-04-19 04:50:16",ACeS,"Asia Cellular Satellite System(ACeS) is a combined cellular telephone and satellite wireless system from Ericsson that provides digital communication service to mobile phone and computer users in the Asia Pacific Region. Adding satellite communication to the terrestrial Global System for Mobile (GSM) communication system, ACeS is billed as the first integrated satellite-GSM system in the world. Users with Ericsson dual-mode terminals will be able to roam within the region switching as necessary between cellular (local) service and satellite service." 2761,1,"2018-04-17 04:02:28",A,2761,"2018-04-19 04:50:23",ACF2,"ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes. ACF2 prevents accidental or deliberate modification, corruption, mutilation, deletion, or viral infection of files. With ACF2, access to a system is denied to unauthorized personnel. Any authorized or unauthorized attempt to gain access is logged. System status can be monitored on a continuous basis, and a permanent usage log can be created. The logging feature, besides helping to identify potential intruders, makes it possible to identify and analyze changes and trends in the use of the system. Settings can be changed on a moment's notice, according to current or anticipated changes in the security or business requirements of the organization using the system." 2762,1,"2018-04-17 04:02:28",A,2762,"2018-04-19 04:50:26","ACF2 or CA-ACF2 (Access Control ...","ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes. ACF2 prevents accidental or deliberate modification, corruption, mutilation, deletion, or viral infection of files. With ACF2, access to a system is denied to unauthorized personnel. Any authorized or unauthorized attempt to gain access is logged. System status can be monitored on a continuous basis, and a permanent usage log can be created. The logging feature, besides helping to identify potential intruders, makes it possible to identify and analyze changes and trends in the use of the system. Settings can be changed on a moment's notice, according to current or anticipated changes in the security or business requirements of the organization using the system." 2763,1,"2018-04-17 04:02:28",A,2763,"2018-04-19 04:50:31",ACH,"Automated Clearing House (ACH) is a secure payment transfer system that connects all U.S. financial institutions. The ACH network acts as the central clearing facility for all Electronic Fund Transfer (EFT) transactions that occur nationwide, representing a crucial link in the national banking system. It is here that payments linger in something akin to a holding pattern while awaiting clearance for their final banking destination. Scores of financial institutions transmit or receive ACH entries through ACH operators such as the American Clearing House Association, the Federal Reserve, the Electronic Payments Network, and Visa." 2764,1,"2018-04-17 04:02:28",A,2764,"2018-04-19 04:50:34","Achievers Corp.","Achievers is a maker of talent management software and provider of consulting services headquartered in Toronto, Canada." 2765,1,"2018-04-17 04:02:28",A,2765,"2018-04-19 04:50:41",achromatic,"Achromatic is an adjective that means “free of color.”" 2766,1,"2018-04-17 04:02:28",A,2766,"2018-04-19 04:50:44",ACID,"ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor). These attributes are:" 2767,1,"2018-04-17 04:02:28",A,2767,"2018-04-19 04:50:48","ACID (atomicity, consistency, isolation...","ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor). These attributes are:" 2768,1,"2018-04-17 04:02:28",A,2768,"2018-04-19 04:50:53",ACK,"In some digital communication protocols, ACK is the name of a signal that data has been received successfully (for example, with an acceptable number of errors)." 2769,1,"2018-04-17 04:02:28",A,2769,"2018-04-19 04:50:57",ACL,"An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file, or program). Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and UNIX-based systems are among the operating systems that use access control lists. The list is implemented differently by each operating system." 2770,1,"2018-04-17 04:02:28",A,2770,"2018-04-19 04:51:03",ACM,"The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society. Through its many Special Interest Group s, the ACM fosters research and communication in a broad range of computing areas." 2771,1,"2018-04-17 04:02:28",A,2771,"2018-04-19 04:51:03","ACM (Association for Computing ...","The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society. Through its many Special Interest Group s, the ACM fosters research and communication in a broad range of computing areas." 2772,1,"2018-04-17 04:02:28",A,2772,"2018-04-19 04:51:06","acoustic coupler","An acoustic coupler is a hardware device that enables a modem (a device that converts signals from analog to digital and from digital back to analog) to connect to a voice circuit. A handset adapter is used to receive modem tones through the handset's mouthpiece, and the earpiece is used to transmit these tones to the modem." 2773,1,"2018-04-17 04:02:28",A,2773,"2018-04-19 04:51:12","acoustic wave","A sound wave is the pattern of disturbance caused by the movement of energy traveling through a medium (such as air, water, or any other liquid or solid matter) as it propagates away from the source of the sound. The source is some object that causes a vibration, such as a ringing telephone, or a person's vocal chords. The vibration disturbs the particles in the surrounding medium; those particles disturb those next to them, and so on. The pattern of the disturbance creates outward movement in a wave pattern, like waves of seawater on the ocean. The wave carries the sound energy through the medium, usually in all directions and less intensely as it moves farther from the source." 2774,1,"2018-04-17 04:02:28",A,2774,"2018-04-19 04:51:18","acoustical infection","Acoustic infection is a type of malware that uses a compromised computer’s sound card and speakers to send data using a covert ultrasonic acoustical mesh network." 2775,1,"2018-04-17 04:02:28",A,2775,"2018-04-19 04:51:25","acoustical mesh network","An acoustical mesh network is a decentralized communication system that transmits data by using sound to connect computers." 2776,1,"2018-04-17 04:02:28",A,2776,"2018-04-19 04:51:28",ACPI,"ACPI (Advanced Configuration and Power Interface) is an industry specification for the efficient handling of power consumption in desktop and mobile computers. ACPI specifies how a computer's basic input/output system, operating system, and peripheral devices communicate with each other about power usage. ACPI is a key component of Intel's ""Instantly Available"" technology. Microsoft refers to its support as ""Always On.""" 2777,1,"2018-04-17 04:02:28",A,2777,"2018-04-19 04:51:31","ACPI (Advanced Configuration and Power ...","ACPI (Advanced Configuration and Power Interface) is an industry specification for the efficient handling of power consumption in desktop and mobile computers. ACPI specifies how a computer's basic input/output system, operating system, and peripheral devices communicate with each other about power usage. ACPI is a key component of Intel's ""Instantly Available"" technology. Microsoft refers to its support as ""Always On.""" 2778,1,"2018-04-17 04:02:28",A,2778,"2018-04-19 04:51:36",acquihire,"An acquihire, also known as a talent acquisition, is the purchase of one company by another for the sole purpose of retaining the business's employees. The purchaser typically has no interest in the products, services or assets made available to them through the acquisition and are likely to discontinue products and dispose of assets." 2779,1,"2018-04-17 04:02:28",A,2779,"2018-04-19 04:51:41","acquisition plan","An acquisition plan, in the context of procurement, is a business document specifying all relevant considerations for acquiring specific goods, services or other organizations." 2780,1,"2018-04-17 04:02:28",A,2780,"2018-04-19 04:51:47",ACR,"Attenuation-to-crosstalk ratio (ACR), also called headroom, is the difference, expressed as a figure in decibels (dB), between the signal attenuation produced by a wire or cable transmission medium and the near-end crosstalk (NEXT)." 2781,1,"2018-04-17 04:02:28",A,2781,"2018-04-19 04:51:52",Acrobat,"Acrobat is a program from Adobe that lets you capture a document and then view it in its original format and appearance. Acrobat is ideal for making documents or brochures that were designed for the print medium viewable electronically and capable of being shared with others on the Internet. To view an Acrobat document, which is called a Portable Document Format ( PDF ) file, you need Acrobat Reader. The Reader is free and can be downloaded from Adobe. You can use it as a standalone reader or as a plug-in in a Web browser." 2782,1,"2018-04-17 04:02:28",A,2782,"2018-04-19 04:51:58",Acronis,"Acronis is a data protection software company that broke off from SWsoft Inc. into an independent company in 2003. It offers backup products ranging from those meant for personal use to products for small to medium enterprises." 2783,1,"2018-04-17 04:02:28",A,2783,"2018-04-19 04:52:02",acronym,"An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a pronounceable word. The word may already exist or it can be a new word. Webster's cites snafu and radar, two terms of World War Two vintage, as examples of acronyms that were created." 2784,1,"2018-04-17 04:02:28",A,2784,"2018-04-19 04:52:05","acronyms used in online chatting","Texting, Twitter, chat and IM abbreviations and acronyms represent people's shorthand communications via mobile devices and on the Internet, especially on social media platforms. Although many seem as if they are misspelled, grammatically incorrect or confusing, texting abbreviation and texting acronyms are commonly used and are meant to expedite communications by shortening them so that the user doesn't have to spell out phrases, expressions or sentences. The use of emoticons is also pervasive in online communications and texting." 2785,1,"2018-04-17 04:02:28",A,2785,"2018-04-19 04:52:09",Acrylic,"Expression Graphic Designer is Microsoft's new software tool for creating the images that appear in an application's user interface, or UI. The product supports both vector and bitmap types of graphics and allows application designers to use effects such as fringes and drop shadows. Through the use of XAML, which is Microsoft's XML-based Extensible Application Markup Language, users can directly export the images to the Windows Presentation Foundation and Visual Studio 2005, both of which are Microsoft's tools for application development in the .NET Framework." 2786,1,"2018-04-17 04:02:28",A,2786,"2018-04-19 04:52:16",ACT,"Application Compatibility Toolkit (ACT) is a set of freely downloadable program utilities and related documents from Microsoft for ensuring compatibility among application programs in Windows operating systems, especially in a large network environment. The Toolkit can also be used to diagnose and fix problems that may be related to compatibility. The Toolkit can be used for applications running in Windows 2000 with Service Pack 3 or later, Windows XP, and Windows Server 2003. Microsoft says that the tools can be used to resolve over 200 symptoms of problems." 2787,1,"2018-04-17 04:02:28",A,2787,"2018-04-19 04:52:21",ACTA,"ACTA (America's Carriers Telecommunications Association) is a lobbying organization for over 165 small long-distance telephone carrier companies. It was organized in 1985 to represent the interests of the group before legislative and regulatory bodies. The organization is based in Casselberry, Florida." 2788,1,"2018-04-17 04:02:28",A,2788,"2018-04-19 04:52:22","ACTA (America's Carriers ...","ACTA (America's Carriers Telecommunications Association) is a lobbying organization for over 165 small long-distance telephone carrier companies. It was organized in 1985 to represent the interests of the group before legislative and regulatory bodies. The organization is based in Casselberry, Florida." 2789,1,"2018-04-17 04:02:28",A,2789,"2018-04-19 04:52:25","action item","An action item is a discrete task that must be accomplished, usually by a single individual or a small team or group." 2790,1,"2018-04-17 04:02:28",A,2790,"2018-04-19 04:52:31","action plan","An action plan is a document that lists what steps must be taken in order to achieve a specific goal." 2791,1,"2018-04-17 04:02:28",A,2791,"2018-04-19 04:52:34",actionable,"Actionable, in a business context, is an adjective referring to things that can be acted upon." 2792,1,"2018-04-17 04:02:28",A,2792,"2018-04-19 04:52:39","actionable intelligence","Actionable intelligence is information that can be acted upon, with the further implication that actions should be taken." 2793,1,"2018-04-17 04:02:28",A,2793,"2018-04-19 04:52:46",ActionScript,"ActionScript is an object-oriented programming (OOP) language that is designed specifically for Web site animation. Originally released with Macromedia Flash 4 and enhanced for Flash 5, ActionScript is a sophisticated version of the script language introduced in Flash 3. ActionScript makes it possible for developers to create onscreen environments (such as games, tutorials, and e-commerce applications) that can respond to user input through the keyboard or mouse. ActionScript is an event-based language: just as is the case in real life, actions are triggered by events." 2794,1,"2018-04-17 04:02:28",A,2794,"2018-04-17 04:14:23","ActionScript Cheat Sheets", 2795,1,"2018-04-17 04:02:28",A,2795,"2018-04-19 04:52:58","active archive","An active archive is a collection of data that is too valuable for a company to discard, but is only accessed occasionally." 2796,1,"2018-04-17 04:02:28",A,2796,"2018-04-19 04:53:04","active attack","An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target." 2797,1,"2018-04-17 04:02:28",A,2797,"2018-04-19 04:53:09","active cooling","Active cooling is the use of fans to reduce the heat of computer components. Active cooling contrasts with passive cooling, which involves reducing the speed at which a component is running to reduce its heat." 2798,1,"2018-04-17 04:02:28",A,2798,"2018-04-19 04:53:11","Active Directory","Active Directory is Microsoft's trademarked directory service, an integral part of the Windows 2000 architecture. Like other directory services, such as Novell Directory Services (NDS), Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments." 2799,1,"2018-04-17 04:02:28",A,2799,"2018-04-19 04:53:15","Active Directory Certificate Services (...","Active Directory Certificate Services (AD CS) is an Active Directory tool that lets administrators customize services in order to issue and manage public key certificates." 2800,1,"2018-04-17 04:02:28",A,2800,"2018-04-19 04:53:20","Active Directory domain (AD domain)","An Active Directory domain is a collection of objects within a Microsoft Active Directory network. An object can be a single user or a group or it can be a hardware component, such as a computer or printer. Each domain holds a database containing object identity information." 2801,1,"2018-04-17 04:02:28",A,2801,"2018-04-19 04:53:26","Active Directory Federation Services (...","Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall." 2802,1,"2018-04-17 04:02:28",A,2802,"2018-04-19 04:53:31","Active Directory forest (AD forest)","An Active Directory forest is the highest level of organization within Active Directory. Each forest shares a single database, a single global address list and a security boundary. By default, a user or administrator in one forest cannot access another forest." 2803,1,"2018-04-17 04:02:28",A,2803,"2018-04-19 04:53:34","Active Directory functional levels","Active Directory functional levels are controls that specify which advanced Active Directory domain features can be used in an enterprise domain. The enterprise domain is usually comprised of domain controller that run on different versions of the Windows Server operating system." 2804,1,"2018-04-17 04:02:28",A,2804,"2018-04-19 04:53:40","Active Directory tree (AD tree)","An Active Directory tree is a collection of domains within a Microsoft Active Directory network." 2805,1,"2018-04-17 04:02:28",A,2805,"2018-04-19 04:53:45","active man in the middle attack","What is an active man-in-the-middle attack?" 2806,1,"2018-04-17 04:02:28",A,2806,"2018-04-19 04:53:49","active man-in-the-middle attack","What is an active man-in-the-middle attack?" 2807,1,"2018-04-17 04:02:28",A,2807,"2018-04-19 04:53:50","active man-in-the-middle attack (MitM)","What is an active man-in-the-middle attack?" 2808,1,"2018-04-17 04:02:28",A,2808,"2018-04-19 04:53:53","active matrix display","Active matrix (also known as thin film transistor or TFT) is a technology used in the flat panel liquid crystal displays of notebook and laptop computers. Active matrix displays provide a more responsive image at a wider range of viewing angle than dual scan (passive matrix) displays." 2809,1,"2018-04-17 04:02:28",A,2809,"2018-04-19 04:53:57","active matrix display (thin film ...","Active matrix (also known as thin film transistor or TFT) is a technology used in the flat panel liquid crystal displays of notebook and laptop computers. Active matrix displays provide a more responsive image at a wider range of viewing angle than dual scan (passive matrix) displays." 2810,1,"2018-04-17 04:02:28",A,2810,"2018-04-19 04:54:01","active network","An active network is a network in which the nodes are programmed to perform custom operations on the messages that pass through the node. For example, a node could be programmed or customized to handle packets on an individual user basis or to handle multicast packets differently than other packets. Active network approaches are expected to be especially important in networks of mobile users. ""Smart packets"" use a special self-describing language that allows new kinds of information to be carried within a packet and operated on by a node." 2811,1,"2018-04-17 04:02:28",A,2811,"2018-04-19 04:54:07","active reconnaissance","Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities." 2812,1,"2018-04-17 04:02:28",A,2812,"2018-04-19 04:54:12","active RFID (active radio frequency ...","Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device." 2813,1,"2018-04-17 04:02:28",A,2813,"2018-04-19 04:54:15","active sensor","An active sensor is a sensing device that requires an external source of power to operate; active sensors contrast with passive sensors, which simply detect and respond to some type of input from the physical environment." 2814,1,"2018-04-17 04:02:28",A,2814,"2018-04-19 04:54:18","Active Server Page","ASP is also an abbreviation for application service provider." 2815,1,"2018-04-17 04:02:28",A,2815,"2018-04-19 04:54:20","Active Server Page (ASP)","ASP is also an abbreviation for application service provider." 2816,1,"2018-04-17 04:02:28",A,2816,"2018-04-17 04:14:23","Active Server Pages (ASP) Cheat Sheets", 2817,1,"2018-04-17 04:02:28",A,2817,"2018-04-19 04:54:30","Active Template Library","Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page ( ASP ) code and other ActiveX program component s with C++ (including Visual C++). A Web site developer that wants to forward user requests to a program in the Web server can write a common gateway interface application or, if the server is Microsoft's Internet Information Server ( IIS ), can include a script in the HTML (Web) page. The page itself is called an Active Server Page (ASP) and has a suffix of .asp. The script in the Active Server Page is interpreted and performed at the server before the page is sent on to the user. Another approach is to have this script (written in Microsoft's VBScript or JScript) in turn call a compiled program, written typically in C++, a sophisticated object-oriented programming language. Since a compiled program runs faster than a script, the Web page will be formulated faster and returned more quickly to the user. A C++ program also can interface more closely with the operating system than a script can, and there are several other advantages. On the other hand, it is more difficult and time-consuming to write a program in C++ than to write one in a script language." 2818,1,"2018-04-17 04:02:28",A,2818,"2018-04-19 04:54:34","Active Template Library (ATL)","Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page ( ASP ) code and other ActiveX program component s with C++ (including Visual C++). A Web site developer that wants to forward user requests to a program in the Web server can write a common gateway interface application or, if the server is Microsoft's Internet Information Server ( IIS ), can include a script in the HTML (Web) page. The page itself is called an Active Server Page (ASP) and has a suffix of .asp. The script in the Active Server Page is interpreted and performed at the server before the page is sent on to the user. Another approach is to have this script (written in Microsoft's VBScript or JScript) in turn call a compiled program, written typically in C++, a sophisticated object-oriented programming language. Since a compiled program runs faster than a script, the Web page will be formulated faster and returned more quickly to the user. A C++ program also can interface more closely with the operating system than a script can, and there are several other advantages. On the other hand, it is more difficult and time-consuming to write a program in C++ than to write one in a script language." 2819,1,"2018-04-17 04:02:28",A,2819,"2018-04-19 04:54:37","active/active array","Active/active (also called dual active) is a storage array configuration in which two (or more) storage controllers work together to process inputs/outputs (I/Os). Active/active can be contrasted with active/passive, an array configuration in which the first controller processes all I/O requests and the second controller is only used in the event of a failover." 2820,1,"2018-04-17 04:02:28",A,2820,"2018-04-19 04:54:41",ActiveX,"ActiveX is a set of object-oriented programming technologies and tools that Microsoft developed for Internet Explorer to facilitate rich media playback." 2821,1,"2018-04-17 04:02:28",A,2821,"2018-04-19 04:54:44","ActiveX control","An ActiveX control is a component program object that can be re-used by many application programs within a computer or among computers in a network. The technology for creating ActiveX controls is part of Microsoft's overall ActiveX set of technologies, chief of which is the Component Object Model (COM). ActiveX controls can be downloaded as small programs or animations for Web pages, but they can also be used for any commonly-needed task by an application program in the latest Windows and Macintosh environments. In general, ActiveX controls replace the earlier OCX (Object Linking and Embedding custom controls). An ActiveX control is roughly equivalent in concept and implementation to the Java applet." 2822,1,"2018-04-17 04:02:28",A,2822,"2018-04-19 04:54:51","ActiveX Data Objects","ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers. For example, if you wanted to write a program that would provide users of your Web site with data from an IBM DB2 database or an Oracle database, you could include ADO program statements in an HTML file that you then identified as an Active Server Page. Then, when a user requested the page from the Web site, the page sent back would include appropriate data from a database, obtained using ADO code." 2823,1,"2018-04-17 04:02:28",A,2823,"2018-04-19 04:54:52","ActiveX Data Objects (ADO)","ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers. For example, if you wanted to write a program that would provide users of your Web site with data from an IBM DB2 database or an Oracle database, you could include ADO program statements in an HTML file that you then identified as an Active Server Page. Then, when a user requested the page from the Web site, the page sent back would include appropriate data from a database, obtained using ADO code." 2824,1,"2018-04-17 04:02:28",A,2824,"2018-04-19 04:54:55","activity-based management (ABM)","Activity-based management (ABM) is a management strategy in which business processes are evaluated and adjusted for their cost efficiency using activity-based costing." 2825,1,"2018-04-17 04:02:28",A,2825,"2018-04-19 04:55:00",ACTS,"ACTS (Automatic Coin Telephone System) is a public coin-operated telephone service that completes a variety of phone calls, times the calls, and collects payment without the aid of an operator."