SlideShare a Scribd company logo
1 of 42
Download to read offline
IT abbreviations
CREATED BY ANJU A
GUEST LECTURER
PAYYANUR COLLEGE
BBN Bolt, Beranek
and Newman
the last names of the
three founders of BBN
Technologies and the
original name of the
company.
BBS Bulletin Board
System
A computerized
meeting and
announcement system
that allows people to
carry on discussions,
upload and download
files, and make
announcements
without the people
being connected to the
computer at the same
time.
Bcc Blind Carbon
Copy
When you send an e-
mail to only one person,
you type the recipient's
address in the "To:"
field. When you send a
message to more than
one person, you have
the option to enter
addresses in the "Cc:"
and "Bcc:" fields.
BCC Block Check
Character
A control character
added to a block in
character oriented
protocols (such as
Bisync) used for
determining if the
block was received
in error
• IBM- INTERNATIONAL BUSINESS MACHINES
• ENIAC- ELECTRONIC NUMERICAL INTEGRATOR AND CALCULATOR
• EDVAC- ELECTRONIC DISCRETE VARIABLE AUTOMATIC COMPUTER
• UNIVAC- UNIVERSAL AUTOMATIC COMPUTER
• IC- INTEGRATED CIRCUIT
• PC-PERSONAL COMPUTER
• PDA- PERSONAL DIGITAL ASSISTANT
• TCP-TRANSMISSION CONTROL PROTOCOL
• IC-INTERNET PROTOCOL
• TCP- TRANSMISSION CONTROL PROTOCOL
• IWB-INTERACTIVE WHITEBOARD
• VOIP-VOICE-OVER-INTERNET-PROTOCOL
• ARPANET- ADVANCED RESEARCH PROGRAMME AGENCY NETWORK
• UCLA- UNIVERSITY OF CALIFORNIA LOS ANGELES
• CIS- COMPUSERVE INFORMATION SERVICE
• HCI- HUMAN COMPUTER INTERACTION
• RSS- REALLY SIMPLE SYNDICATION
• SERP- SEARCH ENGINE RESULTS PAGE
• f2f- face-to-face
• CEC-CONSORTIUM FOR EDUCATIONAL COMMUNICATION
• EFL-ENGLISH AS A FOREIGN LANGUAGE
• ESL- ENGLISH AS A SECOND LANGUAGE
• CLT-COMMUNICATIVE LANGUAGE TECHNOLOGY
• CALL- COMPUTER ASSISTED LANGUAGE LEARNING
• CALT-COMPUTER ASSISTED LANGUAGE TESTING
• NLP-NATURAL LANGUAGE PROCESSING
• ETS- EDUCATIONAL TESTING SERVICES
• MT- MACHINE TRANSLATION
• MALL-MOBILE LEARNING
• HTTP-HYPER TEXT TRANSFER PROTOCOL
• OLE- ONLINE LEARNING ENVIRONMENT
• ASR- AUTOMATIC SPEECH RECOGNITION
• KMS- KNOWLEDGE MANAGEMENT SYSTEM
• LMS-LEARNING MANAGEMENT SYSTEM
• CMS- COURSE MANAGEMENT SYSTEM
• AAA—Authentication Authorization, Accounting
• AABB—Axis Aligned Bounding Box
• AAC—Advanced Audio Coding
• AAL—ATM Adaptation Layer
• AALC—ATM Adaptation Layer Connection
• AARP—AppleTalk Address Resolution Protocol
• ABAC—Attribute-Based Access Control
• ABCL—Actor-Based Concurrent Language
• ABI—Application Binary Interface
• ABM—Asynchronous Balanced Mode
• ABR—Area Border Router
V
• ABR—Auto Baud-Rate detection
• ABR—Available Bitrate
• ABR—Average Bitrate
• AC—Acoustic Coupler
• AC—Alternating Current
• ACD—Automatic Call Distributor
• ACE—Advanced Computing Environment
• ACID—Atomicity Consistency Isolation Durability
• ACK—ACKnowledgement
• ACK—Amsterdam Compiler Kit
• ACL—Access Control List
• ACL—Active Current Loop
• ACM—Association for Computing Machinery
• ACME—Automated Classification of Medical Entities
• ACP—Airline Control Program
• ACPI—Advanced Configuration and Power Interface
• ACR—Allowed Cell Rate
• ACR—Attenuation to Crosstalk Ratio
• AD—Active Directory
• AD—Administrative Domain
• ADC—Analog-to-Digital Converter
• ADC—Apple Display Connector
• ADB—Apple Desktop Bus
• ADCCP—Advanced Data Communications Control Procedures
• ADO—ActiveX Data Objects
• ADSL—Asymmetric Digital Subscriber Line
• ADT—Abstract Data Type
• AE—Adaptive Equalizer
• AES—Advanced Encryption Standard
• AF—Anisotropic Filtering
• AFP—Apple Filing Protocol
• AGP—Accelerated Graphics Port
• AH—Active Hub
• AI—Artificial Intelligence
• AIX—Advanced Interactive eXecutive
• Ajax—Asynchronous JavaScript and XML
• AL—Active Link
• AL—Access List
• ALAC—Apple Lossless Audio Codec
• ALGOL—Algorithmic Language
• ALSA—Advanced Linux Sound Architecture
• ALU—Arithmetic and Logical Unit
• AM—Access Method
• AM—Active Matrix
• AMOLED—Active-Matrix Organic Light-Emitting Diode
• AM—Active Monitor
• AM—Allied Mastercomputer
• AM—Amplitude Modulation
• AMD—Advanced Micro Devices
• AMQP—Advanced Message Queuing Protocol
• AMR—Audio Modem Riser
• ANN—Artificial Neural Network
• ANSI—American National Standards Institute
• ANT—Another Neat Tool
• AoE—ATA over Ethernet
• AOP—Aspect-Oriented Programming
• APCI—Application-Layer Protocol Control Information
• APIC—Advanced Programmable Interrupt Controller
• API—Application Programming Interface
• APIPA—Automatic Private IP Addressing
• APL—A Programming Language
• APR—Apache Portable Runtime
• ARC—Adaptive Replacement Cache
• ARC—Advanced RISC Computing
• ARIN—American Registry for Internet Numbers
• ARM—Advanced RISC Machines
• AROS—AROS Research Operating System
• ARP—Address Resolution Protocol
• ARPA—Address and Routing Parameter Area
• ARPA—Advanced Research Projects Agency
• ARPANET—Advanced Research Projects Agency Network
• AS—Access Server
• ASCII—American Standard Code for Information Interchange
• AuthIP—Authenticated Internet Protocol
• ASET—Automated Security Enhancement Tool
• ASG—Abstract Semantic Graph
• ASIC—Application-Specific Integrated Circuit
• ASIMO—Advanced Step in Innovative Mobility
• ASLR—Address Space Layout Randomization
• ASM—Algorithmic State Machine
• ASMP—Asymmetric Multiprocessing
• ASN.1—Abstract Syntax Notation 1
• ASP—Active Server Pages
• ASP—Application Service Provider
• ASR—Asynchronous Signal Routine
• AST—Abstract Syntax Tree
• AT—Advanced Technology
• AT—Access Time
• AT—Active Terminator
• ATA—Advanced Technology Attachment
• ATAG—Authoring Tool Accessibility Guidelines
• ATAPI—Advanced Technology Attachment Packet Interface
• ATM—Asynchronous Transfer Mode
• AV—Antivirus
• AVC—Advanced Video Coding
• AVI—Audio Video Interleaved
• AWK—Aho Weinberger Kernighan
• AWT—Abstract Window Toolkit
• AWFL—Acronym With Four Letters
• B2B—Business-to-Business
• B2C—Business-to-Consumer
• B2E—Business-to-Employee
• BAL—Basic Assembly Language
• BAM—Block Availability Map
• Bash—Bourne-again shell
• BASIC—Beginner's All-Purpose Symbolic Instruction Code
• BBP—Baseband Processor
• BBS—Bulletin Board System
• BCD—Binary Coded Decimal
• BCD—Boot Configuration Data
• BCNF—Boyce–Codd normal form
• BEEP—Blocks Extensible Exchange Protocol
• BER—Bit Error Rate
• BFD—Bidirectional Forwarding Detection
• BFD—Binary File Descriptor
• BFS—Breadth-First Search
• BFT—Byzantine Fault Tolerant
• BGP—Border Gateway Protocol
• BI—Business Intelligence
• BiDi—Bi-Directional
• bin—binary
• BINAC—Binary Automatic Computer
• BIND—Berkeley Internet Name Domain
• BIOS—Basic Input Output System
• BJT—Bipolar Junction Transistor
• bit—binary digit
• Blob—Binary large object
• Blog—Web Log
• BMP—Basic Multilingual Plane
• BNC—Bayonet Neill-Concelman
• BOINC—Berkeley Open Infrastructure for Network Computing
• BOM—Byte Order Mark
• BOOTP—Bootstrap Protocol
• BPDU—Bridge Protocol Data Unit
• BPEL—Business Process Execution Language
• BPL—Broadband over Power Lines
• BPM—Business Process Management
• BPM—Business Process Modeling
• bps—bits per second
• BRM—Business Reference Model
• BRMS—Business Rule Management System
• BRR—Business Readiness Rating
• BRS—Broadband Radio Service
• BSA—Business Software Alliance
• BSB—Backside Bus
• BSD—Berkeley Software Distribution
• BSoD—Blue Screen of Death
• BSS—Block Started by Symbol
• BT—BitTorrent
• BT—Bluetooth
• B TAM—Basic Telecommunications Access Method
• BW—Bandwidth
• BYOD—Bring Your Own Device
• Byte—By eight (group of 8 bits)
• CA—Computer Accountancy
• CAD—Computer-Aided Design
• CAE—Computer-Aided Engineering
• CAID—Computer-Aided Industrial Design
• CAI—Computer-Aided Instruction
• CAM—Computer-Aided Manufacturing
• CAPTCHA—Completely Automated Public Turing Test to tell Computers and Humans Apart
• CAT—Computer-Aided Translation
• CAQ—Computer-Aided Quality Assurance
• CASE—Computer-Aided Software Engineering
• cc—C Compiler
• CD—Compact Disc
• CDE—Common Desktop Environment
• CDFS—Compact Disk File System
• CDMA—Code Division Multiple Access
• CDN—Content Delivery Network
• CDP—Cisco Discovery Protocol
• CDP—Continuous Data Protection
• CD-R—CD-Recordable
• CD-ROM—CD Read-Only Memory
• CD-RW—CD-Rewritable
• CDSA—Common Data Security Architecture
• CERT—Computer Emergency Response Team
• CES—Consumer Electronics Show
• CF—Compact Flash
• CFD—Computational Fluid Dynamics
• CFG—Context-Free Grammar
• CFG—Control Flow Graph
• CG—Computer Graphics
• CGA—Color Graphics Array
• CGI—Common Gateway Interface
• CGI—Computer-Generated Imagery
• CGT—Computational Graph Theory
• CHAP—Challenge-Handshake Authentication Protocol
• CHS—Cylinder-Head-Sector
• DAC—Digital-To-Analog Converter
• DAC—Discretionary Access Control
• DAL—Database Abstraction Layer
• DAO—Data Access Object
• DAO—Data Access Objects
• DAO—Disk-At-Once
• DAP—Directory Access Protocol
• DARPA—Defense Advanced Research Projects Agency
• DAT—Digital Audio Tape
• DB—Database
• DBA—Database Administrator
• DBCS—Double Byte Character Set
• DBMS—Database Management System
• DCC—Direct Client-to-Client
• DCCP—Datagram Congestion Control Protocol
• DCCA—Debian Common Core Alliance
• DCL—Data Control Language
• DCS—Distributed Control System
• DCMI—Dublin Core Metadata Initiative
• DCOM—Distributed Component Object Model
• DD—Double Density
• DDE—Dynamic Data Exchange
• DDI—DNS DHCP & IP Address management
• DDL—Data Definition Language
• DDoS—Distributed Denial of Service
• DDR—Double Data Rate
• DEC—Digital Equipment Corporation
• DES—Data Encryption Standard
• dev—development
• DFA—Deterministic Finite Automaton
• DFD—Data Flow Diagram
• DFS—Depth-First Search
• DFS—Distributed File System
• DGD—Dworkin's Game Driver
• DHCP—Dynamic Host Configuration Protocol
• DHTML—Dynamic Hypertext Markup Language
• DIF—Data Integrity Field
• DIMM—Dual Inline Memory Module
• DIN—Deutsches Institut für Normung
• DIP—Dual In-line Package
• DISM—Deployment Image and Service Management Tool
• DIVX—Digital Video Express
• DKIM—Domain Keys Identified Mail
• DL—Download
• DLL—Dynamic Link Library
• DLNA—Digital Living Network Alliance
• DLP—Data loss protection
• DMA—Direct Memory Access
• DMCA—Digital Millennium Copyright Act
• DMI—Direct Media Interface
• DML—Data Manipulation Language
• DML—Definitive Media Library
• DMR—Dennis M. Ritchie
• DMZ—Demilitarized Zone
• DN—Distinguished Name
• DND—Drag-and-Drop
• DNS—Domain Name System
• DOA—Dead on Arrival
• DOCSIS—Data Over Cable Service Interface Specification
• DOM—Document Object Model
• DoS—Denial of Service
• DOS—Disk Operating System
• DP—Dot Pitch
• DPC—Deferred Procedure Call
• DPI—Deep Packet Inspection
• DPI—Dots Per Inch
• DPMI—DOS Protected Mode Interface
• eSATA—external SATA
• ESB—Enterprise service bus
• ESCON—Enterprise Systems Connection
• ESD—Electrostatic Discharge
• ESR—Eric Steven Raymond
• ETL—Extract, Transform, Load
• ETW—Event Tracing for Windows
• EUC—Extended Unix Code
• EULA—End User License Agreement
• EWMH—Extended Window Manager Hints
• EXT—EXTended file system
• DVD-RW—DVD-Rewritable
• DVI—Digital Visual Interface
• DVR—Digital Video Recorder
• DW—Data Warehouse
• E[edit]
• EAI—Enterprise Application Integration
• EAP—Extensible Authentication Protocol
• EAS—Exchange ActiveSync
• EBCDIC—Extended Binary Coded Decimal Interchange Code
• EBML—Extensible Binary Meta Language
• ECC—Elliptic Curve Cryptography
• ECMA—European Computer Manufacturers Association
• ECN—Explicit Congestion Notification
• ECOS—Embedded Configurable Operating System
• ECRS—Expense and Cost Recovery System
• EDA—Electronic Design Automation
• EDGE— Enhanced Data rates for GSM Evolution
• EDI—Electronic Data Interchange
• EDO—Extended Data Out
• EDSAC—Electronic Delay Storage Automatic Calculator
• EDVAC—Electronic Discrete Variable Automatic Computer
• EEPROM—Electronically Erasable Programmable Read-Only Memory
• EFF—Electronic Frontier Foundation
• EFI—Extensible Firmware Interface
• EFM—Eight-to-Fourteen Modulation
• EFM—Ethernet in the First Mile
• EFS—Encrypting File System
• EGA—Enhanced Graphics Array
• E-mail—Electronic mail
• EGP—Exterior Gateway Protocol
• eID—electronic ID card
• EIDE—Enhanced IDE
• EIGRP—Enhanced Interior Gateway Routing Protocol
• EISA—Extended Industry Standard Architecture
• ELF—Extremely Low Frequency
• ELF—Executable and Linkable Format
• ELM—ELectronic Mail
• EMACS—Editor MACroS
• EMS—Expanded Memory Specification
• ENIAC—Electronic Numerical Integrator And Computer
• EOD—End of Day
• EOF—End of File
• EOL—End of Line
• EOM—End Of Message
• EOS—End OF Support
• EPIC—Explicitly Parallel Instruction Computing
• EPROM—Erasable Programmable Read-Only Memory
• ERD—Entity-Relationship Diagram
• ERM—Entity-Relationship Model
• ERP—Enterprise Resource Planning
• DPMS—Display Power Management Signaling
• DR—Disaster Recovery
• DRAM—Dynamic Random-Access Memory
• DR-DOS—Digital Research - Disk Operating System
• DRI—Direct Rendering Infrastructure
• DRM—Digital Rights Management
• DRM—Direct Rendering Manager
• DSA—Digital Signature Algorithm
• DSDL—Document Schema Definition Languages
• DSDM—Dynamic Systems Development Method
• DSL—Digital Subscriber Line
• DSL—Domain-Specific Language
• DSLAM—Digital Subscriber Line Access Multiplexer
• DSN—Database Source Name
• DSN—Data Set Name
• DSP—Digital Signal Processor
• DSSSL—Document Style Semantics and Specification Language
• DTD—Document Type Definition
• DTE—Data Terminal Equipment or data transfer rate
• DTP—Desktop Publishing
• DTR—Data Terminal Ready or Data transfer rate
• DVD—Digital Versatile Disc
• DVD-R—DVD-Recordable
• DVD-ROM—DVD-Read Only Memory

More Related Content

Similar to It abbreviations

How to Minimize Cost and Risk for Developing Safety-Certifiable Systems
How to Minimize Cost and Risk for Developing Safety-Certifiable SystemsHow to Minimize Cost and Risk for Developing Safety-Certifiable Systems
How to Minimize Cost and Risk for Developing Safety-Certifiable SystemsReal-Time Innovations (RTI)
 
Exploration of Radars and Software Defined Radios using VisualSim
Exploration of  Radars and Software Defined Radios using VisualSimExploration of  Radars and Software Defined Radios using VisualSim
Exploration of Radars and Software Defined Radios using VisualSimDeepak Shankar
 
Advanced embedded training details & syllabus - Wiztech
Advanced embedded training details & syllabus - WiztechAdvanced embedded training details & syllabus - Wiztech
Advanced embedded training details & syllabus - WiztechWiztech Automation Solutions
 
Automotive network and gateway simulation
Automotive network and gateway simulationAutomotive network and gateway simulation
Automotive network and gateway simulationDeepak Shankar
 
Architectural tricks to maximize memory bandwidth
Architectural tricks to maximize memory bandwidthArchitectural tricks to maximize memory bandwidth
Architectural tricks to maximize memory bandwidthDeepak Shankar
 
Webinar: Detecting Deadlocks in Electronic Systems using Time-based Simulation
Webinar: Detecting Deadlocks in Electronic Systems using Time-based SimulationWebinar: Detecting Deadlocks in Electronic Systems using Time-based Simulation
Webinar: Detecting Deadlocks in Electronic Systems using Time-based SimulationDeepak Shankar
 
Telecom Abbreviations
Telecom AbbreviationsTelecom Abbreviations
Telecom AbbreviationsMahira Khan
 
Presentacion inConcert Allegro 2015
Presentacion inConcert Allegro 2015Presentacion inConcert Allegro 2015
Presentacion inConcert Allegro 2015Sebastian Davidsohn
 
Building a Big Data & Analytics Platform using AWS
Building a Big Data & Analytics Platform using AWS Building a Big Data & Analytics Platform using AWS
Building a Big Data & Analytics Platform using AWS Amazon Web Services
 
Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...
Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...
Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...Real-Time Innovations (RTI)
 
Managing Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftManaging Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftReal-Time Innovations (RTI)
 
Isa&ngod architecture
Isa&ngod architectureIsa&ngod architecture
Isa&ngod architectureLei Xu
 
Telecommunications architectures and standards
Telecommunications architectures and standardsTelecommunications architectures and standards
Telecommunications architectures and standardschrisjosewanjira
 
Working Experience_V5.0
Working Experience_V5.0Working Experience_V5.0
Working Experience_V5.0Danny Lai
 
Edge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-timeEdge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-timeShuquan Huang
 

Similar to It abbreviations (20)

How to Minimize Cost and Risk for Developing Safety-Certifiable Systems
How to Minimize Cost and Risk for Developing Safety-Certifiable SystemsHow to Minimize Cost and Risk for Developing Safety-Certifiable Systems
How to Minimize Cost and Risk for Developing Safety-Certifiable Systems
 
Exploration of Radars and Software Defined Radios using VisualSim
Exploration of  Radars and Software Defined Radios using VisualSimExploration of  Radars and Software Defined Radios using VisualSim
Exploration of Radars and Software Defined Radios using VisualSim
 
Advanced embedded training details & syllabus - Wiztech
Advanced embedded training details & syllabus - WiztechAdvanced embedded training details & syllabus - Wiztech
Advanced embedded training details & syllabus - Wiztech
 
Automotive network and gateway simulation
Automotive network and gateway simulationAutomotive network and gateway simulation
Automotive network and gateway simulation
 
Architectural tricks to maximize memory bandwidth
Architectural tricks to maximize memory bandwidthArchitectural tricks to maximize memory bandwidth
Architectural tricks to maximize memory bandwidth
 
Lesson 5 full form
Lesson  5 full formLesson  5 full form
Lesson 5 full form
 
Webinar: Detecting Deadlocks in Electronic Systems using Time-based Simulation
Webinar: Detecting Deadlocks in Electronic Systems using Time-based SimulationWebinar: Detecting Deadlocks in Electronic Systems using Time-based Simulation
Webinar: Detecting Deadlocks in Electronic Systems using Time-based Simulation
 
www.vardisc.com
www.vardisc.comwww.vardisc.com
www.vardisc.com
 
Telecom Abbreviations
Telecom AbbreviationsTelecom Abbreviations
Telecom Abbreviations
 
Exploring Opensource on Microsoft Azure
Exploring Opensource on Microsoft AzureExploring Opensource on Microsoft Azure
Exploring Opensource on Microsoft Azure
 
Presentacion inConcert Allegro 2015
Presentacion inConcert Allegro 2015Presentacion inConcert Allegro 2015
Presentacion inConcert Allegro 2015
 
Building a Big Data & Analytics Platform using AWS
Building a Big Data & Analytics Platform using AWS Building a Big Data & Analytics Platform using AWS
Building a Big Data & Analytics Platform using AWS
 
CAN_tcs_ppt
CAN_tcs_pptCAN_tcs_ppt
CAN_tcs_ppt
 
Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...
Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...
Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...
 
Managing Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftManaging Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned Aircraft
 
Isa&ngod architecture
Isa&ngod architectureIsa&ngod architecture
Isa&ngod architecture
 
Processors selection
Processors selectionProcessors selection
Processors selection
 
Telecommunications architectures and standards
Telecommunications architectures and standardsTelecommunications architectures and standards
Telecommunications architectures and standards
 
Working Experience_V5.0
Working Experience_V5.0Working Experience_V5.0
Working Experience_V5.0
 
Edge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-timeEdge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-time
 

More from ANJU A

Our casuarina tree
Our casuarina treeOur casuarina tree
Our casuarina treeANJU A
 
Writing by the Indian Diaspora
Writing by the Indian Diaspora Writing by the Indian Diaspora
Writing by the Indian Diaspora ANJU A
 
Welcome
WelcomeWelcome
WelcomeANJU A
 
Types of computers
Types of computersTypes of computers
Types of computersANJU A
 
History and development of computers
History and development of computersHistory and development of computers
History and development of computersANJU A
 
Mla 7 vs MLA 8
Mla 7 vs MLA 8Mla 7 vs MLA 8
Mla 7 vs MLA 8ANJU A
 
How to cite a film or video in mla 8
How to cite a film or video in mla 8How to cite a film or video in mla 8
How to cite a film or video in mla 8ANJU A
 
How to cite a book in print in mla 8
How to cite a book in print in mla 8How to cite a book in print in mla 8
How to cite a book in print in mla 8ANJU A
 
Citing interviews with in
Citing interviews with inCiting interviews with in
Citing interviews with inANJU A
 
In-text citation mla 8
In-text citation mla 8In-text citation mla 8
In-text citation mla 8ANJU A
 
Mla 8 format
Mla 8 formatMla 8 format
Mla 8 formatANJU A
 
Diegetic and non diegetic sound
Diegetic and non diegetic soundDiegetic and non diegetic sound
Diegetic and non diegetic soundANJU A
 
Cuts used in films
Cuts used in filmsCuts used in films
Cuts used in filmsANJU A
 
Cut or sequencing,kuleshov effect, colour in film , eastman
Cut or sequencing,kuleshov effect, colour in film , eastmanCut or sequencing,kuleshov effect, colour in film , eastman
Cut or sequencing,kuleshov effect, colour in film , eastmanANJU A
 
Basic film terminology; masking; iris shot; shot reverse shot
Basic film terminology; masking; iris shot; shot reverse shotBasic film terminology; masking; iris shot; shot reverse shot
Basic film terminology; masking; iris shot; shot reverse shotANJU A
 
Rack focus
Rack focusRack focus
Rack focusANJU A
 
Film language basic terminology of filmmaking
Film language basic terminology of filmmakingFilm language basic terminology of filmmaking
Film language basic terminology of filmmakingANJU A
 
Mla handbook 8 th edition
Mla handbook 8 th editionMla handbook 8 th edition
Mla handbook 8 th editionANJU A
 
Film studies
Film studiesFilm studies
Film studiesANJU A
 
English as second and foreign language
English as second and foreign languageEnglish as second and foreign language
English as second and foreign languageANJU A
 

More from ANJU A (20)

Our casuarina tree
Our casuarina treeOur casuarina tree
Our casuarina tree
 
Writing by the Indian Diaspora
Writing by the Indian Diaspora Writing by the Indian Diaspora
Writing by the Indian Diaspora
 
Welcome
WelcomeWelcome
Welcome
 
Types of computers
Types of computersTypes of computers
Types of computers
 
History and development of computers
History and development of computersHistory and development of computers
History and development of computers
 
Mla 7 vs MLA 8
Mla 7 vs MLA 8Mla 7 vs MLA 8
Mla 7 vs MLA 8
 
How to cite a film or video in mla 8
How to cite a film or video in mla 8How to cite a film or video in mla 8
How to cite a film or video in mla 8
 
How to cite a book in print in mla 8
How to cite a book in print in mla 8How to cite a book in print in mla 8
How to cite a book in print in mla 8
 
Citing interviews with in
Citing interviews with inCiting interviews with in
Citing interviews with in
 
In-text citation mla 8
In-text citation mla 8In-text citation mla 8
In-text citation mla 8
 
Mla 8 format
Mla 8 formatMla 8 format
Mla 8 format
 
Diegetic and non diegetic sound
Diegetic and non diegetic soundDiegetic and non diegetic sound
Diegetic and non diegetic sound
 
Cuts used in films
Cuts used in filmsCuts used in films
Cuts used in films
 
Cut or sequencing,kuleshov effect, colour in film , eastman
Cut or sequencing,kuleshov effect, colour in film , eastmanCut or sequencing,kuleshov effect, colour in film , eastman
Cut or sequencing,kuleshov effect, colour in film , eastman
 
Basic film terminology; masking; iris shot; shot reverse shot
Basic film terminology; masking; iris shot; shot reverse shotBasic film terminology; masking; iris shot; shot reverse shot
Basic film terminology; masking; iris shot; shot reverse shot
 
Rack focus
Rack focusRack focus
Rack focus
 
Film language basic terminology of filmmaking
Film language basic terminology of filmmakingFilm language basic terminology of filmmaking
Film language basic terminology of filmmaking
 
Mla handbook 8 th edition
Mla handbook 8 th editionMla handbook 8 th edition
Mla handbook 8 th edition
 
Film studies
Film studiesFilm studies
Film studies
 
English as second and foreign language
English as second and foreign languageEnglish as second and foreign language
English as second and foreign language
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

It abbreviations

  • 1. IT abbreviations CREATED BY ANJU A GUEST LECTURER PAYYANUR COLLEGE
  • 2. BBN Bolt, Beranek and Newman the last names of the three founders of BBN Technologies and the original name of the company.
  • 3. BBS Bulletin Board System A computerized meeting and announcement system that allows people to carry on discussions, upload and download files, and make announcements without the people being connected to the computer at the same time.
  • 4. Bcc Blind Carbon Copy When you send an e- mail to only one person, you type the recipient's address in the "To:" field. When you send a message to more than one person, you have the option to enter addresses in the "Cc:" and "Bcc:" fields.
  • 5. BCC Block Check Character A control character added to a block in character oriented protocols (such as Bisync) used for determining if the block was received in error
  • 6. • IBM- INTERNATIONAL BUSINESS MACHINES • ENIAC- ELECTRONIC NUMERICAL INTEGRATOR AND CALCULATOR • EDVAC- ELECTRONIC DISCRETE VARIABLE AUTOMATIC COMPUTER • UNIVAC- UNIVERSAL AUTOMATIC COMPUTER • IC- INTEGRATED CIRCUIT • PC-PERSONAL COMPUTER • PDA- PERSONAL DIGITAL ASSISTANT • TCP-TRANSMISSION CONTROL PROTOCOL • IC-INTERNET PROTOCOL • TCP- TRANSMISSION CONTROL PROTOCOL • IWB-INTERACTIVE WHITEBOARD • VOIP-VOICE-OVER-INTERNET-PROTOCOL
  • 7. • ARPANET- ADVANCED RESEARCH PROGRAMME AGENCY NETWORK • UCLA- UNIVERSITY OF CALIFORNIA LOS ANGELES • CIS- COMPUSERVE INFORMATION SERVICE • HCI- HUMAN COMPUTER INTERACTION • RSS- REALLY SIMPLE SYNDICATION • SERP- SEARCH ENGINE RESULTS PAGE • f2f- face-to-face • CEC-CONSORTIUM FOR EDUCATIONAL COMMUNICATION • EFL-ENGLISH AS A FOREIGN LANGUAGE • ESL- ENGLISH AS A SECOND LANGUAGE • CLT-COMMUNICATIVE LANGUAGE TECHNOLOGY
  • 8. • CALL- COMPUTER ASSISTED LANGUAGE LEARNING • CALT-COMPUTER ASSISTED LANGUAGE TESTING • NLP-NATURAL LANGUAGE PROCESSING • ETS- EDUCATIONAL TESTING SERVICES • MT- MACHINE TRANSLATION • MALL-MOBILE LEARNING • HTTP-HYPER TEXT TRANSFER PROTOCOL • OLE- ONLINE LEARNING ENVIRONMENT • ASR- AUTOMATIC SPEECH RECOGNITION • KMS- KNOWLEDGE MANAGEMENT SYSTEM • LMS-LEARNING MANAGEMENT SYSTEM • CMS- COURSE MANAGEMENT SYSTEM
  • 9. • AAA—Authentication Authorization, Accounting • AABB—Axis Aligned Bounding Box • AAC—Advanced Audio Coding • AAL—ATM Adaptation Layer • AALC—ATM Adaptation Layer Connection • AARP—AppleTalk Address Resolution Protocol • ABAC—Attribute-Based Access Control • ABCL—Actor-Based Concurrent Language • ABI—Application Binary Interface • ABM—Asynchronous Balanced Mode • ABR—Area Border Router
  • 10. V • ABR—Auto Baud-Rate detection • ABR—Available Bitrate • ABR—Average Bitrate • AC—Acoustic Coupler • AC—Alternating Current • ACD—Automatic Call Distributor • ACE—Advanced Computing Environment • ACID—Atomicity Consistency Isolation Durability • ACK—ACKnowledgement • ACK—Amsterdam Compiler Kit • ACL—Access Control List • ACL—Active Current Loop
  • 11. • ACM—Association for Computing Machinery • ACME—Automated Classification of Medical Entities • ACP—Airline Control Program • ACPI—Advanced Configuration and Power Interface • ACR—Allowed Cell Rate • ACR—Attenuation to Crosstalk Ratio • AD—Active Directory • AD—Administrative Domain • ADC—Analog-to-Digital Converter • ADC—Apple Display Connector • ADB—Apple Desktop Bus • ADCCP—Advanced Data Communications Control Procedures • ADO—ActiveX Data Objects • ADSL—Asymmetric Digital Subscriber Line
  • 12. • ADT—Abstract Data Type • AE—Adaptive Equalizer • AES—Advanced Encryption Standard • AF—Anisotropic Filtering • AFP—Apple Filing Protocol • AGP—Accelerated Graphics Port • AH—Active Hub • AI—Artificial Intelligence • AIX—Advanced Interactive eXecutive
  • 13. • Ajax—Asynchronous JavaScript and XML • AL—Active Link • AL—Access List • ALAC—Apple Lossless Audio Codec • ALGOL—Algorithmic Language • ALSA—Advanced Linux Sound Architecture • ALU—Arithmetic and Logical Unit
  • 14. • AM—Access Method • AM—Active Matrix • AMOLED—Active-Matrix Organic Light-Emitting Diode • AM—Active Monitor • AM—Allied Mastercomputer • AM—Amplitude Modulation • AMD—Advanced Micro Devices • AMQP—Advanced Message Queuing Protocol • AMR—Audio Modem Riser • ANN—Artificial Neural Network
  • 15. • ANSI—American National Standards Institute • ANT—Another Neat Tool • AoE—ATA over Ethernet • AOP—Aspect-Oriented Programming • APCI—Application-Layer Protocol Control Information • APIC—Advanced Programmable Interrupt Controller • API—Application Programming Interface
  • 16. • APIPA—Automatic Private IP Addressing • APL—A Programming Language • APR—Apache Portable Runtime • ARC—Adaptive Replacement Cache • ARC—Advanced RISC Computing • ARIN—American Registry for Internet Numbers • ARM—Advanced RISC Machines • AROS—AROS Research Operating System
  • 17. • ARP—Address Resolution Protocol • ARPA—Address and Routing Parameter Area • ARPA—Advanced Research Projects Agency • ARPANET—Advanced Research Projects Agency Network • AS—Access Server • ASCII—American Standard Code for Information Interchange • AuthIP—Authenticated Internet Protocol • ASET—Automated Security Enhancement Tool • ASG—Abstract Semantic Graph • ASIC—Application-Specific Integrated Circuit • ASIMO—Advanced Step in Innovative Mobility
  • 18. • ASLR—Address Space Layout Randomization • ASM—Algorithmic State Machine • ASMP—Asymmetric Multiprocessing • ASN.1—Abstract Syntax Notation 1 • ASP—Active Server Pages • ASP—Application Service Provider • ASR—Asynchronous Signal Routine • AST—Abstract Syntax Tree • AT—Advanced Technology • AT—Access Time • AT—Active Terminator
  • 19. • ATA—Advanced Technology Attachment • ATAG—Authoring Tool Accessibility Guidelines • ATAPI—Advanced Technology Attachment Packet Interface • ATM—Asynchronous Transfer Mode • AV—Antivirus • AVC—Advanced Video Coding • AVI—Audio Video Interleaved • AWK—Aho Weinberger Kernighan • AWT—Abstract Window Toolkit • AWFL—Acronym With Four Letters
  • 20. • B2B—Business-to-Business • B2C—Business-to-Consumer • B2E—Business-to-Employee • BAL—Basic Assembly Language • BAM—Block Availability Map • Bash—Bourne-again shell • BASIC—Beginner's All-Purpose Symbolic Instruction Code • BBP—Baseband Processor • BBS—Bulletin Board System
  • 21. • BCD—Binary Coded Decimal • BCD—Boot Configuration Data • BCNF—Boyce–Codd normal form • BEEP—Blocks Extensible Exchange Protocol • BER—Bit Error Rate • BFD—Bidirectional Forwarding Detection • BFD—Binary File Descriptor • BFS—Breadth-First Search
  • 22. • BFT—Byzantine Fault Tolerant • BGP—Border Gateway Protocol • BI—Business Intelligence • BiDi—Bi-Directional • bin—binary • BINAC—Binary Automatic Computer • BIND—Berkeley Internet Name Domain • BIOS—Basic Input Output System
  • 23. • BJT—Bipolar Junction Transistor • bit—binary digit • Blob—Binary large object • Blog—Web Log • BMP—Basic Multilingual Plane • BNC—Bayonet Neill-Concelman • BOINC—Berkeley Open Infrastructure for Network Computing • BOM—Byte Order Mark • BOOTP—Bootstrap Protocol
  • 24. • BPDU—Bridge Protocol Data Unit • BPEL—Business Process Execution Language • BPL—Broadband over Power Lines • BPM—Business Process Management • BPM—Business Process Modeling • bps—bits per second • BRM—Business Reference Model • BRMS—Business Rule Management System • BRR—Business Readiness Rating • BRS—Broadband Radio Service
  • 25. • BSA—Business Software Alliance • BSB—Backside Bus • BSD—Berkeley Software Distribution • BSoD—Blue Screen of Death • BSS—Block Started by Symbol • BT—BitTorrent • BT—Bluetooth • B TAM—Basic Telecommunications Access Method • BW—Bandwidth • BYOD—Bring Your Own Device • Byte—By eight (group of 8 bits)
  • 26. • CA—Computer Accountancy • CAD—Computer-Aided Design • CAE—Computer-Aided Engineering • CAID—Computer-Aided Industrial Design • CAI—Computer-Aided Instruction • CAM—Computer-Aided Manufacturing • CAPTCHA—Completely Automated Public Turing Test to tell Computers and Humans Apart • CAT—Computer-Aided Translation • CAQ—Computer-Aided Quality Assurance • CASE—Computer-Aided Software Engineering • cc—C Compiler • CD—Compact Disc • CDE—Common Desktop Environment
  • 27. • CDFS—Compact Disk File System • CDMA—Code Division Multiple Access • CDN—Content Delivery Network • CDP—Cisco Discovery Protocol • CDP—Continuous Data Protection • CD-R—CD-Recordable • CD-ROM—CD Read-Only Memory • CD-RW—CD-Rewritable • CDSA—Common Data Security Architecture • CERT—Computer Emergency Response Team
  • 28. • CES—Consumer Electronics Show • CF—Compact Flash • CFD—Computational Fluid Dynamics • CFG—Context-Free Grammar • CFG—Control Flow Graph • CG—Computer Graphics • CGA—Color Graphics Array • CGI—Common Gateway Interface • CGI—Computer-Generated Imagery • CGT—Computational Graph Theory • CHAP—Challenge-Handshake Authentication Protocol • CHS—Cylinder-Head-Sector
  • 29. • DAC—Digital-To-Analog Converter • DAC—Discretionary Access Control • DAL—Database Abstraction Layer • DAO—Data Access Object • DAO—Data Access Objects • DAO—Disk-At-Once • DAP—Directory Access Protocol • DARPA—Defense Advanced Research Projects Agency • DAT—Digital Audio Tape • DB—Database
  • 30. • DBA—Database Administrator • DBCS—Double Byte Character Set • DBMS—Database Management System • DCC—Direct Client-to-Client • DCCP—Datagram Congestion Control Protocol • DCCA—Debian Common Core Alliance • DCL—Data Control Language • DCS—Distributed Control System • DCMI—Dublin Core Metadata Initiative • DCOM—Distributed Component Object Model • DD—Double Density • DDE—Dynamic Data Exchange • DDI—DNS DHCP & IP Address management
  • 31. • DDL—Data Definition Language • DDoS—Distributed Denial of Service • DDR—Double Data Rate • DEC—Digital Equipment Corporation • DES—Data Encryption Standard • dev—development • DFA—Deterministic Finite Automaton • DFD—Data Flow Diagram • DFS—Depth-First Search
  • 32. • DFS—Distributed File System • DGD—Dworkin's Game Driver • DHCP—Dynamic Host Configuration Protocol • DHTML—Dynamic Hypertext Markup Language • DIF—Data Integrity Field • DIMM—Dual Inline Memory Module • DIN—Deutsches Institut für Normung • DIP—Dual In-line Package • DISM—Deployment Image and Service Management Tool • DIVX—Digital Video Express • DKIM—Domain Keys Identified Mail • DL—Download • DLL—Dynamic Link Library
  • 33. • DLNA—Digital Living Network Alliance • DLP—Data loss protection • DMA—Direct Memory Access • DMCA—Digital Millennium Copyright Act • DMI—Direct Media Interface • DML—Data Manipulation Language • DML—Definitive Media Library • DMR—Dennis M. Ritchie • DMZ—Demilitarized Zone • DN—Distinguished Name • DND—Drag-and-Drop
  • 34. • DNS—Domain Name System • DOA—Dead on Arrival • DOCSIS—Data Over Cable Service Interface Specification • DOM—Document Object Model • DoS—Denial of Service • DOS—Disk Operating System • DP—Dot Pitch • DPC—Deferred Procedure Call • DPI—Deep Packet Inspection • DPI—Dots Per Inch • DPMI—DOS Protected Mode Interface
  • 35. • eSATA—external SATA • ESB—Enterprise service bus • ESCON—Enterprise Systems Connection • ESD—Electrostatic Discharge • ESR—Eric Steven Raymond • ETL—Extract, Transform, Load • ETW—Event Tracing for Windows • EUC—Extended Unix Code • EULA—End User License Agreement • EWMH—Extended Window Manager Hints • EXT—EXTended file system
  • 36. • DVD-RW—DVD-Rewritable • DVI—Digital Visual Interface • DVR—Digital Video Recorder • DW—Data Warehouse • E[edit] • EAI—Enterprise Application Integration • EAP—Extensible Authentication Protocol • EAS—Exchange ActiveSync • EBCDIC—Extended Binary Coded Decimal Interchange Code
  • 37. • EBML—Extensible Binary Meta Language • ECC—Elliptic Curve Cryptography • ECMA—European Computer Manufacturers Association • ECN—Explicit Congestion Notification • ECOS—Embedded Configurable Operating System • ECRS—Expense and Cost Recovery System • EDA—Electronic Design Automation • EDGE— Enhanced Data rates for GSM Evolution • EDI—Electronic Data Interchange • EDO—Extended Data Out • EDSAC—Electronic Delay Storage Automatic Calculator • EDVAC—Electronic Discrete Variable Automatic Computer • EEPROM—Electronically Erasable Programmable Read-Only Memory
  • 38. • EFF—Electronic Frontier Foundation • EFI—Extensible Firmware Interface • EFM—Eight-to-Fourteen Modulation • EFM—Ethernet in the First Mile • EFS—Encrypting File System • EGA—Enhanced Graphics Array • E-mail—Electronic mail • EGP—Exterior Gateway Protocol
  • 39. • eID—electronic ID card • EIDE—Enhanced IDE • EIGRP—Enhanced Interior Gateway Routing Protocol • EISA—Extended Industry Standard Architecture • ELF—Extremely Low Frequency • ELF—Executable and Linkable Format • ELM—ELectronic Mail • EMACS—Editor MACroS
  • 40. • EMS—Expanded Memory Specification • ENIAC—Electronic Numerical Integrator And Computer • EOD—End of Day • EOF—End of File • EOL—End of Line • EOM—End Of Message • EOS—End OF Support • EPIC—Explicitly Parallel Instruction Computing • EPROM—Erasable Programmable Read-Only Memory • ERD—Entity-Relationship Diagram • ERM—Entity-Relationship Model • ERP—Enterprise Resource Planning
  • 41. • DPMS—Display Power Management Signaling • DR—Disaster Recovery • DRAM—Dynamic Random-Access Memory • DR-DOS—Digital Research - Disk Operating System • DRI—Direct Rendering Infrastructure • DRM—Digital Rights Management • DRM—Direct Rendering Manager • DSA—Digital Signature Algorithm • DSDL—Document Schema Definition Languages • DSDM—Dynamic Systems Development Method • DSL—Digital Subscriber Line
  • 42. • DSL—Domain-Specific Language • DSLAM—Digital Subscriber Line Access Multiplexer • DSN—Database Source Name • DSN—Data Set Name • DSP—Digital Signal Processor • DSSSL—Document Style Semantics and Specification Language • DTD—Document Type Definition • DTE—Data Terminal Equipment or data transfer rate • DTP—Desktop Publishing • DTR—Data Terminal Ready or Data transfer rate • DVD—Digital Versatile Disc • DVD-R—DVD-Recordable • DVD-ROM—DVD-Read Only Memory