it_glossary- مسرد مصطلحات المعلوماتية

96
    G  LOSSARY  OF   I  NFORMATION T  ECHNOLOGY T  ERMS  .  

Upload: ahmed-salah

Post on 04-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 1/96

G LOSSARY OF I NFORMATION T ECHNOLOGY

T ERMS

.

Page 2: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 2/96

:

– –

..33492

:3736156-2137204-2137205

:3737558-2137202

:[email protected]

2007

Page 3: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 3/96

. : .

2000 7000

30. ""

.

.

. . 2000

).(

.

.

.

Page 4: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 4/96

. :

- 10)2001( 20--)

2006(

- – : )2001()2002(

-)2004(

- : )2005( )2007(

-)2006(

- : )2006(

- )(

.

.

..

(index)

.

.

Page 5: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 5/96

.

5800 .

.

. .

.

.

.

. .

Page 6: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 6/96

1(2)-Queue model )(

1:N Relationship type 1:N)1 N( 100BaseT Ethernet 100BaseT 10BaseT Ethernet 10BaseT 1-Persistent CSMA CSMA

3D Segmentation3D Torus

AAbort

Abort (T) T

Aborted

Above node

Absolute address

Absolute code

Absolute loader )( Abstract operation

Abstract Syntax NotationOne (ASN.l)

1

Abstraction

Abstraction concepts

Acceptance test Access bracket

Access control )( Access control policies

Access latency

Access method

Access permission

Access Point (AP)

Access protection

Access rate

Access rights

Access token

Access violation

Access-control list

Accessibility Accidental breaches

Accreditation

Accumulators )( Accuracy Achievability )( ACID: Atomicity,

Consistency, Isolation,Durability

ACID:

Acknowledgedconnectionless service

Acknowledgement

ACL (Access-ControlList)

Acoustic

Acronyms

Actigram Action

Action item checklist

Action partAction path Activate command

Activation

Activation diagrams

Active /

Page 7: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 7/96

Active attack 2 Agile software process

Active attack / ):(

Active database systems

)(

Active Directory )( Active process

Active sensing

Active state

Active/passive / Activists

Activity diagrams )(Activity-chart Actor

):( Actuator

Acyclic

Acyclic graphs

Acyclic-graph

Acyclic-graph directory

Ad hoc network

Ad hoc networking ] [

Adaptability )( Adaptable

Adaptive Brain Interfaces(ABI)

)(

Adaptive maintenance Adaptive mutexes

Adaptive routing

Adaptive-chosen-plaintextattack

Ad–aware

Added-digit framing

Addition (+) operator

Add-on help facility Address class

Address learning

Address mask

Address ResolutionProtocol (ARP)

Address WindowingExtension (AWE)

Addressed

Addressing

Addressing level

Addressing scope

Address-translationhardware

Ad-hoc querying

Adjacent faulting

Adjacent pages

Adjudicated protocol

Admissibility

Advanced EncryptionStandard (AES)

Advanced mobile phoneservices (amps)

Advanced replication

Advisories Adware

AES (AdvancedEncryption Standards)

Agent / Agent oriented

Agent-Based intra- andinter-organizational e-commerce

Agent-Object-Relationship MarkupLanguage

Aggregate functions )(Aggregate peak demand

Aggregation

Agile softwaredevelopment

Agile SoftwareEngineeringEnvironment (ASEE)

Agile software process

Page 8: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 8/96

Aging 3 Aperiodic signal

Aging

Aging software plants Agreement

Air gap

Alarm clock

Alertable

Algebraic structure

Alias

Aliases

Align (v) / Aligned Alignment

All-key relations" "

Allocate (v)

Allocation

Allocation proportional

All-or- nothing disclosureof secrets

All-or-nothing rule

Alpha testing Alpha-beta procedure -Alternate

Alternate fields

Alternate Mark Inversion(AMI)

Alternate routing

Alternative search

Ambiguity

Ambiguous )( American National

Standards Institute

(ANSI)American Standard Code

For InformationInterchange (ASCII)

Amplifiers attacks

Amplitude

Amplitude Modulation(AM)

Amplitude Shift Keying(ASK)

Analog

Analog carrier system

Analog signals

Analogical representation

Analytic evaluation

Analytic modeling

AND operator AND

Angle modulation

Angle of incidence

Angle of refraction

Animation

Animator )( Animatronic automation

Annealing

Annotation

Annotations

Anomalies

Anomalies deletion

Anomalies insertion

Anomalies modification

Anomalies update

Anomaly-detection system

Anonymity

Anonymizers

Anonymous access

Anonymous FTP FTP Anonymous key

distribution

Anonymous message

broadcastAntecedent

Antenna(s) )(Antibugging Antispy

Anti-spyware

Anycast

Aperiodic signal

Page 9: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 9/96

API 4 Associative registers

API (ApplicationProgrammerInterface)

Appending

Appendix

AppletsAppliances Application architecture Application Binary

Interface (ABI)

Application binaryinterface (ABI)

Application developmentenvironments

Application layer(three-tier client-server architecture)

) / (

Application programmers

Application ProgrammingInterface (API)

Application programs

Application servers

Application-basedconstraints

Approximate (adj)

Approximate (v)

Approximate reasoning Approximation

Apriori algorithm

Arbitrary / / Arbitrated loop

Arbitrated protocol Arbitrator

Arc

Architectural DescriptionLanguage (ADL)

Architectural design )( Architectural view Architecture

Architecture ContextDiagram (ACD)

Architecture FlowDiagram (AFD)

Architecture template

Architectures for DBMS DBMS Archived tapes

Areal density

Argument vector )(

Argument(s) )(ARIES recovery

algorithmARIES

Arithmetic operators

Armstrong's inferencerules

Arrays )( Arrow notation

Artifact ):( Artificial Intelligence

Markup Language As a whole

ASID (Address SpaceIDentifier)

ASN.l (Abstract SyntaxNotation One)

1

Aspect-OrientedProgramming (AOP)

Assemble (v) packets

Assembler )( Assembly

Assembly language

Assembly time

Assertions

Assets Assignment

Assignment edge

Associated mode signaling

Association autonomy

Association rules

Association rules amonghierarchies

Association(s) )(Associations aggregation

Associative data object Associative memory

Associative registers

Page 10: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 10/96

Assumptions 5 Automatic voice recognition

Assumptions

Asymmetric clustering

Asymmetric DigitalSubscriber Lines(ADSL)

Asymmetricmultiprocessing

Asynchronous BalancedMode (ABM)

Asynchronouscancellation

Asynchronous I/O / Asynchronous Procedure

Calls (APCs)

Asynchronous ResponseMode (ARM)

Asynchronous Transfer

Mode (ATM)Asynchronous writes

ATM (AsynchronousTransfer Mode)

ATM Adaptation Layer(AAL)

ATM

ATM service categories ATM

Atmosphere

Atom

Atomic

Atomic attributes

Atomic literals

Atomic module Atomic objects

Atomic transactions

Atomic value

Atomically ][

Atomicity

Atoms

Attenuation

Attenuation distortion

Attribute inheritance

Attribute(s) )(

Attribute-basedpartitioning

Attribute-definedspecialization

Attributes of relationshiptypes

Audibility )( Audio

Audit Audit checks

Auditing

Auditor Audits

Audit-trail processing

Augmented eke

Augmented reality

Augmented TransitionNetwork (ATN)

Augmented vector

Authentic

Authenticated access

Authentication ) (Authentication package

Authenticator

Authoring systems

Authoring tools

Authorization

Authorization identifier

Authorization subsystem

Auto correlation

Autodecrement

Autoincrement

Automated FormProcessing

Automatic buffering

Automatic job sequencing

Automatic RepeatRequest (ARQ)

Automatic voicerecognition

Page 11: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 11/96

Automatic working-set trimming 6 Base register

Automatic working-settrimming

Automount

Autonomous system

Auxiliary access structure

Auxiliary data structure

Availability / Available bit rate (abr)

Avalanche criteria

Avalanche effect

Avatars

Averaging

Awakened

Axiom

BB+-trees +B

Bachman diagrams Bachman

Backbone

Backbone network

Backdoors

Back-end network Back-ends

Backflushing

Background Background process

Backing store

Backing store

Backing up

Backjumping

Backlog

Backoff

Back-office application

Back-office applications

Back-office servers

Backpressure

Backpropagation

Back-to-back testing Backtracking / Backup / Backup and recovery

systems

Backup engineer )( Backup processor

Backward

Backward chaining

Backward channel

Backward congestionsignaling

Backward ExplicitCongestionNotification (BECN)

Backward learning

Backward protocol

Backward tracking Bad (page state)

Bad blocks

Bakery algorithm

Balanced transmission

BAN logic (BAN)

Bandpass filter

Bandpass signal

Bandwidth

Bandwidth efficiency

Bang metric Banker

Banker's algorithm

Barcode Bare hardware

Bare-machine

Barriers

Base address

Base class

Base file record

Base priority

Base register

Page 12: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 12/96

Base Station 7 Bit map

Base Station (BS)

Base tables

Baseband bus

Baseline

Basic file organizations

Basic file system

Basic rate

Basic replication

Basic service set (bss)

Basis path testing Basis set Batch ):(Batch application Batch operating system

Batch systems

Batch version

Bathtub curve Beam

Behavior inheritance

Behavioral modeling Belief network

Below node

Berkeley SoftwareDistribution (BSD)

Berkeley SourceDistribution (BSD)

Best affine approximationattack

Best effort service

Best fit

Beta testing

Bias

Biased protocol

Bibliography

Bidirectional

Bidirectional associations

Big endian

Billing

Binaries Binary

Binary associations

Binary bit

Binary decompositions

Binary exponentialbackoff

Binary Large OBjects(BLOBs)

Binary locks

Binary notation

Binary optimizers

Binary Phase Shift Keying(BPSK)

Binary program image

Binary relationaloperations

Binary relationship

Binary search

Binary semaphore

Binary-object format

Bind operation

Binding ): (Binding acknowledgment

Binding update

Bioinformatics

Biological sciences andgenetics

Biomedical signalprocessing

Biometrics )( Biphase

Bipolar

Bipolar with 8-ZerosSubstitution (B8ZS)

8

Birthday attack

Birthday paradox

Bit commitment

Bit Error Rate (BER)

Bit map

Page 13: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 13/96

Bit oriented protocol 8 Boundary node

Bit oriented protocol

Bit stream

Bit stuffing

Bit vector

Bit/byte-interleaving / Bit-interleaved parity

organization

Bit-level data striping

Bit-level striping

Bitmap indexing

Bit-string data types

Black-box specification

Black-box testing Blade

Blind carbon copy

Blind signature

Blind unanticipatedsignature

Blinding factor

Blob

BLOBs (Binary LargeObjects)

Bloc code

Bloc diagram

Bloc interleaver

Block / Block algorithm

Block buffer cache Block cipher

Block device

Block groups

Block I/O / Block interface Block replay

Block Transfer Time(BTT)

Blocked

Blockers

Blocking

Blocking

Blocking factor

Blocking protocol

Blocking send

Blocking system call

Block-interleaveddistributed parity

Block-interleaved parityorganization

Block-level striping

Block-oriented device

Blueprints

Blum integer (Blum) Blurring

Bodies )( Boilerplate code "" Book keeping

Boolean data types

Boolean type attributes

Boot block

Boot control block

Boot space

Booting the system

Bootstrap loader )( Bootstrap program

Bootstrapping / Border Gateway Protocol

(BGP)

Bottleneck

Bottomless data sink

Bottom-up

Bottom-up conceptualsynthesis

Bottom-up designmethodology

Bottom-up testing Boundary following

Boundary node

Page 14: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 14/96

Boundary Value Analysis 9 Business function

Boundary Value Analysis(BVA)

Bounded waiting

Bounded-buffer

Box diagram Box structure box structure specification Boyce-Codd Normal Form

(BCNF)Boyce-Codd

Braces

Braided shield

Brain computer interfaces(BCI)

)(

Branch & bound (v)

Branch and RelationalOperator testing(BRO)

Branch testing Breaches ):( Breadth of testing Break point Break-in

Break-ins

Breakthrough product Bridge(s) )(Bridged LAN

Bridging

Brightness

Broadcast ][Browser changers

Browser hijackers

Browser plug-ins

Brute force )( Brute force attack

B-trees B

BTT (Block TransferTime)

)BTT(

Bubble chart Bucket

Buddy-heap algorithm

Budget Budget shortfalls )(Buffer ):(

Buffer caching system Buffer manager modules

Buffer overruns Buffer pool

Buffer space

Buffer storage

Buffered in the cache ) (

Buffered through... ...

Buffering

Buffering modules

Buffering of blocks

Buffering systems ) (

Buffers )( Bug ]) [:( Bug-tracking

Built in reaction

Bulk encryption

Bulk of

Bulk transfer rates

Bulletin boards Bullet-point lists

Bundleware

Burst

Burst tolerance

Burstiness

Bus(es) )(Business / Business Area Analysis

(BAA) Business function

Page 15: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 15/96

Business process 10 Canonical

Business process

Business ProcessExecution LanguageFor Web Services(BPEL4WS or BPEL)

Business Process

Modeling Language(BPML)

Business ProcessReengineering (BPR)

Business risk Business Rules Markup

Language

Business System Design(BSD)

Business TransactionProtocol (BTP)

Business-driven Business-level data model

Business-level datamodeling

Business-to-Business (B2B)

Bus-mastering I/O boards /

Busy loop

Busy signal

Busy tone

Busy waiting

Busy-hour

By convention

By copy

By default

By reference

Bypass relay

Bypass state

Byte

Bytecode

Byzantine generalsproblem

C

C++ language binding ++C

Cable modem

Cable TV/cable television

Cables )( Cabling / Cache ):( Cache coherency

Cache lines

Cache memory

Cached I/O / Cachefs (cache file

system)

Cache-manager

Cache-writer thread

Caching

Caching of disk blocks

Calculus

Calibration

Call

Call Acceptance (CA)

Call Language Interface(CLI)

Call request (CR)

Call semantics

Callback )( )( Callback mechanism

Callbacks

Campus

Cancellation points

Candidate keys

Canned transactions

Canonical

Page 16: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 16/96

Capabilities 11 Chaining variables

Capabilities

Capability list

Capability MaturityModel (CMM)

Capability possession

Capture/playback / Cardinality ratio

Care Of Address (COA)

Carrier

Carrier Sense MultipleAccess (CSMA)

Carrier Sense MultipleAccess With CollisionDetection (CSMA/CD)

Carrier Sense with

Multiple Access(CSMA)

Cartesian product

Cartesian productoperation

Cartridges )( Cascade (n) / Cascade-caused failure

Cascading mounts

Cascading rollback

Cascading rollbacks

Cascading Style Sheets(CSS)

Cascading termination

CASE (Computer-Assisted SoftwareEngineering)

Case repository

Case-Based MarkupLanguage

Case-based reasoning

Casual end users

Casualty system Catalog )(

Category-basedpartitioning

Causal network

Caveats

CCITT (Comité

Consultatif Internationale deTélégraphie etTéléphonie)

CD jukebox

CD-ROM

Ceiling function

Cell

Cell clumping

Cell Delay Variation(CDV)

Cell Delay VariationTolerance (CDVT)

Cell delineation

Cell Loss Priority (CLP)

Cell Loss Ratio (CLR)

Cell relay

Cell sectoring

Cell splitting

Cellular

Cellular automaton

Cellular IP (CIP) ][IP Cellular networks

Center frequency

Centralized DBMS DBMS

Centralized schema designapproach

Certificate authority

Certification Certification Authority

(CA)

Certification path

Certified mail

Chained-overflow hashtable

Chaining

Chaining variables

Page 17: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 17/96

Chalkboard 12 Cleanroom software engineering

Chalkboard )( Change Cipher Spec

Protocol (CCSP)

Change control )(

Change Control Authority(CCA)

Change report Change request Channel capacity

Channel(s) )(Chaos model Character buffering

system Character device

Character devices

Character stream I/O / Characteristics

Character-stream device

Character-string datatype

Check bits

Checklist Checkpoints / Checksum / Chief programmer team Child nodes

Child process

Children processes

Chinese remaindertheorem

Chip

Chip(s)/Chipping code / )(Chi-square test

Chock packet

Chosen ciphertext attack

Chosen key attack

Chosen plaintext attack

Chronic

Chronologicalbacktracking

CIFS (Common InternetFile System)

Cigarette-smokersproblem

Cipher

Cipher Block Chaining(CBC)

Cipher Block ChainingMode (CBC)

Cipher Feedback Mode(CFB)

Cipher text stealing

Ciphertext

Ciphertext only attack

Circuit

Circuit emulation

Circuit switching

Circular Scan (C-SCAN)

Circular wait

Circumscription

CK metrics suite CK )Chidamber

Kemerer ( Claim edge

Class diagrams

Class hierarchy Class libraries

Class loader

Class properties

Class testing Class verifier

Class/subclassrelationships

Classification

Classifier

Classifier system

Class-Responsibility-Collaborator (CRC)modeling

--

Clause

Clean semantics

Cleanroom softwareengineering

Page 18: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 18/96

Cleanup operation 13 Collision

Cleanup operation

Clear box CLI (Call Language

Interface)

CLI (Call Level Interface)

Client

Client computers

Client machines

Client modules

Client programs

Client systems

Client/Server (C/S) / Client/server architecture /

Client/server DBMS DBMS / Client-initiated approach

Client-server model - Client-side

Client-side caching

Client-side memorycaching

Clinical diagnoses Clipboard

C-lists

Clock

Clocking

C-look (Circular-Look)Scheduling

Closed paradigm Closed world assumption

Closed-source software Cluster remapping

Cluster testing )( Cluster(s) )( Clustered page table

Clustered systems )( Clustering

Coaxial cable

Cochannels

COCOMO (COnstructiveCOst MOdel) model

COCOMO)(

Code book

Code Division MultipleAccess (CDMA)

Code generation Code generator Code restructuring Code segments

Code(s) )(Codec ) / (Codesigned Virtual

Machines

Codevelopers

Codeword

Cognitive

Cognitive ModelingLanguage (CML)

)( Cognitive structure

Cohesion (s) )( Cohesive conceptual

module Cohesiveness Coin

Coin flipping

Coincidence

Coincidentally cohesive Collaboration Collaboration diagrams

Collaborative filtering

Collaborative UsabilityInspection (CUI)

Collaborator Collection data types

Collection interface

Collection literals

Collection objects

Collective filtering

Collision

Page 19: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 19/96

Collision detection 14 Compile-time checking

Collision detection

Collision resistance Collision resolution

Collision-resistant hashfunction

)(

Combination / Combination generator Combinatorial

specification Combinatorics

Combined scheme

Combined signal

Combining function

Command

Command

Command interpreter

Command language Command macro facility Command ready

Command-line interpreter

Command-orientedinterfaces

Commercial DataMasking Facility(CDMF)

Commit (T) T

Commit (v, n)

Commit point

Commit point of transaction

Commit protocol

Committed

Committed burst size

Committed InformationRate (CIR)

Committed state

Common bus

Common channelsignaling

Common coupling

Common LanguageInterface (CLI)

Common LanguageRuntime (CLR)

Common memory Common Object Request

Broker Architecture(CORBA)

Common PartConvergence Sublayer(CPCS)

Common ProcessFramework (CPF)

Common sense knowledge

Commonsense reasoning Communication

autonomy

Communicationcommonality

Communication link

Communication model

Communication networks

Communication variables

Communicationalcohesion

Communications software

Community Antenna

TeleVision (CATV)Community source

Commutative operations

Compact Disk (CD)

Compaction

Compand (abbreviation of compress-expand)

): – (

Compander (seeCompand)

)(

Comparison testing

Compartmentalization Compatibility

Compatibility testing Compatible Time-Sharing

System (CTSS)

Compile time

Compiler(s) )( Compile-time checking

Page 20: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 20/96

Complement 15 Concurrent Version System

Complement

Complementary CodeKeying (CCK)

Complementation

Complete (T) T

Complete horizontalfragmentation

Completeness Completeness constraints

Complex attributes

Complexity

Complexity theory

Complexity weighting Compliant cell

Component assemblymodel

Component diagrams

Component object model Component software Component-based

development Component-Based

Development AndIntegration (CBDI)

Component-BasedSoftware Architecture(CBSA)

Componentization Components )( Composability )( Composite attributes

Composite data Composite information Composite keys

Composite object Compression

Compression permutation

Compromise

Computation migration

Computation speedup

Compute-bound thread

Computer Aided SoftwareEngineering (CASE)

Computer communication

Computer networks

Computer system

Computer vision

Computer vision Computer-Aided Design

(CAD) Computer-Aided

Engineering (CAE) Computer–aided

prototyping

Computer-AssistedSoftware Engineering(CASE)

Computer-based system Computer-generated

slides

Computer-SupportedCooperative Work (CSCW)

Compute-server systems

Concentrator

Concept developmentproject

Concept scooping

Conceptual data models

Conceptual databasedesign

Conceptual design )(Conceptual representation

Conceptual schema

Conceptualization

Conciseness/Concision Concurrency control

Concurrent

Concurrent access

Concurrent engineering

Concurrent execution

Concurrent processes

Concurrent processing

Concurrent VersionSystem (CVS)

Page 21: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 21/96

Concurrently 16 Conservative timestamp-ordering scheme

Concurrently / Condition construct

Condition part

Condition testing

Condition type

Condition variables

Conditional critical region Conditional independence

Conditional probability

Conditional ProbabilityTable (CPT)

Conditional-waitconstruct

Condition-defined

subclassesConditions

Conduit(s) )(Confidence

Confidentiality Configurability Configuration

Configuration auditing Configuration

managementConfiguration manager Configuration object Configuration review Configuration Status

Reporting (CSR) Configuration testing Confinement

Confirmation

Confirmation primitive

Confirmed service

Conflict equivalent

Conflict phase

Conflict resolution

Conflict serializability

Conflict serializable

Conflicting operations

Confusion

Congestion

Congestion avoidance

Congestion control

Congestion recovery

Congruence

Conjunct

Conjunction

Conjunctive Normal Form(CNF)

Connecting fields

Connection AdmissionControl (CAC)

Connection disconnection )(Connection establishment / Connection integer

Connection matrix Connection objects

Connection ports

Connection records

Connection setup )(Connection(s) /

) / ( Connectionless

Connectionlessinternetworking

Connectionless message

Connectionless socket

Connection-mode service

Connection-oriented

Connection-orientedsockets

Connection-port object

Connections to databases

Connector(s) )(Consecutives

Consequent

Conservative timestamp-ordering scheme

Page 22: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 22/96

Consistency 17 Conversion tools

Consistency Consistency checker

Consistency checking

Consistency maintenanceof polymorphicknowledgerepresentations

Consistency semantics

Consistent / Console ):( Consortium

Consortium Of Anti-Spyware Technology(COAST)

)(

Constant Angular

Velocity (CAV)Constant Bit Rate (CBR)

Constraint propagation

Constraint satisfactionproblem

Constraint specificationlanguage

Constraint(s) )( Constraints as assertions

Constraints on extents

Construct (n)Constructive method

Constructive specification Constructor injection

Consumer

Container object

Content Content coupling Content Management

System (CMS) Contention

Content-managementsystems

Context Context awareness

Context free question Context model

Context sensitive

Context switching Context units

Context-switching

Contextual Design (CD)

Contextual Inquiry (CI) Contiguous allocation

Contiguous memoryallocation

Contiguous pages

Contingency planning Contour

Contributions

Control coupling Control dimension Control flow Control Flow Diagram

(CFD) Control hierarchy Control process

Control program

Control signaling

Control Specification(CSPEC)

Control StructureDiagram (CSD)

Control structure testing Control thread

Control vector

Control-card interpreter

Controllability )( Controlled access

Controlled indexingvocabulary

Controlled redundancy / Convenience

Convergence Sublayer(CS)

Conversion routines

Conversion tools

Page 23: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 23/96

Conveyor 18 Cross product operation

Conveyor Convolution

Convolutional encoder

Cooperating processes

Coordinating CommitteeFor MultilateralExport Security(COCOM)

Coordination

Copy semantics

Copy-on-reference

Copy-on-write

Copyright

Core

Core developers

Core map (cmap)

Core memories

Core product Corrective action

Corrective maintenance Correctness Correctness verification

Correlated nested queries

Correlation / Correlation attack

Correlation immunity

Correspondence problem

Cost of quality Cost-based queries

Cost-based queryoptimization

Cost-benefit analysis - Cost-oriented Count

Count function

Counting

Counting semaphore

Coupling / Course Cover channel

Covert channels

CPU (Central ProcessingUnit)

CPU burst

CPU scheduler

CPU utilization

CPU-bound process

Crawlers

Create assertionstatements

Credential

Credentials

Credibility

Credit

Credit allocation

Credit card

Credit-based

Creeping

Crisis management

Crispness

Criterion(criteria) )(Critical

Critical module Critical path Critical Path Method

(CPM) Critical region

Critical section

Critical Success Factor(CSF)

Critical-region construct

Cross Compiler

Cross correlation

Cross point

Cross product )(Cross product operation )(

Page 24: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 24/96

Cross validation 19 Data flow analysis

Cross validation

Crossbar switch

Cross-departmentalconflicts

Cross-platform

Crosstalk

Crosstalk interference

Cryptanalysis

Cryptanalyst

Cryptographer )( Cryptographic

architecture

Cryptographic mode

Cryptography

Cryptology

Cryptosystem

Current directory

Current state )(Curse of dimensionality

Cursors

Customer voice table Customerization

Customizable

Customize (to)

Cut and choose

Cut-off

Cut-through switching

Cyber - )(

Cybergloves

Cybersurveillance

Cycle stealing

Cyclic Redundancy Check (CRC)

Cyclomatic complexity Cylinder block Cylinder group(s) )( Cylinders

D

DAC (DiscretionaryAccess Control)

Daemon process

Daemons )( Daisy chain

Damaged

DAML (DARPA AgentMarkup Language)

DARPA

Dangling tuples

DARPA Agent MarkupLanguage (DAML)

DARPA

Data access

Data architect

Data architecture Data Base Administrator

(DBA)

Data blade modules

Data circuit-terminatingequipment

-

Data commonality

Data communication

Data CommunicationEquipment (DCE)

Data communicationnetworking

Data complexity Data consistency

Data coupling

Data Definition Language(DDL)

Data design )(

Data dictionary )( Data dictionary systems

Data dimension Data elements

Data Encryption Standard(DES)

Data flow analysis

Page 25: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 25/96

Data Flow Diagram 20 DDBMS

Data Flow Diagram(DFD)

Data flow graph Data flow testing Data fork

Data fragmentation

Data independence

Data insertion

Data invariant Data Link Connection

Identifier (DLCI)

Data link control

Data link layer

Data localization

Data managementrequirements of GIS

Data ManipulationLanguage (DML)

Data marts

Data migration

Data mining

Data model

Data model mapping

Data modeling

Data name rationalization Data networks

Data object Data object type

hierarchy Data operations

Data pointers

Data reception

Data recordstandardization

Data removal

Data replication

Data repository system

Data restructuring Data section

Data segment

Data servers

Data sources

Data striping

Data Structured SystemDevelopment (DSSD)

Data sublanguage

Data Terminal Equipment(DTE)

Data transfer rate Data transparency

Data types

Data warehouses

Data warehousing system

DataBase Administrator

(DBA)Database application life

cycle

Database programminglanguages

Database schema

Database serversconnections

Database tuning

Database utilities

Data-based web pages

Data-driven

Data-driven design

Datagram

Datagram lifetime

Data-in

Datalog notation ""datalog

Data-out

DBA (DataBaseAdministrator)

DBMS classification DBMS

DBMS componentmodules

DBMS

DC component )(DDBMS (Distributed

DBMS)DBMS

Page 26: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 26/96

DDL 21 Deletion anomalies

DDL (Data DefinitionLanguage)

De facto standard Deadline Deadlock

Deadlock avoidance

Deadlock detection

Deadlock prevention

Deadlock recovery Debit-credit transactions

Debugger )( Debugging )( Decapsulation

Decibel

Decidability

Decipher (v)

Deciphering

Decision lists

Decision table Decision tree Decision-Support Systems

(DSS)

Decision-tree induction

Declarative assertions

Declarative expressions

Decoder

Decommit

Decomposability )( Decomposable )(Decomposition

Decrypt (v)Decryption

Dedicated device

Dedicated machine

Dedicated token ring

Deduction

Deduction rules

Deductive

Deductive databasesystems

Deep computing capacityon demand

Default

Default context

Default logic

Default signal handler

Default/by default / Defect Defect amplification

model Defect per KLOC

Defect Removal Efficiency(DRE)

Defective software

Defects

Defense AdvancedResearch ProjectsAgency (DARPA)

Deferred cancellation

Deferred updatetechniques

Defined classes

Defined classification

Defined data model

Definition phase Definition-use chain - Definition-use test

adequacy criterion-

Defragmentation

Defunct Degree of homogeneity

Degree of local autonomy

Degree of relation )( Degree of rigor Delay

Delay distortion

Delayed-write policy Deletion anomalies

Page 27: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 27/96

Deletion marker 22 Diagrammatic notation

Deletion marker

Deletion operation

Deliberate

Deliverable ):(

Delivery / Delta Modulation (DM)

DEM (Digital ElevationModel)

Demand paging

Demand replication

Demand segmentation

Demand-assignmentmultiple access

Demand-zero memory

DeMilitarized Zone(DMZ)

Demodulator

Demultiplexer

Denial of service

Denial-Of-Service (DOS)attack

Denormalization

Denotation

Dense indexes

Dense multiplexing

Dense polynomial

Dependencies

Dependency Dependency injection

Dependency-directedbacktracking

Dependency-preservation

Dependent class Deployment diagrams

Depth of testing Derived tables

DES (Data EncryptionStandard)

Description records

Descriptors

Design autonomy

Design For Reuse (DFR) Design methodology

Design model )( Design postprocessing Design specification Design Structure Quality

Index (DSQI) Designated confirmer

signature

Desktop

Desktop file

Desktop systems

Destination )( Destination unreachable

Destroying information

Destroying keys

Detachable disk

Detecting encryption

Deterministic

Deterministic modeling

Development kernel Development phase / Development roadmap

Deviation

Device attachment point

Device controllers

Device directory

Device driver

Device queueDevice(s) )(Device-service time

Device-status table

DFS (Distributed FileSystem)

Diagnostic

Diagrammatic notation

Page 28: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 28/96

Dial tone 23 Discrete

Dial tone

Dialers

Dial-up

Dial-up lines

Dictionary

Dictionary attack

Didactical content

Differed Procedure Call(DPC)

Differential

Differential cryptanalysis

Differentiated Services(DS)

Diffraction

Diffusion

Digital

Digital carrier system

Digital cash, digital money

Digital Elevation Model(DEM)

Digital era

Digital European CordlessTelecommunications(DECT)

Digital Linear Tapes(DLTs)

Digital signal

Digital signature

Digital signaturealgorithm

Digital SignatureAlgorithm (DSA)

Digital SignatureStandard (DSS)

Digital Subscriber Line

(DSL)Digital Terrain Modeling

(DTM)

Digital thermometer

Digitization

Digitizer

Digitizer tablet

Dimension tables

Dimensional Data Marts(DDMS)

Dimensionality

Dining-philosophersproblem

Diode Direct access

Direct blocks

Direct Broadcast Satellite(DBS)

Direct reference

Direct Sequence SpreadSpectrum (DSSS)

Directed acyclic graph

Directed graph

Directed graphs

Directional antenna

Directional readingproperties

Directory

Directory structure

Directory(s) )(Directrix

Dirty

Dirty bit

Disable interruption )( Disambiguate

Disassemble (v) packets

Disassociated modesignaling

Discard (v) / Discard Eligibility (DE)

Disclaiming statements

Disclosure

Discovery of patterns intime series

Discovery of sequentialpatterns

Discrepancies

Discrete

Page 29: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 29/96

Discrete logarithm 24 Distributed systems

Discrete logarithm

Discrete mathematics Discrete multitone

Discretionary access

Discretionary AccessControl (DAC)

Discretionary protection

Discriminating attribute

Discriminating attributes

Discriminator

Disinfect (v)

Disjointness

Disjointness constraint

Disjunct

Disjunction

Disjunctive Normal Form(DNF)

Disk arm

Disk attachment

Disk blocks

Disk cache

Disk controllers

Disk drives )(Disk formatting

Disk I/Os /

Disk mirroring

Disk pack )(

Disk platter

Disk read-ahead ) (

Disk space allocation

Disk storage

Disk stripping

Disk transfer Diskless

Diskless workstations

Disks cylinders

Disks initialization

Disks tracks )(Disparity control

Dispatch (to -) a thread

Dispatch branch Dispatch interrupt

Dispatch latency

Dispatch table

Dispatcher Dispatcher object

Dispatcher objects

Display

Disruption

Distance-vector routing

Distinct data types

Distortion / Distributed applications

Distributed ControlSystem (DCS)

Distributed coordination

Distributed CoordinationFunction (DCF)

Distributed databasesystems

Distributed DBMS(DDBMS)

DBMS

Distributed Denial-of-Service (DDoS) attack

Distributed FoundationWireless MAC(DFWMAC)

MAC

Distributed informationsystems

Distributed InteractiveVirtual Environment(DIVE)

Distributed lock manager

Distributed namingscheme

Distributed namingservices

Distributed routing

Distributed systems

Page 30: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 30/96

Distributed warehouse 25 Dual-booted

Distributed warehouse

Distribution System (DS)

Distribution transparency

Distribution-drivensimulation

Distributions

Divide & conquer

Division operation

DMA (Direct MemoryAccess)

DMA controller

DMA DML (Data Manipulation

Language)

DNS (Domain NameSystem)

Document markup

Document restructuring Document type

declarations

Documents headers

Document-TypeDefinition (DTD)

Do-it-yourself computing ""Domain analysis

Domain calculus

Domain characteristic Domain engineering Domain Name System

(DNS)

Domain of attributes

Domain of knowledge

Domain testing Domain tree

Domain-Key NormalForms (DKNF)

Domains constraints

Domains of attributes

Domain-specific thesaurus Dot notation )(Dot product / Dotted decimal notation

Double buffering )(Double caching

Double encryption Double indirect block

Double Side BandSuppressed Carrier(DSBSC)

Double Side BandTransmitted Carrier(DSBTC)

Double-indirect block Double-sided disks

Doubling

Down time

Downlink

Download (v)

Downsizing

Downstream

Down-translation

Downward closureproperty

Downward multiplexing

Dozing

Drill-down

Drill-down display

Drill-up

Drive-by download )( Driver end

Driver manager )(Driver manager class

Drives )( Dropper

Drum

D-separation

DSS (Decision-SupportSystems)

DTD (Document TypeDefinition)

DTM (Digital TerrainModeling)

Dual-booted

Page 31: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 31/96

Dual-mode operation 26 Electroencephalogram

Dual-mode operation

Dummy-variable

Dump

Duplex set

Duplex transmission ][Duplicate

Duplicate elimination )(Durative

DVD

DVMA (Direct Virtual-Memory Access)

Dynamic backtracking

Dynamic binarytranslators

Dynamic component Dynamic decision network

Dynamic file

Dynamic file expansion

Dynamic Host-ConfigurationProtocol (DCHP)

Dynamic Link Library(DLL)

Dynamic linking

Dynamic model Dynamic routing

Dynamic storageallocation

E

Earlier

Early detection

Early token release

Ease-of-use

Eavesdrop (v)

Eavesdropper

Eavesdropping

ECA model ECA

ECC (Error-CorrectingCODE)

ECG wave analysis E-Chalk software system

Echo cancellation

Echo, echo reply

E-commerce policies

Economy of scale

Edge enhancement

Edge switch

Edge(s) )( )( Editors )( EEPROM (Electrically

Erasable

Programmable Read-Only Memory)

EER (Enhanced-er) model ER

EER model concepts ER

EER model constructs EER

EER model constructs torelations mappings

EER

Effective access time

Effective bandwidth /

Effective branching factor

Effective memory-accesstime

Effective modularity Effective transfer rate

Effector

Efficiency Effort Adjustment Factor

(EAF) Effort validation Eigen-coefficients

Eight-puzzle / Elaborative approach Elastic traffic

Election

Electrodes Electroencephalogram

(EEG)

Page 32: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 32/96

Electron trapping 27 Enumeration

Electron trapping

Electronic Code Book (ECB)

Electronic Codebook Mode (ECB)

Electronic disk

Electronic IndustriesAlliance (EIA)

Electronic mail

Elementary BusinessProcess (EBP)

Elevator algorithm

Elicitation

Elliptic curve

Email spoofing

Embedded

Embedded software Embedded SQL SQL Embedded statements

Embedded systems

Empty state

Emulation

EmulatorsEnable interruption

Encapsulating SecurityPayload (ESP)

Encapsulating,encapsulation

Encapsulation / Encipher (v)

Encode (v)

Encoded data

Encoder Encrypt (v)

Encrypted file

Encrypted Key Exchange(EKE)

Encryption

Encryption mode

End

End office

End point

End system

End tags

End to end

End transactions

End user )( End-to-end encryption

End-user development End-user software

engineering

Engineering ChangeOrder (ECO)

Enhanced ER ER

Enhanced-ER (EER)model

ER

Entailment

Enter key

Enterprise componentcompound pattern

Enterprise InformationIntegration (EII)

Enterprise Java Beans

(EJB) Enterprise Resource

Planning (ERP)

Enterprise-wide datawarehouses

Entity

Entity beans

Entity integrityconstraints

Entity types

Entity-relationshipdiagram (ERD)

Entropy )(Entry

Entry code

Entry points

Entry section

Enumeration

Page 33: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 33/96

Enumerations 28 Existence dependency

Enumerations

Environment architecture Environment records

Environment vector )(

Epipolar line

Epistemic necessitation

Equal allocation

Equalization

Equijoin operation

Equipment ) / (Equivalence partitioning ER (Entity-Relationship)

Model

ER database schema

ERP (Enterprise ResourcePlanning)

Error Error control

Error Index (EI) Error propagation

Error tolerance

Error-Correction Codes(ECC)

Error-detection code /

Error–prone

Errors found per person-hour expended

/ ER-to-relational mapping

Escape

Escrow Escrow agency

Escrowed encryptionstandard

Ethernet

Euclid's algorithm

Euler totient function

Eurogrid

European ComputerManufacturingAssociation (ECMA)

European IntellectualProperty Office (EPO)

European PatentConvention (EPC)

European Patent Office(EPO)

EuropeanTelecommunicationStandards Institute(ETSI)

Even-parity function

Event flow diagram Event trace

Event-pair object

Events

Events flow Evoked potentials

Evolution

Evolution graph Evolutionary model Evolutionary prototyping

Exception dispatcherException objects

Exceptions

Excess burst size

Exchange

Exclusive

Exclusive access

Exclusive locks

Exclusive-writer protocol )(

Executable file

Execution autonomy

Execution efficiency Execution time

Executive

Existence dependency )(

Page 34: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 34/96

Existential quantifier 29 Factoring

Existential quantifier

Existential quantifiers

Exit section

Exocentric views

Expandability )(Expansion bus

Expansion permutation

Expenditure

Expert system

Explanation-basedgeneralization

Explicit congestionsignaling

Explicit sets

Exploit code

Exponential smoothing

Exponential time

Export list

Exposure

Expression(s) )(Expressive power

Exptime calss

Exptime-complete calss

Extended Binary CodedDecimal InterchangeCode (EBCDIC)

Extended euclideanalgorithm

Extended file system(extfs)

Extended MarkupLanguage (XML)

Extended relationalsystems

Extended Service Set(ESS)

Extendible

Extendible hashing

Extensibility )( )(

eXtensible Business RulesLanguage (XBRL)

Extensible data types

eXtensible MarkupLanguage (XML)

eXtensible Rule MarkupLanguage (XRML)

Extensible StylesheetLanguage (XSL)

Extension of schema

Extent

Exterior Router Protocol(ERP)

External fragmentation

External hashing

External schemas

External sorting

Extra functionalattributes

Extranets

Extreme

Extreme programming

Eye-gaze tracking

F

Fabric

Face RecognitionTechnology (FERET)

Face Recognition VendorTests (FRVT)

Facet descriptor Facial expression analysis

Facilitated Application

SpecificationTechnique (FAST) Facilitator Facility/Facilities / Fact tables )(Fact-defined predicates

Factor(s) )(Factoring ][

Page 35: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 35/96

Factory objects 30 Fields clustering

Factory objects

Fading

Failed state

Fail-stop digital signature

Fail-stop signature

Failure

Failure containment

Failure cost )( Failure intensity Failure(s) )(Failure-independent

machines

Fair cryptosystems

Fairness

Fair-share schedulers

False alarm

False cycle

Fan-in Fan-out FAQ (Frequently Asked

Questions))(

Fast Ethernet

Fast file system (ffs)

Fast team

Fastscan

FAT (File AllocationTable)

Fat client Fat server Fatal error

Fault Fault in a page

Fault recovery

Fault tolerance

Fault tree analysis Fault-based-testing Faulting process

Fault-tolerant

Fault-tolerant systems

Faulty

Faulty process

Fax

FC (Fiber Channel)

FCB (File Control Block)

FCFS (First-Come, First-Served)

FDBS (federated DatabaseSystem)

Feasibility study Feature

Feature analysis

Feature migration

Feature point Federal Communications

Commission (FCC)

Federal InformationProcessing Standard(FIPS)

Federated datawarehouses

Federated DBMS DBMS

Federated warehouse

Feedback / Feedback loops

Feedback shift register

Feedback with CarryShift Registers (FCSR)

Feedforward

Feedforward networks

Fermat’s theorem

Fetch command

Fetch orientation

Fiber channel

Fields clustering

Page 36: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 36/96

Fields connecting 31 Flow graph

Fields connecting

Fields ordering

Fields repeating

FIFO (First-In, First-Out)

Fifth Normal Form (5NF)

File access

File blocks

File descriptor

File expansion

File extension

File group

File handle

File locking

File offset File organization

File permissions

File processing

File records on disks

File reorganization

File replication

File scan

File segments

File servers

File session

File sorting

File Transfer Protocol(FTP)

)(

File-organization module

File-server systems

Filing

Fill sequence / Filter driver

Filter generator

Filters

Final permutation

Finalized

Finance applications

Fine-grained control overcode

Fine-grained locking

Fine-grained objects

Fine-tune (to)

Finite field

Finite-state automata

Finite-state machine

Firewall

Firewall chains

Firmware

First fit

First hands-on systems

First level indexes

First Normal Form (FNF)

Fishbone diagram Fitness

Fixed hosts

Fixed point attack

Fixed routing

Fixed-head disks

Fixed-length record

Fixing bugs )( Fixtures

Flag

Flash memory

Flat Flat fading

Flat key space

Flat relational model

Flexibility Flooding (routing)

Floor function

Floppy disks

Flow

Flow control

Flow graph

Page 37: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 37/96

Flow label 32 Frame relay

Flow label

Flowchart )( Fluctuation

Fluents /

Fluid

FLWR )For-Let-Where-

Return(FLWR expression FLWR

Focus

Focusing operation Foiled twisted pair

Fold(s) )(Folder

Folder icon Folder redirection

Folding

Force/no-force approach / Force-writing

Foreground

Foreground process

Foreign Agent (FA)

Foreign key )( Foreign Network (FN)

Forestall (to -) Formal

Formal change control Formal description

Formal design Formal methods model

Formal Technical Review(FTR)

Formalism

Format

Format (v)

Formatted Formatters )(

Formatting

Formatting styles )( / Forms

Forms specificationlanguages

Forms-based interfaces

Formula(s) )(formulation

Fortified key negotiation Forum

Forward (v)

Forward chaining

Forward channel

Forward congestionsignaling

Forward engineering Forward Error

Correction (FEC)

Forward ExplicitCongestionNotification (FECN)

Forward protocol

Forward tracking Forwarding

Forward-mapped pagetable

Fourth GenerationLanguage (4GL)

Fourth GenerationTechnology (4GT)

Fourth Normal Form(4NF)

Fragmentation

Fragmentation

transparencyFragments )

( Frame Check Sequence

(FCS)

Frame handler

Frame mode bearerservice

Frame relay

Page 38: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 38/96

Frame table 33 General graph directory

Frame table

Frame technology Frame(s) )(Framework /

Framework activity Framework integration

Framework model Framing

Free list

Free Rider Free software

Free software foundation(FSF)

Free-behind

Free-space list

Freeware

Frequency

Frequency borrowing

Frequency domain

Frequency hopping

Frequency hoppingspread spectrum

Frequency modulation(FM)

Frequency reuse

Frequency Shift Keying(FSK)

Frequency synthesizer

Frequency-DivisionMultiplexing (FDM)

Frequent-pattern treealgorithm

Front console

Front-end processors

Fronto-central- parietal Front-office FTP (File transfer

Protocol))(

Full backup

Full duplex

Full duplex operation

Full duplex transmission

Full outer join operation

Full-screen mode

Function deployment Function Point (FP) Function(s) ) /()(Functional dependencies

Functional dimension Functional domain Functional independence Functional magnetic

resonance imaging)(

Functional requirements

Functionality

Function-oriented metrics Fundamental frequency

Fundamental harmonic

Fundamental systemmodel

FURPS (Functionality,Usability, Reliability,

Performance,Supportability) Future-knowledge

scheduling

Fuzzy-connectedness

G

Gain(s) )(Galois field

Gap filler

Garbage collection

Gate

Gateway / Gauge

GDT (Global DescriptorTable)

Gender ) ( General graph directory

Page 39: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 39/96

General number field sieve 34 Graphical Device Interface

General number fieldsieve

General Problem Solver(GPS)

General Public License(GPL)

General purpose / Generality Generalization/

specialization mapping /

Generalization-specialization (Gen-Spec)

-

Generalized cylinders

Generalized deltaprocedure

Generalized entity types

Generalized model

Generalized superclass

General-purposeapplication

Generating plans

Generation of tuples

Generic

Generic Flow Control(GFC)

Genetic

Genetic algorithms )(Genome data

management

Geographic InformationSystems (GIS)

Geographic mobilitydomain

Gestures

Gigabit Ethernet

GIS (GeographicInformation Systems)

Glass-box testing Glitch

Global data

Global depth

Global Grid Forum(OGF)

Global mobility

Global ordering

Global replacement

Global roaming

Global System for MobileCommunications (GSM)

Glossary

Gnu's Not Unix (GNU) GNU Go to sleep

Goal Question Metric-Bases MeasurementProgram (GQM)

Go-Back-N ARQ n

Goppa codes

GPL code

GPL software

Graceful close

Graceful degradation / Graceful recovery Graded-index multimode -Gradient

Gradient descent

Grammar )(Grammar-oriented

objects)(

Grammatical parse )( Grant (v)

Grant command

Granting privileges

Granularity

Graph matrix Graph serialization

Graph theory

Graph(s) / Graphical Device

Interface (GDI)

Page 40: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 40/96

Graphical User Interfaces 35 Hash files

Graphical User Interfaces(GUIs)

Graphics

Graphics card

Graphics controller

Grappling hook

Grayscale

Greedy method

Green packaging Green threads

Grid

Grid computing

Grid files

Ground

Ground wave propagation

Group address

Group rights

Group signal

Group signature

Group structure

Grouping

Grouping attributes

Groupware Growing phase

Guaranteed Frame Rate(GFR)

Guard page

Guards

Guess (v)

Guest

Guided transmissionmedia )(

GUIs (Graphical UserInterfaces)

HHackers Half duplex

Half duplex transmission

Halving

Hamming distance

Handbook

Handheld devices

Handheld DevicesMarkup Language

Handheld systems

Hand-held devices

Handler )( Handles )( Handoff )(Handoff delay

Handoff latency Handset )(Handshake

Handshaking

Hands-on computersystem

Handspread

Hang-up

Happened-before relation

Hard disks

Hard handoff

Hard link Hard problem

Hard real-time system

)( Hard-coded

Hardware )(Hardware controller

Hardware independence Hardware trap

Hardware-abstractionlayer (HAL)

Harmonic(s) )(Hash

Hash files

Page 41: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 41/96

Hash function 36 Horizontal partitioning

Hash function

Hash rate

Hash table

Hashed file

Hashed page table

Hashed records

Hashing techniques

Hazard analysis Head & tail

Head crash

Head seek

Headend

Header

Header Error Control(HEC)

Header Hub (HHub)

Head-Mounted Display(HMD)

Health care applications

Heap

Heap file

Heavy load

Heavyweight process

Help-me-test

Heterarchy

Heuristics )( Heuristic repair

Hibernate mode

Hidden node

Hierarchical and network systems

Hierarchical data models

Hierarchical Mobile IP(HMIP)

][IP

Hierarchical storagestructure

)(

Hierarchical storagesystems

)(

Hierarchical/nonhierarchical

/

Hierarchies generalization

Hierarchies specialization

Hierarchy (Hierarchies) ) /()(

High Data Rate DigitalSubscriber Line(HDSL)

High Level Data Link Control (HDLC)

High-Density Bipolar-3Zeros (HDB3)

Higher/lower-order bits / Higher-degree

relationships

High-level data modules

High-level DML

High-Level Language(HLL)

Hit ratio

Hive

Hold and wait

Hold time

Hole

Holographic diffractionpattern

Holographic storage

)( Home address

Home Agent (HA)

Home directories

Home Network (HN)

Homogeneous DDBMS DDBMS

Homonyms ) (Homophonic substitution

cipher

Hooked system

Hop

Hop-by-hop

Horizontal fragmentation

Horizontal partitioning

Page 42: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 42/96

Horizontal propagation 37 Image attribute

Horizontal propagation

Horn clauses

Horn greatest lowerbound theory

Horn least upper bound

theoryHost

Host

Host adapter

Host attached storage

Host languages

Hosted

Hosted

Hosted Virtual Machines

(VMS)Host-to-host

Host-to-host layer

Hot spare disk

Hot standby mode

HSM (HierarchicalStorage Management)

HTML (HypertextMarkup Language)

HTTP )(

Hub(s) ): (Human Identification at

Distance (HumanID)

Human-ComputerInterface (HCI)

Hybrid

Hybrid Online AnalyticalProcessing (HOLAP)

Hyper Text Markup

Language (HTML)Hyper Text Transfer

Protocol (HTTP)

Hyperlink (link)

Hyperplan

Hyperspace

Hyperterminal

Hypertext

Hypertext knowledge HyperText Markup

Language (HTML )Hyphen

I

I/O burst / I/O

I/O bus / I/O devices / I/O interlock

/ I/O port(s) )( / I/O subsystem / I/O-bound process / I-CASE CASE Iconic Iconic representation

Icons )( IDE (Integrated Device

Electronics) Idempotent )( Idempotent operation

Identification

Identifier

Identifying entity type )(Identity

Identity element

Idle

Idle channel )(Idle state )(Idle thread

Idleness

Ignore

Illegal

Illocutionary

Illumination

Image attribute

Page 43: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 43/96

Image data types 38 Industrial Control Systems

Image data types

Imaging process

Immediate

Immediate updatetechniques

Immediate updates

Immersion Immersive virtual

environments Immersive virtual reality

Immutable shared files

Impairment(s)

Impedance mismatch )(Impersonation

Impersonation

Implementation datamodels

Implementation level

Implementation view Implementation(s) )(Implicit congestion

signaling

Implicit graph

Implicit requirements Implicit rules Implicitly embedded Improvisation

Impulse noise

In the wake

Inactivity timer

In-band signaling

Inchannel signaling

Inclusion dependencies

Incoming branch Incoming flow Incoming/outgoing ) /()(Incompatible mode

Inconsistency

Inconsistent

In-core

In-core copy Increment Incremental backup

Incremental model Incremental Parsing (IP)

Incremental updates

Indefinite blocking

Indefinite blocking

Indemnity

Independent class Independent classes

Independent processes

Independent SoftwareVendors (ISV)

Independent Test Group(ITG)

Index block

Index of coincidence

Index of refraction

Index registers

Index root

Indexed allocation

Indexed-sequential file

Indexes

Indexes clustering

Indexes file

Indexes tuning

Indexical

Indexing

Indication primitiveIndirect blocks

Indirection Indirection blocks

Indirectly

Individual usability

Industrial ControlSystems (ICS)

Page 44: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 44/96

Inelastic traffic 39 Instructions

Inelastic traffic

Inertial Location System(ILS)

Infect (v)

Inference

Inference engine )(Inference rules

Inferencing

Infiniband

Information content Information deployment Information determinacy Information domain

Information Engineering(IE)

Information flow Information flow

continuity Information hiding

Information recompaction

Information repositories

Information ResourceManagement (IRM)

Information security(infosec)

Information StrategyPlanning (ISP)

Information structure Information

superhighway Information system life

cycle

Information systems

Information Technology(IT)

Informix universal server

Infrared

Infrastructure

Inherent

Inherent model-basedconstraints

Inheritance Inheritance support

Initial permutation

Initial state

Initial value

Initial vector

Initialization

Initialization )(Initialize (v)

Initialized

Initiate (v)

Injection

Injection Laser Diode(ILD)

In-line data

Innermost nested queries

Innermost queries

Inode

Inode structure

Inodes Input ):( Input queue

Input(s) / )(Insert command

Insert operation

Insertion anomalies

Insertion attack

Insertion operation )( Installation

Instance handler

Instance variables Instance(s) )( Instantiable interfaces

Instantiation

Institute of Electrical andElectronics Engineers(IEEE)

Instruction register

Instruction SetArchitecture (ISA)

Instructions

Page 45: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 45/96

Instrumentation 40 International Mobile Telecommunications

Instrumentation Int. Standardization Org.

(ISO)

Integrated help facility Integrated Project

Support Environment(IPSE) Integrated public service

interface

Integrated ServicesArchitecture (ISA)

Integrated Services DigitalNetwork (isdn)

Integration testing Integrity / Integrity constraints

Intellectual-PropertyRights (IPRS)

Intelligibility

Intensity

Intention of schema

Intention schemas

Intentional stance

Inter record gaps

Interactive

Interactive computersystem

Interactive computing Interactive interfaces

Interactive processes

Interactive system Interactive transactions

Interblock gaps

Inter-cell handoff

Interception

Interchange circuits

Inter–class test casegeneration

interconnected

Interconnection

Interdependency

Inter-domain mobility

Interface DefinitionLanguage (IDL)

Interface design Interface tool kit Interface(s) )(Interfacing

Interference

Interior Router Protocol(IRP)

Interlacing

Interleave/interleaved / Interleaved planning

Interleaving Interlock protocol Interlocked

Intermediate Hub (IHub)

Intermediate System (IS)

IntermittentlySynchronizedDatabaseEnvironment (ISDBE)

Intermodular interface

Intermodulation

Intermodulation noise

Internal fragmentation

Internal hashing

Internal Revenue Service(IRS)

Internal schemas

International AssociationFor CryptologicResearch (IACR)

International DataEncryption Standard(IDEA)

International Electro-technical Commission(ECL)

International MobileTelecommunications(IMT)

Page 46: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 46/96

ISO 41 Intrusive activity

InternationalOrganization ForStandardization (ISO)

International ReferenceAlphabet (IRA)

International Standards

Organization (ISO)International support

InternationalTelecommunicationUnion (ITU)

International Traffic InArms Regulations(ITAR)

Internet / Internet Architecture

Board (IAB)

Internet broadcasting

Internet Cache Protocol(ICP)

Internet Control MessageProtocol (ICMP)

Internet Corporation forAssigned Names andNumbers (ICANN)

Internet EngineeringSteering Group(IESG)

Internet Engineering Task

Force (IETF)Internet Group Message

Protocol (IGMP)

Internet mailing list

Internet Protocol (IP)

Internet Service Provider(ISP)

Internet Society (ISOC)

Internetwork

InternetworkingInteroperability )

(Interoperability

Interoperability )(Interpolation

Interpretation

Interpretations of rules

Interpreter Interprocess

communication Interrogation

Interrupt chaining

Interrupt dispatch table

Interrupt dispatcher

Interrupt driven

Interrupt handler

Interrupt handling Interrupt latency )( Interrupt priority levels

Interrupt processing

Interrupt service routine

Interrupt vector

Interrupt(s) )( Interrupt-request line

Interrupt-routines list

Intersection

Intersection operation

Intersymbol interference

Inter-track density

Interval

Interval data type

Intra-cell handoff

Intractable problem

Intra-domain mobility

Intranet )(Intranets Intra-subnet mobility

Intrinsic

Introspection

Intruder

Intruding DetectionSystem (IDS)

Intrusion

Intrusive activity

Page 47: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 47/96

Intuitive game-controlling gestures 42 Join dependencies

Intuitive game-controllinggestures

)( Intuitive gestures )( Invalid

Invalid page reference

Invalid state ""Invariables

Invariant

Inventory analysis Inversion of control (IoC)

Inverted page table

Inverter

Inward multiplexing

In-window

Ionosphere

IP multicasting IP IP next generation IP

IP paging IP IP spoofing IP

IPC (Inter-ProcessCommunication)

IRM (InformationResourceManagement)

Irreducible

IS-A relationship IS-A)(...

ISAM (Indexed SequentialAccess Method)

ISDBE (IntermittentlySynchronizedDatabaseEnvironment)

Island-driven search

Isolation property

Isomorphic )( Isomorphism )( Isorythmic

Isotropic antenna )(IT staff

Iterated block cipher

Iteration markers

Iteration(s) )(Iterative broadening

Iterative deepening

Iterator variables )(Iterators

ITU TelecommunicationStandardizationSector (ITU-T)

J

Jacket

Jackson plans

Jackson systemDevelopment (JSD)

Jacobi symbol

jammer

Jamming

Java 2 Enterprise Edition(J2EE)

Java-2

Java 2 Standard Edition(J2SE)

Java-2

Java Community Process

Java Community Process(JCP)

Java DatabaseConnectivity (JDBC)

Java Developing Kit(JDK)

Java Server Faces (JSF)

Java Servlet Pages (JSP)

JIT (Just-In-Time)compiler

Jitter

Job control Job Control Language

(JCL)

Job objects

Job pool

Job queue

Jobs )( Join dependencies

Page 48: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 48/96

Join indexing 43 Latch

Join indexing

Join operation

Joined tables

Joins

Joint probability

Journaling

Journaling file systems

Joystick

Juggernauts

Jukeboxes

Junction

Just-In-Time (JIT)

Juxtaposition JVM (Java Virtual

Machine)

K KDD (Knowledge

Discovery inDatabases)

Kernel data address

Kernel DispatcherKernel threads

Kernel-level threads

Key attributes

Key class Key compromise

Key Distribution Center(KDC)

Key escrow

Key exchangeKey field

Key management

Key management facility

Key Process Area (KPA) Key transformation

Keylogger )(

Keypad

Keyspace

Keystream

Keystroke

Keystrokes

Keyword )(Keyword-based indexing

Keyword-based search

KLOC Kilo Line-Of-Code Knapsack

Knowledge base

Knowledge discovery Knowledge Discovery In

Databases (KDD)

Knowledge interchangeformats

Knowledge managementsystems

Knowledge representation

Knowledge-based security

Knowledge-Based System (KBS) Known plaintext attack

L

Label(s) )(LAN extension

LAN segment

Lane

Language rate

Laptops

Large scale

Large-grainedfunctionalities

Large-Scale-Integration(LSI)

Last In first Out (LIFO)

Latch ) (

Page 49: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 49/96

Latency 44 Linear consistency test

Latency

Latency time

Latent errors

Lattices

Lattices generalization

Lattices specialization

Law enforcement

Law of causality Layer

Layered approach

Layered, feedforwardnetwork

Layering )(

Layering interfaces

Layout ][Layout Appropriateness

(LA) Lazy swapper

LDAP (LightweightDirectory-AccessProtocol)

LDT (Local DescriptorTable)

Lead

Leading bits

Leaf classes

Leaf node

Leakage

Learning rate parameter

Lease

Leased line

Least Frequently Used(LFU)

Least Frequently Used(LFU) pagereplacement algorithm

Least Recently Used(LRU)

Least Recently Used(LRU) page

Least-cost algorithm

Least-cost routing

Left outer join operation

Left-deep tree

Legacy Legacy DDBMS DBMS

Legacy system Legal relation states

Legendre symbol

Lemma

Level x Optical Carrier(OC)

x

Level x SynchronousTransfer Signal (STS) x

LGPL (GNU lesser GPL)

)GNU( Liability

License License agreement

License(s) )( Licensed

Licensee

Licensing

Licensor )( Light Emitting Diode

(LED)

Lightweight containers

Lightweight DirectoryAccess Protocol(LDAP)

)(

Limit

Limit register

Limited-horizon search

Line break

Line configuration

Line discipline

Line Of Sight (LOS)

Linear complexity

Linear complexity profile

Linear congruentialgenerator

Linear consistency test

Page 50: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 50/96

Linear cryptanalysis 45 Lock-in attack

Linear cryptanalysis

Linear differentialcryptanalysis

Linear Feedback ShiftRegister (LFSR)

Linear hashing

Linear list

Linear recursion

Linear regression

Linear sequential model Linearly separable

functions

Lines Of Code (LOC) Link

Link access Procedure forFrame mode bearerservices (LAPF)

Link Access ProtocolBalanced (LAPB)

Link attributes

Link management

Link time

Link weight

Linkage editor )( Linked allocation

Linked list

Linked scheme

Linkers )( Link-state routing

Linqua franca

Linux

Listen stateLiteral ][Little endian

Little-endian

Little-endian convention

Live video avatar LLC protocol data unit LLC

Load (to) )(

Load balancers

Load balancing

Load sharing

Load Sharing Facility(LSF)

Load time

Load(s) )(Loaders )( Loading utility )(Local Area Network

(LAN)

Local data

Local depth

Local host

Local loop

Local loopback

Local Procedure Call(LPC)

Local replacement

Local Security AuthoritySubsystem (LSASS)

Locales Locality model

Locality of reference

Localization Localized (to be -)

Location

Location cache

Location independence

Location independent

Location transparency

Location transparent

Lock bit

Lock management

Lock manager

Lock mode

Lock request

Locked

Lock-in attack

Page 51: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 51/96

Locking 46 Macro payment

Locking Locking protocol

Lock-key scheme

Locks

Log file

Log information

Log records

Log Sequence Number(LSN)

Log-based recovery

Log-based transaction-oriented file systems

Log-file service

Logging ) ( Logging area

Logical address space

Logical Block Address(LBA)

Logical clock

Logical Cluster Number(LCN)

Logical database design

Logical definitions of

domainsLogical file system

Logical formatting

Logical level

Logical Link Control(LLC)

Logical sampling

Logical theory

Logical units

Logically omniscient

Login

Login authentication

Login sessions

Logon subsystem

Long-haul fibertransmission

Longitudinal redundancycheck

Long-running activity

Long-term scheduler

Look over the shoulder of a user

Look scheduling Loop resolution

Loop testing Loosely coupled systems )

( loss(es) )( Lossless

Lossless join property

Low-latency

Low-level data models

Low-level formatting

Low-level programminglanguages

Low-level triggers

Lowpass

Lowpass filter

LPC (Local ProcedureCall)

LRU (Least-Recently-Used)

Lucas number

LWP (LightweightProcess)

MM:N relationship type M:N)M N(

Machine Vision (MV)

Macro life cycle

Macro mobility

Macrocell )(Macro-expansion Macro-operator

Macro-payment

Page 52: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 52/96

Macroscopic schedule 47 Master secrete

Macroscopic schedule Magnetic disks

Magnetic tape storagedevices

Magnetic tapes

Magnetoencephalography

Magneto-optic disks

Magnitude )(Mail destination

Mail envelop

Mailbox

Mailing list

Mailslot

Main files

Main memory

Mainframes

Maintainability )( Maintenance personnel )(Maintenance phase Major device number

Major number

Majority protocol

Major-version number

Make-buy decision / Malefactors

Malfunctioning

Malicious

Malicious code Malicious intent

Malicious software

Man

Management InformationBase (MIB)

Management InformationSystem (MIS)

Mandatory access control

MANET (Mobile Ad-HocNetwork)

Man-in-the-middle attack

Manual identification

Manufacturingapplications

)(

Manufacturing cell Many-to-many model

Many-to-one model

Map

Map (v) / Mapping

Mapping cache

Mapping to relations

Mapping(s) )(

Mark

Mark up (v)

Marker

Market-based data

Market-basket data

Marketers

Marketing ploy

Marshalling

Marshalling

Maskable interrupt

Masquerade

Mass storage

Mass storage media

Massively ParallelProcessing (MPP)

Master (slave/master) ) / (Master copy )(

Master file )(Master File Directory

(MFD)

Master File Table (MFT)

Master key

Master processor

Master PTE PTE Master secret

Page 53: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 53/96

Master server 48 Metadata

Master server

Mastergroup

Master-slave relationship - Master-slave structure -

Matched filtering

Matching

Mathematical relation

Max function

Maximum Burst Size(MBS)

Maximum Frame Size(MFS)

Maximum function

McCabe technique McCabe M-commerce payment

Mean Time BetweenFailures (MTBF)

Mean time to data loss

Mean time to repair(MTTR)

)(

Mean-time-to-change(MTTC)

Mean-time-To-Failure(MTTF)

Measure / Measurement

Mechanism

Media )( Media cubes

Media Gateway (MG) MG

Media GatewayController (MGC)

MGC

Medium Access Control(MAC)

Medium-term scheduler

Meet-in-the-middle attack

Meet-in-the-middleconsistency attack

Membership

Membership querymessage

Membership reportmessage

Memory address register

Memory allocation

Memory dump

Memory locking Memory mapping

Memory mapping a file

Memory partition

Memory-access violation

Memory-mapped I/O / Memory-protection

violation

Memory-style Error-

Correcting-Code(ECC) organization

MEMS (Micro-ElectronicMechanical Systems)

Menu selection system Menu-based interfaces

Menu-driven

Merger

Meshed

Meshing

Message AuthenticationCode (MAC)

Message AuthenticatorAlgorithm (MAA)

Message Body (bodies) ):(Message Digest (MD) / Message Integrity Check

(MIC)

Message passing )( Message pool

)( Message queues

Message slots

Message system Messaging )(Meta knowledge Meta-class

Metadata

Page 54: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 54/96

Metadata repository 49 Mixed transactions

Metadata repository

Meta-design

Metaknowledge

Metalevel

Metamodel Metaphor

Meta-signaling

Metatags Meter

Method ):( Metric ):( Metrics computation Metrics evaluation Metropolitan Area

Network (MAN)

Micro life cycle

Micro mobility Microbrowser

Microcell )(Microcode

Microcomputers

MicroElectroMEchanicalSystems (MEMS)

Microgestures )( Microkernels )( Micro-payment Microscopic schedule Microsoft Interface

Definition Language(MIDL)

Microsoft shared source

MicrowaveMicrowave LAN

Middle tier

Middleware Milestone ):( Mimic function

Min function

Miniature keyboards

Miniaturization Minicomputer

Minidisks

Minimal cover /

Minimal sets

Minimum cardinalityconstraint

Minimum Cell Rate(MCR)

Minimum function

Minimum test sequence Minimum-cost spanning

tree

Minimum-hop path

Minimum-hop tree

Mining

Mini-specification Mini-specs Miniworld

Minor device number Minor number

Minor-version number

MIPS ) ( Mirror set

Mirrored blocks )(Mirrored disk

Mirroring

Mirroring )(Misalignment

Mischievous

MissMissing values

Mission-criticaldevelopment

Mitigating legal exposure

Mixed file

Mixed fragmentation

Mixed transactions

Page 55: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 55/96

MMU 50 Mount table

MMU (Memory-Management Unit)

Mnemonic

Mnemonics

Mobile

Mobile Ad-hoc NETwork (MANET)

Mobile agent

Mobile banking services

) ( Mobile content )( Mobile databases

Mobile financialapplications

Mobile financial services

Mobile IP (MIP) ][IP Mobile node

Mobile payment

Mobile payment forum

Mobile phones

MobileTelecommunicationSwitching Office(MTSO)

Mobile telephonyMobility )(Modal operator

Modality Mode

Model-based vision

Modeler

Modems )( Modifiability )( Modification anomalies

Modify bit

Modular

Modular arithmetic Modular reduction

Modularity

Modulated signal

Modulating signal

Modulation

Module ):( Module Interconnection

Language (MIL) Module-chart Modulo n n

Modulo, modulus

Modulus attack

MOLAP(MultidimensionalOLAP)

OLAP

Molecular DynamicsMachine (MDM)

Monitor ):

( Monitor call

Monitor construct

Monitor mode

Mono mode

Monoalphabetic cipher

Monolithic software Monomial

Monotonic

Monotonic reasoning

Moor’s law

Moral compatibility

Morphological

Morphology metrics Most Frequently Used

(MFU) pagereplacement algorithm

Most Recently Used(MRU) page

Most significant bit

Motifs Mount (to)

Mount on demand

Mount point

Mount table

Page 56: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 56/96

Mounted 51 Multirate

Mounted

MP3 players MP3 MPLS (Multiprotocol

Label Switching)

MPOA (MultiprotocolEncapsulation OverATM) ATM

MPP (Massively ParallelProcessing)

Multi-access bus Multicarrier

Multicast

Multidimensional analysis )( Multidimensional

associations

Multidimensional OLAP(MOLAP)

OLAP

Multidimensional OnlineAnalytical Processing(MOLAP)

Multidimensional User-Oriented SyntheticEnvironment (MUSE)

Multilevel binary

Multilevel feedback queuescheduling

Multilevel index

Multilevel indexes

Multilevel queue-scheduling

Multimedia data

Multimedia databases

Multimedia Internet MailExtension (MIME)

Multimedia MessagingService (MMS)

)(

multimode

Multinational use

Multiparty computation

Multi-pass clock

Multipath

Multipath distortion

Multipath interference

Multipath propagation

Multiple agents

Multiple class partitiontesting

Multiple encryption

Multiple granularity levellocks

Multiple inheritance

Multiple tuples

Multiple unicast

Multiple Universal-naming-conventionProviders (MUP)

Multiple user interfaces

Multiple-relation options

Multiplexer

Multiplexing

Multiplication (*)operator

Multiplicities

Multipoint

Multiprocessing / Multiprocessor systems

Multiprocessorvirtualization

Multiprogrammedsystems

Multiprogramming

Multiprogrammingdegree

MultiProtocolencapsulation OverATM (MPOA) ATM

MultiProtocol LabelSwitching (MPLS)

MPLS

Multiprovider router

Multirate

Page 57: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 57/96

Multisets 52 Nested relational model

Multisets

Multitable locks

Multitasking Multithreaded process

Multithreading models

Multi-URL-basedinference

URL

Multiuser DBMS DBMS Multiuser DDBMS DBMS

Multiuser systems

Multivalued attributes

Multivalued dependencies

Multiversion

Multiversion concurrencycontrol

Multiway joins

Music CD

Musical surface

Mutant

Mutation operator

Mutex

Mutual exclusion

N

Naive end user )(Naive knowledge

Name collision

Name space

Named iterators

Named objects

Named pipes

Named queries

Naming

Naming constraints

Naming hierarchy

Naming schemaconstructs

Naming transparency

Nano technology

Nanomedicine

Nanotubes

Narrative context

Narrowband / N-ary relationship types

Nassi-Shneiderman plans N-S National Bureau of

Standards (NBS)

National Computer

Security Centre(NCSC)

National Institute of standard andtechnology (NIST)

National LanguageSupport (NLS)

National ScienceFoundation

National security agency(NSA)

Native

Native compilerNative Win32 executable Win32

Natural join operation

Natural languageinterfaces

Navigator

Near-end crosstalk

Near-line

Need-to-know principleNegative associations

Negotiation Neighbor acquisition

Neighbor reachability

Nested queries

Nested relational model

Page 58: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 58/96

Nested relations 53 Nonconfirmed service

Nested relations

NetBIOS Extended UserInterface (NetBEUI)

NetBIOS

Network access layer

Network Attached Storage(NAS)

Network attachment point

Network BasicInput/Output System(NetBIOS)

/

Network computers

Network connections

Network daemon

Network Device InterfaceSpecification (NDIS)

Network Dynamic DataExchange (NetDDE)

Network file systems

Network for EarthquakeEngineeringSimulation (NEES)

Network layer

Network login

Network OperatingSystem (NFS)

Network OperatingSystem (NOS)

Network partitioning

Network redirector

Network response

Network security

Network Service AccessPoint (NSAP)

Network-friendlyencoding

Networking

Network-oriented

Network-TerminatingEquipment (NT)

Neural networks

Neurocognitive

NFS (Network FileSystem)

Nicknames

Nimbus

NIS (Network Information System)

NIST (National Institute

Of Standards)No preemption

No Remote MemoryAccess (NORMA)

No-access page

No-cache Node weight Noise-tolerant

Nomadic access

Non active

Non blocking

Non confirmed message

Non faulty process

Non guided transmissionmedia

Non monotonic reasoning

Non Real Time VariableBit Rate (NRT-VBR)

Non Return To Zero(NRZ)

Non Return To ZeroInverted (NRZI)

Non Return To Zero-Level (NRZ-L)

Non scalable Non volatility

Nonadditive join property )(Nonblocking I/O /

Nonblocking send

Noncached I/O / Noncached read

Nonce Non-compliant cells

Nonconfirmed service

Page 59: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 59/96

Noncontainer object 54 Object occurrencies

Noncontainer object

Non-eud environment

Non-incrementalintegration

Noninstantiable interfaces

Noninvasive Nonmaskable interrupt

Nonmonolithic approach

Nonpersistent CSMA CSMA Non-preemptive

Nonprocedural language Nonrecoverable read

error

Nonrecursive queries

Nonredundant allocation

Nonrepudiation

Nonresident attributes

Nonserial schedule

Non-Uniform MemoryAccess (NUMA)

Nonverbal communication

Nonvolatile cache

Nonvolatile ram cache

Nonvolatile storage

Nonvolatile storagedevices

Normal forms

Normal Response Mode(NRM)

Normalization

Normalization process

Normalization value

Normalize (v)

No-store

Not operator

Notation Notched quanta

Notepad

Notification

Notification events

NP Class (Non-PolynomialClass)

NP-complete class

Null modem

Null values

Null values attributes

Null values in tuples

Number crunching

Number Field Sieve (NFS)

Number theory

Numeric AssignmentModule (NAM)

Numeric data types

O

Object abstractiontechnique

Object adapter Object behavior

Object Data ManagementGroup (ODMG )

Object definition language(ODL)

Object file

Object format Object identity

Object life history Object Linking And

Embedding (OLE) Object Management

Group (OMG)

Object Management

Layer (OML) Object manager

Object ManipulationLanguage (OML)

Object modeling

Object ModelingTechnique (OMT)

Object module

Object occurrences

Page 60: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 60/96

Page 61: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 61/96

One-time password system 56 Ordering

One-time passwordsystem

One-to-one model

One-way function )(

One-way hash function )( One-way trust )( On-hook

Online / Online Analytical

Processing (OLAP) )(

Online configurations On-line storage

On-line system

Online TransactionProcessing (OLTP)

)(Ontologies

Ontology

Ontology Inference Layer(OIL)

Ontology knowledgeengineering

Opaque data type

Op-code Open addressing

Open count

Open cursor command

Open DatabaseConnectivity (ODBC)

Open Grid ServicesArchitecture (OGSA)

Open paradigm Open research problems

Open Shortest Path First(OSPF)

Open software foundation(OSF)

Open source

Open Source Definition(OSD)

Open source initiative

Open Source Software(OSS)

Open SystemInterconnection (OSI)model

Open-file record

Open-file table

Operability )( Operand

Operands )( Operating system(s) )(Operation

Operational profile Operator overloading

Operator(s) )(Optical cables

Optical disks

Optical fiber

Optical Line Of Sight

Optimal algorithm

Optimally

Optimally aligned Optimist concurrency

control

Optimistic locking

Optimistic techniques

Optimization

Optimizations

Optimized

Optimizers

Option(s) )(Optional fields

OQL (Object Query

Language)OR operator

Order

Order of magnitude

Order preservation

Ordered files

Ordering

Page 62: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 62/96

OASIS 57 Page sharing

Organization ForAdvance StructuredInformation Systems(OASIS)

Orthogonal

Orthogonal codes

Oscillation(s) )(Out of memory

Outcome ):( Outer join operations

Outer queries

Outer union operation

Outer-page table

Outgoing flow

Outlet

Out-line data

Out-of-band information

Out-of-band signaling

Out-of-date

Output

Output ):( Output Feedback mode

(OFB) Outsourcing Over-allocating memory

Overfitting

Overflow

Overflow files

Overhead )(Overlap (v)

Overlapping

Overlapping frequenciesOverlay

Overlay driver

Overlay loader )( Overload

Overloading Overriding

Overwrite

Overwriting

Owner

Owner entity

Owner entity type

Owner rights

Ownership

P

P class (Polynomial class)

P+Q redundancy scheme P+Q Package

Packaging

Packaging companies

Packet sniffers Packet sniffing

Packet switching

Packet(s) )(Padding

P-adic number p Page allocator

Page break

Page cache

Page directory

Page Fault Frequency(PFF)

Page fault trap

Page faulting

Page layout Page offset )( Page out

Page out (to -)

Page replacement

Page replacement

Page scanning

Page sharing

Page 63: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 63/96

Page table 58 Passive attack

Page table

Paged

Paged (to be -) in from thefile system

Paged segmentation

schemePaged-aligned sections

Page-Directory Entry(PDE)

Page-fault rate

Page-frame database

Page-not-present bit " " Pageout

Pageout (to)

Pageouts Pager

Pager

Page-replacementalgorithms

Page-Table Entry (PTE)

Page-table self map

Paging

Paging daemon

Paging file

Palletize (to) )( Palm telephones

Palmtop

Panic Paper prototype Parabola

Parabolic reflective

antennaParaboloid

Paradox Parallel / Parallel database

management systems

Parallel processing

Parallel systems

Parameter marshalling

Parameter mode

Parameter passing

Parameter types

Parameter(s) )(Parameters of disks

Parametric end users

Parcel

Parent nodes

Parent process

Parenthesis (roundbrackets)

Parity

Parity bit

Parity error

Parse procedures

Parsing

Partial key

Partial replication

Partial specialization

Partially committed state

Partially observablemarkov decisionproblem

Partial-Order Planning(POP)

Participation constraints

Partition Partition algorithm

Partition boot sector

Partition control block Partition testing Partitioned hashing )(Partitioning

Partitions )( Pass phrase

Passive

Passive attack

Page 64: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 64/96

Passive entity 59 Person-to-person payment

Passive entity

Password

Patches

Path

Path expression

Path loss

Path name

Path-name translation

Path-vector routing

Pattern

Pattern matching ][Payload

Payload Type (PT)

Payroll system P-box P PC hygiene

PCB (Process ControlBlock)

Peak amplitude

Peak Cell Rate (PCR)

Peculiarities Peer

/ / Peer to peer

Peer-to-peer computing

Peer-to-peer systems

Penal laws

People ManagementCapability MaturityModel (PM-CMM)

Per se

Perceived behavioral

control factor

Perceived cost

Perceived Ease of Use(PEU)

Perceived Usefulness (PU)

Perception

Perceptron

Percepts

Perceptual interfaces

Perfective maintenance Perfidious way

Performance

Performance monitoring

Performance testing Per-Hop Behavior (PHB)

Period

Periodic signal

Perlocutionary

Permanent key

Permanent VirtualConnection (PVC)

Permission attributes

Permits

Per-process open-file table

Persist (v) Persistence

Persistence timer

Persistent CSMA CSMA Persistent forwarding

information base(FIB)

Persistent objects )(Persistent storage )(Persistent stored modules

)(Person/Month (PM) / Personal databases

Personal Digital Assistants

(PDAS)Personal Identification

Number (PIN)

Personal Software Process(PSP)

Personal workstations

Personalization ) (

Person-to-person payment

Page 65: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 65/96

Perspective projection 60 Polymorphic

Perspective projection

Petaflops

Phantom body

Phantom problem

Phase

Phase Modulation (PM)

Phase shift keying (PSK)

Phase-change disk

Phonemes

Physical AddressExtension (PAE)

Physical address space

Physical dataindependence

][

Physical data models ][Physical database design ][

Physical formatting

Physical indexes ][Physical layer

Physical processes andevents

Physical properties

PID )( Piggybacking

Pile file

Piling

Pilot channel

PIN (PersonalIdentificationNumber)

Pin (to -) a page

Pin(s) )(Ping floods

Pinning interface

Pipe

Piped through pr / pr Pipelines ][ Pipelining )(

Pivoting

Pixel(s) )()(

Plain file

Plain Old Java Objects(POJO)

Plain Old TelephonyService (POTS)

Plaintext

Plaintext feedback mode

Plane/level / Platform for Internet

Content Selection(PICS)

Platform(s) )(Platters

Plausible fault Plethora Plug and play

Pluggable )(Pluggable authentication

module (PAM)

Point CoordinationFunction (PCF)

Point of attachment

Point of sale (pos)

Point to point

Pointing device

Point-to-Point (PPP)Protocol

)(

Point-To-Point TunnelingProtocol (PPTP)

Polar

Policy

Policy CertificationAuthority (PCA)

Polling/poll

Polyalphabeticsubstitution cipher

Polygram substitutioncipher

Polyinstantiation

Polymorphic

Page 66: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 66/96

Page 67: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 67/96

Premaster secret 62 Process identifier

Premaster secret

Prepaging

Prepaid cards Prepare (T) T

Prepositional form

Preprocessors

Presentation layer

Presentation protocol )( Pretty Good Privacy

(PGP) Preventive auditing Preventive maintenance Primary actor

Primary clause ""Primary copy )( Primary indexes

Primary key

Primary processor

Primary rate

Primary storage

Primary/Secondary / Prime (number)

Prime attributes

Primitive(s) )(Principal

Principle componentanalysis

Printer servers

Prior probability

Prioritized, credit-basedalgorithm

Priority inversion

Priority paging

Priority replacement

Priority scheduling

Priority(s) )(Priority-inheritance

protocol

Privacy

Privacy enhanced mail

Privacy protection

Private

Private Branch Exchange(PBX)

Private key

Privilege

Privilege escalation

Privileged instructions

Privileged mode

Privileged software

Privileges

Privileges granting

Privileges revoking / Proactive strategy Probabilistic encryption

Probe packet

Problem decomposition Problem reporting Problem space Procedural cohesion

Procedural design Procedural DML DML Procedural language Procedural layering Procedural narrative Procedural program code

Procedure call

Procedures )( Process Activation Table

(PAT) Process aging Process algebra Process control

Process Control Blocks(PCBs)

Process identifier )(

Page 68: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 68/96

Page 69: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 69/96

Prototype 64 Quantifying in

Prototype Prototype page-table

entry

Prototype PTE PTE Prototyping Prototyping paradigm Prover

Proxies

Proximity

Proxy

Proxy signature

Pseudocode

Pseudo-code

Pseudonoise

Pseudo-random

Pseudoternary

PSM (Program StoredModules)

Pspace class Pspace-complete class

Psychoacoustician

Psychological /

PTBR (Page-Table BaseRegister)

PTLR (page-table lengthRegister)

Public BroadcastingService (PBS)

Public key

Public key algorithm

Public key certificate )(Public key cryptography )(Public key encryption

)(Public telecommunication

networks

Public telephone network

Public-domain

Public-domain software

Public-key encryptionalgorithm

Pulse AmplitudeModulation (PAM)

Pulse Code Modulation(PCM)

Pulse sensor

Pulse-width-modulation

Pun

Punctuation characters

Pure code

Pure demand paging

Pure segmentation

Purposeful breaches

Purposive vision

Q

QBE (Query-By-Example)

Qos eligibility

Quadratic

Quadratic nonresidue

Quadratic residue

Quadratic Sieve (QS)

Quadrature AmplitudeModulation (QAM)

Quadrature Phase ShiftKeying (QPSK)

Qualification

Qualified aggregation

Qualified associations

Quality assurance Quality assurance system Quality control Quality Function

Deployment (QFD) Quality of conformance Quality of design Quality Of Service (QOS)

Quantifier ) /( /

Quantifiers )(Quantifying in

Page 70: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 70/96

Quantitative physics 65 Reactive system

Quantitative physics

Quantization

Quantum computing

Quantum cryptography

Quantum electrodynamics

Quasi-formal grammar Querier's Robustness

Variable (QRV)

Queries

Queries blocks

Query compiler

Query language

Query processing

Query servers

Query-By-Example(QBE )

Querying constructs

Questionnaire

Queue

Queue network model Queued spinlocks

Queueing-network analysis

Queuing diagram

Queuing semaphore Queuing theory Quintuple encryption

Quotas

R Race condition

Radiation

Radio LAN

Radio range

Radiologist Radiometry of image

formation

RAID (Redundant ArraysOf Independent Disks)

RAID (Redundant ArraysOf Inexpensive Disks)

Raised

RAM (Random AccessMemory)

Ramification

Random paradigm Random routing

Random testing Random-access device

Random-access time

Randomizing function

Randomly

Range relation

Range(s) )(Rapid Application

Development (RAD) Rapid prototyping Raster image processing

Raster images

Raster scan )( Rasterization

Rational Rose design tool Rational Rose

Rational Rose tool Rational Rose

Raw device interfaces

Raw disk

Raw I/O / RBAC (Role-Based Access

Control)

RDBMS (RelationalDatabase ManagementSystems)

RDF (ResourceDescriptionFramework)

Reachability

Reacquisition

Reactive machines

Reactive strategy Reactive system

Page 71: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 71/96

Read command 66 Refactoring

Read command

Read timestamp

Read/write head / Read/write locks /

Readability Read-ahead )( Readers-writers problem

Read-set transactions

Read-write disks

Ready ][ Ready (state) )( Ready (T) T

Ready queue

Real Time Logic (RTL) Real Time Variable Bit

Rate (RT-VBR)RT-VBR

Real-time database

Real-time executive )(

Real-Time Operatingsystem (RTO)

Real-time scheduling

Real-time system(s) )( Reasoning

Reasoning mechanisms

Reassembly

Receive Non Ready (RNR) RNR

Receive Ready (RR) RR

Reception path Reclaim Reconnection timer

Record pointers

Record types

Record-at-a-time

Record-at-a-timeoperations

Record-based data models

Recorder Records )( Records items

Records values

Recover (v) Recoverable read error

Recovering process

Recovery ] /[][Recovery after a power

failure

Recovery and backupsystems

Recovery checkpoints

Recovery in multidatabasesystems

Recovery testing Recreation and

Entertainment (R&E)

Recurrent networks

Recursive closure

Recursive parallel model /

Recursive relationships

Redirector

Redirector connection

Redo (T) T

Redo operation

Redo transaction

Reducible )( Redundancy

Redundancy controlRedundant Redundant Arrays Of

Independent Disks(RAID)

Redundant information intuples

Reentrant code

Refactoring

Page 72: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 72/96

Reference bit 67 Remainder section

Reference bit

Reference count

Reference materials

Reference string

Referencing relation

Referent point Referential integrity

constraints

Referential triggeredaction

Refining conceptualschemas

Reflective

Reflex

Reflexive associations

Refraction

Refractive index

Refresh rate

Refutation

Regional networks

Register-allocationalgorithm

Register-replacementalgorithm

Registers )( Registry

Regression line Regression rule )(Regression testing Regression tests

Regular entity types

Regular expression

Regulation

Regulation Reify

Related keys

Related keys attack

Relation schema

Relational algebra

Relational calculus

Relational data models

Relational data modelsnotation

Relational database

Relational database design

Relational DatabaseManagement Systems(RDBMS)

Relational databaseschema

Relational decomposition

Relational OLAP(ROOLAP)

OLAP

Relational OnlineAnalytical Processing(ROLAP)

Relational-Functional

Markup Language Relationship sets

Relationships

Relationships as attributes

Relative access

Relative advantage

Relative block number

Relay

Release memory

Releases )( Reliability

Reliable

Reliable sequencingnetwork service

Relinquish (v) the CPU

Relocatable address

Relocatable code

Relocatable linking loader

Relocatable loader )(

Relocation

Relocation register

Remailers

Remainder section

Page 73: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 73/96

Remapping 68 Response set

Remapping

Remote collaboration

Remote file transfer Remote login

Remote logon

Remote loopback

Remote procedure

Remote storage services

Remote teaching

Remote terminal access

Remote-Access Server(RAS)

)(

Removable

Removable media

Rename operation

Renaming

Rendering

Rendezvous

Rendezvous point Repair approach

Reparse data

Reparse points

Repeater(s) )(Repertoire

Replay

Replay attack

Replicas

Replicated

Replication

Replication transparency

reply

Repositioning

Repository Representational data

models

Request )(Request edge

Request For Comments(RFC)

][

Request memory

Request primitive

Requirement Engineering

(RE)Requirements collection

and analysis

Requirementsspecificationtechniques, databasedesign

Requirements tracing Research Fund

Expenditure Reservation

Reset

Resident attributes

Resident monitor )( Residual error

Residue

Resilience

Resolution ):(Resource allocation

Resource Description

Framework (RDF)Resource fork

Resource instances

Resource preemption ) (

Resource reservation

Resource ReservationProtocol (RSVP)

)(

Resource sharing

Resource utilization

Resource vector

Resource-allocation graph

Resources )( Resources allocator

Response

Response primitive

Response set

Page 74: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 74/96

Response time 69 Roll in

Response time

Responsibility Responsibility-driven

design

Responsiveness

Restart

Restore

Restricting access

Restriction

Restructuring Result equivalent

Retail shopping

Retailers

Retransmission timer

Retrieval Retrieval operations

Retrieval transactions

Retrievals

Return circuit

Return key

Returns On Investment(ROI)

Reusability Reuse-driven

Reverse channel

Reverse engineering

Reversible

Review Review issues list Review leader

Review meeting Review summary report Reviewer Revise Revisions Revocation

Revoke command /

Revoked

Rewrite time

Rhythm

Rich Text Format (RTF)

Right outer join operation )(

Ring LAN

Ring topology

Ringing tone

Ripple effect

Risk ):( Risk analysis Risk avoidance Risk driver Risk estimation Risk factor Risk identification Risk item checklist Risk management

Risk management process

Risk Mitigation,

Monitoring AndManagement(RMMM)

Risk monitoring Risk projection Risk referent level RMI (Remote Method

Invocation)

Roaming

Roaming profiles

Robot visionRobotic tape library

Robots )( Robustness

ROLAP (RelationalOLAP)

OLAP

Role-Based AccessControl (RBAC)

Roll in

Page 75: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 75/96

Roll out 70 Scalability

Roll out

Rollback

Rolled back

Roll-forward

Roll-up display

Root directory

Root file system Root partition

Rostering Rosters Rotational Delay (RD)

Rotational latency

Rotor

Round robin service

Round trip )(Round-robin review Round-robin scheduling

Round-trip propagation

Route

Route-caching table

Router(s) )(Routines )( Routing

Routing protocols

Routing header

Routing InformationProtocol (RIP)

Routing table

Row data types

Row-level triggers

RPC (Remote ProcedureCall)

RPC daemon RPC Rudimental, rudimentary Rule base Rule Identification

Markup Language (RIML)

Rule learning

Rule Structure MarkupLanguage (RSML)

Rule Triggering MarkupLanguage (RTML)

Rule-defined predicates

Rules Markup LanguageResearch

Running (state) )( Running key cipher

Run-time

Run-time condition

Runtime databaseprocessor

Run-time libraries

Run-time routine

Run-time support Run-time support system

S

Safe expression

Safe sequence

Safe state

Safety algorithm

Salesman problem

Salt

Sample assignments

Sampling algorithm

Sampling theorem )(SAN (Storage-Area

Networks)

Sandwich testing Satellite communication

Satellite microwave

Satellite(s) )(Satisfied constraints

Saturation

S-box S Scalability )(

Page 76: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 76/96

SPLINE 71 Security

Scalable Platform forLarge InteractiveNetworkedenvironments(SPLINE)

Scalable scope

Scalar variable

Scale

Scan )(Scanrate

Scattering

Scenario

Scenario script

Scenario-based testing

Scene analysisSchedule(s)

)( Scheduler )(Schedules of transactions

Scheduling

Schema

Schema change statements

Schema construct

Schema evolution

Schema name

Schema-based constraints

Scheme )( Science Activity Planner

(SAP) Scientific rendezvous

Scope Scope of IPSec IPSec

Scoring metric / Scrambling

Script functions

Script(s) )(Scripting language

SCSI (Small ComputerStorage Interface)

SCSI initiator SCSI SCSI targets SCSI Scumware

SDL (Storage DefinitionLanguage)

Seal (v) )( Search path

Search trees

Searches

Second extended filesystem (ext2fs)

Second Normal Form(2NF)

Secondary actor Secondary indexes

Secondary storage

Secondary storage device

Second-chance algorithm

Second-chance page-replacement algorithm

Secret splitting

Secrete disclosure Secrete sharing

Section

Section object

Sector

Sector slipping

Sector sparing

Secure

Secure (v) )( Secure attention sequence

(Control-Alt-Delete)

Secure Hash Algorithm(SHA)

Secure hash functions

Secure hash standard

Secure Socket Layer(SSL)

Security

Page 77: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 77/96

Security access token 72 Sensors

Security access token

Security Associations(SAS)

Security breaches

Security clearance

Security hole

Security ID (SID)

Security ParametersIndex (SPI)

Security referencemonitor

Security subsystem

Security testing Security threats

Seed (n)

Seek time

Segment

Segment base

Segment limit

Segment table

Segment(s) )(Segmentation

Segmentation And

Reassembly (SAR)layer

Segment-replacementalgorithms

Select clause ""Select operation )(Select-from-where block " ...

"...Selection condition

Selective

Selective REJect (SREJ)

Selective cell discard

Selective inheritance

Selective prediction

Selective reject ARQ

Selective survival

Selector )(

Self-activating code

Self-contained Self-contained routine

Self-describing data

Self-documentation Self-Organizing Pro-

cessing and StreamingArchitecture (SOPA)

Self-perpetuating )( Self-regulatory programs

Semantic

Semantic data modeling

Semantic domain Semantic knowledge Semantic networks

Semantic optimization

Semantic queryoptimization

Semantic Web

Semantics

Semaphore ):( Semaphore construct

Semiconductor memory

Semi-decidability

Semi-decidable

Semiformal

Semijoin

Semipermanent VCCs

Semistructured data

Senior engineer Sense key

Sense-code

Sense-code qualifier

Sensing

Sensitivity label

Sensitivity testing Sensor(s) )(

Page 78: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 78/96

Sensorimotor cortex 73 Shielded twisted-pair

Sensorimotor cortex

Sensory filter

Separator

SEQUEL (StructuredEnglish QueryLanguage)

Sequence

Sequence diagrams

Sequence domain Sequence number

Sequence of operation

Sequence range Sequential access

Sequential access devices

Sequential device

Sequential patterns

Sequential specification Serial schedule

Serial schedules

Serializability

Serializable

Serialization graph

Serialization order

series

Server

Server crash and recovery

Server farms

Server Message-Block (SMB)

Server systems

Server-initiated approach

Server-side )( Service Access Point

(SAP)

Service Level Agreement(SLA)

Serviceability Service-oriented

Servlet

Session key

Session layer

Session space

Set operation

Set-at-a-time DML DML Set-at-a-time operations

Set-oriented dml DML Setter injection

Settings

Setup / Setup time

Shadow paging

Shadowing

Shaper

Share Shared )(Shared data )( Shared databases

)(Shared disks )( Shared libraries

Shared locks Shared memory )(Shared repository layer Shared subclass )(Shared subclasses

mappings

Shared variables )(Shared locks

Shareware

Sharing

Shell programming Shell script

Shells )( Shield

Shielded twisted-pair

Page 79: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 79/96

Page 80: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 80/96

Sleeping-barber problem 75 Sound

Sleeping-barber problem

Slide show presentations

Sliding window

Slope overload

Slot fillers

Slots )( Slotted aloha Aloha Slow cortical potential

Slow start

Slowscan

Small Computer StorageInterface (SCSI)

Small-area network

Smart card

Smoothing

SMP (SymmetricMultiprocessor)

SNapshot RefreshProcesses (SNPS)

Snapshots

Sniff (v)

Snowflake

Snowflake schema

SNPS (SNapshot RefreshProcesses)

Sockets )( Soft handoff )( Soft line break

Soft real-time system

)(Softbots

Softswitch

Software agent )( Software architecture )( Software configuration Software configuration

audit Software Configuration

Item (SCI) Software Configuration

Management (SCM)

Software damage Software Engineering

(SE) Software Engineering

Environment (SEE) Software engineering

institute capabilitymaturity model

Software equation Software librarian Software maintenance )( Software Maturity Index

(SMI) Software metrics Software metrics etiquette

Software patent Software procedure

Software ProcessImprovement (SPI)

Software QualityAssurance (SQA)

Software quality factor Software repository Software requirement

specification Software restructuring Software reusability

Software review Software risk Software risk components Software safety )( Software scope )( Software sizing Software system

independence Solid-state disks

Solution space Solvers )( Sombrero

Sophisticated users

Sorted file

Sound (v)

Page 81: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 81/96

Soundness 76 Square brackets

Soundness

Source

Source code

Source file

Source format

Source listing Source quench packet

Source routing

Source/destination / Source/sink / Space / Space complexity

Space division switching

Spam

Spanned organization

Spanned records

Spanning tree

Spare sectors

Sparse

Sparse address space

Sparse files

Sparse indexes

Sparse polynomial Spatial applications

Spatial audio

Spatial databases

Spawn

Special purpose RDBMS DBMS

Specialization

Specialized servers

Special-purposestructured-lightdevices

Specification defect Specification(s) / ):

(

Specificity Spectral efficiency

Spectrum

Speech

Speech played backward

Spendable item Spiders

Spillover

Spindles

Spinlock

Spiral model Split-and-merge

Splitting

Spoofing

Spool

Spooling

Spread sheets

Spread spectrum

Spreader/despreader / )(Spreading code

Spreadsheet

Spurious tuples

Spy catcher

Spy eliminator

Spy sweeper

Spybots

Spying Spyware Spyware bot army

Spywareblaster

SQA plan SQL (Structured Query

Language)

SQL standards andcomponents

SQL

SQL transaction support SQL

Square brackets

Page 82: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 82/96

Page 83: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 83/96

Page 84: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 84/96

Page 85: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 85/96

Swapped 80 Tagged capability system

Swapped Swapped in ) ( Swapped out ) ( Swapping

Swap-space management

Switch(s) )(Switched communication

network

Switched Ethernet LAN

Switched network

Switched VirtualConnection (SVC)

Switching Switching hub

Switching node

Symbol table

Symbol(s) )(Symbolic link

Symetric encryption

Symmetric

Symmetric algorithm Symmetric

MultiProcessing(SMP)

SymmetricMultiProcessor (SMP)

Symmetric replication

Synchronization

Synchronization control Synchronized Multimedia

Integration Language(SMIL)

Synchronizing

Synchronous DigitalHierarchy (SDH)

Synchronous I/O / Synchronous Optical

Network (SONET)

Synchronous paradigm Synchronous transmission

Synchronous writes

Syndrome

Synergetic-energetic

Synonyms

Syntactic analysis

Syntactic domain

Syntactic knowledge Syntax )( Syntax summary

SYSGEN (SystemGENeration)

System analysis System analysts

System call

System code

System complexity System concept document System designers

System global scheduling

System image System link time

System lock tables

System log

System perception )( System programs

System specification System testing System utilities )( System virtual machine

System-development time

System-wide open-file

table

T

Tables dimension

Tag

Tagged capability system

Page 86: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 86/96

Page 87: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 87/96

Page 88: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 88/96

Timestamping 83 Transform mapping

Timestamping / Time-to-live

Timing

TIN (Triangular IrregularNetwork)

TLB (Translation Look-Aside Buffer)

TLB hit ratio TLB TLB miss TLB

TLB reach TLB Token

Token bucket

Token bus

Token passing

Token ring

Tone

Tool Control Language(TCL)

Tool developers / Tools layer Tools Management

Service (TMS) Top-down

Top-down design Top-down design

methodology

Topology / Torus Total Cost of Ownership

(TCO) Total float Total participation

Total QualityManagement (TQM)

/

Total specialization

Touch-sensitive computerscreen

Tournament selection

Trace tapes

Traceability )( Tracks )(

Tractability / Tractable problem

Tractibility / Tradeoff

Tradeoffs

Trade-Related aspects of Intellectual PropertyrightS (TRIPS)

Traffic

Traffic analysis

Traffic conditioning

Traffic contract

Traffic management

Traffic policing

Traffic shaping

Trailer )(Training Training set

Transaction

Transaction center Transaction failures

Transaction file

Transaction flow Transaction rollback

Transaction servers

Transactional application

Transaction-oriented

Transactions processingsystem

Transactionsrecoverability

Transceiver (Transmitter/Receiver) ) / (Transducer

Transfer rate

Transfers Transform center Transform flow Transform mapping

Page 89: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 89/96

Transformation rules 84 Tutorial

Transformation rules

Transformations

Transient objects

Transit center

Transition

Transition (in Transitionstate)

)(

Transition constraints

Translation-LookasideBuffer (TLB)

Transmission ControlProtocol (TCP)

Transmissionimpairments

Transmission media

Transmissive LCDdisplays

LCD Transmitter/receiver / Transparency

Transparent

Transparent link

Transponder / Transport Driver

Interface (TDI)

Transport layer

Transport Layer Security(TLS)

Transport/transmission / Transposition cipher

Trap

Trap door )(Trapdoor one-way

function

Tree structures

Tree topology

Tree-structured directory

Trialability

Triangular IrregularNetwork (TIN)

Triangular routing

Triangulation

Trigger

Triggers granularity

Triple encryption

Triple indirect block ) (

Trivial File TransferProtocol (TFTP)

Trivial MVD

Trojan code

Trojan horse

Trojan(s) )( Troubleshooting

True values

Truncate

Truncated

Truncating a file

Trunk

Trust

Trust Gauge (TG)

Trusted Computer Base(TCB)

Trustworthiness

Trustworthy

Truth values

TSR (Terminate And Stayresident)

TSR program TSR routine

Tuning

Tunnel

Tunnel (v)

Tuple

Tuple-based constraints

Turing machine

Turnaround time

Turnover Turnstiles

Tutorial

Page 90: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 90/96

Twin GUI 85 Union type

Twin GUI

Twisted pair

Two-dimensional datatypes

Two-factor authentication

Two-handed-clock algorithm

Two-level directory

Two-level PSK PSK Two-phase commit

Two-phase lock ) (Two-Phase Locking (2PL)

protocol

Two-phase protocol

Two-phase terminationprotocol

Two-tier client/serverarchitecture

Two-way handshake

Two-way joins

Type constructor

Type hierarchy

Type inheritance

Type verification

Typeahead

Typing surface

Typographicalarrangements

U

UDP (User DatagramProtocol)

)(

UDP sockets UDP

Uiquifier

Umbrella activity Umbrella tasks UML (Universal Modeling

Language)

UML diagrams UML

Unacknowledgedconnectionless service

Unary operations

Unauthorized access

Unauthorized user

Unbalanced transmission

Unbounded-buffer

Unbuffered ) (

Uncertain

Uncertain evidence

Uncertainty

Unconfirmed service

Undeniable signature

Underlying layer

Understandability )(

Undo (T) T

Undo transaction

Undo/redo algorithm / Unicast

Unicity distance

Unidirectional

Unidirectionalassociations

Unification grammar

Unified buffer cache

Unified method Unified Process of

Software Development(UPSD)

Unified virtual memory

Unifier

UNiform Interface toCOmputingREsources(UNICORE)

Uniform Memory Access(UMA)

Uniform NamingConvention (UNC)

Uninformed search

Union compatible

Union operation

Union type

Page 91: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 91/96

Page 92: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 92/96

User File Directory 87 Versioning

User File Directory (UFD) User identifier )( User Interface (ui) User Interface

Development system(UID)

User interface layer User interface toolkit User mobility

) (

User mode

User model User rights

User scenario User threads

User’s model User-based Security

(USM) Model

User-Centered Design(UCD)

User-defined functions

User-defined functionssupport

User-defined object

User-defined signalhandler function

User-friendly

User-friendly interfaces

User-friendly interpreter

User-level threads

User-to-Network Interface (UNI)

User-to-user application

Utility/Utilities )( Utilization

Utterance

V

Valid

Valid

Valid state

Valid/Invalid bit

Validation

Validation queries

Validation set

Validation techniques

Validation testing Validator token

Validity

Value analysis Value sets of attributes

Value-added network

Variability )( Variable-length records

Variables

Variance

VCAB index array VACB

VCR (VideoCassetteRecorder)

VDL (View DefinitionLanguage)

Vector ):(Velocity of propagation

Vendor

Venn diagrams

Verifiability )(

VerificationVerification algorithm

Verification equation Verifier

Version

Version control )( Version graph

Versioning

Page 93: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 93/96

Versions 88 Visualizer

Versions

Vertical fragmentation )(Vertical propagation

Very high data rateDigital SubscriberLine (VDSL)

Very Small ApertureTerminal (VSAT)

Very-Large-Scale-Integration (VLSI)

Vestigial Side Band (VSB)

Veterans VFS (Virtual File System)

Viable

Victim

Victim frame

Video

Video broadcastingsoftware

Video clip

Video controllers

Video sources

Video Surveillance andMonitoring (VSAM)Program

Videoconferencing

View

View Definition Language(VDL)

View integrationapproach

View materialization

View serializable

Views )( Violated constraints

Violations

Virtual channel

Virtual ChannelConnection (VCC)

Virtual Channel Identifier(VCI)

Virtual ChannelSwitching Function(VC-SW)

Virtual circuit

Virtual data

Virtual disk

Virtual LAN

Virtual Machine Monitor(VMM)

Virtual Machines (VM)

Virtual memory

Virtual Memory (VM)manager

Virtual memory paging

Virtual path

Virtual Path Connection

(VPC)Virtual Path Identifier

(VPI)

Virtual Path SwitchingFunction VP-SW

Virtual Private Network (VPN)

Virtual Reality ModelingLanguage (VRML)

Virtual relations

Virtual Storage AccessMethod (VSAM)

Virtual tablesVirtual-Address Control

Block (VACB)

Virtual-address space

Virtualization

Visibility

Vision Enabled Robotics(VER)

Vision-based action games

Vision-based interfaces

Visual cues )(

Visual elements

Visualization

Visualizer

Page 94: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 94/96

Page 95: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 95/96

Page 96: IT_Glossary-  مسرد مصطلحات المعلوماتية

7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية

http://slidepdf.com/reader/full/itglossary- 96/96

S YRIAN C OMPUTER S OCIETY

. 5800

2000.

. 2000

: – )(

)( .

.

.

) 10 20(

.

– –

.