it_glossary- مسرد مصطلحات المعلوماتية
Post on 04-Apr-2018
225 Views
Preview:
TRANSCRIPT
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 1/96
–
G LOSSARY OF I NFORMATION T ECHNOLOGY
T ERMS
.
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 2/96
:
– –
..33492
:3736156-2137204-2137205
:3737558-2137202
:nzhafez@scs-net.org
2007
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 3/96
. : .
2000 7000
30. ""
.
.
. . 2000
).(
.
.
.
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 4/96
. :
- 10)2001( 20--)
2006(
- – : )2001()2002(
-)2004(
- : )2005( )2007(
-)2006(
- : )2006(
- )(
.
.
..
(index)
.
.
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 5/96
.
5800 .
.
. .
.
.
.
. .
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 6/96
–
1(2)-Queue model )(
1:N Relationship type 1:N)1 N( 100BaseT Ethernet 100BaseT 10BaseT Ethernet 10BaseT 1-Persistent CSMA CSMA
3D Segmentation3D Torus
AAbort
Abort (T) T
Aborted
Above node
Absolute address
Absolute code
Absolute loader )( Abstract operation
Abstract Syntax NotationOne (ASN.l)
1
Abstraction
Abstraction concepts
Acceptance test Access bracket
Access control )( Access control policies
Access latency
Access method
Access permission
Access Point (AP)
Access protection
Access rate
Access rights
Access token
Access violation
Access-control list
Accessibility Accidental breaches
Accreditation
Accumulators )( Accuracy Achievability )( ACID: Atomicity,
Consistency, Isolation,Durability
ACID:
Acknowledgedconnectionless service
Acknowledgement
ACL (Access-ControlList)
Acoustic
Acronyms
Actigram Action
Action item checklist
Action partAction path Activate command
Activation
Activation diagrams
Active /
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 7/96
Active attack 2 Agile software process
Active attack / ):(
Active database systems
)(
Active Directory )( Active process
Active sensing
Active state
Active/passive / Activists
Activity diagrams )(Activity-chart Actor
):( Actuator
Acyclic
Acyclic graphs
Acyclic-graph
Acyclic-graph directory
Ad hoc network
Ad hoc networking ] [
Adaptability )( Adaptable
Adaptive Brain Interfaces(ABI)
)(
Adaptive maintenance Adaptive mutexes
Adaptive routing
Adaptive-chosen-plaintextattack
Ad–aware
Added-digit framing
Addition (+) operator
Add-on help facility Address class
Address learning
Address mask
Address ResolutionProtocol (ARP)
Address WindowingExtension (AWE)
Addressed
Addressing
Addressing level
Addressing scope
Address-translationhardware
Ad-hoc querying
Adjacent faulting
Adjacent pages
Adjudicated protocol
Admissibility
Advanced EncryptionStandard (AES)
Advanced mobile phoneservices (amps)
Advanced replication
Advisories Adware
AES (AdvancedEncryption Standards)
Agent / Agent oriented
Agent-Based intra- andinter-organizational e-commerce
Agent-Object-Relationship MarkupLanguage
Aggregate functions )(Aggregate peak demand
Aggregation
Agile softwaredevelopment
Agile SoftwareEngineeringEnvironment (ASEE)
Agile software process
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 8/96
Aging 3 Aperiodic signal
Aging
Aging software plants Agreement
Air gap
Alarm clock
Alertable
Algebraic structure
Alias
Aliases
Align (v) / Aligned Alignment
All-key relations" "
Allocate (v)
Allocation
Allocation proportional
All-or- nothing disclosureof secrets
All-or-nothing rule
Alpha testing Alpha-beta procedure -Alternate
Alternate fields
Alternate Mark Inversion(AMI)
Alternate routing
Alternative search
Ambiguity
Ambiguous )( American National
Standards Institute
(ANSI)American Standard Code
For InformationInterchange (ASCII)
Amplifiers attacks
Amplitude
Amplitude Modulation(AM)
Amplitude Shift Keying(ASK)
Analog
Analog carrier system
Analog signals
Analogical representation
Analytic evaluation
Analytic modeling
AND operator AND
Angle modulation
Angle of incidence
Angle of refraction
Animation
Animator )( Animatronic automation
Annealing
Annotation
Annotations
Anomalies
Anomalies deletion
Anomalies insertion
Anomalies modification
Anomalies update
Anomaly-detection system
Anonymity
Anonymizers
Anonymous access
Anonymous FTP FTP Anonymous key
distribution
Anonymous message
broadcastAntecedent
Antenna(s) )(Antibugging Antispy
Anti-spyware
Anycast
Aperiodic signal
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 9/96
API 4 Associative registers
API (ApplicationProgrammerInterface)
Appending
Appendix
AppletsAppliances Application architecture Application Binary
Interface (ABI)
Application binaryinterface (ABI)
Application developmentenvironments
Application layer(three-tier client-server architecture)
) / (
Application programmers
Application ProgrammingInterface (API)
Application programs
Application servers
Application-basedconstraints
Approximate (adj)
Approximate (v)
Approximate reasoning Approximation
Apriori algorithm
Arbitrary / / Arbitrated loop
Arbitrated protocol Arbitrator
Arc
Architectural DescriptionLanguage (ADL)
Architectural design )( Architectural view Architecture
Architecture ContextDiagram (ACD)
Architecture FlowDiagram (AFD)
Architecture template
Architectures for DBMS DBMS Archived tapes
Areal density
Argument vector )(
Argument(s) )(ARIES recovery
algorithmARIES
Arithmetic operators
Armstrong's inferencerules
Arrays )( Arrow notation
Artifact ):( Artificial Intelligence
Markup Language As a whole
ASID (Address SpaceIDentifier)
ASN.l (Abstract SyntaxNotation One)
1
Aspect-OrientedProgramming (AOP)
Assemble (v) packets
Assembler )( Assembly
Assembly language
Assembly time
Assertions
Assets Assignment
Assignment edge
Associated mode signaling
Association autonomy
Association rules
Association rules amonghierarchies
Association(s) )(Associations aggregation
Associative data object Associative memory
Associative registers
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 10/96
Assumptions 5 Automatic voice recognition
Assumptions
Asymmetric clustering
Asymmetric DigitalSubscriber Lines(ADSL)
Asymmetricmultiprocessing
Asynchronous BalancedMode (ABM)
Asynchronouscancellation
Asynchronous I/O / Asynchronous Procedure
Calls (APCs)
Asynchronous ResponseMode (ARM)
Asynchronous Transfer
Mode (ATM)Asynchronous writes
ATM (AsynchronousTransfer Mode)
ATM Adaptation Layer(AAL)
ATM
ATM service categories ATM
Atmosphere
Atom
Atomic
Atomic attributes
Atomic literals
Atomic module Atomic objects
Atomic transactions
Atomic value
Atomically ][
Atomicity
Atoms
Attenuation
Attenuation distortion
Attribute inheritance
Attribute(s) )(
Attribute-basedpartitioning
Attribute-definedspecialization
Attributes of relationshiptypes
Audibility )( Audio
Audit Audit checks
Auditing
Auditor Audits
Audit-trail processing
Augmented eke
Augmented reality
Augmented TransitionNetwork (ATN)
Augmented vector
Authentic
Authenticated access
Authentication ) (Authentication package
Authenticator
Authoring systems
Authoring tools
Authorization
Authorization identifier
Authorization subsystem
Auto correlation
Autodecrement
Autoincrement
Automated FormProcessing
Automatic buffering
Automatic job sequencing
Automatic RepeatRequest (ARQ)
Automatic voicerecognition
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 11/96
Automatic working-set trimming 6 Base register
Automatic working-settrimming
Automount
Autonomous system
Auxiliary access structure
Auxiliary data structure
Availability / Available bit rate (abr)
Avalanche criteria
Avalanche effect
Avatars
Averaging
Awakened
Axiom
BB+-trees +B
Bachman diagrams Bachman
Backbone
Backbone network
Backdoors
Back-end network Back-ends
Backflushing
Background Background process
Backing store
Backing store
Backing up
Backjumping
Backlog
Backoff
Back-office application
Back-office applications
Back-office servers
Backpressure
Backpropagation
Back-to-back testing Backtracking / Backup / Backup and recovery
systems
Backup engineer )( Backup processor
Backward
Backward chaining
Backward channel
Backward congestionsignaling
Backward ExplicitCongestionNotification (BECN)
Backward learning
Backward protocol
Backward tracking Bad (page state)
Bad blocks
Bakery algorithm
Balanced transmission
BAN logic (BAN)
Bandpass filter
Bandpass signal
Bandwidth
Bandwidth efficiency
Bang metric Banker
Banker's algorithm
Barcode Bare hardware
Bare-machine
Barriers
Base address
Base class
Base file record
Base priority
Base register
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 12/96
Base Station 7 Bit map
Base Station (BS)
Base tables
Baseband bus
Baseline
Basic file organizations
Basic file system
Basic rate
Basic replication
Basic service set (bss)
Basis path testing Basis set Batch ):(Batch application Batch operating system
Batch systems
Batch version
Bathtub curve Beam
Behavior inheritance
Behavioral modeling Belief network
Below node
Berkeley SoftwareDistribution (BSD)
Berkeley SourceDistribution (BSD)
Best affine approximationattack
Best effort service
Best fit
Beta testing
Bias
Biased protocol
Bibliography
Bidirectional
Bidirectional associations
Big endian
Billing
Binaries Binary
Binary associations
Binary bit
Binary decompositions
Binary exponentialbackoff
Binary Large OBjects(BLOBs)
Binary locks
Binary notation
Binary optimizers
Binary Phase Shift Keying(BPSK)
Binary program image
Binary relationaloperations
Binary relationship
Binary search
Binary semaphore
Binary-object format
Bind operation
Binding ): (Binding acknowledgment
Binding update
Bioinformatics
Biological sciences andgenetics
Biomedical signalprocessing
Biometrics )( Biphase
Bipolar
Bipolar with 8-ZerosSubstitution (B8ZS)
8
Birthday attack
Birthday paradox
Bit commitment
Bit Error Rate (BER)
Bit map
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 13/96
Bit oriented protocol 8 Boundary node
Bit oriented protocol
Bit stream
Bit stuffing
Bit vector
Bit/byte-interleaving / Bit-interleaved parity
organization
Bit-level data striping
Bit-level striping
Bitmap indexing
Bit-string data types
Black-box specification
Black-box testing Blade
Blind carbon copy
Blind signature
Blind unanticipatedsignature
Blinding factor
Blob
BLOBs (Binary LargeObjects)
Bloc code
Bloc diagram
Bloc interleaver
Block / Block algorithm
Block buffer cache Block cipher
Block device
Block groups
Block I/O / Block interface Block replay
Block Transfer Time(BTT)
Blocked
Blockers
Blocking
Blocking
Blocking factor
Blocking protocol
Blocking send
Blocking system call
Block-interleaveddistributed parity
Block-interleaved parityorganization
Block-level striping
Block-oriented device
Blueprints
Blum integer (Blum) Blurring
Bodies )( Boilerplate code "" Book keeping
Boolean data types
Boolean type attributes
Boot block
Boot control block
Boot space
Booting the system
Bootstrap loader )( Bootstrap program
Bootstrapping / Border Gateway Protocol
(BGP)
Bottleneck
Bottomless data sink
Bottom-up
Bottom-up conceptualsynthesis
Bottom-up designmethodology
Bottom-up testing Boundary following
Boundary node
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 14/96
Boundary Value Analysis 9 Business function
Boundary Value Analysis(BVA)
Bounded waiting
Bounded-buffer
Box diagram Box structure box structure specification Boyce-Codd Normal Form
(BCNF)Boyce-Codd
Braces
Braided shield
Brain computer interfaces(BCI)
)(
Branch & bound (v)
Branch and RelationalOperator testing(BRO)
Branch testing Breaches ):( Breadth of testing Break point Break-in
Break-ins
Breakthrough product Bridge(s) )(Bridged LAN
Bridging
Brightness
Broadcast ][Browser changers
Browser hijackers
Browser plug-ins
Brute force )( Brute force attack
B-trees B
BTT (Block TransferTime)
)BTT(
Bubble chart Bucket
Buddy-heap algorithm
Budget Budget shortfalls )(Buffer ):(
Buffer caching system Buffer manager modules
Buffer overruns Buffer pool
Buffer space
Buffer storage
Buffered in the cache ) (
Buffered through... ...
Buffering
Buffering modules
Buffering of blocks
Buffering systems ) (
Buffers )( Bug ]) [:( Bug-tracking
Built in reaction
Bulk encryption
Bulk of
Bulk transfer rates
Bulletin boards Bullet-point lists
Bundleware
Burst
Burst tolerance
Burstiness
Bus(es) )(Business / Business Area Analysis
(BAA) Business function
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 15/96
Business process 10 Canonical
Business process
Business ProcessExecution LanguageFor Web Services(BPEL4WS or BPEL)
Business Process
Modeling Language(BPML)
Business ProcessReengineering (BPR)
Business risk Business Rules Markup
Language
Business System Design(BSD)
Business TransactionProtocol (BTP)
Business-driven Business-level data model
Business-level datamodeling
Business-to-Business (B2B)
Bus-mastering I/O boards /
Busy loop
Busy signal
Busy tone
Busy waiting
Busy-hour
By convention
By copy
By default
By reference
Bypass relay
Bypass state
Byte
Bytecode
Byzantine generalsproblem
C
C++ language binding ++C
Cable modem
Cable TV/cable television
Cables )( Cabling / Cache ):( Cache coherency
Cache lines
Cache memory
Cached I/O / Cachefs (cache file
system)
Cache-manager
Cache-writer thread
Caching
Caching of disk blocks
Calculus
Calibration
Call
Call Acceptance (CA)
Call Language Interface(CLI)
Call request (CR)
Call semantics
Callback )( )( Callback mechanism
Callbacks
Campus
Cancellation points
Candidate keys
Canned transactions
Canonical
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 16/96
Capabilities 11 Chaining variables
Capabilities
Capability list
Capability MaturityModel (CMM)
Capability possession
Capture/playback / Cardinality ratio
Care Of Address (COA)
Carrier
Carrier Sense MultipleAccess (CSMA)
Carrier Sense MultipleAccess With CollisionDetection (CSMA/CD)
Carrier Sense with
Multiple Access(CSMA)
Cartesian product
Cartesian productoperation
Cartridges )( Cascade (n) / Cascade-caused failure
Cascading mounts
Cascading rollback
Cascading rollbacks
Cascading Style Sheets(CSS)
Cascading termination
CASE (Computer-Assisted SoftwareEngineering)
Case repository
Case-Based MarkupLanguage
Case-based reasoning
Casual end users
Casualty system Catalog )(
Category-basedpartitioning
Causal network
Caveats
CCITT (Comité
Consultatif Internationale deTélégraphie etTéléphonie)
CD jukebox
CD-ROM
Ceiling function
Cell
Cell clumping
Cell Delay Variation(CDV)
Cell Delay VariationTolerance (CDVT)
Cell delineation
Cell Loss Priority (CLP)
Cell Loss Ratio (CLR)
Cell relay
Cell sectoring
Cell splitting
Cellular
Cellular automaton
Cellular IP (CIP) ][IP Cellular networks
Center frequency
Centralized DBMS DBMS
Centralized schema designapproach
Certificate authority
Certification Certification Authority
(CA)
Certification path
Certified mail
Chained-overflow hashtable
Chaining
Chaining variables
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 17/96
Chalkboard 12 Cleanroom software engineering
Chalkboard )( Change Cipher Spec
Protocol (CCSP)
Change control )(
Change Control Authority(CCA)
Change report Change request Channel capacity
Channel(s) )(Chaos model Character buffering
system Character device
Character devices
Character stream I/O / Characteristics
Character-stream device
Character-string datatype
Check bits
Checklist Checkpoints / Checksum / Chief programmer team Child nodes
Child process
Children processes
Chinese remaindertheorem
Chip
Chip(s)/Chipping code / )(Chi-square test
Chock packet
Chosen ciphertext attack
Chosen key attack
Chosen plaintext attack
Chronic
Chronologicalbacktracking
CIFS (Common InternetFile System)
Cigarette-smokersproblem
Cipher
Cipher Block Chaining(CBC)
Cipher Block ChainingMode (CBC)
Cipher Feedback Mode(CFB)
Cipher text stealing
Ciphertext
Ciphertext only attack
Circuit
Circuit emulation
Circuit switching
Circular Scan (C-SCAN)
Circular wait
Circumscription
CK metrics suite CK )Chidamber
Kemerer ( Claim edge
Class diagrams
Class hierarchy Class libraries
Class loader
Class properties
Class testing Class verifier
Class/subclassrelationships
Classification
Classifier
Classifier system
Class-Responsibility-Collaborator (CRC)modeling
--
Clause
Clean semantics
Cleanroom softwareengineering
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 18/96
Cleanup operation 13 Collision
Cleanup operation
Clear box CLI (Call Language
Interface)
CLI (Call Level Interface)
Client
Client computers
Client machines
Client modules
Client programs
Client systems
Client/Server (C/S) / Client/server architecture /
Client/server DBMS DBMS / Client-initiated approach
Client-server model - Client-side
Client-side caching
Client-side memorycaching
Clinical diagnoses Clipboard
C-lists
Clock
Clocking
C-look (Circular-Look)Scheduling
Closed paradigm Closed world assumption
Closed-source software Cluster remapping
Cluster testing )( Cluster(s) )( Clustered page table
Clustered systems )( Clustering
Coaxial cable
Cochannels
COCOMO (COnstructiveCOst MOdel) model
COCOMO)(
Code book
Code Division MultipleAccess (CDMA)
Code generation Code generator Code restructuring Code segments
Code(s) )(Codec ) / (Codesigned Virtual
Machines
Codevelopers
Codeword
Cognitive
Cognitive ModelingLanguage (CML)
)( Cognitive structure
Cohesion (s) )( Cohesive conceptual
module Cohesiveness Coin
Coin flipping
Coincidence
Coincidentally cohesive Collaboration Collaboration diagrams
Collaborative filtering
Collaborative UsabilityInspection (CUI)
Collaborator Collection data types
Collection interface
Collection literals
Collection objects
Collective filtering
Collision
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 19/96
Collision detection 14 Compile-time checking
Collision detection
Collision resistance Collision resolution
Collision-resistant hashfunction
)(
Combination / Combination generator Combinatorial
specification Combinatorics
Combined scheme
Combined signal
Combining function
Command
Command
Command interpreter
Command language Command macro facility Command ready
Command-line interpreter
Command-orientedinterfaces
Commercial DataMasking Facility(CDMF)
Commit (T) T
Commit (v, n)
Commit point
Commit point of transaction
Commit protocol
Committed
Committed burst size
Committed InformationRate (CIR)
Committed state
Common bus
Common channelsignaling
Common coupling
Common LanguageInterface (CLI)
Common LanguageRuntime (CLR)
Common memory Common Object Request
Broker Architecture(CORBA)
Common PartConvergence Sublayer(CPCS)
Common ProcessFramework (CPF)
Common sense knowledge
Commonsense reasoning Communication
autonomy
Communicationcommonality
Communication link
Communication model
Communication networks
Communication variables
Communicationalcohesion
Communications software
Community Antenna
TeleVision (CATV)Community source
Commutative operations
Compact Disk (CD)
Compaction
Compand (abbreviation of compress-expand)
): – (
Compander (seeCompand)
)(
Comparison testing
Compartmentalization Compatibility
Compatibility testing Compatible Time-Sharing
System (CTSS)
Compile time
Compiler(s) )( Compile-time checking
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 20/96
Complement 15 Concurrent Version System
Complement
Complementary CodeKeying (CCK)
Complementation
Complete (T) T
Complete horizontalfragmentation
Completeness Completeness constraints
Complex attributes
Complexity
Complexity theory
Complexity weighting Compliant cell
Component assemblymodel
Component diagrams
Component object model Component software Component-based
development Component-Based
Development AndIntegration (CBDI)
Component-BasedSoftware Architecture(CBSA)
Componentization Components )( Composability )( Composite attributes
Composite data Composite information Composite keys
Composite object Compression
Compression permutation
Compromise
Computation migration
Computation speedup
Compute-bound thread
Computer Aided SoftwareEngineering (CASE)
Computer communication
Computer networks
Computer system
Computer vision
Computer vision Computer-Aided Design
(CAD) Computer-Aided
Engineering (CAE) Computer–aided
prototyping
Computer-AssistedSoftware Engineering(CASE)
Computer-based system Computer-generated
slides
Computer-SupportedCooperative Work (CSCW)
Compute-server systems
Concentrator
Concept developmentproject
Concept scooping
Conceptual data models
Conceptual databasedesign
Conceptual design )(Conceptual representation
Conceptual schema
Conceptualization
Conciseness/Concision Concurrency control
Concurrent
Concurrent access
Concurrent engineering
Concurrent execution
Concurrent processes
Concurrent processing
Concurrent VersionSystem (CVS)
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 21/96
Concurrently 16 Conservative timestamp-ordering scheme
Concurrently / Condition construct
Condition part
Condition testing
Condition type
Condition variables
Conditional critical region Conditional independence
Conditional probability
Conditional ProbabilityTable (CPT)
Conditional-waitconstruct
Condition-defined
subclassesConditions
Conduit(s) )(Confidence
Confidentiality Configurability Configuration
Configuration auditing Configuration
managementConfiguration manager Configuration object Configuration review Configuration Status
Reporting (CSR) Configuration testing Confinement
Confirmation
Confirmation primitive
Confirmed service
Conflict equivalent
Conflict phase
Conflict resolution
Conflict serializability
Conflict serializable
Conflicting operations
Confusion
Congestion
Congestion avoidance
Congestion control
Congestion recovery
Congruence
Conjunct
Conjunction
Conjunctive Normal Form(CNF)
Connecting fields
Connection AdmissionControl (CAC)
Connection disconnection )(Connection establishment / Connection integer
Connection matrix Connection objects
Connection ports
Connection records
Connection setup )(Connection(s) /
) / ( Connectionless
Connectionlessinternetworking
Connectionless message
Connectionless socket
Connection-mode service
Connection-oriented
Connection-orientedsockets
Connection-port object
Connections to databases
Connector(s) )(Consecutives
Consequent
Conservative timestamp-ordering scheme
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 22/96
Consistency 17 Conversion tools
Consistency Consistency checker
Consistency checking
Consistency maintenanceof polymorphicknowledgerepresentations
Consistency semantics
Consistent / Console ):( Consortium
Consortium Of Anti-Spyware Technology(COAST)
)(
Constant Angular
Velocity (CAV)Constant Bit Rate (CBR)
Constraint propagation
Constraint satisfactionproblem
Constraint specificationlanguage
Constraint(s) )( Constraints as assertions
Constraints on extents
Construct (n)Constructive method
Constructive specification Constructor injection
Consumer
Container object
Content Content coupling Content Management
System (CMS) Contention
Content-managementsystems
Context Context awareness
Context free question Context model
Context sensitive
Context switching Context units
Context-switching
Contextual Design (CD)
Contextual Inquiry (CI) Contiguous allocation
Contiguous memoryallocation
Contiguous pages
Contingency planning Contour
Contributions
Control coupling Control dimension Control flow Control Flow Diagram
(CFD) Control hierarchy Control process
Control program
Control signaling
Control Specification(CSPEC)
Control StructureDiagram (CSD)
Control structure testing Control thread
Control vector
Control-card interpreter
Controllability )( Controlled access
Controlled indexingvocabulary
Controlled redundancy / Convenience
Convergence Sublayer(CS)
Conversion routines
Conversion tools
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 23/96
Conveyor 18 Cross product operation
Conveyor Convolution
Convolutional encoder
Cooperating processes
Coordinating CommitteeFor MultilateralExport Security(COCOM)
Coordination
Copy semantics
Copy-on-reference
Copy-on-write
Copyright
Core
Core developers
Core map (cmap)
Core memories
Core product Corrective action
Corrective maintenance Correctness Correctness verification
Correlated nested queries
Correlation / Correlation attack
Correlation immunity
Correspondence problem
Cost of quality Cost-based queries
Cost-based queryoptimization
Cost-benefit analysis - Cost-oriented Count
Count function
Counting
Counting semaphore
Coupling / Course Cover channel
Covert channels
CPU (Central ProcessingUnit)
CPU burst
CPU scheduler
CPU utilization
CPU-bound process
Crawlers
Create assertionstatements
Credential
Credentials
Credibility
Credit
Credit allocation
Credit card
Credit-based
Creeping
Crisis management
Crispness
Criterion(criteria) )(Critical
Critical module Critical path Critical Path Method
(CPM) Critical region
Critical section
Critical Success Factor(CSF)
Critical-region construct
Cross Compiler
Cross correlation
Cross point
Cross product )(Cross product operation )(
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 24/96
Cross validation 19 Data flow analysis
Cross validation
Crossbar switch
Cross-departmentalconflicts
Cross-platform
Crosstalk
Crosstalk interference
Cryptanalysis
Cryptanalyst
Cryptographer )( Cryptographic
architecture
Cryptographic mode
Cryptography
Cryptology
Cryptosystem
Current directory
Current state )(Curse of dimensionality
Cursors
Customer voice table Customerization
Customizable
Customize (to)
Cut and choose
Cut-off
Cut-through switching
Cyber - )(
Cybergloves
Cybersurveillance
Cycle stealing
Cyclic Redundancy Check (CRC)
Cyclomatic complexity Cylinder block Cylinder group(s) )( Cylinders
D
DAC (DiscretionaryAccess Control)
Daemon process
Daemons )( Daisy chain
Damaged
DAML (DARPA AgentMarkup Language)
DARPA
Dangling tuples
DARPA Agent MarkupLanguage (DAML)
DARPA
Data access
Data architect
Data architecture Data Base Administrator
(DBA)
Data blade modules
Data circuit-terminatingequipment
-
Data commonality
Data communication
Data CommunicationEquipment (DCE)
Data communicationnetworking
Data complexity Data consistency
Data coupling
Data Definition Language(DDL)
Data design )(
Data dictionary )( Data dictionary systems
Data dimension Data elements
Data Encryption Standard(DES)
Data flow analysis
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 25/96
Data Flow Diagram 20 DDBMS
Data Flow Diagram(DFD)
Data flow graph Data flow testing Data fork
Data fragmentation
Data independence
Data insertion
Data invariant Data Link Connection
Identifier (DLCI)
Data link control
Data link layer
Data localization
Data managementrequirements of GIS
Data ManipulationLanguage (DML)
Data marts
Data migration
Data mining
Data model
Data model mapping
Data modeling
Data name rationalization Data networks
Data object Data object type
hierarchy Data operations
Data pointers
Data reception
Data recordstandardization
Data removal
Data replication
Data repository system
Data restructuring Data section
Data segment
Data servers
Data sources
Data striping
Data Structured SystemDevelopment (DSSD)
Data sublanguage
Data Terminal Equipment(DTE)
Data transfer rate Data transparency
Data types
Data warehouses
Data warehousing system
DataBase Administrator
(DBA)Database application life
cycle
Database programminglanguages
Database schema
Database serversconnections
Database tuning
Database utilities
Data-based web pages
Data-driven
Data-driven design
Datagram
Datagram lifetime
Data-in
Datalog notation ""datalog
Data-out
DBA (DataBaseAdministrator)
DBMS classification DBMS
DBMS componentmodules
DBMS
DC component )(DDBMS (Distributed
DBMS)DBMS
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 26/96
DDL 21 Deletion anomalies
DDL (Data DefinitionLanguage)
De facto standard Deadline Deadlock
Deadlock avoidance
Deadlock detection
Deadlock prevention
Deadlock recovery Debit-credit transactions
Debugger )( Debugging )( Decapsulation
Decibel
Decidability
Decipher (v)
Deciphering
Decision lists
Decision table Decision tree Decision-Support Systems
(DSS)
Decision-tree induction
Declarative assertions
Declarative expressions
Decoder
Decommit
Decomposability )( Decomposable )(Decomposition
Decrypt (v)Decryption
Dedicated device
Dedicated machine
Dedicated token ring
Deduction
Deduction rules
Deductive
Deductive databasesystems
Deep computing capacityon demand
Default
Default context
Default logic
Default signal handler
Default/by default / Defect Defect amplification
model Defect per KLOC
Defect Removal Efficiency(DRE)
Defective software
Defects
Defense AdvancedResearch ProjectsAgency (DARPA)
Deferred cancellation
Deferred updatetechniques
Defined classes
Defined classification
Defined data model
Definition phase Definition-use chain - Definition-use test
adequacy criterion-
Defragmentation
Defunct Degree of homogeneity
Degree of local autonomy
Degree of relation )( Degree of rigor Delay
Delay distortion
Delayed-write policy Deletion anomalies
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 27/96
Deletion marker 22 Diagrammatic notation
Deletion marker
Deletion operation
Deliberate
Deliverable ):(
Delivery / Delta Modulation (DM)
DEM (Digital ElevationModel)
Demand paging
Demand replication
Demand segmentation
Demand-assignmentmultiple access
Demand-zero memory
DeMilitarized Zone(DMZ)
Demodulator
Demultiplexer
Denial of service
Denial-Of-Service (DOS)attack
Denormalization
Denotation
Dense indexes
Dense multiplexing
Dense polynomial
Dependencies
Dependency Dependency injection
Dependency-directedbacktracking
Dependency-preservation
Dependent class Deployment diagrams
Depth of testing Derived tables
DES (Data EncryptionStandard)
Description records
Descriptors
Design autonomy
Design For Reuse (DFR) Design methodology
Design model )( Design postprocessing Design specification Design Structure Quality
Index (DSQI) Designated confirmer
signature
Desktop
Desktop file
Desktop systems
Destination )( Destination unreachable
Destroying information
Destroying keys
Detachable disk
Detecting encryption
Deterministic
Deterministic modeling
Development kernel Development phase / Development roadmap
Deviation
Device attachment point
Device controllers
Device directory
Device driver
Device queueDevice(s) )(Device-service time
Device-status table
DFS (Distributed FileSystem)
Diagnostic
Diagrammatic notation
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 28/96
Dial tone 23 Discrete
Dial tone
Dialers
Dial-up
Dial-up lines
Dictionary
Dictionary attack
Didactical content
Differed Procedure Call(DPC)
Differential
Differential cryptanalysis
Differentiated Services(DS)
Diffraction
Diffusion
Digital
Digital carrier system
Digital cash, digital money
Digital Elevation Model(DEM)
Digital era
Digital European CordlessTelecommunications(DECT)
Digital Linear Tapes(DLTs)
Digital signal
Digital signature
Digital signaturealgorithm
Digital SignatureAlgorithm (DSA)
Digital SignatureStandard (DSS)
Digital Subscriber Line
(DSL)Digital Terrain Modeling
(DTM)
Digital thermometer
Digitization
Digitizer
Digitizer tablet
Dimension tables
Dimensional Data Marts(DDMS)
Dimensionality
Dining-philosophersproblem
Diode Direct access
Direct blocks
Direct Broadcast Satellite(DBS)
Direct reference
Direct Sequence SpreadSpectrum (DSSS)
Directed acyclic graph
Directed graph
Directed graphs
Directional antenna
Directional readingproperties
Directory
Directory structure
Directory(s) )(Directrix
Dirty
Dirty bit
Disable interruption )( Disambiguate
Disassemble (v) packets
Disassociated modesignaling
Discard (v) / Discard Eligibility (DE)
Disclaiming statements
Disclosure
Discovery of patterns intime series
Discovery of sequentialpatterns
Discrepancies
Discrete
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 29/96
Discrete logarithm 24 Distributed systems
Discrete logarithm
Discrete mathematics Discrete multitone
Discretionary access
Discretionary AccessControl (DAC)
Discretionary protection
Discriminating attribute
Discriminating attributes
Discriminator
Disinfect (v)
Disjointness
Disjointness constraint
Disjunct
Disjunction
Disjunctive Normal Form(DNF)
Disk arm
Disk attachment
Disk blocks
Disk cache
Disk controllers
Disk drives )(Disk formatting
Disk I/Os /
Disk mirroring
Disk pack )(
Disk platter
Disk read-ahead ) (
Disk space allocation
Disk storage
Disk stripping
Disk transfer Diskless
Diskless workstations
Disks cylinders
Disks initialization
Disks tracks )(Disparity control
Dispatch (to -) a thread
Dispatch branch Dispatch interrupt
Dispatch latency
Dispatch table
Dispatcher Dispatcher object
Dispatcher objects
Display
Disruption
Distance-vector routing
Distinct data types
Distortion / Distributed applications
Distributed ControlSystem (DCS)
Distributed coordination
Distributed CoordinationFunction (DCF)
Distributed databasesystems
Distributed DBMS(DDBMS)
DBMS
Distributed Denial-of-Service (DDoS) attack
Distributed FoundationWireless MAC(DFWMAC)
MAC
Distributed informationsystems
Distributed InteractiveVirtual Environment(DIVE)
Distributed lock manager
Distributed namingscheme
Distributed namingservices
Distributed routing
Distributed systems
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 30/96
Distributed warehouse 25 Dual-booted
Distributed warehouse
Distribution System (DS)
Distribution transparency
Distribution-drivensimulation
Distributions
Divide & conquer
Division operation
DMA (Direct MemoryAccess)
DMA controller
DMA DML (Data Manipulation
Language)
DNS (Domain NameSystem)
Document markup
Document restructuring Document type
declarations
Documents headers
Document-TypeDefinition (DTD)
Do-it-yourself computing ""Domain analysis
Domain calculus
Domain characteristic Domain engineering Domain Name System
(DNS)
Domain of attributes
Domain of knowledge
Domain testing Domain tree
Domain-Key NormalForms (DKNF)
Domains constraints
Domains of attributes
Domain-specific thesaurus Dot notation )(Dot product / Dotted decimal notation
Double buffering )(Double caching
Double encryption Double indirect block
Double Side BandSuppressed Carrier(DSBSC)
Double Side BandTransmitted Carrier(DSBTC)
Double-indirect block Double-sided disks
Doubling
Down time
Downlink
Download (v)
Downsizing
Downstream
Down-translation
Downward closureproperty
Downward multiplexing
Dozing
Drill-down
Drill-down display
Drill-up
Drive-by download )( Driver end
Driver manager )(Driver manager class
Drives )( Dropper
Drum
D-separation
DSS (Decision-SupportSystems)
DTD (Document TypeDefinition)
DTM (Digital TerrainModeling)
Dual-booted
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 31/96
Dual-mode operation 26 Electroencephalogram
Dual-mode operation
Dummy-variable
Dump
Duplex set
Duplex transmission ][Duplicate
Duplicate elimination )(Durative
DVD
DVMA (Direct Virtual-Memory Access)
Dynamic backtracking
Dynamic binarytranslators
Dynamic component Dynamic decision network
Dynamic file
Dynamic file expansion
Dynamic Host-ConfigurationProtocol (DCHP)
Dynamic Link Library(DLL)
Dynamic linking
Dynamic model Dynamic routing
Dynamic storageallocation
E
Earlier
Early detection
Early token release
Ease-of-use
Eavesdrop (v)
Eavesdropper
Eavesdropping
ECA model ECA
ECC (Error-CorrectingCODE)
ECG wave analysis E-Chalk software system
Echo cancellation
Echo, echo reply
E-commerce policies
Economy of scale
Edge enhancement
Edge switch
Edge(s) )( )( Editors )( EEPROM (Electrically
Erasable
Programmable Read-Only Memory)
EER (Enhanced-er) model ER
EER model concepts ER
EER model constructs EER
EER model constructs torelations mappings
EER
Effective access time
Effective bandwidth /
Effective branching factor
Effective memory-accesstime
Effective modularity Effective transfer rate
Effector
Efficiency Effort Adjustment Factor
(EAF) Effort validation Eigen-coefficients
Eight-puzzle / Elaborative approach Elastic traffic
Election
Electrodes Electroencephalogram
(EEG)
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 32/96
Electron trapping 27 Enumeration
Electron trapping
Electronic Code Book (ECB)
Electronic Codebook Mode (ECB)
Electronic disk
Electronic IndustriesAlliance (EIA)
Electronic mail
Elementary BusinessProcess (EBP)
Elevator algorithm
Elicitation
Elliptic curve
Email spoofing
Embedded
Embedded software Embedded SQL SQL Embedded statements
Embedded systems
Empty state
Emulation
EmulatorsEnable interruption
Encapsulating SecurityPayload (ESP)
Encapsulating,encapsulation
Encapsulation / Encipher (v)
Encode (v)
Encoded data
Encoder Encrypt (v)
Encrypted file
Encrypted Key Exchange(EKE)
Encryption
Encryption mode
End
End office
End point
End system
End tags
End to end
End transactions
End user )( End-to-end encryption
End-user development End-user software
engineering
Engineering ChangeOrder (ECO)
Enhanced ER ER
Enhanced-ER (EER)model
ER
Entailment
Enter key
Enterprise componentcompound pattern
Enterprise InformationIntegration (EII)
Enterprise Java Beans
(EJB) Enterprise Resource
Planning (ERP)
Enterprise-wide datawarehouses
Entity
Entity beans
Entity integrityconstraints
Entity types
Entity-relationshipdiagram (ERD)
Entropy )(Entry
Entry code
Entry points
Entry section
Enumeration
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 33/96
Enumerations 28 Existence dependency
Enumerations
Environment architecture Environment records
Environment vector )(
Epipolar line
Epistemic necessitation
Equal allocation
Equalization
Equijoin operation
Equipment ) / (Equivalence partitioning ER (Entity-Relationship)
Model
ER database schema
ERP (Enterprise ResourcePlanning)
Error Error control
Error Index (EI) Error propagation
Error tolerance
Error-Correction Codes(ECC)
Error-detection code /
Error–prone
Errors found per person-hour expended
/ ER-to-relational mapping
Escape
Escrow Escrow agency
Escrowed encryptionstandard
Ethernet
Euclid's algorithm
Euler totient function
Eurogrid
European ComputerManufacturingAssociation (ECMA)
European IntellectualProperty Office (EPO)
European PatentConvention (EPC)
European Patent Office(EPO)
EuropeanTelecommunicationStandards Institute(ETSI)
Even-parity function
Event flow diagram Event trace
Event-pair object
Events
Events flow Evoked potentials
Evolution
Evolution graph Evolutionary model Evolutionary prototyping
Exception dispatcherException objects
Exceptions
Excess burst size
Exchange
Exclusive
Exclusive access
Exclusive locks
Exclusive-writer protocol )(
Executable file
Execution autonomy
Execution efficiency Execution time
Executive
Existence dependency )(
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 34/96
Existential quantifier 29 Factoring
Existential quantifier
Existential quantifiers
Exit section
Exocentric views
Expandability )(Expansion bus
Expansion permutation
Expenditure
Expert system
Explanation-basedgeneralization
Explicit congestionsignaling
Explicit sets
Exploit code
Exponential smoothing
Exponential time
Export list
Exposure
Expression(s) )(Expressive power
Exptime calss
Exptime-complete calss
Extended Binary CodedDecimal InterchangeCode (EBCDIC)
Extended euclideanalgorithm
Extended file system(extfs)
Extended MarkupLanguage (XML)
Extended relationalsystems
Extended Service Set(ESS)
Extendible
Extendible hashing
Extensibility )( )(
eXtensible Business RulesLanguage (XBRL)
Extensible data types
eXtensible MarkupLanguage (XML)
eXtensible Rule MarkupLanguage (XRML)
Extensible StylesheetLanguage (XSL)
Extension of schema
Extent
Exterior Router Protocol(ERP)
External fragmentation
External hashing
External schemas
External sorting
Extra functionalattributes
Extranets
Extreme
Extreme programming
Eye-gaze tracking
F
Fabric
Face RecognitionTechnology (FERET)
Face Recognition VendorTests (FRVT)
Facet descriptor Facial expression analysis
Facilitated Application
SpecificationTechnique (FAST) Facilitator Facility/Facilities / Fact tables )(Fact-defined predicates
Factor(s) )(Factoring ][
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 35/96
Factory objects 30 Fields clustering
Factory objects
Fading
Failed state
Fail-stop digital signature
Fail-stop signature
Failure
Failure containment
Failure cost )( Failure intensity Failure(s) )(Failure-independent
machines
Fair cryptosystems
Fairness
Fair-share schedulers
False alarm
False cycle
Fan-in Fan-out FAQ (Frequently Asked
Questions))(
Fast Ethernet
Fast file system (ffs)
Fast team
Fastscan
FAT (File AllocationTable)
Fat client Fat server Fatal error
Fault Fault in a page
Fault recovery
Fault tolerance
Fault tree analysis Fault-based-testing Faulting process
Fault-tolerant
Fault-tolerant systems
Faulty
Faulty process
Fax
FC (Fiber Channel)
FCB (File Control Block)
FCFS (First-Come, First-Served)
FDBS (federated DatabaseSystem)
Feasibility study Feature
Feature analysis
Feature migration
Feature point Federal Communications
Commission (FCC)
Federal InformationProcessing Standard(FIPS)
Federated datawarehouses
Federated DBMS DBMS
Federated warehouse
Feedback / Feedback loops
Feedback shift register
Feedback with CarryShift Registers (FCSR)
Feedforward
Feedforward networks
Fermat’s theorem
Fetch command
Fetch orientation
Fiber channel
Fields clustering
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 36/96
Fields connecting 31 Flow graph
Fields connecting
Fields ordering
Fields repeating
FIFO (First-In, First-Out)
Fifth Normal Form (5NF)
File access
File blocks
File descriptor
File expansion
File extension
File group
File handle
File locking
File offset File organization
File permissions
File processing
File records on disks
File reorganization
File replication
File scan
File segments
File servers
File session
File sorting
File Transfer Protocol(FTP)
)(
File-organization module
File-server systems
Filing
Fill sequence / Filter driver
Filter generator
Filters
Final permutation
Finalized
Finance applications
Fine-grained control overcode
Fine-grained locking
Fine-grained objects
Fine-tune (to)
Finite field
Finite-state automata
Finite-state machine
Firewall
Firewall chains
Firmware
First fit
First hands-on systems
First level indexes
First Normal Form (FNF)
Fishbone diagram Fitness
Fixed hosts
Fixed point attack
Fixed routing
Fixed-head disks
Fixed-length record
Fixing bugs )( Fixtures
Flag
Flash memory
Flat Flat fading
Flat key space
Flat relational model
Flexibility Flooding (routing)
Floor function
Floppy disks
Flow
Flow control
Flow graph
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 37/96
Flow label 32 Frame relay
Flow label
Flowchart )( Fluctuation
Fluents /
Fluid
FLWR )For-Let-Where-
Return(FLWR expression FLWR
Focus
Focusing operation Foiled twisted pair
Fold(s) )(Folder
Folder icon Folder redirection
Folding
Force/no-force approach / Force-writing
Foreground
Foreground process
Foreign Agent (FA)
Foreign key )( Foreign Network (FN)
Forestall (to -) Formal
Formal change control Formal description
Formal design Formal methods model
Formal Technical Review(FTR)
Formalism
Format
Format (v)
Formatted Formatters )(
Formatting
Formatting styles )( / Forms
Forms specificationlanguages
Forms-based interfaces
Formula(s) )(formulation
Fortified key negotiation Forum
Forward (v)
Forward chaining
Forward channel
Forward congestionsignaling
Forward engineering Forward Error
Correction (FEC)
Forward ExplicitCongestionNotification (FECN)
Forward protocol
Forward tracking Forwarding
Forward-mapped pagetable
Fourth GenerationLanguage (4GL)
Fourth GenerationTechnology (4GT)
Fourth Normal Form(4NF)
Fragmentation
Fragmentation
transparencyFragments )
( Frame Check Sequence
(FCS)
Frame handler
Frame mode bearerservice
Frame relay
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 38/96
Frame table 33 General graph directory
Frame table
Frame technology Frame(s) )(Framework /
Framework activity Framework integration
Framework model Framing
Free list
Free Rider Free software
Free software foundation(FSF)
Free-behind
Free-space list
Freeware
Frequency
Frequency borrowing
Frequency domain
Frequency hopping
Frequency hoppingspread spectrum
Frequency modulation(FM)
Frequency reuse
Frequency Shift Keying(FSK)
Frequency synthesizer
Frequency-DivisionMultiplexing (FDM)
Frequent-pattern treealgorithm
Front console
Front-end processors
Fronto-central- parietal Front-office FTP (File transfer
Protocol))(
Full backup
Full duplex
Full duplex operation
Full duplex transmission
Full outer join operation
Full-screen mode
Function deployment Function Point (FP) Function(s) ) /()(Functional dependencies
Functional dimension Functional domain Functional independence Functional magnetic
resonance imaging)(
Functional requirements
Functionality
Function-oriented metrics Fundamental frequency
Fundamental harmonic
Fundamental systemmodel
FURPS (Functionality,Usability, Reliability,
Performance,Supportability) Future-knowledge
scheduling
Fuzzy-connectedness
G
Gain(s) )(Galois field
Gap filler
Garbage collection
Gate
Gateway / Gauge
GDT (Global DescriptorTable)
Gender ) ( General graph directory
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 39/96
General number field sieve 34 Graphical Device Interface
General number fieldsieve
General Problem Solver(GPS)
General Public License(GPL)
General purpose / Generality Generalization/
specialization mapping /
Generalization-specialization (Gen-Spec)
-
Generalized cylinders
Generalized deltaprocedure
Generalized entity types
Generalized model
Generalized superclass
General-purposeapplication
Generating plans
Generation of tuples
Generic
Generic Flow Control(GFC)
Genetic
Genetic algorithms )(Genome data
management
Geographic InformationSystems (GIS)
Geographic mobilitydomain
Gestures
Gigabit Ethernet
GIS (GeographicInformation Systems)
Glass-box testing Glitch
Global data
Global depth
Global Grid Forum(OGF)
Global mobility
Global ordering
Global replacement
Global roaming
Global System for MobileCommunications (GSM)
Glossary
Gnu's Not Unix (GNU) GNU Go to sleep
Goal Question Metric-Bases MeasurementProgram (GQM)
Go-Back-N ARQ n
Goppa codes
GPL code
GPL software
Graceful close
Graceful degradation / Graceful recovery Graded-index multimode -Gradient
Gradient descent
Grammar )(Grammar-oriented
objects)(
Grammatical parse )( Grant (v)
Grant command
Granting privileges
Granularity
Graph matrix Graph serialization
Graph theory
Graph(s) / Graphical Device
Interface (GDI)
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 40/96
Graphical User Interfaces 35 Hash files
Graphical User Interfaces(GUIs)
Graphics
Graphics card
Graphics controller
Grappling hook
Grayscale
Greedy method
Green packaging Green threads
Grid
Grid computing
Grid files
Ground
Ground wave propagation
Group address
Group rights
Group signal
Group signature
Group structure
Grouping
Grouping attributes
Groupware Growing phase
Guaranteed Frame Rate(GFR)
Guard page
Guards
Guess (v)
Guest
Guided transmissionmedia )(
GUIs (Graphical UserInterfaces)
HHackers Half duplex
Half duplex transmission
Halving
Hamming distance
Handbook
Handheld devices
Handheld DevicesMarkup Language
Handheld systems
Hand-held devices
Handler )( Handles )( Handoff )(Handoff delay
Handoff latency Handset )(Handshake
Handshaking
Hands-on computersystem
Handspread
Hang-up
Happened-before relation
Hard disks
Hard handoff
Hard link Hard problem
Hard real-time system
)( Hard-coded
Hardware )(Hardware controller
Hardware independence Hardware trap
Hardware-abstractionlayer (HAL)
Harmonic(s) )(Hash
Hash files
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 41/96
Hash function 36 Horizontal partitioning
Hash function
Hash rate
Hash table
Hashed file
Hashed page table
Hashed records
Hashing techniques
Hazard analysis Head & tail
Head crash
Head seek
Headend
Header
Header Error Control(HEC)
Header Hub (HHub)
Head-Mounted Display(HMD)
Health care applications
Heap
Heap file
Heavy load
Heavyweight process
Help-me-test
Heterarchy
Heuristics )( Heuristic repair
Hibernate mode
Hidden node
Hierarchical and network systems
Hierarchical data models
Hierarchical Mobile IP(HMIP)
][IP
Hierarchical storagestructure
)(
Hierarchical storagesystems
)(
Hierarchical/nonhierarchical
/
Hierarchies generalization
Hierarchies specialization
Hierarchy (Hierarchies) ) /()(
High Data Rate DigitalSubscriber Line(HDSL)
High Level Data Link Control (HDLC)
High-Density Bipolar-3Zeros (HDB3)
Higher/lower-order bits / Higher-degree
relationships
High-level data modules
High-level DML
High-Level Language(HLL)
Hit ratio
Hive
Hold and wait
Hold time
Hole
Holographic diffractionpattern
Holographic storage
)( Home address
Home Agent (HA)
Home directories
Home Network (HN)
Homogeneous DDBMS DDBMS
Homonyms ) (Homophonic substitution
cipher
Hooked system
Hop
Hop-by-hop
Horizontal fragmentation
Horizontal partitioning
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 42/96
Horizontal propagation 37 Image attribute
Horizontal propagation
Horn clauses
Horn greatest lowerbound theory
Horn least upper bound
theoryHost
Host
Host adapter
Host attached storage
Host languages
Hosted
Hosted
Hosted Virtual Machines
(VMS)Host-to-host
Host-to-host layer
Hot spare disk
Hot standby mode
HSM (HierarchicalStorage Management)
HTML (HypertextMarkup Language)
HTTP )(
Hub(s) ): (Human Identification at
Distance (HumanID)
Human-ComputerInterface (HCI)
Hybrid
Hybrid Online AnalyticalProcessing (HOLAP)
Hyper Text Markup
Language (HTML)Hyper Text Transfer
Protocol (HTTP)
Hyperlink (link)
Hyperplan
Hyperspace
Hyperterminal
Hypertext
Hypertext knowledge HyperText Markup
Language (HTML )Hyphen
I
I/O burst / I/O
I/O bus / I/O devices / I/O interlock
/ I/O port(s) )( / I/O subsystem / I/O-bound process / I-CASE CASE Iconic Iconic representation
Icons )( IDE (Integrated Device
Electronics) Idempotent )( Idempotent operation
Identification
Identifier
Identifying entity type )(Identity
Identity element
Idle
Idle channel )(Idle state )(Idle thread
Idleness
Ignore
Illegal
Illocutionary
Illumination
Image attribute
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 43/96
Image data types 38 Industrial Control Systems
Image data types
Imaging process
Immediate
Immediate updatetechniques
Immediate updates
Immersion Immersive virtual
environments Immersive virtual reality
Immutable shared files
Impairment(s)
Impedance mismatch )(Impersonation
Impersonation
Implementation datamodels
Implementation level
Implementation view Implementation(s) )(Implicit congestion
signaling
Implicit graph
Implicit requirements Implicit rules Implicitly embedded Improvisation
Impulse noise
In the wake
Inactivity timer
In-band signaling
Inchannel signaling
Inclusion dependencies
Incoming branch Incoming flow Incoming/outgoing ) /()(Incompatible mode
Inconsistency
Inconsistent
In-core
In-core copy Increment Incremental backup
Incremental model Incremental Parsing (IP)
Incremental updates
Indefinite blocking
Indefinite blocking
Indemnity
Independent class Independent classes
Independent processes
Independent SoftwareVendors (ISV)
Independent Test Group(ITG)
Index block
Index of coincidence
Index of refraction
Index registers
Index root
Indexed allocation
Indexed-sequential file
Indexes
Indexes clustering
Indexes file
Indexes tuning
Indexical
Indexing
Indication primitiveIndirect blocks
Indirection Indirection blocks
Indirectly
Individual usability
Industrial ControlSystems (ICS)
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 44/96
Inelastic traffic 39 Instructions
Inelastic traffic
Inertial Location System(ILS)
Infect (v)
Inference
Inference engine )(Inference rules
Inferencing
Infiniband
Information content Information deployment Information determinacy Information domain
Information Engineering(IE)
Information flow Information flow
continuity Information hiding
Information recompaction
Information repositories
Information ResourceManagement (IRM)
Information security(infosec)
Information StrategyPlanning (ISP)
Information structure Information
superhighway Information system life
cycle
Information systems
Information Technology(IT)
Informix universal server
Infrared
Infrastructure
Inherent
Inherent model-basedconstraints
Inheritance Inheritance support
Initial permutation
Initial state
Initial value
Initial vector
Initialization
Initialization )(Initialize (v)
Initialized
Initiate (v)
Injection
Injection Laser Diode(ILD)
In-line data
Innermost nested queries
Innermost queries
Inode
Inode structure
Inodes Input ):( Input queue
Input(s) / )(Insert command
Insert operation
Insertion anomalies
Insertion attack
Insertion operation )( Installation
Instance handler
Instance variables Instance(s) )( Instantiable interfaces
Instantiation
Institute of Electrical andElectronics Engineers(IEEE)
Instruction register
Instruction SetArchitecture (ISA)
Instructions
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 45/96
Instrumentation 40 International Mobile Telecommunications
Instrumentation Int. Standardization Org.
(ISO)
Integrated help facility Integrated Project
Support Environment(IPSE) Integrated public service
interface
Integrated ServicesArchitecture (ISA)
Integrated Services DigitalNetwork (isdn)
Integration testing Integrity / Integrity constraints
Intellectual-PropertyRights (IPRS)
Intelligibility
Intensity
Intention of schema
Intention schemas
Intentional stance
Inter record gaps
Interactive
Interactive computersystem
Interactive computing Interactive interfaces
Interactive processes
Interactive system Interactive transactions
Interblock gaps
Inter-cell handoff
Interception
Interchange circuits
Inter–class test casegeneration
interconnected
Interconnection
Interdependency
Inter-domain mobility
Interface DefinitionLanguage (IDL)
Interface design Interface tool kit Interface(s) )(Interfacing
Interference
Interior Router Protocol(IRP)
Interlacing
Interleave/interleaved / Interleaved planning
Interleaving Interlock protocol Interlocked
Intermediate Hub (IHub)
Intermediate System (IS)
IntermittentlySynchronizedDatabaseEnvironment (ISDBE)
Intermodular interface
Intermodulation
Intermodulation noise
Internal fragmentation
Internal hashing
Internal Revenue Service(IRS)
Internal schemas
International AssociationFor CryptologicResearch (IACR)
International DataEncryption Standard(IDEA)
International Electro-technical Commission(ECL)
International MobileTelecommunications(IMT)
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 46/96
ISO 41 Intrusive activity
InternationalOrganization ForStandardization (ISO)
International ReferenceAlphabet (IRA)
International Standards
Organization (ISO)International support
InternationalTelecommunicationUnion (ITU)
International Traffic InArms Regulations(ITAR)
Internet / Internet Architecture
Board (IAB)
Internet broadcasting
Internet Cache Protocol(ICP)
Internet Control MessageProtocol (ICMP)
Internet Corporation forAssigned Names andNumbers (ICANN)
Internet EngineeringSteering Group(IESG)
Internet Engineering Task
Force (IETF)Internet Group Message
Protocol (IGMP)
Internet mailing list
Internet Protocol (IP)
Internet Service Provider(ISP)
Internet Society (ISOC)
Internetwork
InternetworkingInteroperability )
(Interoperability
Interoperability )(Interpolation
Interpretation
Interpretations of rules
Interpreter Interprocess
communication Interrogation
Interrupt chaining
Interrupt dispatch table
Interrupt dispatcher
Interrupt driven
Interrupt handler
Interrupt handling Interrupt latency )( Interrupt priority levels
Interrupt processing
Interrupt service routine
Interrupt vector
Interrupt(s) )( Interrupt-request line
Interrupt-routines list
Intersection
Intersection operation
Intersymbol interference
Inter-track density
Interval
Interval data type
Intra-cell handoff
Intractable problem
Intra-domain mobility
Intranet )(Intranets Intra-subnet mobility
Intrinsic
Introspection
Intruder
Intruding DetectionSystem (IDS)
Intrusion
Intrusive activity
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 47/96
Intuitive game-controlling gestures 42 Join dependencies
Intuitive game-controllinggestures
)( Intuitive gestures )( Invalid
Invalid page reference
Invalid state ""Invariables
Invariant
Inventory analysis Inversion of control (IoC)
Inverted page table
Inverter
Inward multiplexing
In-window
Ionosphere
IP multicasting IP IP next generation IP
IP paging IP IP spoofing IP
IPC (Inter-ProcessCommunication)
IRM (InformationResourceManagement)
Irreducible
IS-A relationship IS-A)(...
ISAM (Indexed SequentialAccess Method)
ISDBE (IntermittentlySynchronizedDatabaseEnvironment)
Island-driven search
Isolation property
Isomorphic )( Isomorphism )( Isorythmic
Isotropic antenna )(IT staff
Iterated block cipher
Iteration markers
Iteration(s) )(Iterative broadening
Iterative deepening
Iterator variables )(Iterators
ITU TelecommunicationStandardizationSector (ITU-T)
J
Jacket
Jackson plans
Jackson systemDevelopment (JSD)
Jacobi symbol
jammer
Jamming
Java 2 Enterprise Edition(J2EE)
Java-2
Java 2 Standard Edition(J2SE)
Java-2
Java Community Process
Java Community Process(JCP)
Java DatabaseConnectivity (JDBC)
Java Developing Kit(JDK)
Java Server Faces (JSF)
Java Servlet Pages (JSP)
JIT (Just-In-Time)compiler
Jitter
Job control Job Control Language
(JCL)
Job objects
Job pool
Job queue
Jobs )( Join dependencies
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 48/96
Join indexing 43 Latch
Join indexing
Join operation
Joined tables
Joins
Joint probability
Journaling
Journaling file systems
Joystick
Juggernauts
Jukeboxes
Junction
Just-In-Time (JIT)
Juxtaposition JVM (Java Virtual
Machine)
K KDD (Knowledge
Discovery inDatabases)
Kernel data address
Kernel DispatcherKernel threads
Kernel-level threads
Key attributes
Key class Key compromise
Key Distribution Center(KDC)
Key escrow
Key exchangeKey field
Key management
Key management facility
Key Process Area (KPA) Key transformation
Keylogger )(
Keypad
Keyspace
Keystream
Keystroke
Keystrokes
Keyword )(Keyword-based indexing
Keyword-based search
KLOC Kilo Line-Of-Code Knapsack
Knowledge base
Knowledge discovery Knowledge Discovery In
Databases (KDD)
Knowledge interchangeformats
Knowledge managementsystems
Knowledge representation
Knowledge-based security
Knowledge-Based System (KBS) Known plaintext attack
L
Label(s) )(LAN extension
LAN segment
Lane
Language rate
Laptops
Large scale
Large-grainedfunctionalities
Large-Scale-Integration(LSI)
Last In first Out (LIFO)
Latch ) (
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 49/96
Latency 44 Linear consistency test
Latency
Latency time
Latent errors
Lattices
Lattices generalization
Lattices specialization
Law enforcement
Law of causality Layer
Layered approach
Layered, feedforwardnetwork
Layering )(
Layering interfaces
Layout ][Layout Appropriateness
(LA) Lazy swapper
LDAP (LightweightDirectory-AccessProtocol)
LDT (Local DescriptorTable)
Lead
Leading bits
Leaf classes
Leaf node
Leakage
Learning rate parameter
Lease
Leased line
Least Frequently Used(LFU)
Least Frequently Used(LFU) pagereplacement algorithm
Least Recently Used(LRU)
Least Recently Used(LRU) page
Least-cost algorithm
Least-cost routing
Left outer join operation
Left-deep tree
Legacy Legacy DDBMS DBMS
Legacy system Legal relation states
Legendre symbol
Lemma
Level x Optical Carrier(OC)
x
Level x SynchronousTransfer Signal (STS) x
LGPL (GNU lesser GPL)
)GNU( Liability
License License agreement
License(s) )( Licensed
Licensee
Licensing
Licensor )( Light Emitting Diode
(LED)
Lightweight containers
Lightweight DirectoryAccess Protocol(LDAP)
)(
Limit
Limit register
Limited-horizon search
Line break
Line configuration
Line discipline
Line Of Sight (LOS)
Linear complexity
Linear complexity profile
Linear congruentialgenerator
Linear consistency test
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 50/96
Linear cryptanalysis 45 Lock-in attack
Linear cryptanalysis
Linear differentialcryptanalysis
Linear Feedback ShiftRegister (LFSR)
Linear hashing
Linear list
Linear recursion
Linear regression
Linear sequential model Linearly separable
functions
Lines Of Code (LOC) Link
Link access Procedure forFrame mode bearerservices (LAPF)
Link Access ProtocolBalanced (LAPB)
Link attributes
Link management
Link time
Link weight
Linkage editor )( Linked allocation
Linked list
Linked scheme
Linkers )( Link-state routing
Linqua franca
Linux
Listen stateLiteral ][Little endian
Little-endian
Little-endian convention
Live video avatar LLC protocol data unit LLC
Load (to) )(
Load balancers
Load balancing
Load sharing
Load Sharing Facility(LSF)
Load time
Load(s) )(Loaders )( Loading utility )(Local Area Network
(LAN)
Local data
Local depth
Local host
Local loop
Local loopback
Local Procedure Call(LPC)
Local replacement
Local Security AuthoritySubsystem (LSASS)
Locales Locality model
Locality of reference
Localization Localized (to be -)
Location
Location cache
Location independence
Location independent
Location transparency
Location transparent
Lock bit
Lock management
Lock manager
Lock mode
Lock request
Locked
Lock-in attack
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 51/96
Locking 46 Macro payment
Locking Locking protocol
Lock-key scheme
Locks
Log file
Log information
Log records
Log Sequence Number(LSN)
Log-based recovery
Log-based transaction-oriented file systems
Log-file service
Logging ) ( Logging area
Logical address space
Logical Block Address(LBA)
Logical clock
Logical Cluster Number(LCN)
Logical database design
Logical definitions of
domainsLogical file system
Logical formatting
Logical level
Logical Link Control(LLC)
Logical sampling
Logical theory
Logical units
Logically omniscient
Login
Login authentication
Login sessions
Logon subsystem
Long-haul fibertransmission
Longitudinal redundancycheck
Long-running activity
Long-term scheduler
Look over the shoulder of a user
Look scheduling Loop resolution
Loop testing Loosely coupled systems )
( loss(es) )( Lossless
Lossless join property
Low-latency
Low-level data models
Low-level formatting
Low-level programminglanguages
Low-level triggers
Lowpass
Lowpass filter
LPC (Local ProcedureCall)
LRU (Least-Recently-Used)
Lucas number
LWP (LightweightProcess)
MM:N relationship type M:N)M N(
Machine Vision (MV)
Macro life cycle
Macro mobility
Macrocell )(Macro-expansion Macro-operator
Macro-payment
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 52/96
Macroscopic schedule 47 Master secrete
Macroscopic schedule Magnetic disks
Magnetic tape storagedevices
Magnetic tapes
Magnetoencephalography
Magneto-optic disks
Magnitude )(Mail destination
Mail envelop
Mailbox
Mailing list
Mailslot
Main files
Main memory
Mainframes
Maintainability )( Maintenance personnel )(Maintenance phase Major device number
Major number
Majority protocol
Major-version number
Make-buy decision / Malefactors
Malfunctioning
Malicious
Malicious code Malicious intent
Malicious software
Man
Management InformationBase (MIB)
Management InformationSystem (MIS)
Mandatory access control
MANET (Mobile Ad-HocNetwork)
Man-in-the-middle attack
Manual identification
Manufacturingapplications
)(
Manufacturing cell Many-to-many model
Many-to-one model
Map
Map (v) / Mapping
Mapping cache
Mapping to relations
Mapping(s) )(
Mark
Mark up (v)
Marker
Market-based data
Market-basket data
Marketers
Marketing ploy
Marshalling
Marshalling
Maskable interrupt
Masquerade
Mass storage
Mass storage media
Massively ParallelProcessing (MPP)
Master (slave/master) ) / (Master copy )(
Master file )(Master File Directory
(MFD)
Master File Table (MFT)
Master key
Master processor
Master PTE PTE Master secret
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 53/96
Master server 48 Metadata
Master server
Mastergroup
Master-slave relationship - Master-slave structure -
Matched filtering
Matching
Mathematical relation
Max function
Maximum Burst Size(MBS)
Maximum Frame Size(MFS)
Maximum function
McCabe technique McCabe M-commerce payment
Mean Time BetweenFailures (MTBF)
Mean time to data loss
Mean time to repair(MTTR)
)(
Mean-time-to-change(MTTC)
Mean-time-To-Failure(MTTF)
Measure / Measurement
Mechanism
Media )( Media cubes
Media Gateway (MG) MG
Media GatewayController (MGC)
MGC
Medium Access Control(MAC)
Medium-term scheduler
Meet-in-the-middle attack
Meet-in-the-middleconsistency attack
Membership
Membership querymessage
Membership reportmessage
Memory address register
Memory allocation
Memory dump
Memory locking Memory mapping
Memory mapping a file
Memory partition
Memory-access violation
Memory-mapped I/O / Memory-protection
violation
Memory-style Error-
Correcting-Code(ECC) organization
MEMS (Micro-ElectronicMechanical Systems)
Menu selection system Menu-based interfaces
Menu-driven
Merger
Meshed
Meshing
Message AuthenticationCode (MAC)
Message AuthenticatorAlgorithm (MAA)
Message Body (bodies) ):(Message Digest (MD) / Message Integrity Check
(MIC)
Message passing )( Message pool
)( Message queues
Message slots
Message system Messaging )(Meta knowledge Meta-class
Metadata
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 54/96
Metadata repository 49 Mixed transactions
Metadata repository
Meta-design
Metaknowledge
Metalevel
Metamodel Metaphor
Meta-signaling
Metatags Meter
Method ):( Metric ):( Metrics computation Metrics evaluation Metropolitan Area
Network (MAN)
Micro life cycle
Micro mobility Microbrowser
Microcell )(Microcode
Microcomputers
MicroElectroMEchanicalSystems (MEMS)
Microgestures )( Microkernels )( Micro-payment Microscopic schedule Microsoft Interface
Definition Language(MIDL)
Microsoft shared source
MicrowaveMicrowave LAN
Middle tier
Middleware Milestone ):( Mimic function
Min function
Miniature keyboards
Miniaturization Minicomputer
Minidisks
Minimal cover /
Minimal sets
Minimum cardinalityconstraint
Minimum Cell Rate(MCR)
Minimum function
Minimum test sequence Minimum-cost spanning
tree
Minimum-hop path
Minimum-hop tree
Mining
Mini-specification Mini-specs Miniworld
Minor device number Minor number
Minor-version number
MIPS ) ( Mirror set
Mirrored blocks )(Mirrored disk
Mirroring
Mirroring )(Misalignment
Mischievous
MissMissing values
Mission-criticaldevelopment
Mitigating legal exposure
Mixed file
Mixed fragmentation
Mixed transactions
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 55/96
MMU 50 Mount table
MMU (Memory-Management Unit)
Mnemonic
Mnemonics
Mobile
Mobile Ad-hoc NETwork (MANET)
Mobile agent
Mobile banking services
) ( Mobile content )( Mobile databases
Mobile financialapplications
Mobile financial services
Mobile IP (MIP) ][IP Mobile node
Mobile payment
Mobile payment forum
Mobile phones
MobileTelecommunicationSwitching Office(MTSO)
Mobile telephonyMobility )(Modal operator
Modality Mode
Model-based vision
Modeler
Modems )( Modifiability )( Modification anomalies
Modify bit
Modular
Modular arithmetic Modular reduction
Modularity
Modulated signal
Modulating signal
Modulation
Module ):( Module Interconnection
Language (MIL) Module-chart Modulo n n
Modulo, modulus
Modulus attack
MOLAP(MultidimensionalOLAP)
OLAP
Molecular DynamicsMachine (MDM)
Monitor ):
( Monitor call
Monitor construct
Monitor mode
Mono mode
Monoalphabetic cipher
Monolithic software Monomial
Monotonic
Monotonic reasoning
Moor’s law
Moral compatibility
Morphological
Morphology metrics Most Frequently Used
(MFU) pagereplacement algorithm
Most Recently Used(MRU) page
Most significant bit
Motifs Mount (to)
Mount on demand
Mount point
Mount table
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 56/96
Mounted 51 Multirate
Mounted
MP3 players MP3 MPLS (Multiprotocol
Label Switching)
MPOA (MultiprotocolEncapsulation OverATM) ATM
MPP (Massively ParallelProcessing)
Multi-access bus Multicarrier
Multicast
Multidimensional analysis )( Multidimensional
associations
Multidimensional OLAP(MOLAP)
OLAP
Multidimensional OnlineAnalytical Processing(MOLAP)
Multidimensional User-Oriented SyntheticEnvironment (MUSE)
Multilevel binary
Multilevel feedback queuescheduling
Multilevel index
Multilevel indexes
Multilevel queue-scheduling
Multimedia data
Multimedia databases
Multimedia Internet MailExtension (MIME)
Multimedia MessagingService (MMS)
)(
multimode
Multinational use
Multiparty computation
Multi-pass clock
Multipath
Multipath distortion
Multipath interference
Multipath propagation
Multiple agents
Multiple class partitiontesting
Multiple encryption
Multiple granularity levellocks
Multiple inheritance
Multiple tuples
Multiple unicast
Multiple Universal-naming-conventionProviders (MUP)
Multiple user interfaces
Multiple-relation options
Multiplexer
Multiplexing
Multiplication (*)operator
Multiplicities
Multipoint
Multiprocessing / Multiprocessor systems
Multiprocessorvirtualization
Multiprogrammedsystems
Multiprogramming
Multiprogrammingdegree
MultiProtocolencapsulation OverATM (MPOA) ATM
MultiProtocol LabelSwitching (MPLS)
MPLS
Multiprovider router
Multirate
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 57/96
Multisets 52 Nested relational model
Multisets
Multitable locks
Multitasking Multithreaded process
Multithreading models
Multi-URL-basedinference
URL
Multiuser DBMS DBMS Multiuser DDBMS DBMS
Multiuser systems
Multivalued attributes
Multivalued dependencies
Multiversion
Multiversion concurrencycontrol
Multiway joins
Music CD
Musical surface
Mutant
Mutation operator
Mutex
Mutual exclusion
N
Naive end user )(Naive knowledge
Name collision
Name space
Named iterators
Named objects
Named pipes
Named queries
Naming
Naming constraints
Naming hierarchy
Naming schemaconstructs
Naming transparency
Nano technology
Nanomedicine
Nanotubes
Narrative context
Narrowband / N-ary relationship types
Nassi-Shneiderman plans N-S National Bureau of
Standards (NBS)
National Computer
Security Centre(NCSC)
National Institute of standard andtechnology (NIST)
National LanguageSupport (NLS)
National ScienceFoundation
National security agency(NSA)
Native
Native compilerNative Win32 executable Win32
Natural join operation
Natural languageinterfaces
Navigator
Near-end crosstalk
Near-line
Need-to-know principleNegative associations
Negotiation Neighbor acquisition
Neighbor reachability
Nested queries
Nested relational model
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 58/96
Nested relations 53 Nonconfirmed service
Nested relations
NetBIOS Extended UserInterface (NetBEUI)
NetBIOS
Network access layer
Network Attached Storage(NAS)
Network attachment point
Network BasicInput/Output System(NetBIOS)
/
Network computers
Network connections
Network daemon
Network Device InterfaceSpecification (NDIS)
Network Dynamic DataExchange (NetDDE)
Network file systems
Network for EarthquakeEngineeringSimulation (NEES)
Network layer
Network login
Network OperatingSystem (NFS)
Network OperatingSystem (NOS)
Network partitioning
Network redirector
Network response
Network security
Network Service AccessPoint (NSAP)
Network-friendlyencoding
Networking
Network-oriented
Network-TerminatingEquipment (NT)
Neural networks
Neurocognitive
NFS (Network FileSystem)
Nicknames
Nimbus
NIS (Network Information System)
NIST (National Institute
Of Standards)No preemption
No Remote MemoryAccess (NORMA)
No-access page
No-cache Node weight Noise-tolerant
Nomadic access
Non active
Non blocking
Non confirmed message
Non faulty process
Non guided transmissionmedia
Non monotonic reasoning
Non Real Time VariableBit Rate (NRT-VBR)
Non Return To Zero(NRZ)
Non Return To ZeroInverted (NRZI)
Non Return To Zero-Level (NRZ-L)
Non scalable Non volatility
Nonadditive join property )(Nonblocking I/O /
Nonblocking send
Noncached I/O / Noncached read
Nonce Non-compliant cells
Nonconfirmed service
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 59/96
Noncontainer object 54 Object occurrencies
Noncontainer object
Non-eud environment
Non-incrementalintegration
Noninstantiable interfaces
Noninvasive Nonmaskable interrupt
Nonmonolithic approach
Nonpersistent CSMA CSMA Non-preemptive
Nonprocedural language Nonrecoverable read
error
Nonrecursive queries
Nonredundant allocation
Nonrepudiation
Nonresident attributes
Nonserial schedule
Non-Uniform MemoryAccess (NUMA)
Nonverbal communication
Nonvolatile cache
Nonvolatile ram cache
Nonvolatile storage
Nonvolatile storagedevices
Normal forms
Normal Response Mode(NRM)
Normalization
Normalization process
Normalization value
Normalize (v)
No-store
Not operator
Notation Notched quanta
Notepad
Notification
Notification events
NP Class (Non-PolynomialClass)
NP-complete class
Null modem
Null values
Null values attributes
Null values in tuples
Number crunching
Number Field Sieve (NFS)
Number theory
Numeric AssignmentModule (NAM)
Numeric data types
O
Object abstractiontechnique
Object adapter Object behavior
Object Data ManagementGroup (ODMG )
Object definition language(ODL)
Object file
Object format Object identity
Object life history Object Linking And
Embedding (OLE) Object Management
Group (OMG)
Object Management
Layer (OML) Object manager
Object ManipulationLanguage (OML)
Object modeling
Object ModelingTechnique (OMT)
Object module
Object occurrences
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 60/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 61/96
One-time password system 56 Ordering
One-time passwordsystem
One-to-one model
One-way function )(
One-way hash function )( One-way trust )( On-hook
Online / Online Analytical
Processing (OLAP) )(
Online configurations On-line storage
On-line system
Online TransactionProcessing (OLTP)
)(Ontologies
Ontology
Ontology Inference Layer(OIL)
Ontology knowledgeengineering
Opaque data type
Op-code Open addressing
Open count
Open cursor command
Open DatabaseConnectivity (ODBC)
Open Grid ServicesArchitecture (OGSA)
Open paradigm Open research problems
Open Shortest Path First(OSPF)
Open software foundation(OSF)
Open source
Open Source Definition(OSD)
Open source initiative
Open Source Software(OSS)
Open SystemInterconnection (OSI)model
Open-file record
Open-file table
Operability )( Operand
Operands )( Operating system(s) )(Operation
Operational profile Operator overloading
Operator(s) )(Optical cables
Optical disks
Optical fiber
Optical Line Of Sight
Optimal algorithm
Optimally
Optimally aligned Optimist concurrency
control
Optimistic locking
Optimistic techniques
Optimization
Optimizations
Optimized
Optimizers
Option(s) )(Optional fields
OQL (Object Query
Language)OR operator
Order
Order of magnitude
Order preservation
Ordered files
Ordering
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 62/96
OASIS 57 Page sharing
Organization ForAdvance StructuredInformation Systems(OASIS)
Orthogonal
Orthogonal codes
Oscillation(s) )(Out of memory
Outcome ):( Outer join operations
Outer queries
Outer union operation
Outer-page table
Outgoing flow
Outlet
Out-line data
Out-of-band information
Out-of-band signaling
Out-of-date
Output
Output ):( Output Feedback mode
(OFB) Outsourcing Over-allocating memory
Overfitting
Overflow
Overflow files
Overhead )(Overlap (v)
Overlapping
Overlapping frequenciesOverlay
Overlay driver
Overlay loader )( Overload
Overloading Overriding
Overwrite
Overwriting
Owner
Owner entity
Owner entity type
Owner rights
Ownership
P
P class (Polynomial class)
P+Q redundancy scheme P+Q Package
Packaging
Packaging companies
Packet sniffers Packet sniffing
Packet switching
Packet(s) )(Padding
P-adic number p Page allocator
Page break
Page cache
Page directory
Page Fault Frequency(PFF)
Page fault trap
Page faulting
Page layout Page offset )( Page out
Page out (to -)
Page replacement
Page replacement
Page scanning
Page sharing
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 63/96
Page table 58 Passive attack
Page table
Paged
Paged (to be -) in from thefile system
Paged segmentation
schemePaged-aligned sections
Page-Directory Entry(PDE)
Page-fault rate
Page-frame database
Page-not-present bit " " Pageout
Pageout (to)
Pageouts Pager
Pager
Page-replacementalgorithms
Page-Table Entry (PTE)
Page-table self map
Paging
Paging daemon
Paging file
Palletize (to) )( Palm telephones
Palmtop
Panic Paper prototype Parabola
Parabolic reflective
antennaParaboloid
Paradox Parallel / Parallel database
management systems
Parallel processing
Parallel systems
Parameter marshalling
Parameter mode
Parameter passing
Parameter types
Parameter(s) )(Parameters of disks
Parametric end users
Parcel
Parent nodes
Parent process
Parenthesis (roundbrackets)
Parity
Parity bit
Parity error
Parse procedures
Parsing
Partial key
Partial replication
Partial specialization
Partially committed state
Partially observablemarkov decisionproblem
Partial-Order Planning(POP)
Participation constraints
Partition Partition algorithm
Partition boot sector
Partition control block Partition testing Partitioned hashing )(Partitioning
Partitions )( Pass phrase
Passive
Passive attack
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 64/96
Passive entity 59 Person-to-person payment
Passive entity
Password
Patches
Path
Path expression
Path loss
Path name
Path-name translation
Path-vector routing
Pattern
Pattern matching ][Payload
Payload Type (PT)
Payroll system P-box P PC hygiene
PCB (Process ControlBlock)
Peak amplitude
Peak Cell Rate (PCR)
Peculiarities Peer
/ / Peer to peer
Peer-to-peer computing
Peer-to-peer systems
Penal laws
People ManagementCapability MaturityModel (PM-CMM)
Per se
Perceived behavioral
control factor
Perceived cost
Perceived Ease of Use(PEU)
Perceived Usefulness (PU)
Perception
Perceptron
Percepts
Perceptual interfaces
Perfective maintenance Perfidious way
Performance
Performance monitoring
Performance testing Per-Hop Behavior (PHB)
Period
Periodic signal
Perlocutionary
Permanent key
Permanent VirtualConnection (PVC)
Permission attributes
Permits
Per-process open-file table
Persist (v) Persistence
Persistence timer
Persistent CSMA CSMA Persistent forwarding
information base(FIB)
Persistent objects )(Persistent storage )(Persistent stored modules
)(Person/Month (PM) / Personal databases
Personal Digital Assistants
(PDAS)Personal Identification
Number (PIN)
Personal Software Process(PSP)
Personal workstations
Personalization ) (
Person-to-person payment
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 65/96
Perspective projection 60 Polymorphic
Perspective projection
Petaflops
Phantom body
Phantom problem
Phase
Phase Modulation (PM)
Phase shift keying (PSK)
Phase-change disk
Phonemes
Physical AddressExtension (PAE)
Physical address space
Physical dataindependence
][
Physical data models ][Physical database design ][
Physical formatting
Physical indexes ][Physical layer
Physical processes andevents
Physical properties
PID )( Piggybacking
Pile file
Piling
Pilot channel
PIN (PersonalIdentificationNumber)
Pin (to -) a page
Pin(s) )(Ping floods
Pinning interface
Pipe
Piped through pr / pr Pipelines ][ Pipelining )(
Pivoting
Pixel(s) )()(
Plain file
Plain Old Java Objects(POJO)
Plain Old TelephonyService (POTS)
Plaintext
Plaintext feedback mode
Plane/level / Platform for Internet
Content Selection(PICS)
Platform(s) )(Platters
Plausible fault Plethora Plug and play
Pluggable )(Pluggable authentication
module (PAM)
Point CoordinationFunction (PCF)
Point of attachment
Point of sale (pos)
Point to point
Pointing device
Point-to-Point (PPP)Protocol
)(
Point-To-Point TunnelingProtocol (PPTP)
Polar
Policy
Policy CertificationAuthority (PCA)
Polling/poll
Polyalphabeticsubstitution cipher
Polygram substitutioncipher
Polyinstantiation
Polymorphic
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 66/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 67/96
Premaster secret 62 Process identifier
Premaster secret
Prepaging
Prepaid cards Prepare (T) T
Prepositional form
Preprocessors
Presentation layer
Presentation protocol )( Pretty Good Privacy
(PGP) Preventive auditing Preventive maintenance Primary actor
Primary clause ""Primary copy )( Primary indexes
Primary key
Primary processor
Primary rate
Primary storage
Primary/Secondary / Prime (number)
Prime attributes
Primitive(s) )(Principal
Principle componentanalysis
Printer servers
Prior probability
Prioritized, credit-basedalgorithm
Priority inversion
Priority paging
Priority replacement
Priority scheduling
Priority(s) )(Priority-inheritance
protocol
Privacy
Privacy enhanced mail
Privacy protection
Private
Private Branch Exchange(PBX)
Private key
Privilege
Privilege escalation
Privileged instructions
Privileged mode
Privileged software
Privileges
Privileges granting
Privileges revoking / Proactive strategy Probabilistic encryption
Probe packet
Problem decomposition Problem reporting Problem space Procedural cohesion
Procedural design Procedural DML DML Procedural language Procedural layering Procedural narrative Procedural program code
Procedure call
Procedures )( Process Activation Table
(PAT) Process aging Process algebra Process control
Process Control Blocks(PCBs)
Process identifier )(
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 68/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 69/96
Prototype 64 Quantifying in
Prototype Prototype page-table
entry
Prototype PTE PTE Prototyping Prototyping paradigm Prover
Proxies
Proximity
Proxy
Proxy signature
Pseudocode
Pseudo-code
Pseudonoise
Pseudo-random
Pseudoternary
PSM (Program StoredModules)
Pspace class Pspace-complete class
Psychoacoustician
Psychological /
PTBR (Page-Table BaseRegister)
PTLR (page-table lengthRegister)
Public BroadcastingService (PBS)
Public key
Public key algorithm
Public key certificate )(Public key cryptography )(Public key encryption
)(Public telecommunication
networks
Public telephone network
Public-domain
Public-domain software
Public-key encryptionalgorithm
Pulse AmplitudeModulation (PAM)
Pulse Code Modulation(PCM)
Pulse sensor
Pulse-width-modulation
Pun
Punctuation characters
Pure code
Pure demand paging
Pure segmentation
Purposeful breaches
Purposive vision
Q
QBE (Query-By-Example)
Qos eligibility
Quadratic
Quadratic nonresidue
Quadratic residue
Quadratic Sieve (QS)
Quadrature AmplitudeModulation (QAM)
Quadrature Phase ShiftKeying (QPSK)
Qualification
Qualified aggregation
Qualified associations
Quality assurance Quality assurance system Quality control Quality Function
Deployment (QFD) Quality of conformance Quality of design Quality Of Service (QOS)
Quantifier ) /( /
Quantifiers )(Quantifying in
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 70/96
Quantitative physics 65 Reactive system
Quantitative physics
Quantization
Quantum computing
Quantum cryptography
Quantum electrodynamics
Quasi-formal grammar Querier's Robustness
Variable (QRV)
Queries
Queries blocks
Query compiler
Query language
Query processing
Query servers
Query-By-Example(QBE )
Querying constructs
Questionnaire
Queue
Queue network model Queued spinlocks
Queueing-network analysis
Queuing diagram
Queuing semaphore Queuing theory Quintuple encryption
Quotas
R Race condition
Radiation
Radio LAN
Radio range
Radiologist Radiometry of image
formation
RAID (Redundant ArraysOf Independent Disks)
RAID (Redundant ArraysOf Inexpensive Disks)
Raised
RAM (Random AccessMemory)
Ramification
Random paradigm Random routing
Random testing Random-access device
Random-access time
Randomizing function
Randomly
Range relation
Range(s) )(Rapid Application
Development (RAD) Rapid prototyping Raster image processing
Raster images
Raster scan )( Rasterization
Rational Rose design tool Rational Rose
Rational Rose tool Rational Rose
Raw device interfaces
Raw disk
Raw I/O / RBAC (Role-Based Access
Control)
RDBMS (RelationalDatabase ManagementSystems)
RDF (ResourceDescriptionFramework)
Reachability
Reacquisition
Reactive machines
Reactive strategy Reactive system
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 71/96
Read command 66 Refactoring
Read command
Read timestamp
Read/write head / Read/write locks /
Readability Read-ahead )( Readers-writers problem
Read-set transactions
Read-write disks
Ready ][ Ready (state) )( Ready (T) T
Ready queue
Real Time Logic (RTL) Real Time Variable Bit
Rate (RT-VBR)RT-VBR
Real-time database
Real-time executive )(
Real-Time Operatingsystem (RTO)
Real-time scheduling
Real-time system(s) )( Reasoning
Reasoning mechanisms
Reassembly
Receive Non Ready (RNR) RNR
Receive Ready (RR) RR
Reception path Reclaim Reconnection timer
Record pointers
Record types
Record-at-a-time
Record-at-a-timeoperations
Record-based data models
Recorder Records )( Records items
Records values
Recover (v) Recoverable read error
Recovering process
Recovery ] /[][Recovery after a power
failure
Recovery and backupsystems
Recovery checkpoints
Recovery in multidatabasesystems
Recovery testing Recreation and
Entertainment (R&E)
Recurrent networks
Recursive closure
Recursive parallel model /
Recursive relationships
Redirector
Redirector connection
Redo (T) T
Redo operation
Redo transaction
Reducible )( Redundancy
Redundancy controlRedundant Redundant Arrays Of
Independent Disks(RAID)
Redundant information intuples
Reentrant code
Refactoring
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 72/96
Reference bit 67 Remainder section
Reference bit
Reference count
Reference materials
Reference string
Referencing relation
Referent point Referential integrity
constraints
Referential triggeredaction
Refining conceptualschemas
Reflective
Reflex
Reflexive associations
Refraction
Refractive index
Refresh rate
Refutation
Regional networks
Register-allocationalgorithm
Register-replacementalgorithm
Registers )( Registry
Regression line Regression rule )(Regression testing Regression tests
Regular entity types
Regular expression
Regulation
Regulation Reify
Related keys
Related keys attack
Relation schema
Relational algebra
Relational calculus
Relational data models
Relational data modelsnotation
Relational database
Relational database design
Relational DatabaseManagement Systems(RDBMS)
Relational databaseschema
Relational decomposition
Relational OLAP(ROOLAP)
OLAP
Relational OnlineAnalytical Processing(ROLAP)
Relational-Functional
Markup Language Relationship sets
Relationships
Relationships as attributes
Relative access
Relative advantage
Relative block number
Relay
Release memory
Releases )( Reliability
Reliable
Reliable sequencingnetwork service
Relinquish (v) the CPU
Relocatable address
Relocatable code
Relocatable linking loader
Relocatable loader )(
Relocation
Relocation register
Remailers
Remainder section
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 73/96
Remapping 68 Response set
Remapping
Remote collaboration
Remote file transfer Remote login
Remote logon
Remote loopback
Remote procedure
Remote storage services
Remote teaching
Remote terminal access
Remote-Access Server(RAS)
)(
Removable
Removable media
Rename operation
Renaming
Rendering
Rendezvous
Rendezvous point Repair approach
Reparse data
Reparse points
Repeater(s) )(Repertoire
Replay
Replay attack
Replicas
Replicated
Replication
Replication transparency
reply
Repositioning
Repository Representational data
models
Request )(Request edge
Request For Comments(RFC)
][
Request memory
Request primitive
Requirement Engineering
(RE)Requirements collection
and analysis
Requirementsspecificationtechniques, databasedesign
Requirements tracing Research Fund
Expenditure Reservation
Reset
Resident attributes
Resident monitor )( Residual error
Residue
Resilience
Resolution ):(Resource allocation
Resource Description
Framework (RDF)Resource fork
Resource instances
Resource preemption ) (
Resource reservation
Resource ReservationProtocol (RSVP)
)(
Resource sharing
Resource utilization
Resource vector
Resource-allocation graph
Resources )( Resources allocator
Response
Response primitive
Response set
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 74/96
Response time 69 Roll in
Response time
Responsibility Responsibility-driven
design
Responsiveness
Restart
Restore
Restricting access
Restriction
Restructuring Result equivalent
Retail shopping
Retailers
Retransmission timer
Retrieval Retrieval operations
Retrieval transactions
Retrievals
Return circuit
Return key
Returns On Investment(ROI)
Reusability Reuse-driven
Reverse channel
Reverse engineering
Reversible
Review Review issues list Review leader
Review meeting Review summary report Reviewer Revise Revisions Revocation
Revoke command /
Revoked
Rewrite time
Rhythm
Rich Text Format (RTF)
Right outer join operation )(
Ring LAN
Ring topology
Ringing tone
Ripple effect
Risk ):( Risk analysis Risk avoidance Risk driver Risk estimation Risk factor Risk identification Risk item checklist Risk management
Risk management process
Risk Mitigation,
Monitoring AndManagement(RMMM)
Risk monitoring Risk projection Risk referent level RMI (Remote Method
Invocation)
Roaming
Roaming profiles
Robot visionRobotic tape library
Robots )( Robustness
ROLAP (RelationalOLAP)
OLAP
Role-Based AccessControl (RBAC)
Roll in
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 75/96
Roll out 70 Scalability
Roll out
Rollback
Rolled back
Roll-forward
Roll-up display
Root directory
Root file system Root partition
Rostering Rosters Rotational Delay (RD)
Rotational latency
Rotor
Round robin service
Round trip )(Round-robin review Round-robin scheduling
Round-trip propagation
Route
Route-caching table
Router(s) )(Routines )( Routing
Routing protocols
Routing header
Routing InformationProtocol (RIP)
Routing table
Row data types
Row-level triggers
RPC (Remote ProcedureCall)
RPC daemon RPC Rudimental, rudimentary Rule base Rule Identification
Markup Language (RIML)
Rule learning
Rule Structure MarkupLanguage (RSML)
Rule Triggering MarkupLanguage (RTML)
Rule-defined predicates
Rules Markup LanguageResearch
Running (state) )( Running key cipher
Run-time
Run-time condition
Runtime databaseprocessor
Run-time libraries
Run-time routine
Run-time support Run-time support system
S
Safe expression
Safe sequence
Safe state
Safety algorithm
Salesman problem
Salt
Sample assignments
Sampling algorithm
Sampling theorem )(SAN (Storage-Area
Networks)
Sandwich testing Satellite communication
Satellite microwave
Satellite(s) )(Satisfied constraints
Saturation
S-box S Scalability )(
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 76/96
SPLINE 71 Security
Scalable Platform forLarge InteractiveNetworkedenvironments(SPLINE)
Scalable scope
Scalar variable
Scale
Scan )(Scanrate
Scattering
Scenario
Scenario script
Scenario-based testing
Scene analysisSchedule(s)
)( Scheduler )(Schedules of transactions
Scheduling
Schema
Schema change statements
Schema construct
Schema evolution
Schema name
Schema-based constraints
Scheme )( Science Activity Planner
(SAP) Scientific rendezvous
Scope Scope of IPSec IPSec
Scoring metric / Scrambling
Script functions
Script(s) )(Scripting language
SCSI (Small ComputerStorage Interface)
SCSI initiator SCSI SCSI targets SCSI Scumware
SDL (Storage DefinitionLanguage)
Seal (v) )( Search path
Search trees
Searches
Second extended filesystem (ext2fs)
Second Normal Form(2NF)
Secondary actor Secondary indexes
Secondary storage
Secondary storage device
Second-chance algorithm
Second-chance page-replacement algorithm
Secret splitting
Secrete disclosure Secrete sharing
Section
Section object
Sector
Sector slipping
Sector sparing
Secure
Secure (v) )( Secure attention sequence
(Control-Alt-Delete)
Secure Hash Algorithm(SHA)
Secure hash functions
Secure hash standard
Secure Socket Layer(SSL)
Security
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 77/96
Security access token 72 Sensors
Security access token
Security Associations(SAS)
Security breaches
Security clearance
Security hole
Security ID (SID)
Security ParametersIndex (SPI)
Security referencemonitor
Security subsystem
Security testing Security threats
Seed (n)
Seek time
Segment
Segment base
Segment limit
Segment table
Segment(s) )(Segmentation
Segmentation And
Reassembly (SAR)layer
Segment-replacementalgorithms
Select clause ""Select operation )(Select-from-where block " ...
"...Selection condition
Selective
Selective REJect (SREJ)
Selective cell discard
Selective inheritance
Selective prediction
Selective reject ARQ
Selective survival
Selector )(
Self-activating code
Self-contained Self-contained routine
Self-describing data
Self-documentation Self-Organizing Pro-
cessing and StreamingArchitecture (SOPA)
Self-perpetuating )( Self-regulatory programs
Semantic
Semantic data modeling
Semantic domain Semantic knowledge Semantic networks
Semantic optimization
Semantic queryoptimization
Semantic Web
Semantics
Semaphore ):( Semaphore construct
Semiconductor memory
Semi-decidability
Semi-decidable
Semiformal
Semijoin
Semipermanent VCCs
Semistructured data
Senior engineer Sense key
Sense-code
Sense-code qualifier
Sensing
Sensitivity label
Sensitivity testing Sensor(s) )(
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 78/96
Sensorimotor cortex 73 Shielded twisted-pair
Sensorimotor cortex
Sensory filter
Separator
SEQUEL (StructuredEnglish QueryLanguage)
Sequence
Sequence diagrams
Sequence domain Sequence number
Sequence of operation
Sequence range Sequential access
Sequential access devices
Sequential device
Sequential patterns
Sequential specification Serial schedule
Serial schedules
Serializability
Serializable
Serialization graph
Serialization order
series
Server
Server crash and recovery
Server farms
Server Message-Block (SMB)
Server systems
Server-initiated approach
Server-side )( Service Access Point
(SAP)
Service Level Agreement(SLA)
Serviceability Service-oriented
Servlet
Session key
Session layer
Session space
Set operation
Set-at-a-time DML DML Set-at-a-time operations
Set-oriented dml DML Setter injection
Settings
Setup / Setup time
Shadow paging
Shadowing
Shaper
Share Shared )(Shared data )( Shared databases
)(Shared disks )( Shared libraries
Shared locks Shared memory )(Shared repository layer Shared subclass )(Shared subclasses
mappings
Shared variables )(Shared locks
Shareware
Sharing
Shell programming Shell script
Shells )( Shield
Shielded twisted-pair
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 79/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 80/96
Sleeping-barber problem 75 Sound
Sleeping-barber problem
Slide show presentations
Sliding window
Slope overload
Slot fillers
Slots )( Slotted aloha Aloha Slow cortical potential
Slow start
Slowscan
Small Computer StorageInterface (SCSI)
Small-area network
Smart card
Smoothing
SMP (SymmetricMultiprocessor)
SNapshot RefreshProcesses (SNPS)
Snapshots
Sniff (v)
Snowflake
Snowflake schema
SNPS (SNapshot RefreshProcesses)
Sockets )( Soft handoff )( Soft line break
Soft real-time system
)(Softbots
Softswitch
Software agent )( Software architecture )( Software configuration Software configuration
audit Software Configuration
Item (SCI) Software Configuration
Management (SCM)
Software damage Software Engineering
(SE) Software Engineering
Environment (SEE) Software engineering
institute capabilitymaturity model
Software equation Software librarian Software maintenance )( Software Maturity Index
(SMI) Software metrics Software metrics etiquette
Software patent Software procedure
Software ProcessImprovement (SPI)
Software QualityAssurance (SQA)
Software quality factor Software repository Software requirement
specification Software restructuring Software reusability
Software review Software risk Software risk components Software safety )( Software scope )( Software sizing Software system
independence Solid-state disks
Solution space Solvers )( Sombrero
Sophisticated users
Sorted file
Sound (v)
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 81/96
Soundness 76 Square brackets
Soundness
Source
Source code
Source file
Source format
Source listing Source quench packet
Source routing
Source/destination / Source/sink / Space / Space complexity
Space division switching
Spam
Spanned organization
Spanned records
Spanning tree
Spare sectors
Sparse
Sparse address space
Sparse files
Sparse indexes
Sparse polynomial Spatial applications
Spatial audio
Spatial databases
Spawn
Special purpose RDBMS DBMS
Specialization
Specialized servers
Special-purposestructured-lightdevices
Specification defect Specification(s) / ):
(
Specificity Spectral efficiency
Spectrum
Speech
Speech played backward
Spendable item Spiders
Spillover
Spindles
Spinlock
Spiral model Split-and-merge
Splitting
Spoofing
Spool
Spooling
Spread sheets
Spread spectrum
Spreader/despreader / )(Spreading code
Spreadsheet
Spurious tuples
Spy catcher
Spy eliminator
Spy sweeper
Spybots
Spying Spyware Spyware bot army
Spywareblaster
SQA plan SQL (Structured Query
Language)
SQL standards andcomponents
SQL
SQL transaction support SQL
Square brackets
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 82/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 83/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 84/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 85/96
Swapped 80 Tagged capability system
Swapped Swapped in ) ( Swapped out ) ( Swapping
Swap-space management
Switch(s) )(Switched communication
network
Switched Ethernet LAN
Switched network
Switched VirtualConnection (SVC)
Switching Switching hub
Switching node
Symbol table
Symbol(s) )(Symbolic link
Symetric encryption
Symmetric
Symmetric algorithm Symmetric
MultiProcessing(SMP)
SymmetricMultiProcessor (SMP)
Symmetric replication
Synchronization
Synchronization control Synchronized Multimedia
Integration Language(SMIL)
Synchronizing
Synchronous DigitalHierarchy (SDH)
Synchronous I/O / Synchronous Optical
Network (SONET)
Synchronous paradigm Synchronous transmission
Synchronous writes
Syndrome
Synergetic-energetic
Synonyms
Syntactic analysis
Syntactic domain
Syntactic knowledge Syntax )( Syntax summary
SYSGEN (SystemGENeration)
System analysis System analysts
System call
System code
System complexity System concept document System designers
System global scheduling
System image System link time
System lock tables
System log
System perception )( System programs
System specification System testing System utilities )( System virtual machine
System-development time
System-wide open-file
table
T
Tables dimension
Tag
Tagged capability system
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 86/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 87/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 88/96
Timestamping 83 Transform mapping
Timestamping / Time-to-live
Timing
TIN (Triangular IrregularNetwork)
TLB (Translation Look-Aside Buffer)
TLB hit ratio TLB TLB miss TLB
TLB reach TLB Token
Token bucket
Token bus
Token passing
Token ring
Tone
Tool Control Language(TCL)
Tool developers / Tools layer Tools Management
Service (TMS) Top-down
Top-down design Top-down design
methodology
Topology / Torus Total Cost of Ownership
(TCO) Total float Total participation
Total QualityManagement (TQM)
/
Total specialization
Touch-sensitive computerscreen
Tournament selection
Trace tapes
Traceability )( Tracks )(
Tractability / Tractable problem
Tractibility / Tradeoff
Tradeoffs
Trade-Related aspects of Intellectual PropertyrightS (TRIPS)
Traffic
Traffic analysis
Traffic conditioning
Traffic contract
Traffic management
Traffic policing
Traffic shaping
Trailer )(Training Training set
Transaction
Transaction center Transaction failures
Transaction file
Transaction flow Transaction rollback
Transaction servers
Transactional application
Transaction-oriented
Transactions processingsystem
Transactionsrecoverability
Transceiver (Transmitter/Receiver) ) / (Transducer
Transfer rate
Transfers Transform center Transform flow Transform mapping
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 89/96
Transformation rules 84 Tutorial
Transformation rules
Transformations
Transient objects
Transit center
Transition
Transition (in Transitionstate)
)(
Transition constraints
Translation-LookasideBuffer (TLB)
Transmission ControlProtocol (TCP)
Transmissionimpairments
Transmission media
Transmissive LCDdisplays
LCD Transmitter/receiver / Transparency
Transparent
Transparent link
Transponder / Transport Driver
Interface (TDI)
Transport layer
Transport Layer Security(TLS)
Transport/transmission / Transposition cipher
Trap
Trap door )(Trapdoor one-way
function
Tree structures
Tree topology
Tree-structured directory
Trialability
Triangular IrregularNetwork (TIN)
Triangular routing
Triangulation
Trigger
Triggers granularity
Triple encryption
Triple indirect block ) (
Trivial File TransferProtocol (TFTP)
Trivial MVD
Trojan code
Trojan horse
Trojan(s) )( Troubleshooting
True values
Truncate
Truncated
Truncating a file
Trunk
Trust
Trust Gauge (TG)
Trusted Computer Base(TCB)
Trustworthiness
Trustworthy
Truth values
TSR (Terminate And Stayresident)
TSR program TSR routine
Tuning
Tunnel
Tunnel (v)
Tuple
Tuple-based constraints
Turing machine
Turnaround time
Turnover Turnstiles
Tutorial
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 90/96
Twin GUI 85 Union type
Twin GUI
Twisted pair
Two-dimensional datatypes
Two-factor authentication
Two-handed-clock algorithm
Two-level directory
Two-level PSK PSK Two-phase commit
Two-phase lock ) (Two-Phase Locking (2PL)
protocol
Two-phase protocol
Two-phase terminationprotocol
Two-tier client/serverarchitecture
Two-way handshake
Two-way joins
Type constructor
Type hierarchy
Type inheritance
Type verification
Typeahead
Typing surface
Typographicalarrangements
U
UDP (User DatagramProtocol)
)(
UDP sockets UDP
Uiquifier
Umbrella activity Umbrella tasks UML (Universal Modeling
Language)
UML diagrams UML
Unacknowledgedconnectionless service
Unary operations
Unauthorized access
Unauthorized user
Unbalanced transmission
Unbounded-buffer
Unbuffered ) (
Uncertain
Uncertain evidence
Uncertainty
Unconfirmed service
Undeniable signature
Underlying layer
Understandability )(
Undo (T) T
Undo transaction
Undo/redo algorithm / Unicast
Unicity distance
Unidirectional
Unidirectionalassociations
Unification grammar
Unified buffer cache
Unified method Unified Process of
Software Development(UPSD)
Unified virtual memory
Unifier
UNiform Interface toCOmputingREsources(UNICORE)
Uniform Memory Access(UMA)
Uniform NamingConvention (UNC)
Uninformed search
Union compatible
Union operation
Union type
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 91/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 92/96
User File Directory 87 Versioning
User File Directory (UFD) User identifier )( User Interface (ui) User Interface
Development system(UID)
User interface layer User interface toolkit User mobility
) (
User mode
User model User rights
User scenario User threads
User’s model User-based Security
(USM) Model
User-Centered Design(UCD)
User-defined functions
User-defined functionssupport
User-defined object
User-defined signalhandler function
User-friendly
User-friendly interfaces
User-friendly interpreter
User-level threads
User-to-Network Interface (UNI)
User-to-user application
Utility/Utilities )( Utilization
Utterance
V
Valid
Valid
Valid state
Valid/Invalid bit
Validation
Validation queries
Validation set
Validation techniques
Validation testing Validator token
Validity
Value analysis Value sets of attributes
Value-added network
Variability )( Variable-length records
Variables
Variance
VCAB index array VACB
VCR (VideoCassetteRecorder)
VDL (View DefinitionLanguage)
Vector ):(Velocity of propagation
Vendor
Venn diagrams
Verifiability )(
VerificationVerification algorithm
Verification equation Verifier
Version
Version control )( Version graph
Versioning
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 93/96
Versions 88 Visualizer
Versions
Vertical fragmentation )(Vertical propagation
Very high data rateDigital SubscriberLine (VDSL)
Very Small ApertureTerminal (VSAT)
Very-Large-Scale-Integration (VLSI)
Vestigial Side Band (VSB)
Veterans VFS (Virtual File System)
Viable
Victim
Victim frame
Video
Video broadcastingsoftware
Video clip
Video controllers
Video sources
Video Surveillance andMonitoring (VSAM)Program
Videoconferencing
View
View Definition Language(VDL)
View integrationapproach
View materialization
View serializable
Views )( Violated constraints
Violations
Virtual channel
Virtual ChannelConnection (VCC)
Virtual Channel Identifier(VCI)
Virtual ChannelSwitching Function(VC-SW)
Virtual circuit
Virtual data
Virtual disk
Virtual LAN
Virtual Machine Monitor(VMM)
Virtual Machines (VM)
Virtual memory
Virtual Memory (VM)manager
Virtual memory paging
Virtual path
Virtual Path Connection
(VPC)Virtual Path Identifier
(VPI)
Virtual Path SwitchingFunction VP-SW
Virtual Private Network (VPN)
Virtual Reality ModelingLanguage (VRML)
Virtual relations
Virtual Storage AccessMethod (VSAM)
Virtual tablesVirtual-Address Control
Block (VACB)
Virtual-address space
Virtualization
Visibility
Vision Enabled Robotics(VER)
Vision-based action games
Vision-based interfaces
Visual cues )(
Visual elements
Visualization
Visualizer
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 94/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 95/96
7/30/2019 IT_Glossary- مسرد مصطلحات المعلوماتية
http://slidepdf.com/reader/full/itglossary- 96/96
S YRIAN C OMPUTER S OCIETY
. 5800
2000.
. 2000
: – )(
)( .
.
.
) 10 20(
.
– –
.
top related