Explore topic-wise fullforms in Information Technology

This section includes 1268 fullforms, each offering curated multiple-choice questions to sharpen your Information Technology knowledge and support exam preparation. Choose a topic below to get started.

701.

OMG meaning in Information Technology ?

Answer» What is Object Management Group mean?

The Object Management Group (OMG) is a computer industry standards consortium. OMG Task Forces develop enterprise integration standards for a range of technologies.

reference
Full Form Category
Omega Airport Code
O M Group, Incorporated Business
Officine Meccaniche Gonzaga Business
Omg Business
OPMEDIC Group Incorporated (de-listed) Business
Online Marketing Gurus Business
Onsite Management Group Business
Our Mighty God Community
Online Media Generation Community
Oh My Grohl Community
Outstanding Music Genius Community
Object Model Guide Computing
Open Management Group Computing
Online Merchants Guild Computing
OMG Network Cryptocurrency
Oppose Microsoft Group General
Ostriches Mooning George General
Old Man Gloom General
Only My Green General
Oh, My Gabe General
Orange Mice Grinds General
Octopus Makes Goop General
Oh My Gourd General
Oh, My Gluesticks! General
Oh my, gerbils General
Officially Miss Guided General
One More Generation General
Oxford Metrics General
Oh My Gracious General
Oxford Metrics Group General
Organic Meets Good General
Our Mahatma Gandhi General
Overly Managed Garden General
Oceans Melting Greenland General
Oligodendrocyte myelin glycoprotein General
One Man Gang General
Outta My Garden General
Oak Mosaic Golding General
Operational Manoeuvre Group General
Original Milwaukee Group General
Oh My Girl General
Oh my Gould General
One More Grape General
Outlaw Motorcycle Gang General
Ocean Melting Greenland General
Oh Middle Grade General
Oh My Greatness General
Operations Managers Group General
On My Grind General
Omnipresent Meatball God General
Original Mac Games General
Ocean Magic Greatness General
Ocean Modeling Group General
Ohlone Math Gateway General
Owl Moon Gang General
Old Man Goose General
Omnicom Media Group General
Outlaw Motorcycle Gangs General
Outrageous Millennial Girls General
Obama Must Go! Governmental
Object Management Group Information Technology
Oh, Mein Gott! International
Oh My Gandhi International
Oh My Greek International
Oh My Gobstopper Internet
One More Game Internet
Oh My Goat! Internet
Oh My Goddess Internet
Old Mean and Grouchy/Grumpy Internet
Order More Gravy Internet
Oh Man Guts Internet
Oh my god Internet Slang
Observed Minus Gridded Maths
Ohio Medical Group Medical
Ocular Myasthenia Gravis Medical
Organisms Genetically Modified Medical
Oh My Gosh Messaging
Oh My Goodness Messaging
Operational Maneuver Group Military and Defence
Operation Market- Garden Military and Defence
704.

NetBIOS meaning in Information Technology ?

Answer» What is Network Basic Input/Output System mean?

NetBIOS () is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol. Older operating systems ran NetBIOS over IEEE 802.2 and IPX/SPX using the NetBIOS Frames (NBF) and NetBIOS over IPX/SPX (NBX) protocols, respectively. In modern networks, NetBIOS normally runs over TCP/IP via the NetBIOS over TCP/IP (NBT) protocol. This results in each computer in the network having both an IP address and a NetBIOS name corresponding to a (possibly different) host name. NetBIOS is also used for identifying system names in TCP/IP(Windows). Simply saying, it is a protocol that allows communication of files and printers through the Session Layer of the OSI Model in a LAN.

reference nan
705.

NCQ meaning in Information Technology ?

Answer» What is Native Command Queuing mean?

In computing, Native Command Queuing (NCQ) is an extension of the Serial ATA protocol allowing hard disk drives to internally optimize the order in which received read and write commands are executed. This can reduce the amount of unnecessary drive head movement, resulting in increased performance (and slightly decreased wear of the drive) for workloads where multiple simultaneous read/write requests are outstanding, most often occurring in server-type applications.

reference
706.

NFA meaning in Information Technology ?

Answer» What is Nondeterministic Finite Automaton mean?

In automata theory, a finite-state machine is called a deterministic finite automaton (DFA), if

each of its transitions is uniquely determined by its source state and input symbol, andreading an input symbol is required for each state transition.

A nondeterministic finite automaton (NFA), or nondeterministic finite-state machine, does not need to obey these restrictions. In particular, every DFA is also an NFA. Sometimes the term NFA is used in a narrower sense, referring to an NFA that is not a DFA, but not in this article.

Using the subset construction algorithm, each NFA can be translated to an equivalent DFA; i.e., a DFA recognizing the same formal language.Like DFAs, NFAs only recognize regular languages.

NFAs were introduced in 1959 by Michael O. Rabin and Dana Scott, who also showed their equivalence to DFAs. NFAs are used in the implementation of regular expressions: Thompson's construction is an algorithm for compiling a regular expression to an NFA that can efficiently perform pattern matching on strings. Conversely, Kleene's algorithm can be used to convert an NFA into a regular expression (whose size is generally exponential in the input automaton).

NFAs have been generalized in multiple ways, e.g., nondeterministic finite automata with ε-moves, finite-state transducers, pushdown automata, alternating automata, ω-automata, and probabilistic automata.Besides the DFAs, other known special cases of NFAsare unambiguous finite automata (UFA)and self-verifying finite automata (SVFA).

reference
Full Form Category
Norwich Free Academy Academic & Science
National Fire Academy's Academic & Science
Newburgh Free Academy Academic & Science
National Flight Academy Academic & Science
Net Foreign Assets Banking
National Franchisee Association Business
NALAC Fund for the Arts Business
Net Floor Area Business
Northern Finance Association Business
National Fibromyalgia Association Community
National Flute Association Community
Now And Forever Angels Community
National Federation Application Community
National Fireworks Association Community
National Futures Association's Community
National Forensic Association Community
Nondeterministic Finite Automata Computing
Network File Access Computing
Name Field Address Computing
NFTFundArt Cryptocurrency
No Freakin Access General
New Farmers of America General
N F A No Fixed Abode General
National Food Authority General
New Framework for Assessment General
Net Free Area General
New Farmers of American General
National Fire Adjustment General
Net Foreign Asset General
Near Field Array General
National Firearms Agreement General
Northern Frights Award General
New Friends of Agriculture General
Neo Finding Automaton General
Not F***ing Around General
New Face Appreciation General
Not Formally Accepted General
Nondeterministic Finite Au General
Noction Flow Analyzer General
Nissan Fast Software General
National Fire Academy Governmental
National Firearms Act Governmental
National Food Administration Governmental
No Fixed Address Governmental
No Fixed Abode Governmental
National Financial Alliance Governmental
National Firearm Act Governmental
Nashville Fashion Alliance Governmental
Nation Firearms Act Governmental
National Forensic Academy Governmental
No Further Actions Governmental
Nondeterministic Finite Automaton Information Technology
No Future Advancement Jobs
Nursing Facility Administrator Medical
No Future Ambition Messaging
No-fire Area Military and Defence
No Further Action Military and Defence
National Football Academies Sports
Northeastern Football Alliance Sports
National Football Association Sports
National Football Alliance Sports
Nigeria Football Association Sports
Not for Anglers Sports
National Federation of Anglers Sports
National Futures Association Stock Exchange
Net Financial Assets Stock Exchange
707.

NGSCB meaning in Information Technology ?

Answer» What is Next-Generation Secure Computing Base mean?

The Next-Generation Secure Computing Base (NGSCB; codenamed Palladium and also known as Trusted Windows') was a software architecture designed by Microsoft which aimed to provide users of the Windows operating system with better privacy, security, and system integrity. NGSCB was the result of years of research and development within Microsoft to create a secure computing solution that equaled the security of closed platforms such as set-top boxes while simultaneously preserving the backward compatibility, flexibility, and openness of the Windows operating system. Microsoft's primary stated objective with NGSCB was to "protect software from software."

Part of the Trustworthy Computing initiative when unveiled in 2002, NGSCB was to be integrated with Windows Vista, then known as "Longhorn." NGSCB relied on hardware designed by the Trusted Computing Group to produce a parallel operation environment hosted by a new hypervisor (referred to as a sort of kernel in documentation) called the "Nexus" that existed alongside Windows and provided new applications with features such as hardware-based process isolation, data encryption based on integrity measurements, authentication of a local or remote machine or software configuration, and encrypted paths for user authentication and graphics output. NGSCB would facilitate the creation and distribution of digital rights management (DRM) policies pertaining the use of information.

NGSCB was subject to much controversy during its development, with critics contending that it would impose restrictions on users, enforce vendor lock-in, and undermine fair use rights and open-source software. It was first demonstrated by Microsoft at WinHEC 2003 before undergoing a revision in 2004 that would enable earlier applications to benefit from its functionality. Reports indicated in 2005 that Microsoft would change its plans with NGSCB so that it could ship Windows Vista by its self-imposed deadline year, 2006; instead, Microsoft would ship only part of the architecture, BitLocker, which can optionally use the Trusted Platform Module to validate the integrity of boot and system files prior to operating system startup. Development of NGSCB spanned approximately a decade before its cancellation, the lengthiest development period of a major feature intended for Windows Vista.

NGSCB differed from technologies Microsoft billed as "pillars of Windows Vista"—Windows Presentation Foundation, Windows Communication Foundation, and WinFS—during its development in that it was not built with the .NET Framework and did not focus on managed code software development. NGSCB has yet to fully materialize; however, aspects of it are available in features such as BitLocker of Windows Vista, Measured Boot of Windows 8, Certificate Attestation of Windows 8.1, and Device Guard of Windows 10.

reference
708.

NEXT meaning in Information Technology ?

Answer»

INFO: Full form for NEXT is Near-End CrossTalk in Information Technology category
NEXT also has other full forms in other categories mentioned below.

709.

NIST meaning in Information Technology ?

Answer» What is National Institute of Standards and Technology mean?

The National Institute of Standards and Technology (NIST) is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into laboratory programs that include nanoscale science and technology, engineering, information technology, neutron research, material measurement, and physical measurement. From 1901 to 1988, the agency was named the National Bureau of Standards.

reference
710.

TCP/IP meaning in Information Technology ?

Answer» What is Transmission Control Protocol/Internet Protocol mean?

The Internet protocol suite, commonly known as TCP/IP, is the set of communications protocols used in the Internet and similar computer networks. The current foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

During its development, versions of it were known as the Department of Defense (DoD) model because the development of the networking method was funded by the United States Department of Defense through DARPA. Its implementation is a protocol stack.

The Internet protocol suite provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received. This functionality is organized into four abstraction layers, which classify all related protocols according to each protocol's scope of networking. From lowest to highest, the layers are the link layer, containing communication methods for data that remains within a single network segment (link); the internet layer, providing internetworking between independent networks; the transport layer, handling host-to-host communication; and the application layer, providing process-to-process data exchange for applications.

The technical standards underlying the Internet protocol suite and its constituent protocols are maintained by the Internet Engineering Task Force (IETF). The Internet protocol suite predates the OSI model, a more comprehensive reference framework for general networking systems.

reference nan
711.

TNC meaning in Information Technology ?

Answer» What is Terminal Node Controller mean?

A terminal node controller (TNC) is a device used by amateur radio operators to participate in AX.25 packet radio networks. It is similar in function to the Packet Assembler/Disassemblers used on X.25 networks, with the addition of a modem to convert baseband digital signals to audio tones.

The first TNC, the VADCG board, was originally developed by Doug Lockhart, VE7APU, of Vancouver, British Columbia.

Amateur Radio TNCs were first developed in 1978 in Canada by the Montreal Amateur Radio Club and the Vancouver Area Digital Communications group. These never gained much popularity because only a bare printed circuit board was made available and builders had to gather up a large number of components.

In 1983, the Tucson Amateur Packet Radio (TAPR) association produced complete kits for their TNC-1 design. This was later available as the Heathkit HD-4040. A few years later, the improved TNC-2 became available, and it was licensed to commercial manufacturers such as MFJ.

In 1986, the improved "TNC+" was designed to run programs and protocols developed for the original TNC board.TNC+ also included an assembler and a version of Forth (STOIC), which runs on the TNC+ itself, to support developing new programs and protocols.

reference
Full Form Category
Tactical Nuclear Cossie Academic & Science
Tin City (ak) Airport Code
Trans National Corporation Business
Trade Negotiations Committee Business
Touch Numerical Controls Business
Total Nutrition Centre Business
Transnational Company Business
Transol Corporation Ltd Business
Trade Nation Corporation Business
Theatres National Committee Community
Transient Non Community Community
Theatre Needs Courage Community
Total Numerical Control Computing
Threaded Neil Concelman Computing
Total Network Cost Computing
Tarantella Native Client Computing
Trusted Network Connect Computing
The Networking Center Computing
Threaded Navy Connector Computing
TNC16 Networking Conference Computing
TNC Coin Cryptocurrency
Threaded Neill Concelman Electronics
Terminal Node Control General
Translational Neuroscience Center General
Tsunami National Contacts General
Transportation Network Company General
True North Collection General
Touch Numerical Co General
Total Net Cost General
Turtle Neck Clan General
Nature Conservancy General
Ta Nehisi Coates General
Trans National Corporations General
The Nature General
Tuesday Night Classics General
Tomorrow Never Comes General
The Nightmare Continues General
Trusted Network Communications General
Transport network companies General
Trinity Network Credit General
Tnc the nature conservancytnc General
Twist and Curl General
The Nature Conservancy Governmental
The New Constitution Governmental
TransNational Crime Governmental
Transportation Network Companies Governmental
Terminal Node Controller Information Technology
Threaded Neill-Concelman connector Information Technology
Too Numerous to Count Medical
Total Neutrophil Count Medical
Troponin C Medical
The Newbie Club Messaging
Theater Network Operations (netops) Center Military and Defence
Terminal-node Computer Networking
Tin City, Alaska USA Regional
712.

TPF meaning in Information Technology ?

Answer» What is Transaction Processing Facility mean?

Transaction Processing Facility (TPF) is an IBM real-time operating system for mainframe computers descended from the IBM System/360 family, including zSeries and System z9.

TPF delivers fast, high-volume, high-throughput transaction processing, handling large, continuous loads of essentially simple transactions across large, geographically dispersed networks.

While there are other industrial-strength transaction processing systems, notably IBM's own CICS and IMS, TPF's specialty is extreme volume, large numbers of concurrent users, and very fast response times. For example, it handles VISA credit card transaction processing during the peak holiday shopping season.

The TPF passenger reservation application PARS, or its international version IPARS, is used by many airlines. PARS is an application program; TPF is an operating system.

One of TPF's major optional components is a high performance, specialized database facility called TPF Database Facility (TPFDF).

A close cousin of TPF, the transaction monitor ALCS, was developed by IBM to integrate TPF services into the more common mainframe operating system MVS, now z/OS.

reference
Full Form Category
The Third Party Fund Business
Technical and Professional Training Business
Taliesin Pty Business
The Pharmacy Foundation Business
Third Party Fund Business
Turkish Philanthropy Funds Business
The Peregrine Fund Community
Teens Praise Fellowship Community
Texas Pinball Festival Community
Tiny Personal Firewall Computing
Three-phase Filter Electronics
Downloadable Pcl Soft Font File (hijaak) File Type
Tissue Procurement Facility General
Traditional Personnel Function General
Transcript Plate Files General
The Perfect Face General
Theodore Payne Foundation General
Tiling Path File General
Transmission Priority Field General
Tal Package Fielding General
True Pareto Front General
Taper Per Foot General
Trans Pacific Foods General
Tiered Pricing Framework General
Toyota Prius Forum General
Truck Parking Facility General
Trailer Parking Facility General
Terrestrial Planet Finder General
The Perl Foundation General
Texas Presbyterian Foundation General
Targets Perpetually Frightened General
True Positive Fraction General
Tibial Plateau Fracture General
The Promotions Factory General
Triple Pattern Fragments General
Tactical Patrol Force General
Two Phase Flow General
Triangular Possibility Function General
Transports publics fribourgeois General
To Prison Fast Governmental
Tooting Popular Front Governmental
Transition Planning Form Governmental
Transportation Pooled Fund Governmental
TARAPITH ROAD Indian Railway Station
Transaction Processing Facility Information Technology
Total Package Fielding Military and Defence
Two Photon Fluorescence Physics Related
Terminal Phase Finalization (braking) Space Science
Terminal Phase Finish Space Science
Transfer Phase Final Space Science
Tug Processing Facility Space Science
Total Points For Sports
Team Play First Sports
713.

TCU meaning in Information Technology ?

Answer» What is Telecommunication Control Unit mean?

A telecommunication control unit (TCU), line control unit, or terminal control unit (although terminal control unit may also refer to a terminal cluster controller) is a Front-end processor for mainframes and some minicomputers which supports attachment of one or more telecommunication lines. TCUs free processors from handling the data coming in and out of RS-232 ports. The TCU can support multiple terminals, sometimes hundreds. Many of these TCUs can support RS-232 when it is required, although there are other serial interfaces as well.

The advent of ubiquitous TCP/IP has reduced the need for telecommunications control units.

reference
Full Form Category
Texas Christian University Academic & Science
Tecumseh Council University Academic & Science
Tufts Community Union Academic & Science
Towering CUmulus Academic & Science
Texas Christian UniversityROSE Academic & Science
Tinned Copper Conductor Academic & Science
Thaba Nchu Airport Code
Thompson Center Ugalde Business
Travis Credit Union Business
Toledo Credit Union Business
Trust Certificate Unit Business
Teachers Credit Union Community
Transmission Control Unit Computing
Turbo C Utilities Computing
Timing and Control Unit Computing
Trunk Coupling Unit Computing
Thermal Control Unit Electronics
Technical Charitable University General
Texas Criminal University General
Texas Chainsaw University General
The Come Up General
Tall Center Unused General
True Color Unit General
Texas C U General
Tactical Combat Uniform General
Telematics Control Unit General
Tal Colour Unit General
True Colour Unit General
Tactical Communications Unit General
TACAN Control Unit General
Throttle Control Unit General
Trailer Connection Unit General
Trailer Control Unit General
Time Control Unit General
Taxi Cab Union General
Telematics Communication Unit General
Through Car Unit General
Transportation Control Unit Governmental
Transportation, Communication, and Utilities Governmental
True Colour Units Governmental
Transportation Communications And Utilities Governmental
Cal Fire's Tuolumne-Calaveras Unit Governmental
Telecommunication Control Unit Information Technology
Transitional Care Unit Medical
Transportable Computer Unit Military and Defence
Tactical Computer Unit Military and Defence
Terminal Control Unit Military and Defence
Tape Control Unit Space Science
Three Camming Unit Stock Exchange
714.

TNC meaning in Information Technology ?

Answer» What is Threaded Neill-Concelman connector mean?

The TNC connector (acronym of "Threaded Neill–Concelman") is a threaded version of the BNC connector.

reference
Full Form Category
Tactical Nuclear Cossie Academic & Science
Tin City (ak) Airport Code
Trans National Corporation Business
Trade Negotiations Committee Business
Touch Numerical Controls Business
Total Nutrition Centre Business
Transnational Company Business
Transol Corporation Ltd Business
Trade Nation Corporation Business
Theatres National Committee Community
Transient Non Community Community
Theatre Needs Courage Community
Total Numerical Control Computing
Threaded Neil Concelman Computing
Total Network Cost Computing
Tarantella Native Client Computing
Trusted Network Connect Computing
The Networking Center Computing
Threaded Navy Connector Computing
TNC16 Networking Conference Computing
TNC Coin Cryptocurrency
Threaded Neill Concelman Electronics
Terminal Node Control General
Translational Neuroscience Center General
Tsunami National Contacts General
Transportation Network Company General
True North Collection General
Touch Numerical Co General
Total Net Cost General
Turtle Neck Clan General
Nature Conservancy General
Ta Nehisi Coates General
Trans National Corporations General
The Nature General
Tuesday Night Classics General
Tomorrow Never Comes General
The Nightmare Continues General
Trusted Network Communications General
Transport network companies General
Trinity Network Credit General
Tnc the nature conservancytnc General
Twist and Curl General
The Nature Conservancy Governmental
The New Constitution Governmental
TransNational Crime Governmental
Transportation Network Companies Governmental
Terminal Node Controller Information Technology
Threaded Neill-Concelman connector Information Technology
Too Numerous to Count Medical
Total Neutrophil Count Medical
Troponin C Medical
The Newbie Club Messaging
Theater Network Operations (netops) Center Military and Defence
Terminal-node Computer Networking
Tin City, Alaska USA Regional
715.

TLA meaning in Information Technology ?

Answer» What is Three-Letter Acronym mean?

A three-letter acronym (TLA), or three-letter abbreviation, is an abbreviation consisting of three letters. These are usually the initial letters of the words of the phrase abbreviated, and are written in capital letters (upper case); three-letter abbreviations such as etc. and Mrs. are not three-letter acronyms, but "TLA" itself is a TLA (an example of an autological abbreviation).

Most three-letter abbreviations are not, strictly, acronyms, but rather initialisms: all the letters are pronounced as the names of letters, as in APA AY-pee-AY. Some are true acronyms, pronounced as a word: as with computed axial tomography, for example, CAT is almost always pronounced as the animal's name () in "CAT scan". Even the initialisms are however considered three-letter acronyms, because that term appeared first in widespread use, and is overwhelmingly popular today.

reference
Full Form Category
Third Language Acquisition Academic & Science
Total Learning Architecture Academic & Science
The Language Archive Academic & Science
Three Letter Abbreviation Academic & Science
Truly Liable Asset Accounts and Finance
Teller (ak) Airport Code
Top Level Aggregation Business
Tax Lien Associates Business
Technology Leadership Awards Community
Teaching and Learning Assistant Community
Tamil Literary Association, VIT University Community
Theatre of Living Arts Community
Texas Library Association Community
Theatre Library Association Community
Tennessee Library Association Community
Teaching Learning Academy Community
The Learning Accelerator Community
True Love Always Community
Tadpole Liberation Army Community
Texian Legacy Association Community
Takerus Lost Angel Community
The Love Artists Community
Trial Lawyers Association Community
Transitional Learning Academy Community
Teaching Learning Assessment Community
Theatre of the Living Arts in Philadelphia Community
Thermal Leadless Array Computer Hardware
Top Level Assembly Computing
Technology Licensing Agreement Computing
True Logarithmic Amplifier Computing
Time Since Last Access Computing
Top Layer Aggregation Computing
Technology License Agreement Computing
Telex Line Adapter Computing
Tibetan Literature and Art Educational Degree
Tube Leveling Amplifier Electronics
Transmission Line Advanced Electronics
Thrust Lever Angle General
Thread Local Area General
Transitional Living Areas General
Turtles Linger Afterwards General
Titty Lickers Anonymous General
Targeted Locus Amplification General
Tech Launch Arizona General
Transformational License Agreement General
Thin Layer Activation General
Three Letter Acronyms General
Trinidad Lake Asphalt General
The Last Alliance General
Two Letter Acronym General
Technical License Agreement General
Transport for London Authority General
Traffic Light Assist General
Truck Loggers Association General
Touring Luxury Automatic General
Total Lab Automation General
Transportation Lawyers Association Governmental
Territorial Local Authority Governmental
Temporary Living Allowance Governmental
Three-Letter Agency Governmental
Timber Licensee Agreement Governmental
TITVALA Indian Railway Station
Three-Letter Acronym Information Technology
translumbar aortogram Medical
translumbar aortography Medical
transluminal angioplasty Medical
Tumescent Local Anaesthesia Medical
Theta-Like Activity Medical
Thymus Leukaemia Antigen Medical
Time-Limited Admission Medical
Turrel Lock Assembly Military and Defence
Temporary Lodging Allowance Military and Defence
Transport Layer Architecture Networking
Top Level Architecture Networking
Two Level Analysis Physics Related
Temporal Logic of Actions Physics Related
Teller, Alaska USA Regional
Text Link Ads Softwares
Toyota Landcruiser Association Sports
Training Level Assignment Sports
716.

TROFF meaning in Information Technology ?

Answer»

INFO: Full form for TROFF is Trace Off in Information Technology category
TROFF also has other full forms in other categories mentioned below.

718.

WYSIWYG meaning in Information Technology ?

Answer» What is What You See Is What You Get mean?

In computing, WYSIWYG ( WIZ-ee-wig), an acronym for What You See Is What You Get, is a system in which editing software allows content to be edited in a form that resembles its appearance when printed or displayed as a finished product, such as a printed document, web page, or slide presentation.

reference
719.

WWN meaning in Information Technology ?

Answer» What is World Wide Name mean?

A World Wide Name (WWN) or World Wide Identifier (WWID) is a unique identifier used in storage technologies including Fibre Channel, Parallel ATA, Serial ATA, NVM Express, SCSI and Serial Attached SCSI (SAS).

A WWN may be employed in a variety of roles, such as a serial number or for addressability; for example, in Fibre Channel networks, a WWN may be used as a WWNN (World Wide Node Name) to identify an endpoint, or a WWPN (World Wide Port Name) to identify an individual port on a switch. Two WWNs which do not refer to the same thing should always be different even if the two are used in different roles, i.e. a role such as WWPN or WWNN does not define a separate WWN space. The use of burned-in addresses and specification compliance by vendors is relied upon to enforce uniqueness.

reference
720.

WZC meaning in Information Technology ?

Answer» What is Wireless Zero Configuration mean?

Wireless Zero Configuration (WZC), also known as Wireless Auto Configuration, or WLAN AutoConfig, is a wireless connection management utility included with Microsoft Windows XP and later operating systems as a service that dynamically selects a wireless network to connect to based on a user's preferences and various default settings. This can be used instead of, or in the absence of, a wireless network utility from the manufacturer of a computer's wireless networking device. The drivers for the wireless adapter query the NDIS Object IDs and pass the available network names (SSIDs) to the service. The service then lists them in the user interface on the Wireless Networks tab in the connection's Properties or in the Wireless Network Connection dialog box accessible from the notification area. A checked (debug) build version of the WZC service can be used by developers to obtain additional diagnostic and tracing information logged by the service.

reference
721.

XAG meaning in Information Technology ?

Answer»

INFO: Full form for XAG is XML Accessibility Guidelines in Information Technology category
XAG also has other full forms in other categories mentioned below.

722.

XAML meaning in Information Technology ?

Answer»

INFO: Full form for XAML is eXtensible Application Markup Language in Information Technology category
XAML also has other full forms in other categories mentioned below.

723.

XDMCP meaning in Information Technology ?

Answer» What is X Display Manager Control Protocol mean?

In the X Window System, an X display manager is a graphical login manager which starts a login session on an X server from the same or another computer.

A display manager presents the user with a login screen. A session starts when a user successfully enters a valid combination of username and password.

When the display manager runs on the user's computer, it starts the X server before presenting the user the login screen, optionally repeating when the user logs out. In this condition, the DM realizes in the X Window System the functionality of getty and login on character-mode terminals. When the display manager runs on a remote computer, it acts like a telnet server, requesting username and password and starting a remote session.

X11 Release 3 introduced display managers in October 1988 with the aim of supporting the standalone X terminals, just coming onto the market. Various display managers continue in routine use to provide a graphical login prompt on standalone computer workstations running X. X11R4 introduced the X Display Manager Control Protocol (XDMCP) in December 1989 to fix problems in the X11R3 implementation.

reference
724.

XTF meaning in Information Technology ?

Answer» What is eXtended Triton Format mean?


eXtended Triton Format (XTF) is a file format developeded by Triton Imaging, Inc for recording hydrographic survey data. XTF is the most commonly used format for this type of information in the hydrographic survey industry. XTF supports sources including sidescan sonar, shallow seismic and multibeam bathymetry, as well as associated position and altitude information.

reference
725.

XUL meaning in Information Technology ?

Answer» What is XML User Interface Language mean?

XUL ( ZOOL), which stands for XML User Interface Language, is a user interface markup language developed by Mozilla. XUL is an XML dialect for writing graphical user interfaces, enabling developers to write user interface elements in a manner similar to web pages.

XUL applications rely on the Mozilla codebase (or a fork of it); the most prominent example is the Firefox web browser. However, in recent years, Mozilla has been reducing the usage of XUL in Firefox. The most notable example is the removal of add-on customization. Firefox originally permitted add-ons to extensively alter its user interface via custom XUL code, but this capability was removed in 2017 and replaced with the less-permissive WebExtensions API. Several forks of Firefox, such as Pale Moon, Basilisk, and Waterfox, retain support for XUL add-ons.

reference
726.

XVGA meaning in Information Technology ?

Answer»

INFO: Full form for XVGA is Extended Video Graphics Adapter in Information Technology category
XVGA also has other full forms in other categories mentioned below.

727.

YACC meaning in Information Technology ?

Answer» What is Yet Another Compiler Compiler mean?

Yacc (Yet Another Compiler-Compiler) is a computer program for the Unix operating system developed by Stephen C. Johnson. It is a Look Ahead Left-to-Right (LALR) parser generator, generating a LALR parser (the part of a compiler that tries to make syntactic sense of the source code) based on a formal grammar, written in a notation similar to Backus–Naur Form (BNF). Yacc is supplied as a standard utility on BSD and AT&T Unix. GNU-based Linux distributions include Bison, a forward-compatible Yacc replacement.

reference
728.

Y2K meaning in Information Technology ?

Answer»

INFO: Full form for Y2K is Year Two Thousand in Information Technology category
Y2K also has other full forms in other categories mentioned below.

Full Form Category
Year 2000 Electronics
Year Two Thousand (2000) General
Year Two Thousand Information Technology
729.

YAAF meaning in Information Technology ?

Answer»

INFO: Full form for YAAF is Yet Another Application Framework in Information Technology category
YAAF also has other full forms in other categories mentioned below.

730.

YaST meaning in Information Technology ?

Answer» What is Yet another Setup Tool mean?

YaST (Yet another Setup Tool) is a Linux operating system setup and configuration tool.

YaST is featured in the openSUSE Linux distribution, as well as in SUSE's derived commercial distributions. It is also part of the defunct United Linux.

YaST features tools that can configure many aspects of the system.

YaST was released first in April 1995. The first SuSE distribution that included YaST was released in May 1996. YaST was re-written in 1999 and included first in SuSE Linux 6.3 as only an installer. YaST2 was added to the desktop in SuSE Linux 6.4 and co-existed with YaST1 until YaST1's removal in SuSE Linux 8.0.

reference
731.

ZCAV meaning in Information Technology ?

Answer» What is Zone Constant Angular Velocity mean?

In computer storage, zone bit recording (ZBR) is a method used by disk drives to optimise the tracks for increased data capacity. It does this by placing more sectors per zone on outer tracks than on inner tracks. This contrasts with other approaches, such as constant angular velocity (CAV) -drives, where the number of sectors per track are the same.On a disk consisting of roughly concentric tracks – whether realized as separate circular tracks or as a single spiral track – the physical track length (circumference) is increased as it gets farther from the centre hub.

The inner tracks are packed as densely as the particular drive's technology allows. The packing of the rest of the disks is changed depending on the type of disk.

With a CAV-drive the data on the outer tracks are the same angular width of those in the centre, and so less densely packed. Using ZBR instead, the inner zoning is used to set the read/write rate, which is the same for other tracks. This permits the drive to have more bits stored in the outside tracks compared to the inner ones. Storing more bits per track equates to achieving a higher total data capacity on the same disk area.

However, ZBR influences other performance characteristics of the hard disk. In the outer most tracks, data will have the highest data transfer rate. Since both hard disks and floppy disks typically number their tracks beginning at the outer edge and continuing inward, and since operating systems typically fill the lowest-numbered tracks first, this is where the operating system typically stores its own files during its initial installation onto an empty drive. Testing disk drives when they are new or empty after defragmenting them with some benchmarking applications will often show their highest performance. After some time, when more data are stored in the inner tracks, the average data transfer rate will drop, because the transfer rate in the inner zones is slower; this, combined with the head's longer stroke and possible fragmentation, may give the impression of the disk drive slowing down over time.

Some other ZBR drives, such as the 800 kilobyte 3.5" floppy drives in the Apple IIGS and older Macintosh computers, don't change the data rate but rather spin the medium slower when reading or writing outer tracks, thus approximating the performance of constant linear velocity drives.

reference
732.

ZIF meaning in Information Technology ?

Answer» What is Zero Insertion Force mean?

Zero insertion force (ZIF) is a type of IC socket or electrical connector that requires very little force for insertion. With a ZIF socket, before the IC is inserted, a lever or slider on the side of the socket is moved, pushing all the sprung contacts apart so that the IC can be inserted with very little force - generally the weight of the IC itself is sufficient and no external downward force is required. The lever is then moved back, allowing the contacts to close and grip the pins of the IC. ZIF sockets are much more expensive than standard IC sockets and also tend to take up a larger board area due to the space taken up by the lever mechanism. Typically, they are only used when there is a good reason to do so.

reference
733.

ZISC meaning in Information Technology ?

Answer» What is Zero Instruction Set Computer mean?

No instruction set computing (NISC) is a computing architecture and compiler technology for designing highly efficient custom processors and hardware accelerators by allowing a compiler to have low-level control of hardware resources.

reference
734.

ZCS meaning in Information Technology ?

Answer» What is Zero Code Suppression mean?

Modified AMI codes are a digital telecommunications technique to maintain system synchronization. Alternate mark inversion (AMI) line codes are modified by deliberate insertion of bipolar violations. There are several types of modified AMI codes, used in various T-carrier and E-carrier systems.

reference
735.

ZOI meaning in Information Technology ?

Answer» What is Zero One Infinity mean?

The Zero one infinity (ZOI) rule is a rule of thumb in software design proposed by early computing pioneer Willem van der Poel. It argues that arbitrary limits on the number of instances of a particular type of data or structure should not be allowed. Specifically, an entity should either be forbidden entirely, only one should be allowed, or any number of them should be allowed. Although various factors outside that particular software could limit this number in practice, it should not be the software itself that puts a hard limit on the number of instances of the entity.

Allow none of foo, one of foo, or any number of foo.

The only reasonable numbers are zero, one and infinity.

Examples of this rule may be found in the structure of many file systems' directories (also known as folders):

0 – The topmost directory has zero parent directories; that is, there is no directory that contains the topmost directory.1 – Each subdirectory has exactly one parent directory (not including shortcuts to the directory's location; while such files may have similar icons to the icons of the destination directories, they are not directories at all).∞ (infinity) – Each directory, whether the topmost directory or any of its subdirectories, according to the file system's rules, may contain any number of files or subdirectories. Practical limits to this number are caused by other factors, such as space available on storage media and how well the computer's operating system is maintained.

In real-world software design, violations of this rule of thumb are common. For example, the FAT16 file system imposes a limit of 65,536 (i.e. 216) files to a directory.

reference
736.

ZOPE meaning in Information Technology ?

Answer»

INFO: Full form for ZOPE is Z Object Publishing Environment in Information Technology category
ZOPE also has other full forms in other categories mentioned below.

737.

ADO.NET meaning in Information Technology ?

Answer»

INFO: Full form for ADO.NET is Activex Data Objects + .net (framework) in Information Technology category

nan
738.

PKC meaning in Information Technology ?

Answer» What is Public Key Cryptography mean?

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys. Each pair consists of a public key (which may be known to others) and a private key (which may not be known by anyone except the owner). The generation of such key pairs depends on cryptographic algorithms which are based on mathematical problems termed one-way functions. Effective security requires keeping the private key private; the public key can be openly distributed without compromising security.

In such a system, any person can encrypt a message using the intended receiver's public key, but that encrypted message can only be decrypted with the receiver's private key. This allows, for instance, a server program to generate a cryptographic key intended for a suitable symmetric-key cryptography, then to use a client's openly-shared public key to encrypt that newly generated symmetric key. The server can then send this encrypted symmetric key over an insecure channel to the client; only the client can decrypt it using the client's private key (which pairs with the public key used by the server to encrypt the message). With the client and server both having the same symmetric key, they can safely use symmetric key encryption (likely much faster) to communicate over otherwise-insecure channels. This scheme has the advantage of not having to manually pre-share symmetric keys (a fundamentally difficult problem) while gaining the higher data throughput advantage of symmetric-key cryptography.

With public-key cryptography, robust authentication is also possible. A sender can combine a message with a private key to create a short digital signature on the message. Anyone with the sender's corresponding public key can combine that message with a claimed digital signature; if the signature matches the message, the origin of the message is verified (i.e., it must have been made by the owner of the corresponding private key).

Public key algorithms are fundamental security primitives in modern cryptosystems, including applications and protocols which offer assurance of the confidentiality, authenticity and non-repudiability of electronic communications and data storage. They underpin numerous Internet standards, such as Transport Layer Security (TLS), S/MIME, PGP, and GPG. Some public key algorithms provide key distribution and secrecy (e.g., Diffie–Hellman key exchange), some provide digital signatures (e.g., Digital Signature Algorithm), and some provide both (e.g., RSA). Compared to symmetric encryption, asymmetric encryption is rather slower than good symmetric encryption, too slow for many purposes. Today's cryptosystems (such as TLS, Secure Shell) use both symmetric encryption and asymmetric encryption, often by using asymmetric encryption to securely exchange a secret key which is then used for symmetric encryption.

reference
740.

ZMA meaning in Information Technology ?

Answer» What is Zone Multicast Address mean?

A multicast address is a logical identifier for a group of hosts in a computer network that are available to process datagrams or frames intended to be multicast for a designated network service. Multicast addressing can be used in the link layer (layer 2 in the OSI model), such as Ethernet multicast, and at the internet layer (layer 3 for OSI) for Internet Protocol Version 4 (IPv4) or Version 6 (IPv6) multicast.

reference
742.

XCBL meaning in Information Technology ?

Answer»

INFO: Full form for XCBL is XML Common Business Library in Information Technology category

nan
743.

XHTML meaning in Information Technology ?

Answer» What is eXtensible Hypertext Markup Language mean?

Extensible HyperText Markup Language (XHTML) is part of the family of XML markup languages. It mirrors or extends versions of the widely used HyperText Markup Language (HTML), the language in which Web pages are formulated.

While HTML, prior to HTML5, was defined as an application of Standard Generalized Markup Language (SGML), a flexible markup language framework, XHTML is an application of XML, a more restrictive subset of SGML. XHTML documents are well-formed and may therefore be parsed using standard XML parsers, unlike HTML, which requires a lenient HTML-specific parser.

XHTML 1.0 became a World Wide Web Consortium (W3C) recommendation on January 26, 2000. XHTML 1.1 became a W3C recommendation on May 31, 2001. The standard known as XHTML5 is being developed as an XML adaptation of the HTML5 specification.

reference
744.

XILP meaning in Information Technology ?

Answer»

INFO: Full form for XILP is X Interactive ListProc in Information Technology category
XILP also has other full forms in other categories mentioned below.

745.

XMMS meaning in Information Technology ?

Answer» What is X Multimedia System mean?

X Multimedia System (XMMS) is an audio player for Unix-like systems released under a free software license.

reference
746.

XMPP meaning in Information Technology ?

Answer»

INFO: Full form for XMPP is eXtensible Messaging and Presence Protocol in Information Technology category
XMPP also has other full forms in other categories mentioned below.

747.

XPCOM meaning in Information Technology ?

Answer» What is Cross Platform Component Object Model mean?

Cross Platform Component Object Model (XPCOM) is a cross-platform component model from Mozilla. It is similar to Microsoft Component Object Model (COM) and Common Object Request Broker Architecture (CORBA). It features multiple language bindings and interface description language (IDL) descriptions; thus programmers can plug their custom functions into the framework and connect it with other components.

The most prominent usage of XPCOM is within the Firefox web browser. Many of its internal components interact via XPCOM interfaces. Furthermore, Firefox used to allow add-ons extensive XPCOM access, but this was removed in 2017 and replaced with the less-permissive WebExtensions API. (Three forks of Firefox still support the legacy add-on capability: Pale Moon, Basilisk, Waterfox.)

reference nan
748.

XNS meaning in Information Technology ?

Answer» What is Xerox Network Systems mean?

Xerox Network Systems (XNS) is a computer networking protocol suite developed by Xerox within the Xerox Network Systems Architecture. It provided general purpose network communications, internetwork routing and packet delivery, and higher level functions such as a reliable stream, and remote procedure calls. XNS predated and influenced the development of the Open Systems Interconnection (OSI) networking model, and was very influential in local area networking designs during the 1980s. It had little impact on TCP/IP, however, which was designed earlier.

XNS was developed by the Xerox Systems Development Department in the early 1980s, who were charged with bringing Xerox Parc's research to market. XNS was based on the earlier (and equally influential) PARC Universal Packet (PUP) suite from the late 1970s. Some of the protocols in the XNS suite were lightly modified versions of the ones in the Pup suite. XNS added the concept of a network number, allowing larger networks to be constructed from multiple smaller ones, with routers controlling the flow of information between the networks.

The protocol suite specifications for XNS were placed in the public domain in 1977. This helped XNS become the canonical local area networking protocol, copied to various degrees by practically all networking systems in use into the 1990s. XNS was used unchanged by 3Com's 3+Share and Ungermann-Bass's Net/One. It was also used, with modifications, as the basis for Novell NetWare, and Banyan VINES. XNS was used as the basis for the AppleNet system, but this was never commercialized; a number of XNS's solutions to common problems were used in AppleNet's replacement, AppleTalk.

reference
749.

XPS meaning in Information Technology ?

Answer» What is XML Paper Specification mean?

Open XML Paper Specification (also referred to as OpenXPS) is an open specification for a page description language and a fixed-document format. Microsoft developed it as the XML Paper Specification (XPS). In June 2009, Ecma International adopted it as international standard ECMA-388.

It is an XML-based (more precisely XAML-based) specification, based on a new print path (print processing data representation and data flow) and a color-managed vector document format that supports device independence and resolution independence. In Windows 8 .xps was replaced with the ECMA standard .oxps format which is not natively supported in older Windows versions.

reference
750.

XPIDL meaning in Information Technology ?

Answer»

INFO: Full form for XPIDL is Cross-Platform IDL in Information Technology category
XPIDL also has other full forms in other categories mentioned below.