FULLFORMDEFINITION
This section includes 1268 fullforms, each offering curated multiple-choice questions to sharpen your Information Technology knowledge and support exam preparation. Choose a topic below to get started.
| 702. |
OO meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» INFO: Full form for OO is Object-Oriented in Information Technology category
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 703. |
NDPS meaning in Information Technology ? |
||||||||||||||||||||||||
|
Answer» INFO: Full form for NDPS is Novell Distributed Print Services in Information Technology category
|
|||||||||||||||||||||||||
| 704. |
NetBIOS meaning in Information Technology ? |
|
Answer» What is Network Basic Input/Output System mean? NetBIOS () is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol. Older operating systems ran NetBIOS over IEEE 802.2 and IPX/SPX using the NetBIOS Frames (NBF) and NetBIOS over IPX/SPX (NBX) protocols, respectively. In modern networks, NetBIOS normally runs over TCP/IP via the NetBIOS over TCP/IP (NBT) protocol. This results in each computer in the network having both an IP address and a NetBIOS name corresponding to a (possibly different) host name. NetBIOS is also used for identifying system names in TCP/IP(Windows). Simply saying, it is a protocol that allows communication of files and printers through the Session Layer of the OSI Model in a LAN. reference nan |
|
| 705. |
NCQ meaning in Information Technology ? |
|
Answer» What is Native Command Queuing mean? In computing, Native Command Queuing (NCQ) is an extension of the Serial ATA protocol allowing hard disk drives to internally optimize the order in which received read and write commands are executed. This can reduce the amount of unnecessary drive head movement, resulting in increased performance (and slightly decreased wear of the drive) for workloads where multiple simultaneous read/write requests are outstanding, most often occurring in server-type applications. reference |
|
| 706. |
NFA meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Nondeterministic Finite Automaton mean? In automata theory, a finite-state machine is called a deterministic finite automaton (DFA), if each of its transitions is uniquely determined by its source state and input symbol, andreading an input symbol is required for each state transition.A nondeterministic finite automaton (NFA), or nondeterministic finite-state machine, does not need to obey these restrictions. In particular, every DFA is also an NFA. Sometimes the term NFA is used in a narrower sense, referring to an NFA that is not a DFA, but not in this article. Using the subset construction algorithm, each NFA can be translated to an equivalent DFA; i.e., a DFA recognizing the same formal language.Like DFAs, NFAs only recognize regular languages. NFAs were introduced in 1959 by Michael O. Rabin and Dana Scott, who also showed their equivalence to DFAs. NFAs are used in the implementation of regular expressions: Thompson's construction is an algorithm for compiling a regular expression to an NFA that can efficiently perform pattern matching on strings. Conversely, Kleene's algorithm can be used to convert an NFA into a regular expression (whose size is generally exponential in the input automaton). NFAs have been generalized in multiple ways, e.g., nondeterministic finite automata with ε-moves, finite-state transducers, pushdown automata, alternating automata, ω-automata, and probabilistic automata.Besides the DFAs, other known special cases of NFAsare unambiguous finite automata (UFA)and self-verifying finite automata (SVFA). reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 707. |
NGSCB meaning in Information Technology ? |
|
Answer» What is Next-Generation Secure Computing Base mean? The Next-Generation Secure Computing Base (NGSCB; codenamed Palladium and also known as Trusted Windows') was a software architecture designed by Microsoft which aimed to provide users of the Windows operating system with better privacy, security, and system integrity. NGSCB was the result of years of research and development within Microsoft to create a secure computing solution that equaled the security of closed platforms such as set-top boxes while simultaneously preserving the backward compatibility, flexibility, and openness of the Windows operating system. Microsoft's primary stated objective with NGSCB was to "protect software from software." Part of the Trustworthy Computing initiative when unveiled in 2002, NGSCB was to be integrated with Windows Vista, then known as "Longhorn." NGSCB relied on hardware designed by the Trusted Computing Group to produce a parallel operation environment hosted by a new hypervisor (referred to as a sort of kernel in documentation) called the "Nexus" that existed alongside Windows and provided new applications with features such as hardware-based process isolation, data encryption based on integrity measurements, authentication of a local or remote machine or software configuration, and encrypted paths for user authentication and graphics output. NGSCB would facilitate the creation and distribution of digital rights management (DRM) policies pertaining the use of information. NGSCB was subject to much controversy during its development, with critics contending that it would impose restrictions on users, enforce vendor lock-in, and undermine fair use rights and open-source software. It was first demonstrated by Microsoft at WinHEC 2003 before undergoing a revision in 2004 that would enable earlier applications to benefit from its functionality. Reports indicated in 2005 that Microsoft would change its plans with NGSCB so that it could ship Windows Vista by its self-imposed deadline year, 2006; instead, Microsoft would ship only part of the architecture, BitLocker, which can optionally use the Trusted Platform Module to validate the integrity of boot and system files prior to operating system startup. Development of NGSCB spanned approximately a decade before its cancellation, the lengthiest development period of a major feature intended for Windows Vista. NGSCB differed from technologies Microsoft billed as "pillars of Windows Vista"—Windows Presentation Foundation, Windows Communication Foundation, and WinFS—during its development in that it was not built with the .NET Framework and did not focus on managed code software development. NGSCB has yet to fully materialize; however, aspects of it are available in features such as BitLocker of Windows Vista, Measured Boot of Windows 8, Certificate Attestation of Windows 8.1, and Device Guard of Windows 10. reference |
|
| 708. |
NEXT meaning in Information Technology ? |
||||||||||||||||||||||
|
Answer» INFO: Full form for NEXT is Near-End CrossTalk in Information Technology category
|
|||||||||||||||||||||||
| 709. |
NIST meaning in Information Technology ? |
||||||||||||||||||||||||||
|
Answer» What is National Institute of Standards and Technology mean? The National Institute of Standards and Technology (NIST) is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into laboratory programs that include nanoscale science and technology, engineering, information technology, neutron research, material measurement, and physical measurement. From 1901 to 1988, the agency was named the National Bureau of Standards. reference
|
|||||||||||||||||||||||||||
| 710. |
TCP/IP meaning in Information Technology ? |
|
Answer» What is Transmission Control Protocol/Internet Protocol mean? The Internet protocol suite, commonly known as TCP/IP, is the set of communications protocols used in the Internet and similar computer networks. The current foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP). During its development, versions of it were known as the Department of Defense (DoD) model because the development of the networking method was funded by the United States Department of Defense through DARPA. Its implementation is a protocol stack. The Internet protocol suite provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received. This functionality is organized into four abstraction layers, which classify all related protocols according to each protocol's scope of networking. From lowest to highest, the layers are the link layer, containing communication methods for data that remains within a single network segment (link); the internet layer, providing internetworking between independent networks; the transport layer, handling host-to-host communication; and the application layer, providing process-to-process data exchange for applications. The technical standards underlying the Internet protocol suite and its constituent protocols are maintained by the Internet Engineering Task Force (IETF). The Internet protocol suite predates the OSI model, a more comprehensive reference framework for general networking systems. reference nan |
|
| 711. |
TNC meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Terminal Node Controller mean? A terminal node controller (TNC) is a device used by amateur radio operators to participate in AX.25 packet radio networks. It is similar in function to the Packet Assembler/Disassemblers used on X.25 networks, with the addition of a modem to convert baseband digital signals to audio tones. The first TNC, the VADCG board, was originally developed by Doug Lockhart, VE7APU, of Vancouver, British Columbia. Amateur Radio TNCs were first developed in 1978 in Canada by the Montreal Amateur Radio Club and the Vancouver Area Digital Communications group. These never gained much popularity because only a bare printed circuit board was made available and builders had to gather up a large number of components. In 1983, the Tucson Amateur Packet Radio (TAPR) association produced complete kits for their TNC-1 design. This was later available as the Heathkit HD-4040. A few years later, the improved TNC-2 became available, and it was licensed to commercial manufacturers such as MFJ. In 1986, the improved "TNC+" was designed to run programs and protocols developed for the original TNC board.TNC+ also included an assembler and a version of Forth (STOIC), which runs on the TNC+ itself, to support developing new programs and protocols. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 712. |
TPF meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Transaction Processing Facility mean? Transaction Processing Facility (TPF) is an IBM real-time operating system for mainframe computers descended from the IBM System/360 family, including zSeries and System z9. TPF delivers fast, high-volume, high-throughput transaction processing, handling large, continuous loads of essentially simple transactions across large, geographically dispersed networks. While there are other industrial-strength transaction processing systems, notably IBM's own CICS and IMS, TPF's specialty is extreme volume, large numbers of concurrent users, and very fast response times. For example, it handles VISA credit card transaction processing during the peak holiday shopping season. The TPF passenger reservation application PARS, or its international version IPARS, is used by many airlines. PARS is an application program; TPF is an operating system. One of TPF's major optional components is a high performance, specialized database facility called TPF Database Facility (TPFDF). A close cousin of TPF, the transaction monitor ALCS, was developed by IBM to integrate TPF services into the more common mainframe operating system MVS, now z/OS. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 713. |
TCU meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Telecommunication Control Unit mean? A telecommunication control unit (TCU), line control unit, or terminal control unit (although terminal control unit may also refer to a terminal cluster controller) is a Front-end processor for mainframes and some minicomputers which supports attachment of one or more telecommunication lines. TCUs free processors from handling the data coming in and out of RS-232 ports. The TCU can support multiple terminals, sometimes hundreds. Many of these TCUs can support RS-232 when it is required, although there are other serial interfaces as well. The advent of ubiquitous TCP/IP has reduced the need for telecommunications control units. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 714. |
TNC meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Threaded Neill-Concelman connector mean? The TNC connector (acronym of "Threaded Neill–Concelman") is a threaded version of the BNC connector. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 715. |
TLA meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Three-Letter Acronym mean? A three-letter acronym (TLA), or three-letter abbreviation, is an abbreviation consisting of three letters. These are usually the initial letters of the words of the phrase abbreviated, and are written in capital letters (upper case); three-letter abbreviations such as etc. and Mrs. are not three-letter acronyms, but "TLA" itself is a TLA (an example of an autological abbreviation). Most three-letter abbreviations are not, strictly, acronyms, but rather initialisms: all the letters are pronounced as the names of letters, as in APA AY-pee-AY. Some are true acronyms, pronounced as a word: as with computed axial tomography, for example, CAT is almost always pronounced as the animal's name () in "CAT scan". Even the initialisms are however considered three-letter acronyms, because that term appeared first in widespread use, and is overwhelmingly popular today. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 716. |
TROFF meaning in Information Technology ? |
|
Answer» INFO: Full form for TROFF is Trace Off in Information Technology category |
|
| 717. |
XDM meaning in Information Technology ? |
||||||||||||||||||||
|
Answer» What is X Window Display Manager mean? XDM or xdm or similar can refer to: reference
|
|||||||||||||||||||||
| 718. |
WYSIWYG meaning in Information Technology ? |
|
Answer» What is What You See Is What You Get mean? In computing, WYSIWYG ( WIZ-ee-wig), an acronym for What You See Is What You Get, is a system in which editing software allows content to be edited in a form that resembles its appearance when printed or displayed as a finished product, such as a printed document, web page, or slide presentation. reference |
|
| 719. |
WWN meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is World Wide Name mean? A World Wide Name (WWN) or World Wide Identifier (WWID) is a unique identifier used in storage technologies including Fibre Channel, Parallel ATA, Serial ATA, NVM Express, SCSI and Serial Attached SCSI (SAS). A WWN may be employed in a variety of roles, such as a serial number or for addressability; for example, in Fibre Channel networks, a WWN may be used as a WWNN (World Wide Node Name) to identify an endpoint, or a WWPN (World Wide Port Name) to identify an individual port on a switch. Two WWNs which do not refer to the same thing should always be different even if the two are used in different roles, i.e. a role such as WWPN or WWNN does not define a separate WWN space. The use of burned-in addresses and specification compliance by vendors is relied upon to enforce uniqueness. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 720. |
WZC meaning in Information Technology ? |
||||||||||||||||
|
Answer» What is Wireless Zero Configuration mean? Wireless Zero Configuration (WZC), also known as Wireless Auto Configuration, or WLAN AutoConfig, is a wireless connection management utility included with Microsoft Windows XP and later operating systems as a service that dynamically selects a wireless network to connect to based on a user's preferences and various default settings. This can be used instead of, or in the absence of, a wireless network utility from the manufacturer of a computer's wireless networking device. The drivers for the wireless adapter query the NDIS Object IDs and pass the available network names (SSIDs) to the service. The service then lists them in the user interface on the Wireless Networks tab in the connection's Properties or in the Wireless Network Connection dialog box accessible from the notification area. A checked (debug) build version of the WZC service can be used by developers to obtain additional diagnostic and tracing information logged by the service. reference
|
|||||||||||||||||
| 721. |
XAG meaning in Information Technology ? |
|
Answer» INFO: Full form for XAG is XML Accessibility Guidelines in Information Technology category |
|
| 722. |
XAML meaning in Information Technology ? |
|
Answer» INFO: Full form for XAML is eXtensible Application Markup Language in Information Technology category |
|
| 723. |
XDMCP meaning in Information Technology ? |
||||||
|
Answer» What is X Display Manager Control Protocol mean? In the X Window System, an X display manager is a graphical login manager which starts a login session on an X server from the same or another computer. A display manager presents the user with a login screen. A session starts when a user successfully enters a valid combination of username and password. When the display manager runs on the user's computer, it starts the X server before presenting the user the login screen, optionally repeating when the user logs out. In this condition, the DM realizes in the X Window System the functionality of getty and login on character-mode terminals. When the display manager runs on a remote computer, it acts like a telnet server, requesting username and password and starting a remote session. X11 Release 3 introduced display managers in October 1988 with the aim of supporting the standalone X terminals, just coming onto the market. Various display managers continue in routine use to provide a graphical login prompt on standalone computer workstations running X. X11R4 introduced the X Display Manager Control Protocol (XDMCP) in December 1989 to fix problems in the X11R3 implementation. reference
|
|||||||
| 724. |
XTF meaning in Information Technology ? |
|
Answer» What is eXtended Triton Format mean? eXtended Triton Format (XTF) is a file format developeded by Triton Imaging, Inc for recording hydrographic survey data. XTF is the most commonly used format for this type of information in the hydrographic survey industry. XTF supports sources including sidescan sonar, shallow seismic and multibeam bathymetry, as well as associated position and altitude information. reference |
|
| 725. |
XUL meaning in Information Technology ? |
|
Answer» What is XML User Interface Language mean? XUL ( ZOOL), which stands for XML User Interface Language, is a user interface markup language developed by Mozilla. XUL is an XML dialect for writing graphical user interfaces, enabling developers to write user interface elements in a manner similar to web pages. XUL applications rely on the Mozilla codebase (or a fork of it); the most prominent example is the Firefox web browser. However, in recent years, Mozilla has been reducing the usage of XUL in Firefox. The most notable example is the removal of add-on customization. Firefox originally permitted add-ons to extensively alter its user interface via custom XUL code, but this capability was removed in 2017 and replaced with the less-permissive WebExtensions API. Several forks of Firefox, such as Pale Moon, Basilisk, and Waterfox, retain support for XUL add-ons. reference |
|
| 726. |
XVGA meaning in Information Technology ? |
|
Answer» INFO: Full form for XVGA is Extended Video Graphics Adapter in Information Technology category |
|
| 727. |
YACC meaning in Information Technology ? |
||||||||||||||||||||
|
Answer» What is Yet Another Compiler Compiler mean? Yacc (Yet Another Compiler-Compiler) is a computer program for the Unix operating system developed by Stephen C. Johnson. It is a Look Ahead Left-to-Right (LALR) parser generator, generating a LALR parser (the part of a compiler that tries to make syntactic sense of the source code) based on a formal grammar, written in a notation similar to Backus–Naur Form (BNF). Yacc is supplied as a standard utility on BSD and AT&T Unix. GNU-based Linux distributions include Bison, a forward-compatible Yacc replacement. reference
|
|||||||||||||||||||||
| 728. |
Y2K meaning in Information Technology ? |
||||||||
|
Answer» INFO: Full form for Y2K is Year Two Thousand in Information Technology category
|
|||||||||
| 729. |
YAAF meaning in Information Technology ? |
||||||
|
Answer» INFO: Full form for YAAF is Yet Another Application Framework in Information Technology category
|
|||||||
| 730. |
YaST meaning in Information Technology ? |
|
Answer» What is Yet another Setup Tool mean? YaST (Yet another Setup Tool) is a Linux operating system setup and configuration tool. YaST is featured in the openSUSE Linux distribution, as well as in SUSE's derived commercial distributions. It is also part of the defunct United Linux. YaST features tools that can configure many aspects of the system. YaST was released first in April 1995. The first SuSE distribution that included YaST was released in May 1996. YaST was re-written in 1999 and included first in SuSE Linux 6.3 as only an installer. YaST2 was added to the desktop in SuSE Linux 6.4 and co-existed with YaST1 until YaST1's removal in SuSE Linux 8.0. reference |
|
| 731. |
ZCAV meaning in Information Technology ? |
|
Answer» What is Zone Constant Angular Velocity mean? In computer storage, zone bit recording (ZBR) is a method used by disk drives to optimise the tracks for increased data capacity. It does this by placing more sectors per zone on outer tracks than on inner tracks. This contrasts with other approaches, such as constant angular velocity (CAV) -drives, where the number of sectors per track are the same.On a disk consisting of roughly concentric tracks – whether realized as separate circular tracks or as a single spiral track – the physical track length (circumference) is increased as it gets farther from the centre hub. The inner tracks are packed as densely as the particular drive's technology allows. The packing of the rest of the disks is changed depending on the type of disk. With a CAV-drive the data on the outer tracks are the same angular width of those in the centre, and so less densely packed. Using ZBR instead, the inner zoning is used to set the read/write rate, which is the same for other tracks. This permits the drive to have more bits stored in the outside tracks compared to the inner ones. Storing more bits per track equates to achieving a higher total data capacity on the same disk area. However, ZBR influences other performance characteristics of the hard disk. In the outer most tracks, data will have the highest data transfer rate. Since both hard disks and floppy disks typically number their tracks beginning at the outer edge and continuing inward, and since operating systems typically fill the lowest-numbered tracks first, this is where the operating system typically stores its own files during its initial installation onto an empty drive. Testing disk drives when they are new or empty after defragmenting them with some benchmarking applications will often show their highest performance. After some time, when more data are stored in the inner tracks, the average data transfer rate will drop, because the transfer rate in the inner zones is slower; this, combined with the head's longer stroke and possible fragmentation, may give the impression of the disk drive slowing down over time. Some other ZBR drives, such as the 800 kilobyte 3.5" floppy drives in the Apple IIGS and older Macintosh computers, don't change the data rate but rather spin the medium slower when reading or writing outer tracks, thus approximating the performance of constant linear velocity drives. reference |
|
| 732. |
ZIF meaning in Information Technology ? |
||||||||||||||
|
Answer» What is Zero Insertion Force mean? Zero insertion force (ZIF) is a type of IC socket or electrical connector that requires very little force for insertion. With a ZIF socket, before the IC is inserted, a lever or slider on the side of the socket is moved, pushing all the sprung contacts apart so that the IC can be inserted with very little force - generally the weight of the IC itself is sufficient and no external downward force is required. The lever is then moved back, allowing the contacts to close and grip the pins of the IC. ZIF sockets are much more expensive than standard IC sockets and also tend to take up a larger board area due to the space taken up by the lever mechanism. Typically, they are only used when there is a good reason to do so. reference
|
|||||||||||||||
| 733. |
ZISC meaning in Information Technology ? |
||||||
|
Answer» What is Zero Instruction Set Computer mean? No instruction set computing (NISC) is a computing architecture and compiler technology for designing highly efficient custom processors and hardware accelerators by allowing a compiler to have low-level control of hardware resources. reference
|
|||||||
| 734. |
ZCS meaning in Information Technology ? |
||||||||||||||||||||||||
|
Answer» What is Zero Code Suppression mean? Modified AMI codes are a digital telecommunications technique to maintain system synchronization. Alternate mark inversion (AMI) line codes are modified by deliberate insertion of bipolar violations. There are several types of modified AMI codes, used in various T-carrier and E-carrier systems. reference
|
|||||||||||||||||||||||||
| 735. |
ZOI meaning in Information Technology ? |
|
Answer» What is Zero One Infinity mean? The Zero one infinity (ZOI) rule is a rule of thumb in software design proposed by early computing pioneer Willem van der Poel. It argues that arbitrary limits on the number of instances of a particular type of data or structure should not be allowed. Specifically, an entity should either be forbidden entirely, only one should be allowed, or any number of them should be allowed. Although various factors outside that particular software could limit this number in practice, it should not be the software itself that puts a hard limit on the number of instances of the entity. Allow none of foo, one of foo, or any number of foo. The only reasonable numbers are zero, one and infinity. Examples of this rule may be found in the structure of many file systems' directories (also known as folders): 0 – The topmost directory has zero parent directories; that is, there is no directory that contains the topmost directory.1 – Each subdirectory has exactly one parent directory (not including shortcuts to the directory's location; while such files may have similar icons to the icons of the destination directories, they are not directories at all).∞ (infinity) – Each directory, whether the topmost directory or any of its subdirectories, according to the file system's rules, may contain any number of files or subdirectories. Practical limits to this number are caused by other factors, such as space available on storage media and how well the computer's operating system is maintained.In real-world software design, violations of this rule of thumb are common. For example, the FAT16 file system imposes a limit of 65,536 (i.e. 216) files to a directory. reference |
|
| 736. |
ZOPE meaning in Information Technology ? |
|
Answer» INFO: Full form for ZOPE is Z Object Publishing Environment in Information Technology category |
|
| 737. |
ADO.NET meaning in Information Technology ? |
|
Answer» INFO: Full form for ADO.NET is Activex Data Objects + .net (framework) in Information Technology category nan |
|
| 738. |
PKC meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Public Key Cryptography mean? Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys. Each pair consists of a public key (which may be known to others) and a private key (which may not be known by anyone except the owner). The generation of such key pairs depends on cryptographic algorithms which are based on mathematical problems termed one-way functions. Effective security requires keeping the private key private; the public key can be openly distributed without compromising security. In such a system, any person can encrypt a message using the intended receiver's public key, but that encrypted message can only be decrypted with the receiver's private key. This allows, for instance, a server program to generate a cryptographic key intended for a suitable symmetric-key cryptography, then to use a client's openly-shared public key to encrypt that newly generated symmetric key. The server can then send this encrypted symmetric key over an insecure channel to the client; only the client can decrypt it using the client's private key (which pairs with the public key used by the server to encrypt the message). With the client and server both having the same symmetric key, they can safely use symmetric key encryption (likely much faster) to communicate over otherwise-insecure channels. This scheme has the advantage of not having to manually pre-share symmetric keys (a fundamentally difficult problem) while gaining the higher data throughput advantage of symmetric-key cryptography. With public-key cryptography, robust authentication is also possible. A sender can combine a message with a private key to create a short digital signature on the message. Anyone with the sender's corresponding public key can combine that message with a claimed digital signature; if the signature matches the message, the origin of the message is verified (i.e., it must have been made by the owner of the corresponding private key). Public key algorithms are fundamental security primitives in modern cryptosystems, including applications and protocols which offer assurance of the confidentiality, authenticity and non-repudiability of electronic communications and data storage. They underpin numerous Internet standards, such as Transport Layer Security (TLS), S/MIME, PGP, and GPG. Some public key algorithms provide key distribution and secrecy (e.g., Diffie–Hellman key exchange), some provide digital signatures (e.g., Digital Signature Algorithm), and some provide both (e.g., RSA). Compared to symmetric encryption, asymmetric encryption is rather slower than good symmetric encryption, too slow for many purposes. Today's cryptosystems (such as TLS, Secure Shell) use both symmetric encryption and asymmetric encryption, often by using asymmetric encryption to securely exchange a secret key which is then used for symmetric encryption. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 739. |
SFDC meaning in Information Technology ? |
||||||||||||||||||||||||||||||
|
Answer» INFO: Full form for SFDC is Salesforce Developer Certification in Information Technology category
|
|||||||||||||||||||||||||||||||
| 740. |
ZMA meaning in Information Technology ? |
||||||||||||||||||||||||||||||||
|
Answer» What is Zone Multicast Address mean? A multicast address is a logical identifier for a group of hosts in a computer network that are available to process datagrams or frames intended to be multicast for a designated network service. Multicast addressing can be used in the link layer (layer 2 in the OSI model), such as Ethernet multicast, and at the internet layer (layer 3 for OSI) for Internet Protocol Version 4 (IPv4) or Version 6 (IPv6) multicast. reference
|
|||||||||||||||||||||||||||||||||
| 741. |
ZPL meaning in Information Technology ? |
||||||||||||||||||||||||||||
|
Answer» INFO: Full form for ZPL is Z-level Programming Language in Information Technology category
|
|||||||||||||||||||||||||||||
| 742. |
XCBL meaning in Information Technology ? |
|
Answer» INFO: Full form for XCBL is XML Common Business Library in Information Technology category nan |
|
| 743. |
XHTML meaning in Information Technology ? |
||||||
|
Answer» What is eXtensible Hypertext Markup Language mean? Extensible HyperText Markup Language (XHTML) is part of the family of XML markup languages. It mirrors or extends versions of the widely used HyperText Markup Language (HTML), the language in which Web pages are formulated. While HTML, prior to HTML5, was defined as an application of Standard Generalized Markup Language (SGML), a flexible markup language framework, XHTML is an application of XML, a more restrictive subset of SGML. XHTML documents are well-formed and may therefore be parsed using standard XML parsers, unlike HTML, which requires a lenient HTML-specific parser. XHTML 1.0 became a World Wide Web Consortium (W3C) recommendation on January 26, 2000. XHTML 1.1 became a W3C recommendation on May 31, 2001. The standard known as XHTML5 is being developed as an XML adaptation of the HTML5 specification. reference
|
|||||||
| 744. |
XILP meaning in Information Technology ? |
||||||
|
Answer» INFO: Full form for XILP is X Interactive ListProc in Information Technology category
|
|||||||
| 745. |
XMMS meaning in Information Technology ? |
|
Answer» What is X Multimedia System mean? X Multimedia System (XMMS) is an audio player for Unix-like systems released under a free software license. reference |
|
| 746. |
XMPP meaning in Information Technology ? |
|
Answer» INFO: Full form for XMPP is eXtensible Messaging and Presence Protocol in Information Technology category |
|
| 747. |
XPCOM meaning in Information Technology ? |
|
Answer» What is Cross Platform Component Object Model mean? Cross Platform Component Object Model (XPCOM) is a cross-platform component model from Mozilla. It is similar to Microsoft Component Object Model (COM) and Common Object Request Broker Architecture (CORBA). It features multiple language bindings and interface description language (IDL) descriptions; thus programmers can plug their custom functions into the framework and connect it with other components. The most prominent usage of XPCOM is within the Firefox web browser. Many of its internal components interact via XPCOM interfaces. Furthermore, Firefox used to allow add-ons extensive XPCOM access, but this was removed in 2017 and replaced with the less-permissive WebExtensions API. (Three forks of Firefox still support the legacy add-on capability: Pale Moon, Basilisk, Waterfox.) reference nan |
|
| 748. |
XNS meaning in Information Technology ? |
|
Answer» What is Xerox Network Systems mean? Xerox Network Systems (XNS) is a computer networking protocol suite developed by Xerox within the Xerox Network Systems Architecture. It provided general purpose network communications, internetwork routing and packet delivery, and higher level functions such as a reliable stream, and remote procedure calls. XNS predated and influenced the development of the Open Systems Interconnection (OSI) networking model, and was very influential in local area networking designs during the 1980s. It had little impact on TCP/IP, however, which was designed earlier. XNS was developed by the Xerox Systems Development Department in the early 1980s, who were charged with bringing Xerox Parc's research to market. XNS was based on the earlier (and equally influential) PARC Universal Packet (PUP) suite from the late 1970s. Some of the protocols in the XNS suite were lightly modified versions of the ones in the Pup suite. XNS added the concept of a network number, allowing larger networks to be constructed from multiple smaller ones, with routers controlling the flow of information between the networks. The protocol suite specifications for XNS were placed in the public domain in 1977. This helped XNS become the canonical local area networking protocol, copied to various degrees by practically all networking systems in use into the 1990s. XNS was used unchanged by 3Com's 3+Share and Ungermann-Bass's Net/One. It was also used, with modifications, as the basis for Novell NetWare, and Banyan VINES. XNS was used as the basis for the AppleNet system, but this was never commercialized; a number of XNS's solutions to common problems were used in AppleNet's replacement, AppleTalk. reference |
|
| 749. |
XPS meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||
|
Answer» What is XML Paper Specification mean? Open XML Paper Specification (also referred to as OpenXPS) is an open specification for a page description language and a fixed-document format. Microsoft developed it as the XML Paper Specification (XPS). In June 2009, Ecma International adopted it as international standard ECMA-388. It is an XML-based (more precisely XAML-based) specification, based on a new print path (print processing data representation and data flow) and a color-managed vector document format that supports device independence and resolution independence. In Windows 8 .xps was replaced with the ECMA standard .oxps format which is not natively supported in older Windows versions. reference
|
|||||||||||||||||||||||||||||||||||
| 750. |
XPIDL meaning in Information Technology ? |
|
Answer» INFO: Full form for XPIDL is Cross-Platform IDL in Information Technology category |
|