FULLFORMDEFINITION
This section includes 1268 fullforms, each offering curated multiple-choice questions to sharpen your Information Technology knowledge and support exam preparation. Choose a topic below to get started.
| 1202. |
EXT meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||
|
Answer» INFO: Full form for EXT is EXTended file system in Information Technology category
|
|||||||||||||||||||||||||||||||||||||||||
| 1203. |
EUC meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Extended Unix Code mean? Extended Unix Code (EUC) is a multibyte character encoding system used primarily for Japanese, Korean, and simplified Chinese. The most commonly used EUC codes are variable-width encodings with a character belonging an ISO/IEC 646 compliant coded character set (such as ASCII) taking one byte, and a character belonging to a 94x94 coded character set (such as GB 2312) represented in two bytes. The EUC-CN form of GB 2312 and EUC-KR are examples of such two-byte EUC codes. EUC-JP includes characters represented by up to three bytes, including an initial shift code, whereas a single character in EUC-TW can take up to four bytes. Modern applications are more likely to use UTF-8, which supports all of the glyphs of the EUC codes, and more, and is generally more portable with fewer vendor deviations and errors. EUC is however still very popular, especially EUC-KR for South Korea. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1204. |
EULA meaning in Information Technology ? |
||||||||||||||||||||||||
|
Answer» What is End User License Agreement mean? An end-user license agreement is a legal contract entered into between a software developer or vendor and the user of the software, often where the software has been purchased by the user from an intermediary such as a retailer. A EULA specifies in detail the rights and restrictions which apply to the use of the software. Many form contracts are only contained in digital form and only presented to a user as a click-through which the user must "accept". As the user may not see the agreement until after they have already purchased the software, these documents may be contracts of adhesion. Software companies often make special agreements with large businesses and government entities that include support contracts and specially drafted warranties. Some end-user license agreements accompany shrink-wrapped software that is presented to a user sometimes on paper or more usually electronically, during the installation procedure. The user has the choice of accepting or rejecting the agreement. The installation of the software is conditional to the user clicking a button labelled "accept". See below. Many EULAs assert extensive liability limitations. Most commonly, an EULA will attempt to hold harmless the software licensor in the event that the software causes damage to the user's computer or data, but some software also proposes limitations on whether the licensor can be held liable for damage that arises through improper use of the software (for example, incorrectly using tax preparation software and incurring penalties as a result). One case upholding such limitations on consequential damages is M.A. Mortenson Co. v. Timberline Software Corp., et al. Some EULAs also claim restrictions on venue and applicable law in the event that a legal dispute arises. Some copyright owners use EULAs in an effort to circumvent limitations the applicable copyright law places on their copyrights (such as the limitations in sections 107–122 of the United States Copyright Act), or to expand the scope of control over the work into areas for which copyright protection is denied by law (such as attempting to charge for, regulate or prevent private performances of a work beyond a certain number of performances or beyond a certain period of time). Such EULAs are, in essence, efforts to gain control, by contract, over matters upon which copyright law precludes control. This kind of EULAs concurs in aim with DRM and both may be used as alternate methods for widening control over software. In disputes of this nature in the United States, cases are often appealed and different circuit courts of appeal sometimes disagree about these clauses. This provides an opportunity for the U.S. Supreme Court to intervene, which it has usually done in a scope-limited and cautious manner, providing little in the way of precedent or settled law. End-user license agreements are usually lengthy, and written in highly specific legal language, making it difficult for the average user to give informed consent. If the company designs the end-user license agreement in a way that intentionally discourages users from reading them, and uses difficult to understand language, many of the users may not be giving informed consent. reference
|
|||||||||||||||||||||||||
| 1205. |
FASM meaning in Information Technology ? |
||||||||||||||||||
|
Answer» INFO: Full form for FASM is Flat ASseMbler in Information Technology category
|
|||||||||||||||||||
| 1206. |
EWMH meaning in Information Technology ? |
|
Answer» What is Extended Window Manager Hints mean? Extended Window Manager Hints, a.k.a. NetWM, is an X Window System standard for the communication between window managers and applications. It builds on the functionality of the Inter-Client Communication Conventions Manual (ICCCM). These standards formulate protocols for the mediation of access to shared X resources, like the screen and the input focus. Applications request access, while the window manager grants or denies it. Communication occurs via X properties and client messages.The EWMH is a comprehensive set of protocols to implement a desktop environment. It defines both required and optional protocols. The window manager may choose to implement virtual desktops or a layered stacking order, but if it does, then the EWMH defines how this is communicated. reference nan |
|
| 1207. |
FAP meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is FORTRAN Assembly Program mean? The IBM 700/7000 series is a series of large-scale (mainframe) computer systems that were made by IBM through the 1950s and early 1960s. The series includes several different, incompatible processor architectures. The 700s use vacuum-tube logic and were made obsolete by the introduction of the transistorized 7000s. The 7000s, in turn, were eventually replaced with System/360, which was announced in 1964. However the 360/65, the first 360 powerful enough to replace 7000s, did not become available until November 1965. Early problems with OS/360 and the high cost of converting software kept many 7000s in service for years afterward. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1208. |
FAT meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is File Allocation Table mean? File Allocation Table (FAT) is a file system developed for personal computers. Originally developed in 1977 for use on floppy disks, it was adapted for use on hard disks and other devices. It is often supported for compatibility reasons by current operating systems for personal computers and many mobile devices and embedded systems, allowing interchange of data between disparate systems. The increase in disk drives capacity required three major variants: FAT12, FAT16 and FAT32. The FAT standard has also been expanded in other ways while generally preserving backward compatibility with existing software. FAT is no longer the default file system for Microsoft Windows computers. FAT file systems are still commonly found on floppy disks, flash and other solid-state memory cards and modules (including USB flash drives), as well as many portable and embedded devices. FAT is the standard file system for digital cameras per the DCF specification. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1209. |
FBDIMM meaning in Information Technology ? |
|
Answer» INFO: Full form for FBDIMM is Fully Buffered Dual Inline Memory Module in Information Technology category nan |
|
| 1210. |
FDDI meaning in Information Technology ? |
||||||||||||||||||||
|
Answer» What is Fiber Distributed Data Interface mean? Fiber Distributed Data Interface (FDDI) is a standard for data transmission in a local area network.It uses optical fiber as its standard underlying physical medium, although it was also later specified to use copper cable, in which case it may be called CDDI (Copper Distributed Data Interface), standardized as TP-PMD (Twisted-Pair Physical Medium-Dependent), also referred to as TP-DDI (Twisted-Pair Distributed Data Interface). FDDI was effectively made obsolete in local networks by Fast Ethernet which offered the same 100 Mbit/s speeds, but at a much lower cost and, since 1998, by Gigabit Ethernet due to its speed, and even lower cost, and ubiquity. reference
|
|||||||||||||||||||||
| 1211. |
FIFO meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||
|
Answer» What is First In First Out mean? In computing and in systems theory, FIFO (an acronym for first in, first out) is a method for organising the manipulation of a data structure (often, specifically a data buffer) where the oldest (first) entry, or "head" of the queue, is processed first. Such processing is analogous to servicing people in a queue area on a first-come, first-served (FCFS) basis, i.e. in the same sequence in which they arrive at the queue's tail. FCFS is also the jargon term for the FIFO operating system scheduling algorithm, which gives every process central processing unit (CPU) time in the order in which it is demanded. FIFO's opposite is LIFO, last-in-first-out, where the youngest entry or "top of the stack" is processed first. A priority queue is neither FIFO or LIFO but may adopt similar behaviour temporarily or by default. Queueing theory encompasses these methods for processing data structures, as well as interactions between strict-FIFO queues. reference
|
|||||||||||||||||||||||||||||||||||
| 1212. |
FDMA meaning in Information Technology ? |
|
Answer» INFO: Full form for FDMA is Frequency-Division Multiple Access in Information Technology category |
|
| 1213. |
FLAC meaning in Information Technology ? |
|
Answer» What is Free Lossless Audio Codec mean? FLAC (; Free Lossless Audio Codec) is an audio coding format for lossless compression of digital audio, developed by the Xiph.Org Foundation, and is also the name of the free software project producing the FLAC tools, the reference software package that includes a codec implementation. Digital audio compressed by FLAC's algorithm can typically be reduced to between 50 and 70 percent of its original size and decompress to an identical copy of the original audio data. FLAC is an open format with royalty-free licensing and a reference implementation which is free software. FLAC has support for metadata tagging, album cover art, and fast seeking. reference |
|
| 1214. |
FEMB meaning in Information Technology ? |
|
Answer» INFO: Full form for FEMB is Front-End Motherboard in Information Technology category nan |
|
| 1215. |
FC-AL meaning in Information Technology ? |
|
Answer» What is Fibre Channel Arbitrated Loop mean? The arbitrated loop, also known as FC-AL, is a Fibre Channel topology in which devices are connected in a one-way loop fashion in a ring topology. Historically it was a lower-cost alternative to a fabric topology. It allowed connection of many servers and computer storage devices without using then very costly Fibre Channel switches. The cost of the switches dropped considerably, so by 2007, FC-AL had become rare in server-to-storage communication. It is however still common within storage systems. It is a serial architecture that can be used as the transport layer in a SCSI network, with up to 127 devices. The loop may connect into a fibre channel fabric via one of its ports.The bandwidth on the loop is shared among all ports.Only two ports may communicate at a time on the loop. One port wins arbitration and may open one other port in either half or full duplex mode.A loop with two ports is valid and has the same physical topology as point-to-point, but still acts as a loop protocol-wise.Fibre Channel ports capable of arbitrated loop communication are NL_port (node loop port) and FL_port (fabric loop port), collectively referred to as the L_ports. The ports may attach to each other via a hub, with cables running from the hub to the ports. The physical connectors on the hub are not ports in terms of the protocol. A hub does not contain ports.An arbitrated loop with no fabric port (with only NL_ports) is a private loop.An arbitrated loop connected to a fabric (through an FL_port) is a public loop.An NL_Port must provide fabric logon (FLOGI) and name registration facilities to initiate communication with other node through the fabric (to be an initiator).Arbitrated loop can be physically cabled in a ring fashion or using a hub. The physical ring ceases to work if one of the devices in the chain fails. The hub on the other hand, while maintaining a logical ring, allows a star topology on the cable level. Each receive port on the hub is simply passed to next active transmit port, bypassing any inactive or failed ports. Fibre Channel hubs therefore have another function: They provide bypass circuits thatprevent the loop from breaking if one device fails or is removed. If a device is removedfrom a loop (for example, by pulling its interconnect plug), the hub’s bypass circuitdetects the absence of signal and immediately begins to route incoming data directlyto the loop’s next port, bypassing the missing device entirely. This gives loops at leasta measure of resiliency—failure of one device in a loop doesn’t cause the entire loopto become inoperable. reference nan |
|
| 1216. |
FET meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Field Effect Transistor mean? The field-effect transistor (FET) is a type of transistor that uses an electric field to control the flow of current in a semiconductor. FETs are devices with three terminals: source, gate, and drain. FETs control the flow of current by the application of a voltage to the gate, which in turn alters the conductivity between the drain and source. FETs are also known as unipolar transistors since they involve single-carrier-type operation. That is, FETs use either electrons or holes as charge carriers in their operation, but not both. Many different types of field effect transistors exist. Field effect transistors generally display very high input impedance at low frequencies. The most widely used field-effect transistor is the MOSFET (metal-oxide-semiconductor field-effect transistor). reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1217. |
FICON meaning in Information Technology ? |
||||||||
|
Answer» INFO: Full form for FICON is FIber CONnectivity in Information Technology category
|
|||||||||
| 1218. |
FLOSS meaning in Information Technology ? |
||||||||||||||||||
|
Answer» What is Free/Libre/Open Source Software mean? Free and open-source software (FOSS) is software that is both free software and open-source software where anyone is freely licensed to use, copy, study, and change the software in any way, and the source code is openly shared so that people are encouraged to voluntarily improve the design of the software. This is in contrast to proprietary software, where the software is under restrictive copyright licensing and the source code is usually hidden from the users. FOSS maintains the software user's civil liberty rights (see the Four Essential Freedoms, below). Other benefits of using FOSS can include decreased software costs, increased security and stability (especially in regard to malware), protecting privacy, education, and giving users more control over their own hardware. Free and open-source operating systems such as Linux and descendants of BSD are widely utilized today, powering millions of servers, desktops, smartphones (e.g., Android), and other devices. Free-software licenses and open-source licenses are used by many software packages. The free-software movement and the open-source software movement are online social movements behind widespread production and adoption of FOSS, with the former preferring to use the terms FLOSS or free/libre. reference
|
|||||||||||||||||||
| 1219. |
FOLDOC meaning in Information Technology ? |
|
Answer» What is Free On-line Dictionary of Computing mean? The Free On-line Dictionary of Computing (FOLDOC) is an online, searchable, encyclopedic dictionary of computing subjects. reference nan |
|
| 1220. |
FOSI meaning in Information Technology ? |
||||||||||||||||||||||||
|
Answer» INFO: Full form for FOSI is Formatted Output Specification Instance in Information Technology category
|
|||||||||||||||||||||||||
| 1221. |
FLOPS meaning in Information Technology ? |
|
Answer» INFO: Full form for FLOPS is FLoating-Point Operations Per Second in Information Technology category nan |
|
| 1222. |
EAP meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Extensible Authentication Protocol mean? Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748, which made RFC 2284 obsolete, and is updated by RFC 5247.EAP is an authentication framework for providing the transport and usage of material and parameters generated by EAP methods. There are many methods defined by RFCs and a number of vendor specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines the information from the interface and the formats. Each protocol that uses EAP defines a way to encapsulate by the user EAP messages within that protocol's messages. EAP is in wide use. For example, in IEEE 802.11 (WiFi) the WPA and WPA2 standards have adopted IEEE 802.1X (with various EAP types) as the canonical authentication mechanism. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1223. |
EBCDIC meaning in Information Technology ? |
||||||||||||||||||
|
Answer» What is Extended Binary Coded Decimal Interchange Code mean? Extended Binary Coded Decimal Interchange Code (EBCDIC; ) is an eight-bit character encoding used mainly on IBM mainframe and IBM midrange computer operating systems. It descended from the code used with punched cards and the corresponding six-bit binary-coded decimal code used with most of IBM's computer peripherals of the late 1950s and early 1960s. It is supported by various non-IBM platforms, such as Fujitsu-Siemens' BS2000/OSD, OS-IV, MSP, and MSP-EX, the SDS Sigma series, Unisys VS/9, Unisys MCP and ICL VME. reference
|
|||||||||||||||||||
| 1224. |
EBML meaning in Information Technology ? |
|
Answer» What is Extensible Binary Meta Language mean? Extensible Binary Meta Language (EBML) is a generalized file format for any kind of data, aiming to be a binary equivalent to XML. It provides a basic framework for storing data in XML-like tags. It was originally developed for the Matroska audio/video container format. EBML is not extensible in the same way that XML is, as the XML schema (e.g., DTD) must be known in advance. reference nan |
|
| 1225. |
ECOS meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» INFO: Full form for ECOS is Embedded Configurable Operating System in Information Technology category
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1226. |
ECRS meaning in Information Technology ? |
||||||||||||||||||||
|
Answer» INFO: Full form for ECRS is Expense and Cost Recovery System in Information Technology category
|
|||||||||||||||||||||
| 1227. |
EDA meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Electronic Design Automation mean? Electronic design automation (EDA), also referred to as electronic computer-aided design (ECAD), is a category of software tools for designing electronic systems such as integrated circuits and printed circuit boards. The tools work together in a design flow that chip designers use to design and analyze entire semiconductor chips. Since a modern semiconductor chip can have billions of components, EDA tools are essential for their design; this article in particular describes EDA specifically with respect to integrated circuits (ICs). reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1228. |
EDI meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Electronic Data Interchange mean? Electronic data interchange (EDI) is the concept of businesses electronically communicating information that was traditionally communicated on paper, such as purchase orders and invoices. Technical standards for EDI exist to facilitate parties transacting such instruments without having to make special arrangements. EDI has existed at least since the early 70s, and there are many EDI standards (including X12, EDIFACT, ODETTE, etc.), some of which address the needs of specific industries or regions. It also refers specifically to a family of standards. In 1996, the National Institute of Standards and Technology defined electronic data interchange as "the computer-to-computer interchange of strictly formatted messages that represent documents other than monetary instruments. EDI implies a sequence of messages between two parties, either of whom may serve as originator or recipient. The formatted data representing the documents may be transmitted from originator to recipient via telecommunications or physically transported on electronic storage media." It distinguished mere electronic communication or data exchange, specifying that "in EDI, the usual processing of received messages is by computer only. Human intervention in the processing of a received message is typically intended only for error conditions, for quality review, and for special situations. For example, the transmission of binary or textual data is not EDI as defined here unless the data are treated as one or more data elements of an EDI message and are not normally intended for human interpretation as part of online data processing." In short, EDI can be defined as the transfer of structured data, by agreed message standards, from one computer system to another without human intervention. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1229. |
EDSAC meaning in Information Technology ? |
||||||||||||
|
Answer» What is Electronic Delay Storage Automatic Calculator mean? The Electronic delay storage automatic calculator (EDSAC) was an early British computer. Inspired by John von Neumann's seminal First Draft of a Report on the EDVAC, the machine was constructed by Maurice Wilkes and his team at the University of Cambridge Mathematical Laboratory in England. EDSAC was the second electronic digital stored-program computer to go into regular service. Later the project was supported by J. Lyons & Co. Ltd., intending to develop a commercially applied computer and succeeding in Lyons' development of LEO I, based on the EDSAC design. Work on EDSAC started during 1947, and it ran its first programs on 6 May 1949, when it calculated a table of square numbers and a list of prime numbers. EDSAC was finally shut down on 11 July 1958, having been superseded by EDSAC 2, which remained in use until 1965. reference
|
|||||||||||||
| 1230. |
EDVAC meaning in Information Technology ? |
|
Answer» What is Electronic Discrete Variable Automatic Computer mean? EDVAC (Electronic Discrete Variable Automatic Computer) was one of the earliest electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal, and was designed to be a stored-program computer. ENIAC inventors, John Mauchly and J. Presper Eckert, proposed the EDVAC's construction in August 1944. A contract to build the new computer was signed in April 1946 with an initial budget of US$100,000. EDVAC was delivered to the Ballistic Research Laboratory in 1949. The Ballistic Research Laboratory became a part of the US Army Research Laboratory in 1952. Functionally, EDVAC was a binary serial computer with automatic addition, subtraction, multiplication, programmed division and automatic checking with an ultrasonic serial memory capacity of 1,000 34-bit words. EDVAC's average addition time was 864 microseconds and its average multiplication time was 2,900 microseconds. reference |
|
| 1231. |
E-mail meaning in Information Technology ? |
||||||
|
Answer» What is Electronic mail mean? Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer. Some systems also supported a form of instant messaging, where sender and receiver needed to be online simultaneously. Ray Tomlinson is credited as the inventor of networked email; in 1971, he developed the first system able to send mail between users on different hosts across the ARPANET, using the @ sign to link the user name with a destination server. By the mid-1970s, this was the form recognized as email. Email operates across computer networks, primarily the Internet. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to be online simultaneously; they need to connect, typically to a mail server or a webmail interface to send or receive messages or download it. Originally an ASCII text-only communications medium, Internet email was extended by Multipurpose Internet Mail Extensions (MIME) to carry text in other character sets and multimedia content attachments. International email, with internationalized email addresses using UTF-8, is standardized but not widely adopted. The history of modern Internet email services reaches back to the early ARPANET, with standards for encoding email messages published as early as 1973 (RFC 561). An email message sent in the early 1970s is similar to a basic email sent today. reference
|
|||||||
| 1232. |
EIGRP meaning in Information Technology ? |
|
Answer» What is Enhanced Interior Gateway Routing Protocol mean? Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration. The protocol was designed by Cisco Systems as a proprietary protocol, available only on Cisco routers. Functionality of EIGRP was converted to an open standard in 2013 and was published with informational status as RFC 7868 in 2016. EIGRP is used on a router to share routes with other routers within the same autonomous system. Unlike other well known routing protocols, such as RIP, EIGRP only sends incremental updates, reducing the workload on the router and the amount of data that needs to be transmitted. EIGRP replaced the Interior Gateway Routing Protocol (IGRP) in 1993. One of the major reasons for this was the change to classless IPv4 addresses in the Internet Protocol, which IGRP could not support. reference |
|
| 1233. |
EEPROM meaning in Information Technology ? |
||||||||||||||||||
|
Answer» INFO: Full form for EEPROM is Electronically Erasable Programmable Read-Only Memory in Information Technology category
|
|||||||||||||||||||
| 1234. |
EFF meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Electronic Frontier Foundation mean? The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet civil liberties. The EFF provides funds for legal defense in court, presents amicus curiae briefs, defends individuals and new technologies from what it considers abusive legal threats, works to expose government malfeasance, provides guidance to the government and courts, organizes political action and mass mailings, supports some new technologies which it believes preserve personal freedoms and online civil liberties, maintains a database and web sites of related news and information, monitors and challenges potential legislation that it believes would infringe on personal liberties and fair use and solicits a list of what it considers abusive patents with intentions to defeat those that it considers without merit. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1235. |
EIDE meaning in Information Technology ? |
||||||||||||||||||||||||
|
Answer» What is Enhanced IDE mean? Parallel ATA (PATA), originally AT Attachment, also known as ATA or IDE is standard interface for IBM computers. It was first developed by Western Digital and Compaq in 1986 for compatible hard drives and CD or DVD drives. The connection is used for storage devices such as hard disk drives, floppy disk drives, and optical disc drives in computers. The standard is maintained by the X3/INCITS committee. It uses the underlying AT Attachment (ATA) and AT Attachment Packet Interface (ATAPI) standards. The Parallel ATA standard is the result of a long history of incremental technical development, which began with the original AT Attachment interface, developed for use in early PC AT equipment. The ATA interface itself evolved in several stages from Western Digital's original Integrated Drive Electronics (IDE) interface. As a result, many near-synonyms for ATA/ATAPI and its previous incarnations are still in common informal use, in particular Extended IDE (EIDE) and Ultra ATA (UATA). After the introduction of Serial ATA (SATA) in 2003, the original ATA was renamed to Parallel ATA, or PATA for short. Parallel ATA cables have a maximum allowable length of 18 in (457 mm). Because of this limit, the technology normally appears as an internal computer storage interface. For many years, ATA provided the most common and the least expensive interface for this application. It has largely been replaced by SATA in newer systems. reference
|
|||||||||||||||||||||||||
| 1236. |
DVR meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Digital Video Recorder mean? A digital video recorder (DVR) is an electronic device that records video in a digital format to a disk drive, USB flash drive, SD memory card, SSD or other local or networked mass storage device. The term includes set-top boxes with direct to disk recording, portable media players and TV gateways with recording capability, and digital camcorders. Personal computers are often connected to video capture devices and used as DVRs; in such cases the application software used to record video is an integral part of the DVR. Many DVRs are classified as consumer electronic devices; such devices may alternatively be referred to as personal video recorders (PVRs), particularly in Canada. Similar small devices with built-in (~5 inch diagonal) displays and SSD support may be used for professional film or video production, as these recorders often do not have the limitations that built-in recorders in cameras have, offering wider codec support, the removal of recording time limitations and higher bitrates. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1237. |
DIF meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Data Integrity Field mean? Data Integrity Field (DIF) is an approach to protect data integrity in computer data storage from data corruption. It was proposed in 2003 by the T10 subcommittee of the International Committee for Information Technology Standards. A similar approach for data integrity was added in 2016 to the NVMe 1.2.1 specification. Packet-based storage transport protocols have CRC protection on command and data payloads. Interconnect buses have parity protection. Memory systems have parity detection/correction schemes. I/O protocol controllers at the transport/interconnect boundaries have internal data path protection.Data availability in storage systems is frequently measured simply in terms of the reliability of the hardware components and the effects of redundant hardware. But the reliability of the software, its ability to detect errors, and its ability to correctly report or apply corrective actions to a failure have a significant bearing on the overall storage system availability.The data exchange usually takes place between the host CPU and storage disk. There may be a storage data controller in between these two. The controller could be RAID controller or simple storage switches. DIF included extending the disk sector from its traditional 512 bytes, to 520 bytes, by adding eight additional protection bytes.This extended sector is defined for Small Computer System Interface (SCSI) devices, which is in turn used in many enterprise storage technologies, such as Fibre Channel.Oracle Corporation included support for DIF in the Linux kernel.An evolution of this technology called Protection Information was introduced by 2012.One large vendor promoting the technology is EMC Corporation. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1238. |
DFS meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Distributed File System mean? A distributed file system is a file system where data is distributed across multiple nodes. Distributed file system may also refer to: Shared disk file system, a different approach, also known as cluster file system.Distributed File System (Microsoft), the Microsoft distributed file system (DFS)DCE Distributed File System, the distributed file system from The Open Group (and earlier from IBM)Distributed data store reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1239. |
DHTML meaning in Information Technology ? |
|
Answer» What is Dynamic Hypertext Markup Language mean? The HyperText Markup Language, or HTML is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaScript. Web browsers receive HTML documents from a web server or from local storage and render the documents into multimedia web pages. HTML describes the structure of a web page semantically and originally included cues for the appearance of the document. HTML elements are the building blocks of HTML pages. With HTML constructs, images and other objects such as interactive forms may be embedded into the rendered page. HTML provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. HTML elements are delineated by tags, written using angle brackets. Tags such as <img /> and <input /> directly introduce content into the page. Other tags such as <p> surround and provide information about document text and may include other tags as sub-elements. Browsers do not display the HTML tags, but use them to interpret the content of the page. HTML can embed programs written in a scripting language such as JavaScript, which affects the behavior and content of web pages. Inclusion of CSS defines the look and layout of content. The World Wide Web Consortium (W3C), former maintainer of the HTML and current maintainer of the CSS standards, has encouraged the use of CSS over explicit presentational HTML since 1997. reference |
|
| 1240. |
DIVX meaning in Information Technology ? |
||||||||
|
Answer» What is Digital Video Express mean? DIVX (Digital Video Express) is a discontinued digital video format, an unsuccessful attempt to create an alternative to video rental in the United States. reference
|
|||||||||
| 1241. |
DIMM meaning in Information Technology ? |
||||||||||||||||||||||||||
|
Answer» What is Dual Inline Memory Module mean? A DIMM () or dual in-line memory module, commonly called a RAM stick, comprises a series of dynamic random-access memory integrated circuits. These modules are mounted on a printed circuit board and designed for use in personal computers, workstations, printers, and servers. DIMMs began to replace SIMMs (single in-line memory modules) as the predominant type of memory module as Intel P5-based Pentium processors began to gain market share. While the contacts on SIMMs on both sides are redundant, DIMMs have separate electrical contacts on each side of the module. Another difference is that standard SIMMs have a 32-bit data path, while standard DIMMs have a 64-bit data path. Since Intel's Pentium, many processors have a 64-bit bus width, requiring SIMMs installed in matched pairs in order to populate the data bus. The processor would then access the two SIMMs in parallel. DIMMs were introduced to eliminate this disadvantage. reference
|
|||||||||||||||||||||||||||
| 1242. |
DKIM meaning in Information Technology ? |
|
Answer» What is Domain Keys Identified Mail mean? DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often used in phishing and email spam. DKIM allows the receiver to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain. It achieves this by affixing a digital signature, linked to a domain name, to each outgoing email message. The recipient system can verify this by looking up the sender's public key published in the DNS. A valid signature also guarantees that some parts of the email (possibly including attachments) have not been modified since the signature was affixed. Usually, DKIM signatures are not visible to end-users, and are affixed or verified by the infrastructure rather than the message's authors and recipients. DKIM is an Internet Standard. It is defined in RFC 6376, dated September 2011; with updates in RFC 8301 and RFC 8463. reference nan |
|
| 1243. |
DLNA meaning in Information Technology ? |
|
Answer» What is Digital Living Network Alliance mean? Digital Living Network Alliance (DLNA) (originally named Digital Home Working Group, DHWG) was founded by a group of PC and consumer electronics companies in June 2003 (with Intel in the lead role) to develop and promote a set of interoperability guidelines for sharing digital media among multimedia devices under the auspices of a certification standard. DLNA certified devices include smartphones, tablets, PCs, TV sets and storage servers. The group published its first set of guidelines in June 2004. The guidelines incorporate several existing public standards, including Universal Plug and Play (UPnP) for media management and device discovery and control, and widely used digital media formats and wired and wireless networking standards. DLNA worked with cable, satellite, and telecom service providers to provide link protection on each end of the data transfer. The extra layer of digital rights management (DRM) security allows broadcast operators to communicate digital media to certain devices (e.g., to those of their customers) in such a manner that further, unauthorized, communication of the media is difficult. In March 2014, DLNA publicly released the VidiPath Guidelines, originally called "DLNA CVP-2 Guidelines." VidiPath enables consumers to view subscription TV content on a wide variety of devices including televisions, tablets, phones, Blu-ray players, set top boxes (STBs), personal computers (PCs) and game consoles without any additional intermediate devices from the service provider. By September 2014 over 25,000 different device models had obtained "DLNA Certified" status, indicated by a logo on their packaging and confirming their interoperability with other devices. In June 2015 the organization claimed membership of "more than 200 companies". On January 5, 2017, DLNA announced that "the organization has fulfilled its mission and will dissolve as a non-profit trade association." Its certification program continues to be conducted by SpireSpark International of Portland, Oregon. reference |
|
| 1244. |
DMCA meaning in Information Technology ? |
||||||||||||||||||||||
|
Answer» What is Digital Millennium Copyright Act mean? The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works (commonly known as digital rights management or DRM). It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. Passed on October 12, 1998, by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while limiting the liability of the providers of online services for copyright infringement by their users. The DMCA's principal innovation in the field of copyright is the exemption from direct and indirect liability of Internet service providers and other intermediaries. This exemption was adopted by the European Union in the Electronic Commerce Directive 2000. The Information Society Directive 2001 implemented the 1996 WIPO Copyright Treaty in the EU. reference
|
|||||||||||||||||||||||
| 1245. |
DOCSIS meaning in Information Technology ? |
||||||||||||||||
|
Answer» What is Data Over Cable Service Interface Specification mean? Data Over Cable Service Interface Specification (DOCSIS) is an international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable television (CATV) system. It is used by many cable television operators to provide Internet access (see cable Internet) over their existing hybrid fiber-coaxial (HFC) infrastructure. The version numbers are sometimes prefixed with simply "D" instead of "DOCSIS" (e.g. D3 for DOCSIS 3). reference
|
|||||||||||||||||
| 1246. |
DMR meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Dennis M. Ritchie mean? Dennis MacAlistair Ritchie (September 9, 1941 – c. October 12, 2011) was an American computer scientist. He created the C programming language and, with long-time colleague Ken Thompson, the Unix operating system and B programming language. Ritchie and Thompson were awarded the Turing Award from the ACM in 1983, the Hamming Medal from the IEEE in 1990 and the National Medal of Technology from President Bill Clinton in 1999. Ritchie was the head of Lucent Technologies System Software Research Department when he retired in 2007. He was the "R" in K&R C, and commonly known by his username dmr. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 1247. |
DBCS meaning in Information Technology ? |
||||||||||||||||||||||||
|
Answer» What is Double Byte Character Set mean? A double-byte character set (DBCS) is a character encoding in which either all characters (including control characters) are encoded in two bytes, or merely every graphic character not representable by an accompanying single-byte character set (SBCS) is encoded in two bytes (Han characters would generally comprise most of these two-byte characters). A DBCS supports national languages that contain many unique characters or symbols (the maximum number of characters that can be represented with one byte is 256 characters, while two bytes can represent up to 65,536 characters). Examples of such languages include Japanese and Chinese. Korean Hangul does not contain as many characters, but KS X 1001 supports both Hangul and Hanja, and uses two bytes per character. reference
|
|||||||||||||||||||||||||
| 1248. |
DARPA meaning in Information Technology ? |
||||||||||||||||||||
|
Answer» What is Defense Advanced Research Projects Agency mean? The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Advanced Research Projects Agency (ARPA), the agency was created on February 7, 1958 by President Dwight D. Eisenhower in response to the Soviet launching of Sputnik 1 in 1957. By collaborating with academia, industry, and government partners, DARPA formulates and executes research and development projects to expand the frontiers of technology and science, often beyond immediate U.S. military requirements. The Economist has called DARPA the agency "that shaped the modern world," and pointed out that "Moderna’s covid-19 vaccine sits alongside weather satellites, GPS, drones, stealth technology, voice interfaces, the personal computer and the internet on the list of innovations for which DARPA can claim at least partial credit." Its track record of success has inspired governments around the world to launch similar research and development agencies. DARPA is independent of other military research and development and reports directly to senior Department of Defense management. DARPA comprises approximately 220 government employees in six technical offices, including nearly 100 program managers, who together oversee about 250 research and development programs. The name of the organization first changed from its founding name, ARPA, to DARPA, in March 1972, changing back to ARPA in February 1993, then reverted to DARPA in March 1996. The agency's current director, appointed in March 2021, is Stefanie Tompkins. reference
|
|||||||||||||||||||||
| 1249. |
DCCP meaning in Information Technology ? |
|
Answer» What is Datagram Congestion Control Protocol mean? In computer networking, the Datagram Congestion Control Protocol (DCCP) is a message-oriented transport layer protocol. DCCP implements reliable connection setup, teardown, Explicit Congestion Notification (ECN), congestion control, and feature negotiation. The IETF published DCCP as RFC 4340, a proposed standard, in March 2006. RFC 4336 provides an introduction. reference |
|
| 1250. |
DCCA meaning in Information Technology ? |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Answer» What is Debian Common Core Alliance mean? The DCC Alliance (DCCA) was an industry association designed to promote a common subset of the Debian Linux operating system that multiple companies within the consortium could distribute. It was founded by Ian Murdock in 2005 and was wound up in 2007. reference
|
|||||||||||||||||||||||||||||||||||||||||||||||||