Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
414 Cards in this Set
- Front
- Back
ASCII |
American Standard Code for Information Interchange |
|
Bit |
Binary digit |
|
CASE |
Computer-aided system engineering |
|
CCTV |
Closed-circuit television |
|
CPU |
Central processing unit
|
|
DBA |
Database Administrator
|
|
DBMS |
Database management system
|
|
EDI |
Electronic Data Interchange
|
|
FTP |
File Transfer Protocol
|
|
HTTP |
Hypertext Transmission Protocol |
|
HTTPS |
Secured Hypertext Transmission Protocol |
|
ID |
Identification |
|
IDS |
Intrusion detection system
|
|
IP |
Internet Protocol |
|
IS |
Information Systems
|
|
ISO |
International Organization for Standardization
|
|
IT |
Information Technology
|
|
LAN |
Local area network |
|
PBX |
Private branch (business) exchange |
|
PC |
Personal computer/microcomputer |
|
PCR |
Program change request |
|
PERT |
Program Evaluation Review Technique |
|
PIN |
Personal Identification Number |
|
PKI |
Public key infrastructure |
|
RAID |
Redundant Array of Inexpensive Disks |
|
RFID |
Radio frequency identification |
|
SDLC |
System development life cycle
|
|
SSL |
Secure Sockets Layer |
|
TCP |
Transmission Control Protocol |
|
UPS |
Uninterruptible power supply |
|
WAN |
Wide are network` |
|
4GL |
4th generation language |
|
ACID |
Atomicity, consistency, isolation and durability |
|
ACL |
Access control list |
|
AES |
Advanced Encrytion Standard |
|
AH |
Authentication header |
|
AI |
Artificial intelligence |
|
AICPA |
American Institute of Certified Public Accountants |
|
ALE |
Annual loss expectancy |
|
ALU |
Arithmetic-logic unit |
|
ANSI |
American National Standards Institute |
|
API |
Application programming interface |
|
ARP |
Address Resolution Protocol |
|
ASIC |
Application-specific integrated circuit |
|
ATDM |
Asynchronous time division multiplexing |
|
ATM |
Asynchronous Transfer Mode/ Automated Teller Machine |
|
B-to-B |
Business-to-business |
|
B-to-C |
Business to consumer |
|
B-to-E |
Business to employee |
|
B-to-G |
Business to government |
|
BCI |
Business Continuity Institute |
|
BCM |
Business continuity management |
|
BCP |
Business continuity plan/planning |
|
BDA |
Business dependency assessment |
|
BI |
Business Intelligence |
|
BIA |
Business impact analysis |
|
BIMS |
Biometric Information Management and Security |
|
BIOS |
Basic input/Output System |
|
BIS |
Bank for International Settlements |
|
BLP |
Bypass label process |
|
BNS |
Backbone network services |
|
BOM |
Bill of materials |
|
BOMP |
Bill of materials processor |
|
BPR |
Business process reengineering |
|
BRP |
Business recovery (or resumption) pan |
|
BSC |
Balanced scorecard |
|
C-to-G |
Consumer to government |
|
CA |
Certified authority |
|
CAAT |
Computer-assisted audit technique |
|
CAD |
Computer-assisted design |
|
CAE |
Computer-assisted engineering |
|
CAM |
Computer-aided manufacturing |
|
CCK |
Complementary Code Keying |
|
CCM |
Constructive Cost Model |
|
CD |
Compact Disk |
|
CD-R |
Compact-disk recordable |
|
CD-RW |
Compact-disk rewritable |
|
CDDF |
Call Data Distribution Function |
|
CDPD |
Cellular Digital Packet Data |
|
CERT |
Computer emergency response team |
|
CGI |
Common gateway interface |
|
CIA |
Confidentiality, integrity and availability |
|
CIAC |
Computer Incident Advisory Capability |
|
CICA |
Canadian Institute of Chartered Accountants |
|
CIM |
Computer-integrated manufacturing |
|
CIS |
Continuous and intermittent simulation |
|
CISO |
Chief Information Security Officer |
|
CMDB |
Configuration management database |
|
CMM |
Capability Maturity Model |
|
CMMI |
Capability Maturity Model Integration |
|
CNC |
Computerized Numeric Control |
|
COCOMO2 |
Constructive Cost Model |
|
CODASYL |
Conference on Data Systems Language |
|
COM |
Component Object Model |
|
COM/DCOM |
Component Object Model/Distributed Component Object Model |
|
COOP |
Continuity of operations plan |
|
CORBA |
Common Object Request Broker Architecture |
|
CoS |
Class of service |
|
COSO |
Committee of Sponsoring Organizations of the Treadway Commission |
|
CPM |
Critical Path Methodology |
|
CPO |
Chief Privacy Officer
|
|
CPS |
Certification practice statement |
|
CRC |
Cyclic redundancy check |
|
CRL |
Certificate revocation list |
|
CRM |
Customer relationship management |
|
CSA |
Control self-assessment |
|
CSF |
Critical success factor |
|
CSIRT |
Computer security incident response team |
|
CSMA/CA |
Carrier sense multiple access/collision avoidance |
|
CSMA/CD |
Carrier sense Multiple access/collision detection |
|
CSO |
Chief Security Officer |
|
CSU-DSU |
Channel service unit/ digital service unit |
|
DAC |
Discretionary access control |
|
DASD |
Direct access storage device |
|
DAT |
Digital audio tape |
|
DBMS |
Database management system |
|
DCE |
Data communications equipment/ Distributed computing environment |
|
DCOM |
Distributed Component Object Model |
|
DCT |
Discrete Cosine Transform |
|
DD/DS |
Data dictionary/Directory system |
|
DDL |
Data Definition Language |
|
DDN |
Digital Divide Network |
|
DDoS |
Distributed denial of service |
|
DECT |
Digital Enhanced Cordless Telecommunications |
|
DES |
Data Encryption Standard |
|
DFD |
Data flow diagram |
|
DHCP |
Dynamic Host Configuration Protocol |
|
DID |
Direct inward dial |
|
DIP |
Document image processing |
|
DLL |
Dynamic link library |
|
DMS |
Disk management system |
|
DMZ |
Demilitarized zone |
|
DNS |
Domain name system
|
|
DoS |
Denial of Service |
|
DRII |
Disaster Recovery Institute International |
|
DRM |
Digital rights management |
|
DRP |
Disaster recovery plan |
|
DSL |
Digital Subscriber lines |
|
DSS |
Decision support systems |
|
DSSS |
Direct sequence spread spectrum |
|
DTE |
Data terminal equipment |
|
DTR |
Data terminal ready |
|
DVD |
Digital video disc |
|
DVD-HD |
Digital video disc-high definition/ high density |
|
DW |
Data warehouse |
|
EA |
Enterprise Architecture |
|
EAC |
Estimates at completion |
|
EAI |
Enterprise application integration |
|
EAM |
Embedded audit module |
|
EAP |
Extensible Authentication Protocol |
|
EBCDIC |
Exteneded Binary-coded for Decimal Interchange code |
|
EC |
Electronic commerce |
|
ECC |
Elliptical Curve Cryptography |
|
EDFA |
Enterprise data flow architecture |
|
EDI |
Electronic data interchange |
|
EER |
Equal-error rate |
|
EFT |
Electronic Funds Transfer |
|
EIGRP |
Enhance Interior Gateway Routing Protocol |
|
EJB |
Enterprise Java beans |
|
EMI |
Electromagnetic interference |
|
EMRT |
Emergency response time |
|
ERD |
Entity relationship diagram |
|
ERP |
Enterprise Resource Planning |
|
ESP |
Encapsulating security payload |
|
EVA |
Earned value analysis |
|
FAR |
False-acceptance rate |
|
FAT |
File allocation table |
|
FC |
Fibre channels |
|
FDDI |
Fiber Distributed Data Interface |
|
FDM |
Frequency division multiplexing |
|
FEA |
Federal enterprise architecture |
|
FEMA |
Federal Emergency Management Association (USA) |
|
FER |
Failure-to-enroll rate |
|
FERC |
Federal Energy Regulatory Commission (USA) |
|
FFIEC |
Federal Financial Regulatory Examination Council (USA) |
|
FFT |
Fast Fourier Transform |
|
FHSS |
Frequency-hopping spread spectrum |
|
FIPS |
Federal Information Processing Standards |
|
FP |
Function point |
|
FPA |
Function point analysis |
|
FRAD |
Frame relay assembler/disassembler |
|
FRB |
Federal Reserve Board (USA) |
|
FRR |
False-rejection rate |
|
GAS |
Generalized audit software |
|
Gb |
Gigabit |
|
GB |
Gigabyte |
|
GID |
Group ID |
|
GIS |
Geographic Information Systems |
|
GPS |
Global positioning system |
|
GSM |
Global system for mobile communications |
|
GUI |
Graphical user interface |
|
HA |
High availability |
|
HD-DVD |
High definition/ high-density- digital video disc |
|
HDLC |
high-level data link control |
|
HIPAA |
Health Insurance Portability and Accountability Act (USA) |
|
HIPO |
Hierarchy input-process-output |
|
HMI |
Human machine interfacing |
|
HTML |
Hypertext Markup Language |
|
HW/SW |
Hardware/Software |
|
I/O |
Input/Output |
|
I&A |
Identification and authentication |
|
ICMP |
Internet Control Message Protocol |
|
ICT |
Information and communication technologies |
|
IDE |
Integrated development environment |
|
IDEFIX |
Integration Definition for Information Modeling |
|
IETF |
Internet Engineering Task Force |
|
IMS |
Integrated manufacturing systems |
|
IPF |
Information processing facility |
|
IPL |
Initial program load |
|
IPMA |
International Project Management Association |
|
IPRs |
Intellectual property rights |
|
IPS |
Intrusion prevention system |
|
IPSec |
IP Security |
|
IPX |
Internetwork Packet Exchange |
|
IR |
Incident response |
|
IRC |
Internet relay chat |
|
IrDA |
Infrared Data Association |
|
IRM |
Incident Response Management |
|
IS/DRP |
IS Disaster recovery planning |
|
ISAKMP/Oakley |
Internet Security Association and Key Management Protocol/Oakley |
|
ISAM |
Indexed Sequential Access Method |
|
ISDN |
Integrated services digital network |
|
ISP |
Internet service provider |
|
ITF |
Integrated test facility |
|
ITGI |
IT Governance Institute |
|
ITIL |
Information Technology Infrastructure Library |
|
ITSM |
IT Service Management |
|
ITT |
Invitation to tender |
|
ITU |
International Telecommunications Union |
|
IVR |
Interactive voice response |
|
JIT |
Just in time |
|
Kb |
Kilobit |
|
KB |
Kilobyte |
|
KB |
Knowledge Base |
|
KGI |
Key goal indicator |
|
KPI |
Key performance indicator |
|
L2TP |
Layer 2 Tunneling Protocol |
|
LCP |
Link Control Protocol |
|
M&A |
Mergers and acquisition |
|
MAC |
Mandatory access control/ Message authentication code |
|
MAC Address |
Media Access Control Address |
|
MAN |
Metropolitan Area Network |
|
MAP |
Manufacturing accounting and Production |
|
MIS |
Management Information System |
|
MODEM |
Modulator/Demodulator |
|
MOS |
Maintenance Out of Service |
|
MPLS |
Multiprotocol label switching |
|
MRP |
Manufacturing resources planning |
|
MSAUs |
Multistation access units |
|
MTBF |
Mean time between failures |
|
MTS |
Microsoft's Transaction Server |
|
MTTR |
Mean time to repair |
|
NAP |
Network Access Point |
|
NAS |
Network access server/ Network attached storage |
|
NAT |
Network address translation |
|
NCP |
Network Control Protocol |
|
NDA |
Nondisclosure agreement |
|
NFPA |
National Fire Protection Agency (USA) |
|
NFS |
Network File System |
|
NIC |
Network Interface Card |
|
NIST |
National Institute of Standards and Technology (USA) |
|
NNTP |
Network News Transfer Protocol |
|
NSP |
Name Server Protocol/ Network Server Provider |
|
NT |
New Technology |
|
NTFS |
NT file system |
|
NTP |
Network Time Protocol |
|
OBS |
Object Breakdown Structure |
|
OCSP |
Online Certificate Status Protocol |
|
ODC |
On-Demand computing |
|
OECD |
Organization for Economic Cooperation and development |
|
OEP |
Occupant emergency plan |
|
OLAP |
Online analytical processing |
|
OOSD |
Object-oriented system development |
|
ORB |
Object request broker |
|
OS |
Operating System |
|
OSI |
Open Systems Interconnection |
|
OSPF |
Open Shortest Path First |
|
PAD |
Packet assembler/disassembler |
|
PAN |
Personal area network |
|
PBX |
private branch exchange |
|
PDCA |
Plan-do-check-act |
|
PDN |
Public data network |
|
PER |
Package-enabled reengineering |
|
PICS |
Platform for Internet Content Selection |
|
PID |
Process ID/Project initiation document |
|
PKI |
Public key infastructure |
|
PLC |
Programmable logic controllers |
|
PMBOK |
Project Management Body of Knowledge |
|
PMI |
Project Management Institute |
|
POC |
Proof of concept |
|
POP |
Proof of possession |
|
POS |
Point of sale |
|
POTS |
Plain old telephone service |
|
PPP |
Point-to-point protocol |
|
PPPoE |
Point-to-point protocol over Ethernet |
|
PPTP |
Point-to-Point Tunneling Protocol |
|
PR |
Public relations |
|
PRD |
Project request document |
|
PRINCE2 |
Projects in Controlled Environments 2 |
|
PROM |
Programmable Read-only Memory |
|
PSTN |
Public switched telephone network |
|
PVC |
Permanent virtual circuit |
|
QA |
Quality assurance |
|
QAT |
Quality assurance testing |
|
RA |
Registration authority |
|
RAD |
Rapid application development |
|
RADIUS |
Remote Access Dial-in User Service |
|
RAID |
Redundant Array of Inexpensive Disks |
|
RAM |
Random access memory |
|
RAS |
Remote access service |
|
RBAC |
Role-based access control |
|
RDBMS |
Relationship database management system |
|
RF |
Radio frequencies |
|
RFI |
Request for Information |
|
RFP |
Request for proposal |
|
RIP |
Routing Information Protocol |
|
RMI |
Remote method invocation |
|
ROI |
Return on investment |
|
ROLAP |
Relational online analytical processing |
|
ROM |
Read-only memory |
|
RPC |
Remote procedure call |
|
RPO |
Recovery point objective |
|
RSN |
Robust secure network |
|
RST |
reset |
|
RTO |
Recovery time objective |
|
RTU |
Remote terminal unit |
|
RW |
Rewritable |
|
S/HTTP |
Secure Hypertext Transfer Protocol |
|
S/MIME |
Secure Multipurpose Internet Mail Extensions |
|
SA |
Security Association |
|
SAN |
The SANS institute |
|
SANS |
SysAdmin, Audit, Network, Security |
|
SAS |
Statement on Auditing Standards |
|
SBC |
Session border controller |
|
SCADA |
Supervisory Control and Data Acquisition |
|
SCARF |
Systems Control Audit Review File |
|
SCARF/EAM |
Systems Control Audit Review File and Embedded Audit Modules |
|
SCM |
Supply chain management |
|
SCOR |
Supply chain operations reference |
|
SDLC |
System development life cycle |
|
SD/MMC |
Secure digital multimedia card |
|
SDO |
Service delivery objective |
|
SEC |
Securities and Exchange Commission (USA) |
|
SET |
Secure electronic transactions |
|
SIP |
Service improvement plan |
|
SLA |
Service level agreement |
|
SLIP |
Serial Line Internet Protocol |
|
SLM |
Service Level Management |
|
SLOC |
Source lines of code |
|
SMART |
Specific, measurable, attainable, realistic, timely |
|
SME |
Subject Matter expert |
|
SMF |
System management facility |
|
SMTP |
Simple Mail Transport Protocol |
|
SNA |
Systems network Architecture |
|
SNMP |
Simple Network Management Protocol |
|
SO |
Security Officer |
|
SOA |
Service-oriented architectures |
|
SOAP |
Simple Object Access Protocol |
|
SOHO |
Small office-home office |
|
SOW |
Statement of work |
|
SPI |
Security parameter index |
|
SPICE |
Software Process Improvement and Capability determination |
|
SPOC |
Single point of contact |
|
SPOOL |
Simultaneous peripheral operations online |
|
SQL |
Structured Query Language |
|
SSH |
Secure Shell |
|
SSID |
Service Set identifier |
|
SSO |
Single sign-on |
|
SVC |
Switched virtual circuits |
|
SYSGEN |
System generation |
|
TACACS |
Terminal Access Controller Access Control System |
|
TCO |
Total cost of ownership |
|
TCP/IP |
Transmission Control Protocol/Internet Protocol |
|
TCP/UDP |
Transmission Control Protocol/User Datagram Protocol |
|
TDM |
Time-division multiplexing |
|
TELNET |
Teletype network |
|
TES |
Terminal emulation software |
|
TFTP |
Trivial File Transport Protocol |
|
TKIP |
Temporal Key Integrity Protocol |
|
TLS |
Transport layer security |
|
TMS |
Tape management system |
|
TP monitors |
Transaction processing monitors |
|
TQM |
Total Quality Management |
|
TR |
Technical Report |
|
UAT |
User acceptance testing |
|
UBE |
Unsolicited bulk email |
|
UDDI |
Universal description, discovery and integration |
|
UDP |
User Datagram Protocol |
|
UID |
User ID |
|
UML |
Unified Modeling Language |
|
URI |
Uniform resource identifier |
|
URL |
Uniform resource locator |
|
URN |
Uniform resource name |
|
USB |
Universal Serial Bus |
|
VLAN |
Virtual Local Area Network |
|
VoIP |
Voice-over IP |
|
VPN |
Virtual private network |
|
WAP |
Wireless Application Protocol |
|
WBS |
Work breakdown structure |
|
WEP |
Wired Equivalent Privacy |
|
WLAN |
Wireless local are network |
|
WML |
Wireless Markup Language |
|
WORM |
Write Once and Read Many |
|
WP |
Work Package |
|
WPA |
Wi-Fi Protected Access |
|
WPAN |
Wireless Personal Area Network |
|
WSDL |
Web Services Description Language |
|
WWAN |
Wireless wide area network |
|
X-to-X |
Exchange-to-exchange |
|
XBRL |
Extensible Business Reporting Language |
|
XML |
Extensible Markup Language |
|
XOR |
Exclusive-OR |
|
Xquery |
XML query |
|
XSL |
Extensible Stylesheet Language |