Sunday 15 December 2013

OEM 201 : EDUCATONAL MANAGEMENT AND LEADERSHIP 1---- THE OPEN UNIVESITY OF TANZANIA.

The 5 most important leadership qualities any leader should possess

See also

If you’re currently leading a team of people or are about to become a leader, I have learned five things that you should seriously take into consideration. For those already managing and leading a team of employees, it’s never too late to review some aspects of your leadership skills.
Nobody’s perfect and becoming a strong leader is something you can learn and even improve if you think that you’re lacking in certain areas. As in many other roles in the corporate world, a leadership role is a never ending process of self analysis and self improvement.
While opinions do vary regarding the role of a leader in a company or within a hierarchical system, several studies have shown that the main qualities a strong leader should possess aren’t the stereotypical ones we see almost everywhere.
Leaders that empower others are much more preferred and therefore are more successful than those who believe that leading simply means exercising power over those below you.
Here is the list of the five most important leadership qualities any good leader should possess.
1. Serve as a role model and lead as you want your leader to be: The fist real thing that differentiates a good leader from a bad one is how they understand the concept of leadership itself, and how they use it to benefit the company as well as the employees. As a leader, your role is to lead a team of people to achieve results that will ultimately enhance and better the company.
So, how do you accomplish this? Simply by empowering, trusting and setting examples instead of showing and using the power you have acquired for your own gain, and to please your ego. It’s probably a little harsh to hear but it’s a truth.
A good leader should be a role model for the rest of team. Maybe it’s even easier to think of it this way; achieving success as a leader will only happen when you manage to lead as you would like your leader to be. In other words, be the leader you would want to lead you.
2. Working the hardest to set the example: Being a leader doesn’t exonerate you from hard work. In fact, it’s the opposite. Successful leaders, whether they run international corporations or smaller firms have to understand this concept which is the importance of working the hardest to set an example. A team will only recognize a good leader who’s willing to work the hardest and set the example by raising the bar as high as possible.
The time when bosses and superiors were sitting comfortably in their offices barking orders, making negative comments, mostly and resting on their laurels should be a thing of the past. When you think of it with an open mind, it’s simple and logical.
How can a leader expect the best from his own team or co-workers if he doesn’t show the example himself? Being in charge still brings in nice perks, such as some flexible time when needed for instance, but it also gives you the very important duty to work as hard as possible alongside your team.
3. Putting your employees first in all circumstances: Leaders do have to make decisions all the time. Good leaders will try and consider the well-being of the company, as well as that of the employees. While this is clearly not an easy task to do—indeed, so many different factors can affect the running of a company—a responsible leader will look for decisions that will benefit both the company and the employees.
One very important thing to remember is that a company is nothing without its workforce, whoever they are, and so, when faced with a hard decision, a good general manager for instance with a good understanding of human resources won’t hesitate to put his or her people first.
Again, decisions can be hard to make but compromises do exist and one of the top 5 leadership skills a good leader should possess is the ability of being able to value the employees as much as the company itself.
4. Expressing yourself the right way: It’s sometimes difficult for leaders to accept that they are filling a role that requires certain skills they may not yet possess. We all express ourselves differently but when it comes to talking to employees for instance, it’s best to adopt a style that may differ from the one you use outside of the workplace.
First of all, paying close attention to what your employees are telling you is probably what’s most important when it comes to honing your communication skills. By listening carefully instead of rushing, and maybe hearing only what you really want to hear, your answer will be much more adapted to your employees’ needs, appreciations or questions.
The second most important thing to learn is to always get straight to the point. There is no need to engage in a long-winded conversation, which in the end may lead you to say things you had no intention of saying, initially.
Listening carefully and making sure that the answer you provide is clear, polite and straight to the point will not only prove effective, but will also show that as a leader, you know what you’re talking about and what you really want.
5. Do exactly as you say and mean what you say: It’s sometimes difficult to keep promises made to employees, and we all know that disappointed staff members do not make good employees.
While there is nothing wrong with promises, and if you want to be a really good leader, you must always think thoroughly before committing yourself to something that may be impossible to keep later on.
Forecasting big business results or any other great business venture for instance is always enticing, and employees will respond positively but when the results aren’t there in end, you will most certainly lose your credibility. The golden rule here is to only commit to what you can deliver and this applies to all areas of your business.
There is always a learning curve when you take on leadership roles but when you know exactly that what you’ve said and announced to your employees is what you really mean, there will be no nasty surprises, disappointments and your leadership skills will remain intact, whatever the circumstances.
Not being able to keep up with things you’ve promised is like sending your employees the message that you are not in control of the situation and ultimately of your company. This reflects badly on yourself and you want to avoid this at all costs—for you
r own benefits, the benefit of your team or co-workers, and that of your company.
In conclusion, no one is perfect and neither is their leadership style or ability. If we remember that as leaders we must lead by learning, and we must continually focus on bettering ourselves. We should truly lead with a style of graciousness and humility, and show our strength only when needed. This will improve productivity, morale, and make you an all around better leader.

OCP 100 : INTRODUCTION TO MICROCOMPUTER STUDIES AND INFORMATION TECHNOLOGY ---- THE OPEN UNIVERSITY OF TANZANIA.

Windows XP

Microsoft Windows XP was introduced in 2001 and is the most significant upgrade to the Windows operating system since Windows 95. The previous version of Windows, called Windows Me (or Millennium Edition) still had the look and feel of Windows 95 and was known to have stability issues and incompatibilities with certain hardware.
Windows XP addressed many issues of its predecessor and added a number of other improvements as well. It is a stable operating system since it is built on the Windows 2000 kernel, which is known for its reliability. XP also has a new, more modern look, and an interface that is more easy to navigate than previous versions of Windows. While not written from the ground up, like Mac OS X, Windows XP is a substantial system update. The letters "XP" stand for "eXPerience," meaning the operating system is meant to be a new type of user experience.

What is Microsoft Excel and When Would I Use it?

Question: What is Microsoft Excel and When Would I Use it?
Answer: Excel is an Electronic Spreadsheet Program
Excel is an electronic spreadsheet program that can be used for storing, organizing and manipulating data.
When you look at the Excel screen (refer to the example on this page) you see a rectangular table or grid of rows and columns. The horizontal rows are identified by numbers (1,2,3) and the vertical columns with letters of the alphabet (A,B,C). For columns beyond 26, columns are identified by two or more letters such as AA, AB, AC.
The intersection point between a column and a row is a small rectangular box known as a cell. A cell is the basic unit for storing data in the spreadsheet. Because an Excel spreadsheet contains thousands of these cells, each is given a cell reference or address to identify it.
The cell reference is a combination of the column letter and the row number such as A3, B6, AA345.
Data Types, Formulas, and Functions
The types of data that a cell can hold include numbers, text or formulas. Just as in math class, formulas are used for calculations usually involving data contained in other cells. Excel and other electronic spreadsheets include a number of built in formulas used for common tasks known as functions.
Excel and Financial Data
Spreadsheets are often used to store financial data. Formulas and functions that are used on this type of data include:
  • Performing basic mathematical operations such as summing columns and rows of figures.
  • Finding values such as profit or loss.
  • Calculating repayment plans for loans or mortgages.
  • Finding the average, maximum, or minimum values in a specified range of data.
Excel's Other Uses
Other common operations that Excel can be used for include:
  • graphing or charting data to assist users in identifying data trends.
  • sorting and filtering data to find specific information.
The information garnered in a spreadsheet can easily be incorporated into electronic presentations, web pages, or printed off in report form.
The Original "Killer App"
Spreadsheets were the original killer apps for personal computers. Early spreadsheet programs such as VisiCalc and Lotus 1-2-3 were largely responsible for the growth in popularity of computers like the Apple II and the IBM PC as a business tool.

Introducing Microsoft Office Access 2003

Microsoft® Office Access 2003 is the database management program that gives you an improved user experience and an expanded ability to import, export, and work with XML data files. Working in Access 2003 is easier because common errors are identified and flagged for you with options to correct them. Additionally, a new feature to Access 2003 also helps database developers view information on dependencies between database objects.
What is Electronic Mail?

Electronic mail, or e-mail (and mail) for short, is one of the most popular uses of the Internet. Once you have an e-mail account you can send an electronic message (sort of like a letter) to just about anyone else with an e-mail account so long as you know their e-mail address.

If you have an internet service provider (ISP) or commercial online service you probably already have and know your e-mail address (If you don't know it, you can always badger technical support!) Most e-mail addresses are set up like this: it is your username, then an @ ('at') symbol, and then a domain name (something .com, .net, or .org in most cases).

For example, if you are on America Online (AOL) your e-mail address is username@aol.com where username is your AOL screen name. (Contrary to popular belief, not everyone uses AOL, so if you use AOL and someone asks you for your e-mail address, always remember to add the @aol.com part or they might get an error message!)

Using e-mail is rather straightforward. Once you have an account set up, you just select the option that says something like "new e-mail message" or "create a new message". You'll probably be prompted with three boxes (called fields):

To:

Subject:

Body: (sometimes the body doesn't actually say body, it's just the big area where you type your actual message.)

In the To: field you type the complete e-mail address of the person who will receive the e-mail. You can type anything you want as the subject and body, although the length of the subject is limited. You usually want to keep the subject to just a few words describing the content of the body of the e-mail message.

You may also see options for attachments and forwards. You can add files to your e-mail by using the attachment option. You can forward (make a copy) of a message you receive from someone (if you have their permission if necessary) and mail it to someone else with the forward option.

You may also see fields for CC: and BCC: close to your To: field. CC stands for carbon copy. If you want to send a message to multiple people, add the extra people in the CC: field (usually you separate their e-mail addresses by commas). BCC stands for blind carbon copy. BCC works just like a carbon copy, except the e-mail addresses you type in BCC do not show up to the other recipients. (Example: You send a message To: Mary and BCC: Joey. Joey will see Mary's e-mail address, but Mary won't see Joey's e-mail address because you "blinded" it by putting it in the BCC field.)

There are two things about file attachments you need to be careful of. The first thing is that you need to limit the size of files you are sending. An attachment the size of a floppy disk (1.44MB) can take anywhere from a few seconds to a few hours for someone to receive, depending on the speed of their Internet connection. Get permission before sending large files to someone.
Caution: Be careful when reading e-mail. Most email that looks like its from a bank, credit card company, mortgage company, eBay, PayPal, etc, is actually a criminal trying to rip you off or steal your info.

To stay safe, NEVER click links in an e-mail message that takes you to a page that asks for ANY INFORMATION from you. Instead, go directly to the site. For example, if you want to check on your eBay account, open your web brower and type www.ebay.com. If you'd like to learn more about protecting yourself from this crime, go to Google and search for "phishing."

Click the yellow Norton box on the left to learn about Internet Security.

Always keep your security software up to date.

Get $30 Off Norton Internet Security 2013. Now $49.99. DISCOUNT AUTOMATICALLY APPLIED. CLICK HERE.
The second reason you need to be careful with attachments is because they are one of the most common ways for computer viruses to spread. As a rule you should never open an attachment from someone you don't know or don't trust. And even if you know the sender, don't open an attachment you are not expecting or an attachment that looks suspicious. Some viruses can destroy all the data on your computer so it's best to play it safe.
CAUTION: You can also get viruses by downloading executable files (usually .com and .exe on Windows computers) from web sites. While only a very small percentage of executable files contain viruses you still may get one. Don't download or run executable files from web sites you don't trust.
What is Chat?
So now you know all sorts of things about the Internet. But you're probably wondering, wouldn't it be nice to talk back and forth with someone without having to continuously send e-mails? Online conversations in which you are immediately able to send messages back and forth to one another is called chat.
Often you'll hear people say, "I was chatting last night to someone from [this state.]" Other times you'll hear them say "I was chatting to someone from [this country.]" Chances are they weren't talking about the telephone, which can cost a few cents every minute. They were probably talking about online chat. Online chat doesn't cost anything extra, as long as you have an Internet connection.
There are three commonly used types of chat. They are Instant Messaging, ICQ, and IRC.
Instant Messaging
Instant messaging (IM) is one of the most popular forms of chat. Most of the time, instant messaging (IM'ing) is just between two people, although most IM software can handle group chats (with 3 or more people.) When you first start out IM'ing, you have to choose a name that people see you as. This name is commonly referred to as a nick (as in nickname) and is sometimes called a handle.
The most popular form of IM is AOL Instant Messenger. AOL IM allows anyone who downloads their free software to choose a nick (AOL calls their nicks Screen names) and 'chat' with anyone else with AOL IM or the America Online Service itself. Nearly everyone with America Online is reachable by AOL IM. If you see an AOL e-mail address, you can often cut off the @aol.com to get the IM screen name to contact the person directly.
Example: You get an e-mail from Bob12345@aol.com and want to contact them by IM. Cut off the @aol.com. You're left with Bob12345. You can add Bob12345 to your "Buddy List" with AOL IM and send them a message almost anytime they are online.
No two people with AOL IM or AOL can have the same screen name.
AOL IM is free. You can download it here. The software and web site have detailed instructions on how to get started.
Caution: Be careful when reading e-mail. Most email that looks like its from a bank, credit card company, mortgage company, eBay, PayPal, etc, is actually a criminal trying to rip you off or steal your info.

To stay safe, NEVER click links in an e-mail message that takes you to a page that asks for ANY INFORMATION from you. Instead, go directly to the site. For example, if you want to check on your eBay account, open your web brower and type www.ebay.com. If you'd like to learn more about protecting yourself from this crime, go to Google and search for "phishing."

Click the yellow Norton box on the left to learn about Internet Security.

Always keep your security software up to date.

Get $30 Off Norton Internet Security 2013. Now $49.99. DISCOUNT AUTOMATICALLY APPLIED. CLICK HERE.
ICQ ("I seek you")
ICQ is an extremely useful communication program. It allows you to message (chat), send files, send URLs, and more to anyone else with ICQ.
When you download ICQ (which is free) you are assigned an ICQ number. Two or more people using ICQ can have the same nickname, but no two people can have the same ICQ number. If you want to let someone contact you by ICQ, give them both your ICQ# and your nickname, so they won't accidentally contact someone else with the same nickname by mistake.
ICQ is a great tool to keep in touch. You can learn more about using ICQ at icq.com.
IRC - Internet Relay Chat
Unlike AOL IM and ICQ, IRC (Internet Relay Chat) is not owned by any company. To use IRC, you need an IRC client program. I recommend the shareware program mIRC if you are using Microsoft Windows.
IRC has many networks that are completely separate from one another. Some popular networks include The Undernet, EFnet, and DALnet. If you want to chat with someone on IRC, you need to make sure that both of you are on the same network (you can set it and change it each time your start your IRC program.)
IRC has very few rules. You are allowed to say pretty much anything to want to pretty much anyone you want. For example, if you are on AOL, and someone keeps bothering you, you could report that screen name to the AOL company. There is no high authority on IRC, but there is still an ignore option to use if someone annoys you.
IRC is probably the best way to meet new people. Most people who use IRC are very friendly and helpful.
Once you connect to an IRC network with an IRC client program, there are often thousands of rooms (they are called channels, and all start with a pound sign [#]) on nearly any topic, and tens of thousands of different people to chat with. If you have some free time and you're pretty bored, IRC is an excellent way to have a nice chat.
Note: Although only one person can be using a nickname at a time on an IRC network, there is no central registration. It is conceivable that someone else may be using the same nickname as you when you aren't online just by pure coincidence. Please pick a unique nickname to reduce the chances of being mistaken for someone else.
Other Chat Possibilities
The programs and services mentioned above are just a few of the more popular ways to chat. If there is someone you wish to chat with, contact that person by e-mail first. You can ask them if they use a chat or IM service. It is possible they may be using one that I haven't mentioned above. Lots of web sites also have chats built into them.

 



What are Discussion Boards and Newsgroups?
Discussion boards (which are often called message boards) and newsgroups in general both accomplish the same task. They each have general topics, and visitors can post messages about those topics on them. Anyone who has access to the board of newsgroup can read and reply to a message, which again, will be able to read and replied to by anyone else with access.
Discussion boards are usually read through a web browser, while newsgroups are usually read through a special program called a (newsgroup) reader. I prefer discussion boards on the web to newsgroups because I find them easier to use.
Some popular web sites that have discussion boards include delphi.com and theglobe.com. If you want access to a newsgroup (like alt.something or comp.something) and don't have or don't want to set up a reader you can access them through the USENET newsgroup section of deja.com.
(Some people with the technical know-how set up message boards on their web sites. An alternative to setting one up on your site is to setting one up on a free server like delphi.com and linking to it from your web site.)
Caution: Be careful when reading e-mail. Most email that looks like its from a bank, credit card company, mortgage company, eBay, PayPal, etc, is actually a criminal trying to rip you off or steal your info.

To stay safe, NEVER click links in an e-mail message that takes you to a page that asks for ANY INFORMATION from you. Instead, go directly to the site. For example, if you want to check on your eBay account, open your web brower and type www.ebay.com. If you'd like to learn more about protecting yourself from this crime, go to Google and search for "phishing."


What is the World Wide Web?
The World Wide Web is what you are using right now (unless you printed out the guide, then you're probably reading a piece of paper). The World Wide Web is the name given to the entire part of the Internet you can access with your web browser software. (Netscape Navigator and Microsoft Internet Explorer are the two most popular web browsers.) The World Wide Web, or WWW or web for short, consists of millions of web sites (like yahoo.com, microsoft.com, and davesite.com) and millions of web pages.
A web page is what you are viewing right now. It's kind of like a word-processing document, except it can contain pictures, sounds, and even movies along with text. Anyone who knows a little HTML (hyper-text markup language) or has a program capable of saving in HTML can make a web page. (For a free course in HTML, you can visit HTML: An Interactive Tutorial for Beginners, which is one of my other sites.)
The main difference between a web page (or 'home page') and a web site is that a web site generally contains multiple web pages, all linked to one another in some fashion. Some people use the term web page and web site interchangeably but those with Internet experience know the difference.
One of the beauties of the World Wide Web is the ability to hyperlink. (A hyperlink is one of those cool little [usually] blue and [usually] underlined pieces of text that you can click on to go to a different web page.) When someone makes a web page they can place a link on it to virtually anywhere they wish on the web. When someone visits their web page they can just click the link and the visitor's computer automatically loads the linked site in the web browser window. Most people use links to help their sites' visitors find other useful sites. When someone makes a page about himself or herself just for fun they'll usually add links to pages created by their friends.
Links can connect different web sites on different servers. You can even make a link to this guide if you really wanted to!

What is the Internet?
The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to one another. These computers are connected by phone lines, fiber optic lines, coaxial cable, satellites, and wireless connections.
When you log on to the Internet you are given access to many of the other computers that are connected around the world.
Some common ways of connecting to the Internet include:
  • Internet service provider ( ISP ) by modem
  • Internet ready cable
  • digital subscriber line ( ADSL )
  • simply turning on your computer which is on a network at work or school connected to the Internet
Today you can even get a wireless connection to the Internet with a handheld PC or notebook computer.
Caution: Be careful when reading e-mail. Most email that looks like its from a bank, credit card company, mortgage company, eBay, PayPal, etc, is actually a criminal trying to rip you off or steal your info.

To stay safe, NEVER click links in an e-mail message that takes you to a page that asks for ANY INFORMATION from you. Instead, go directly to the site. For example, if you want to check on your eBay account, open your web brower and type www.ebay.com. If you'd like to learn more about protecting yourself from this crime, go to Google and search for "phishing."

Click the yellow Norton box on the left to learn about Internet Security.

Always keep your security software up to date.

Get $30 Off Norton Internet Security 2013. Now $49.99. DISCOUNT AUTOMATICALLY APPLIED. CLICK HERE.
Once you are connected to the Internet you are able to do many things. You can send and receive e-mail. You can chat with text or voice. You can browse the World Wide Web. And you can perform countless other tasks with the appropriate software.
The Internet works a lot like a postal or parcel delivery system, except it is much, much faster. Say, for example, you are in California and want to send an e-mail to a friend in London. After you press the send button, your e-mail goes to your mail server. (Your mail server isn't usually part of your computer, but rather part of your internet service provider's computer network, so you can disconnect as soon as you press the send button and it won't interrupt delivery.) The mail server will attempt to contact your friend's mail server in London. But chances are your mail server doesn't have a direct line connecting it to your friend's mail server in London. Your mail server may have to "talk" to a computer in Chicago, which then takes to a computer in Washington, D.C., which contacts the London server via satellite. Or the Washington, D.C. computer might contact London via an undersea cable.
If the satellite or undersea cable appeared to be busy with other Internet data, your mail server may try sending west through Australia or Japan. In theory, the e-mail, although probably just a few paragraphs may possibly be broken into two or more parts and half of it would be sent east and half west. All the pieces would be reconstructed in London in one piece for your friend to read next time they log on.
The Internet is very dynamic. Routers and other computer server hardware try to find the best lines between servers so you get the best possible service. All of these connections are transparent to you, the Internet User. All of these connections look just like a direct connection to you. It makes using the Internet a lot easier.
CAUTION: It is important that you use a secure server when transferring personal information like credit card numbers over the Internet because any stop along the way (again, in theory) could log your credit card number. When you use a secure server, the number is encrypted (coded) and looks like gibberish to every computer except the one you are sending the number to. Look for a "secure server" option before entering your credit card number online.



Dave's Beginners Guide to the Internet
Net Etiquette and Shorthand

Net Etiquette

There are a few things you should try to remember if you want to be treated with respect from the online community.
  • Don't type everything in CAPITAL LETTERS. A sentence typed in capital letters is considered yelling by the online community, and it makes you look like a goof.
  • If you are sending an e-mail to or communicating with someone you don't know well enough to be informal with:
    • Address them with respect.
    • Use complete sentences with proper capitalization and punctuation.
    • Do not use shorthand abbreviations, especially u for you, because you'll look like a goof.
    • Don't use profane language.
  • Laws applicable offline are almost always applicable online. Do not break a law. Do not harass or defame individuals. Do not pirate (that is, make illegal copies of) copyrighted material such as web sites, music, and software. You can be sued or prosecuted from your online activity just as you can be sued or prosecuted from your offline activities.

Shorthand

In many informal situations on the Internet you may see a lot of shorthand. It saves times to use shorthand. Just remember not to use shorthand in formal situations where it may not be appropriate.
Some common shorthand includes:
  • wb - welcome back (sometimes write back in an e-mail)
  • lol - lots of laughter or laughing out loud
  • rofl - rolls on floor laughing
  • roflmao - rolls on floor laughing my a** off
  • asl or a/s/l - age / sex / location query. Used in informal chat situations to get to know people. A proper response would be something like 25/f/ca if you were a 25 year old female from California.
This is just a tiny list of shorthand. If you don't know what an abbreviation means, ask the person who wrote it. You should get used to it pretty quickly.
Anonymity and Privacy
Anonymity and privacy on the Internet come hand in hand. In general, people on the Internet do not know anything more about you than you offer to tell them.
If you e-mail someone, they may be able to see your first and last name, depending on how you set up your e-mail account. You may wish to check those setting if you don't want people to know your full name.
Before you submit data to enter a contest online or for a free offer, check for a site privacy policy. (You can see the davesite.com privacy policy here if you'd like.) Some sites will sell your e-mail address and/or mailing address to direct marketers. Most privacy policies will tell you what practices a web site will follow with your personal information. If you have a suspicion about a web site, don't give them your information.
When you surf the web or chat the only thing visible to other users that can identify you in remote circumstances is your IP address. This number, which either changes every time you log on (dynamic IP address) or stays the same every time you log on (static IP address) allows data to be transferred to and from your computer and other computers on the Internet.
An IP address is kind of like a phone number. Say you ordered pizza, you'd have to tell them where you lived in order for it to be delivered. An IP address is just like your delivery address for the Internet. It lets you get what you want while you are online.
While the common person cannot figure out who you are from an IP address, government agencies like the FBI and Secret Service in the U.S. can contact your internet service provider (ISP) if you broke the law to figure out who was using a certain IP address when a crime occurred online. (Cracking [breaking into someone else's computer or server illegally] and piracy can be tracked, so don't do these things and other things that can get you in trouble unless you really like prison food!)
Caution: Be careful when reading e-mail. Most email that looks like its from a bank, credit card company, mortgage company, eBay, PayPal, etc, is actually a criminal trying to rip you off or steal your info.

To stay safe, NEVER click links in an e-mail message that takes you to a page that asks for ANY INFORMATION from you. Instead, go directly to the site. For example, if you want to check on your eBay account, open your web brower and type www.ebay.com. If you'd like to learn more about protecting yourself from this crime, go to Google and search for "phishing."

Click the yellow Norton box on the left to learn about Internet Security.

Always keep your security software up to date.

Get $30 Off Norton Internet Security 2013. Now $49.99. DISCOUNT AUTOMATICALLY APPLIED. CLICK HERE.
To stay on the safe side, don't give out information to those that you don't trust. And never give out your password to anyone. Remember to check out privacy policies, and remember you can be held accountable for any crimes you commit.
Safety Issues
Safety is important on the Internet, especially for children. If you are a parent concerned with what your child may find on the Internet, you may wish to consider filtering software. Filtering software will block most objectionable sites and can usually be disabled with a password you set. (A disadvantage of filtering software is that it also blocks a lot of non-objectionable content, like information on breast cancer, because it could find breast as an objectionable word.)
Other ways to stay safe:
  • Don't give out personal information like street addresses and phone numbers on your personal web site or in chats.
  • If you are chatting or have an e-mail contact you are not completely comfortable with, do not tell them the exact area you live. Give then your general area (example: Southern California) or general metropolitan area (example: near San Diego).
  • Don't give out bank account numbers or credit card numbers in e-mail or enter them on non-secure web servers. If you want to purchase something, make sure you are on a secure server before you start typing a credit card number. (You can usually tell the difference between a secure server and a non-secure server because secure servers start with https:// in the Location: field at the top of the web browser, while non-secure servers start with http://) Secure servers encrypt your data so no one else can get your information except the computer at the other end.
  • Use a virus scanner. Don't download files from web sites you don't trust or from e-mails that look suspicious. Be careful even if you have a virus scanner installed, because your scanning software does not recognize undiscovered and new viruses. Update your virus definitions so you have the best protection with your software (consult your scanner manual if you need help with that.)
Caution: Be careful when reading e-mail. Most email that looks like its from a bank, credit card company, mortgage company, eBay, PayPal, etc, is actually a criminal trying to rip you off or steal your info.

To stay safe, NEVER click links in an e-mail message that takes you to a page that asks for ANY INFORMATION from you. Instead, go directly to the site. For example, if you want to check on your eBay account, open your web brower and type www.ebay.com. If you'd like to learn more about protecting yourself from this crime, go to Google and search for "phishing."

Click the yellow Norton box on the left to learn about Internet Security.

Always keep your security software up to date.

Get $30 Off Norton Internet Security 2013. Now $49.99. DISCOUNT AUTOMATICALLY APPLIED. CLICK HERE.
NOTE: In the United States, you are only held responsible for the first $50 of an unauthorized charge on your credit card (unfortunately this does not include purchases your children may make.) It doesn't matter whether the charge came from an online or offline store. So don't be afraid to buy online from reputable vendors.
Finding Stuff on the Web
In order to find something on the web, first you need to determine the category what you are looking for falls into.
If you are looking for online information on a certain topic, you’ll probably want to use a regular search engine.
But perhaps you are looking for a recipe for a dinner. Sure, you could try searching at a search engine for a specific recipe, but it might be better to get to a recipe site first. So you’d want to search for “recipes” in general and then, once you find a reliable-looking site, use its own search engine or browse its categories for an appropriate recipe.
Or perhaps you are looking for a phone number. You’ll want to find some white pages or yellow pages. Have a phone number and need to know to whom it belongs? You’ll need to do a reverse phone number lookup.
This last example probably illustrates the problem the best. If you were to go to Yahoo.com and type in your home phone number in the main search engine, chances are you’d get nothing. However, if you took a different approach, and went to the Reverse Lookup section of anywho.com, you’d probably get the right result. But of course, you didn’t know that anywho.com existed before I mentioned it. So you’d have to take three steps:
  1. Search for "Reverse Lookup" at a popular search engine.
  2. Visit the sites that are in the search result for one you think would work.
  3. Once you’ve found a site that worked, enter the number you’re looking up.
Say you are looking for a recent unbiased product review. Sure, you could type "[product name here] review" in a major search engine, but there may be better places to look. Perhaps you'd want to check out epinions.com, a place where thousands of people submit and rate reviews about thousands of products.
Obviously, you are not going to know the best site for what you need when you are starting out. So, just test out a few different search engines. When you find a site you think is useful, Bookmark it. Right away, you'll probably want to bookmark a few major search engines, just to get started. Sometimes one search engine will give you better results than another one.
My personal favorites for search engines are yahoo.com, directhit.com, askjeeves.com, altavista.com, and northernlight.com. Other popular search engines include excite.com, lycos.com, infoseek.com, and google.com. There are a dozen more extremely popular search engines. I'd suggest that you try a few out. Sometimes it's best to use different engines depending on your circustances.
Here's a few examples of specialized searches:
  • How would you find the capital of Vermont?
    • Well, you could search for "Vermont" at a major search engine, but you'd probably come up with thousands of results, ranging from hotels and resorts to small businesses, high schools, and personal webpages from people who live in the state.
    • In this case, you might want to use a question-answering engine like askjeeves.com. Go to askjeeves.com and type in the question box: What is the capital of Vermont?
  • How would you find a local restaurant with genuine Thai cuisine?
    • Well, you could search for "Thai cusuine" at a major search engine, but it'd probably take you hours to find a restaurant that is within an hour's drive.
    • In this case, you'd probably want to check out an Online Yellow pages web site. Enter your City, find the restaurants category, and type in 'thai food' or 'thai cuisuine.'
So when you are searching, think a little bit about where you might find the best result. It'll take time to get used to all the different ways you can find what you want, but you're sure to enjoy the learning process.
Want an amusing search to start off with? Go to altavista.com, and type your regular full name (what you commonly go by) in quotes, e.g. "Bob Smith" You might be amazed at how many people have the same name as you, or you might find out you already have a few fan clubs. If you have a really unique name, I'm sorry! :)
Glossary
You've finished the lessons. This page is for reference.
Browser
common name for a web browser. A piece of software that displays web sites and web pages on a computer or other Internet-ready device.
Chat
communication between two or more people, typically in real-time. Electronic mail is generally not considered chat, because it is not two people writing back and forth in conversation simultaneously.
E-mail
Electronic mail. One of the most popular uses of the Internet. Allows for communication between people when one person is online and one person is not online. An e-mail address is a place where someone can contact another person, typically in the format username@host.com.
Caution: Be careful when reading e-mail. Most email that looks like its from a bank, credit card company, mortgage company, eBay, PayPal, etc, is actually a criminal trying to rip you off or steal your info.

To stay safe, NEVER click links in an e-mail message that takes you to a page that asks for ANY INFORMATION from you. Instead, go directly to the site. For example, if you want to check on your eBay account, open your web brower and type www.ebay.com. If you'd like to learn more about protecting yourself from this crime, go to Google and search for "phishing."

Click the yellow Norton box on the left to learn about Internet Security.

Always keep your security software up to date.

Get $30 Off Norton Internet Security 2013. Now $49.99. DISCOUNT AUTOMATICALLY APPLIED. CLICK HERE.
HTML
HyperText Markup Language. The code that tells the web browser how to interpret a web page.
Internet
Global Network of millions of computers that are able to communicate with one another based on a standard protocol.
IP
Internet Protocol, typically refers to the Internet Protocol number, such as 127.0.0.1, which is much like a house address or phone number. When you request information such as a web page, or send e-mail, this IP is recorded along with it. In addition, IP's are used to track crackers (computer hackers who break the law.)
ISP
Internet Service Provider. Someone you typically pay in order to be connected to the Internet. Usually provides you with an e-mail address and a phone number to dial into with your modem.
Link
something embedded in a web page that gives instructions on what a web browser should do once the user clicks it. Kind of like a "shortcut" for the Internet.
Modem
Computer hardware that "talks" to an ISP, tranfers data, and such. Most modems can also be set up to receive and send faxes (when they are not connected to the Internet.)
Online
to be logged on to the Internet, typically actively doing something.
Search engine
a piece of computer software that retrieves data relative to a query from a large database of information. Typically, a search engine is a web site with this software, and is used to find other web sites after the user enters keywords.
WWW / World Wide Web
the part of the Internet based on the HTTP protocol. Commonly accessed with a web browser.

List of computing and IT abbreviations

From Wikipedia, the free encyclopedia
Jump to: navigation, search
This is a list of computing and IT acronyms and abbreviations.

0–9

  • /.—Slashdot
  • 1GL—First-Generation Programming Language
  • 1NF—First Normal Form
  • 10B2—10BASE-2
  • 10B5—10BASE-5
  • 10B-F—10BASE-F
  • 10B-FB—10BASE-FB
  • 10B-FL—10BASE-FL
  • 10B-FP—10BASE-FP
  • 10B-T—10BASE-T
  • 100B-FX—100BASE-FX
  • 100B-T—100BASE-T
  • 100B-TX—100BASE-TX
  • 100BVG—100BASE-VG
  • 286—Intel 80286 processor
  • 2B1Q—2 Binary 1 Quaternary
  • 2GL—Second-Generation Programming Language
  • 2NF—Second Normal Form
  • 3GL—Third-Generation Programming Language
  • 3GPPmobile broadband "3G" Partnership Project
  • 3NF—Third Normal Form
  • 386—Intel 80386 processor
  • 486—Intel 80486 processor
  • 4B5BLF—4 Byte 5 Byte Local Fiber
  • 4GL—Fourth-Generation Programming Language
  • 4NF—Fourth Normal Form
  • 5GL—Fifth-Generation Programming Language
  • 5NF—Fifth Normal Form
  • 6NF—Sixth Normal Form
  • 8B10BLF—8 Byte 10 Byte Local Fiber

A

  • AAT—Average Access Time
  • AA—Anti-Aliasing
  • AAA—Authentication Authorization, Accounting
  • AABB—Axis Aligned Bounding Box
  • AAC—Advanced Audio Coding
  • AAL—ATM Adaptation Layer
  • AALC—ATM Adaptation Layer Connection
  • AARP—AppleTalk Address Resolution Protocol
  • ABCL—Actor-Based Concurrent Language
  • ABI—Application Binary Interface
  • ABM—Asynchronous Balanced Mode
  • ABR—Area Border Router
  • ABR—Auto Baud-Rate detection
  • ABR—Available Bitrate
  • ABR—Average Bitrate
  • AC—Acoustic Coupler
  • AC—Alternating Current
  • ACD—Automatic Call Distributor
  • ACE—Advanced Computing Environment
  • ACID—Atomicity Consistency Isolation Durability
  • ACK—ACKnowledgement
  • ACK—Amsterdam Compiler Kit
  • ACL—Access Control List
  • ACL—Active Current Loop
  • ACM—Association for Computing Machinery
  • ACME—Automated Classification of Medical Entities
  • ACP—Airline Control Program
  • ACPI—Advanced Configuration and Power Interface
  • ACR—Allowed Cell Rate
  • ACR—Attenuation to Crosstalk Ratio
  • AD—Active Directory
  • AD—Administrative Domain
  • ADC—Analog-to-Digital Converter
  • ADC—Apple Display Connector
  • ADB—Apple Desktop Bus
  • ADCCP—Advanced Data Communications Control Procedures
  • ADO—ActiveX Data Objects
  • ADSL—Asymmetric Digital Subscriber Line
  • ADT—Abstract Data Type
  • AE—Adaptive Equalizer
  • AES—Advanced Encryption Standard
  • AF—Anisotropic Filtering
  • AFP—Apple Filing Protocol
  • AGP—Accelerated Graphics Port
  • AH—Active Hub
  • AI—Artificial Intelligence
  • AIX—Advanced Interactive eXecutive
  • Ajax—Asynchronous JavaScript and XML
  • AL—Active Link
  • AL—Access List
  • ALAC—Apple Lossless Audio Codec
  • ALGOL—Algorithmic Language
  • ALSA—Advanced Linux Sound Architecture
  • ALU—Arithmetic and Logical Unit
  • AM—Access Method
  • AM—Active Matrix
  • AMOLED—Active-Matrix Organic Light-Emitting Diode
  • AM—Active Monitor
  • AM—Allied Mastercomputer
  • AM—Amplitude Modulation
  • AMD—Advanced Micro Devices
  • AMQP—Advanced Message Queuing Protocol
  • AMR—Audio Modem Riser
  • ANN—Artificial Neural Network
  • ANSI—American National Standards Institute
  • ANT—Another Neat Tool
  • AoE—ATA over Ethernet
  • AOP—Aspect-Oriented Programming
  • APCI—Application-Layer Protocol Control Information
  • API—Application Programming Interface
  • APIC—Advanced Programmable Interrupt Controller
  • APIPA—Automatic Private IP Addressing
  • APL—A Programming Language
  • APR—Apache Portable Runtime
  • ARC—Adaptive Replacement Cache
  • ARC—Advanced RISC Computing
  • ARIN—American Registry for Internet Numbers
  • ARM—Advanced RISC Machines
  • AROS—AROS Research Operating System
  • ARP—Address Resolution Protocol
  • ARPA—Address and Routing Parameter Area
  • ARPA—Advanced Research Projects Agency
  • ARPANET—Advanced Research Projects Agency Network
  • AS—Access Server
  • ASCII—American Standard Code for Information Interchange
  • ASG—Abstract Semantic Graph
  • ASIC—Application-Specific Integrated Circuit
  • ASIMO—Advanced Step in Innovative Mobility
  • ASLR—Address Space Layout Randomization
  • ASM—Algorithmic State Machine
  • ASMP—Asymmetric Multiprocessing
  • ASN.1—Abstract Syntax Notation 1
  • ASP—Active Server Pages
  • ASP—Application Service Provider
  • ASR—Asynchronous Signal Routine
  • AST—Abstract Syntax Tree
  • ASSP—Application-Specific Standard Product
  • AT—Advanced Technology
  • AT—Access Time
  • AT—Active Terminator
  • ATA—Advanced Technology Attachment
  • ATAG—Authoring Tool Accessibility Guidelines
  • ATAPI—Advanced Technology Attachment Packet Interface
  • ATM—Asynchronous Transfer Mode
  • AVC—Advanced Video Coding
  • AVI—Audio Video Interleaved
  • AWK—Aho Weinberger Kernighan
  • AWT—Abstract Window Toolkit

B

  • B2B—Business-to-Business
  • B2C—Business-to-Consumer
  • BAL—Basic Assembly Language
  • BAM—Block Availability Map
  • Bash—Bourne-again shell
  • BASIC—Beginner's All-Purpose Symbolic Instruction Code
  • BBP—Baseband Processor
  • BBS—Bulletin Board System
  • BCD—Binary Coded Decimal
  • BCNF—Boyce–Codd normal form
  • BEEP—Blocks Extensible Exchange Protocol
  • BER—Bit Error Rate
  • BFD—Bidirectional Forwarding Detection
  • BFD—Binary File Descriptor
  • BFS—Breadth-First Search
  • BFT—Byzantine Fault Tolerant
  • BGP—Border Gateway Protocol
  • BiDi—Bi-Directional
  • bin—binary
  • BINAC—Binary Automatic Computer
  • BIND—Berkeley Internet Name Domain
  • BIOS—Basic Input Output System
  • BJT—Bipolar Junction Transistor
  • bit—binary digit
  • Blob—Binary large object
  • Blog—Web Log
  • BMP—Basic Multilingual Plane
  • BNC—Bayonet Neill-Concelman
  • BOINC—Berkeley Open Infrastructure for Network Computing
  • BOM—Byte Order Mark
  • BOOTP—Bootstrap Protocol
  • BPDU—Bridge Protocol Data Unit
  • BPEL—Business Process Execution Language
  • BPL—Broadband over Power Lines
  • BPM—Business Process Modeling
  • bps—bits per second
  • BRM—Business Reference Model
  • BRMS—Business Rule Management System
  • BRR—Business Readiness Rating
  • BSA—Business Software Alliance
  • BSB—Backside Bus
  • BSD—Berkeley Software Distribution
  • BSoD—Blue Screen of Death
  • BSS—Block Started by Symbol
  • BT—BitTorrent
  • BT—Bluetooth
  • BTAM—Basic Telecommunications Access Method
  • BW—Bandwidth
  • BYOD—Bring Your Own Device

C

  • CA—Certificate Authority
  • CAD—Computer-Aided Design
  • CAE—Computer-Aided Engineering
  • CAID—Computer-Aided Industrial Design
  • CAI—Computer-Aided Instruction
  • CAM—Computer-Aided Manufacturing
  • CAPTCHA—Completely Automated Public Turing Test to tell Computers and Humans Apart
  • CAT—Computer-Aided Translation
  • CAQ—Computer-Aided Quality Assurance
  • CASE—Computer-Aided Software Engineering
  • cc—C Compiler
  • CD—Compact Disc
  • CDE—Common Desktop Environment
  • CDMA—Code Division Multiple Access
  • CDN—Content Delivery Network
  • CDP—Continuous Data Protection
  • CD-R—CD-Recordable
  • CD-ROM—CD Read-Only Memory
  • CD-RW—CD-Rewritable
  • CDSA—Common Data Security Architecture
  • CERT—Computer Emergency Response Team
  • CES—Consumer Electronics Show
  • CF—Compact Flash
  • CFD—Computational Fluid Dynamics
  • CFG—Context-Free Grammar
  • CFG—Control Flow Graph
  • CG—Computer Graphics
  • CGA—Color Graphics Array
  • CGI—Common Gateway Interface
  • CGI—Computer-Generated Imagery
  • CGT—Computational Graph Theory
  • CHAP—Challenge-Handshake Authentication Protocol
  • CHS—Cylinder-Head-Sector
  • CIDR—Classless Inter-Domain Routing
  • CIFS—Common Internet Filesystem
  • CIM—Common Information Model
  • CIM—Computationally Independent Model
  • CISC—Complex Instruction Set Computer
  • CJK—Chinese, Japanese, and Korean
  • CJKV—Chinese, Japanese, Korean, and Vietnamese
  • CLI—Command Line Interface
  • CLR—Common Language Runtime
  • CM—Configuration Management
  • CM—Content Management
  • CMMI—Capability Maturity Model Integration
  • CMOS—Complementary Metal-Oxide Semiconductor
  • CMS—Content Management System
  • CN—Canonical Name
  • CN—Common Name
  • CNC—Computer Numerical Control
  • CNR—Communications and Networking Riser
  • COBOL—Common Business-Oriented Language
  • COMPUTER-Common Operating Machine Particularly Used for Trade, Education, and Research
  • COM—Component Object Model
  • CORBA—Common Object Request Broker Architecture
  • COTS—Commercial Off-The-Shelf
  • CPA—Cell Processor Architecture
  • CPAN—Comprehensive Perl Archive Network
  • CP/M—Control Program/Monitor
  • CPRI—Common Public Radio Interface
  • CPS—characters per second
  • CPU—Central Processing Unit
  • CR—Carriage Return
  • CRAN—Comprehensive R Archive Network
  • CRC—Cyclic Redundancy Check
  • CRLF—Carriage Return Line Feeds
  • CRM—Customer Relationship Management
  • CRS—Computer Reservations System
  • CRT—Cathode Ray Tube
  • CRUD—Create, Read, Update and Delete
  • CS—Cable Select
  • CS—Computer Science
  • CSE—Computer Science and Engineering
  • CSI—Common System Interface
  • CSP—Communicating Sequential Processes
  • CSRF—Cross-Site Request Forgery
  • CSS—Cascading Style Sheets
  • CSS—Content-Scrambling System
  • CSS—Closed Source Software
  • CSS—Cross-Site Scripting
  • CSV—Comma-Separated Values
  • CT—Computerized Tomography
  • CTAN—Comprehensive TeX Archive Network
  • CTCP—Client-To-Client Protocol
  • CTI—Computer Telephony Integration
  • CTL—Computational Tree Logic
  • CTM—Close To Metal
  • CTS—Clear To Send
  • CTSS—Compatible Time-Sharing System
  • CUA—Common User Access
  • CVS—Concurrent Versioning System

D

  • DAC—Digital-To-Analog Converter
  • DAC—Discretionary Access Control
  • DAL—Database Abstraction Layer
  • DAO—Data Access Objects
  • DAO—Disk-At-Once
  • DAP—Directory Access Protocol
  • DARPA—Defense Advanced Research Projects Agency
  • DAT—Digital Audio Tape
  • DB—Database
  • DBA—Database Administrator
  • DBCS—Double Byte Character Set
  • DBMS—Database Management System
  • DCC—Direct Client-to-Client
  • DCCP—Datagram Congestion Control Protocol
  • DCCA—Debian Common Core Alliance
  • DCL—Data Control Language
  • DCMI—Dublin Core Metadata Initiative
  • DCOM—Distributed Component Object Model
  • DD—Double Density
  • DDE—Dynamic Data Exchange
  • DDL—Data Definition Language
  • DDoS—Distributed Denial of Service
  • DDR—Double Data Rate
  • DEC—Digital Equipment Corporation
  • DES—Data Encryption Standard
  • dev—development
  • DFA—Deterministic Finite Automaton
  • DFD—Data Flow Diagram
  • DFS—Depth-First Search
  • DFS—Distributed File System
  • DGD—Dworkin's Game Driver
  • DHCP—Dynamic Host Configuration Protocol
  • DHTML—Dynamic Hypertext Markup Language
  • DIF—Data Integrity Field
  • DIMM—Dual Inline Memory Module
  • DIN—Deutsches Institut für Normung
  • DIP—Dual In-line Package
  • DIVX—Digital Video Express
  • DKIM—Domain Keys Identified Mail
  • DL—Download
  • DLL—Dynamic Link Library
  • DLNA—Digital Living Network Alliance
  • DLP—Digital Light Processing
  • DMA—Direct Memory Access
  • DMCA—Digital Millennium Copyright Act
  • DMI—Direct Media Interface
  • DML—Data Manipulation Language
  • DML—Definitive Media Library
  • DMR—Dennis M. Ritchie
  • DN—Distinguished Name
  • DND—Drag-and-Drop
  • DNS—Domain Name System
  • DOCSIS—Data Over Cable Service Interface Specification
  • DOM—Document Object Model
  • DoS—Denial of Service
  • DOS—Disk Operating System
  • DP—Dot Pitch
  • DPC—Deferred Procedure Call
  • DPI—Deep Packet Inspection
  • DPI—Dots Per Inch
  • DPMI—DOS Protected Mode Interface
  • DPMS—Display Power Management Signaling
  • DRAM—Dynamic Random Access Memory
  • DR-DOS—Digital Research - Disk Operating System
  • DRI—Direct Rendering Infrastructure
  • DRM—Digital Rights Management
  • DRM—Direct Rendering Manager
  • DSDL—Document Schema Definition Languages
  • DSDM—Dynamic Systems Development Method
  • DSL—Digital Subscriber Line
  • DSL—Domain-Specific Language
  • DSLAM—Digital Subscriber Line Access Multiplexer
  • DSN—Database Source Name
  • DSN—Data Set Name
  • DSP—Digital Signal Processor
  • DSSSL—Document Style Semantics and Specification Language
  • DTD—Document Type Definition
  • DTE—Data Terminal Equipment
  • DTP—Desktop Publishing
  • DTR—Data Terminal Ready
  • DVD—Digital Versatile Disc
  • DVD—Digital Video Disc
  • DVD-R—DVD-Recordable
  • DVD-ROM—DVD-Read Only Memory
  • DVD-RW—DVD-Rewritable
  • DVI—Digital Visual Interface
  • DVR—Digital Video Recorder

E

  • EAI—Enterprise Application Integration
  • EAP—Extensible Authentication Protocol
  • EBCDIC—Extended Binary Coded Decimal Interchange Code
  • EBML—Extensible Binary Meta Language
  • ECC—Elliptic Curve Cryptography
  • ECMA—European Computer Manufacturers Association
  • ECN—Explicit Congestion Notification
  • ECOS—Embedded Configurable Operating System
  • ECRS—Expense and Cost Recovery System
  • EDA—Electronic Design Automation
  • EDI—Electronic Data Interchange
  • EDO—Extended Data Out
  • EDSAC—Electronic Delay Storage Automatic Calculator
  • EDVAC—Electronic Discrete Variable Automatic Computer
  • EEPROM—Electronically Erasable Programmable Read-Only Memory
  • EFF—Electronic Frontier Foundation
  • EFI—Extensible Firmware Interface
  • EFM—Eight-to-Fourteen Modulation
  • EGA—Enhanced Graphics Array
  • EGP—Exterior Gateway Protocol
  • eID—electronic ID card
  • EIDE—Enhanced IDE
  • EIGRP—Enhanced Interior Gateway Routing Protocol
  • EISA—Extended Industry Standard Architecture
  • ELF—Extremely Low Frequency
  • ELF—Executable and Linkable Format
  • ELM—ELectronic Mail
  • EMACS—Editor MACroS
  • EMS—Expanded Memory Specification
  • ENIAC—Electronic Numerical Integrator And Computer
  • EOF—End of File
  • EOL—End of Life
  • EOL—End of Line
  • EOM—End Of Message
  • EPIC—Explicitly Parallel Instruction Computing
  • EPROM—Erasable Programmable Read-Only Memory
  • ERD—Entity-Relationship Diagram
  • ERM—Entity-Relationship Model
  • ERP—Enterprise Resource Planning
  • ESB—Enterprise service bus
  • ESCON—Enterprise Systems Connection
  • ESD—Electrostatic Discharge
  • ETL—Extract, Transform, Load
  • ESR—Eric Steven Raymond
  • EUC—Extended Unix Code
  • EULA—End User License Agreement
  • EWMH—Extended Window Manager Hints
  • EXT—EXTended file system

F

  • FAP—FORTRAN Assembly Program
  • FASM—Flat ASseMbler
  • FAT—File Allocation Table
  • FAQ—Frequently Asked Questions
  • FBDIMM—Fully Buffered Dual Inline Memory Module
  • FC-AL—Fibre Channel Arbitrated Loop
  • FCB—File Control Block
  • FCS—Frame Check Sequence
  • FDC—Floppy Disk Controller
  • FDS—Fedora Directory Server
  • FDD—Floppy Disk Drive
  • FDDI—Fiber Distributed Data Interface
  • FDMA—Frequency-Division Multiple Access
  • FEC—Forward Error Correction
  • FEMB—Front-End Motherboard
  • FET—Field Effect Transistor
  • FHS—Filesystem Hierarchy Standard
  • FICON—FIber CONnectivity
  • FIFO—First In First Out
  • FIPS—Federal Information Processing Standards
  • FL—Function Level
  • FLAC—Free Lossless Audio Codec
  • FLOPS—FLoating-Point Operations Per Second
  • FLOSS—Free/Libre/Open Source Software
  • FMC— Fixed Mobile Convergence "Mobile UC or Unified Communications over Wireless"
  • FOLDOC—Free On-line Dictionary of Computing
  • FOSDEM—Free and Open source Software Developers' European Meeting
  • FOSI—Formatted Output Specification Instance
  • FOSS—Free and Open Source Software
  • FP—Function Programming
  • FPGA—Field Programmable Gate Array
  • FPS—Floating Point Systems
  • FPU—Floating Point Unit
  • FRU—Field Replaceable Unit
  • FS—File System
  • FSB—Front Side Bus
  • fsck—File System Check
  • FSF—Free Software Foundation
  • FSM—Finite State Machine
  • FTTC—Fiber To The Curb
  • FTTH—Fiber To The Home
  • FTTP—Fiber To The Premises
  • FTP—File Transfer Protocol
  • FQDN—Fully Qualified Domain Name
  • FUD—Fear Uncertainty Doubt
  • FWS—Folding White Space
  • FXP—File eXchange Protocol

G

  • G11N—Globalization
  • Gas—GNU Assembler
  • Gb—Gigabit
  • GB—Gigabyte
  • GCC—GNU Compiler Collection
  • GCJ—GNU Compiler for Java
  • GCR—Group Code Recording
  • GDB—GNU Debugger
  • GDI—Graphics Device Interface
  • GFDL—GNU Free Documentation License
  • GIF—Graphics Interchange Format
  • GIGO—Garbage In, Garbage Out
  • GIMP—GNU Image Manipulation Program
  • GIMPS—Great Internet Mersenne Prime Search
  • GIS—Geographic Information System
  • GLUT—OpenGL Utility Toolkit
  • GML—Geography Markup Language
  • GNOME—GNU Network Object Model Environment
  • GNU—GNU's Not Unix
  • GOMS—Goals, Operators, Methods, and Selection rules
  • GPASM—GNU PIC ASseMbler
  • GPFS—General Parallel File System
  • GPG—GNU Privacy Guard
  • GPGPU—General-Purpose Computing on Graphics Processing Units
  • GPIB—General-Purpose Instrumentation Bus
  • GPL—General Public License
  • GPL—General-Purpose Language
  • GPRS—General Packet Radio Service
  • GPT—GUID Partition Table
  • GPU—Graphics Processing Unit
  • GRUB—Grand Unified Boot-Loader
  • GSM—Global System for Mobile Communications
  • GTK+—GIMP Toolkit
  • GUI—Graphical User Interface
  • GUID—Globally Unique IDentifier
  • GWT—Google Web Toolkit

H

  • HAL—Hardware Abstraction Layer
  • HBA—Host Bus Adapter
  • HCI—Human Computer Interaction
  • HD—High Density
  • HDD—Hard Disk Drive
  • HCL—Hardware Compatibility List
  • HD DVD—High Definition DVD
  • HDL—Hardware Description Language
  • HDMI—High-Definition Multimedia Interface
  • HF—High Frequency
  • HHD—Hybrid Hard Drive
  • HID—Human Interface Device
  • HIG—Human Interface Guidelines
  • HIRD—Hurd of Interfaces Representing Depth
  • HLASM—High Level ASseMbler
  • HMA—High Memory Area
  • HP—Hewlett-Packard
  • HPC—High-Performance Computing
  • HPFS—High Performance File System
  • HTC—High-Throughput Computing
  • HSM—Hierarchical Storage Management
  • HT—Hyper Threading
  • HTM—Hierarchical Temporal Memory
  • HTML—Hypertext Markup Language
  • HTTP—Hypertext Transfer Protocol
  • HTTPd—Hypertext Transport Protocol Daemon
  • HTX—HyperTransport eXpansion
  • HURD—Hird of Unix-Replacing Daemons
  • HVD—Holographic Versatile Disc
  • Hz—Hertz

I

  • I²C—Inter-Integrated Circuit
  • I18N—Internationalization
  • IANA—Internet Assigned Numbers Authority
  • iBCS—Intel Binary Compatibility Standard
  • IBM—International Business Machines
  • IC—Integrated Circuit
  • ICANN—Internet Corporation for Assigned Names and Numbers
  • ICE—In-Circuit Emulator
  • ICE—Intrusion Countermeasure Electronics
  • ICMP—Internet Control Message Protocol
  • ICP—Internet Cache Protocol
  • ICT—Information and Communication Technology
  • IDE—Integrated Development Environment
  • IDE—Integrated Drive Electronics
  • IDF—Intermediate Distribution Frame
  • IDL—Interface Definition Language
  • IDS—Intrusion Detection System
  • IE—Internet Explorer
  • IEC—International Electrotechnical Commission
  • IEEE—Institute of Electrical and Electronics Engineers
  • IETF—Internet Engineering Task Force
  • IFL—Integrated Facility for Linux
  • IGMP—Internet Group Management Protocol
  • IGRP—Interior Gateway Routing Protocol
  • IHV—Independent Hardware Vendor
  • IIOP—Internet Inter-Orb Protocol
  • IIS—Internet Information Services
  • IL—Intermediate Language
  • IM—Instant Messaging
  • IMAP—Internet Message Access Protocol
  • IME—Input Method Editor
  • INFOSEC—Information Systems Security
  • I/O—Input/Output
  • IP—Intellectual Property
  • IP—Internet Protocol
  • IPC—Inter-Process Communication
  • IPL—Initial Program Load
  • IPO—Inter Procedural Optimization
  • IPP—Internet Printing Protocol
  • IPS—In-Plane Switching
  • IPS—Instructions Per Second
  • IPS—Intrusion Prevention System
  • IPsec—Internet Protocol security
  • IPTV—Internet Protocol Television
  • IPX—Internetwork Packet Exchange
  • IR—Intermediate Representation
  • IRC—Internet Relay Chat
  • IrDA—Infrared Data Association
  • IRI—Internationalized Resource Identifier
  • IRP—I/O Request Packet
  • IRQ—Interrupt Request
  • IS—Information Systems
  • ISA—Industry Standard Architecture
  • ISA—Instruction Set Architecture
  • ISAM—Indexed Sequential Access Method
  • ISC—Internet Storm Center
  • iSCSI—Internet Small Computer System Interface
  • ISDN—Integrated Services Digital Network
  • ISO—International Organization for Standardization
  • iSNS—Internet Storage Name Service
  • ISP—Internet Service Provider
  • ISPF—Interactive System Productivity Facility
  • ISR—Interrupt Service Routine
  • ISV—Independent Software Vendor
  • IT—Information Technology
  • ITIL—Information Technology Infrastructure Library
  • ITL—Interval Temporal Logic
  • ITU—International Telecommunication Union
  • IVRS—Interactive Voice Response System

J

  • J2EE—Java 2 Enterprise Edition
  • J2ME—Java 2 Micro Edition
  • J2SE—Java 2 Standard Edition
  • JAXB—Java Architecture for XML Binding
  • JAX-RPC—Java XML for Remote Procedure Calls
  • JAXP—Java API for XML Processing
  • JBOD—Just a Bunch of Disks
  • JCE— Java Cryptography Extension
  • JCL—Job Control Language
  • JCP—Java Community Process
  • JDBC—Java Database Connectivity
  • JDK—Java Development Kit
  • JES—Job Entry Subsystem
  • JDS—Java Desktop System
  • JFC—Java Foundation Classes
  • JFET—Junction Field-Effect Transistor
  • JFS—IBM Journaling File System
  • JINI—Jini Is Not Initials
  • JIT—Just-In-Time
  • JMX—Java Management Extensions
  • JMS—Java Message Service
  • JNDI—Java Naming and Directory Interface
  • JNI—Java Native Interface
  • JNZ—Jump non-zero
  • JPEG—Joint Photographic Experts Group
  • JRE—Java Runtime Environment
  • JS—JavaScript
  • JSON—JavaScript Object Notation
  • JSP—Jackson Structured Programming
  • JSP—JavaServer Pages
  • JTAG—Joint Test Action Group
  • JUG—Java Users Group
  • JVM—Java Virtual Machine

K

  • K&R—Kernighan and Ritchie
  • KB—Keyboard
  • Kb—Kilobit
  • KB—Kilobyte
  • KB—Knowledge Base
  • KDE—K Desktop Environment
  • kHz—Kilohertz
  • KM—Knowledge Machine
  • KRL—Knowledge Representation Language
  • KVM—Keyboard, Video, Mouse

L

  • L10N—Localization
  • L2TP—Layer two Tunneling Protocol
  • LAMP—Linux Apache MySQL Perl
  • LAMP—Linux Apache MySQL PHP
  • LAMP—Linux Apache MySQL Python
  • LAN—Local Area Network
  • LBA—Logical Block Addressing
  • LCD—Liquid Crystal Display
  • LCR—Least Cost Routing
  • LCOS—Liquid Crystal On Silicon
  • LDAP—Lightweight Directory Access Protocol
  • LE—Logical Extents
  • LED—Light-Emitting Diode
  • LF—Line Feed
  • LF—Low Frequency
  • LFS—Linux From Scratch
  • LGPL—Lesser General Public License
  • LIB—LIBrary
  • LIF—Low Insertion Force
  • LIFO—Last In First Out
  • LILO—Linux Loader
  • LISP—LISt Processing
  • LKML—Linux Kernel Mailing List
  • LM—Lan Manager
  • LOC—Lines of Code
  • LPC—Lars Pensjö C
  • LPI—Linux Professional Institute
  • LPT— Line Print Terminal
  • LSB—Least Significant Bit
  • LSB—Linux Standard Base
  • LSI—Large-Scale Integration
  • LTL—Linear Temporal Logic
  • LTR—Left-to-Right
  • LUG—Linux User Group
  • LUN—Logical Unit Number
  • LV—Logical Volume
  • LVD—Low Voltage Differential
  • LVM—Logical Volume Management
  • LZW—Lempel-Ziv-Welch

M

  • MAC—Mandatory Access Control
  • MAC—Media Access Control
  • MAN—Metropolitan Area Network
  • MANET—Mobile Ad-Hoc Network
  • MAPI—Messaging Application Programming Interface
  • Mb—Megabit
  • MB—Megabyte
  • MBCS—Multi Byte Character Set
  • MBD—Model-Based Design
  • MBR—Master Boot Record
  • MCA—Micro Channel Architecture
  • MCA—Microsoft Certified Architect
  • MCAD—Microsoft Certified Application Developer
  • MCAS—Microsoft Certified Application Specialist
  • MCDBA—Microsoft Certified DataBase Administrator
  • MCDST—Microsoft Certified Desktop Support Technician
  • MCITP—Microsoft Certified Information Technology Professional
  • MCM—Microsoft Certified Master
  • MCP—Microsoft Certified Professional
  • MCPD—Microsoft Certified Professional Developer
  • MCSA—Microsoft Certified Systems Administrator
  • MCSD—Microsoft Certified Solution Developer
  • MCSE—Microsoft Certified Systems Engineer
  • MCT—Microsoft Certified Trainer
  • MCTS—Microsoft Certified Technology Specialist
  • MDA—Mail Delivery Agent
  • MDA—Model-Driven Architecture
  • MDA—Monochrome Display Adapter
  • MDD/MDSD—Model-Driven (Software) Development
  • MDF—Main Distribution Frame
  • MDI—Multiple Document Interface
  • ME—[Windows] Millennium Edition
  • MF—Medium Frequency
  • MFC—Microsoft Foundation Classes
  • MFM—Modified Frequency Modulation
  • MGCP—Media Gateway Control Protocol
  • MHz—Megahertz
  • MIB—Management Information Base
  • MICR—Magnetic Ink Character Recognition
  • MIDI—Musical Instrument Digital Interface
  • MIMD—Multiple Instruction, Multiple Data
  • MIMO—Multiple-Input Multiple-Output
  • MINIX—MIni-uNIX
  • MIPS—Million Instructions Per Second
  • MIPS—Microprocessor without Interlocked Pipeline Stages
  • MIS—Management Information Systems
  • MISD—Multiple Instruction, Single Data
  • MIT—Massachusetts Institute of Technology
  • MIME—Multipurpose Internet Mail Extensions
  • MMDS—Mortality Medical Data System
  • MMI—Man Machine Interface.
  • MMIO—Memory-Mapped I/O
  • MMORPG—Massively Multiplayer Online Role-Playing Game
  • MMU—Memory Management Unit
  • MMX—Multi-Media Extensions
  • MNG—Multiple-image Network Graphics
  • MoBo—Motherboard
  • MOM—Message-Oriented Middleware
  • MOO—MUD Object Oriented
  • MOS—Microsoft Office Specialist
  • MOSFET—Metal-Oxide Semiconductor Field Effect Transistor
  • MOTD—Message Of The Day
  • MOUS—Microsoft Office User Specialist
  • MPAA—Motion Picture Association of America
  • MPEG—Motion Pictures Experts Group
  • MPL—Mozilla Public License
  • MPLS—Multiprotocol Label Switching
  • MPU—Microprocessor Unit
  • MS—Memory Stick
  • MS—Microsoft
  • MSB—Most Significant Bit
  • MS-DOS—Microsoft DOS
  • MT—Machine Translation
  • MTA—Mail Transfer Agent
  • MTA—Microsoft Technology Associate
  • MTBF—Mean Time Between Failures
  • MTU—Maximum Transmission Unit
  • MSA—Mail Submission Agent
  • MSDN—Microsoft Developer Network
  • MSI—Medium-Scale Integration
  • MSI—Message Signaled Interrupt
  • MSI—Microsoft Installer
  • MUA—Mail User Agent
  • MUD—Multi-User Dungeon
  • MVC—Model-View-Controller
  • MVP—Most Valuable Professional
  • MVS—Multiple Virtual Storage
  • MX—Mail exchange
  • MXF—Material Exchange Format

N

  • NACK—Negative ACKnowledgement
  • NAK—Negative AcKnowledge Character
  • NaN—Not a Number
  • NAS—Network-Attached Storage
  • NASM—Netwide ASseMbler
  • NAT—Network Address Translation
  • NCP—NetWare Core Protocol
  • NCQ—Native Command Queuing
  • NCSA—National Center for Supercomputing Applications
  • NDPS—Novell Distributed Print Services
  • NDS—Novell Directory Services
  • NEP—Network Equipment Provider
  • NetBIOS—Network Basic Input/Output System
  • NEXT—Near-End CrossTalk
  • NFA—Nondeterministic Finite Automaton
  • NFC—Near field communication
  • NFS—Network File System
  • NGL—aNGeL
  • NGSCB—Next-Generation Secure Computing Base
  • NI—National Instruments
  • NIC—Network Interface Controller
  • NIM—No Internal Message
  • NIO—New I/O
  • NIST—National Institute of Standards and Technology
  • NLP—Natural Language Processing
  • NLS—Native Language Support
  • NMI—Non-Maskable Interrupt
  • NP—Nondeterministic Polynomial time
  • NPL—Netscape Public License
  • NPU—Network Processing Unit
  • NS—Netscape
  • NSA—National Security Agency
  • NSPR—Netscape Portable Runtime
  • NNTP—Network News Transfer Protocol
  • NOC—Network Operations Center
  • NOP—No OPeration
  • NOS—Network Operating System
  • NPTL—Native POSIX Thread Library
  • NSS—Novell Storage Service
  • NSS—Network Security Services
  • NSS—Name Service Switch
  • NT—New Technology
  • NTFS—NT Filesystem
  • NTLM—NT Lan Manager
  • NTP—Network Time Protocol
  • NUMA—Non-Uniform Memory Access
  • NURBS—Non-Uniform Rational B-Spline
  • NVR—Network Video Recorder
  • NVRAM—Non-Volatile Random Access Memory

O

  • OASIS—Organization for the Advancement of Structured Information Standards
  • OAT—Operational Acceptance Testing
  • OBSAI—Open Base Station Architecture Initiative
  • ODBC—Open DataBase Connectivity
  • OEM—Original Equipment Manufacturer
  • OES—Open Enterprise Server
  • OFTC—Open and Free Technology Community
  • OID—Object Identifier
  • OLAP—Online Analytical Processing
  • OLE—Object Linking and Embedding
  • OLED—Organic Light Emitting Diode
  • OLPC—One Laptop per Child
  • OLTP—Online Transaction Processing
  • OMF—Object Module Format
  • OMG—Object Management Group
  • OMR—Optical Mark Recognition
  • OO—Object-Oriented
  • OO—OpenOffice
  • OOE—Out-of-Order Execution
  • OOM—Out Of Memory
  • OOo—OpenOffice.org
  • OoOE—Out-of-Order Execution
  • OOP—Object-Oriented Programming
  • OOTB—Out of the box
  • OPML—Outline Processor Markup Language
  • ORB—Object Request Broker
  • ORM—Oject-Relational Mapping
  • OS—Open Source
  • OS—Operating System
  • OSCON—O'Reilly Open Source CONvention
  • OSDN—Open Source Developer Network
  • OSI—Open Source Initiative
  • OSI—Open Systems Interconnection
  • OSPF—Open Shortest Path First
  • OSS—Open Sound System
  • OSS—Open-Source Software
  • OSS—Operations Support System
  • OSTG—Open Source Technology Group
  • OUI—Organizationally Unique Identifier

P

  • P2P—Peer-To-Peer
  • PaaS—Platform as a Service
  • PAN—Personal Area Network
  • PAP—Password Authentication Protocol
  • PARC—Palo Alto Research Center
  • PATA—Parallel ATA
  • PBS—Portable Batch System
  • PC—Personal Computer
  • PCB—Printed Circuit Board
  • PCB—Process Control Block
  • PC DOS—Personal Computer Disk Operating System
  • PCI—Peripheral Component Interconnect
  • PCIe—PCI Express
  • PCL—Printer Command Language
  • PCMCIA—Personal Computer Memory Card International Association
  • PCM—Pulse-Code Modulation
  • PCRE—Perl Compatible Regular Expressions
  • PD—Public Domain
  • PDA—Personal Digital Assistant
  • PDF—Portable Document Format
  • PDH—Plesiochronous Digital Hierarchy
  • PDP—Programmed Data Processor
  • PE—Physical Extents
  • PERL—Practical Extraction and Reporting Language
  • PGA—Pin Grid Array
  • PGA—Programmable Gate Array
  • PGO—Profile-Guided Optimization
  • PGP—Pretty Good Privacy
  • PHP—PHP: Hypertext Preprocessor
  • PIC—Peripheral Interface Controller
  • PIC—Programmable Interrupt Controller
  • PID—Proportional-Integral-Derivative
  • PID—Process ID
  • PIM—Personal Information Manager
  • PINE—Program for Internet News and Email
  • PIM—Platform Independent Model
  • PIO—Programmed Input/Output
  • PKCS—Public Key Cryptography Standards
  • PKI—Public Key Infrastructure
  • PLC—Power Line Communication
  • PLC—Programmable Logic Controller
  • PLD—Programmable Logic Device
  • PL/I—Programming Language One
  • PL/M—Programming Language for Microcomputers
  • PL/P—Programming Language for Prime
  • PLT—Power Line Telecoms
  • PMM—POST Memory Manager
  • PNG—Portable Network Graphics
  • PnP—Plug-and-Play
  • PoE—Power over Ethernet
  • POID—Persistent Object Identifier
  • POJO—Plain Old Java Object
  • POP—Point of Presence
  • POP3—Post Office Protocol v3
  • POSIX—Portable Operating System Interface, formerly IEEE-IX
  • POST—Power-On Self Test
  • PPC—PowerPC
  • PPI—Pixels Per Inch
  • PPP—Point-to-Point Protocol
  • PPPoA—PPP over ATM
  • PPPoE—PPP over Ethernet
  • PPTP—Point-to-Point Tunneling Protocol
  • PS—PostScript
  • PS/2—Personal System/2
  • PSA—Professional Services Automation
  • PSM—Platform Specific Model
  • PSU—Power Supply Unit
  • PSVI—Post-Schema-Validation Infoset
  • PTS-DOS—PhysTechSoft - Disk Operating System
  • PV—Physical Volume
  • PVG—Physical Volume Group
  • PVR—Personal Video Recorder
  • PXE—Preboot Execution Environment
  • PXI—PCI eXtensions for Instrumentation

Q

  • QDR—Quad Data Rate
  • QA—Quality Assurance
  • QFP—Quad Flat Package
  • QoS—Quality of Service
  • QOTD—Quote of the Day
  • Qt—Quasar Toolkit
  • QTAM—Queued Teleprocessing Access Method

R

  • RACF—Resource Access Control Facility
  • RAD—Rapid Application Development
  • RADIUS—Remote Authentication Dial In User Service
  • RAID—Redundant Array of Independent Disks
  • RAID—Redundant Array of Inexpensive Disks
  • RAII—Resource Acquisition Is Initialization
  • RAIT—Redundant Array of Inexpensive Tapes
  • RAM—Random Access Memory
  • RARP—Reverse Address Resolution Protocol
  • RAS—Reliability, Availability and Serviceability
  • RAS—Remote Access Service
  • RRAS—Routing and Remote Access Service
  • RC—Region Code
  • RC—Release Candidate
  • RC—Run Commands
  • RCS—Revision Control System
  • RDBMS—Relational Database Management System
  • RDC—Remote Desktop Connection
  • RDF—Resource Description Framework
  • RDM—Relational Data Model
  • RDOS—Real-time Disk Operating System
  • RDS—Remote Data Services
  • REFAL—Recursive Functions Algorithmic Language
  • REST—Representational State Transfer
  • regex—Regular Expression
  • regexp—Regular Expression
  • RF—Radio Frequency
  • RFC—Request For Comments
  • RFI—Radio Frequency Interference
  • RFID—Radio Frequency Identification
  • RGB—Red, Green, Blue
  • RGBA—Red, Green, Blue, Alpha
  • RHL—Red Hat Linux
  • RHEL—Red Hat Enterprise Linux
  • RIA—Rich Internet Application
  • RIAA—Recording Industry Association of America
  • RIP—Raster Image Processor
  • RIP—Routing Information Protocol
  • RIR—Regional Internet registry
  • RISC—Reduced Instruction Set Computer
  • RISC OS—Reduced Instruction Set Computer Operating System
  • RJE—Remote Job Entry
  • RLE—Run-Length Encoding
  • RLL—Run-Length Limited
  • RMI—Remote Method Invocation
  • RMS—Richard Matthew Stallman
  • ROM—Read Only Memory
  • ROMB—Read-Out Motherboard
  • ROM-DOS—Read Only Memory - Disk Operating System
  • RPC—Remote Procedure Call
  • RPG—Report Program Generator
  • RPM—RPM Package Manager
  • RSA—Rivest Shamir Adleman
  • RSI—Repetitive Strain Injury
  • RSS—Radio Service Software
  • RSS—Rich Site Summary, RDF Site Summary, or Really Simple Syndication
  • RTAI—Real-Time Application Interface
  • RTC—Real-Time Clock
  • RTE—Real-Time Enterprise
  • RTEMS—Real-Time Executive for Multiprocessor Systems
  • RTL—Right-to-Left
  • RTOS—Real-Time Operating System
  • RTP—Real-time Transport Protocol
  • RTS—Ready To Send
  • RTSP—Real Time Streaming Protocol
  • RTTI—Run-time Type Information

S

  • SaaS—Software as a Service
  • SAN—Storage Area Network
  • SAS—Serial attached SCSI
  • SATA—Serial ATA
  • SAX—Simple API for XML
  • SBOD—Spinning Beachball of Death
  • SBP-2—Serial Bus Protocol 2
  • sbin—superuser binary
  • SBU—Standard Build Unit
  • SCADA—Supervisory Control And Data Acquisition
  • SCID—Source Code in Database
  • SCM—Software Configuration Management
  • SCM—Source Code Management
  • SCP—Secure Copy
  • SCPI—Standard Commands for Programmable Instrumentation
  • SCSI—Small Computer System Interface
  • SCTP—Stream Control Transmission Protocol
  • SD—Secure Digital
  • SDDL—Security Descriptor Definition Language
  • SDH—Synchronous Digital Hierarchy
  • SDI—Single Document Interface
  • SDIO—Secure Digital Input Output
  • SDK—Software Development Kit
  • SDL—Simple DirectMedia Layer
  • SDN—Service Delivery Network
  • SDP—Session Description Protocol
  • SDR—Software-Defined Radio
  • SDRAM—Synchronous Dynamic Random Access Memory
  • SDSL—Symmetric DSL
  • SE—Single Ended
  • SEI—Software Engineering Institute
  • SEO—Search Engine Optimization
  • SFTP—Secure FTP
  • SFTP—Simple File Transfer Protocol
  • SFTP—SSH File Transfer Protocol
  • SGI—Silicon Graphics, Incorporated
  • SGML—Standard Generalized Markup Language
  • SGR—Select Graphic Rendition
  • SHA—Secure Hash Algorithm
  • SHDSL—Single-pair High-speed Digital Subscriber Line
  • SIGCAT—Special Interest Group on CD-ROM Applications and Technology
  • SIGGRAPH—Special Interest Group on Graphics
  • SIMD—Single Instruction, Multiple Data
  • SIMM—Single Inline Memory Module
  • SIP—Session Initiation Protocol
  • SIP—Supplementary Ideographic Plane
  • SISD—Single Instruction, Single Data
  • SISO—Single-Input and Single-Output
  • SLED—SUSE Linux Enterprise Desktop
  • SLES—SUSE Linux Enterprise Server
  • SLI—Scalable Link Interface
  • SLIP—Serial Line Internet Protocol
  • SLM—Service Level Management
  • SLOC—Source Lines of Code
  • SPM—Software project management
  • SPMD—Single Program, Multiple Data
  • SMA—SubMiniature version A
  • SMB—Server Message Block
  • SMBIOS—System Management BIOS
  • SMIL—Synchronized Multimedia Integration Language
  • S/MIME—Secure/Multipurpose Internet Mail Extensions
  • SMP—Supplementary Multilingual Plane
  • SMP—Symmetric Multi-Processing
  • SMS—Short Message Service
  • SMS—System Management Server
  • SMT—Simultaneous Multithreading
  • SMTP—Simple Mail Transfer Protocol
  • SNA—Systems Network Architecture
  • SNMP—Simple Network Management Protocol
  • SNTP—Simple Network Time Protocol
  • SOA—Service-Oriented Architecture
  • SOAP—Simple Object Access Protocol
  • SOAP—Symbolic Optimal Assembly Program
  • SOPA—Stop Online Piracy Act
  • SoC—System-on-a-Chip
  • SO-DIMM—Small Outline DIMM
  • SOE—Standard Operating Environment
  • SOHO—Small Office/Home Office
  • SOI—Silicon On Insulator
  • SP—Service Pack
  • SPA—Single Page Application
  • SPF—Sender Policy Framework
  • SPI—Serial Peripheral Interface
  • SPI—Stateful Packet Inspection
  • SPARC—Scalable Processor Architecture
  • SQL—Structured Query Language
  • SRAM—Static Random Access Memory
  • SSA—Static Single Assignment
  • SSD—Software Specification Document
  • SSD—Solid-State Drive
  • SSE—Streaming SIMD Extensions
  • SSH—Secure Shell
  • SSI—Server Side Includes
  • SSI—Single-System Image
  • SSI—Small-Scale Integration
  • SSID—Service Set Identifier
  • SSL—Secure Socket Layer
  • SSP—Supplementary Special-purpose Plane
  • SSSE—Supplementary Streaming SIMD Extensions
  • su—superuser
  • SUS—Single UNIX Specification
  • SUSE—Software und System-Entwicklung
  • SVC—Scalable Video Coding
  • SVG—Scalable Vector Graphics
  • SVGA—Super Video Graphics Array
  • SVD—Structured VLSI Design
  • SWF—Shock Wave Flash
  • SWT—Standard Widget Toolkit
  • Sysop—System operator

T

  • TAO—Track-At-Once
  • TASM—Turbo ASseMbler
  • TB—TeraByte
  • Tcl—Tool Command Language
  • TCP—Transmission Control Protocol
  • TCP/IP—Transmission Control Protocol/Internet Protocol
  • TCU—Telecommunication Control Unit
  • TDMA—Time Division Multiple Access
  • TFT—Thin Film Transistor
  • TFTP—Trivial File Transfer Protocol
  • TI—Texas Instruments
  • TLA—Three-Letter Acronym
  • TLD—Top-Level Domain
  • TLS—Thread-Local Storage
  • TLS—Transport Layer Security
  • TLV—Type-length-value
  • tmp—temporary
  • TNC—Terminal Node Controller
  • TNC—Threaded Neill-Concelman connector
  • TPF—Transaction Processing Facility
  • TROFF—Trace Off
  • TRON—Trace On
  • TRON—The Real-time Operating system Nucleus
  • TRS-DOS—Tandy Radio Shack - Disk Operating System
  • TSO—Time Sharing Option
  • TSP—Traveling Salesman Problem
  • TSR—Terminate and Stay Resident
  • TTA—True Tap Audio
  • TTF—TrueType Font
  • TTL—Transistor-Transistor Logic
  • TTL—Time To Live
  • TTS—Text-to-Speech
  • TTY—Teletype
  • TUCOWS—The Ultimate Collection of Winsock Software
  • TUG—TeX Users Group
  • TWAIN—Technology Without An Interesting Name

U

  • UAAG—User Agent Accessibility Guidelines
  • UAC—User Account Control
  • UART—Universal Asynchronous Receiver/Transmitter
  • UAT—User Acceptance Testing
  • UCS—Universal Character Set
  • UDDI—Universal Description, Discovery, and Integration
  • UDMA—Ultra DMA
  • UDP—User Datagram Protocol
  • UEFI—Unified Extensible Firmware Interface
  • UHF—Ultra High Frequency
  • UI—User Interface
  • UL—Upload
  • ULA—Uncommitted Logic Array
  • UMA—Upper Memory Area
  • UMB—Upper Memory Block
  • UML—Unified Modeling Language
  • UML—User-Mode Linux
  • UMPC—Ultra-Mobile Personal Computer
  • UNC—Universal Naming Convention
  • UPS—Uninterruptible Power Supply
  • URI—Uniform Resource Identifier
  • URL—Uniform Resource Locator
  • URN—Uniform Resource Name
  • USB—Universal Serial Bus
  • usr—user
  • USR—U.S. Robotics
  • UTC—Coordinated Universal Time
  • UTF—Unicode Transformation Format
  • UTP—Unshielded Twisted Pair
  • UUCP—Unix to Unix Copy
  • UUID—Universally Unique Identifier
  • UUN—Universal User Name
  • UVC—Universal Virtual Computer
  • UX—User Experience

V

  • var—variable
  • VAX—Virtual Address eXtension
  • VCPI—Virtual Control Program Interface
  • VR—Virtual Reality
  • VRML—Virtual Reality Modeling Language
  • VB—Visual Basic
  • VBA—Visual Basic for Applications
  • VBS—Visual Basic Script
  • VDSL—Very High Bitrate Digital Subscriber Line
  • VESA—Video Electronics Standards Association
  • VFAT—Virtual FAT
  • VFS—Virtual File System
  • VG—Volume Group
  • VGA—Video Graphics Array
  • VGA—Video Graphics Adapter
  • VHF—Very High Frequency
  • VLAN—Virtual Local Area Network
  • VLSM—Variable Length Subnet Mask
  • VLB—Vesa Local Bus
  • VLF—Very Low Frequency
  • VLIW—Very Long Instruction Word
  • VLSI—Very-Large-Scale Integration
  • VM—Virtual Machine
  • VM—Virtual Memory
  • VNC—Virtual Network Computing
  • VOD—Video On Demand
  • VoIP—Voice over Internet Protocol
  • VPN—Virtual Private Network
  • VPU—Visual Processing Unit
  • VSAM—Virtual Storage Access Method
  • VSAT—Very Small Aperture Terminal
  • VT—Video Terminal?
  • VTAM—Virtual Telecommunications Access Method

W

  • W3C—World Wide Web Consortium
  • WWDCApple World Wide Developer Conference
  • WAFS—Wide Area File Services
  • WAI—Web Accessibility Initiative
  • WAIS—Wide Area Information Server
  • WAN—Wide Area Network
  • WAP—Wireless Access Point
  • WAP—Wireless Application Protocol
  • WASM—Watcom ASseMbler
  • WBEM—Web-Based Enterprise Management
  • WCAG—Web Content Accessibility Guidelines
  • WCF—Windows Communication Foundation
  • WDM—Wavelength-Division Multiplexing
  • WebDAV—WWW Distributed Authoring and Versioning
  • WEP—Wired Equivalent Privacy
  • WFI—Wait For Interrupt
  • WiMAX—Worldwide Interoperability for Microwave Access
  • WinFS—Windows Future Storage
  • WINS—Windows Internet Name Service
  • WLAN—Wireless Local Area Network
  • WMA—Windows Media Audio
  • WMV—Windows Media Video
  • WOL—Wake-on-LAN
  • WOR—Wake-on-Ring
  • WORA—Write once, run anywhere
  • WORE—Write once, run everywhere
  • WPA—Wi-Fi Protected Access
  • WPAN—Wireless Personal Area Network
  • WPF—Windows Presentation Foundation
  • WSDL—Web Services Description Language
  • WSFL—Web Services Flow Language
  • WUSB—Wireless Universal Serial Bus
  • WWAN—Wireless Wide Area Network
  • WWID—World Wide Identifier
  • WWN—World Wide Name
  • WWW—World Wide Web
  • WYSIWYG—What You See Is What You Get
  • WZC—Wireless Zero Configuration

X

  • XAG—XML Accessibility Guidelines
  • XAML—eXtensible Application Markup Language
  • XDM—X Window Display Manager
  • XDMCP—X Display Manager Control Protocol
  • XCBL—XML Common Business Library
  • XHTML—eXtensible Hypertext Markup Language
  • XILP—X Interactive ListProc
  • XML—eXtensible Markup Language
  • XMMS—X Multimedia System
  • XMPP—eXtensible Messaging and Presence Protocol
  • XMS—Extended Memory Specification
  • XNS—Xerox Network Systems
  • XP—Cross-Platform
  • XP—Extreme Programming
  • XPCOM—Cross Platform Component Object Model
  • XPI—XPInstall
  • XPIDL—Cross-Platform IDL
  • XPS— XML Paper Specification
  • XSD—XML Schema Definition
  • XSL—eXtensible Stylesheet Language
  • XSL-FO—eXtensible Stylesheet Language Formatting Objects
  • XSLT—eXtensible Stylesheet Language Transformations
  • XSS—Cross-Site Scripting
  • XTF—eXtensible Tag Framework
  • XTF—eXtended Triton Format
  • XUL—XML User Interface Language
  • XVGA—Extended Video Graphics Adapter

Y

  • Y2K—Year Two Thousand
  • YAAF—Yet Another Application Framework
  • YACC—Yet Another Compiler Compiler
  • YAML—YAML Ain't Markup Language
  • YaST—Yet another Setup Tool

Z

  • ZCAV—Zone Constant Angular Velocity
  • ZCS—Zero Code Suppression
  • ZIF—Zero Insertion Force
  • ZIFS—Zero Insertion Force Socket
  • ZISC—Zero Instruction Set Computer
  • ZOI—Zero One Infinity
  • ZOPE—Z Object Publishing Environment
  • ZMA—Zone Multicast Address
  • ZPL—Z-level Programming Language