Acronymns II (Optional) Flashcards

1
Q

4GL

A

Fourth-generation language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACID

A

Atomicity, Consistency, Isolation and Durability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AICPA

A

American Institute of Certified Public Accountants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annual loss expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALU

A

Arithmetic-logic unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ANSI

A

American National Standards Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

API

A

Application programming interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ASIC

A

Application-specific integrated circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATDM

A

Asynchronous time division multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ATM (Technology)

A

Asynchronous Transfer Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ATM (Banking)

A

Automated teller machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

B-to-B

A

Business-to-business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

B-to-C

A

Business-to-consumer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

B-to-E

A

Business-to-employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

B-to-G

A

Business-to-government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BCI

A

Business Continuity Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BCM

A

Business continuity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BCP

A

Business continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BCP

A

Business continuity planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BDA
Business dependency assessment
26
BI
Business intelligence
27
BIA
Business impact analysis
28
BIMS
Biometric Information Management and Security
29
BIOS
Basic Input/Output System
30
BIS
Bank for International Settlements
31
BLP
Bypass label process
32
BNS
Backbone network services
33
BOM
Bill of materials
34
BOMP
Bill of materials processor
35
BPR
Business process reengineering
36
BRP
Business recovery (or resumption) plan
37
BSC
Balanced scorecard
38
C-to-G
Consumer-to-government
39
CA
Certificate authority
40
CAAT
Computer-assisted audit technique
41
CAD
Computer-assisted design
42
CAE
Computer-assisted engineering
43
CAM
Computer-aided manufacturing
44
CASE
Computer-aided software engineering
45
CCK
Complementary Code Keying
46
CCM
Constructive Cost Model
47
CD
Compact disk
48
CD-R
Compact disk-recordable
49
CD-RW
Compact disk-rewritable
50
CDDF
Call Data Distribution Function
51
CDPD
Cellular Digital Packet Data
52
CEO
Chief executive officer
53
CERT
Computer emergency response team
54
CGI
Common gateway interface
55
CIA
Confidentiality, integrity, and availability
56
CIAC
Computer Incident Advisory Capability
57
CICA
Canadian Institute of Chartered Accountants
58
CIM
Computer-integrated manufacturing
59
CIO
Chief information officer
60
CIS
Continuous and intermittent simulation
61
CISO
Chief information security officer
62
CMDB
Configuration management database
63
CMM
Capability Maturity Model
64
CMMI
Capability Maturity Model Integration
65
CNC
Computerized Numeric Control
66
COCOMO2
Constructive Cost Model
67
CODASYL
Conference on Data Systems Language
68
COM
Component Object Model
69
COM/DCOM
Component Object Model/Distributed Component Object Model
70
COOP
Continuity of operations plan
71
CORBA
Common Object Request Broker Architecture
72
CoS
Class of service
73
COSO
Committee of Sponsoring Organizations of the Treadway Commission
74
CPM
Critical Path Methodology
75
CPO
Chief privacy officer
76
CPS
Certification practice statement
77
CRC
Cyclic redundancy check
78
CRL
Certificate revocation list
79
CRM
Customer relationship management
80
CSA
Control self-assessment
81
CSF
Critical success factor
82
CSIRT
Computer security incident response team
83
CSMA/CA
Carrier-sense Multiple Access/Collision Avoidance
84
CSMA/CD
Carrier-sense Multiple Access/Collision Detection
85
CSO
Chief security officer
86
CSU-DSU
Channel service unit/digital service unit
87
DAC
Discretionary access control
88
DASD
Direct access storage device
89
DAT
Digital audio tape
90
DBMS
Database management system
91
DCE
Data communications equipment
92
DCE
Distributed computing environment
93
DCOM
Distributed Component Object Model (Microsoft)
94
DCT
Discrete Cosine Transform
95
DD/DS
Data dictionary/directory system
96
DDL
Data Definition Language
97
DDN
Digital Divide Network
98
DDoS
Distributed denial of service
99
DECT
Digital Enhanced Cordless Telecommunications
100
DES
Data Encryption Standard
101
DFD
Data flow diagram
102
DHCP
Dynamic Host Configuration Protocol
103
DID
Direct inward dial
104
DIP
Document image processing
105
DLL
Dynamic link library
106
DMS
Disk management system
107
DMZ
Demilitarized zone
108
DNS
Domain name system
109
DoS
Denial of service
110
DOSD
Data-oriented system development
111
DRII
Disaster Recovery Institute International
112
DRM
Digital rights management
113
DRP
Disaster recovery plan
114
DRP
Disaster recovery planning
115
DSL
Digital subscriber lines
116
DSS
Decision support systems
117
DSSS
Direct Sequence Spread Spectrum (DSSS)
118
DTE
Data terminal equipment
119
DTR
Data terminal ready
120
DVD
Digital video disc
121
DVD-HD
Digital video disc-high definition/high density
122
DW
Data warehouse
123
EA
Enterprise architecture
124
EAC
Estimates at completion
125
EAI
Enterprise application integration
126
EAM
Embedded audit module
127
EAP
Extensible Authentication Protocol
128
EBCDIC
Extended Binary-coded for Decimal Interchange Code
129
EC
Electronic commerce
130
ECC
Elliptic Curve Cryptography
131
EDFA
Enterprise data flow architecture
132
EDI
Electronic data interchange
133
EER
Equal-error rate
134
EFT
Electronic funds transfer
135
EIGRP
Enhanced Interior Gateway Routing Protocol
136
EJB
Enterprise java beans
137
EMI
Electromagnetic interference
138
EMRT
Emergency response time
139
ERD
Entity relationship diagram
140
ERP
Enterprise resource planning
141
ESP
Encapsulating security payload
142
EVA
Earned value analysis
143
FAR
False-acceptance rate
144
FAT
File allocation table
145
FC
Fibre channels
146
FDDI
Fiber Distributed Data Interface
147
FDM
Frequency division multiplexing
148
FEA
Federal enterprise architecture
149
FEMA
Federal Emergency Management Association (USA)
150
FER
Failure-to-enroll rate
151
FERC
Federal Energy Regulatory Commission (USA)
152
FFIEC
Federal Financial Institutions Examination Council (USA)
153
FFT
Fast Fourier Transform
154
FHSS
Frequency-hopping spread spectrum
155
FIPS
Federal Information Processing Standards
156
FP
Function point
157
FPA
Function point analysis
158
FRAD
Frame relay assembler/disassembler
159
FRB
Federal Reserve Board (USA)
160
FRR
False-rejection rate
161
GAS
Generalized audit software
162
Gb
Gigabit
163
GB
Gigabyte
164
GID
Group ID
165
GIS
Geographic information systems
166
GPS
Global positioning system
167
GSM
Global system for mobile communications
168
GUI
Graphical user interface
169
HA
High availability
170
HD-DVD
High definition/high density-digital video disc
171
HDLC
High-level data link control
172
HIPAA
Health Insurance Portability and Accountability Act (USA)
173
HIPO
Hierarchy input-process-output
174
HMI
Human machine interfacing
175
HTML
Hypertext Markup Language
176
HW/SW
Hardware/software
177
I/O
Input/output
178
I&A
Identification and authentication
179
ICMP
Internet Control Message Protocol
180
ICT
Information and communication technologies
181
IDE
Integrated development environment
182
IDEF1X
Integration Definition for Information Modeling
183
IETF
Internet Engineering Task Force
184
IMS
Integrated manufacturing systems
185
IPF
Information processing facility
186
IPL
Initial program load
187
IPMA
International Project Management Association
188
IPRs
Intellectual property rights
189
IPS
Intrusion prevention system
190
IPSec
IP Security
191
IPX
Internetwork Packet Exchange
192
IR
Incident response
193
IR
Infrared
194
IRC
Internet relay chat
195
IrDA
Infrared Data Association
196
IRM
Incident response management
197
IS/DRP
IS disaster recovery planning
198
ISAKMP/
Internet Security Association and Key Oakley Management Protocol/Oakley
199
ISAM
Indexed Sequential Access Method
200
ISDN
Integrated services digital network
201
ISP
Internet service provider
202
ITF
Integrated test facility
203
ITGI
IT Governance Institute
204
ITIL
Information Technology Infrastructure Library
205
ITSM
IT service management
206
ITT
Invitation to tender
207
ITU
International Telecommunications Union
208
IVR
Interactive voice response
209
JIT
Just in time
210
Kb
Kilobit
211
KB
Kilobyte
212
KB
Knowledge base
213
KGI
Key goal indicator
214
KPI
Key performance indicator
215
L2TP
Layer 2 Tunneling Protocol
216
LCP
Link Control Protocol
217
M&A
Mergers and acquisition
218
MAC
Mandatory access control
219
MAC
Message Authentication Code
220
MAC
Address Media Access Control Address
221
MAN
Metropolitan area network
222
MAP
Manufacturing accounting and production
223
MIS
Management information system
224
MODEM
Modulator/demodulator
225
MOS
Maintenance out of service
226
MPLS
Multiprotocol label switching
227
MRP
Manufacturing resources planning
228
MSAUs
Multistation access units
229
MTBF
Mean time between failures
230
MTS
MicrosoftÕs Transaction Server
231
MTTR
Mean time to repair
232
NAP
Network access point
233
NAS
Network access server
234
NAS
Network attached storage
235
NAT
Network address translation
236
NCP
Network Control Protocol
237
NDA
Nondisclosure agreement
238
NFPA
National Fire Protection Agency (USA)
239
NFS
Network File System
240
NIC
Network interface card
241
NIST
National Institute of Standards and Technology (USA)
242
NNTP
Network News Transfer Protocol
243
NSP
Name Server Protocol
244
NSP
Network service provider
245
NT
New technology
246
NTFS
NT file system
247
NTP
Network Time Protocol
248
OBS
Object breakdown structure
249
OCSP
Online Certificate Status Protocol
250
ODC
On-demand computing
251
OECD
Organization for Economic Cooperation and Development
252
OEP
Occupant emergency plan
253
OLAP
Online analytical processing
254
OOSD
Object-oriented system development
255
ORB
Object request broker
256
OS
Operating system
257
OSI
Open Systems Interconnection
258
OSPF
Open Shortest Path First
259
PAD
Packet assembler/disassembler
260
PAN
Personal area network
261
PBX
Private branch exchange
262
PDA
Personal digital assistant
263
PDCA
Plan-do-check-act
264
PDN
Public data network
265
PER
Package-enabled reengineering
266
PICS
Platform for Internet Content Selection
267
PID
Process ID
268
PID
Project initiation document
269
PKI
Public key infrastructure
270
PLC
Programmable logic controllers
271
PMBOK
Project Management Body of Knowledge
272
PMI
Project Management Institute
273
POC
Proof of concept
274
POP
Proof of possession
275
POS
Point of sale (or Point-of-sale systems)
276
POTS
Plain old telephone service
277
PPP
Point-to-point Protocol
278
PPPoE
Point-to-point Protocol Over Ethernet
279
PPTP
Point-to-Point Tunneling Protocol
280
PR
Public relations
281
PRD
Project request document
282
PRINCE2
Projects in Controlled Environments 2
283
PROM
Programmable Read-only Memory
284
PSTN
Public switched telephone network
285
PVC
Permanent virtual circuit
286
QA
Quality assurance
287
QAT
Quality assurance testing
288
RA
Registration authority
289
RAD
Rapid application development
290
RADIUS
Remote Access Dial-in User Service
291
RAID
Redundant Array of Inexpensive Disks
292
RAM
Random access memory
293
RAS
Remote access service
294
RBAC
Role-based access control
295
RDBMS
Relational database management system
296
RF
Radio frequencies
297
RFI
Request for information
298
RFP
Request for proposal
299
RIP
Routing Information Protocol
300
RMI
Remote method invocation
301
ROI
Return on investment
302
ROLAP
Relational online analytical processing
303
ROM
Read-only memory
304
RPC
Remote procedure call
305
RPO
Recovery point objective
306
RSN
Robust secure network
307
RST
Reset
308
RTO
Recovery time objective
309
RTU
Remote terminal unit
310
RW
Rewritable
311
S/HTTP
Secure Hypertext Transfer Protocol
312
S/MIME
Secure Multipurpose Internet Mail Extensions
313
SA
Security Association
314
SAN
The SANS Institute
315
SANS
SysAdmin, Audit, Network, Security
316
SAS
Statement on Auditing Standards
317
SBC
Session border controller
318
SCADA
Supervisory Control and Data Acquisition
319
SCARF
Systems Control Audit Review File
320
SCARF/EAM
Systems Control Audit Review File and Embedded Audit
321
SCM
Supply chain management
322
SCOR
Supply chain operations reference
323
SD/MMC
Secure digital multimedia card
324
SDLC
System development life cycle
325
SDO
Service delivery objective
326
SEC
Securities and Exchange Commission (USA)
327
SET
Secure electronic transactions
328
SIP
Service improvement plan
329
SLA
Service level agreement
330
SLIP
Serial Line Internet Protocol
331
SLM
Service level management
332
SLOC
Source lines of code
333
SMARRT
Specific, measurable, actionable, realistic, results-oriented, and timely
334
SME
Subject matter expert
335
SMF
System management facility
336
SMTP
Simple Mail Transport Protocol
337
SNA
Systems network architecture
338
SNMP
Simple Network Management Protocol
339
SO
Security officer
340
SOA
Service-oriented architectures
341
SOAP
Simple Object Access Protocol
342
SOHO
Small office-home office
343
SOW
Statement of work
344
SPI
Security parameter index
345
SPICE
Software Process Improvement and Capability dEetermination
346
SPOC
Single point of contact
347
SPOOL
Simultaneous peripheral operations online
348
SQL
Structured Query Language
349
SSH
Secure Shell
350
SSID
Service Set Identifier
351
SSO
Single sign-on
352
SVC
Switched virtual circuits
353
SYSGEN
System generation
354
TACACS
Terminal Access Control Access Control System
355
TCO
Total cost of ownership
356
TCP/IP
Transmission Control Protocol/Internet Protocol
357
TCP/UDP
Transmission Control Protocol/User Datagram Protocol
358
TDM
Time-division multiplexing
359
TELNET
Teletype network
360
TES
Terminal emulation software
361
TFTP
Trivial File Transport Protocol
362
TKIP
Temporal Key Integrity Protocol
363
TLS
Transport layer security
364
TMS
Tape management system
365
TP
monitors Transaction processing monitors
366
TQM
Total quality management
367
TR
Technical report
368
UAT
User acceptance testing
369
UBE
Unsolicited bulk email
370
UDDI
Universal description, discovery and integration
371
UDP
User Datagram Protocol
372
UID
User ID
373
UML
Unified Modeling Language
374
URI
Uniform resource identifier
375
URL
Universal resource locator
376
URN
Uniform resource name
377
USB
Universal Serial Bus
378
VLAN
Virtual local area network
379
VoIP
Voice-over IP
380
VPN
Virtual private network
381
WAP
Wireless Application Protocol
382
WBS
Work breakdown structure
383
WEP
Wired Equivalent Privacy
384
WLAN
Wireless local area network
385
WML
Wireless Markup Language
386
WORM
Write Once and Read Many
387
WP
Work package
388
WPA
Wi-Fi Protected Access
389
WPAN
Wireless personal area network
390
WSDL
Web Services Description Language
391
WWAN
Wireless wide area network
392
WWW
World Wide Web
393
X-to-X
Exchange-to-exchange
394
XBRL
Extensible Business Reporting Language
395
XML
Extensible Markup Language
396
XOR
Exclusive-OR
397
Xquery
XML query
398
XSL
Extensible Stylesheet Language