Glossary- C Flashcards
call tree
A method for ensuring the timely notification of key personnel, such as after a disaster.
campus area network (CAN)
The interconnection of LANs for an organization that has buildings in close proximity.
capability maturity model
A model that is used to measure the relative maturity of an organization or of its processes.
capability maturity model integration (CMMI)
A maturity model that represents the aggregation of other maturity models.
capacity management
The IT function that consists of activities that confirm there is sufficient capacity in IT systems and IT processes to meet service needs. Primarily, an IT system or process has sufficient capacity if its performance falls within an acceptable range, as specified in service-level agreements (SLAs). See also IT service management, service-level agreement.
Category 3
A twisted-pair cabling standard that is capable of transporting 10MB Eth- ernet up to 100 m (328 ft). See also twisted-pair cable.
Category 5
A twisted-pair cabling standard that is capable of transporting 10MB, 100MB, and 1000MB (1GB) Ethernet up to 100 m (328 ft). See also twisted-pair cable.
Category 6
A twisted-pair cabling standard that is capable of transporting 10MB, 100MB, and 1000MB (1GB) Ethernet up to 100 m (328 ft). Category 6 has the same trans- port capability as Category 5, but has better noise resistance. See also twisted-pair cable.
Category 7
A twisted-pair cabling standard that is capable of transporting 10GB Eth- ernet over 100 m (328 ft). See also twisted-pair cable.
Category 8
A new cable standard, still under development, designed for high-speed networking. See also twisted-pair cable.
central processing unit (CPU)
The main hardware component of a computer that executes program instructions.
certificate authority (CA)
A trusted party that stores digital certificates and public encryption keys.
certificate revocation list (CRL)
An electronic list of digital certificates that have been revoked prior to their expiration date.
certification practice statement (CPS)
A published statement that describes the practices used by the CA to issue and manage digital certificates.
chain of custody
Documentation that shows the acquisition, storage, control, and analysis of evidence. The chain of custody may be needed if the evidence is to be used in a legal proceeding.
change control
See change management.
change management
The IT function that is used to control changes made to an IT environment. See also IT service management.
change request
A formal request for a change to be made in an environment. See also change management.
change review
A formal review of a requested change. See also change request, change management.
channel service unit/data service unit (CSU/DSU)
A device used to connect a tele- communications circuit to a local device such as a router.
cipher lock
An electronic or mechanical door equipped with combination locks. Only persons who know the combination may unlock the door.
ciphertext
A message, file, or stream of data that has been transformed by an encryp- tion algorithm and rendered unreadable.
circuit switched
A WAN technology where a dedicated, end-to-end communications channel is established that lasts for the duration of the connection.
CISC (complex instruction set computer)
A central processing unit design that uses a comprehensive instruction set. See also central processing unit.
class
The characteristics of an object, including its attributes, properties, fields, and the methods it can perform. See also object, method.
class library
A repository where classes are stored. See also class.
classful network
A TCP/IP network whose addressing fits into one of the classes of networks: Class A, Class B, or Class C. A classful network will have a predetermined address range and subnet mask.
classless network
A TCP/IP network whose addressing does not fit the classful net- work scheme, but instead uses an arbitrary subnet mask, as determined by the net- work’s physical and logical design.
client-server application
An application design where the database and some busi- ness logic are stored on a central server and where some business logic plus display logic are stored on each user’s workstation.
cloud computing
A technique of providing a dynamically scalable and usually virtu- alized computing resource as a service.
cluster
A tightly coupled collection of computers that are used to solve a common task. In a cluster, one or more servers actively perform tasks, while zero or more com- puters may be in a “standby” state, ready to assume active duty should the need arise.