127.0.0.1 — An IP address of the local machine, generally a system’s loopback address. It is used to access a local machine’s TCP/IP resources. A message directed to the 127.0.0.1 will routinely reroute the message into the machines network adapter within the TCP/IP stack.

3GP — A container format for multimedia files created by the 3GPP (Third Generation Partnership Project) for 3G mobile phones. The 3GP uses the .3gp file extension, and is a general video format that makes the file smaller and more accessible for mobile phones.

8VSB — (8-Level Vestigial Sideband) – A method of modulation implemented for terrestrial propagation of ATSC digital broadcasting. 8VSB requires a smaller amount of power to coverage on small areas. 8VSB employs Nyquist sift to attain the required broadcast.

Abandonware — A term used for obsolete software applications or programs that are no longer supported or sold. These types of applications are not accessible in public domains.

ACH (Automated Clearing House) — An electronic system used for financial transactions within the US. It processes huge volumes of debit and credit transactions. It includes express vendor payments and deposit payroll.

ActiveX — A group of item-oriented tools and programming languages. It uses COM (Component Object Model) as its chief technology. It uses an independent program that can operate within the ActiveX network when creating a program that executes in ActiveX environment. Its component is identified as ActiveX Control.

Address Munging — A way for users and groups to exchange or publish email addresses online while avoiding them being leeched by bots. Address munging is done by generating email addresses that cannot be recognized by a leecher or a bot. For example, instead of writing address@lycos.com, it should be written as address at lycos dot com to avoid detection.

Adium — A free IM client for Mac OS X which supports multitudes of protocols. It is programmed using the Mac OS X Cocoa API. Adium was created by Adam Iser, a college student. Adium v1.0 was released in September, 2001.

Adobe Acrobat — A compilation of programs designed to create, manage, access and organize Adobe PDF (Portable Document Format) files. It was created by Adobe Systems.

AdSense — An advertising platform managed by Google. It allows web owners to integrate image, text, as well as video ads in their websites to generate income when visitors click or view those ads.

Adware — An application that can display banners and advertisements while an application is running. Its author incorporates code that sends pop-up advertisement simultaneously. Adware may also track vital information about the user and deliver it to a remote server.

AES (Advanced Encryption Standard) — A standard protocol for encryption founded by the US government. It employs the standard ciphers AES-256, AES-128, and AES-192. All AES ciphers are 128-bit in size. It is recognized as the algorithm used for symmetric cryptography. The NIST announced the AES as FIPS PUB 197 standard on 2001.

AFS (Andrew File System) — A network system distributed to facilitate information from various AFS systems. AFS is a compiled cell that represents a section of the file space that can be managed independently. The cells link to a UNIX system using an AFS root directory.

AIM (AOL Instant Messenger) — A messaging service that uses the OSCAR IM protocol as well as TOC protocol which permits authorized users to connect real time. The application is accessible for Mac OS, Windows OS, and Linux. The application was created and managed by AOL (America Online).

AIM Express — The next generation messaging service that does not oblige the user to download messaging applications. It uses the Windows browser to run and send messages. It establishes a new window that includes file link with IM software. AIM Express can initiate chat rooms, access the address list, as well as “view profiles”.

AIX — A 64-bit UNIX that communicates with the TCSEC C2. It operates on 32-bit and 64-bit programs. The AIX can support JAVA, NIS+, and other applications handling extreme graphic models.

ALG.exe (Application Layer Gateway) — Allows certain applications such as RTSP, SIP, FTP, etc. to be executed. This permits accessing software from another computer, even those with firewalls. Security protocols are blocked without the executable ALG.

Algorithm — A set of fixed protocols used for data processing and calculation. It is a calculable group of instructions used to achieve a preferred result. An alteration from a single condition to another is not essentially the rule. This is because some algorithms utilize randomness.

AMPS (Advanced Mobile Phone System) — An analog mobile technology created by Bell Laboratory. It became the principal analog mobile technology within North America. AMPS use separate frequencies for every conversation, which requires larger bandwidth for users. It is identical to the “OG” system.

Anchor Text (Link Label) — The text of a hyperlink within a web page, which typically identifies the content of the page the hyperlink links to. The words enclosed in the Anchor Text inform web page visitors of what they may expect on a linked page, and search engines about the contents of the linked page. Anchor Text also factors into the terms under which the search engine will rank the linked page.

Anonymous Proxy — A server that stands between an internet user and the rest of the internet, acting as an intermediary. The user of an anonymous proxy connects to the proxy server instructing it to fetch online content on its behalf. Content is then accessed under the IP address of the proxy server rather than the IP address of the client, which makes the client’s internet activities more anonymous.

Anonymous Surfing — A way of surfing the internet while hiding the personally identifiable information usually collected about the surfer. One way of doing so is by using anonymous proxies or Virtual Private Networks.

ANPR (Automatic Number Plate Recognition) — It is a surveillance technique that uses optical character detection on license plates. ANPR can operate to perform saving of images collected by cameras within the location. It is frequently used over CCTV, or Closed-Circuit Television.

ANSI (American National Standards Institute) — This is a non-profit institute which manages the systems, products and processes of the US to be available internationally. The organization verifies the international availability of any related gadgets and services of their citizens.

Anti-virus Software — Computer applications that are used to categorize and eliminate viruses, or other malicious software (or malware). Antivirus applications were primarily employed to battle viruses. Later antivirus applications can guard and protect the system against other types of malware.

Apache — A popular open source web server application managed by the Apache Foundation. An alternative to Microsoft’s IIS (Internet Information Services).

API (Application Programming Interface) — The compilation of data configuration, routines, and protocols supplied by libraries to maintain the construction of functions. This monitors the performance of objects within its environment where the computer language is sustained.

Aprl.exe — A backdoor Trojan designed to replicate files and appear innocent to users. The process name is created to present backdoor functions for remote invaders. It copies a legitimate file to avoid detection from security software. It makes a user believe its intentions are positive but works in the background to get important details.

ARPANET — The communications network that served as the foundation of the Internet. It was developed by US ARPA (Advanced Research Projects Agency) in 1967. The primary purpose was to link several university computers. APRANET took advantage of it and this led to the development of TCP/IP.

AS 400 — Known as CL (Control Language), AS 400 is a programming language for the midrange platform of IBM which is related to the Job Control Language of IBM. The AS/400 instructions were created by IBM programmers to execute system level operations such as creating backups, compiling applications, exhibiting system details, as well as deleting files.

ASCII (American Standard Code for Information Interchange) — A representation of codes in English characters assigned as a combination of numbers. ASCII uses a set of 7-bits for every character. The DOS OS employs high ASCII or extended ASCII for various characters.

ASF (Advanced System Format) — A Microsoft digital video and audio container format. It is a component of Media framework for Windows. An ASF file is instituted on entity that is basically a byte sequence categorized by GUID indicator. It also comprises of entity that represents metadata.

AsfBin — The utility used for joining, cutting, repairing, and editing files such as ASF WMV. It can be used for ASF files as well as for the WMA and WMV extensions. The AsfBin process is executed without recompression. Hence, the quality of the video is still excellent and the files remain untouched.

ASP (Active Server Pages) — A script that is a server-side engine used by Microsoft for interactive websites. It is a free module for Windows Server as well as for Windows 2000. The functionality of the ASP is activated by COM (Component Engine Model). Active Server Pages used the .asp file extension.

Aspect Ratio — The image height and weight expressed as X:Y (X to Y). To keep the aspect ratio when the image height increases or decreases the width should increase or decrease by the same percentage. It is generally used for movie presentation, digital television, standard video formats, still cameras, as well as consumer cameras. When an unequal ratio exists, the aspect ratio is done by adding the vertical and horizontal mattes of the original image.

Assembly Language — Described as a programming language that employs symbolic and numeric code for representing a program of specific computer architecture. The representation is generally defined by programmers which are based on abbreviations. It was established in 1990s and is known as the 2nd generation language.

ATI (ATI Technology Inc.) — A recognized supplier and designer of graphics cards and motherboard chipsets, later acquired by AMD. ATI was the chief manufacturer of graphics or video cards.

ATM (Asynchronous Transfer Mode) — A technical method of transmitting electronic data. This is typically used in Networks, wide and local; it was intended for multimedia handling capability. This uses digital signal to organize data up to 53 byte cell. ATM network reaches a 10Gbps speed.

ATSC (Advanced television System Committee) — An HD television standard. It possesses a theater quality of audio since it uses an AC-3 Dolby Digital structure that presents a 5.1 surround sound. An ATSC system obliges a broadcasting system to use the entire channel.

Attenuation — Term used for the reduction of signal strength within the course of propagation. It occurs on every type of signal, analog or digital. It is a normal result of the transmission of signal on long distances. It is generally labeled in dB (Decibel).

AUP (Acceptable Use Policy) — The set of protocols used by website owners and network to control the ways of using the established network. AUP files are directed for businesses, corporations, ISP, schools, and administrators to lessen the possibility of legal exploit. AUP should be precise and clear. It should also cover the important details regarding the system’s policy.

Autodialer — Sometimes referred to as automatic calling unit, an autodialer is a device with the capability to automatically dial a certain telephone number in order to communicate. The Autodialer can transmit messages to the called party verbally.

Autofill — A utility for various computer programs or applications. It frequently contains forms that automatically fill the field needed. Autofill is also used to fill up a certain section of an object, usually in animation and graphics application.

Autolink — The hyperlink automatically added to a specific document. A specific document is recognized via the method of pattern harmonizing. An autolink can be executed by a server or client application in a circulated system of hypermedia.

Autoresponder — Program used for electronic mail replies. It automatically sends a response to received mails. This computer program is also used as a marketing tool. The autoresponder can immediately send information about products. It comes in three types: server-based software, desktop software, and third party services.

AVG — Term used by various Operating Systems for anti-virus software created by AVG Technologies. It include features such as periodic scans, checks for sent and received emails, capability to repair infected files, as well as virus chest and quarantine operations.

AVI (Audio Video Interleave) — is a multimedia format for Microsoft Windows Media technology. AVI can include a video and audio data that permits simultaneous playback. It also maintains multiple audio and video streams. AVI is derived from RIFF (Resource Interchange File Format).

AWStats — AWStats is a free analytical reporting tool. It is used to examine data on the internet. AWStats balances and inspect the data and log files and present the data in an HTML form. AWStats can run on various server log files such as WebStar, Apache, and IIS.

AWT (Abstract Window Toolkit) — A component of Java for creation of graphics interfaces like scrollbars, menus, and other buttons. AWT may also serve as a toolkit for ME profiles. It incorporates the ability to launch selected desktop programs; for instance, Java Client application.

Babuki — An instant messaging service that can add contacts, even those with different instant messaging services. It gives an advantage of well-organized contacts and message archives provided that it adds up all other IM services.

Backbone — Simply described as the main wire or bus that links the nodes. It is often employed to illustrate the central network connection. The term backbone is frequently used in network communications as the spine of computers’ connectivity.

Backlink — A website linked to a currently active Web page. It also is an external link of a website. A backlink can be an indication of a website’s significance or reputation for search engines. They are also known as inlinks, incoming links, inward links, or inbound links.

Backscatter — The manifestation of particles, waves, or signals that bounces back into the source. It is one of the standards used in a radar system. Backscatter is used in fields such as medical ultrasonography, photography and physics.

BackTrack — Linux live CD system developed in collaboration with ASC (Audio Security Collection) and Whax, and employed for Penetration testing. It uses the SLAX modular structure and design to permit the user to add kernels and tools. It was created by Max Moser and Mati Aharoni.

Backup — A term used for making copies of information and files which can be used to restore when a loss in data occur. Backups are employed primarily for disaster recovery and to restore corrupted or accidentally deleted files.

Bandwidth — The variation of the lower and upper frequencies; for instance, frequencies of communication channels, filters, and signal band. In computers, the bandwidth is the rate of data transfers being measured in bits/s, the quantity of traffic that occurs between websites and the Internet. Bandwidth is the central model of various fields such as signal processing, radio, electronics, and communication.

Baud — Also known as modulation rate or baud rate it is the amount of signaling events created within the transmission standard every second in a modulated digital signal. Baud is linked to the gross-bit-rate. The unit of Baud is coined after Emile Baudot, the creator of Baudot Code used in telegraphy.

BBS (Bulletin Board System) — A software application that permits users to login and link to operating system via terminal module. BBS was primarily used over a telephone line and modem interface. The user can execute functions such as uploading and downloading data and software, IM with various users, and news reading.

Begin2Search — A BHO (Browser Helper Object) and a hijacker. It is a type of toolbar embedded within the Web browser that exhibits advertisements and fabricates search results. It stealthily downloads updates and applications, alters the browser setting and broadcast information to a third party server.

BeleniX — An OS created using OpenSolaris. BeleniX can be intalled directly on hard drives. The project was initiated by Sun Microsystems in India. It was originally planned to operate as a dual structure, one for GNU over Solaris and one for Solaris system compatible.

Beta Version — The title of software that is on its second process of testing and regarded as the preview. It includes every attributes and standard characteristic of the application. During this process, the author of the software gathers feedback from users regarding its stability and usability of the application.

BHO (Browser Helper Object) — A type of DLL program created for Microsoft’s Internet Explorer web browser as a plug-in to execute added functions. It is usually loaded when new attributes occur on Internet Explorer. It was established in October 1997.

BIEW — Multiple platform viewer that includes an editor, hexadecimal as well as disassembler model that operates on binary code. It uses Intel syntax for its disassembly function. It incorporate attributes such as APM Xscale/ Java/ AVR disassembler and others.

Binary — A numerical system that represents only two symbols for its programming. These are 1 and 0, or known as base-2 system. Binary is an uncomplicated standard implementation in electronics industry that uses logic gates. Binary system is generally employed by modern operating systems.

Biometrics — Also known as bio-identification biometrics refer to devices used for verification of a certain identity. It is used to identify humans by the unique character or permanent portion of their body. This is typically used by organizations for access management. The scanning of finger prints is one example of biometrics. Its capability varies upon how it was designed.

BIOS (Basic Input/Output System) — The built-in application that verifies the system before accessing the hard drive. BIOS comprises of every code necessary to display screen, serial communication, hard drives, keyboards, and other functions. BIOS is located within a ROM chip to ensure its accessibility when disk failure occurs.

BitDefender — A bundled security software application created by SOFTWIN. It was developed as a replacement to the AVX (AntiVirus eXpert). The BitDefender bundle incorporates an antivirus application for business, home users, and ISP as well as enterprise users. It can support Windows platform, Symbian OS, Mac OS, FreeBSD and Linux.

Bitmap — An image format or memory configuration used to save digital images. It comes from the term “map of bits”. It is also referred to as the mapped arrangement of pixels. It other circumstances, a bitmap is also known as bit for every pixel.

Bitrate — The overtime size of an audio or video flow. It can be used as a constant value of bits when encoding every second of a video or audio, or the standard required number/s. Bitrate is measured in megabits of binary kilobits where 1Kb=1024 bits.

BitTorrent — A P2P file sharing protocol and application used for the allocation of data transfers over the network. Multiple parts of the file can be “seeded” from multiple peers on the network as allocated by the protocol and merged back into the complete file on “leecher’s” machines. It is often used for transfers of large files.

Bitwise Operation — The execution of a single or two-bit model within the level of each bit. A bitwise operation on older microprocessors is somewhat faster on arithmetic functions.

Black Hat — A term that typically refers to a type of hacker that conducts illegal or unauthorized activites on the network such as breaching into a system without proper authorization. The term is also popularly used for relatively less illicit activities such as, for example, using search engine optimization tactics which aren’t approved by the given search engine (also known as Black Hat SEO). The opposite of a Black Hat is a White Hat, referring to legitimate, authorized or widely acceptable activities and tactics.

Blaster Worm — Also known as Lovesan or Lovsan, it is a worm that propagates on systems that operate on Windows 2003, 2000, and XP. Blaster Worm exploits the buffer overflow. It uses the patch MS03-026 and MS03-039 to be able to deliver the worm without accessing the attachment.

BLOB (Binary Large Object) — Formerly the form of moving large data from one database to another without filters and errors. Nowadays, BLOB is a compilation of multimedia objects and other related data stockpiled into one unit.

Block cipher — A key cipher which is usually effective or completed on group of bits. It accepts a 128-bit plain text block and launches an output of 128-bit of ciphertext block. The modification of the plaintext is accurately dealt with after the secret key is put.

Blog — A shorter version of the word “weblog” with the same meaning. A blog is a web site which contains text, audio or video posts presented chronologically, much like a diary. Latest blog post is typically displayed first on the web site’s homepage. Blog posts can be about any subject and of various types, such as commentary articles, accounts of events, and so on. Video blogs are sometimes called vlogs while logs of very short blog posts (such as tweets on Twitter) are sometimes referred to as microblogs. The word can also be used as a verb whereas “to blog” means “to make blog posts”.

Bluetooth — A wireless method used to swap data over limited distances, generating PANs (Personal Area Networks). It was primarily created as a variant to the RS232 cables. Bluetooth employs a radio technology known as frequency-hopping spectrum. Bluetooth splits up data and transmits each chunk using 79 frequencies.

Blu-ray (Blu-ray Disc) — A high density optical storage device that is often used for storing and distributing High Definition video. It uses a blue laser to write a Blu-ray disc because it employs a 405 nanometers of wavelength. A BD-Rom player is used to play a Blu-ray Disc format.

BMP File Format — Also known as DIB (device independent bitmap) format or bitmap is an image format used to save bitmap images for Windows OS. Numerous GUI’s employ bitmap within its graphics subsystem. It usually uses a .bmp or a .dib file extensions.

BndDrive — An adware type of malicious software. It could display several kinds of advertisements, such as pop-up, pop-under, or side-bars. Its consumption of computer resources is high.

Boot.ini — A plain text configuration file that resides within the system root, and is used by Windows XP upon start up. It is one of the necessary system files, and contains the settings necessary for the system to boot successfully. The tool Ntldr is responsible for locating the boot.ini.

Boot Sector — Also known as bootblock, is a segment of the hard drive or other identical storage device containing standards used to start an application. It is also used to illustrate a particular program. These types of applications are executed after start-up.

Boot Sector Virus — This virus specifically infects the layer of disks or hard drives that contain the Master Boot Record (MBR). As MBR reads the bootable partition of the Operating System, the Boot Sector Virus resides in the memory to infect other disks.

Bots — Programs that operate an automatic task on the Internet. A bot generally executes a task repeatedly during operation. Search engines use indexing bots (like googlebot) to fetch information and files from various Web servers. Many web servers include the file named “robots.txt” that contains instructions for the indexing bots.

BREW (Binary Runtime Environment for Wireless) — A program created for mobile phones by QUALCOMM. It can execute small application and download files, share photos, and send messages. BREW is used to create applications that can operate in a device with an included CDMA chipset.

BRS — BRS (Business Radio Service) is also known as MMDS and Wireless Cable. It is a wireless technology used for broadband networking. BRS microwave band frequencies ranging from 2 GHz- 3 GHz. The broadcasting is done via set-top box and microwave transmitter.

BSOD (Blue Screen of Death) — A blue colored screen with white text that informs a user that an error in the system has occurred. This screen is used to determine the cause of crash. It is usually shown after system termination and most likely needs reboot.

Buffer — A storage area, frequently located in RAM. Buffers aim to operate as a temporary holding area, allowing the system to maneuver or manage data prior to the transfer. Various applications track buffer change in data and reproduce the buffer in a separate location. Buffers are commonly used when burning a compact disc or loading a streaming video on the internet.

Bytecode — Transitional symbol of representation of the Java programming language. The bytecode is also a program generated within the Java Compiler. At any rate of hotspot runtime, a bytecode is a crucial part in the execution of the program.

Bzip2 — A lossless file compression tool. It is only a file compressor, unlike the ZIP and RAR archiver. Since the UNIX system relies on split-external tool such as GnuPG, it employs Bzip2 for its popularity and stability.

CAB — A native and compressed archive file structure for Microsoft. It is generally used for various installation engines and supports digital signing and compression. It was introduced to the public as Diamond. The .cab file extension is within the Microsoft tool and coined for the word ‘cabinet’.

Cache — A reserve space that can be used within the computer memory or hard drive. Two classes of cache are disk cache and memory cache. Disk cache uses usual memory instead of SRAM, while memory cache uses the SRAM to access information.

Caller ID — Also known as CID (Caller Identification), is a telephone tool which broadcast the number of a caller to the called telephone apparatus. The caller ID can also present the name of the calling party. It is also used to track and limit prank calls.

CAN-SPAM or CAN-SPAM Act (Controlling the Assault of Non-Solicited Pornography and Marketing) — A public law that launches the standards used to deliver e-mail and involves FTC to implement its prerequisite. The FTC reports to the congress to publicize the rules to protect users from cell phone scams.

CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) — Programs that identify human minds and computer processors distinctly through a test or questions. Examples of these are distorted or fuzzy texts, usually encountered on verification of emails or other personal accounts.

CAS (Conditional Access System) — A transmission media that broadcast digital signals via cable. The pieces of data are encrypted by the CAS standard to avoid unauthorized reception. CAS contains a specific set of modules for the client to be able to decrypt the information. It is commonly used for DVB-H market.

CCMP (Computer Mode with Cipher Chaining Message Authentication Code Protocol) — A fixed module used by WPA2 standard and an elective module of WPA standard protocol. The CCMP is a vital element of an RSN network. It is an encryption protocol known as IEEE 802.11i.

CCNP (Cisco Certified Network Professional) — The verification of skills and knowledge required to administer switches and routers including programs that incorporates wireless, voice, and security within the network. The curriculum of CCNP certification includes multileveled switched networks, Cisco network, and local and wide area networking.

CDMA (Code Division Multiple Access) — A bundle of protocols used within the 2G and 3G communications. CDMA is a multiplexing protocol which permits signal to inhabit one transmission band, maximizing the bandwidth available. CDMA uses the UHF telephone structure operating at 800 MHz up to 1.9 GHz.

CDPD (Cellular Digital Packet Data) — A method of transferring or copying packets. CDPD permits the user to collect and send data within the mobile’s coverage area. CDPD provides wide, high capacity, and quick services to cellular users since data and voice are both probable for transmission at any time.

CD-ROM — A pre-recorded non-rewritable CD that contains files accessible by a computer or a specialized CD reader, typically used for storing and distribution of music, multimedia or other data.

CGI — (Common Gateway Interface) The standard protocol used to create web pages or dynamic files. It uses a CGI script that manages the websites presentation. CGI is employed to web pages or search engines to exhibit result pages.

CGIProxy (Common Gateway Interface Proxy) — Performs a Perl application through CGI that supports a non-parsed header script. It can be downloaded and installed on various Web servers. CGIProxy occurs to the user as a normal Web page that permits access to numerous websites.

CIELAB — The full color space standard identified by the Commission of Illumination. It explains every color perceptible to human eyes and is generated to provide models to be employed as reference. CIELAB characterizes the color lightness, position between green and red, and its location between blue and yellow.

CIFS — (Common Internet File System) A regular protocol which permits remote users and programmers on the internet to ask for several types of services or files. A CIFS may inquire for certain records or may send messages to an application which is being used in the server. This uses TCP/IP.

ClamAV (Clam AntiVirus) — A tool-kit antivirus application for various Operating Systems. It is frequently used as an email scanner on mail servers. It was created for UNIX, and supports BSD, AIX, OFS, Linux, and Solaris, but later Windows as well. ClamAV includes an auto updater, line scanner, and daemon multi-thread.

CLASSPATH — A type of environment variable for Java Compiler that informs the application about the location of class files to be imported or the files to be interpreted. Classpath is a very challenging application in Java.

Click Fraud — An Internet crime related to pay-per-click online advertising. It generally involves the ad publisher clicking on his own ads to gain extra revenue. The result is the advertisers losing money on clicks which don’t represent genuine interest in what is being advertised.

CLI (Command-Line Interface) — A tool that allows operating a computer system or launching applications using text commands. The operating system waits for instructions from the user inside the command line, then analyses the commands and executes them. Command Line Interfaces come in form of a virtual console or a virtual terminal running outside of a graphical user interface (GUI), or terminal emulators running as applications within the graphical user interface (e.g. xterm or gnome-terminal).

Client-Side Scripting — Scripts running within the web browser, that is, on the client-side rather than the server-side. Client-side scripting is a vital part of Dynamic HTML that enables scripting of Web pages. It is frequently embedded inside HTML document.

Clipboard — Software tool used for temporary file storage and data transfer between applications or documents through copy-paste commands. It is usually an element of GUI structure. It is frequently used to map the users input to a specific interface.

CLNS (Connectionless Network Service) — An OSI Network Layer Service. CLNS directs messages to its particular destination. CLNS employs IS-IS for routing and supports values for Error Report. The CLNS incorporates split fields for representing the segment and total length which is used in reassembly.

Cloaking — A practice of presenting web pages differently to a search engine spider than to a user’s web browser. It is known as one of the SEO black hat techniques. The server identifies a spider by its IP address or HTTP User Agent, and then delivers a fake page.

Clone — An application or program intended to imitate a specific system. It is a separate and comprehensive duplicate of the system’s database which consists of vital information, DBMS application, as well as other programs. The chief purpose of cloning is to open system compatibility.

CMMI (Capability Maturity Model Integration) — Serves as a guide to a project of an organization. It is used to set goals, improvements and guidance to all the tasks and segments of the projects. This assists in separation of all the organizational functions and appraisal for all actions that are in progress.

CMYK — Also known as four colors or process colors, used in printing colors. CMYK operates by entirely or partly masking specific color on white background. The model is generally acknowledged as subtractive, since it subtracts the brightness for color white.

COBOL — A programming language commonly used for data processing. This program is being used since it has been established until today since it is machine-independent and may be modified with Java programming language. COBOL stands for Common Business Oriented Language.

.com — A gTLD (generic Top-level Domain) used in DNS. It is considered as one of the TLDs (top-level domains) such as .gov, .mil, .edu, .net, and .org. It was first originally managed by US DoD (Department of Defense).

Comb Filter — The delayed translation of frequency to itself, in signal processing, which causes interference. The frequency response comprises of sequence of spaced points that gives the appearance of a comb. Comb filter occurs as feedback and feedforward forms, referring to the direction of signals before injecting to the input.

ComboFix — A program with the capability of removing malicious software from an infected computer. Aside from deleting malicious software from the computer, this program could also be updated. Data, DLLs, and files related to infections may all be removed by ComboFix because of its built-in utilities.

COM (Object Component Model) — A mechanism that allows Operating System and its elements to communicate. COM is used in programs such as Microsoft Office. It is used to generate a reusable application module to be able to build and link numerous applications.

Compact Flash Card — An electronic data storage device where information and other vital figures may be saved. It may be connected to other electric portable devices directly or by an adaptor. This may be used by several gadgets like mobiles, laptops and digital cameras.

Compiere — A CRM solution and ERP open source software used for SME distribution. The program is distributed under a GNU General Public License v2. Compiere is known as a model architecture development created to transform when business evolves. It is completely founded on the ADD (Active Data Dictionary) theory.

Computer worm — A program that creates copies of itself in the system of the infected computer. These worms may be acquired through the Internet or electronic mail attachments. Computer worm may lag behind to do its malicious acts like sending copies of infected emails to contacts available in an account.

Conductivity — The measurement of a certain material’s capability to conduct energy or current. A conductivity is described as the current density ratio to the strength of electric field. A conductivity of a metal is high and has low resistance.

Confidence Game — A method of cheating a party by making him believe a fraud. The trickster requests the suspect to perform a certain task by deceiving him with bank savings interest or any interesting subject that could catch the suspect’s attention. When the confidence of the victim is gained the trickster can exploit it for own benefit.

Content Filtering — Offers assistance to other tools in order to manage the course of information entering and exiting the mail stream. It uses various filtering tools to categorize messages. Content Filter assists in preventing confidential information leakage.

Context Switching — The act of changing the assigned process to a computer. This is commonly done when multi-tasking or when it is switching one computer activity to another. This is achieved without causing disturbance to the other activity.

Control Panel — A component of Windows GUI that can manipulate and view the general system settings as well as controls through applets. It can be used to add and remove application, shifting accessibility preferences, and user account management. The applets are saved as CPL file extension within appqiz.cpl of sys32.

Cookies — Also known as HTTP cookies, they are packets of delivered text from a server to client, and broadcasted back every time the client accesses the server. It is usually used for session tracking, authentication, and maintaining data regarding the user. The word cookie was conceptualized from “magic cookie”, from UNIX.

CorelDRAW — A graphical editor created by Corel Corp. It is also known as the Corel Graphics Suite. CorelDRAW executed the use of vector-based editor such as node-edit tool that executes on various objects. It incorporates wide variety of editing tools which permits the user to manage colors, contrast, and CMYK and RGB.

COS (Chip Operating System) — The series of directions created with codes which are permanently implanted in a smart card. This is also called ROM Mask. It has 8k to 64k range of capacity.

CPA (Cost per Action) — A pricing model for online advertising in which a payment is only received once a specific action is completed (such as signing up to a page, filling out a survey, and so on).

cPanel (Control Panel) — A Web-based control panel for Web hosting. It is intended to abridge management of websites. The cPanel is responsible for Web management and its interfaces. It was primarily used in speed hosting. It features a Web Host Manager and an auto-upgrade.

CPU (Central Processing Unit) — An electronic part of a computer that routes all the computer applications being called for execution. It carries out the data for computation in order to achieve the sending of information to the main memory through system bus.

CQT (Critical to Quality) — A worksheet that permits the whole team or group to save essential data about the CTQ features. CQT represent the characteristics of a certain process or product. The worksheet aids the company in guaranteeing customer satisfaction.

CRL (Certificate Revocation List) — A serial number record which has been canceled or which are no longer valid. In relation with PKI, the CA who issues the certificates is also one who timely publish the CRL.

CRM Software (Customer Relationship Management Software) — A group of applications that are intended for managing customer information used by enterprises. This software helps businesses control or manage all their client records, it provide easier tracking of all their stored data.

CRT (Cathode-Ray Tube) — The technology used for older generations of computer monitors and televisions. It employs an electron ray within the back of the tube. When the ray passes across the monitor it lights up the glass tube to activate the segments needed to display the entire image.

Cryogenics — The study of extremely low temperature production as well as behavior of materials that are subjected to these temperatures. Cryogenics uses Rankine and Kelvin scale rather that Celsius and Fahrenheit. Cyrogenics operate on temperature below -150 degree Celsius.

Cryptanalysis — The process of understanding the secret code of systems called cipher or ciphertext, and studying its limitations, in order to find its corresponding plaintext. It recognizes ciphertext, cryptosystem, or cipher.

Cryptology — The mathematics of algorithm, formulas, and number theory that emphasizes the cryptanalysis and cryptography. It is principally used to alter vital and secured information in a way that an untrained user will have difficulty to decipher. It uses a particular equation to structure the foundation of cryptography.

Cryptosystem — The term comes from the terms “cryptography” and “system”. It is any system that does cryptography functions. These kinds of systems are used for security purposes, such as encrypting e-mail. It uses certain methods to provide protection to data that needs to be locked.

CSNET (Computer Science Network) — Established in 1980s by National Science Foundation, CSNET was primarily used by universities to link Computer Science dept. universally. It contains three elements: the name server, the phonenet system, and TCP/IP tunnel x.25. It was designed as an ARPANET extension.

CSS (Cascading Style Sheet) — A type of computer language, known as the style sheet language, used to describe the formatting and the look of information presentation written in a specific markup language. It was intended to allow separating the content from how it is presented. CSS is often used to style pages written in XHTML or HTML, as well as XML, XUL and SVG markup languages.

CSTN (Color Super Twist Nematic) — LCD equipment based upon the extensive matrix, which presents a 100ms display response time as well as 140 degree angle to view. CSTN was created in 1990’s. The extensive matrix of the CSTN is known as HPA (High-Performance Addressing).

CTCP (Client-To-Client Protocol) — A type of contact among internet relay chat clients (IRC). This protocol may be used to instruct messages which are usually not allowed by other raw IRC protocols.

Cyber Criminals — Internet intruders who create a number of techniques (malicious software embedded in legitimate software, fraud selling via internet, etc.) on how to fetch personal information like credit card numbers, its passwords, bank accounts or other major information which they may use to benefit from.

Cyber — Product created by CDC (Control Data Corporation) for mainframe-category supercomputers. In its early days, Cyber was the choice for mathematically and scientifically intensive computing. It incorporates applications such as stress analysis, probabilistic analysis, electromechanical analysis, radiation modeling, and academic computing.

CyberSquatting (Domain Squatting) — Trafficking, registering, or utilizing a domain name that matches or is linked to someone elses trademark or a popular name in order to profit from it. A cybersquatter may seek to sell the domain name at a much higher price than its purchase price, often to the very entity to whom the trademark belongs or with whom the name is generally associated.

Cydoor — A program typically embedded into programs downloaded from the Internet. It is an adware application which installs itself into the downloaded program to act as if it is a legitimate component of it. Advertisement is the sole purpose of this program.

DAM (Digital Asset Management) — DAM is responsible for retrieving, storing, and interpreting all digital resources, like music, photos, videos and other multimedia files. The DAM is also intended for all file backup, archiving, optimizing, renaming, relocating and other organizing procedures.

Database (DB) — An electronic collection of records and data stored in the system. This is a location where system files are filed according to the database models. It is also considered as the filing system where computer programs may find the bits of needed information.

Data Link Layer — The standard protocol layer that transmits data along the neighboring node of network over a WAN or nodes within LAN section. It presents a way to transmit files between units and could correct setbacks that occur within the physical layer. Data Link Layer also provides the operation of multimedia access control.

Data mining — A method of getting information or records from a huge amount of data. This has become a technique for detecting fraudulence, surveillance, discoveries or other important conditions that need profound detection. It is used to reveal patterns in data. This is the search of sensible records from certain data.

Data Recovery — The protocol of retrieving data from failed, corrupted, or damaged storage media. Usually the data are recovered from DVD, RAID, Storage Tape, Hard Disk, as well as other electronics. The retrieval may be implemented due to logical or physical damage of the device.

Data Type — The characteristic of data that informs the system regarding what type of data is being processed. It is also described as a group of values as well as the acceptable procedure within these values. It usually merges multiple components of valid operation to define an original data type.

DAT files — Data files that consist of data using ASCII file format. DAT files can be accessed via numerous programs. For instance Microsoft Notepad and Microsoft Word, as well as Microsoft Excel, since various DAT files are CSV files.

DBS (Direct Broadcast Satellite) — A satellite TV configuration that transmits direct signals from a geostationary satellites. The bits of information are broadcasted through microware frequencies. DBS is an updated version of the DTH (Direct-to-Home) services. The mechanism directly captures a microwave signal from source to a standard TV set.

DCE (Data Circuit-Terminating Equipment) — A mechanism located between the transmission circuit and DTE (Data Terminal Equipment). It performs tasks such as coding, signal conversion, line clocking, as well as being an element of intermediate tool. DCE communicates with RS-232 and other communication standards.

DDoS Attack (Distributed Denial of Service Attack) — Takes place when several systems cooperate to overflow the resources of a certain system. This could be controlled by an attacker, with the possibility of using hacked units and controlling them to flood a target system. There are several methods that an attacker may use to do this type of assault.

DEA (Data Encryption Algorithm) — An algorithm block code that is the standard of the United States government. DEA makes use of keys in 64-bit where approximately eighty eight percent are chosen independently.

Debugger — An application used to examine and repair other computer programs installed in the computer. This could change the operations of a running application. The debugger usually works when an application crashes.

DECSeerver — The orchestrated Terminal Servers created by Digital Equipment Corporation. The DECServer is used for Linux with Linux-DECnet project. It uses a solitary 10Bases terminal server with 8 serial port and Ethernet port. The server must download the required boot image through MOP protocol.

Deep Web — Also known as invisible Web or Deepnet, it is the part of the web that is not indexed by conventional search engines, and is therefore not part of what is known as the Surface Web. It is distinct from the dark internet in so far as the deep web is reachable through the internet whereas the dark internet includes devices that are no longer reachable.

Defragmentation — A method of gathering the noncontiguous fragments to form into one intact file so as to save more space. Another purpose of defragmentation is to save time whenever a user is accessing a file or data. It usually makes a system respond quicker.

DES (Data Encryption Standard) — A protocol for the encryption of information chosen by FIPS and NBS. It is founded in the 56-bit symmetric algorithm. Its algorithm is practically secure via Triple DES. It has been used in the modern perceptive of cryptanalysis and block cipher.

Device Driver — An application that controls a specific device connected to the computer. It manages interrupts that occur in the software and retains settings of hardware devices.

DF (Disk Free) — The standard UNIX command used to show the quantity of disk space available. DF is frequently executed by accessing running mtab or through statfs. Disk Free primarily appeared in UNIX AT&T version 1.

DHCP (Dynamic Host Configuration Protocol) — A network protocol used by devices to acquire configuration file from IP network. The protocol trims down the system administrator task, permitting other devices to be link on a network. DHCP was described as the standard protocol in RFC 1531. The configuration of DHCP is also suggested for servers.

Dial-up — An Internet access that uses a telephone line to link to the Web. It uses a modem linked to a phone line and dials the ISP’s module to set up modem-to-modem connection. The modem is used to direct data packets between the PC and the Internet.

Dictionary Attack — A protocol used to crack a security system, particularly a system with passwords. The invader methodically checks for every potential password. The term “dictionary” refers to the capability of the invader to try every word in the dictionary to gain the necessary password.

Digital WaterMark — A blueprint of specific bits injected within a video, audio or digital image that will recognize the copyright information of a file. Its sole purpose is to provide protection in a digital format. Digital Watermarks are invisible and the representation of bits are scattered all over the files.

Direct3D — A component of DirectX API from Microsoft, available for Microsoft Windows. Direct3D is a fundamental element for API graphics on Xbox gaming systems. It is used to render 3D graphics and permits applications to execute in full screen. It employs hardware acceleration to allow the whole rendering to accommodate even graphics acceleration.

DirectDraw — An application used for 2-D hardware-accelerated graphics. It is used to exhibit hardware and still retains the compatibility with GDI (Graphics Device Interface) of Windows. It is a memory manager used to display devices and system memory. It can support BLITS (Bit-Block Transfer), multiple buffers, overlays, and direct video buffers.

DirectInput — An API used to interface input devices and to manage device’s force-feedback. It is bundled with DirectX SDK. It executes a program used to recover information from an input apparatus via action mapping.

Disassembler — A computer application whose task is to convert the machine language to assembly language. This gives the user an easier way to understand how an application works, and allows it to be modified.

DiSEqC (Digital Satellite Equipment control) — A particular communication standard used between a small dish rotor or multiple dish switches and the satellite receiver. DiSEqC depends only on coaxial cable to broadcast a power, and a bidirectional signal. It is frequently used for control switches, and attuned to actuators employed for C-band dishes.

Disk Storage — The type of storage equipment where the information is saved on a disk drive. It uses a device used to retrieve and record data. This storage can be a hard drive, floppy drive, optical discs, or removable drives.

Distributed Computing — The science of solving a large problem by simply sorting parts of the problem and distributing them to several computers for solution. Each solution by all computers is then combined to solve the major problem.

DivX — A video decompression / compression set-up that permits video files to be compacted. A DivX file format can save a whole movie on 700 MB compact disc. It employs an MPEG-4 structure to balance the quality of the film and file size.

DLL (Dynamic Link Library) — The implementation used by Microsoft for its shared library model within Windows and OS/2. The libraries use DLL extensions as well as OCX (with ActiveX control), or DRV extension for legacy drivers. It contains data and code that can be used by other programs simultaneously.

DLP (Digital Light Processing) — Technology used for video projectors. The image will be generated by tiny mirrors resting within the DMD (Digital Micromirror Device). Every tiny mirror represents and corresponds to the required resolution needed for the image.

DMS (Document Management System) — A computer program that is used for managing any form of electronic documents. It provides a more comfortable way of locating and accessing records. It reduces time spent on finding documents.

DMX512 — The EIA-485 communication protocol generally used to organize stage effects and lightings. The technology was created by USITT’s Engineering Commission. The DMX512 was primarily created as a common denominator standard for specific interfaces. DMX512 is a unidirectional application.

DNS (Domain Name System) — An Internet system that resolves a domain name into an IP address. Since domain names are consisted of letters, numbers and symbols, they are much easier to recognize. DNS is also described as Digital Nervous System, developed by Bill Gates to illustrate the connections of systems, which is used to understand and obtain data.

DOLAP (Desktop Online Analytical Processing) — An online business intelligence application, which includes the capability to obtain small cubes of data from the server and execute multidimensional calculation while detached from the server. This attribute is practical for mobile users.

Dolby Digital — The succession or group of technologies used for audio compression created by Dolby Laboratories. Dolby Digital, also known as AC-3, uses predefined channels of up to six separate sounds, the five channels being the normal-range of speakers and one for sub-woofers. It supports 48 kHz of audio sample-rates.

Domain Kiting — The practice of constantly deleting and registering a specific domain name to be able to possess the domain name without paying. Domain Kiting is also known as domain tasting, which make use of the AGP within the registration of the domain name.

DOS (Disk Operating System) — An operating system linked to the IBM PC market in 1981 up to 1995. It is also referred to as MS-DOS, shorthand for Microsoft disk operating system. It was created by Microsoft as the standard OS for IBM personal computers.

Dreamweaver — Adobe application used for the development of web contents. Dreamweaver supports Windows OS and Mac OS and includes support for JavaScript, CSS web technologies as well as PHP, ASP, and ColdFusion languages. The application was created by Macromedia and purchased by Adobe System.

DRM (Digital Rights Management) — The standard technologies used by manufacturers, publishers, and copyright owners to border out the usage of devices or digital media. DRM is used to avoid unauthorized duplication of digital media files or devices to preserve artistic reliability.

DSA Digital Signature Algorithm — A gadget which could be connected to a computer in order to sign electronically. It is used for the (DSS) Digital Signature Standard. This corresponds to hand written signatures. It is difficult to forge therefore makes the sender believe that the message has reached the right recipient.

DSL (Digital Subscriber Line / Loop) — A method of transmitting digital data through cables of telephone networks. This allows the use of internet via the telephone line and the use of the telephone line with typical telephone use at the same time. It splits the high and low frequency to allow both uses.

DSN (Data Source Name) — A source of Open Database Connectivity (ODBC) that consists of records of specific database needed by ODBC to connect to the database. DSN includes vital database information like the name, directory, passwords, or identifications of the user.

DSP (Digital Signal Processing) — A standard protocol responsible for the representation of bands via symbols or series of integers as well as the processing the signals. It incorporates fields such as speech and audio processing, radar and sonar processing, processing digital images, processing signals for communication, and sensor processing. DSP frequently evaluates or filter analog and digital signals via a converter.

DSS (Decision Support System) — Software that was constructed for helping decision makers settle on problems. These are computer applications that may provide more data, knowledge, documents or any form of information that adds up to a decision maker’s idea in order to provide more progress to the decision making.

DTE (Data Terminal Equipment) — The end mechanism used to translate information to a signal. A DTE tool is used to communicate with DCE (Data Circuit Terminating Equipment). The equipment functions in harmony with the link procedure. It can be a multi-linked subsystem or single equipment that operates the needed functions to communicate.

DTMF (Dual-Tone Multi-Frequency) — Signaling employed for telecommunication within voice band channels. The DTMF for telephone is recognized as Touch-Tone dialing. It is also used in cable television channel which designates the beginning and end times of advertisements. The loud DTMF is employed between the advertisements of cable channels.

DVB (Digital Video Broadcasting) — A protocol used internationally for digital television. Its standards are managed by the DVB Project. The DVB sub-protocols are illustrated within the book of DVB standards. Various elements of DVB are licensed and patented, including the MPEG audio and video coding.

DVD (Digital Versatile Disc) — An optical storage disc used for data and video storage. A standard DVD wavelength is 650 nm. DVD can store of up to six times of data than a compact disc.

DVD Region — DVD Region Numerous DVDs are encoded with a specific DRM codec that restricts the area in which it could be played. A DVD that has no region codec is known as all region discs, which is accessible to every DVD players. The sole purpose of the region codec is to permit film studios to manage the aspect and release according to region.

DVI (Digital Visual Interface) — A standard video interface intended to take advantage of the quality of digital devices (i.e. visual display such as projectors, flat panel and LCD among others). It uses a digital procedure for the binary data to be transmitted in pixels. The DVI will read every binary and apply the brightness to a corresponding pixel.

DWDM (Dense Wavelength Division Multiplexing) — The optical technology employed to maximize the bandwidth for optical fiber backbones. DWDM operates by transmitting and mixing multiple signals at the same time via different wavelengths within a single fiber. This method will transform a single fiber into virtually multiple fibers. It can transmit data using 400 gigabytes per second.

EAP (Extensible Authentication Protocol) — The worldwide structure that is used by point-to-point connections and networks for authentication. The EAP is more commonly known for the validation of the wireless networks although it is also capable of authenticating wired LAN.

EBCDIC (Extended Binary Coded Decimal Interchange Code) — An 8-bit encoding standard used within IBM mainframe as well as IBM midrange operating systems. EBCDIC was created to expand the encoding of binary in its time. It is also used by modern platforms for reverse compatibility.

ED4W — A full editor or programming IDE (Interactive Development Environment) that supports various computer languages. It incorporates editing capacity as well as built-in Database Source Engine that traces every method, class, and module that enables the user to jump on specific functions. ED4W makes navigation easier within the large database of codes.

EDGE (Enhanced Data Rates for Global Evolution) — An improved GPRS standard used to obtain rich content data. It broadcasted four times faster than conventional transmissions. The speed of an EDGE network depends upon various aspects, such as service outages, traffic volume, signal strength and the Internet speed.

EEPROM (Electrically Erasable Programmable Read-Only Memory) — A microchip that saves data which can be erased and rewritten. EEPROM cannot be rewritten selectively; instead, the whole microchip must be erased to update its files. EEPROM is frequently used by various BIOS chips for their system settings.

EIDE (Enhanced IDE) — The standard for storage device interfaces also known as Parallel ATA, and sometimes referred to as Fast IDE or Fast ATA. It can support 4 Mbps up to 16.6 Mbps of data transfers. It was later superseded by Serial ATA (SATA).

EIP (Enterprise Information Portal) — A structure used for integration of information, people, and processes within an organization. It offers a protected cohesive entry point in form of a web user interface. Various EIP applications are used to rapidly deploy and develop a company’s enterprise portal.

Elasticity — A division of science that studies the elastic properties of a material. Elasticity can be described as a property of a material that deforms via stress and returns to the original shape upon the removal of stress.

ElcomSoft — A company that dedicated to building and creating data recovery and computer security software. ElcomSoft’s standard products include password recovery applications and eBook processing software. The company supports various Microsoft applications.

E-learning — A training program conducted through the Web. This is a method of developing skills and knowledge through online presentations and courses. This program also entertains questions and suggestions.

Electronic Voting — Allows people to vote electronically using certain types of punch cards or other optical voting systems. This incorporates counting of votes and their broadcast by using networks, telephones and Internet connections. E-voting can speed up voting and counting of ballots, but also carries a risk of voting fraud.

E-mail Address — Internet location to which electronic mail is delivered. Majority of e-mail addresses employ the SMTP (Simple Mail Transfer Protocol) described in RFC 5322 and RFC 5321 Internet Standards. When the server receives an e-mail, the server will deliver the e-mail to an e-mail inbox associated with the e-mail address.

E-mail Client — Also known as MUA (Mail User Agent) or an email reader, it is a computer application used to send, receive, and organize emails. It is also recognized as the acting client agent that manages email servers. Frequently a web application that offers these functions and capabilities is also acknowledged as an email client.

Email — A procedure or technique of creating, storing, or transmitting text-based messages to be delivered via a digital system. Today e-mail structures are based upon a forward-and-store model when a server receives and forwards messages to various personal computers. Originally, the e-mail only contained text messages using the ASCII set of characters.

E-mail Extractor — An application tool that is designed to pull out email addresses from local files, web pages, plain text, clipboard and address books. An E-mail Extractor collects all valid addresses and generates output files that comprise of legitimate addresses only.

E-mail Scam — An action that swindles users through e-mail fraud. The scam generally takes the structure of confidence scam which exploits the naivety and greed of users. The scam often relies on users vulnerable to “get rich schemes”.

Email Spam — Identical email messages sent in bulk to several recipients. It often takes a lot of space in email accounts. Spam mails may also contain malware or advertisements which may contaminate computers when activated.

Embedded Links — Also known as associated links, embedded links comprise of links inside the body of a text. They can help present detailed information on a certain subject. Anchor text in embedded links is typically styled to be distinct from other text for easier accessibility.

Emulation — A software simulation of an electronic system or a different operating system. Emulators can, for example, simulate a gaming console on a PC in order to allow games made for that console to run on the PC.

Encryption — The procedure of converting plaintext or other information into an unreadable form through the use of algorithms or ciphers to protect its privacy and security. The outcome of the procedure is known as the ciphertext (the encrypted data). The act of reversing the encrypted form to become readable again is known as decryption.

ERP (Enterprise Resource Planning) — Computer application used to coordinate and manage all resources, functions, and data from shared information stores of a business. ERP includes hardware and services that could be linked over a network. Its design permits an administrator to reconfigure or add modules to the system while protecting the reliability of the database.

Error Codes — Enumerated messages representing various errors that may occur in software applications, useful fo error handling. Nowadays, there are Exceptions that replace Error Codes.

ESA (Electronic Self-Assembly) — A process that permits a consistent pattern or formation of multiple layers of raw materials to form thin and functional films. ESA method entails simple dipping of specific material into solutions that contain the compounds needed to form the required material.

Espionage — Spying, or accessing secret or confidential information about a person or an organization without permission and for the benefit of the individual or organization engaging in espionage. This is often coupled with hacking in order to gain access to such information.

Ethernet — A group of frame-base system network technologies used for LAN. The term is from the natural concept of ether. Ethernet describes the signaling and wiring standards used for the OSI Physical Layer networking model. Ethernet is an IEEE 802.3 standard.

ETSI (European Telecommunication Standard Institute) — The non-profit, independent organization that establishes standards for Information and Communications Technologies (ICT), used by european telecom companies. ETSI was generated by CEPT which is recognized by the EFTA and the European Commission. ETSI encouraged the construction of 3GPP.

EV-DO (Evolution-Data Optimized) — A telecommunications protocol used for wireless transmission of information via signals, frequently used in broadband access. It uses multiplexing such as CDMA (Code Deviation Multiple Access) and TDMA (Time division Multiple Access) to make the most of the overall system. It was created as an advancement of CDMA2000.

FaceBook — Social networking service managed by Facebook Incorporated, and created by Mark Zuckerberg, Chris Hughes, and Dustin Moskovitz. It is used for sending messages, sharing various types of content with friends, maintaining a social profile (also known as a timeline), managing events and communities, and social media marketing, among others.

FAT32 — File Allocation Table (or a file system format) for various Windows Operating Systems, used to track every bit of information in the system. FAT32 is an evolution on FAT16 designed to be used on larger storage volumes. It is considered a legacy file system architecture.

Fibre Channel — High-speed networking technology mainly used for connecting storage devices, used in the field of supercomputers, and Storage Area Networks (SAN). It can run through fiber-optic cables and twisted pair copper wires, and supports SCSI (Small Computer System Interface).

Firewall — A virtual fence that protects computers from destructive forces. This may prevent viruses and pop-ups, advertisements, and other programs embedded with them to effortlessly break into a property. A firewall’s protection also depends on how the user has set it to be, which usually varies from low to high.

Firmware — Firmware is the term used for small, fixed programs that manage numerous devices such as keyboards, hard drives, calculators or memory. Simple firmware exists in OTP/PROM or ROM, while the more complicated firmware can manage flash memory for updates.

Fixboot — A command employed in the Recovery Console that carves a new boot partition into the specified system partition. Fixboot is typically available inside the Recovery Console of Windows systems.

Flag — Bits used to save a code or binary value. Flags are found as a component of specific data configuration. Flag is also used to allocate or mark information configuration for upcoming processing.

Floppy Disk — A disk that is used for storing data and is inserted into the floppy disk drive. The diskette, as it’s also known, has low capacity, is easily wrecked, and is barely ever used anymore.

FORTRAN — A procedural, general-purpose programming language suitable for scientific and numeric computing. FORTRAN was developed by IBM for engineering applications, dynamics, weather prediction, as well as chemistry and physics. The language includes versions that add language extensions which maintain the compatibility with older versions.

Framework — The practical structure of the design for specific software development. It could comprise of codes, programs, other applications, language, as well as tools used to join the software project.

Free BSD — An OS based on the 386BSD branch of UNIX as well as 4.4BSD OS. It operates within Intel x86 computers, DEC Alpha, IA-64, NEC and Microsoft Xbox. It is characterized as “the unrecognized giant OS”. It operates as UNIX but, but is not a UNIX clone.

Freeware — Software that is freely available for download and use although it may or may not be open source or free to redistribute or modify. The term was created by Andrew Fluegelman.

FTA (Free-to-air) — Television or radio broadcasts that can be received by suitable devices and viewed or listened to for free, and without subscription. It is, however, geographically restricted since it is digitally encrypted. It is also sometimes delivered by satellite.

FTP (File Transfer Protocol) — The network technology used to deliver information from one system to another. It is used for managing and exchanging data over a TCP network. FTP listens to port 21 for connections. From this connection, the client generates a stream that passes instructions on FTP server to be able to make the transfer.

Funnel Web — Macro programming which enables the programmer to intertwine documentation and scripts together. The FunnelWeb is a tool used in the production quality of a programming language. It is also a general purpose preparation tool for various applications.

G2mdlhlpx.exe — Trojan that contaminates the system. This malicious file is executed and established by the user from the internet. The process deals damage to the configuration and boot-up processes. It has the capability to halt automatic updates and firewalls.

Gateway — The communication network that employs various protocols. It may also refer to protocol interpreter, fault isolator, and rate converters. Gateways are also known as protocol converter, which operates on various OSI layer model. The gateway should translate a protocol into a different one.

GBE (Gigabit Ethernet) — A technical way of transferring Ethernet frames at gigabit rates per second through Local Area Network (LAN) or Wide Area Network (WAN). This makes everything on the network run quicker.

Generic Programming — The method of programming where the algorithm is programmed in an easy-to-understand manner. It describes a specific type of programming that permits several parameters to avoid fixed scripting requirements. This technique allows common operations to be used in various programming.

Ghost — The replica of an image dimmer to the primary figure. It is a specific setback for television that encounters a weak signal. Ghosting may occur due to mismatch impedance and multi-path distortion.

GIF (Graphics Interface Format) — A bitmap file structure that can support 8-bits for every pixel, supporting up to 256 specific colors from a 24-bit RGB. GIF can support animation that can split 256 colors for every frame. GIF image format uses LZW (Lempel-Ziv-Welch) data compression.

GIMP (GNU Image Manipulation Program) — An open source application and image editor used to process photographs and digital images. It is used to generate logos and graphics, color management, converting images into particular formats and so on. GIMP is also used for the creation of GIF files. Its tools can be accessed via dialog box, menu paths, and toolbox.

GNOME Office — An open source suite of office applications that is offered by the GNOME project, primarily for the GNOME Desktop Environment. GNOME Office applications include AbiWord word processor, Evince document viewer, Evolution groupware and email application, Gnumeric spreadsheet application, Inkscape vector graphics application, and Ease for creating presentations.

GNU — The name of a Free Software (as defined by the Free Software Foundation) operating system started by Richard Matthew Stallman. While most of the components of the operating system are created and functional the core, or kernel, of the system (called GNU Hurd) is still in development and not ready for prime time. This is why GNU components were joined with the Linux kernel to form GNU/Linux OS, or Linux for short. GNU Project offers a number of system tools and user applications.

GnuPG (GNU Privacy Guard) — Often referred to as just GPG it is a suite of cryptographic software offered under the GNU General Public License, as an alternative to PGP. It uses the implementation standard RFC 4880 for GNU Projects.

Gnutella — A well known file sharing application. Gnutella uses lists of working nodes that employs an updated cache compatible with GWC (Gnutella Web Cache), IRC, and UDP cache host. Once linked, the Gnutella client requests the working address list to be able to upload the data.

Googlebot — A search bot or a search spider program used by Google to “crawl” web pages and documents all over the web in order to construct a searchable index for their search engine. Googlebot uses the “googlebot” agent string and a host-address of “googlebot.com”.

GPRS — GPRS (General Packet Radio Service) – is a mobile information tool accessible for GSM mobile telephones. It is frequently illustrated as the 2.5G (Generation). GPRS is a packet-switched used for multiple users that use the same channel for transmission.

GPS (Global Positioning System) — Global navigation using satellites. It uses constellation of 24 to 32 Earth Orbit Satellites which can deliver data in accurate microwave signal. GPS requires a key synchronization resource for cellular telephone network.

Grayscale — Digital image format that describes only the intensity information of each pixel in which the strongest intensity produces white, and the weakest produces black. That’s why grayscale images are also known as black-and-white, monochrome, bilevel or binary images.

Groupware — A set of collaborative programs that allow a number of people across the network (often co-workers) to cooperate on various tasks. Groupware offers a wide range of communications features including email, e-meetings, file sharing, calendar sharing, and others.

GSM (Global System for Mobile Communication) — A standard that describes protocols for the second generation (2G) of digital mobile communications networks for mobile phones, established by ETSI (European Telecommunications Standards Institute). GSM employs TDMA (Time Division Multiple Access), compresses and digitizes data, and sends it through a specific channel that operates at 900 MHz to 1800 MHz band.

GUI (Graphical User Interface) — Allows users to interact with the functions of computers and electronic devices using graphical icons and indicators rather than only text. It was developed to make computing available to a larger number of people since textual command line interfaces typically require a steep learning curve. First computer with a GUI (often pronounced “gooey”) was Xerox Alto, but the first to bring GUI’s to mass market was Apple with its Lisa computer, and subsequently the Macintosh.

GZIP — Free Software program used to compress and decompress files, written as a replacement for the “compress” UNIX utility for the same purpose. It was programmed by Mark Adler and Jean-Loup Gailly for the GNU project.

Hack — A hack can be a quick fix or smart way to repair an application, or an inelegant or clumsy way into the solution needed to execute a program. Its modern meaning is linked with cracking, which typically refers to unauthorized breaking into a program or a system.

Hard Drive — A disk or a storage device (usually with metal casing) that is responsible for storing all the programs and files being saved by computer users; it magnetically keeps information which has been saved by the user. This device has space limitations for data which ranges from hundreds of gigabytes to a few terabytes.

Hash Function — A well-designed function that can translate variable or large quantity of information into undersized datum, particularly a single instance that could be presented in an array. Hash values, hash sums, hashes, and hash codes are known as the returned value of a hash function. These functions are used to speed up data comparisons.

HD Upconverter — A mechanism that can transfer DVD signals directly onto HDTV without a transitional analog translation. This will advance the picture quality and overall resolution. The device enhances each frame of the DVD signal to equalize the required resolution needed for HDTV.

Hex Editor — Also known as byte editor or binary data editor, it is an application that permits a user to manage binary files. The program used by Hex Editor is interpreted in hexadecimal values separated in classes of 16 ASCCI and 8 byte characters. Hex Editors created to manage parse, or sector, data drives and hard disks are known as Disk Editors.

HijackThis — Also known as HJT, it is a tool for removing Windows spyware. The application uses a technique for identifying malicious software. It scans the operating system and generates records of sypware allowing the user to fix these threats.

HIT — A page hit is a single request of a file from a web server, which can be a web page, an image, a script, a stylesheet or other files.

Hitbox — A web analysis and counter tool launched by WebSideStory, and initially used for adult web sites, later acquired by Omniture, which was then acquired by Adobe. It was popular in the industrial sector as a complete integrated metrics system for monitoring web traffic.

Honeypot — A trap meant to detect, deflect or otherwise counter unauthorized use of information systems by luring attackers with seemingly valuable resources. It appears as if it is a part of a network, but is actually separated and monitored.

Hostname — The name of a host in a particular network, used to classify a specific host in numerous structures such as email, World Wide Web, or Usenet. Hostname is used by numerous systems, such as SMB, DNS, NIS, and others. When a hostname without any context is presented, it is assumed that the Internet is the network and the naming system is DNS.

Hot Bar — A program that mounts a toolbar into a web browser. Its purpose is to send information to third parties after having spied on which websites a user visits, or which phrases are searched for. The aim of the personal information report is to display targeted ads on the user’s system.

Hotlinking — A process of directly linking to video, audio, image, as well as other files in a certain website from another web site. It is sometimes considered a way of stealing or leeching bandwidth from various websites, which is why it’s sometimes referred to as bandwidth theft. Most often it is loading an image from another web site within the current web site.

Hotmail — Free web based email application managed by Microsoft, later replaced by Outlook.com.

HPC (High-performance Computing) — Supercomputers or clusters of supercomputers allow for high-performance computing, or processing at highest capacities and speeds possible with the bleeding edge of current computer technology. It is especially used for complex calculations at great speeds. The term is generally used in scientific study.

HSCSD (High-Speed Circuit-Switched Data) — The enhanced version of CSD, which is used for the data transmission of GSM mobile system. It can use 38.4 kbit/s, and 4 times the speed of CSD. The allocations of channels are prepared via circuit-switched mode. It can use several time slots at the same time to amplify information throughput.

HSDPA (High-Speed Downlink Packet Access) — A standard employed for data transmissions in mobile telecommunications networks. It is acknowledged as the 3.5 generation technology. The protocol offers fast downloading for mobile devices. HSDPA advances the transfer of data faster than W-CDMA. It can attain of up to 8 to 10 Mbps transmission speeds.

HSUPA (High Speed Uplink Packet Access) — An advancement on the WCDMA / UMTS uplink technology. It is used as the standard for 3GPP (3rd Generation Partnership Project). HSUPA is related to the HSDPA technology complimenting each other. HSUPA presents a higher data and voice performance.

HSV (Hue, Saturation and Value) — A color system that uses input factor via solitary HSV cone. The presentations of the value of the pixels are linearly interrupted from start to finish of the HSV. The HSV standard is written in IDL programming language. Its source code is located within the lib subdirectory using hsv.pro.

HTML (Hypertext Markup Language) — The principal markup language for the creation of web pages. It offers a way to illustrate configuration of the web page via a document. HTML is scripted using tags with angle brackets. It can be also used to explain the semantics and appearance of the web page, and can embed various scripts, such as JavaScript.

HTML Redirect — An HTML meta tag that redirects the current web page to an address of another one after a specified delay in seconds. The meta tag is put in the head section of the HTML document.

HTTPS — Secure HTTP, which is responsible for the decryption and encryption of a page request including the pages visited by Web servers. The HTTPS shields against remote attacks and snooping. Instead of the HTTP port 80, HTTPS uses the port 443 to link with TCP/IP.

Hulu — An online service that offers commercial streaming of movies and television shows, available only in the US.

HVAC — Short form for Heating, Ventilating, and Air Conditioning. This is a significant design in industries. It is intended for the proper ventilation of a buildingm and appropriate means of access of the cold and warm air stream. The conditioning is to provide the right amount of humidity and breeze inside closed spaces.

Hyperlink — Also known as a link, it is a reference to another piece of data within a document, or to an entirely different document, that the user can follow by clicking or tapping on it.

Hypertext — Digital text containing hyperlinks, and can also include images, tables, as well as presentational mechanisms.

IBL (Inbound-link) — Viewed from the perspective of a given web page or hypertext document an inbound link is a hyperlink on another web page or hypertext document linking to the current one. It is the key of Web navigation since connections are inbound within point of view of target link. Today, various search engines categorize websites based on IBL.

ICMP (Internet Control Message Protocol) — Its sole purpose is to present a response regarding the communication environment. It generally reports error messages during the routing of datagram. ICMP messages can be exhibited in situations such as when the datagram is incapable of reaching a destination.

Icon — A computer icon is a pictogram designed to help users navigate a computer system much like traffic signs help drivers navigate traffic. It was first developed to make the interface of a computer easier for beginners. Computer icons come typically come in sizes ranging from 16×16 pixels up to 128×128 pixels.

ICQ — AOL’s instant messaging program created by an Israeli company called Mirabilis, and first released in November, 1996. ICQ was the first online instant messaging application. Its name was coined from the phrase “I seek you”. ICQ messenger was acquired by AOL in June, 1998.

ICT (Information and Communications Technology) — ICT includes all variety of devices that can send, retrieve, communicate or collect information. Small and huge devices, like mobile phones, televisions, radio, MP3 players, speakers, computers and all others software and hardware that are used for communication fall within the realm of ICT.

ICV (Integrity Check Value) — The outcome of an integrity check of a file. The ICV generally employs HMAC (Hash Message Authentication Code) as well as MD5. It incorporates functions known as the SHA-1 hash operation.

IDE (Integrated Development Environment) — An application that assists computer programmers with comprehensive software development features typically including a source code editor, a debugger, build automation, and sometimes a compiler, interpreter and intelli-sense coding features. An IDE can help make software development easier and faster.

IETF (Internet Engineering Task Force) — A standard body that promotes and develops Internet standard protocols, relative to ISO.IEC and W3C, which deals with TCP/IP standard suites. The organization primarily operates on Internet’s foundation standards. Members of the organization are mostly volunteers and frequently funded by agencies of US government.

IFF (Interchange File Format) — A generic file structure created by Electronic Arts to simplify the data transfer among applications. The IFF file format is constructed from portions of the “type ID”, and followed by unsigned 32-bit integer.

IGN (Imagine Games Network) — A review and multimedia news web site that centers its interest on gaming. It contains a multitude of channels for gaming consoles, technology, TV, movies, comics, and so on.

IKE (Internet Key Exchange) — A protocol used to establish a SA (Security Association) within IPsec standards. The IKE employs a Diffie-Hellman exchange to initiate shared session which defines cryptographic keys. IKE is founded within the Oakley standard. It uses UDP packets inside port 500, and obliges a 4-6 packets.

Image Arcadia — An advanced system for multimedia management. This is an application used to make multimedia uploading an easier task. It allows a user to add photos, videos or other multimedia files to a website in a few clicks.

Image Spamming — A method of email spamming in which text is embedded in image or picture files, which most anti-spam software ignore, because they are pictures and not text.

Image Toolbar — A clone of the Internet Explorer’s feature that offers an easy and quick way to numerous image functions. The toolbar is executed and activated by moving a mouse pointer over an image. It displays within the corners of the image, and allows the user to save the image or execute other function.

IMAP (Internet Message Access Protocol) — An Application Layer Internet protocol that allows an e-mail client to access e-mail on a remote mail server using a well known port 143. IMAP supports offline and connected modes.

IMAX (Image Maximum) — The format used for motion pictures. It is also a projection format generated by IMAX Corporation. It has the capability of exhibiting greater quality of images and greater resolution than a regular system. 22 meters and 16.1 meters are the standard screens for IMAX.

iMesh — A file and media sharing application that includes social networking features and supports multiple languages. It employs a centralized, proprietary, P2P network that uses ports 443, 80 and 1863. It was primarily used as a peer-to-peer ‘RIAA-accredited’ service. It also allows users to access non-copyrighted video and music files.

IM (Instant Messaging) — Technologies and applications that allow for text-based and real-time conversations among users. Features include delivery report, reply recognition, ability to set an offline message, saving conversations for future reference, and other.

Indexing Service — Services used to dig out contents of files and create a record to assist rapid searching. Indexing Service is capable of extracting property information and text from data within the local system or on a remote OS. It uses filtering elements that can filter by various file formats.

Information Foraging — A theory that is used to understand how human beings search for information, based on ideas from optimal foraging theory that assumes humans have built-in foraging mechanisms evolved to help our animal ancestors find food. Understanding how people search for information helps improve usability of web sites and other user interfaces.

Inline Linking — Another term used for “hotlinking”, piggy-backing, leeching, direct linking, or offline image grabs. It is the use of objects, such as images, hosted on one site within a web page of another site.

Instancing — Rendering multitude copies of a particular mesh at the same time. Used primarily in graphics, it is usually used in objects such as grass, trees, or buildings. Since every piece of such data has different instances and parameters instancing is used to decrease the emergence of repetition.

Integer Overflow — A result of trying to set up an integer within computer memory. It will occur if a mathematical operation tries to generate a numeric value larger than its presented storage. Integer overflow frequently occurs unnoticed by the contaminated application.

Interactive Whiteboard — A relatively large interactive display that is connected to a computer in order to display the computer’s desktop. Users can then control it using a pen, a stylus, finger touch or other similar input devices.

Internet Radio — Continuous audio broadcast, much like traditional radio broadcasts, streamed over the internet. Internet Radio is also known as net radio, web radio, e-radio, webcast or streaming radio.

Intranet — A computer network that uses the Internet Protocol for sharing of information and computing services within an organization, but separated from the public internet. In contrast to the internet, which is a network between organizations and individuals, an intranet is a private network existing inside of a particular organization.

Invisible Hack — A hack that allows instant messaging users to see the true connection status of users who’ve marked themselves as “invisible”, or hidden from view even while actually online. Typically the hack is accomplished by using a third party application that taps into an IM network (such as Yahoo! IM) or launching an application shared with the invisible user and watch for resulting connection messages.

IP Address — A set of assigned identification numbers for devices which are part of a network. This numerical identification is unique and traceable by Internet users or other members of the network. IP addresses have the capacity to identify the specific location of sources in the topology of the routing system.

iPhone — A modern smartphone designed by Apple Inc. It was the first mass market smartphone that featured a multitouch screen, and an attractive user interface with multiple applications. It runs the iPhone OS, later renamed iOS, which is based on a standard Mach kernel used to create Mac OS X.

IP (Internet Protocol) — A primary communications protocol within the Internet layer of the Internet protocol suite, used to relay datagrams across the network. Its routing capability allows internetworking, and as such creates the internet. IPv4 is the first widely used and dominant version of the Internet Protocol, being succeeded by IPv6.

IPv4 (Internet Protocol version 4) — The fourth generation in the progression of IP (Internet Protocol). The IPv4 is described as data-oriented standard used on Ethernet. The IPv4 offers file integrity shield via packet checksums. It was identified by IETF RFC 791.

IRC (Internet Relay Chat) — A real-time application for text messaging or conferencing. It is created to be used for group chat forums, known as channels, and permits private message. IRC uses TCP and TLS open protocol. The IRC server can link to other servers to enlarge its network.

IrDA (Infrared Data Association) — An organization that defines standards for wireless infrared communications protocols, and a term used to refer to that set of protocols. IrDA uses optical communication to transmit data. It is frequently used in medical instrumentation, palmtop PCs, laptops, measurement tools, and mobile phones.

IR — IR- Stands for InfraRed. This is a method of transmitting data among computers or other electronic devices like mobile phones. This is usually only a short-range transfer of figures. This uses LED to produce the radiation. This may be switched on and off. The IR does not go through walls and is usually only utilize indoors.

ISA (Industry Standard Architecture) — A computer bus standard introduced with IBM’s Personal Computer for use with IBM PC and compatible computers. It was created to support Intel 8088’s processor’s 8-bit external data bus, later extended to support 16 bits for Intel’s 80286 processor, and then again extended for 32-bit processors in form of EISA (Extended Industry Standard Architecture) before it was superseeded by newer standards.

ISAKMP (Internet Security Association and Key Management Protocol) — A protocol for establishing a framework for Security Associations and cryptographic keys on the internet, designed to be key exchange independent. It enables the parameters of IP Security channels and the mapping of various channels to VPN instances.

ISP (Internet Service Provider) — A business that offers internet access and related services. Internet access is provided by means of a particular data transmission technology suitable for use with the Internet Protocol, such as DSL, dial-up, satellite, fiber-optic cables and so on. Related services may include personal web hosting, storage, email addresses, various security features and so on.

ITIL (Information Technology Infrastructure Library) — Ideas and rules about IT management, procedures and progress. ITIL comes in books which discuss certain IT topics; describing IT practices and other vital data related to Information Technology.

IT (Information Technology) — The design, study, implementation, support, development, and management of computer-based data structures such as computer hardware and software programs. IT harmonizes with any software to store, convert, transmit, process, and recover applications. It generally illustrates a technology capable of communicating and distributing information.

ITSM (Information Technology Service Management) — A method of maintaining Information Technology standards of an organization in accordance with the concerns of its customers. This relates to all the quality related fields. Its main focus is customer’s satisfaction with the quality of products.

iTunes — A multimedia player program used to access and organize videos and music files. It is required to manage and organize music on iPods and iPhones. iTunes can also be used to purchase and download music, movies, books, podcasts and so on via the iTunes Store.

ITU-T (International Telecommunication Union – Telecommunications standardization sector) — A division of the United Nations’ ITU agency, which specializes in telecommunications standards. Its aim is to guarantee efficient and timely development of standards in all telecommunications fields worldwide, and defining tariff and accounting principles for international communication services.

J2ME — A micro edition of Java2 Platform that allows programmers to take advantage of the Java language, including tools to create a typescript for wireless and mobile devices. It comprises of specialized virtual machine and programming specs that permit the encoded script to execute in mobile devices.

JAR file (Java Archive file) — An archive file format used for the distribution of Java applications or libraries across the Java platform. It combines multitude of Java class files, related metadata and resources (such as text and images) into a single .jar file. JAR files are based on the ZIP file format.

Java Card — Smart cards and similar small memory footprint devices such as SIM cards and ATM cards that can securely run tiny Java-based applications, known as applets. It is the smallest Java platform for embedded devices.

JAVA RMI (Java Remote Method Invocation) — A Java API (Application Programming Interface), that performs the object-oriented equivalent of remote procedure calls (RPC), and supports direct transfer of serialized Java objects and distributed garbage collection.

JDBC (Java Database Connectivity) — A Java API that describes how the user accesses the database. It presents a technique for updating and querying files within the database. The JDBC can be used by relational databases.

JFS (Journal File System) — A journaling file structure created by IBM. JFS structure is used by AIX OS and presented in two versions, JFS1 and JFS2. In other OS, such as Linux, second generation JFS is used.

Jiffy — Jiffy is the interval of a click of the system timer. The length depends upon the frequency interrupt for specific operating system. Jiffy may also refer to the alternating current between the times of the power cycle.

Jitter — In electronics and telecommunications a Jitter represents an undesired deviation or variation from the expected periodic signal, typically relative to a reference source clock. It can be be found in the frequency of successive pulses, phase timing, width, and amplitude.

JPEG — The process of compressing digital images. The compression can be adjusted to specific image quality and size. It usually accomplishes a ratio of 10:1 compression. JPEG compressions are commonly used in several file formats including JPEG/Exif and JPEG/JFIF.

JPG — JPG is the file format used for very small image files. JPG is frequently used for camera’s digital memory cards. The file is generally compressed as 1/10 from its original size. It employs lossy compression meaning that the non-essential parts of the file may be lost without affecting the expected content of the file.

JRE (Java Runtime Environment) — A library for Java Virtual Machines that includes elements necessary for executing applications and applets scripted in Java language. JRE also includes the Java Web Start that organizes independent applications and Java Plug-ins, allowing applications to execute within web browsers.

JSP (Java Server Pages) — A tool that spawns a dynamic content with an application server or Web server. It presents a way to organize applets via Java plug-in, without translating every HTML sheet with its converter. JSP will be used to produce HTML sheets instantly using Java tools.

JSwat — An open source graphical front-end to a Java debugger, programmed to use the Java Platform Debugger Architecture, also used by Netbeans, IntelliJ IDEA, and Eclipse.

JunkChief — An application that stops spam and junk email from contaminating an inbox with the use of Bayesian statistical filtering. The application routinely filters email and keeps hold of the legitimate files. Deleted files are moved to the “Junk Folder”.

Junk-Out — An anti-spam plugin for Microsoft Outlook email client application. It uses Bayesian statistical filtering. Spam mails are deleted from the inbox and moved to a specific folder, which Junk-Out woul