Browse Definitions by Alphabet

  • cloud workload protection - Cloud workload protection is the safeguarding of workloads spread out across multiple cloud environments.
  • cloud workload protection platform (CWPP) - A cloud workload protection platform (CWPP) is a security tool designed to protect workloads that run on premises, in the cloud or in a hybrid arrangement.
  • cloud-native application protection platform (CNAPP) - Cloud-native application protection platform, or CNAPP, is a software product that bundles multiple cloud security tools into one package, thereby delivering a holistic approach for securing an organization's cloud infrastructure, its cloud-native applications and its cloud workloads.
  • Cloud-to-Cloud Backup (C2C Backup) - C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service.
  • Cloudability - Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.
  • CloudCheckr - CloudCheckr is a vendor that provides a cloud management platform intended to give an organization more control over and visibility into its cloud computing costs, performance and security.
  • cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
  • CloudOps (cloud operations) - Cloud operations (CloudOps) is the management, delivery and consumption of software in a computing environment where there is limited visibility into an app's underlying infrastructure.
  • cluster - Clusters are typically defined as collections or groups of items with similar or different characteristics.
  • cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
  • cmdlet - A cmdlet -- pronounced 'command-let' -- is a small, lightweight command that is used in the Windows PowerShell environment.
  • CMOS sensor - A CMOS sensor is an electronic chip that converts photons to electrons for digital processing.
  • coaxial cable - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
  • COBIT - COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.
  • COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • code - In computer programming, 'computer code' refers to the set of instructions, or a system of rules, written in a particular programming language (i.
  • codebase (code base) - A codebase, or code base, is the complete body of source code for a software program, component or system.
  • codec - A codec is a hardware- or software-based process that compresses and decompresses large amounts of data.
  • coded orthogonal frequency-division multiplexing (COFDM) - Coded orthogonal frequency-division multiplexing (COFDM) is a telecommunications modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.
  • coexistence testing - Coexistence testing, similar to compatibility testing, is a method of measuring the ability of multiple devices to interact in a single environment with limited bandwidth.
  • cognitive computing - Cognitive computing is the use of computerized models to simulate the human thought process in complex situations where the answers might be ambiguous and uncertain.
  • cognitive diversity - Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives because they think differently, have divergent perspectives and come from varied backgrounds.
  • cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
  • cognitive radio (CR) - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.
  • cognitive search - Cognitive search represents a new generation of enterprise search that uses artificial intelligence (AI) technologies to improve users' search queries and extract relevant information from multiple diverse data sets.
  • cohort learning - Cohort learning is a learning strategy prioritizing coursework or lessons that groups of students complete together in an interactive fashion.
  • cold backup (offline backup) - A cold backup is a backup of an offline database.
  • cold calling - Cold calling is the business practice of contacting a potential customer or client who has not expressed previous interest in speaking with a customer service representative or making a purchase.
  • cold storage - Cold storage is a computer system or mode of operation designed for the retention of inactive data.
  • collaboration diagram - A collaboration diagram, also known as a communication diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
  • collision in networking - In a half-duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data at the same time.
  • colocation (colo) - A colocation facility (colo) is a data center or telecommunications facility in which a business can rent space for servers, storage devices, and other computing and networking hardware.
  • columnar database - A columnar database (column-oriented) is a database management system (DBMS) that stores data on disk in columns instead of rows.
  • com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
  • command-and-control server (C&C server) - A command-and-control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware.
  • command-line interface (CLI) - A command-line interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with the computer.
  • committed information rate (CIR) - Committed information rate (CIR) is the guaranteed rate at which a Frame Relay network will transfer information under normal line conditions.
  • commodity hardware - Commodity hardware in computing is computers or components that are readily available, inexpensive and easily interchangeable with other commodity hardware.
  • Common Access Card (CAC) - A Common Access Card (CAC) is a smart card issued by the Unites States Department of Defense for accessing DOD systems and facilities.
  • Common Body of Knowledge (CBK) - In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices.
  • Common Information Model (CIM) - The Common Information Model (CIM) is a computer industry standard that defines device and application characteristics so system administrators and management programs can control devices and applications from different manufacturers.
  • Common Internet File System (CIFS) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Common Service Center (CSC) - Common Service Center (CSC) is an initiative by the government of India to establish locations with computers that are freely available for citizens to use.
  • Common Vulnerability Scoring System (CVSS) - The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity and characteristics of security vulnerabilities in information systems.
  • Common Weakness Enumeration (CWE) - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • communication plan - A communication plan is a policy-driven approach to providing company stakeholders with certain information.
  • communication service provider (CSP) - Communication service provider (CSP) is the broad title for a variety of service providers in broadcast and two-way communications services.
  • Communications as a Service (CaaS) - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
  • communications intelligence (COMINT) - Communications intelligence (COMINT) is information gathered from the communications between individuals or groups of individuals, including telephone conversations, text messages, email conversations, radio calls and online interactions.
  • communications platform as a service (CPaaS) - Communications platform as a service (CPaaS) is a cloud-based delivery model that allows organizations to add real-time communication capabilities, such as voice, video and messaging, to business applications by deploying application program interfaces (APIs).
  • communications security (COMSEC) - Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic or to any written information that is transmitted or transferred.
  • compact disc (CD) - A compact disc is a portable storage medium that can record, store and play back audio, video and other data in digital form.
  • compact fluorescent light bulb (CFL) - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • compatibility - In the world of IT, compatibility refers to the ability of software and hardware from different sources to work together without having to be altered to do so.
  • compatibility test - A compatibility test is an assessment used to ensure a software application is properly working across different browsers, databases, operating systems (OS), mobile devices, networks and hardware.
  • compensating control (alternative control) - A compensating control, also called an alternative control, is a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
  • compensation management - Compensation management is the discipline and process for determining employees' appropriate pay and benefits.
  • competency framework - A competency framework is a structure that defines a set of competencies, or skills, for each role in an organization.
  • competitive advantage - Competitive advantage is the favorable position an organization seeks to be more profitable than its rivals.
  • competitive differentiation - Competitive differentiation is a strategic positioning tactic an organization can undertake to set its products, services and brands apart from those of its competitors.
  • complex event processing (CEP) - Complex event processing (CEP) is the use of technology to predict high-level events.
  • compliance - Compliance is the state of being in accordance with established guidelines or specifications, or the process of becoming so.
  • compliance as a service (CaaS) - Compliance as a service (CaaS) is a cloud service that specifies how a managed service provider (MSP) helps an organization meet its regulatory compliance mandates.
  • compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
  • compliance officer - Compliance officers are employees tasked with ensuring a company follows its internal rules and best-practice policies while always complying with applicable external laws and government regulations.
  • component - In programming and engineering disciplines, a component is an identifiable part of a larger program or construction.
  • componentization (component-based development) - Componentization is an approach to software development that involves breaking software down into identifiable and reusable pieces that application developers can independently build and deploy.
  • composable infrastructure - Composable infrastructure is a framework that decouples device resources in order to treat them as services.
  • CompTIA A+ practice test questions and answers - CompTIA's A+ is the most popular of all IT certification programs.
  • CompTIA ITF+ practice test questions and answers - CompTIA's IT Fundamentals+ certification demonstrates general knowledge of computer components, operating systems and networks.
  • CompTIA Network+ - The CompTIA Network+ is an IT certification exam that confirms an individual possesses the skills in networking required to develop a career in IT infrastructure.
  • CompTIA Project+ - CompTIA Project+ is the Computing Technology Industry Association's certification program designed to demonstrate a person has a validated understanding of and skills in project management.
  • CompTIA Security+ - CompTIA Security+ is a certification that demonstrates a person's competency with core security practices and functions that are carried out in IT security roles.
  • computational creativity (artificial creativity) - Computational creativity (artificial creativity), is the application of computer technologies to emulate, study, stimulate and enhance human creativity.
  • computational storage - Computational storage is an IT architecture in which data is processed at the storage device level to reduce the amount of data that must move between the storage plane and the compute plane.
  • computer - A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.
  • computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer cracker - A computer cracker is an outdated term used to describe someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
  • Computer Emergency Response Team (CERT) - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • computer forensics (cyber forensics) - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • Computer Fraud and Abuse Act (CFAA) - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that imposes criminal penalties on individuals who intentionally access a protected computer without proper authorization or whose access exceeds their authorization.
  • computer hardware - Computer hardware is a collective term used to describe any of the physical components of an analog or digital computer.
  • computer instruction - A computer instruction is an order given to a computer processor by a computer program.
  • computer network - A computer network is a group of interconnected nodes or computing devices that exchange data and resources with each other.
  • computer room air conditioning (CRAC) unit - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a data center, network or server room.
  • computer room air handler (CRAH) - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • computer security incident response team (CSIRT) - A computer security incident response team, or CSIRT, is a group of IT professionals that provides an organization with services and support surrounding the assessment, management and prevention of cybersecurity-related emergencies, as well as coordination of incident response efforts.
  • computer worm - A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  • computer-generated imagery (CGI) - Computer-generated imagery (CGI) is the creation of still or animated visual content using imaging software.
  • computerized physician order entry (CPOE) - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • Concurrent Versions System (CVS) - CVS also is an abbreviation for Computer Vision Syndrome.
  • conduct risk - Conduct risk refers to the potential for a company's actions or behavior to harm its customers, stakeholders or broader market integrity.
  • conductance - Conductance is an expression of the ease with which electric current flows through materials like metals and nonmetals.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • confidential computing - Confidential computing is a concept in which encrypted data can be processed in memory to limit access to protect data in use.
  • CONFIG.SYS - CONFIG.SYS is a text file containing disk operating system (DOS) commands that tell the operating system (OS) how the computer is initially set up.
  • configuration - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • configuration management database (CMDB) - A configuration management database (CMDB) is a file -- usually in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships among those components.
  • configuration service provider (CSP) - A configuration service provider (CSP) is a component of Windows client operating systems that shows IT professionals device configuration choices and allows them to apply the settings across multiple Windows OSes.