Browse Definitions by Alphabet
CTR - WHA
- Ctrl-Alt-Delete - On a personal computer with the Microsoft Windows operating system, Control+Alt+Delete is the combination of the Ctrl key, the Alt key, and Del key that a user can press at the same time to terminate an application task or to reboot the operating system.
- cubic meter (meter cubed) - The cubic meter is the unit of volume in the International System of Units.
- cultural fit - Cultural fit is the likelihood that a job candidate will be able to conform and adapt to the core values and collective behaviors that make up an organization.
- culture of failure (blameless culture) - A culture of failure is a set of shared values, goals and practices that encourages learning through experimentation.
- cumulative trauma disorder (CTD) - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
- curation - Curation is a field of endeavor involved with assembling, managing and presenting some type of collection.
- curiosity artificial intelligence (curiosity AI) - Curiosity artificial intelligence (curiosity AI) is the simulation of human curiosity in artificial intelligence.
- currency - Currency is anything that is generally accepted to have value as a medium of exchange so that it can be traded for goods and services.
- current - Current is a flow of electrical charge carriers, usually electrons or electron-deficient atoms.
- Current Procedural Terminology (CPT) code - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
- cursor - A cursor is the position indicator on a computer display screen where a user can enter text.
- custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
- customer account record - A customer account record is the basic unit of information about a customer that resides in a CRM, or customer relationship management system.
- customer acquisition cost - Customer acquisition cost is the fee associated with convincing a consumer to buy your product or service, including research, marketing and advertising costs.
- customer analytics (customer data analytics) - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and behavior to identify, attract and retain the most profitable customers.
- customer base - Customer base is the group of clients to whom a business markets and sells their goods or services.
- customer churn (customer attrition) - Customer churn, also called customer attrition, is the number of paying customers who fail to become repeat customers.
- customer data integration (CDI) - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
- customer data management (CDM) - Customer data management (CDM) is the centralization of customer information, such as customer experiences, demographics and feedback, into a single database.
- customer data platform (CDP) - A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that can be collected, viewed or accessed by other systems.
- customer demographics - Customer demographics are categories of consumer populations that are relevant to a business' purposes, such as marketing and product design.
- customer effort score (CES) - Customer effort score (CES) is a system for evaluating how much effort is required on the part of a customer to achieve satisfaction in their experience with a company.
- customer engagement - Customer engagement is the way a company creates a relationship with its customer base to foster brand loyalty and awareness.
- customer experience (CX) - Customer experience (CX) is the sum total of customers' perceptions and feelings resulting from interactions with a brand's products and services.
- customer health score - A customer health score is a value that indicates the long-term prospect for a customer to drop off or, conversely, to become a high-value, repeat customer through renewal or Cross-selling or up-selling strategies.
- customer intelligence (CI) - Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources to gain insights about customer needs, motivations and behaviors.
- customer journey map - A customer journey map is a visual representation of the stages a customer goes through when interacting with a company.
- customer journey orchestration - Customer journey orchestration is the coordination of customer experiences in real time, in an omnichannel environment, to better understand customer needs and encourage further interaction with a brand.
- customer lifecycle - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
- customer premises equipment (CPE) - Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.
- customer profiling - Customer profiling is the practice of organizing customers into specific groups possessing similar goals or characteristics.
- customer proprietary network information (CPNI) - Customer proprietary network information (CPNI) in the United States is information that telecommunications services -- such as local, long-distance and wireless telephone companies -- acquire about their subscribers.
- customer retention - Customer retention is a metric that measures customer loyalty, or the ability for an organization to keep its customers over time.
- customer satisfaction (CSAT) - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets customer expectations.
- customer segmentation - Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests and spending habits.
- customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
- customer service and support - Customer service is the support that organizations offer to customers before and after purchasing a product or service.
- customer service charter - A customer service charter is a document that outlines how an organization promises to work with its customers along with providing insights into how an organization operates.
- customer success - Customer success is a strategy to ensure a company's products are meeting the needs of the customer.
- customer touch point - A customer touch point is any direct or indirect contact a customer has with a brand.
- customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, apps and perhaps internet capability to encourage the customer to control access to information and ordering.
- cutting edge - Cutting edge is an adjective used to describe the newest, most advanced version of a product or service.
- CVO (Chief Visionary Officer) - The Chief Visionary Officer (CVO) is a newer title where the holder is expected to have a broad and comprehensive knowledge of all matters related to the business of the organization, as well as the vision required to steer its course into the future.
- cyber attack - A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage.
- cyber attribution - Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit.
- cyber espionage - Cyber espionage (cyberespionage) is a type of cyber attack that malicious hackers carry out against a business or government entity.
- cyber hijacking - Cyber hijacking, or computer hijacking, is a type of network security attack in which the attacker takes control of computer systems, software programs and/or network communications.
- cyber resilience - Cyber resilience is a concept that refers to the security that goes beyond defense and prevention to focus on response and resilience in moments of crisis.
- cyberbullying - Cyberbullying is a type of bullying in which one or more individuals use digital technologies to intentionally and repeatedly cause harm to another person.
- cybercrime - Cybercrime is any criminal activity that involves a computer, networked device or a network.
- cyberextortion - Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
- cyberpicketing - Cyberpicketing is the use of the Internet to protest a corporation or other institution's wages, work conditions, products, environmental policy, or other issues.
- cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
- Cybersecurity and Infrastructure Security Agency (CISA) - Cybersecurity and Infrastructure Security Agency (CISA) is the division of the Department of Homeland Security (DHS) that is tasked with defending the infrastructure of the internet and improving its resilience and security.
- Cybersecurity Information Sharing Act (CISA) - Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.
- cyberstalking - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
- cyberterrorism - Cyberterrorism is often defined as any premeditated, politically motivated attack against information systems, programs and data that threatens violence or results in violence.
- cyberwarfare - The generally accepted definition of cyberwarfare is a series of cyber attacks against a nation-state, causing it significant harm.
- cycle counting - Cycle counting is an inventory-control method that lets businesses conduct a regular count of several items in different areas in a warehouse, without constantly adding up the entire inventory.
- Cygwin - Cygwin is a collection of open source tools that allows Unix or Linux applications to be compiled and run on a Microsoft Windows operating system (OS) from within a Linux-like interface.
- CYOD (choose your own device) - CYOD (choose your own device) is an alternative model to BYOD (bring your own device) that involves allowing employees to select the device they want from among a limited number of options.
- IT consultant - A consultant is an experienced individual in a given field who provides expert advice for a fee.
- OpenStack Block Storage (Cinder) - OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data storage to cloud computing applications.
- What are containers (container-based virtualization or containerization)? - Containers are a type of software that can virtually package and isolate applications for deployment.
- What is a cloud database? An in-depth cloud DBMS guide - A cloud database is an organized and managed collection of data in an IT system that resides on a public, private or hybrid cloud computing platform.
- What is cloud backup and how does it work? - Cloud backup, also known as online backup or remote backup, is a strategy for sending a copy of a physical or virtual file or database to a secondary, off-site location for preservation in case of equipment failure, site catastrophe or human malfeasance.
- What is cloud management? Everything you need to know - Cloud management refers to the exercise of control over public, private or hybrid cloud infrastructure resources and services.
- What is cloud migration? An introduction to moving to the cloud - Cloud migration is the process of moving data, applications or other business elements to a cloud computing environment.
- What is configuration management? A comprehensive guide - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
- What is container management and why is it important? - Container management refers to a set of practices that govern and maintain containerization software.
- What is customer experience management (CEM or CXM)? - Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.
- What is cyber hygiene and why is it important? - Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the health and security of users, devices, networks and data.
- What is cybersecurity insurance (cybersecurity liability insurance)? - Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to help reduce the financial risks associated with doing business online.
- What is cybersecurity? - Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.
- What is the CIA triad (confidentiality, integrity and availability)? - Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.