IT Dictionary.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

IT Dictionary.Pdf مقدمة اإذا كان التغيري يقا�س بال�ضنوات، فاإن ال�ضنوات اخلم�س املا�ضية تعادل ًعقودا من الزمن من منظور التطور الهائل يف تقنية املعلومات والت�ضال و التي غريت ًكثريا من الو�ضائل ومفاهيم وطرق الت�ضال بني الأفراد. وبعد اأن اأ�ضبحت التقنية ًجزءا ًمهما يف حياتنا وبعد اأن غدا احلا�ضوب الأداة التي ل ميكن ال�ضتغناء عنها يف ت�ضيري خمتلف جمالت احلياة ، ظهرت العديد من امل�ضطلحات العلمية والتقنية واأ�ضبح تداولها �ض ًائعا، فكان لبد من و�ضع معانيها بطريقة علمية �ضليمة، متكن من الو�ضول اإليها بي�ضر و�ضهولة. لقد كانت بداية الألفية الثالثة ًمنعطفا ًحقيقيا يف تاريخ الب�ضرية، فقد جاءت بالتحولت الكربى ًاجتماعيا وثقافيا و�ضيا�ضيا واقت�ض ًاديا ًوتربويا متزامنة مع موجة العوملة بفعل املد العنيف لتقنية املعلومات والت�ضال التي اأ�ضبح العامل العربي يف خ�ضمها ، وملا كانت هذه التطورات قد اأخذت بعد ذلك ت�ضطبغ بال�ضبغة الدولية كان لبد من احلفاظ على لغة الأعمال والتقنيات العربية وتطويرها واغنائها، ولكي تكون املواكبة فعالة وموؤثرة كان علينا التو�ضع اأكرث يف تعريب الألفاظ. نحن نفخر بان لغتنا العربية هي لغة ثرية ونوؤمن ب�ضرورة اإتقان لغة الآخرين، ومن هنا فقد حفزنا اإح�ضا�ضنا بوجود حاجة ما�ضة ملثل هذا املعجم التقني على رفوف مكتباتنا التي تعاين ندرة يف جمال تقنية املعلومات و الت�ضالت. ولقد حر�ضنا اأن يكون املعجم ًمرجعا تتحقق من خﻻله اأهداف جوهرية اأهمها ال�ضمولية يف تلبية حاجات املتخ�ض�ضني يف نظم املعلومات والت�ضالت وطلبة اجلامعات والكليات ومعاهد التدريب، ثم ال�ضهولة التي متكن من خﻻلها اإي�ضال املعاين الدقيقة اإىل املهتمني ب�ضورة وا�ضحة واأي�ضا الكفاية على نحو ميكن معه عر�س ال�ضروح ال�ضرورية وعدم القت�ضار على بيان املعنى املقابل فقط. ًختاما، نقدم اإ�ضدارنا الأول من هذا املعجم والأمل يحذونا مبتابعة اجلهد بتطويره واإثرائه مبا يخدم املهتمني يف جمال علم احلا�ضوب وتقنية املعلومات و الت�ضالت، ونعتز باأن ي�ضاف اإىل اإ�ضداراتنا الأخرى من املعاجم العلمية واملهنية وهي معجم اأبوغزاله للملكية الفكرية ومعجم اأبوغزاله للمحا�ضبة والأعمال ومعجم اأبوغزاله املحا�ضبي ومعجم اأبوغزاله القانوين. طﻻل اأبوغزاله Talal Abu-Ghazaleh ICT Dictionary ä’É°üJ’Gh äÉeƒ∏©ŸG á«æ≤àd ¬dGõZ ƒHCG ∫ÓW ºé©e Introduction Information and Communication Technology (ICT) is one of the fastest growing fields in the world today. Each day brings us new ICT discoveries that connect the world together and make it even a smaller place for the human race to live. In an era where technology is manifest in every aspect of our lives, and where a multitude of technological and scientific terminologies has emerged and become part of our daily routine; the need for an alphabetically well-arranged and easily accessible reference for these terms becomes a priority. Moreover, there is a clear need to create momentum in our part of the world to quickly absorb and disseminate knowledge about these rapid advancements in technology. Issuing a specialized English-Arabic ICT dictionary that enhances our understanding and knowledge in this diversified realm is now a necessity. This dictionary serves various goals; one of which is meeting the needs of ICT specialists and students at universities, colleges and vocational institutions. It also provides necessary explanations for various terms rather than merely the equivalent meaning or synonym. It is with great pleasure that we present: The Talal Abu-Ghazaleh ICT Dictionary to be another valuable addition to Talal Abu-Ghazaleh Organization’s professional and scientific publications which include Abu- Ghazaleh Intellectual Property Dictionary, Abu-Ghazaleh Accountancy and Business Dictionary, Abu-Ghazaleh Dictionary of Accountancy and Abu- Ghazaleh Legal Dictionary. This is just the beginning; we will continue to exert our efforts to develop and enrich this dictionary in order to serve those interested in the fields of computer science, information technology and telecommunications. Talal Abu-Ghazaleh Talal Abu-Ghazaleh ICT Dictionary ä’É°üJ’Gh äÉeƒ∏©ŸG á«æ≤àd ¬dGõZ ƒHCG ∫ÓW ºé©e A# (A sharp) L}}8{{9{{) {{א†D{{א0א}}4 }}SZaS AXIOM • א$ZH7+!„(hאJ I3 A.L.I.C.E {{EKzW 3{{ {{א1}}}D }}S:W H}}+I}}L• }}} B !"}}}LM h}}}3n}}}+א}}}D"}}}u Pא{{{^ Gא{{{) Asterisk) a) "*" (AIML) *a}8}C K0}S:} •}B• }! Žא+{אC1 ! { א!o{{א&m W}},+{{7אJ uh}}"I}}3,א!C{{ 0אא! {{ . * W Š,•0 [ }}U• DrK0{{9:@*{{{{א;€{{ •،*,*אFH{{ אJ I}}3 A/B Switch Box אC -}}4}} S}} U%L{{ -،א!o{{א&m C>k:}}Ea}}8}} {{ 9 [s a.א#8WTC K0}}9}C+ " V * ‚}‘}C3LM e}+א&O&#:`@k:E‚znk*:E،*, (B A) `+>@* * <H:Q †}& h}3e}+אF v:}"*K אI:#o!uh"OZ . 8^[א!+C& :><"E* F’< E‹ I}3*אAt Sign) K}E**@}E) "@" . <: *אF’KE E‚‹ U I3 uh"W @K0 BK 1S73 =!א!>. .aero A/E/C Systems Conferences {{{Rf:א@2S&{{{א!&{{{ K0*א/3{{{*א{{{W Wא${{{Rf:א{{{‚ 1S73 =1+ א}O7}3 J LC}Ue}+א†QA}S…S{)„ {{{) א!&{{{ K0*א/3{{{*א{{{W mW}}} C"T{{{ א$!+{{{ {{{W}}}+v: *אq&! {{{ *א$3f{{{ אLJ O,}}}{{{ *א אq Kא$d+"-C\hא) א1 א aiff (ِAudio Interchange File Format) A/UX. )uhV+1,&+ { א${“،V ”} L{א${m“V{7 א9+ א)}" 9+p C"{ א{)،D{ 9+{ א)B9א;+D & a88 CL"* 8 ("*@ K א{{{)"{{{}}}huh S{{{ א{{{)א' }}}D Jא}}}3 g A1 (Address 1 Code) א(hW FH@*Kא)א†S*…L א;`:Y U:9 A1 K:9 S„B9uh .•א$…arc 7H. A-3 א+P 9+T}uh}{ א;U0{9א${_<{LH ˆ}S {:a}8}M\}O{א+{א1"• A-2 }OZ }8: ARC , .arj 19553 A3D {{א+{{P 9+T}}uh}}{{ א;U0{{9א${{_<{{S{{ˆ " •"1 8: Aureal -–C—\ אC"6”א){uh}}"*Robert Jung ARJ. a}[o[ [z" {{א${{)9א{{1W , א;! `˜ o U < U א!:tא: ! אqK. .art A4C (Authentication, Authorization, (Accounting, Auditing and Charging א+9+WP 0D AOL 0D*@S א${_<@* אpB}א9 Š{™ C3}:אE{!H }א:אLאŠ BW:0א)‰0. .asc A56 DSP56001 DSP56000 }2T›&O8 u"{0*( * א$!{ Ž {א+{P T}uh}א9+${{ א$L{*{ +:{›א 3{{ •U 0אא:\& א;: L C א$!+ .(ASCII) .asp AAC (Adaptive audio Coding) <: {{{{_9+v{{ א{{)א:\& {{،}}Ha}}1!A&&}}DK א+P B9DTuh א' uאŒ!9 H=9"DMP3 K א$! avi .K. @S@Eאˆ9+ א9 \*، A n!#A3*:L. A & B H8:אU†G [7\0K0 a. F"72!,uh oא- T1 AADL 2 Absolute Link AADL (Axiomatic Architecture Description ABCL/C+ L+FH S א!&KLanguage) Ce+ V&}}"}}a}}8 Abeline$א9}}D }}:(}}}}€ g}}E0F2א/3{{ LCU א;אG א$!& 0 !Kא$! Yq*אFHא$…2SL7H uא{W - (S Abend (Abnormal End)*Y$א:\ \א†S*…L AAL ! C> 5 FS (ABI (Application Binary Interface 0אATM Adaption LayerTH *אFHאC1 pא4 . a8*WC K0*אP(}"}FHאאFH{א{AAP (Association of American Publishers) 6 "S:<T C1"• }2S*a uא{W -،@*אאFH{א{&Oa}8 <}T}"6}!T}#*,(}(h} Fm {א]{ .p*8{7{{ "C1 O*p}}&{{:אd}}+"*@n}}Oא{{T}}"6{{>א;H{{אGא$SL{{ א U: א;: L > AAP DTD .<!p C1 :!"• ABIOS (Advanced Basic Input/output !&n9 0F• א] .pא!+& aard System) }}2S uא†`{{ Lא†`{{:אœא;3 a}}3אK}}E*W0}}1$¡ {{‘{{‚ @אB9K„א^א:S:,uh"K C++ • אSZ •א;3 Wa3 -אJ AARP (Apple Address Resolution Protocol) I3 e}}+-}}&!+ Apple Talk }}"*Zs &}}+-}} @u }}2S Abiword ! ¢(SŽ g3;א&OGF !u qא)¢. אLCW )Local Talk "*: AARP Probe Packets A-Bone LC}}Uא/{ { £א3j{{ ‚א;3 }}3 Wא{{LCWא;3 }}3 " A}}S…S† uh}"},א{{ W}*}:!$ Apple Talk kW}א.a א| vא/ £א3j{ ‚א{^‚ {)-א${FH7\: I}H*=:}U,<h ›,אhU‚@-C\uhLCW„ אC+{אא3j{ *@3{…א {: @*@ T1e}+{*אJ AAS (Auto Area Segmentation) }H †30 אC S Z:אp@ א&W * W&-@ {_ 0*א{v •.א$ Eא+ . W" \:אKGא:›אC): א$h , T@*0* *א( א$&# KB s#*א)0א6 FB7 * Gא„F3-א{:אKG , Abort א\Aא"n. AAUI k (ABR (Available Bit Rate 0אApple Attachment Unit InterfaceTH ! "pא;\0 uא4 . א$ 8*WsC K0A-B Box h}}`} ,LC}}}U v}}}€א†S{{{ אo{{{א{{{ ("}}}8}}}L 9 • s ‚}x‚*œ:}Q* EI * @F<+`}e}+*אE{@*{`- E r}}H"{{אא${{)0*אFq{{א${{)V&}}"*KK¤ {{ 8{{^[ *א<H:Q*E †& e+א†h3א*Ku v:}}& E*{"> א'@¡)„אLCWt:א1{ =א${ :}}> }!-LW}s }}F’< E‹ I}}3*אK}}E**@}}E<: {{*אF’K}}E{{ ›‚ . (Z p" !0א;\0 uא4 . אJ E . I3 Abandonware Absolute Address א!אאO: p+1$ h!"bM\ Abbrev Absolute Cell Reference :THא'+ א+h+TH:Wp+1$ S:,uh •@*0א=א!&- +& "!l`) 0 Abbreviation א†S*…L ) S*@XS-א) א: # . 0 (` Absolute Code ABC <: {{אOZ{{א:>W}}+1$ uh}}"}}O: }}{{אJ H{{; :* JO O:@3 3 א;5:אt "L{{{א!{{{ * +{{{אR}}}L}}}j }}} }}}& F2}}}3: ABC Algol . ALGOL60 8^ 9" Absolute Link 8{{א{{ F }+L }S W}א. *!{ o !:\C-א$uh א:אvאp+1$ Absolute Path 3 Accelerated Graphics Port Absolute Path Abstract Syntax ": :•a(Sg CP}D*W‚} 1!} } -} P}D*} 73Wp + 1 0 0 _&א$F -Wא\_eא;:E*{ - @FHKאJ I3*אOZ א$h . א;1C":a+D> ;א:9 73aF"*א$+P. Absolute Pointing Device Abstract Syntax Notation One א… א;* +… gא{)aא:m W‚} } ^}a}*} u @אKאUz אW+1$@א Uz"K F!\vC": א9 } a.א.&{ {T (1984 P אC S * :n`) 0א { T# ASN.1א$:Ufe+אW U. 1" Abstract Syntax Tree Epא1kאJ:{/{^אא}Fq ET}{אkא{W U@* K:m}}}}Uא…א {{{{gא:m 4RW}}}} C}}}}U-}}}} n Z}}}}+K:mW}}}}א• Eאkא ^KאJ {#{&א{W C}3e}+!KU -א4${ א*#{T א${{h ,אL{{4 {{ {{ אOZ{{א$L +{{*א|{{:0א א${{uh\+{{7א+E{{א: {{,אא* {{א!+ {{ א &{{E+ e{{ .
Recommended publications
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Technical and Legal Approaches to Unsolicited Electronic Mail†
    35 U.S.F. L. REV. 325 (2001) Technical and Legal Approaches to Unsolicited Electronic Mail† By DAVID E. SORKIN* “Spamming” is truly the scourge of the Information Age. This problem has become so widespread that it has begun to burden our information infrastructure. Entire new networks have had to be constructed to deal with it, when resources would be far better spent on educational or commercial needs. United States Senator Conrad Burns (R-MT)1 UNSOLICITED ELECTRONIC MAIL, also called “spam,”2 causes or contributes to a wide variety of problems for network administrators, † Copyright © 2000 David E. Sorkin. * Assistant Professor of Law, Center for Information Technology and Privacy Law, The John Marshall Law School; Visiting Scholar (1999–2000), Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University. The author is grateful for research support furnished by The John Marshall Law School and by sponsors of the Center for Education and Research in Information Assurance and Security. Paul Hoffman, Director of the Internet Mail Consortium, provided helpful comments on technical matters based upon an early draft of this Article. Additional information related to the subject of this Article is available at the author’s web site Spam Laws, at http://www.spamlaws.com/. 1. Spamming: Hearing Before the Subcomm. on Communications of the Senate Comm. on Commerce, Sci. & Transp., 105th Cong. 2 (1998) (prepared statement of Sen. Burns), available at 1998 WL 12761267 [hereinafter 1998 Senate Hearing]. 2. The term “spam” reportedly came to be used in connection with online activities following a mid-1980s episode in which a participant in a MUSH created and used a macro that repeatedly typed the word “SPAM,” interfering with others’ ability to participate.
    [Show full text]
  • Eszter Babarczy: Community Based Trust on the Internet
    PTE BTK Nyelvtudományi Doktori Iskola Kommunikáció Doktori Program Babarczy Eszter: Community Based Trust on the Internet Doktori értekezés Témavezető: Horányi Özséb egyetemi tanár 2011. 1 Community-based trust on the internet Tartalom Introduction .................................................................................................................................................. 3 II. A very brief history of the internet ........................................................................................................... 9 Early Days ............................................................................................................................................... 11 Mainstream internet .............................................................................................................................. 12 The internet of social software .............................................................................................................. 15 III Early trust related problems and solutions ............................................................................................ 20 Trading .................................................................................................................................................... 20 Risks of and trust in content ....................................................................................................................... 22 UGC and its discontents: Wikipedia ......................................................................................................
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • Docworks PDF 600
    Minimax estimation in regression and random censorship models Citation for published version (APA): Belitser, E. N. (2000). Minimax estimation in regression and random censorship models. (CWI tracts; Vol. 127). Centrum voor Wiskunde en Informatica. Document status and date: Published: 01/01/2000 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal.
    [Show full text]
  • Internet... the Final Frontier. Eine Ethnographie. Schlußbericht Des Projekts 'Interaktionsraum Internet. Netzkultur Und Ne
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Research Papers in Economics econstor www.econstor.eu Der Open-Access-Publikationsserver der ZBW – Leibniz-Informationszentrum Wirtschaft The Open Access Publication Server of the ZBW – Leibniz Information Centre for Economics Helmers, Sabine; Hoffmann, Ute; Hofmann, Jeanette Working Paper Internet... the final frontier: Eine Ethnographie. Schlußbericht des Projekts Interaktionsraum Internet. Netzkultur und Netzwerkorganisation Schriftenreihe der Abteilung Organisation und Technikgenese des Forschungsschwerpunktes Technik-Arbeit-Umwelt am Wissenschaftszentrum Berlin für Sozialforschung, No. FS II 98-112 Provided in cooperation with: Wissenschaftszentrum Berlin für Sozialforschung (WZB) Suggested citation: Helmers, Sabine; Hoffmann, Ute; Hofmann, Jeanette (1998) : Internet... the final frontier: Eine Ethnographie. Schlußbericht des Projekts Interaktionsraum Internet. Netzkultur und Netzwerkorganisation, Schriftenreihe der Abteilung Organisation und Technikgenese des Forschungsschwerpunktes Technik-Arbeit- Umwelt am Wissenschaftszentrum Berlin für Sozialforschung, No. FS II 98-112, http:// hdl.handle.net/10419/49813 Nutzungsbedingungen: Terms of use: Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, The ZBW grants you, the user, the non-exclusive right to use räumlich unbeschränkte und zeitlich auf die Dauer des Schutzrechts the selected work free of charge, territorially unrestricted and beschränkte einfache Recht ein, das ausgewählte Werk im Rahmen within the time limit of the term of the property rights according der unter to the terms specified at → http://www.econstor.eu/dspace/Nutzungsbedingungen → http://www.econstor.eu/dspace/Nutzungsbedingungen nachzulesenden vollständigen Nutzungsbedingungen zu By the first use of the selected work the user agrees and vervielfältigen, mit denen die Nutzerin/der Nutzer sich durch die declares to comply with these terms of use.
    [Show full text]
  • Factors Involved in Estimating Cost of Email Spam
    Factors involved in estimating cost of Email spam Farida Ridzuan, Vidyasagar Potdar, Alex Talevski Anti Spam Research Lab, Digital Ecosystems and Business Intelligence Institute, Curtin University of Technology. [email protected], {v.potdar, a.talevski}@curtin.edu.au Abstract. This paper analyses existing research work to identify all possible factors involved in estimating cost of spam. Main motivation of this paper is to provide unbiased spam costs estimation. For that, we first study the email spam lifecycle and identify all possible stakeholders. We then categorise cost and study the impact on each stakeholder. This initial study will form the backbone of the real time spam cost calculating engine that we are developing for Australia. Keywords: spam cost, email spam, spam lifecycle 1 Introduction Spamming in email refers to sending unwanted, irrelevant, inappropriate and unsolicited email messages to a large number of recipients. Sending email is fast, convenient and cheap; making it as an important means of communication in business and personal. This is supported by the report from Radicati Group saying that there is a growth of email users from time to time [1]. Dependencies on email usage throughout the whole world provide a huge opportunity to the spammers for spamming. Spamming activities starts from spammers (who create and send spam), but its impacts goes far beyond them, involving Internet Service Provider (ISP), company, and users (spam email recipients) since they represent the key stakeholders. It is undeniable that each stakeholders involved in this activity has to bear some costs associated with spam. Throughout our study, there are a few papers discussing on the costs of email spam, but most of them focuses only on one stakeholder, which is the user.
    [Show full text]
  • Writing Cybersecurity Job Descriptions for the Greatest Impact
    Writing Cybersecurity Job Descriptions for the Greatest Impact Keith T. Hall U.S. Department of Homeland Security Welcome Writing Cybersecurity Job Descriptions for the Greatest Impact Disclaimers and Caveats • Content Not Officially Adopted. The content of this briefing is mine personally and does not reflect any position or policy of the United States Government (USG) or of the Department of Homeland Security. • Note on Terminology. Will use USG terminology in this brief (but generally translatable towards Private Sector equivalents) • Job Description Usage. For the purposes of this presentation only, the Job Description for the Position Description (PD) is used synonymously with the Job Opportunity Announcement (JOA). Although there are potential differences, it is not material to the concepts presented today. 3 Key Definitions and Concepts (1 of 2) • What do you want the person to do? • Major Duties and Responsibilities. “A statement of the important, regular, and recurring duties and responsibilities assigned to the position” SOURCE: https://www.opm.gov/policy-data- oversight/classification-qualifications/classifying-general-schedule-positions/classifierhandbook.pdf • Major vs. Minor Duties. “Major duties are those that represent the primary reason for the position's existence, and which govern the qualification requirements. Typically, they occupy most of the employee's time. Minor duties generally occupy a small portion of time, are not the primary purpose for which the position was established, and do not determine qualification requirements” SOURCE: https://www.opm.gov/policy-data- oversight/classification-qualifications/classifying-general-schedule-positions/positionclassificationintro.pdf • Tasks. “Activities an employee performs on a regular basis in order to carry out the functions of the job.” SOURCE: https://www.opm.gov/policy-data-oversight/assessment-and-selection/job-analysis/job_analysis_presentation.pdf 4 Key Definitions and Concepts (2 of 2) • What do you want to see on resumes that qualifies them to do this work? • Competency.
    [Show full text]
  • NIST SP 800-44 Version 2
    Special Publication 800-44 Version 2 Guidelines on Securing Public Web Servers Recommendations of the National Institute of Standards and Technology Miles Tracy Wayne Jansen Karen Scarfone Theodore Winograd NIST Special Publication 800-44 Guidelines on Securing Public Web Version 2 Servers Recommendations of the National Institute of Standards and Technology Miles Tracy, Wayne Jansen, Karen Scarfone, and Theodore Winograd C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 September 2007 U.S. Department of Commerce Carlos M. Gutierrez, Secretary National Institute of Standards and Technology James Turner, Acting Director GUIDELINES ON SECURING PUBLIC WEB SERVERS Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-44 Version 2 Natl. Inst. Stand. Technol. Spec. Publ. 800-44 Ver.
    [Show full text]
  • Comparative Programming Languages CM20253
    We have briefly covered many aspects of language design And there are many more factors we could talk about in making choices of language The End There are many languages out there, both general purpose and specialist And there are many more factors we could talk about in making choices of language The End There are many languages out there, both general purpose and specialist We have briefly covered many aspects of language design The End There are many languages out there, both general purpose and specialist We have briefly covered many aspects of language design And there are many more factors we could talk about in making choices of language Often a single project can use several languages, each suited to its part of the project And then the interopability of languages becomes important For example, can you easily join together code written in Java and C? The End Or languages And then the interopability of languages becomes important For example, can you easily join together code written in Java and C? The End Or languages Often a single project can use several languages, each suited to its part of the project For example, can you easily join together code written in Java and C? The End Or languages Often a single project can use several languages, each suited to its part of the project And then the interopability of languages becomes important The End Or languages Often a single project can use several languages, each suited to its part of the project And then the interopability of languages becomes important For example, can you easily
    [Show full text]
  • Jargon File, Version 4.0.0, 24 Jul 1996
    JARGON FILE, VERSION 4.0.0, 24 JUL 1996 This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor. This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached. Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.0.0" or "The on-line hacker Jargon File, version 4.0.0, 24 JUL 1996".) The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include: Eric Raymond [email protected] Although there is no requirement that you do so, it is considered good form to check with an editor before quoting the File in a published work or commercial product. We may have additional information that would be helpful to you and can assist you in framing your quote to reflect not only the letter of the File but its spirit as well.
    [Show full text]
  • How Do Spammers Harvest Email Addresses ?
    11/26/12 How do spammers harv est email addresses ? How do spammers harvest email addresses ? By Uri Raz There are many ways in which spammers can get your email address. The ones I know of are : 1. From posts to UseNet with your email address. Spammers regularily scan UseNet for email address, using ready made programs designed to do so. Some programs just look at articles headers which contain email address (From:, Reply-To:, etc), while other programs check the articles' bodies, starting with programs that look at signatures, through programs that take everything that contain a '@' character and attempt to demunge munged email addresses. There have been reports of spammers demunging email addresses on occasions, ranging from demunging a single address for purposes of revenge spamming to automatic methods that try to unmunge email addresses that were munged in some common ways, e.g. remove such strings as 'nospam' from email addresses. As people who where spammed frequently report that spam frequency to their mailbox dropped sharply after a period in which they did not post to UseNet, as well as evidence to spammers' chase after 'fresh' and 'live' addresses, this technique seems to be the primary source of email addresses for spammers. 2. From mailing lists. Spammers regularily attempt to get the lists of subscribers to mailing lists [some mail servers will give those upon request],knowing that the email addresses are unmunged and that only a few of the addresses are invalid. When mail servers are configured to refuse such requests, another trick might be used - spammers might send an email to the mailing list with the headers Return- Receipt-To: <email address> or X-Confirm-Reading-To: <email address>.
    [Show full text]