Commonwealth of Virginia Information Technology Resource Management Glossary (COV ITRM Glossary) Version 1.0, January 15, 2010 Virginia Information Technologies Agency COV ITRM Glossary January 15, 2010 v 1.0 ii COV ITRM Glossary January 15, 2010 v 1.0 Table of Contents COV ITRM Glossary Updating..................................................................................................... iv Introduction..................................................................................................................................... 1 Non-alpha........................................................................................................................................ 2 A...................................................................................................................................................... 3 B.................................................................................................................................................... 10 C.................................................................................................................................................... 15 D.................................................................................................................................................... 25 E.................................................................................................................................................... 30 F .................................................................................................................................................... 35 G.................................................................................................................................................... 39 H.................................................................................................................................................... 41 I ..................................................................................................................................................... 44 J..................................................................................................................................................... 53 K.................................................................................................................................................... 54 L.................................................................................................................................................... 55 M................................................................................................................................................... 58 N.................................................................................................................................................... 62 O.................................................................................................................................................... 64 P .................................................................................................................................................... 67 Q.................................................................................................................................................... 77 R.................................................................................................................................................... 78 S .................................................................................................................................................... 83 T.................................................................................................................................................... 93 U.................................................................................................................................................... 97 V.................................................................................................................................................... 99 W................................................................................................................................................. 102 X.................................................................................................................................................. 105 Y.................................................................................................................................................. 106 Z.................................................................................................................................................. 107 iii COV ITRM Glossary January 15, 2010 v 1.0 COV ITRM Glossary Updating Publication Version Control Questions related to this publication should be directed to the Director of the VITA Policy, Practice, and Architecture (PPA) Division. PPA will issue a change notice for new versions of this document, post releases on the VITA Web site, and provide an email announcement to the Agency Information Technology Resources (AITRs) at all state agencies and institutions of higher education and to other interested parties. Document Version History Enterprise Information Architecture Report: Version History Version Date Description 1.0 1-15-2010 COV ITRM Enterprise Architecture, Security and Technology Management document glossaries where combined and updated to create the initial version of this document iv COV ITRM Glossary January 15, 2010 v 1.0 Introduction This glossary supports the content of COV ITRM documents. The intent is to replace individual glossaries in existing COV ITRM documents with a single comprehensive ITRM glossary that shall be referenced by those documents. Much of the information within this document was liberally borrowed from a number of highly recommended Internet sources including: • FOLDOC, the Free On-line Dictionary of Computing at http://foldoc.doc.ic.ac.uk/foldoc/ • The Internet Engineering Taskforce at http://www.ietf.org/home.html • Loosely Coupled Glossary at http://looselycoupled.com/glossary/azindex.html • Matisse Enzer’s Internet Terms Glossary at http://www.matisse.net/files/glossary.html • Network Computing, CMP Media LLC at http://www.networkcomputing.com/ • North Carolina Statewide Technical Architecture Lexicon at Whatis.com at http://whatis.techtarget.com • The Open Group at http://www.opengroup.org/ • O’Reilly’s at http://www.oreilly.com/reference/dictionary/tsearch.cgi • Wikipedia, the free encyclopedia at http://en.wikipedia.org/wiki/Main_Page • http://www.ncsta.gov/docs/Lexicon/Lexicon%20-%20Terms%20and%20Phrases.pdf • The World Wide Web Consortium at http://www.w3.org/ Context: Several glossary entries have more than one meaning. “Authorization” means something from a Security perspective that is very different from what it means from a Project Management/Technology Management perspective. This document identifies the context of the entry when there are different meanings depending on ITRM perspective. The different ITRM perspectives are documented as follows: “Context: ITRM perspective).” Example: Authorization Context: Security). The process of granting access to data or information system by designated authority after proper identification and authentication. Context: Technology Management). The power granted by management to specified individuals allowing them to approve transactions, procedures, or total systems. Page 1 of 111 COV ITRM Glossary January 15, 2010 v 1.0 Non-alpha 10GigE 10 Gigabit Ethernet Service 3GPP LTE (Long Term Evolution) The name given to a project within the Third Generation Partnership Project to improve the UMTS mobile phone standard to cope with future technology evolutions. Goals include improving spectral efficiency, lowering costs, improving services, making use of new spectrum and reframed spectrum opportunities, and improving integration with other open standards. The LTE project is not a standard, but it will result in the new evolved Release 8 of the 3GPP specifications, including mostly or wholly extensions and modifications of the UMTS system. The architecture that will result from this work is called EPS (Evolved Packet System) and comprises E-UTRAN (Evolved UTRAN) on the access side and EPC (Evolved Packet Core) on the core side. 8-, 16-, 32-, and 64-Bit Architectures A CPU is designed to carry out instructions on data that is in memory. The way it does this is significantly different for 8 bit and 64 bit architectures. The greater the number of bits, the more options there are that must be considered for how instructions are handled. Options include the complexity of the instruction set, the width of the data path, the number of registers, and the number of instructions that may execute per clock cycle. A program written for a 64-bit architecture may not be as fast as one written for a 32-bit architecture, but it may provide other advantages. 802.11a card Wireless interface that provides up to 54 Mbps service using an Orthogonal Frequency Division Multiplexing (OFDM) modulation technique for signal transmission in the 5.5 GHz spectrum. 802.11b card Wireless interface that provides up to 11 Mbps service using Frequency Hopping Spread Spectrum (FHSS) modulation technique for signal transmission in the 2.4 GHz spectrum; also called Wi-Fi. Interference from cordless phones and microwave ovens may be a problem. 802.11g card Wireless interface that provides up to 54 Mbps service using an Orthogonal Frequency Division Multiplexing (OFDM) modulation technique
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages111 Page
-
File Size-