0%

24-letter words containing a, c, i, t, y

  • money-market certificate — a certificate of deposit held for a specified term earning a fixed interest rate keyed to the interest rate of U.S. Treasury bills.
  • motorway service station — an establishment off a motorway where drivers can refuel their vehicles, buy food, drink, etc
  • mutual insurance company — an insurance company owned by the policyholders and not by shareholders
  • narcissistic personality — a personality disorder characterized by extreme self-centeredness and self-absorption, fantasies involving unrealistic goals, an excessive need for attention and admiration, and disturbed interpersonal relationships.
  • neutrosophic probability — (logic)   An extended form of probability based on Neutrosophy, in which a statement is held to be t true, i indeterminate, and f false, where t, i, f are real values from the ranges T, I, F, with no restriction on T, I, F or the sum n=t+i+f.
  • object-oriented analysis — (programming)   (OOA) The first phase of object-oriented design.
  • open system architecture — (operating system)   (OSA) A competitor to IBM's SNA.
  • permeability coefficient — the volume of an incompressible fluid that will flow in unit time through a unit cube of a porous substance across which a unit pressure difference is maintained
  • physiological atmosphere — ecosphere.
  • polychlorinated biphenyl — PCB.
  • polymer matrix composite — A polymer matrix composite is a material consisting of a composite made stronger by adding fibers or particles to it.
  • private-key cryptography — (cryptography)   As opposed to public-key cryptography, a cryptographic method in which the same key is used to encrypt and decrypt the message. Private-key algorithms include the obsolescent Data Encryption Standard (DES), triple-DES (3DES), the Advanced Encryption Standard (AES), also known as Rijndael, Blowfish, Twofish RC2, RC4, RC5 and RC6. A problem with private-key cryptography is that the sender and the recipient of the message must agree on a common key via some alternative secure channel.
  • psychopathic personality — an antisocial personality characterized by the failure to develop any sense of moral responsibility and the capability of performing violent or antisocial acts
  • pyrotraumatic dermatitis — hot spot.
  • quick-assembly furniture — furniture such as shelves and cupboards which you buy as a number of separate pieces and assemble yourself
  • referential transparency — (programming)   An expression E is referentially transparent if any subexpression and its value (the result of evaluating it) can be interchanged without changing the value of E. This is not the case if the value of an expression depends on global state which can change value. The most common example of changing global state is assignment to a global variable. For example, if y is a global variable in: f(x) { return x+y; } g(z) { a = f(1); y = y + z; return a + f(1); } function g has the "side-effect" that it alters the value of y. Since f's result depends on y, the two calls to f(1) will return different results even though the argument is the same. Thus f is not referentially transparent. Changing the order of evaluation of the statements in g will change its result. We could make f above referentially transparent by passing in y as an argument: f(x, y) = x+y Similarly, g would need to take y as an argument and return its new value as part of the result: g(z, y) { a = f(1, y); y' = y+z; return (a + f(1, y'), y'); } Referentially transparent programs are more amenable to formal methods and easier to reason about because the meaning of an expression depends only on the meaning of its subexpressions and not on the order of evaluation or side-effects of other expressions. We can stretch the concept of referential transparency to include input and output if we consider the whole program to be a function from its input to its output. The program as a whole is referentially transparent because it will always produce the same output when given the same input. This is stretching the concept because the program's input may include what the user types, the content of certain files or even the time of day. If we do not consider global state like the contents of files as input, then writing to a file and reading what was written behaves just like assignment to a global variable. However, if we must consider the state of the universe as an input rather than global state then any deterministic system would be referentially transparent! See also extensional equality, observational equivalence.
  • representative democracy — a person or thing that represents another or others.
  • responsibility allowance — payment made to somebody who has special responsibilities
  • ricardian theory of rent — economic rent.
  • rocky mountain whitefish — mountain whitefish.
  • scottish country dancing — a type of Scottish folk dancing, including reels, jigs, and strathspeys, in which couples are arranged in sets and perform a series of movements, esp facing one another in a line
  • sequentially compact set — a set in which every sequence has a subsequence that converges to a point of the set.
  • shadow foreign secretary — the member of the main opposition party in Parliament who would hold the office of Foreign Secretary if their party were in power
  • socialist workers' party — one of the biggest extreme left wing parties in Britain
  • supportive psychotherapy — a type of psychotherapy that seeks to reduce psychological conflict and strengthen a patient's defenses through the use of various techniques, as reassurance, suggestion, counseling, and reeducation.
  • telephony user interface — (communications)   (TUI) Either a software interface to telephony (e.g. a phone-capable PC) or a DTMF-based interface to software (e.g. voicemail).
  • to play your cards right — If you say that someone will achieve success if they play their cards right, you mean that they will achieve success if they act skilfully and use the advantages that they have.
  • tricarboxylic acid cycle — Krebs cycle.
  • tricyclic antidepressant — pertaining to or embodying three cycles.
  • virtual software factory — (programming, tool)   (VSF) A product from Systematica which allows users to develop CASE tools appropriate to any software engineering methodology.
  • visual component library — (programming)   VCL A application framework library for Microsoft Windows and Borland Software Corp.'s Delphi and C++Builder rapid application development software. VCL was originally designed for Delphi but is now also used for C++Builder. This replaces OWL Object Windows Library as Borland's Windows C++ framework of choice. VCL encapsulates the C-based Win32 API into a much easier to use, object-oriented form. Like its direct rival, Microsoft Foundation Class Library (MFC), VCL includes classes to create Windows programs. The VCL component class can be inherited to create new VCL components, which are the building blocks of Delphi and C++Builder applications. VCL components are somewhat in competition with ActiveX controls, though a VCL wrapper can be created to make an ActiveX control seem like a VCL component.
  • voluntary aid detachment — (in World War I) an organization of British women volunteers who assisted in military hospitals and ambulance duties
  • water of crystallization — water of hydration, formerly thought necessary to crystallization: now usually regarded as affecting crystallization only as it forms new molecular combinations.
  • ways and means committee — a standing committee of the US House of Representatives that supervises all financial legislation
  • which way the wind blows — air in natural motion, as that moving horizontally at any velocity along the earth's surface: A gentle wind blew through the valley. High winds were forecast.
  • wired equivalent privacy — (networking, standard)   (WEP) IEEE 802.11:1999. A cryptographic privacy algorithm, based on the RC4 encryption engine, used to provide confidentiality for 802.11 wireless networks. WEP is intended to provide roughly the same level of confidentiality for wireless data as a wired LAN (Ethernet), which is NOT protected by encryption. WEP is often wrongly expanded as "Wireless Encryption Protocol". WEP is a protocol that provides encryption used on wireless networks but that's not what it stands for.
Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?