0%

15-letter words containing a, r, t

  • crustaceologist — One who studies crustaceology.
  • cryoanaesthesia — Alternative spelling of cryoanesthesia.
  • cryoprecipitate — a precipitate obtained by controlled thawing of a previously frozen substance. Factor VIII, for treating haemophilia, is often obtained as a cryoprecipitate from frozen blood
  • cryoprotectants — Plural form of cryoprotectant.
  • cryptographical — the science or study of the techniques of secret writing, especially code and cipher systems, methods, and the like. Compare cryptanalysis (def 2).
  • crystal counter — an instrument for detecting and measuring the intensity of high-energy radiation, in which particles collide with a crystal and momentarily increase its conductivity
  • crystal healing — (in alternative therapy) the use of the supposed power of crystals to affect the human energy field
  • crystal lattice — the regular array of points about which the atoms, ions, or molecules composing a crystal are centred
  • crystal nucleus — the tiny crystal that forms at the onset of crystallization
  • crystal pick-up — a record-player pick-up in which the current is generated by the deformation of a piezoelectric crystal caused by the movements of the stylus
  • crystalliferous — producing or containing crystals
  • crystallisation — (British) alternative spelling of crystallization.
  • crystallization — Crystallization is the process in which crystals are formed either from something that has been melted or from a solution.
  • crystallography — the science concerned with the formation, properties, and structure of crystals
  • csk corporation — (company)   The japanese company that owns CSK Software and Sega. CSK Corp. is the largest independent japanese software company.
  • cultural cringe — the perception that one's own culture is inferior to that of another group or country
  • culturalization — to expose or subject to the influence of culture.
  • culture jamming — a form of political and social activism which, by means of fake adverts, hoax news stories, pastiches of company logos and product labels, computer hacking, etc, draws attention to and at the same time subverts the power of the media, governments, and large corporations to control and distort the information that they give to the public in order to promote consumerism, militarism, etc
  • culture pattern — a group of interrelated culture traits of some continuity.
  • curate's-eggish — good in parts
  • curia rhaetorum — a city in E Switzerland, capital of Graubünden canton. Pop: 32 989 (2000)
  • curiosity value — value arising from rarity or strangeness rather than intrinsic worth
  • currency market — a market in which banks and traders purchase and sell foreign currencies
  • currency trader — a person whose work is to trade currencies and profit from exchange rate differentials
  • current account — A current account is a personal bank account which you can take money out of at any time using your cheque book or cash card.
  • current affairs — If you refer to current affairs, you are referring to political events and problems in society which are discussed in newspapers, and on television and radio.
  • current balance — an instrument for measuring electric currents, in which the magnetic force between two current-carrying coils is balanced against a weight.
  • curtain lecture — a scolding or rebuke given in private, esp by a wife to her husband
  • curtain shutter — a focal-plane shutter consisting of a curtain on two rollers, moved at a constant speed past the lens opening so as to expose the film to one of several slots in the curtain, the width of which determines the length of exposure.
  • customer appeal — attractiveness to customers
  • customer-facing — interacting or communicating directly with customers
  • cut the mustard — to come up to expectations
  • cutthroat trout — a game fish (Salmo clarki) with a reddish patch under the jaw, usually found in high mountain streams near the NW North American coast
  • cyber-squatting — (jargon, networking)   The practice of registering famous brand names as Internet domain names, e.g. harrods.com, ibm.firm or sears.shop, in the hope of later selling them to the appropriate owner at a profit.
  • cytomegalovirus — a virus of the herpes virus family that may cause serious disease in patients whose immune systems are compromised
  • cytotrophoblast — the thickened, inner part of the mammalian placenta nearest to the fetus, covering the chorion during early pregnancy
  • dadchelor party — a party primarily attended by men and held to honour and present gifts to a prospective father
  • daguerreotyping — Present participle of daguerreotype.
  • daguerreotypist — an obsolete photographic process, invented in 1839, in which a picture made on a silver surface sensitized with iodine was developed by exposure to mercury vapor.
  • dancing partner — one of a pair of dancers
  • danse du ventre — belly dance
  • dark adaptation — the adaptation of the eye to vision in the dark by dilation of the pupil, increased sensitivity of the retina, etc.
  • darkling beetle — any of a family (Tenebrionidae) of sluggish, dark beetles that feed on plants at night
  • dartmouth basic — (language)   The original BASIC language, designed by John G. Kemeny and Thomas E. Kurtz at Dartmouth College in 1963. Dartmouth BASIC first ran on a GE 235 [date?] and on an IBM 704 on 1964-05-01. It was designed for quick and easy programming by students and beginners using Dartmouth's experimental time-sharing system. Unlike most later BASIC dialects, Dartmouth BASIC was compiled.
  • data dictionary — an index of data held in a database and used to assist in the access to data
  • data link layer — (networking)   Layer two, the second lowest layer in the OSI seven layer model. The data link layer splits data into frames (see fragmentation) for sending on the physical layer and receives acknowledgement frames. It performs error checking and re-transmits frames not received correctly. It provides an error-free virtual channel to the network layer. The data link layer is split into an upper sublayer, Logical Link Control (LLC), and a lower sublayer, Media Access Control (MAC). Example protocols at this layer are ABP, Go Back N, SRP.
  • data processing — Data processing is the series of operations that are carried out on data, especially by computers, in order to present, interpret, or obtain information.
  • data protection — (in Britain) safeguards for individuals relating to personal data stored on a computer
  • data redundancy — (data, communications, storage)   Any technique that stores or transmits extra, derived data that can be used to detect or repair errors, either in hardware or software. Examples are parity bits and the cyclic redundancy check. If the cost of errors is high enough, e.g. in a safety-critical system, redundancy may be used in both hardware AND software with three separate computers programmed by three separate teams ("triple redundancy") and some system to check that they all produce the same answer, or some kind of majority voting system. The term is not typically used for other, less beneficial, duplication of data. 2.   (communications)   The proportion of a message's gross information content that can be eliminated without losing essential information. Technically, redundancy is one minus the ratio of the actual uncertainty to the maximum uncertainty. This is the fraction of the structure of the message which is determined not by the choice of the sender, but rather by the accepted statistical rules governing the choice of the symbols in question.
  • database server — A stand-alone computer in a local area network that holds and manages the database. It implies that database management functions, such as locating the actual record being requested, is performed in the server computer. Contrast with file server, which acts as a remote disk drive and requires that large parts of the database, for example, entire indexes, be transmitted to the user's computer where the real database management tasks are performed. First-generation personal computer database software was not designed for a network; thus, modified versions of the software released by the vendors employed the file server concept. Second-generation products, designed for local area networks, perform the management tasks in the server where they should be done, and consequently are turning the file server into a database server.
Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?