0%

32-letter words containing c, o, e, r, i, t

  • kazakh soviet socialist republic — a republic of the U.S.S.R.: now Kazakhstan
  • linear fractional transformation — a map of the complex plane to itself in which a point z is mapped to a point w by w = (az + b)/(cz + d), where a, b, c, and d are complex numbers and ad − bc does not equal zero.
  • lymphadenopathy-associated virus — See under AIDS virus. Abbreviation: LAV.
  • lymphokine-activated killer cell — LAK cell.
  • major histocompatibility complex — MHC.
  • manager of business applications — (job)   A person who plans and oversees multiple projects and project managers. He works with the CIO and senior management to determine systems development strategy and standards. He administers the department budget and reviews project managers.
  • manufacturers' recommended price — the retail price that a manufacturer recommends for selling their product
  • microsoft data access components — (database)   (MDAC) Microsoft's umbrella term for their ActiveX Data Objects (ADO), OLE DB, and Open Database Connectivity (ODBC) libraries. Together, these provide access to a variety of data sources, both relational (SQL) and nonrelational. MDAC is the technology that supports Universal Data Access, Microsoft's strategy for providing access to information across the enterprise.
  • national industrial recovery act — an act of Congress (1933, declared unconstitutional in 1936) that enabled the president and the National Recovery Administration to formulate and execute measures for reducing industrial unemployment. Abbreviation: NIRA, N.I.R.A.
  • national insurance contributions — the payments someone makes towards their national insurance, usually taken from their salary by their employer before the salary is paid to the person
  • national recovery administration — NRA.
  • nondeterministic polynomial time — (complexity)   (NP) A set or property of computational decision problems solvable by a nondeterministic Turing Machine in a number of steps that is a polynomial function of the size of the input. The word "nondeterministic" suggests a method of generating potential solutions using some form of nondeterminism or "trial and error". This may take exponential time as long as a potential solution can be verified in polynomial time. NP is obviously a superset of P (polynomial time problems solvable by a deterministic Turing Machine in polynomial time) since a deterministic algorithm can be considered as a degenerate form of nondeterministic algorithm. The question then arises: is NP equal to P? I.e. can every problem in NP actually be solved in polynomial time? Everyone's first guess is "no", but no one has managed to prove this; and some very clever people think the answer is "yes". If a problem A is in NP and a polynomial time algorithm for A could also be used to solve problem B in polynomial time, then B is also in NP. See also Co-NP, NP-complete.
  • office of defense transportation — the World War II federal agency (1941–45) that regulated the transport over public routes of goods considered vital to the war effort. Abbreviation: ODT.
  • open document interchange format — (standard)   (ODIF) Part of the ODA standard.
  • oracle co-operative applications — (tool, product)   Packaged client/server software from Oracle for accounting, manufacturing, distribution, human resources and project control.
  • orbiting geophysical observatory — OGO.
  • password authentication protocol — (networking)   (PAP) An authentication scheme used by PPP servers to validate the identity of the originator of the connection. PAP applies a two-way handshaking procedure. After the link is established the originator sends an id-password pair to the server. If authentication succeeds the server sends back an acknowledgement; otherwise it either terminates the connection or gives the originator another chance. PAP is not a strong authentication method. Passwords are sent over the circuit "in the clear" and there is no protection against playback or repeated "trial and error" attacks. The originator is in total control of the frequency and timing of the attempts. Therefore, any server that can use a stronger authentication method, such as CHAP, will offer to negotiate that method prior to PAP. The use of PAP is appropriate, however, if a plaintext password must be available to simulate a login at a remote host. PAP is defined in RFC 1334.
  • plesiochronous digital hierarchy — (communications)   (PDH) A transmission system for voice communication using plesiochronous synchronisation. PDH is the conventional multiplexing technology for network transmission systems. The transmitter adds dummy information bits to allow multiple channels to be bit interleaved. The receiver discards these bits once the signals have been demultiplexed. PDH combines multiple 2 Mb/s (E1) channels in Europe and 1.544 Mb/s (DS1) channels in the US and Japan. PDH is being replaced by SONET and other SDH (Synchronous Digital Hierarchy) schemes.
  • point-to-point protocol over atm — (networking)   (PPPoA) A network protocol for encapsulating PPP frames in ATM AAL5. It is used mainly with cable modem, DSL and ADSL services. PPPoA offers standard PPP features such as authentication, encryption, and compression. It is very slightly more efficient than PPPoE and, like PPPoE, supports VC-MUX and LLC encapsulation. PPPoA is specified in RFC 2364.
  • portable common tool environment — (tool)   (PCTE) An ECMA standard framework for software tools developed in the Esprit programme. It is based on an entity-relationship Object Management System and defines the way in which tools access this.
  • professional liability insurance — Professional liability insurance is insurance for a company or a professional person against claims or financial losses that may occur as a result of their negligence.
  • queen mary and westfield college — (QMW) One of the largest of the multi-faculty schools of the University of London. QMW has some 6000 students and over 600 teaching and research staff organised into seven faculties. QMW was one of the first colleges in the University of London to develop fully the course-unit, or modular, approach to degree programmes. Cross faculty courses are encouraged and the physical proximity of all the College buildings is a major factor in enabling students to adopt an interdisciplinary approach to their studies.
  • real-time common design language — (language)   (RT-CDL) A real-time language for the design of reliable reactive systems.
  • reduced instruction set computer — (processor)   (RISC) A processor whose design is based on the rapid execution of a sequence of simple instructions rather than on the provision of a large variety of complex instructions (as in a Complex Instruction Set Computer). Features which are generally found in RISC designs are uniform instruction encoding (e.g. the op-code is always in the same bit positions in each instruction which is always one word long), which allows faster decoding; a homogenous register set, allowing any register to be used in any context and simplifying compiler design; and simple addressing modes with more complex modes replaced by sequences of simple arithmetic instructions. Examples of (more or less) RISC processors are the Berkeley RISC, HP-PA, Clipper, i960, AMD 29000, MIPS R2000 and DEC Alpha. IBM's first RISC computer was the RT/PC (IBM 801), they now produce the RISC-based RISC System/6000 and SP/2 lines. Despite Apple Computer's bogus claims for their PowerPC-based Macintoshes, the first RISC processor used in a personal computer was the Advanced RISC Machine (ARM) used in the Acorn Archimedes.
  • rene theophile hyacinthe laennec — René Théophile Hyacinthe [ruh-ney tey-aw-feel ya-sant] /rəˈneɪ teɪ ɔˈfil yaˈsɛ̃t/ (Show IPA), 1781–1826, French physician who invented the stethoscope.
  • resource access control facility — (RACF) IBM's large system security product. It originally ran only under MVS but has since been ported to run under VM.
  • saint bartholomew's day massacre — a massacre of over 3000 Huguenots, instigated by Catherine de Médicis and begun in Paris on St. Bartholomew's Day, August 24, 1572.
  • securities and investments board — (from 1986 to 1997) a British regulatory body that oversaw London's financial markets, each of which has its own self-regulatory organization: replaced by the Financial Services Authority
  • single instruction multiple data — Single Instruction/Multiple Data
  • software practice and experience — (publication)   (SPE) A journal about software.
  • standing settlement instructions — Standing settlement instructions are instructions that have been agreed in advance, and that are to be used every time a trade is made.
  • sweep something under the carpet — to conceal (something, esp a problem) in the hope that it will be overlooked by others
  • symbolic mathematical laboratory — (tool, mathematics)   An on-line system under CTSS for symbolic mathematics. It used a display screen and a light pen.
  • systems application architecture — (programming)   (SAA) IBM's family of standard interfaces which enable software to be written independently of hardware and operating system.
  • take one's courage in both hands — to nerve oneself to perform an action
  • terminal oriented social science — (project)   (TOSS) The Cambridge Project Project MAC was an ARPA-funded political science computing project. They worked on topics like survey analysis and simulation, led by Ithiel de Sola Pool, J.C.R. Licklider and Douwe B. Yntema. Yntema had done a system on the MIT Lincoln Labs TX-2 called the Lincoln Reckoner, and in the summer of 1969 led a Cambridge Project team in the construction of an experiment called TOSS. TOSS was like Logo, with matrix operators. A major feature was multiple levels of undo, back to the level of the login session. This feature was cheap on the Lincoln Reckoner, but absurdly expensive on Multics.
  • the courage of one's convictions — the confidence to act in accordance with one's beliefs
  • the game is not worth the candle — If you say that the game is not worth the candle, you mean that something is not worth the trouble or effort needed to achieve or obtain it.
  • time-of-flight mass spectroscopy — a technique for separating ions according to the time required for them to traverse a set distance.
  • to have by the short and curlies — to have completely in one's power
  • to nail your colours to the mast — If someone nails their colours to the mast, they say what they really think about something.
  • to pervert the course of justice — If someone perverts the course of justice, they deliberately do something that will make it difficult to discover who really committed a particular crime, for example, destroying evidence or lying to the police.
  • to point the finger of suspicion — To point the finger of suspicion or blame at someone means to make people suspect them of doing wrong or blame them for doing wrong.
  • to vanish from the radar screens — to go missing; to no longer be visible or able to be detected by anyone
  • transaction application language — (language)   (TAL) Not "Tandem Application Language". A block-structured, procedural language optimised for use on Tandem hardware. TAL is a cross between C and Pascal and is the primary system programming language on Tandem computers. Tandem has no assembler and originally had no C or Pascal.
  • twente compiler generator system — (language, tool)   (TCGS) A compiler generator developed at the University of Twente, The Netherlands.
  • uniform code of military justice — the body of laws governing members of the U.S. armed forces: superseded the Articles of War in 1951
  • united states employment service — the division of the Department of Labor that supervises and coordinates the activities of state employment agencies. Abbreviation: USES.
  • united states information agency — an independent agency, created in 1953 and known from 1978 to 1982 as the International Communication Agency, that administers the government's overseas information and cultural programs. Abbreviation: USIA.
  • virtual sequential access method — Virtual Storage Access Method
Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?