0%

32-letter words containing c, o, m, p

  • application lifecycle management — (programming)   (ALM) A combination of software engineering, requirements management, architecture, coding, testing, tracking and release management.
  • application visualisation system — (tool, graphics)   (AVS) A portable, modular, Unix-based graphics package supported by a consortium of vendors including Convex, DEC, IBM, HP, SET Technologies, Stardent and WaveTracer.
  • applications development manager — (job)   (Or "Director") The person in a company who plans and oversees multiple projects and project managers. The Applications Development Managers works with the CIO and senior management to determine systems development strategy and standards. He or she administers department budget and reviews project managers.
  • automatische rechenplanfertigung — (language)   A programming language published in 1952 by Heinz Rutishauser (1918-70).
  • azimuthal equidistant projection — a projection in which the shortest distance between any point and a central point is a straight line, such a line representing a great circle through the central point.
  • chronic traumatic encephalopathy — a progressive degenerative neurological disease caused by repeated cerebral concussion or milder traumatic brain injury and characterized by memory loss, behavioral disturbances, speech problems, slowed movement, etc. The disease was first identified in boxers. Abbreviation: CTE.
  • client-server analyst programmer — (job)   A person who analyses and designs application programs for a client-server architecture. Typical skills include ODBC, Windows 95, Windows NT, Macintosh, Novell, OS/2, Unix, and RPC.
  • community of sovereign republics — a political and economic union formed in 1996 by Russia and Belarus
  • complex instruction set computer — (CISC) A processor where each instruction can perform several low-level operations such as memory access, arithmetic operations or address calculations. The term was coined in contrast to Reduced Instruction Set Computer. Before the first RISC processors were designed, many computer architects were trying to bridge the "semantic gap" - to design instruction sets to support high-level languages by providing "high-level" instructions such as procedure call and return, loop instructions such as "decrement and branch if non-zero" and complex addressing modes to allow data structure and array accesses to be compiled into single instructions. While these architectures achieved their aim of allowing high-level language constructs to be expressed in fewer instructions, it was observed that they did not always result in improved performance. For example, on one processor it was discovered that it was possible to improve the performance by NOT using the procedure call instruction but using a sequence of simpler instructions instead. Furthermore, the more complex the instruction set, the greater the overhead of decoding an instruction, both in execution time and silicon area. This is particularly true for processors which used microcode to decode the (macro) instruction. It is easier to debug a complex instruction set implemented in microcode than one whose decoding is "hard-wired" in silicon. Examples of CISC processors are the Motorola 680x0 family and the Intel 80186 through Intel 486 and Pentium.
  • computer emergency response team — (security, body)   (CERT) An organisation formed by DARPA in November 1988 in response to the Internet worm incident. The CERT charter is to work with the Internet community to help it responf to computer security events involving Internet hosts, to raise awareness of computer security issues and to conduct research targeted at improving the security of existing systems. CERT products and services include 24-hour technical assistance for responding to computer security incidents, product vulnerability assistance, technical documents and tutorials. E-mail: <[email protected]> (incident reports). Telephone +1 (412) 268 7090 (24-hour hotline).
  • computer generation incorporated — (company)   (CGI) A US software development company and systems integrator. E-mail: Paul G. Smith <[email protected]> Telephone: +1 (404) 705 2800 Address: Bldg. G, 4th Floor, 5775 Peachtree-Dunwoody Rd., Atlanta, GA 30342, USA.
  • cross someone's palm with silver — a structure consisting essentially of an upright and a transverse piece, used to execute persons in ancient times.
  • customer relationship management — the practice of building a strong relationship between a business and its customers and potential customers
  • democratic-republic-of-the-congo — People's Republic of the, a republic in central Africa, W of the Democratic Republic of the Congo: formerly an overseas territory in French Equatorial Africa; now an independent member of the French Community. 132,046 sq. mi. (341,999 sq. km). Capital: Brazzaville. Formerly French Congo, Middle Congo.
  • eli compiler construction system — (tool)   A compiler generation package which integrates off-the-shelf tools and libraries with specialised language processors to generate complete compilers quickly and reliably. It simplifies the development of new special-purpose languages, implementation of existing languages on new hardware and extension of the constructs and features of existing languages. It runs on Sun-4 SunOS 4, 5, Ultrix/MIPS, RS/6000, HP-UX, SGI, Linux. Mailing list: <[email protected]>. E-mail: <[email protected]>, Developers <[email protected]>, Users <[email protected]>.
  • have a bone to pick with someone — Anatomy, Zoology. one of the structures composing the skeleton of a vertebrate. the hard connective tissue forming the substance of the skeleton of most vertebrates, composed of a collagen-rich organic matrix impregnated with calcium, phosphate, and other minerals.
  • hit/come up against a brick wall — If you hit a brick wall or come up against a brick wall, you are unable to continue or make progress because something stops you.
  • internet message access protocol — (protocol, messaging)   (IMAP) A protocol allowing a client to access and manipulate electronic mail messages on a server. It permits manipulation of remote message folders (mailboxes), in a way that is functionally equivalent to local mailboxes. IMAP includes operations for creating, deleting, and renaming mailboxes; checking for new messages; permanently removing messages; searching; and selective fetching of message attributes, texts, and portions thereof. It does not specify a means of posting mail; this function is handled by a mail transfer protocol such as SMTP. See RFC 2060, RFC 2061, and others. Compare: POP.
  • lymphadenopathy-associated virus — See under AIDS virus. Abbreviation: LAV.
  • lymphokine-activated killer cell — LAK cell.
  • major histocompatibility complex — MHC.
  • manager of business applications — (job)   A person who plans and oversees multiple projects and project managers. He works with the CIO and senior management to determine systems development strategy and standards. He administers the department budget and reviews project managers.
  • manufacturers' recommended price — the retail price that a manufacturer recommends for selling their product
  • microsoft data access components — (database)   (MDAC) Microsoft's umbrella term for their ActiveX Data Objects (ADO), OLE DB, and Open Database Connectivity (ODBC) libraries. Together, these provide access to a variety of data sources, both relational (SQL) and nonrelational. MDAC is the technology that supports Universal Data Access, Microsoft's strategy for providing access to information across the enterprise.
  • nondeterministic polynomial time — (complexity)   (NP) A set or property of computational decision problems solvable by a nondeterministic Turing Machine in a number of steps that is a polynomial function of the size of the input. The word "nondeterministic" suggests a method of generating potential solutions using some form of nondeterminism or "trial and error". This may take exponential time as long as a potential solution can be verified in polynomial time. NP is obviously a superset of P (polynomial time problems solvable by a deterministic Turing Machine in polynomial time) since a deterministic algorithm can be considered as a degenerate form of nondeterministic algorithm. The question then arises: is NP equal to P? I.e. can every problem in NP actually be solved in polynomial time? Everyone's first guess is "no", but no one has managed to prove this; and some very clever people think the answer is "yes". If a problem A is in NP and a polynomial time algorithm for A could also be used to solve problem B in polynomial time, then B is also in NP. See also Co-NP, NP-complete.
  • object database management group — Object Data Management Group
  • open document interchange format — (standard)   (ODIF) Part of the ODA standard.
  • point-to-point protocol over atm — (networking)   (PPPoA) A network protocol for encapsulating PPP frames in ATM AAL5. It is used mainly with cable modem, DSL and ADSL services. PPPoA offers standard PPP features such as authentication, encryption, and compression. It is very slightly more efficient than PPPoE and, like PPPoE, supports VC-MUX and LLC encapsulation. PPPoA is specified in RFC 2364.
  • portable common tool environment — (tool)   (PCTE) An ECMA standard framework for software tools developed in the Esprit programme. It is based on an entity-relationship Object Management System and defines the way in which tools access this.
  • reduced instruction set computer — (processor)   (RISC) A processor whose design is based on the rapid execution of a sequence of simple instructions rather than on the provision of a large variety of complex instructions (as in a Complex Instruction Set Computer). Features which are generally found in RISC designs are uniform instruction encoding (e.g. the op-code is always in the same bit positions in each instruction which is always one word long), which allows faster decoding; a homogenous register set, allowing any register to be used in any context and simplifying compiler design; and simple addressing modes with more complex modes replaced by sequences of simple arithmetic instructions. Examples of (more or less) RISC processors are the Berkeley RISC, HP-PA, Clipper, i960, AMD 29000, MIPS R2000 and DEC Alpha. IBM's first RISC computer was the RT/PC (IBM 801), they now produce the RISC-based RISC System/6000 and SP/2 lines. Despite Apple Computer's bogus claims for their PowerPC-based Macintoshes, the first RISC processor used in a personal computer was the Advanced RISC Machine (ARM) used in the Acorn Archimedes.
  • single instruction multiple data — Single Instruction/Multiple Data
  • sweep something under the carpet — to conceal (something, esp a problem) in the hope that it will be overlooked by others
  • systems application architecture — (programming)   (SAA) IBM's family of standard interfaces which enable software to be written independently of hardware and operating system.
  • telecommunication display device — Telecommunications Device for the Deaf
  • time-of-flight mass spectroscopy — a technique for separating ions according to the time required for them to traverse a set distance.
  • to put the cat among the pigeons — If you put the cat among the pigeons or set the cat among the pigeons, you cause fierce argument or discussion by doing or saying something.
  • twente compiler generator system — (language, tool)   (TCGS) A compiler generator developed at the University of Twente, The Netherlands.
  • united states employment service — the division of the Department of Labor that supervises and coordinates the activities of state employment agencies. Abbreviation: USES.
  • workmen's compensation insurance — workers' compensation insurance.

On this page, we collect all 32-letter words with C-O-M-P. It’s easy to find right word with a certain length. It is the easiest way to find 32-letter word that contains in C-O-M-P to use in Scrabble or Crossword puzzles

Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?