0%

24-letter words containing t, y, p, e

  • mathematical probability — the probability of an event consisting of n out of m possible equally likely occurrences, defined to be n/m
  • minister plenipotentiary — plenipotentiary.
  • multiple reentry vehicle — a reentry vehicle equipped with multiple warheads that cannot be directed to separate targets. Abbreviation: MRV, M.R.V.
  • mutual insurance company — an insurance company owned by the policyholders and not by shareholders
  • narcissistic personality — a personality disorder characterized by extreme self-centeredness and self-absorption, fantasies involving unrealistic goals, an excessive need for attention and admiration, and disturbed interpersonal relationships.
  • network operating system — (operating system)   (NOS) The operating system on Control Data Corporation's Cyber Computer.
  • neutrosophic probability — (logic)   An extended form of probability based on Neutrosophy, in which a statement is held to be t true, i indeterminate, and f false, where t, i, f are real values from the ranges T, I, F, with no restriction on T, I, F or the sum n=t+i+f.
  • non-proliferation treaty — an international agreement signed in 1968 which aims to reduce the spread of nuclear weapons
  • not ready for prime time — Usable, but only just so; not very robust; for internal use only. Said of a program or device. Often connotes that the thing will be made more solid Real Soon Now. This term comes from the ensemble name of the original cast of "Saturday Night Live", the "Not Ready for Prime Time Players". It has extra flavour for hackers because of the special (though now semi-obsolescent) meaning of prime time. Compare beta.
  • open system architecture — (operating system)   (OSA) A competitor to IBM's SNA.
  • parliamentary government — government by a body of cabinet ministers who are chosen from and responsible to the legislature and act as advisers to a nominal chief of state.
  • people's liberation army — See under Huk (def 1).
  • permeability coefficient — the volume of an incompressible fluid that will flow in unit time through a unit cube of a porous substance across which a unit pressure difference is maintained
  • physiological atmosphere — ecosphere.
  • polychlorinated biphenyl — PCB.
  • polymer matrix composite — A polymer matrix composite is a material consisting of a composite made stronger by adding fibers or particles to it.
  • preparatory to doing sth — If one action is done preparatory to another, it is done before the other action, usually as preparation for it.
  • present company excepted — If you are making a general, unfavourable comment about a particular type of person, and you are with people of that type, you can say 'present company excepted' as a way of making your comment sound more polite.
  • pretty amazing new stuff — (humour, communications)   (PANS) What PSTN is evolving into.
  • private-key cryptography — (cryptography)   As opposed to public-key cryptography, a cryptographic method in which the same key is used to encrypt and decrypt the message. Private-key algorithms include the obsolescent Data Encryption Standard (DES), triple-DES (3DES), the Advanced Encryption Standard (AES), also known as Rijndael, Blowfish, Twofish RC2, RC4, RC5 and RC6. A problem with private-key cryptography is that the sender and the recipient of the message must agree on a common key via some alternative secure channel.
  • psychopathic personality — an antisocial personality characterized by the failure to develop any sense of moral responsibility and the capability of performing violent or antisocial acts
  • pyrotraumatic dermatitis — hot spot.
  • rapid eye movement sleep — REM sleep.
  • rational-emotive therapy — a form of therapy in which a patient is asked to reject irrational attitudes and assumptions in order to deal effectively with stressful situations.
  • referential transparency — (programming)   An expression E is referentially transparent if any subexpression and its value (the result of evaluating it) can be interchanged without changing the value of E. This is not the case if the value of an expression depends on global state which can change value. The most common example of changing global state is assignment to a global variable. For example, if y is a global variable in: f(x) { return x+y; } g(z) { a = f(1); y = y + z; return a + f(1); } function g has the "side-effect" that it alters the value of y. Since f's result depends on y, the two calls to f(1) will return different results even though the argument is the same. Thus f is not referentially transparent. Changing the order of evaluation of the statements in g will change its result. We could make f above referentially transparent by passing in y as an argument: f(x, y) = x+y Similarly, g would need to take y as an argument and return its new value as part of the result: g(z, y) { a = f(1, y); y' = y+z; return (a + f(1, y'), y'); } Referentially transparent programs are more amenable to formal methods and easier to reason about because the meaning of an expression depends only on the meaning of its subexpressions and not on the order of evaluation or side-effects of other expressions. We can stretch the concept of referential transparency to include input and output if we consider the whole program to be a function from its input to its output. The program as a whole is referentially transparent because it will always produce the same output when given the same input. This is stretching the concept because the program's input may include what the user types, the content of certain files or even the time of day. If we do not consider global state like the contents of files as input, then writing to a file and reading what was written behaves just like assignment to a global variable. However, if we must consider the state of the universe as an input rather than global state then any deterministic system would be referentially transparent! See also extensional equality, observational equivalence.
  • repetitive strain injury — overuse strain injury
  • representative democracy — a person or thing that represents another or others.
  • responsibility allowance — payment made to somebody who has special responsibilities
  • sequentially compact set — a set in which every sequence has a subsequence that converges to a point of the set.
  • slop oil recovery system — A slop oil recovery system is a method and the equipment used for cleaning and disposing of mixtures of oil, chemicals, and water from various sources in a refinery or oilfield.
  • socialist workers' party — one of the biggest extreme left wing parties in Britain
  • staggered pin grid array — (hardware)   (SPGA) A style of integrated circuit socket or pin-out with a staggered grid of pins around the edge of the socket, positioned as several squares, one inside the other. SPGA is commonly used on motherboards for processors, e.g. Socket 5, Socket 7 and Socket 8. See also PGA.
  • steak and kidney pudding — beefsteak and kidney in a suet pastry crust, steamed in a basin.
  • superheterodyne receiver — a radio receiver that combines two radio-frequency signals by heterodyne action, to produce a signal above the audible frequency limit. This signal is amplified and demodulated to give the desired audio-frequency signal
  • supportive psychotherapy — a type of psychotherapy that seeks to reduce psychological conflict and strengthen a patient's defenses through the use of various techniques, as reassurance, suggestion, counseling, and reeducation.
  • telephony user interface — (communications)   (TUI) Either a software interface to telephony (e.g. a phone-capable PC) or a DTMF-based interface to software (e.g. voicemail).
  • tetraethyl pyrophosphate — a colorless to amber, hygroscopic, poisonous liquid, (C 2 H 5) 4 P 2 O 7 , used as an insecticide and as a rodenticide.
  • the long-term unemployed — people who have no job and have not worked for a long time
  • the realm of possibility — If you say that something is not beyond the realms of possibility, you mean that it is possible.
  • to cramp someone's style — If someone or something cramps your style, their presence or existence restricts your behaviour in some way.
  • to have not got a prayer — If you say that someone hasn't got a prayer, you mean that it is impossible for them to succeed in what they are trying to do.
  • to keep something at bay — If you keep something or someone at bay, or hold them at bay, you prevent them from reaching, attacking, or affecting you.
  • to keep your eyes peeled — If you tell someone to keep their eyes peeled for something, you are telling them to watch very carefully for it.
  • transpersonal psychology — a branch of psychology or psychotherapy that recognizes altered states of consciousness and transcendent experiences as a means to understand the human mind and treat psychological disordrs.
  • tricyclic antidepressant — pertaining to or embodying three cycles.
  • visual component library — (programming)   VCL A application framework library for Microsoft Windows and Borland Software Corp.'s Delphi and C++Builder rapid application development software. VCL was originally designed for Delphi but is now also used for C++Builder. This replaces OWL Object Windows Library as Borland's Windows C++ framework of choice. VCL encapsulates the C-based Win32 API into a much easier to use, object-oriented form. Like its direct rival, Microsoft Foundation Class Library (MFC), VCL includes classes to create Windows programs. The VCL component class can be inherited to create new VCL components, which are the building blocks of Delphi and C++Builder applications. VCL components are somewhat in competition with ActiveX controls, though a VCL wrapper can be created to make an ActiveX control seem like a VCL component.
  • what are you playing at? — If you ask what someone is playing at, you are angry because you think they are doing something stupid or wrong.
  • wired equivalent privacy — (networking, standard)   (WEP) IEEE 802.11:1999. A cryptographic privacy algorithm, based on the RC4 encryption engine, used to provide confidentiality for 802.11 wireless networks. WEP is intended to provide roughly the same level of confidentiality for wireless data as a wired LAN (Ethernet), which is NOT protected by encryption. WEP is often wrongly expanded as "Wireless Encryption Protocol". WEP is a protocol that provides encryption used on wireless networks but that's not what it stands for.
Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?