FA
Today, Friday، 22 Nov 2024 - 04:38
Mokhafaf

Acronym Finder

CMS
What is CMS ?
Content Management System
Content management systems (CMS), a set of procedures to manage the process of working in an environment partnership. These procedures can be manual or computer. These procedures are designed that:
a lot of people can participate, and given the variety of ways to share
the data has access control based on users role. Users role determines what user, what can be edit or see
storage and retrieval of data easy.
input, similar duplicate will reduce the
reporting to improve
the relationship between users to improve

in a CMS, etc. data can be anything, such as documents, video, photos, phone number, scientific data, etc. CMS more to store, Control, Review, etc. the development of the semantic and the release of the documents goes to work....
UDP
What is UDP ?
User Datagram Protocol
Contract data journalist, or user protocol data journalist of the user is one of the main components of the set protocol, the internet, a set of network protocols that the internet is used.. Computers use UDP to be able to send the message, which in this case it was a journalist or Datagram track. to the other hosts available in the Internet Protocol (IP). This protocol has an ability this without communicating previous or create channels or paths, data transfer, Special do. The protocol shall, in the year 1980 by David Wake. Reid has been developed and formally in the standard RFC 768 defines....
SOAP
What is SOAP ?
Simple Object Access Protocol
Use the protocol easy access to objects or soup (SOAP) can be used to send and exchange messages with from free X the on the network computer venture.

The protocol for the exchange of messages based on the x-TH El in the midst of a computer network is usually HTTP/HTTPS uses. Soup layer infrastructure, stack, service, web forms, which gives a framework for the message this creates that layer, single more can on it be created.

projects message this variety of soup available, which is the most usual, they plan remote procedure call, and is thus is a node network (client) a message request to the node to another (the server) sends the server the speed of a message reply to the client sends. SOAP successor to XML-RPC, which is being neutral about the transfer and exchange of it and the cover/headlines/body from elsewhere (usually WDDX) to the right.

Soup be the use of an application layer protocol, the internet as a protocol transfer is created. Criticism has been raised is that knowing that this kind of abuse of such protocols. because this goal has not been that he intended to be, and so can not well cope with the role of COPE. But fans of the soup fit in the successful use of protocols at various levels for tunneling other protocols, etc. information, have....
ICMP
What is ICMP ?
Internet Control Message Protocol
Control protocol, internet messages (IC's ) is one of the protocols, the main protocol packets of the internet. About the original use of it in operating systems computers connected to the network, to send error messages, for example, the service requested is not available or that a host or router is disabled. From the IC's can be used to relay off orders use also.

The IC's relies on IP to perform its tasks. and integral part of IP. This system with the transport systems, data like or Mississippi, or Yu, the wake is different and to send and receive data not used. This protocol typically, in applications the grid is not used, except in a few exceptions, such as ping or Tris trained....
POP
What is POP ?
Post Office Protocol
The pope who, in fact, an agreement on international send and receive e-mails.This agreement by the ISPs support and can be used. Mail systems that are based on this protocol, projection, and are designed directly can be receptive to the software, such as Outlook, requirements, and users can also through this software, enter your mailbox are letters to read and answer them.

the advantage of having POP3 email is that you can get your emails through the software management desire get. Desire your in the system your best you and your emails offline study .. The speed of receiving and sending email with this method is much more of a condition, that is, the desire and the browser takes place. Also, you can make your letters with the help of editor, strong in software management, the desire is there, type?, image, or any file on your system, attach the letter and only to send the letter to connect to the internet, which is arguably the time and cost you on the internet will save....
DDOS
What is DDOS ?
Distributed Denial of Service
Attack (DDOS), a method of attack in which the attacker with a large number of computers and networks that are at the disposal of. the attack." In this method, all the computers one method of attack, which in the following are listed at the same time, together, doing that might, in some cases, the damage irreparable.
In this technique, usually the attacker system a lot of infected and they command. to the system, infected zombie, and to the network of this system is under the control of a person. botnet say....
IM
What is IM ?
Instant Messaging
Instant messaging, which is the short form of IM. ... a kind of direct communication a text prompt(real-time) between two or more person using a personal computer with other devices through a server software(Software Client) is common. Text user on a network such as the internet can be passed. Server software more advanced instant messaging category, higher from the relationship, such as a video call or audio offerings....
CLI
What is CLI ?
Command Line Interface
Line interface or CLI mechanism to communicate with the operating system or application and perform specific commands by typing commands. This method against other methods like the use of the marker the mouse is for clicking on the options in the graphical interface user or use the menus in the interface, text user to select options. This method of giving orders to "enter a command", say....