FA
Today, Saturday، 27 Apr 2024 - 04:29
Mokhafaf

Acronym Finder

BCC
What is BCC ?
Blind Carbon Copy
Transcript unsuspected that the Bcc know the phrase, it is, and the abbreviation of it is used. Bcc is a method to send email to other people is so that the name of the people who are in the Bcc write from other people\'s hidden remains.

general to send the email in three parts, can email address, the recipient enter:

1) in part \"To\", which the main receiver of the letter.

2) in the episode \"CC\" someone that you want, Plus include the original email you received (a copy of the letter).

3) in the episode \"BCC\" personal is that without the knowledge of the other recipients (to ,cc), email you receive (i.e., those in to and cc are individual email is in the bcc written will not see).

using BCC, it is possible to keep secret the address of the recipients of an email. will be provided. Unlike the address that is in the field To or CC inserts, and the possibility of viewing them by other recipients, there is the possibility of viewing the address listed in field BCC by other recipients, there will be no (send copy of letter to a third person without the recipient of the initial letter is given.)...
CPC
What is CPC ?
Cost Per Click
Pay per click or CPC, the name of a model of internet advertising in which visitors advertising to the website, mobile app or media other are guided, and the ad provider based on number of clicks and a visit to the media, your advertising cost will pay. This, in time, their innovations in the industry, internet advertising was considered, and to review alternative methods to the traditional banner ads (duration) and pay per number of views. Advanced models more and more complex pay per click is also now in operation that are, for example, could be to pay per lead to purchase noted.

companies Google, Microsoft and Yahoo project, Google Adwords, Microsoft adCenter and Yahoo! Search Marketing from this model benefit....
CEH
What is CEH ?
Certified Ethical Hacker
The yen received on The كك and technologies (from the perspective of defensive mainstay.كك Hacking includes roads and ways are that, during its application to the way they are designed that ك beyond what is expected of them in the direction of policies and processes, security, etc. do....
TELNET
What is TELNET ?
Telecommunications Network
Tel net (Telnet) is a protocol under the network is the internet and local area networks are used. The network in 1969, the development found. More equipment, network and systems, a factor that has a reference model Internet. Tel net can support....
ACID
What is ACID ?
Atomic, Consistent, Isolated, and Durable
ACID of 4 rule is composed of (Atomic teen Consistent, Isolated, and Durable) that put together, it's a transaction concept can't find:

a) Atomic: means all or nothing
if the transactions of the several change to be formed, all of which must be successfully performed, or whether any changes should be opportunity to apply the final flourish.
for example, the transfer amount X from an account. to another account, consider. In this mode, the X rial from the account person, the deduction, and X rial to another person's account, will be deposited. If the inventory account. have the X rails ... should not be a sum from this account can be deducted. The first stage failed. so the whole operation is canceled. Also, if the account is the recipient of the package is also not a sum of from the account of the first fraction be in this case also, the entire transaction should back eat.

b) Consistent or integrated
here is the consistency in addition to applied the constraints, meaning the information that, immediately after the end of the transactional system can be downloaded and read.

C) Isolated: enclosed
if multiple transactions at a time with running time. thus the final state of the transaction, one after the other, are run should be one.

d) Durable: lasting
if the end system transactions to announce. this case means 100%, written information in hard disk should be....
BBS
What is BBS ?
Bulletin Board System
BBS means System bulletin board.

BBS set from a computer system along with software for the direction of management, on which the installation is effortless.

this software allows users access to the system through phone line (or telnet) with a terminal application such as HyperTerminal in Windows or ICL (Irnet Com Lite) in the DOS provides.

This system is under DOS run and managed, and the ability to connect to the internet also.

such facilities that this system for users provides the following Don\'t loaded and up loaded information, reading, and publishing the news, communicate with other members online and offline., the environment, the conversation and questions, answers, chat, play and fun...

In fact, this network, the first foci of the virtual internet in Iran, were welcomed by many of the users were met. Including the famous networks can be applied to network messages, network purpose, network Genius, Network in the sector, particularly and many more affiliate networks to the government, such as network house, the nation, and many other named.

with the spread of the internet, such networks are quite into oblivion....
NOSQL
What is NOSQL ?
Not Only Sql
Novas s stands for not only sql means not only SS s the name is inclusive for the category of comprehensive database management system that with the kind of traditional database, the relational differences are obvious . The most clear these differences do not use SMS s as the first question is the language . His example of the database, X the database is document-oriented . One of the implementation of the well-known, this type of database ,, construction, Foundation software, Apache .

big companies, the internet, including Google (BigTable), the Amazon (Dynamo ), the free software users (Project Voldemort), Facebook (Cassandra and HBase) source (MongoDB), etc., Ubuntu (CouchDB) design and setup Group database NoSQL are responsible for. A significant portion of these projects are open source and free....
UDDI
What is UDDI ?
Universal Description, Discovery and Integration
Protocol description the ... discovery, and integration, inclusive, or the intrauterine device (UDDI) should be one of the foundations of the original in the creation and implementation technologies web services into account. The intrauterine device platform, a standard to exist. that on IT, IT company, applications, various are able to search, easy, fast, and dynamic services, on the internet pay....