A B C D E F G H I J K L M N O P Q R S T U V W X Y and Z Special characters and Numerics


This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.


C


C++
An enhancement of the C language that adds features supporting object-oriented programming.

C++ language
An object-oriented high-level language that evolved from the C language. C++ takes advantage of the benefits of object-oriented technology such as code modularity, portability, and reuse.

C++ library
A system library that contains common C++ language subroutines for file access, memory allocation, and other functions.

C2
A level of security defined in the Trusted Computer System Evaluation Criteria (TCSEC) published by the United States Government. To meet C2 requirements, a system must perform discretionary access control, authentication and verification, object reuse protection, and auditing of security-relevant events.

C2A
See Click-to-Action.

C/370 common anchor area (C-CAA)
A common anchor area (CAA), specific to the C/370, in the runtime environment.

C5.0
A rule induction algorithm that builds either a decision tree or a rule set. The model works by splitting the sample based on the field that provides the maximum information gain at each level. See also rule induction.

CA

  1. See control area.
  2. See channel adapter.
  3. See certificate authority.
  4. See change accumulation.
  5.  

CAA

  1. See Cluster Aware AIX.
  2. See common anchor area.

CaaS
See capabilities as a service.

cable
A physical medium for transmitting signals. Cables include copper conductors and optical fibers.

cable modem
A modem that provides Internet access over cable TV networks (which use fiber-optic or coaxial cables). A cable modem is generally faster than a modem that uses phone lines.

cable path
A series of cables connected in sequence.

cable segment
A section of cable between components or devices on a network. A segment may consist of a single patch cable, multiple patch cables that are connected to one another, or a combination of building cable and patch cables that are connected to one another.

cable-through
Pertaining to a function or feature of a display station that allows multiple work stations to be attached to one cable path.

CA certificate
See certificate authority certificate.

cache

  1. To place a duplicate copy of a file on random access media when the server migrates a file to another storage pool in the hierarchy.
  2. Storage or memory that is used to improve access times to instructions, data, or both. For example, data that resides in cache memory is normally a copy of data that resides elsewhere in slower, less expensive storage, such as on a disk or on another network node.
  3. To place, hide, or store frequently used information locally for quick retrieval.
  4. A buffer that contains frequently accessed instructions and data; it is used to reduce access time.

cache coherency
Consistency of data in caches on multiple processors so that changing a single cache line does not create inconsistent versions of the cache line in the different caches.

cached inventory
Products that have their information, such as item attributes, inventory balance, or availability, stored in a local data cache. The consuming application, such as a web store, can access the information from the cache, reducing synchronous queries to the order management system.

cache eviction
A process by which data associated with a file is removed from the cache system. The data is removed either by using a Least Recently Used (LRU) algorithm when configured General Parallel File System (GPFS) hard or soft quota limits are exceeded or by issuing a command. When referenced again in the cache system, the data that is associated with the file is retrieved from the home system.

cache fast write
A storage control capability in which data is written directly to cache without using nonvolatile storage. Cache fast write is useful for temporary data or data that is readily re-created. See also DASD fast write.

cache file
A snapshot of a logical volume created by Logical Volume Snapshot Agent. Blocks are saved immediately before they are modified during the image backup and their logical extents are saved in the cache files.

cache hit

  1. A processor storage reference that is satisfied by information from a cache.
  2. An event that satisfies a read operation by retrieving data from cache instead of retrieving it from the intended storage or a lower level of cache. See also cache miss.

cache instance resource
A location where any Java Platform, Enterprise Edition (Java EE) application can store, distribute, and share data.

cache line

  1. A record that contains relevant information about the user data that is currently in the subsystem cache memory. Examples of this information include the current state of the data and the intended location of the data on one or more disks.
  2. The cache component that is normally loaded, stored, and interrogated during cache lookup.

cache miss

  1. An event that satisfies a read operation by retrieving data from the intended storage or a lower level of cache because the requested data is not available in the only level or a higher level of cache. See also cache hit.
  2. A delay that occurs when the processor references data or instructions that are not already in the data cache or instruction cache.

cache replication
The sharing of cache IDs, cache entries, and cache invalidations with other servers in the same replication domain.

cache set
A storage-class parameter, defined in the base configuration information, that maps a logical name to cache structure names in a coupling facility (CF).

cache structure
A coupling facility structure that stores data that can be available to all members of a Sysplex. A DB2 data sharing group uses cache structures as group buffer pools. See also group buffer pool.

cache table
In a federated system, a logical table object that is used to cache data from a data source table. A cache table comprises a nickname that identifies the data source table, one or more materialized query tables, and a schedule for replicating the data in each materialized query table.

cache timeout
The length of time that is allowed to pass before the cache is updated.

caching
The process of storing frequently used results from a request to memory for quick retrieval, until it is time to refresh the information. The DB2 database manager provides many forms of caching, such as directory caching, package caching, file system caching, and LDAP caching.

caching inhibited
Pertaining to a memory update policy in which the cache is bypassed, and the load or store is performed to or from main memory.

caching I/O group
The I/O group in the system that performs the cache function for a volume.

caching proxy server
A proxy server that stores the documents that it retrieves from other servers in a local cache. The caching proxy server can then respond to subsequent requests for these documents without retrieving them from the other servers. This can improve response time.

CAD
See client acceptor daemon.

cadence
The modulated and rhythmic recurrence of an audio signal. For example, a series of beeps or a series of rings.

CAF
See call attachment facility.

cage
See I/O cage.

CA key
See command attention key.

CAL
See customer acceptance laboratory.

CalConn server task
A Domino server task that is a component of calendar scheduling.

calc script
See calculation script.

calculated category
A category created based on a calculation. Calculated categories become part of the cube and can be applied to any measure.

calculated column
A column whose values are calculated from other columns, calculated columns, functions, and constants to derive new data for a model.

calculated expression
An expression that is not constant, but whose value depends upon other values. To be evaluated, a calculated expression must obtain and compute values from other sources, normally in other fields or rows.

calculated measure
A measure whose values are calculated from other measures, calculated measures, functions, and numeric constants in an arithmetic equation.

calculated member
A member of a dimension whose measure values are not stored but are calculated at run time using an expression. See also input member.

calculated metric
A metric that can be defined using a formula that is constructed from one or more existing metrics, operators, or constants. For example, users can create a metric named Repeat Visitor % using a calculated metric of [(Unique Visitors –New Visitors)/Unique Visitors].

calculation

  1. A metric that is the main focus of a metric report.
  2. The process used to transform a series of records into a new result. Typically a calculation is mathematical, but may also include sorting, shifting, or adding to a prior result. Calculations enable the model admin to select records from their source data, perform operations on the data, segment results, and begin another calculation based on those results.
  3. An equation within a database outline, a calculation script, or a report script that is used to determine a value for a particular member or point in a report.

calculation account
An account used for calculating rations and formulas in reports. The abbreviation for calculation account is CALC account.

calculation code
A code associated with order items, catalog entries, or catalog groups to specify how discounts, shipping charges, sales or use taxes, and shipping taxes should be calculated.

calculation context
A configuration setting that forecasts a promotion in a specific context in order to account for historical levels of promotion on non-promoted products.

calculation framework
A flexible, generic framework provided by the WebSphere Commerce order subsystem, used to implement calculations and apply them to the applicable business objects.

calculation method
A reference task command that implement parts of calculation framework.

calculation rule
A rule that defines how a calculation will be done.

calculation scale
A set of ranges that can be used by a calculation rule. For example, for shipping charges, there can be a set of weight ranges that each correspond to a particular cost. That is, a product that weighs between 0 to 5 kg might cost $10.00 to ship, while a product weighing 5 to 10 kg might cost $15.00 to ship.

calculation script (calc script)
A text file that contains instructions for how specified data sets within a database should be calculated.

calculation specification
In RPG, a specification on which the programmer describes the processing to be done by the program.

calculation strategy
The strategy used to calculate the final score of a scorecard table.

calculation usage
A type of calculation that the calculation framework performs.

CalDAV
An Internet standard allowing a client to access scheduling information on a remote server. It extends the WebDAV (HTTP-based protocol for data manipulation) specification and uses iCalendar format for the data. The access protocol is defined by RFC 4791.

CalDAV account
A calendar that has been set up using CalDAV.

calendar

  1. A list of scheduling dates. Calendars are defined in the database and are mostly assigned to run cycles. Calendars can be used either to identify the dates when job streams or jobs can be run (when used with inclusive run cycles), or when they cannot be run (when used with exclusive run cycles). A calendar can also be designated for use as a non-working days calendar in a job stream. See also exclusive run cycle, holidays calendar, iCalendar, inclusive run cycle, non-working days calendar, run cycle.
  2. A view in the Notes mail database that can be used to manage time and schedule meetings. Users can add appointments, meetings, reminders, events, and anniversaries to the Calendar view.

calendar exception
A partial or full day during which a resource does not work on a project

calendaring
Software that provides users with the ability to schedule appointments and view contacts. Calendaring software generally works in accordance with other time management software and can be synchronized with additional devices (such as smartphones). See also synchronize.

calendar schedule
A schedule that defines both the days and time that processing occurs. For example, one could use a calendar schedule to make sure that a process runs every Tuesday starting between 19:00 and 19:30 and ending between midnight and 00:30.

calender
A process to make paper smooth or glossy by passing it through a series of metal rollers during the last steps of a paper-making machine.

calender cut
Slits, glazed lines, or discolored lines across paper caused when wrinkles pass through the calender rolls.

calibration

  1. The comparison and adjustment of an instrument to a standard of known accuracy.
  2. In capacity planning, the process of refining a model so that it represents the system the user is modeling. The predicted and measured values should match as closely as possible, with no more than a 10% difference for resource utilization, and no more than a 20% difference for response times.

calibration drift
The difference between the as left value of the previous measurement compared to the as found value of the current measurement for an asset.

calibration point
The calibration requirement for each asset function.

caliper
The thickness of forms, usually expressed in thousandths of an inch.

call

  1. To start a program or procedure, usually by specifying the entry conditions and transferring control to an entry point.
  2. A single runtime instance of a voice application.
  3. A physical or logical connection between one or more parties in a telephone call.

callable interface (CI)

  1. The name of the interface program, the definition of the arguments passed to the interface program, and the definition of the data structures passed to the interface program.
  2. The application server to which the QMF session is currently connected. After the connection is made, this server processes all SQL statements.
  3. In query management, the Common Programming Interface (CPI) that includes the definitions of the control blocks and constants used for the interface. See also command interface.

callable service

  1. A program service provided through a programming interface. See also action service.
  2. A set of documented interfaces between the z/OS operating system and higher level applications that want to access functions specified in the Single UNIX Specification and earlier standards. See also system call.
  3. Services that are provided by IMS for use by IMS exit routines. These services provide clearly defined interfaces that allow exit routines to request various functions, such as acquiring storage or finding an IMS control block.

call-accepted packet
A call supervision packet that a called data terminal equipment (DTE) transmits to indicate to the data circuit-terminating equipment (DCE) that it accepts the incoming call. See also call connected packet, call request packet.

call analysis dimension
A category display that shows dispatch types along with location map and dispatch documents.

call attachment facility (CAF)
A DB2 for z/OS attachment facility for application programs that run in TSO or z/OS batch. The CAF is an alternative to the DSN command processor and provides greater control over the execution environment. See also Resource Recovery Services attachment facility.

call back
To invoke a callback or upcall.

callback

  1. Pertaining to a characteristic that tells a remote system whether the local system it tries to access will verify its identity.
  2. In the AIX operating system, a procedure that is called if and when certain specified conditions are met.
  3. A message consumer or an event handler routine.
  4. A way for one thread to notify another application thread that an event has happened.

callback function
Executable code that allows a lower-level software layer to call a function defined in a higher-level layer.

callback handler
A mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the web service security run time for propagation in the web service security header.

callback mechanism
A method for authentication of a voice user who is requesting a system API. This mechanism places a callback request to VoiceLogistics Pro (VLP) to verify whether the user is logged into VLP.

callback registration
The identification and registration of a callback routine.

callback routine
A procedure that is called if and when certain specified conditions are met. This is accomplished by specifying the procedure in a callback list.

callback URL
A URL that is supplied in a call to an API method. The API will call that URL, usually when the API has finished its task.

call center
A center that handles a large number of calls to either take orders or provide customer service.

call center dashboard
A user interface that provides information on how the telesales service representative, shift, or call center is performing.

call chain
A trace of all active routines and subroutines, such as the names of routines and the locations of save areas, that can be constructed from information included in a system dump.

call connected packet
In X.25 communications, a call supervision packet transmitted by a DCE to inform the calling DTE of the complete establishment of the call. See also call request packet, call-accepted packet.

call control
That set of telephony functions that includes call establishment, call transfer, and call disconnection (the program control of a telephone call).

call detail
A list of calls made or received on a device and plan.

call detail record (CDR)
In telephony, a unit of information containing data about a completed call, such as the time the call began, its duration and date, the originating extension, and the number called.

called DLS user
The data link service (DLS) user in connection mode that processes requests for connections from other DLS users. See also Data Link Service.

called NS user
A network service (NS) with which a calling NS user wants to establish a network connection.

called number
See dialed number identification service.

called party

  1. On a switched line, the location to which a connection is established.
  2. Any person, device, or system that receives a telephone call. See also caller.

called program
A program that is the object of a CALL statement combined at run time with the calling program to produce a run unit.

called routine
A program or sequence of instructions that is invoked by another program.

called segment
A segment that is called from another segment. It can be regarded as an extension of the calling segment, but some actions take place at the call and others at the return. Examples of actions are saving the addresses of the current position and the next order on the segment call stack at the call, and restoring those saved addressed at the return.

caller

  1. The requester of a service.
  2. A function that calls another function.
  3. Any person, device, or system that makes a telephone call. See also called party.

caller ID
A feature that displays the phone number of the incoming caller.

call establishment
The complete sequence of events that is necessary to establish a data connection.

call forward
To send an incoming call to a different number.

call forwarding
The process of sending incoming calls to a different number.

callgate
A method for CSM code to request that an agent function is executed. The callgate request contains the function, along with an instruction on which nodes should execute the function. For example, a CSM callgate could request that the agent code checks a user privilege level, and that would only be executed on the active configuration node.

call graph
A graph that uses lines represents the flow of data between subroutines in a program.

call hold
A feature that places callers on hold while the user does something else (or answers another call).

call home
A communication link established between a product and a service provider. The product can use this link to place a call to IBM or to another service provider when it requires service. With access to the machine, service personnel can perform service tasks, such as viewing error and problem logs or initiating trace and dump retrievals.

CALLIN
The logical channel type on which the data terminal equipment (DTE) can receive a call, but cannot send one.

calling
In X.25 communications, pertaining to the location or user that makes a call.

calling address
See network user address.

calling command ID
A numeric identifier for a command that calls an API function.

calling convention
A specified way for routines and subroutines to exchange data with each other.

calling DLS user
In OSI networking, the Data Link Service (DLS) user in connection mode who establishes a data link connection.

calling line identification presentation (CLIP)
An ISDN supplementary service that advises the called party of the caller's number: for example, by displaying it on a telephone display panel.

calling party
On a switched line, the location that originates a connection.

calling program
A program that calls another program.

calling thread
The task in progress in a multitasking environment.

call intercept
A feature that prevents a call from being answered under certain conditions; for example, when the caller's phone number is invalid or unrecognized.

CALL interface
A part of the external CICS interface (EXCI). The CALL interface consists of six commands that allow you to allocate and open sessions to a CICS system from non-CICS programs running under MVS; issue DPL requests on these sessions from the non-CICS programs; and close and deallocate the sessions on completion of the DPL requests.

CALLIO
The logical channel type on which the data terminal equipment (DTE) can send or receive a call.

call level
The position of an entry (program or procedure) in the call stack. The first entry has a call level of 1. Any entry called by a level 1 entry has a call level of 2, and so on.

call level interface (CLI)

  1. An API for database access that provides a standard set of functions to process SQL statements, XQuery expressions, and related services at run time. See also embedded SQL.
  2. A callable application programming interface (API) for database access, which is an alternative to using embedded SQL.

call level number
A unique number assigned by the system to each call stack entry.

call merging
A feature that allows a user who is on a call to accept a second call and merge it into the first, converting the two separate calls into a multi-person conference.

call message queue
A message queue that exists for each call stack entry within a job.

CALLOUT
The logical channel type on which the data terminal equipment (DTE) can send a call, but cannot receive one.

callout

  1. The action of bringing a computer program, a routine, or a subroutine into effect.
  2. A kernel parameter that establishes the maximum number of scheduled activities that can be pending simultaneously.
  3. An outbound message to request services or data from an enterprise application or web service.

callout node
The connection point in a mediation request flow from which a service message is sent to a target. There must be one callout node for each target operation.

callout response node
The starting point for a mediation response flow. There must be one callout response node for each target.

callout table
A kernel table that keeps track of all sleeping processes and the channel on which each is waiting.

CallPath
Software that provides basic computer-telephony integration (CTI) enablement and comprehensive CTI functionality. This includes access to, and management of, inbound and outbound telecommunications.

call profile
In telephony, a set of characteristics that may be used when establishing or manipulating a program-controlled telephone call.

call progress signal
A call control signal transmitted from the data circuit-terminating equipment (DCE) to the calling data terminal equipment (DTE) to indicate the progress of the establishment of a call, the reason why the connection could not be established, or any other network condition.

call redirection notification
In X.25 communications, an optional CCITT-specified facility that informs the caller that the call has been redirected to another DTE.

call request packet
A call supervision packet that a data terminal equipment (DTE) transmits to ask that a connection for a call be established throughout the network. See also call connected packet, call-accepted packet.

call request signal
During the establishment of a connection for a call, a signal that informs the data circuit-terminating equipment (DCE) that a data terminal equipment (DTE) has asked to make a call.

call session
The sequence of events that occurs from the time a call is initiated to the time all activities related to answering and processing the call are completed.

call stack

  1. The ordered list of all programs or procedures currently started for a job. The programs and procedures can be started explicitly with the CALL instruction, or implicitly from some other event.
  2. A list of data elements that is constructed and maintained by the Java virtual machine (JVM) for a program to successfully call and return from a method.

call stack entry
A program or procedure in the call stack.

call supervision packet
A packet used to establish or clear a call at the interface between the data terminal equipment (DTE) and the data circuit-terminating equipment (DCE).

call thread
In the Distributed Computing Environment (DCE), a thread created by a remote procedure call (RPC) server's run time to execute remote procedures. When engaged by an RPC, a call thread temporarily forms part of the RPC thread of the call.

call to action (CTA)
An instruction or a graphic within a piece of marketing content that engages users to click through and continue the conversation.

call transfer
A series of actions that directs a call to another telephone number.

call user data (CUD)
User-specified data that can be placed in an X.25 call request packet to be sent to the adjacent node.

CAM
See content-addressable memory.

camera definition
The set of parameters that enable the software to communicate with the VMS to analyze the data from the camera. The camera definition can also include camera location information, such as latitude and longitude coordinates.

camera ID
A unique numeric identifier for a camera.

camera-ready copy
Copy which is ready for photographic typesetting.

campaign

  1. A marketing effort that is defined by a business objective, a corporate-defined initiative, and a date range.
  2. A planned series of operations including advertisements and suggestive selling techniques, that are pursued to achieve a defined set of business objectives. In the Management Center, campaigns are used to coordinate and aggregate groups of campaign initiatives.

CAMS
See Cloud, Analytics, Mobile, and Social.

CAMSS
See Cloud, Analytics, Mobile, Social, and Security.

Canadian Anti-Spam Legislation (CASL)
Canadian legislation that establishes rules for the sending of commercial electronic messages (CEMs) and the installation of computer programs. CASL also prohibits the unauthorized alteration of transmission data.

Canadian Standards Association (CSA)
A not-for-profit membership-based association dedicated to standards development for business, industry, government and consumers in Canada and the global marketplace. See also CSA International.

cancel
To end a task before it is completed.

cancelability point
A specific point within the current thread that is enabled to solicit cancel requests.

cancel closedown
A closedown in which a program is abnormally terminated either because of an unexpected situation or as the result of an operator command. See also orderly closedown, quick closedown.

cancellation cleanup handler
A function that you can specify to perform an action, such as releasing resources, that occurs after the thread returns from the start routine and calls pthread_exit() or after a cancellation request is performed on the thread.

cancellation point
A function that causes a pending cancellation request to be delivered if the cancellation state is enabled and the cancellation type is deferred.

cancellation state
One of two values, which are either enabled or disabled, that describe whether cancellation requests in the current thread are acted on or held in a pending state. If the value is enabled, the cancellation request is acted on immediately and is based on the current cancellation type. If the value is disabled, the cancellation request is held in a pending state until it is enabled.

cancellation type
One of two values (deferred or asynchronous) that describe how cancellation requests in the current thread are acted on when the cancellation state is enabled. If the value is deferred, the cancellation request is held pending. If the value is asynchronous, the cancel request is acted on immediately, thus ending the thread with a status of PTHREAD_CANCELED.

candidate

  1. An applicant profile that has been submitted in response to either a contingent staff or hybrid request.
  2. An individual who has applied to requisition. A candidate must have expressed an interest in the position using electronic means, must be considered by the potential employer, must have the basic qualifications for the job, and cannot withdraw before an offer is made. Unless a candidate meets each criterion, that candidate is not an internet applicant for record-keeping purposes.

candidate answer
An answer that is generated by the system which is evaluated for correctness and might be returned as the correct answer.

candidate column
A column that is used as a placeholder in a mapping.

candidate endpoint
A known service endpoint that implements an interface for a particular request. The set of candidates is then filtered by the dynamic assembler to select the best endpoint out of all the candidates.

candidate form
An electronic document that captures the full set of candidate data.

candidate form association
The field bindings that allow a user to designate which field values drive (pre-populate) other field values.

candidate form field association
A field association that enables form fields to be content filters. Once a field is selected a subset of available options display.

candidate list
A short list of entities that are potential matches of the incoming identity because they share certain attributes. See also attribute.

candidate role
An aggregation of entitlements that are provided as output of the role mining process (see also access optimizer). It can be considered an "advised role" to be added into the role set of a company or organization.

candidate score
A score based on the comparison of information in a candidate's resume to the job description. The score can be 1 to 1,000. The score can be used as a starting point in a search for qualified candidates, but is not a final indicator of qualifications.

candidate term
A term in a business glossary that is being considered but that has not yet become standard or accepted. See also accepted term, standard term.

candidate threshold
The minimum score at which a particular attribute value must match between the incoming identity and an existing entity to satisfy the resolution rule. See also resolution rule.

candidate tier
A structure that contains multiple layers of candidates within a req folder, based upon sets of automated rules (such as proximity to the req’s location).

candidate type
A category that distinguishes candidates. The standard candidate types are: external, internal, former employee, inactive, temporary/contractor, co-op/intern, and employee referral.

canister
A single processing unit within a storage system.

cannibalization

  1. A process that uses a working component from an aircraft that is not in service and replaces a broken component on an aircraft that is in service.
  2. The negative effect on the sale of a product when a consumer purchases one product instead of another. For example, when a new flavor of yogurt is introduced the increased sales of the new flavor affect the sales of the other flavors of yogurt.

canonical address
In LANs, the IEEE 802.1 format for the transmission of medium access control (MAC) addresses for token-ring and Ethernet adapters. In canonical format, the least significant (rightmost) bit of each address byte is transmitted first. See also noncanonical address.

canonical format
A format for storing hierarchical names that displays the hierarchical attribute of each component of the name. For example, the canonical format for the name Reuben D. Smith/Ottawa/Renovations/CA is: CN=Reuben D. Smith/OU=Ottawa/O=Renovations/C=CA where: CN is the common name, OU is the organizational unit, O is the organization, and C is the region or country code.

canonical host name
A host name that is not an alias.

canonicalization
In computer science, a process that converts data with more than one possible representation to a standard, or canonical, form.

canonical mode
See line mode.

canonical processing
Processing that occurs according to a defined set of rules. Canonical processing is typically used by the shell and simple commands.

canonical XML
A standard format that defines the physical changes that can be made to the document without changing the logical representation of the document.

canvas
An area within a dashboard or workspace that users interact with to create, view, and manipulate content and data.

CAP
See Common Alerting Protocol.

capabilities as a service (CaaS)
The delivery of enterprise functions as IT solutions.

capability

  1. Specific features or characteristics of a piece of software, such as the database version.
  2. A group of functions and features that can be hidden or revealed to simplify the user interface. Capabilities can be enabled or disabled by changing preference settings, or they can be controlled through an administration interface.
  3. A function or feature that is made available by an application, tool, or product.

capability data
In OSI, a confirmed data transfer service provided by the session layer to transfer a limited amount of data outside of an activity. Capability data can be used by two peers to exchange information about their capability to start an activity.

capability exchange
A series of messages that pass between two CICS regions to establish if they can communicate using IP interconnectivity (IPIC). The capability exchange determines the security controls that are applied to the connection, the number of sessions to be made available, and resynchronizes any outstanding work if the connection has previously failed.

capability list
A list of associated resources and their corresponding privileges per user.

capability matrix
A data structure that represents the linguistic capabilities available within multiple language dictionaries, and allows searching for appropriate dictionaries.

capability type
A category, such as "database" or "hardware" that is used to group characteristics of a piece of software. For example, the "hardware" capability type includes characteristics such the BIOS vendor and BIOS version.

capable to promise (CTP)
Pertaining to the ability to fill and deliver an order in a specific time frame.

capacitor
An electronic part that permits storage of electricity.

capacity

  1. The actual number of parallel servers and workstation resources available during a specified open interval.
  2. A measure of how much volume or revenue can be handled by a specific resource.

capacity break
In logistics, a level of shipment size at which the cost changes.

capacity ceiling
The maximum number of operations that a workstation can handle simultaneously.

capacity constraint
A rule that governs the amount of items that can be awarded to a supplier. Using a capacity constraint, business can be awarded to a preferred supplier or the volume of business for a supplier can be limited.

capacity licensing
A licensing model that licenses features with a price-per-terabyte model. Licensed features are FlashCopy, and Metro Mirror and Global Mirror, and virtualization. See also FlashCopy, Metro Mirror, virtualization.

capacity on demand (CoD)
The ability of a computing system to increase or decrease its performance capacity as needed to meet fluctuations in demand.

capacity optimization
See data deduplication.

capacity organization
An organization definition for which all resource capacity information is consolidated.

capacity override
Override of typical capacity plans when additional capacity is required for specific date/time slot combinations to handle planned spikes in demand or shortfalls in resources.

capacity planner
A function that uses information about the system, such as a description of the system's workload, performance objectives, and configuration, to determine how the data processing needs of the system can best be met. The capacity planner then recommends, through the use of printed reports and graphs, ways to enhance performance, such as hardware upgrades, performance tuning, or system configuration changes.

capacity planning

  1. The process of determining the hardware and software configuration that is required to accommodate the anticipated workload on a system.
  2. The process of scheduling the resources required to perform project work.

capacity requirements planning (CRP)
The process of specifying the level of resources (facilities, equipment, and labor force size) that best supports the competitive strategy for production of the enterprise.

capacity type
A predefined value that determines the capacity units for licensing, such as online processors, configured processors, physical disks or physical memory.

Capacity Upgrade on Demand (CUoD)
The capability to permanently activate one or more inactive processors without having to restart the server or interrupt the data flow of the business, through the purchase of a permanent processor activation. This capability adds significant value by enabling a fast and economical way to add capacity for new workloads, enabling the server to adapt to unexpected performance demands. See also activation code, application provisioning, dynamic LPAR, free pool, Hardware Management Console.

CAPI

  1. See computer assisted personal interviewing.
  2. See cryptographic application programming interface.
  3. See Coherent Accelerator Processor Interface.

capital letter
An uppercase letter. See also simple letter.

capital lock (caps lock)
The keyboard function that invokes the uppercase of alphabetic characters, but does not change the response of numeric and other keys. This function is convenient for combining uppercase letters with numbers as in the string “M3C 1H7”. Capital Lock is a toggle key.

capitals lock state
A state that, if activated, will result in the generation of the capital form of all graphic characters on the keyboard for which such a form exists. National standards or usage may determine which graphic characters are affected by this state (see ISO/IEC 9995-1).

cap-M height
The average height of the uppercase characters in a font. This value is specified by the designer of a font and is usually the height of the uppercase M.

capped partition
A logical partition in a shared processor pool whose processor use cannnot exceeds its assigned processing capacity.

caps lock
See capital lock.

caption

  1. A description associated with an identifier. The caption is often used in preference to the identifier in reports to make them more comprehensible.
  2. A National Language Support-enabled text string in a policy expression that describes the policy.
  3. Text associated with, and describing, a table or figure.

capture

  1. The process by which an acquirer receives payment from the customer's financial institution and remits the payment. A "capture" is the guarantee that the funds are available and that the transfer will take place.
  2. The process by which some printers can save downloaded fonts as temporary printer-resident fonts.
  3. To digitize an image into the video memory of the M-Video Capture Adapter.
  4. In SQL replication, event publishing, and Q replication, to gather changes from a source database. These changes can come from the DB2 log or journal or from source transactions in a relational database that is not a DB2 database.

Capture control server
In SQL replication, a database or subsystem that contains the Capture control tables, which store information about registered replication source tables. The Capture program runs on the Capture control server.

capture data
The business information collected by CICS for inclusion in an event.

capture device
See packet capture appliance.

captured UCB
A virtual window into the actual unit control block (UCB). Captured UCB resides in private storage below 16 MB. All the virtual windows on the actual UCB view the same data at the same time. Only actual UCBs above 16 MB are captured. See also actual UCB, unit control block.

capture file
A file used by a communication program to capture, or record, data being transmitted from a remote system or device.

capture filter
A software filter that collects the visitor-site traffic stream data.

Capture latency
In SQL replication, an approximate difference between the time that source data was changed and the time that the Capture program made the data available to the Apply program by committing the data to a CD table. Capture latency is a subset of the end-to-end latency in a replication configuration. See also Apply latency, end-to-end latency, latency, Q Apply latency, Q Capture latency.

capture point
A point in application logic or CICS system activity where an event is generated. Capture points are defined in a capture specification.

Capture program
In SQL replication, a program that reads database log or journal records to capture changes that are made to DB2 database source tables and store them in staging tables. See also Apply program, Capture trigger, Q Capture program.

Capture schema
In SQL replication, a name that identifies the control tables that are used by an instance of the Capture program.

capture specification
A capture specification provides the information that CICS will use to detect an event within an application or in the system. The capture specification can include the capture point, capture data, and predicates for filtering and is defined in the event binding file.

capture stream
The flow of hits (request/response combinations) through a system.

capture to file
To save data into a file.

Capture trigger
In SQL replication, a mechanism that captures delete, update, or insert operations that are performed on source tables other than DB2 source tables. See also Apply program, Capture program.

carbon cap
A limit on carbon emissions.

carbon copy
A process that allows a shipper to generate a copy of an outbound data exchange transaction, which is sent to other organizations.

carbon credit
A transferrable permit that allows an organization to release one ton of carbon dioxide into the environment. The implementation of carbon credits is an attempt to reduce the amount of greenhouse gases that are being produced.

carbon emission sink
Carbon that is sequestered in forestry management, agricultural management, and other land management.

carbon footprint
The amount of greenhouse gas that a person or organization is responsible for producing. A smaller carbon footprint is associated with having less detrimental effect on the environment.

Carbon Responsibility Factor (CRF)
The percentage of a vehicle's carbon emissions that are attributable to the supply chain.

carbon sequestration
The removal and storage of carbon dioxide from the atmosphere, through natural or man-made means.

card

  1. A Wireless Markup Language (WML) document that provides user-interface and navigational settings to display content on mobile devices. See also deck.
  2. An electronic circuit board that is plugged into a slot in a system to give it added capabilities.
  3. A record of information attached to an item. An item can have multiple cards.
  4. In the Map Designer, a data object. There are two types of map cards: input and output.

card column
The column from a punch card that was used in early computers to read information. Punch cards typically contained 80 columns of 12 rows.

CardDAV
See Card Distributed Authoring and Versioning protocol.

Card Distributed Authoring and Versioning protocol (CardDAV)
An address book client or server protocol designed to allow users to access and share contact data on a server. The CardDAV protocol was developed by the IETF and was published as RFC 6352 in August 2011. CardDAV is based on WebDAV, which is based on HTTP, and it uses vCard for contact data.

card enclosure
The area in the system that contains the logic cards.

card image
A one-to-one representation of the hole patterns of a punched card; for example, a card image might be a matrix in which a one represents a punch and a zero represents the absence of a punch.

cardinality

  1. For OLAP data sources, the number of members in a hierarchy. The cardinality property for a hierarchy is used to assign solve orders to expressions.
  2. In information analysis, a measure of the number of unique values in a column.
  3. The number of rows in a database table or the number of elements in an array. See also associative array.
  4. For relational data sources, a numerical indication of the relationship between two query subjects, query items, or other model objects.
  5. The number of elements in a set.

card object
An object used in the TX Programming Interface that represents an input or output card of a map in program memory.

Card Serial Number (CSN)
A unique data item that identifies a hybrid smart card. It has no relation to the certificates installed in the smart card.

card type
A 4-digit identifier printed on the logic card.

card verification value authorization code (CVV auth code)
A separate authorization code that might be returned in addition to a credit card authorization code when a financial institution approves a credit card transaction.

career pathway
An analytics solution that helps high school and college students achieve their career aspirations by aligning the learning with the job market in a personalized way. Further, it supports employees’ career growth and transition in corporations.

care management platform
A software platform that is used to manage care across the care continuum. It can identify clients in need of care, assess their needs, establish the appropriate care plan to support their needs, and manage the care and monitor results and outcomes.

CARMA
See Continuous Association Rule Mining Algorithm.

carousel

  1. A revolving type of contained storage system that brings locations to the operator.
  2. An interface item that consists of a series of thumbnails or points with directional indicators on either side of the series that allows the user to scroll through options without presenting them all on screen simultaneously.

car probe data
Data from in-vehicle sensors, for example speed and braking information. See also contextual data.

carriage control character
A character that is used to specify a write, space, or skip operation. See also control character.

carriage control data set
A data set whose records are preceded by carriage controls.

carriage control print job
A print job whose records are preceded by carriage controls.

carriage return

  1. A keystroke generally indicating the end of a command line.
  2. The action that indicates that printing is to be continued at the left margin of the next line. A carriage return is equivalent to the carriage return of a typewriter.
  3. The movement of the printing position or display position to the first position on the same line.

carriage return character
A character that in the output stream indicates that printing should start at the beginning of the same physical line in which the carriage-return character occurred.

carrier

  1. A continuous frequency (a pulse train, or an electric or electromagnetic wave) that may be varied by a signal bearing information to be transmitted over a communication system.
  2. The backing material for labels. Labels consist of the printable medium, the adhesive, and the carrier.
  3. A transportation service provider that provides delivery and shipping services between buyers, sellers, and customers.
  4. A service provider that provides the telecom services to customers.

carrier hole
One of many holes in the side margins on continuous-forms paper. When placed on the tractor pins, the holes maintain paper alignment and registration, and control the movement of the paper.

carrier ID
A code that identifies a carrier organization in regions outside North America, which do not use a SCAC as an identifier. See also Standard Carrier Alpha Code.

carrier management system
A network management product that a communication common carrier provides to a customer; this product monitors and manages the telecommunication equipment that the communication common carrier provides for the customer's network.

carrier PRO number
A reference number that the carrier can assign to each shipment.

carrier sense
In a local area network, an ongoing activity of a data station to detect whether another station is transmitting.

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
An arbitration protocol in which multiple stations access the network without explicit coordination, avoiding contention by checking for other signals (sensing the carrier) and deferring if a signal is already present. Should two signals collide, each station detects the collision and transmits again after a random amount of time.

carrier service capacity
The unit of measure that is maintained for a carrier service item. For example, the unit of measure could be defined as truck space for delivery items.

carrier signal
A signal with a constant frequency that can be modulated to carry a data signal.

carrier strip
The half-inch side margin of continuous forms containing the carrier holes.

carrier type
A method for classifying carriers as primary, secondary, or backup carriers.

CART
See command and response token.

cart bar code
A number or bar code stuck on a cart that is used to identify a specific cart.

Cartesian product
The resulting set from performing a multiple-table query without any specified joining conditions among the tables.

carton
A standard container with specific dimensions used in both storage and shipping of loose items.

carton flow rack
Storage rack consisting of multiple lanes of gravity fed carton flow conveyors. The lanes are replenished from the rear. The material flows through the rack and is picked from the front.

cartonization
The process by which loose items from a common order or common customer are placed in standard cartons in preparation for shipment.

carton manifest
The list of cartons in a parcel carrier shipment.

cartridge eject
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the act of physically removing a tape cartridge, usually under robot control, by placing it in an output station. The software logically removes the cartridge by deleting or updating the tape volume record in the tape configuration database (TCDB). For a manual tape library, cartridge eject is the logical removal of a tape cartridge from the manual tape library by deleting or updating the tape volume record in the TCDB.

cartridge entry
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the process of logically adding a tape cartridge to the library by creating or updating the tape volume record in the tape configuration database (TCDB). The cartridge entry process includes the assignment of the cartridge to the scratch or private category in the library.

cartridge loader
A feature that allows a user to place tape cartridges in a loading rack for automatic loading. Manual loading of single tape cartridges is also possible.

Cartridge System Tape
The base tape-cartridge medium used with the IBM 3480 Magnetic Tape Subsystem and IBM 3490 Magnetic Tape Subsystem.

CAS

  1. See common analysis structure.
  2. See channel associated signaling.
  3. See configuration auditing system.
  4. See China Association for Standards.

cascade

  1. In AIX, to arrange in a series.
  2. To connect in a series or in a succession of stages so that each stage derives from or acts upon the product of the preceding stage. For instance, network controllers might be cascaded in a succession of levels in order to concentrate many more lines than a single level permits.
  3. In certain printers, the layout of procedure windows on the operator console. Each new procedure window overlays the previous one, with only the previous window's title bar in view.
  4. An operation that propagates the exact same operation to all dependant objects.

cascade delete
A process by which the DB2 database manager enforces referential constraints by deleting all descendent rows of a deleted parent row.

cascaded initiator
An intermediate node in a transaction program network that uses the two-phase commit protocol.

cascaded menu
A menu that appears from, and contains choices related to, a cascading choice in another menu.

cascaded transaction
A transaction that spans nodes and is coordinated by Resource Recovery Services (RRS). cascaded multisystem transaction. A transaction that spans systems in a sysplex and is coordinated by Resource Recovery Services (RRS).

cascaded UR family
A collection of nodes consisting of a unit of recovery (UR) and its descendants.

cascading choice
A choice on a menu that, when selected, presents another menu with additional related choices.

cascading delete
The process of deleting rows from a child table when the foreign key is deleted from the parent table. When any rows are deleted from the primary key column of a table, cascading deletes, if enabled, delete identical information from any foreign-key column in a related table.

cascading menu
A submenu of related choices that is invoked when the parent item is selected.

cascading permission
A permission of a parent folder in the content repository that has been propagated to its child objects.

cascading prompt
A prompt that uses values from a previous prompt to filter the values in the current prompt or pick list.

cascading replication
A replication topology in which there are multiple tiers of servers. A peer/master server replicates to a small set of read-only servers which in turn replicate to other servers. Such a topology off-loads replication work from the master servers.

cascading resource
A resource that can be taken over by more than one node. A takeover priority is assigned to each configured cluster resource group on a per-node basis. In the event of a takeover, the node with the highest priority acquires the resource group. If that node is unavailable, the node with the next-highest priority acquires the resource group, and so on.

Cascading Style Sheets (CSS)
A language that defines a hierarchical set of style rules for controlling the rendering of HTML or XML files in browsers, viewers, or in print.

Cascading Style Sheets positioning (CSS-P)
Use of Cascading Style Sheets to position web page elements using pixel locations or locations relative to other elements.

cascading switches
Switches that are interconnected to build large fabrics.

case

  1. The information that is contained within a database that pertains to a particular investigation.
  2. A container that holds a specified quantity of identical items (SKU) as packaged by a vendor. Cases are identified by license plate number and are generally put away into storage, in their original condition until picked.
  3. A group of related activities that address a specific business situation. The user or predefined conditions, instead of a defined flow, determines the sequence in which activities are performed. See also case type, process.
  4. The basic unit of analysis. In a data set based on a simple survey, a case generally corresponds to a respondent.

CASE
See Computer Assisted Software Engineering.

case allowance
A discount of a fixed dollar amount on the price of a case of a product. For example, the manufacturer offers a reduction in the price per case of product in order to offload inventory quickly.

case analytics tool
A tool that can be used to monitor and manage daily business operations. The tools can also provide historical trend information that can be used to adjust future operations as needed.

case clause
In a C or C++ switch statement, a CASE label followed by any number of statements.

case code
See factory carton code.

case cube
The volume of a product when packed in a case form.

case data
The data that is recorded for each case. In a market research survey, the case data stores the answers given by each respondent.

Case Data Model (CDM)
A model that defines access to the case data that is stored in a standard database or in a proprietary format.

case data source component (CDSC)
A data source component (DSC) that exposes case data to the Provider.

case document
A document that is associated with a case and made available from the Documents tab.

CASE expression
An expression that is selected based on the evaluation of one or more conditions.

case folder
A folder that holds information pertaining to a case. The case folder stores case related information obtained from search queries. A case folder contains the tasks, history, and comments that are associated with the case.

case history
The history of a case that shows information such as creation dates, comments, and so forth. Event log data is included in the case history, which uses the same security as is applied to case instances.

case ID
A unique identifier for a case or carton stored in the warehouse.

case identifier
A predefined property assigned to a case. The case identifier is displayed at the top of the Case Information widget with a link to open the case in the Case Details page. For example, a case type named Credit Application with a unique identifier of EXPL_CreditApplication might have a case identifier of EXPL_CreditApplication_00000010001.

case label

  1. The word case followed by a constant expression and a colon. When the selector is evaluated to the value of the constant expression, the statements following the case label are processed.
  2. In Pascal, a value or range of values that comes before a statement in a CASE statement branch. When the selector is evaluated to the value of a CASE label, the statement following the case label is processed.

case list cost
The manufacturer's cost of a product in case form.

case management master group
A group that controls access to a case management object store.

case operation
An operation that is used to perform a case-related action like creating a case by using a specified case type or adding a comment to a current case.

case pack
The number of units of a product when packed in case form.

case pick
The process of picking unbroken cases from bulk case storage for shipment.

case sensitive
Pertaining to the ability to distinguish between uppercase and lowercase letters.

case-sensitive search
A search in which a result will be found for the search string only if the particular combination of uppercase and lowercase letters are exactly matched.

case status
A label that is applied to a case by the Data Collection system that indicates its current level of completion.

case synchronizer utility
A utility that can be run to update existing instances to match the changes that were made after modifying a solution after it is deployed.

case title property
The specific title property that can be controlled on an individual case type. By default, the case title property is Case Identifier.

case type

  1. See process.
  2. The definition of the activities that must be completed to address a specific type of business situation. For each activity, the case type specifies the document types that are required to support the activity, the user interface in the activity, and the teams that must complete the activity. Case types make up a case. See also case.

case volume lift percentage
The percentage of cases that will be sold as a result of a promotion.

case weight (CW)
In cultural sorting, the combined weight value of case, subscripting, superscripting, fractions, and other factors. For example, the lowercase letter a precedes the uppercase letter A, and middle Arabic shapes precede final Arabic shapes. See also alphanumeric weight, diacritical weight, indifferent weight, level 3, mark weight, special weight.

cash-and-carry
A delivery method by which orders are fulfilled directly from a store and paid in full at the time of transaction. Cash-and-carry transactions require no additional processing.

cashback
A service that provides customers with the ability to receive cash in addition to the goods that they purchased in a store using an alternate payment method. The total amount of the transaction, which includes the cost of the purchased goods and the amount of the cash received, is debited from the customer's account. For example, a customer might charge $37 to their credit card for a $17 item in order to get that item and $20 back from the store.

CASI
See computer assisted self-interviewing.

CA-signed certificate
A certificate that is signed using a key maintained by a certificate authority. Before issuing a certificate, the certificate authority evaluates a certificate requestor to determine that the requestor is the certificate holder referenced in the certificate.

CASL
See Canadian Anti-Spam Legislation.

CAS processor
See common analysis structure processor.

cassette
In cut-sheet printers, a removable container for a supply of paper.

cast

  1. In programming languages, an expression that converts the value of its operand to a specified type.
  2. A database object and an operator for converting data from one data type to another. Built-in data types have built-in casts to compatible data types within database server. See also explicit cast, implicit cast, user-defined cast.

cast expression
An expression that converts or reinterprets its operand.

cast function
A function that is used to convert instances of a source data type into instances of a different target data type. In general, a cast function has the name of the target data type and has one single argument whose type is the source data type. Its return type is the target data type.

casting
Converting a value with a given data type to a different data type or to the same data type with a different length, precision or scale. See also downcasting, upcasting.

CAS tone
See Customer Premise Equipment Alerting Signal tone.

cast operator
An operator that is used for explicit type conversions.

castout
The process of writing changed pages from a group buffer pool to disk.

castout owner
The DB2 member that is responsible for casting out a particular page set or partition.

cast support function
A function that is used to implement an implicit or explicit cast by performing the necessary operations for conversion between two data types.

casual connection
In an APPN network, a connection between an end node and a network node with different network identifiers.

CAT
See Customer Analysis Tool.

catalog

  1. A container for one or more offerings that a user can request.
  2. A container that stores items. An item can belong to only one catalog. Each catalog must be associated with at least one hierarchy, the primary hierarchy, and can be associated with one or more secondary hierarchies. See also item.
  3. A collection of apps.
  4. A repository for storing specifications for builds, reference structures, connections, and other components.
  5. A directory of files and libraries, with reference to their locations.
  6. A data set that contains information about other data sets.
  7. A collection of services.
  8. To enter information about a data set or a library into a catalog.
  9. See process library.
  10. The highest level of the category hierarchy. All of the groupings that exist below the catalog are referred to as categories.
  11. To specify the record class and file plan location when declaring a record.
  12. A container that, depending on the container type, holds processes, data, resources, organizations, or reports in the project tree.
  13. A collection of tables and views that contains descriptions of objects such as tables, views, and indexes.
  14. A selection of wireless devices and plans that are configured in the application and made available for purchase.
  15. A group of connected external identity repositories. See also store.

catalog asset store
A collection of catalog artifacts that creates a virtual catalog. See also asset store, storefront asset store.

catalog cleanup
A process that deletes entries for which volumes are no longer available; catalog cleanup also allows deletion of a catalog even though it is not empty.

catalog connector
A catalog entry, either a user catalog entry or a catalog connector entry, in the master catalog that points to a user catalog's volume (that is, it contains the volume serial number of the direct access volume that contains the user catalog).

cataloged data set
A data set that is represented in an index or hierarchy of indexes that provide the means for locating it.

cataloged procedure
A set of job control language (JCL) statements that has been placed in a library and that is retrievable by name.

catalog entry
An object in an online catalog. An entry has a name, description, list price, and other details. The entry can be as simple as a SKU; it may also be a product that is automatically broken down into its component items such as a bundle or package. See also list price.

catalog filter
A filter that controls product entitlement by dividing catalogs into subsets as defined by the business owner. Catalog filters can also be used as one of the price rules conditions when determining the prices for the set of catalog entries that a set of customers are entitled to.

Catalog Filter and Pricing tool
A Management Center feature that is used to create and manage catalog filters, price lists, and price rules.

catalog group
A collection of one or more catalog entries or catalog groups which create a navigational hierarchy for an online catalog.

catalog index
A searchable index file that is built from the item data in an order management database. This index provides fast search capability on catalog items.

catalog member
The member in an installation that acts as an index to the information stored in the container server members and supports the data grid.

catalog node
See catalog partition.

catalog organization
An organization definition for which an item master is defined.

catalog partition
In a partitioned database environment, the database partition where the catalog tables for the database are stored. Each database in a partitioned database environment can have its catalog partition on a different database partition server. The catalog partition for a database is automatically created on the database partition server where the CREATE DATABASE command is run.

catalog recovery area (CRA)
An entry-sequenced data set (ESDS) that exists on each volume owned by a recoverable catalog, including the volume on which the catalog resides. The CRA contains copies of the catalog's records and can be used to recover a damaged catalog.

catalog request
One or more offerings that have been ordered by a service requester. Catalog requests are fulfilled via the activities of the Service Catalog approval workflow.

catalog rule
A rule that pertains to catalog management.

Catalog Search Interface
In z/OS, a particular application programming interface (API) that allows programs written in assembler or a high-level language to read information from a catalog.

catalog server
One of the four member types in an installation, the catalog server member acts as an index to the information stored in the container server members and supports the data grid.

catalog service
A service that controls placement of shards and discovers and monitors the health of containers.

catalog service domain
A highly available collection of catalog service processes.

Catalogs tool
A Management Center feature that can be used to manage catalogs, categories, catalog entries, merchandising associations, product attributes and attachments in your store.

catalog table
A table that is automatically created in the DB2 database catalog when a database is created. Catalog tables contain information about a database and its objects. See also catalog view.

catalog view

  1. In DB2 for Linux, UNIX, and Windows, a SYSCAT or SYSSTAT view on the catalog table.
  2. One of a set of views automatically created when a database is created. Catalog views contain information about the database and the objects in that database. Examples of information about the database are definitions of database objects and information about the authority that users have on these objects. See also catalog table.

catch block
A block associated with a try block that receives control when an exception matching its argument is thrown. See also try block.

catcher
A server that service personnel use to collect and retain status data that other machines, such as the TotalStorage Enterprise Storage Server (ESS), send to it. See also catcher telephone number.

catcher telephone number
The telephone number that connects the ESS to the support-catcher server and enables the ESS to receive a trace or dump package. See also catcher, Remote Technical Assistance and Information Network.

catching message intermediate event
An intermediate event that is triggered when a specific message is received. See also intermediate event.

catch-up
In a remote journal network, the process of replicating journal entries that existed in the journal receivers of the source journal before the remote journal was activated.

catch-up mount
A local mount that z/OS UNIX automatically issues to every other system's physical file system that is running sysplex-aware for that mode (read-write or read-only) when a file system mount is successful on a system in a shared file system environment.

catch-up processing
In an RSR environment, the process by which tracked log data is used to make all recoverable resources (for example, shadow databases) current with those resources on the active IMS.

catchup state
In high availability disaster recovery, a state in which the standby database might not have applied all logged operations that occurred on the primary database. In this state, the standby database retrieves and applies previously generated log data to synchronize with the primary database. There are two types of catchup states: local and remote.

categorical question
A question that has a limited number of categories with a choice of possible answers. Categorical questions can be single response or multiple response.

categorical response
A response that has a limited number of categories that represent the possible responses. Categorical responses can be single response or multiple response.

categorical variable
A variable that has a limited number of distinct values or categories, such as a variable that is based on a question that has a predefined set of answers. Categorical variables can be single response or multiple response.

category

  1. A type class that is used to organize types in a type tree in the Type Designer. Categories organize types that have common properties.
  2. An optional grouping of messages that are related in some way. For example, messages that relate to a particular application might be included in a single category. See also message.
  3. A word, phrase, or number used to group documents in a view.
  4. A classification of an item. Hierarchies are made up of categories and items. Items in a catalog can be associated to one or more categories from the specifications of the catalog. Items can also be unassigned, which is their default state, which means they are not in any category yet. Every hierarchy has exactly one root category. Every category can have any number of additional categories within it, called sub-categories. See also container, hierarchy.
  5. A property that is set on an element of the business object model (BOM) and can be applied to business classes and filtered in business rules. This property allows the user to specify whether a business class and its members are visible in a rule.
  6. A group within a system of classification whose contents share similar properties. See also category page.
  7. A logical subset of volumes in a tape library. A category can be assigned by the library manager (for example, the insert category) or by the software (such as, the private or scratch categories).
  8. One possible answer in a set of answers that are defined in the category list of a categorical or grid question.
  9. A set of catalog items in a number of different hierarchical and searchable groupings.
  10. A set of items that are grouped according to a specific description or classification. Categories can be different levels of information within a dimension.
  11. An area of spend. Categories can then each have subcategories. For example, hardware, software, IT services, and telecommunications are all subcategories within the IT category.
  12. A closed-ended response to a question or item in a shared list.
  13. A word or phrase that classifies and organizes terms in the business glossary. A category can contain other categories, and it can also contain terms. In addition, a category can reference terms that it does not contain. See also business glossary.
  14. A set of catalog items in a number of different hierarchical and searchable groupings.
  15. A classification of elements for documentation or analyses.
  16. A container that groups a set of related records within a file plan.
  17. The recommended security specifications needed for both the CICS transaction definitions and the corresponding RACF profiles.
  18. A container used in a structure diagram to group elements based on a shared attribute or quality.

category 1 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are never associated with a terminal: that is, they are for CICS internal use only and should not be invoked from a user terminal. For this reason, CICS does not perform any security checks when it initiates transactions in this category for its own use.

category 2 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either initiated by the terminal user or are associated with a terminal. You should restrict authorization to initiate these transactions to user IDs belonging to specific RACF groups.

category 3 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either invoked by the terminal user or associated with a terminal. All CICS users, whether they are signed on or not, require access to transactions in this category. For this reason, they are exempt from any security checks and CICS permits any terminal user to initiate these transactions. Examples of category 3 transactions are CESN and CESF, to sign on and off, respectively.

category attribute
An attribute instance on a category. The attribute is defined in the specification of the owning hierarchy or by a secondary specification associated to that category. See also attribute instance.

category bag
A container for keyed reference pairs used to aid discovery of a published web service. Each category bag includes a name and the value of a category to which the published item belongs.

category code
A value that uniquely identifies every category within a dimension. See also member unique name.

category count
A measure that records the number of unique, non-zero and non-missing values for the categories in the dimension and level specified by the user.

category distribution
The placement of categories among the columns of a category list that is displayed in more than one column or row.

category field
An additional field that is created by a buyer user to gather more information about categories and items. A category property is specific to the category for which it is created and applies only to items of that category.

category filter
A filter that is set on a business rule and removes the business element to which a category was attached from the completion menu.

category list
A list of predefined answers that are in a categorical or grid question. The respondent selects the answers to the question from this list. For example, a list of brand names is a category list.

category management

  1. The process of determining the price, promotions, assortment, and the shelving of a product category.
  2. A systematic approach that a sourcing team uses to allocate and then distribute spend. It involves facilitating solutions that support both category needs and strategic business objectives.

category manager

  1. A person responsible for all merchandising activities for a category of products, including price, promotion, placement, and assortment.
  2. A defined role in WebSphere Commerce that manages the category hierarchy by creating, modifying, and deleting categories. The category hierarchy organizes products or services offered by the store. The category manager also manages products, expected inventory records, vendor information, inventory, and return reasons.

category page
A web page in an online store that displays product categories. Category pages connect customers to child category pages or to products that belong to the selected category. See also category, child category.

category plan
All promotions for one category that intersect in time with a specified date range.

category recommendation
A recommendation based on the category of a target product.

category replication
The answer portion of categorical, grid, and numeric grid Looks. The category replication controls which category rows in a Look are repeated when the Look is applied to a question.

category schema
A reusable group of categories and subcategories. Assets can be organized in repositories according to their category schemas.

category set
A subset of the categories in a dimension, either from a single level or from different levels in the same dimension. See also set.

category-specific item attribute
An attribute instance that applies to an item because of the presence of that item in a given category. A secondary specification with additional attributes is applied to that category, and all items in that category gain those extra fields. See also attribute instance.

category tree

  1. A hierarchy of categories. See also taxonomy.
  2. See hierarchy.

category viewer
The portion (right pane) of the Categories diagram that shows the category hierarchy of the selected dimension and provides a mechanism for manipulating the categories.

cathode ray tube (CRT)
A vacuum tube in which a beam of electrons can be moved to draw lines or to form characters or symbols on its luminescent screen.

CATI
See computer assisted telephone interviewing.

cause code
In X.25 communications, a 1-byte code included in clear-indication and reset-indication packets that indicates the origin of the packet and the reason for sending it.

CAW

  1. See channel address word.
  2. See cube adjusted weight.

CBC
See cipher block chaining.

CBD
See component-based development.

CBIC
See control blocks in common.

CBJ
See Class Broker for Java.

CBM

  1. See component business modeling.
  2. See component business model.

CBPDO
See Custom-built Product Delivery Option.

CBR

  1. See content-based retrieval.
  2. See content based routing.

CBS
See composite business service.

CBX
See computerized branch exchange.

CC
See change control.

CC&CA
See Corporate Citizenship & Corporate Affairs.

CCA
See Common Cryptographic Architecture.

C-CAA
See C/370 common anchor area.

CCB

  1. See command control block.
  2. See conversation control block.
  3. See connection control block.

CC-compatible SnapShot
See concurrent copy-compatible snapshot.

CCCS
See Common Customs Classification System.

CCDT
See client channel definition table.

CCD table
See consistent-change-data table.

CCF

  1. See channel control function.
  2. See Common Connector Framework.

CCI

  1. See common client interface.
  2. See Common Console Interface.

CCIN
See custom card identification number.

CCITT
See Comité consultatif international télégraphique et téléphonique.

CCL
See common communication layer.

CCM
See change and configuration management.

CCOW
See Clinical Context Object Workgroup.

CCP
See Configuration Control Program.

CCR
See channel command retry.

CCRA
See Cloud Computing Reference Architecture.

CCS

  1. See coded character set.
  2. See Common Communications Support.
  3. See console communication service.
  4. See common channel signaling.

CCSID
See coded character set identifier.

CCSID 65534
See coded character set identifier 65534.

CCSID 65535
See coded character set identifier 65535.

CCSID resource
A representation of the various elements associated with a CCSID in a system in a machine readable form.

CCSID resource repository
An organized collection of CCSID resources that are maintained by a service provider in a system.

CCTL

  1. See coordinator control subsystem.
  2. See coordinator controller.

CCTV
See closed-circuit television.

CCU
See central control unit.

CCW
See channel command word.

CD

  1. See continuous delivery.
  2. See compact disc.

CDA
See Common Data Administration.

CDB

  1. See conversation data block.
  2. See communications database.

CDD

  1. See common data set descriptor record.
  2. See customization definition document.

CDE

  1. See Common Desktop Environment.
  2. See component descriptor editor.

CDF
See channel definition file.

CDI
See Contexts and Dependency Injection.

CDL
See configuration deviation list.

CDLC
See Channel Data Link Control protocol.

CDLC protocol
See Channel Data Link Control protocol.

CDLI
See Common Data Link Interface.

CDM
See Case Data Model.

CDMA
See code division multiple access.

CDMF
See Commercial Data Masking Facility.

CDNM session
See cross-domain network manager session.

CDP

  1. See collateral damage potential.
  2. See Continuous Data Protection.

CDPD
See cellular digital packet data.

CDR

  1. See call detail record.
  2. See critical design review.

CD-R
See compact disc recordable.

CDRA
See Character Data Representation Architecture.

CDRFS
See CD-ROM file system.

CDRM
See cross-domain resource manager.

CD-ROM
See compact-disc read-only memory.

CD-ROM drive
High-capacity read-only memory in the form of an optically read compact disc.

CD-ROM file system (CDRFS)
An implementation of a read-only local file system that can be stored on CD-ROM media, write-protected CD-RW media, or DVD-ROM media.

CDRSC
See cross-domain resource.

CDS

  1. See Cell Directory Service.
  2. See central directory server.
  3. See couple data set.
  4. See control data set.

CDSA
See CICS dynamic storage area.

CDSC
See case data source component.

CDS clerk
The software that provides an interface between client applications and Cell Directory Service (CDS) servers.

CDS control program (CDSCP)
In the Distributed Computing Environment (DCE), a program that Cell Directory Service (CDS) administrators use to control CDS servers and clerks.

CDSCP
See CDS control program.

CDSQ serialization
A technique that serializes DFSMShsm control data sets (CDSs) with a global enqueue product, such as global resource serialization (GRS).

CDSR serialization
A technique that serializes DFSMShsm control data sets (CDSs) with volume reserves.

CDSTL
See connect data set to line.

CDT

  1. See common development test.
  2. See class descriptor table.

CD table
See change-data table.

CEB
See conditional end bracket.

CEC
See central electronics complex.

CECP
See country extended code page.

CEEDUMP
A dump of the run-time environment for Language Environment and the member language libraries. Sections of the dump are selectively included, depending on options specified on the dump invocation. This is not a dump of the full address space, but a dump of storage and control blocks that Language Environment and its members control.

CEE switch
See Converged Enhanced Ethernet switch.

CEI
See Common Event Infrastructure.

CEI event
An event generated over the Common Event Infrastructure (CEI) and logged in a CEI data store.

ceiling
The smallest integer that is greater than the floating-point number under consideration. For example, the ceiling of 3.5 is 4.

ceiling price
The cut-off value entered by the supplier for a bid in forward auction.

ceiling rate
The maximum price allowed for a product or a service.

CEI target
An application server or server cluster where the Common Event Infrastructure (CEI) server is enabled.

CEL
See Command Execution Language.

cell

  1. The rectangular juncture of a horizontal row and a vertical column. Examples include the cells of an electronic spreadsheet and the cells utilized by an XmRowColumn widget in an AIXwindows graphic interface.
  2. A group of WebSphere Application Server nodes in a single administrative domain that is controlled by a deployment manager application.
  3. One or more processes that each host runtime components. Each has one or more named core groups.
  4. A logical grouping of users, computers, data, and other resources that share either a common purpose or a common level of trust.
  5. In asynchronous transfer mode (ATM), a medium access control (MAC) protocol data unit (PDU) of fixed size.
  6. A group of managed processes that are federated to the same deployment manager and can include high-availability core groups.
  7. In mobile computing, an area of radio coverage that is transmitted from a base station. See also base station, radio.
  8. A subsection of a road link. A link can be divided into a series of cells, for example to select the range of traffic cameras. A cell can terminate at a node or at the next cell. See also link, node.
  9. A list of identifiers that is the result of data processing and manipulation. For example, a Select process can generate an output cell consisting of males between the ages of 25 and 34.
  10. In a multidimensional clustering table, a unique combination of dimension values. Physically, a cell is made up of blocks of pages whose records all share the same values for each dimension column.
  11. A single cartridge location within an Automated Tape Library Dataserver (ATLDS). See also rack number, slot.

cell code
An identifier for each segment in a campaign flowchart or in the target cell spreadsheet.

cell cube
In MSS, a block of 32 cartridge cells, four X addresses by four Y addresses by two Z addresses.

Cell Directory Service (CDS)
A Distributed Computing Environment (DCE) component that manages a database of information about the resources within a cell. See also Global Directory Service.

cell phone
A portable telephone that operates on a cellular radio network instead of a traditional wired network over a fiber optic network or the Internet. See also mobile phone.

cell-relative name
See local name.

cell-scoped binding
A binding scope where the binding is not specific to, and not associated with any node or server. This type of name binding is created under the persistent root context of a cell.

cell security
The access control level assigned to a single cell in a cube.

cell tower
See base station.

cellular digital packet data (CDPD)
A standard for transmitting data over a cellular network that places the data in digital electronic envelopes and sends it at high speed through underused radio channels or during pauses in cellular phone conversations. See also packet switching.

cell UUID
A Universally Unique Identifier for a cell that is based on the unique system ID of the workstation and a time stamp.

Celsius
Pertaining to a thermometric scale at which water boils at 100 degrees and freezes at 0 degrees in standard atmospheric pressure.

CEM
See commercial electronic message.

CEMA
See Central Europe, Middle East, and Africa.

center cell
The only cell in a star topology with the ability to make autonomic decisions.

Center for the Information of Industry data format (CII data format)
Data format that provides the Japanese syntax definition for EDI messages within Sterling B2B Integrator.

centering identifier
The category item with which all other identifiers have interacted. The centering identifier is the central item in an investigation.

center of competency (COC)

centimeter (cm)
One hundredth of a meter; 0.39 inch.

central control unit (CCU)
The communication controller hardware unit that contains the circuits and data flow paths needed to execute instructions and to control controller storage and the attached adapters.

central data warehouse
The component of Tivoli Enterprise Data Warehouse that contains the cleansed historical data. Data in the central data warehouse is derived from operational data, although operational data is not stored directly in the central data warehouse.

central data warehouse ETL
In Tivoli Enterprise Data Warehouse, the extract, transform, and load (ETL) process that reads the data from the operational data stores of the application that collects it (for example, a log file, a Tivoli Inventory repository, or a Tivoli Enterprise Console database), verifies the data, makes the data conform to the Tivoli Enterprise Data Warehouse schema, and places the data into the central data warehouse. See also data mart ETL.

central directory
A repository for storing resource location information centrally registered by network nodes or cached as the result of network searches.

central directory architecture
Directory architecture in a Domino domain in which some servers store configuration directories and use primary Domino Directories on remote servers for lookups.

central directory server (CDS)
A network node that provides a repository for information on network resource locations. It also reduces the number of network searches by providing a focal point for queries and broadcast searches, and by storing the results of network searches to avoid later broadcasts for the same information.

central electronic complex
See central processor complex.

central electronics complex (CEC)
See central processor complex.

Central Europe, Middle East, and Africa (CEMA)
For organizational, legal, or administrative purposes, the region comprising Bulgaria, Croatia, Czech Republic, Egypt, Hungary, Pakistan, Poland, Romania, Russia, Serbia and Montenegro, Slovakia, Slovenia, and IBM Middle East. See also Northeast Europe.

Central File Management (CFM)
A central location that receives files for translation from development and, using Translation Workbench (TWB), creates project folders, performs English-to-English word count, and helps identify the appropriate TM translation memories.

central inventory team (CIT)

centrality
The relative importance of one entity compared to other entities in social network analysis, as determined by its relationships. See also authority, betweenness, closeness, degree, eigenvector, hub, social network analysis.

centralized control
A type of control in which in which all the primary station functions of the data link are centralized in one data station. See also independent control.

centralized directory service
In OSI, a method of organizing directory services so that one node provides directory service for other nodes. OSI Communications Subsystem supports only centralized directory service.

centralized installation manager
A component that remotely installs and uninstalls product and maintenance packages in server environments.

centralized processing
In CICS, processing in which the application is processed on a central processor, which users access using a terminal.

centrally managed service
A pureScale service that is fully managed by IBM Systems Director.

Central Message Store (CMS)
A mailbox system that processes documents and controls services such as messaging, archiving and queuing.

central office (CO)
A telephone switching system that connects customer-premise business and subscriber lines to other customer lines or trunks, both locally or remotely. A central office is located on the edge of the telephone service provider's network, rather than on a customer's premises.

central processing unit (CPU)

  1. See processor.
  2. See workstation.

central processor (CP)
The part of the computer that contains the sequencing and processing facilities for instruction execution, initial program load, and other machine operations.

central processor complex (CPC)
A physical collection of hardware that consists of main storage, one or more central processors, timers, and channels.

central registry
A server's database that logs requests for licenses, upgrades for licenses, and journals all license activity in a tamper-proof auditable file. The central registry is a component of the License Use Management network topology.

central resource registration
A process in which an APPN network node sends information about itself and its client end nodes to a central directory server.

central scheduler
A function that permits an administrator to schedule client operations and administrative commands. The operations can be scheduled to occur periodically or on a specific date. See also administrative command schedule, client schedule.

central service
In MERVA, a service that uses resources that either require serialization of access, or are only available in the MERVA nucleus.

central site
In a network of systems, the system licensed to receive program temporary fixes (PTFs) and distribution media from IBM. This system is also used to provide problem handling support to other systems in a network. In a distributed data processing network, the central site is usually defined as the focal point in a communications network for alerts, application design, and remote system management tasks such as problem management.

central site control facility (CSCF)
In Tivoli NetView for OS/390, NetView for VM, and NetView for VSE, a function that allows a network operator to run the test facilities of the IBM 3172 Nways Interconnect Controller and the IBM 3174 Establishment Controller remotely from the NetView console.

central storage
Storage that is an integral part of the processor unit. Central storage includes both main storage and the hardware system area. UNIX-experienced users refer to central storage as memory.

central system
A single system that handles all of the communications to an endpoint system.

centroid
A virtual point in an organizational unit hierarchy that is geometrically collocated close to the area of the hierarchy where the presence of a certain entitlement is a concentrated.

CEP
See complex event processing.

CEPT

  1. See Conference Europeenne des Administrations des Postes et Telecommunications.
  2. See Commission of European Post and Telegraph.

CERT/CC
See CERT Coordination Center.

CERT Coordination Center (CERT/CC)
A major reporting center for Internet security problems. Staff members provide technical advice and coordinate responses to security compromises, identify trends in intruder activity, work with other security experts to identify solutions to security problems, and disseminate information to the broad community. The CERT/CC also analyzes product vulnerabilities, publishes technical documents, and presents training courses.

certificate
A digital document that binds a public key to the identity of the certificate owner, thereby enabling the certificate owner to be authenticated. A certificate is issued by a certificate authority and is digitally signed by that authority. See also certificate authority, certificate signing request, SSL server authentication.

certificate alias
A group that contains one or two certificates. If there are two certificates in the alias, one is the primary and one is the backup, based on the earlier effective from date.

certificate authority (CA)

  1. A trusted third-party organization or company that issues the digital certificates. The certificate authority typically verifies the identity of the individuals who are granted the unique certificate. See also certificate, Globus certificate service, intermediate certificate, Secure Sockets Layer, SSL server authentication, trusted root.
  2. A component that issues certificates to each computer on which components are installed.

certificate authority certificate (CA certificate)

  1. A digital certificate that is issued by a certificate authority. The CA verifies trusted certificates for trusted roots.
  2. In computer security, a digital document that identifies an organization that issues certificates. See also digital certificate.

certificate authority enterprise application
A company application that provides certificates and private keys for its client applications.

certificate chain
A path that traces certificates from a branch in the hierarchy to the primary CA certificate.

certificate filter
A filter that defines a set of similar distinguished name certificate attributes for a group of certificates in an X.509 source user registry.

certificate name filter
A general resource profile that maps multiple user IDs to a digital certificate in order to simplify administration of certificates, conserve storage space in the RACF database, maintain accountability, or maintain access control granularity.

Certificate of Origin
A document used in international trade to authenticate the country of origin of the merchandise being shipped.

certificate revocation list (CRL)
A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a Secure Sockets Layer (SSL) handshake to ensure that the certificates involved have not been revoked.

certificate signing request (CSR)
An electronic message that an organization sends to a certificate authority (CA) to obtain a certificate. The request includes a public key and is signed with a private key; the CA returns the certificate after signing with its own private key. See also certificate, keystore.

certificate store

  1. A collection of certificates.
  2. The Windows name for a key repository.

certification
A process that creates special signed messages called certificates, which state that a particular public key is associated with a particular user or server name.

certification campaign
See attestation campaign.

certifier ID
A file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.

certifier ID file
A file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.

CES

  1. See Complex Engagement Services.
  2. See connection event sequence.

CEVAs
See content-enabled vertical applications.

CF

  1. See coupling facility.
  2. See cluster caching facility.

CF cache structure
See coupling facility cache structure.

CFIOP
See combined function IOP.

CF key
See command function key.

CF lock structure
See coupling facility lock structure.

CFM

  1. See Central File Management.
  2. See Configuration File Manager.

CF message
See confirmed message.

CFRM
See coupling facility resource management.

CFRM policy
See coupling facility resource management policy.

CFS
See continuous-forms stacker.

CFSTRUCT
An IBM MQ object used to describe the queue manager's use of a Coupling Facility list structure

CGCSGID
See coded graphic character set global identifier.

CGI
See Common Gateway Interface.

CGI program
See CGI script.

CGI script
A computer program that runs on a web server and uses the Common Gateway Interface (CGI) to perform tasks that are not usually done by a web server (for example, database access and form processing).

CGM
See Computer Graphics Metafile.

CGU
See character generator utility.

chad
The material separated from a data medium when punching a hole or from the carrier holes in continuous forms.

CHAID
See Chi-squared Automatic Interaction Detector algorithm.

chain

  1. In DFU, a way to change from one display format to another after the user signals that the first display format was completed.
  2. In RPG, an operation code that reads input records identified by specified relative record numbers or keys.
  3. A group of request units delimited by begin-chain and end-chain. Responses are always single-unit chains.
  4. The name of a channel framework connection that contains an endpoint definition.
  5. A group of logically linked records that are transferred over a communications line.
  6. A set of enclosures that are attached to provide redundant access to the drives inside the enclosures. Each control enclosure can have one or more chains.
  7. A branded collection of stores with a single owner.

chain assembly
In CICS intercommunication, a grouping of one or more request units to satisfy a single request. Instead of an input request being satisfied by one RU at a time until the chain is complete, the whole chain is assembled and sent to the CICS application satisfying just one request. This ensures that the integrity of the whole chain is known before it is presented to the application program.

chain auditor
A blockchain role that has permission to interrogate transactions and other actions affecting the blockchain system.

chaincode
Executable code that is deployed on a blockchain network, where it is executed and validated by chain validators together during the consensus process. Developers can use chaincodes to interact with a network's shared ledger, develop business contracts, asset definitions, and collectively-managed decentralized applications.

chained order
An order that must finish its fulfillment process before its parent order can be considered fulfilled. An order is chained when a parent order must communicate some portion of the order fulfillment execution to a third party.

chain erase
The process of erasing a snapshot chain.

chaining

  1. In the Distributed Computing Environment (DCE), a mode of interaction optionally used by a directory system agent (DSA) that cannot perform an operation by itself. The DSA chains by invoking the operation in another DSA and then relaying the outcome to the original requester.
  2. A method of storing records in which each record belongs to a list or group of records and has a linking field for tracing the chain.

chain member
A blockchain role that helps maintain the integrity of a network, but does not participate in the validation process.

chain transactor
A blockchain role that has permission to create transactions and query network data.

chain validator
A blockchain role that owns a stake of a chain network. Each chain validator can decide whether a transaction is valid and can interrogate all transactions sent to their chain.

challenge
A request for certain information to a system. The information, which is sent back to the server in response to this request, is necessary for client authentication.

challenge handler
A client-side component that issues a sequence of challenges on the server side and responds on the client side. See also authenticator.

Challenge Handshake Authentication Protocol (CHAP)
An authentication protocol that protects against eavesdropping by encrypting the user name and password. See also Password Authentication Protocol.

challenge-response authentication
An authentication method that requires users to respond to a prompt by providing information to verify their identity when they log in to the system. For example, when users forget their password, they are prompted (challenged) with a question to which they must provide an answer (response) in order to either receive a new password or receive a hint for specifying the correct password. See also knowledge-based authentication.

chameleon schema
A schema that inherits a target namespace from a schema that includes the chameleon schema.

change

  1. A function or mode that enables a user to modify a specified character string in previously entered text.
  2. An artifact that represents a generalized notion of a development work product, such as a task, defect report, or enhancement request. See also initiative.

changeable media origin
In printers, the ability to accept a command that changes the point on the medium where printing begins.

change accumulation

  1. The process of merging log data sets and reducing the information they contain to the minimum required to perform recovery on a particular database or group of databases.
  2. The process of creating a compacted version of one or more IMS log data sets by eliminating records not related to recovery, and by merging multiple changes to a single segment into a single change.

change aggregate table
In SQL replication, a type of replication target table that contains data aggregations that are based on the contents of a CD table. See also base aggregate table.

change and configuration management (CCM)
A systematic approach to establish and maintain the consistent performance of a system or product throughout its lifecycle, and to effectively manage changes in that product or system.

change authority
An object authority that allows a user to perform all operations on the object except those limited to the owner or controlled by object existence authority, object management authority, object alter authority, and object reference authority. The user can add, change, and delete entries in an object, or read the contents of an entry in the object. Change authority combines object operational authority and all the data authorities.

change bar

  1. A character used in the left margin to indicate that a document line is changed.
  2. An indicator that displays when an object was last changed.

change basis version
The version of the server partition that changes were made against.

change-capture replication
The process of capturing changes that are made to a replication source table and applying them to a replication target table. See also full refresh.

change control (CC)
The use of change management commands for the installation or removal of software or data.

change control administrator
A person responsible for software distribution and change control activities.

change control client
A workstation that (a) receives software and data files from its change control server and (b) installs and removes software and data files as instructed by its change control server. See also change control single node.

change control domain
A change control server and its change control clients.

change control server
A system that controls and tracks the distribution of software and data files to other workstations. See also change control single node.

change control single node
A workstation that controls, tracks, installs, and removes software and data files for itself. A CC single node can also prepare software for distribution. See also change control client, change control server.

change-data table (CD table)
In SQL replication, a replication table on the Capture control server that contains changed data for a replication source table. See also synchpoint.

change-direction protocol
In SNA, a data flow control protocol in which the sending logical unit (LU) stops sending normal-flow requests, signals this fact to the receiving LU using the change-direction indicator (in the request header of the last request of the last chain), and prepares to receive requests.

changed subfile record
A subfile record into which the work station user has entered data, or a subfile record for which a write or change operation was issued with the DDS keyword SFLNXTCHG or DSPATR(MDT) in effect.

change file
A file formatted to the specifications outlined by LLIS. A change file is used for bulk changes to existing user accounts.

change history
A section that displays modifications in the data records, such as supplier records and organization records.

change implementation schedule
A view in change management that shows the start and end dates for changes to selected configuration items in the environment, the RFC that defines the change, and other details.

change listener
In Java, a listener that is notified when an object is changed in any way.

change log

  1. The area of the checkpoint data set that contains the specific control blocks changed by the last member of the multi-access spool configuration to own the checkpoint data set.
  2. For directory shadowing, a record of changes made to directory entries, departments, and locations for the purpose of sending only the updates and not the entire directory to collecting systems.

change-managed relationship
A relationship between two artifacts. A change to either artifact affects the relationship. See also suspect relationship state.

change management

  1. The process of controlling and tracking modifications to artifacts.
  2. The process of planning (for example, scheduling) and controlling (for example, distributing, installing, and tracking) software changes over a network.
  3. The process of planning for and executing changes to configuration items in the information technology environment. The primary objective of change management is to enable beneficial changes to be made with minimum disruption to services.

change notice
An optional hold notice issuance that tells custodians who already confirmed their preservation obligation for a specific initial notice that the search criteria or other aspect of the initial notice changed. The change notices can require reconfirmation or can be issued for information only.

change number of sessions (CNOS)
An internal transaction program that regulates the number of parallel sessions between the partner LUs with specific characteristics.

change order

  1. An update to a purchase order that is already approved or printed and that changes information such as quantity or vendor.
  2. A record of the changes made during the course of a contract or project execution.

change ownership
A method of transferring ownership of a case or a document to another user using Intel L.E.A.D.

change project
A project that is implemented on a staging or a testing environment before being implemented on a production environment to mitigate and minimize operational errors.

change proposal system
A system that allows users to review modules and suggest changes to them.

change record
A recorded instance that is created with each write action to the repository. The change record contains metadata about all repository changes (such as who was responsible for a commit action) and can be used as a version history view of the repository.

change request (CR)

  1. A request from a stakeholder to change an artifact or process. See also defect, enhancement request.
  2. In System Manager, an instance of a change request description that has been submitted to run or is running. A change request is uniquely identified by the change request name and a sequence number.
  3. A request to change some aspect of the project, project plan, activity definition, or document.
  4. A request created in the Telecom Portal application to replace a device, or change a rate plan.
  5. A small, independent unit of work into which each change project is divided.

change request description (CRQD)
An i5/OS object that describes a change to be made to the computing environment. The object, which is maintained only at the central site system or systems, consists of a list of activities that describe the steps needed to make the change.

change request element
An object that is used to track requests for change during the project.

change set

  1. A list of versions of elements that are associated with a Unified Change Management (UCM) activity.
  2. A group of related changes to artifacts in a workspace or stream.
  3. A cohesive unit consisting of a number of related changes that need to be made together.

change table
A table that is used to change company codes, account codes, extended dimension codes, or to merge accounts or dimensions.

change volume
A volume that is used in Global Mirror that holds earlier consistent revisions of data when changes are made.

change window
A period of time defined for one or more configuration items, which specifies when the CIs can be taken out of service for changes to be made, with minimal impact on services.

change window conflict
A condition that occurs when implementation tasks have been scheduled for a CI outside its change window.

channel

  1. A collection of test environment properties that describes a delivery platform in your test effort.
  2. A defined view of a camera, or an input from a related device, that is identified by a uniquely assigned channel ID.
  3. A link along which signals can be sent, such as the channel that handles the transfer of data between processor storage and local peripheral equipment. See also trunk.
  4. An IBM MQ object that defines a communication link between two queue managers (message channel) or between a client and a queue manager (MQI channel). See also message channel, MQI channel, queue manager.
  5. In mainframe computing, the part of a channel subsystem that manages a single I/O interface between a channel subsystem and a set of control units.
  6. The means of distribution of a company's products. Examples are e-commerce and physical stores.
  7. A unidirectional, function-specific register or queue. Channels are the primary means of communication between a synergistic processor unit (SPU) and a memory flow controller (MFC) in a synergistic processor element (SPE), which in turn mediates communication with the PowerPC processor element (PPE), other SPEs, and other devices.
  8. A means of reaching customers, such as mobile, email, direct mail, websites, or retail.
  9. A specialized web application within a portal to which a user can subscribe.
  10. A communication path through a chain to an endpoint.

channel action
A business function that can be issued on a channel. Channel actions are role specific and an authorization policy makes it possible to control which role can perform which action in a channel.

channel adapter (CA)
A communication controller hardware unit that is used to attach the communication controller to a host channel.

channel address word (CAW)
An area in storage that specifies the location in main storage at which a channel program begins.

channel application
An application that is used to place an order in a store or online call center of a retail business.

channel associated signaling (CAS)
A method of communicating telephony supervisory or line signaling (on-hook and off-hook) and address signaling on T1 and E1 digital links. See also common channel signaling.

channel-attached

  1. Pertaining to the attachment of devices directly by input/output channels to a host processor.
  2. Pertaining to devices attached to a controlling unit by cables, rather than by telecommunication lines. See also link-attached.

channel-attachment major node
A major node that may include minor nodes that are resources (host processors, NCPs, line groups, lines, SNA physical units and logical units, cluster controllers, and terminals) attached through a communication adapter.

channel bank
A device that converts an analog line signal to a digital trunk signal.

channel callback
A mechanism that ensures that the channel connection is established to the correct machine. In a channel callback, a sender channel calls back the original requester channel using the sender's definition.

channel code

  1. A number from 1 to 12 that identifies a position in a forms-control buffer or a page definition.
  2. A designation by IBM Sales & Distribution to indicate accounting revenue split by channel/subchannel.

channel command
An instruction that directs a data channel, control unit, or device to perform an operation or set of operations.

channel command retry (CCR)
In mainframe computing, the protocol used between a channel and a control unit that enables the control unit to request that the channel reissue the current command.

channel command word (CCW)
In zSeries systems, an 8-byte command issued to the channel subsystem by a central processor and operating asynchronously with the issuing processor.

channel-control check
A category of I/O errors affecting channel controls and sensed by the channel to which a device is attached.

channel control function (CCF)
A program to move messages from a transmission queue to a communication link, and from a communication link to a local queue, together with an operator panel interface to allow the setup and control of channels.

channel counter
A counting device that identifies how many pages have been successfully received.

channel-data check
A category of I/O errors, indicating a machine error in transferring data to or from storage and sensed by the channel to which a device is attached.

Channel Data Link Control protocol (CDLC, CDLC protocol)
A channel communications protocol that is used to communicate between VTAM and a front end processor (either hardware or emulated).

channel definition file (CDF)
A file containing communication channel definitions that associate transmission queues with communication links.

channel event
An event reporting conditions detected during channel operations, such as when a channel instance is started or stopped. Channel events are generated on the queue managers at both ends of the channel.

channel exit program
A user-written program that is called from one of a defined number of places in the processing sequence of a message channel agent (MCA).

channel framework
A common model for connection management, thread usage, channel management, and message access within an application server.

channel group
A collection of channels, typically created for geographic areas, such as floors of a building, sections of a city, or sections of a region. Groups can be used to limit or filter the channels that can be accessed in the Intelligent Video Analytics operator client.

channel ID
An identification number that is passed back from a multiplexed device to the file system as a result of calling the device driver multiplex (ddmpx) entry point.

channel initiator
A component of IBM MQ distributed queuing that monitors the initiation queue and starts the sender channel when triggering criteria are met.

channel interface
The circuitry in a storage control that attaches storage paths to a host channel.

channel link
A System/390 I/O channel-to-control-unit interface that has an SNA network address. A channel link can be a subarea link, a peripheral link, a LEN link, or an APPN link. See also subarea link.

channel listener
A component of IBM MQ distributed queuing that monitors the network for a startup request and then starts the receiving channel.

channel number

  1. The identifying number assigned to a licensed channel on the T1 or E1 trunk that connects DirectTalk to the switch, channel bank, or channel service unit.
  2. A number that identifies the path by which data is transferred between a particular input or output device and the processor of the computer.

channel owner
A user who is responsible for creating the assets for a specific channel.

channel path

  1. In mainframe computing, the interconnection between a channel and its associated control units.
  2. A single interface attaching one or more control units.

channel-path identifier (CHPID)

  1. A value assigned to each installed channel path of the system that uniquely identifies that path to the system.
  2. In a channel subsystem, a value that is assigned to each installed channel path of the system that uniquely identifies that path to the system.

channel process

  1. In WebSphere Voice Server, the system process that manages call flow.
  2. The AIX process that executes the logic of the state table; each active caller session has one active channel process.

channel program
A sequence of one or more channel command words (CCWs) issued to one device.

channel service unit (CSU)

  1. An American Telephone and Telegraph (AT&T) unit that is part of the AT&T nonswitched digital data system.
  2. A device used to connect a digital phone line to a multiplexer, a channel bank, or directly to another device producing a digital signal. A CSU performs certain line-conditioning and equalization functions, and responds to loopback commands sent from the central office (CO). See also data service unit.

channel station
In certain printers, a page-counting device that counts the number of pages queued for printing.

channel status word (CSW)
A field that provides the program with the status of an I/O device or the conditions under which an I/O operation has been terminated.

channel subsystem (CSS)
A collection of subchannels that directs the flow of information between I/O devices and main storage, relieves the processor of communication tasks, and performs path management functions.

channel-subsystem image
In mainframe computing, the logical functions that a system requires to perform the function of a channel subsystem. With ESCON multiple image facility (EMIF), one channel-subsystem image exists in the channel subsystem for each logical partition (LPAR). Each image appears to be an independent channel-subsystem program, but all images share a common set of hardware facilities.

channel-to-channel (CTC)
Pertaining to the physical connection or the interaction of two devices.

channel-to-channel adapter (CTC adapter)
A device for connecting two channels on the same processor or on different processors.

chaotic relaxation
An iterative relaxation method that uses a combination of the Gauss-Seidel and Jacobi-Seidel methods. The array of discrete values is divided into subregions that can be operated on in parallel. The subregion boundaries are calculated using the Jacobi-Seidel method, while the subregion interiors are calculated using the Gauss-Seidel method. See also Gauss-Seidel.

CHAP
See Challenge Handshake Authentication Protocol.

CHAP secret
In the Challenge-Handshake Authentication Protocol (CHAP), a secret passphrase that is used to authenticate a storage system to iSCSI-attached hosts.

chapter
A group of people with similar skills and responsibilities within a tribe. For example, a squad might have one tester per squad and that tribe consists of ten squads, so the chapter of testers would be the ten testers (from each squad in the chapter). The chapter lead is typically a manager who has the same competencies as their chapter and is actively involved in day-to-day work so that they have a firm grasp of what’s happening within their chapter. Chapter leads focus on slowing down work and ensuring quality. See also guild, squad, tribe.

character

  1. In bar codes, a single group of bars and spaces that represent an individual number, letter, punctuation mark, or other symbol.
  2. A sequence of one or more bytes representing a single graphic symbol or control code.
  3. Any symbol that can be entered on a keyboard, printed, or displayed. For example, letters, numbers, and punctuation marks are all characters.
  4. In a computer system, a member of a set of elements that is used for the representation, organization, or control of data. See also glyph.

character angle
In architecture, the angle that is between the baseline of a character string and the horizontal axis of a presentation space or physical medium.

character arrangement table
An array of data that translates input data into printable characters and identifies associated character sets and graphic character modification modules.

character array
A named list or table of character data.

character attribute
A code that defines a single property of a character or characters; for example, extended color, character set, or extended highlighting. A character can have more than one defined character attribute.

character-based interface
A computer interface that shows only characters and no graphics on the screen.

character baseline
See baseline.

character box

  1. The imaginary parallelogram whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a graphics display device.
  2. The area that completely contains the character pattern.
  3. The maximum area in which a symbol and all associated elements, such as a cursor, an underline, or space surrounding the symbol to separate it from other symbols, can be printed or displayed.

character-box reference edge
In architecture, one of the four edges of a character box.

character cell

  1. See character box.
  2. An addressable location on a display surface or printing medium. The character cell defines the placement of characters with respect to preceding and following characters.
  3. In the GDDM function, the imaginary box whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a work station.
  4. As defined in ISO/IEC 10646, the place within a row at which an individual graphic character may be allocated.
  5. The maximum physical boundary of a single character. For example on the IBM 3800 Printing Subsystem, a cell is made up of 24 rows with total height of 4.23 mm and 18 bit positions having a total width of 2.54 mm.
  6. The physical width and height in pels of a font.

character cell size
In architecture, the size of a rectangle in a drawing space used to scale font symbols into the drawing space.

character class
A named set of characters sharing an attribute associated with the name of the class. The classes and the characters that they contain are dependent on the value of the LC_CTYPE category in the current locale.

character code

  1. An element of a code page or a cell in a code table to which a character can be assigned. The element is associated with a binary value.
  2. In System i Access, an ASCII or EBCDIC value assigned to the symbols or functions that are used by a computer.

character concatenated expression
A concatenated expression that consists of one or more character columns, string literals, or substrings of character columns.

character constant

  1. The actual character value (a symbol, quantity, or constant) in a source program that is itself data, instead of a reference to a field that contains the data. See also numeric constant.
  2. In the C language, a character or an escape sequence enclosed in quotation marks.

character conversion
The process of changing data from one character coding representation to another.

character conversion table
A table that converts one or more characters to alternative characters using hexadecimal encoding for the character sets. The character sets are defined in code pages.

character coordinate system
An orthogonal coordinate system that defines font and character measurement distances.

character data

  1. Data that has an associated coding representation that defines how to interpret each specific pattern of bits that are grouped into one or more bytes.
  2. Data in the form of letters and special characters, such as punctuation marks.

Character Data Representation Architecture (CDRA)
An IBM architecture that defines a set of identifiers, resources, services, and conventions to achieve consistent representation, processing, and interchange of graphic character data in heterogeneous environments.

character data representation identifier
A tag that is used to achieve data integrity. The Character Data Representation Architecture specifies that you should tag all character data as it flows through the system. You can tag using a short-form or a long-form identifier. A coded character set identifier (CCSID) is an example of a character data representation identifier.

character density
A measure of the horizontal spacing of characters.

character device
A device that handles data one character at a time.

character direction
In Graphic Object Content Architecture, an attribute controlling the direction in which a character string grows relative to the inline direction. Values are left-to-right, right-to-left, top-to-bottom, and bottom-to-top. See also escapement direction.

character display
A display that uses a character generator to display predefined character boxes of images (characters) on the screen. This kind of display cannot address the screen any less than one character box at a time.

character encoding

  1. A character set consisting of a code that pairs a sequence of characters from a given set with something else, such as a sequence of natural numbers, octets or electrical pulses. Encoding facilitates the storage and transmission of text through telecommunication networks.
  2. The mapping from a character (a letter of the alphabet) to a numeric value in a character code set. For example, the ASCII character code set encodes the letter "A" as 65, while the EBCIDIC character set encodes this letter as 43. The character code set contains encodings for all characters in one or more language alphabets.

character entity reference
A character string of the form &#xdddd or &#dddd, where dddd is the hexadecimal or decimal equivalent of the Unicode code point of a character. For example, &#x003E and &#0062 are both character entity references to the > (greater-than) sign.

character escapement point
The point where the next character reference point is usually positioned.

character expression
A character constant, a simple character variable, an element of a character array, a character-valued function reference, a substring reference, or a sequence of the above separated by the concatenation operator and parentheses.

character field
An area that is reserved for information that can contain any of the characters in the character set. See also numeric field.

character format
In REXX, a format that is used in the REXX conversion functions to indicate that data is in a textual form as opposed to machine-readable form.

character generator

  1. In word processing, the way to generate visual characters and symbols for coded data.
  2. In computer graphics, a function that converts the coded representation of a graphic character into the shape of the character for display or print.

character generator utility (CGU)
A function of the Application Development ToolSet feature that is used to define and maintain user-defined double-byte characters and related sort information.

character graphic

  1. The visual representation of a character, defined by toned or untoned picture elements. See also graphic character, graphic character.
  2. An image that is composed of symbols printed in a monospace font. Some symbols are standalone; others are intended for assembling larger figures.

character grid
In Business Graphics Utility, an invisible network of uniformly spaced horizontal and vertical lines covering the chart area. Used by the Business Graphics Utility to determine the physical dimensions of the chart and the placement of the data on it.

character grid unit
In Business Graphics Utility, the distance between two adjacent horizontal or vertical lines on a character grid.

character group
Any number of character graphics and character properties.

character ID
See character identifier.

character identifier (character ID)

  1. The standard identifier for a character, regardless of its style. For example, all uppercase A's have the same character identifier.
  2. On a system, a 4-byte binary value. The value is a concatenation of the graphic character set global identifier followed by the code page global identifier. For example, the character identifier for German (feature 2929) is 00697 00273.

character image
See glyph.

character increment
The distance from the character reference point to the character escapement point. Character increment is the sum of the A-space, B-space, and C-space. Usually the distance between the current print position and the next print position.

character-increment adjustment
In a scaled font, an adjustment to character increment values. The adjustment value is derived from the kerning track values for the font used to present the characters.

characteristic
A user-defined trait or property that is associated with an identity that is not commonly expressed as a name, number, address, or email. This attribute allows users to extend the product by defining customizable entity attributes that are meaningful to their data sources. See also attribute, identity.

characteristic type
A specific classification of a characteristic. Examples of characteristic types include gender and date of birth, but additional characteristic types can be defined.

character large object (CLOB)

  1. A character string that contains single-byte characters with an associated code page.
  2. A data type whose value is a sequence of characters (single byte, multibyte, or both) that can range in size from 0 bytes to 2 gigabytes less 1 byte. In general, the CLOB data type is used whenever a character string might exceed the limits of the VARCHAR data type. See also large object.

character literal
A literal that represents character data.

character mapping
The association of code-page code points to the appropriate graphic-character identifiers in a font.

character metric
Measurement information that defines an individual character value such as height, width, or space. Character metrics may be expressed in specific fixed units, such as pels, or in relative units that are independent of both the resolution and size of the font. Often included as part of the general term font metrics. See also character set metric.

character name
See character identifier.

character normalization
A process in which the variant forms of a character, such as capitalization and diacritical marks, are reduced to a common form.

character operator
A symbol representing an operation to be performed on character data, such as concatenation (joining the data or fields) in the control language (CL).

character pattern
See character raster pattern.

character-pattern descriptor
In architecture, information that the printer needs to separate font raster patterns. Each character pattern descriptor is 8 bytes long and specifies both the character box size and an offset value.

character position
On a display, the location of a character.

character positioning
The process of determining where a character is to appear on a presentation surface.

character precision
In architecture, the acceptable amount of variation in the appearance of a character on a physical medium from a specified ideal appearance, including no acceptable variation. Examples of appearance characteristics that can vary for a character are shape and position.

character printer
A device that prints a single character at a time. See also line printer.

character property
Any detail about how a character is printed relative to the other characters around it. Character properties are box size, horizontal and vertical character cell size, character ID, center line, baseline, left space, right space, above space, and below space.

character raster pattern
The scan (picture element) pattern for a character graphic of a particular size, weight, and style.

character recognition
The identification of geographic, phonic, or other characters by automatic, magnetic, optical, or mechanical means.

character reference point

  1. The point along the character baseline within the character box that coincides with the current print position.
  2. The point that corresponds to the origin of the character coordinate system. The character reference point coincides with the presentation position when the character is formed in the presentation process. See also current print position.

character rotation
The alignment of a character with respect to its character baseline, measured in degrees in a clockwise direction. See also orientation.

character set

  1. A set of binary codes that represent specific text characters.
  2. A list of characters (letters, numbers, and symbols such as #, $, and &) that are recognized by computer hardware and software.
  3. A defined set of characters with no coded representation assumed that can be recognized by a configured hardware or software system. A character set can be defined by alphabet, language, script, or any combination of these items.

character set attribute
In architecture, an attribute used to specify a coded font.

character set encoding
The ability to encode different character sets in mailings so that mailings can be sent in any language.

character set identifier 65534
The character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 ( FFFE ) is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs tagged for each individual field it contains. If the file is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.

character set identifier 65535
The character set identifier (CCSID) that is used to show that data associated with the CCSID should not be processed as coded-graphic-character data.

character set metric
One of the measurements used to describe a characteristic of the all the characters in that font. Examples are height, width, and character increment for each character of the font. See also character metric, font metric, relative metrics.

character shape
The visual representation of a graphic character.

character shape presentation
The formation of a character shape on a physical medium at an addressable position determined by the formatting process.

character shear
See shear.

character space
The horizontal space or size of a character. This size depends on the character, the font, and the device on which the character is printed.

character spacing
See character increment.

character special file
An interface file that provides access to an input or output device, which uses character I/0 instead of block I/0. See also block special file.

characters per inch (cpi)
The number of characters printed horizontally within an inch across a page.

characters per second (cps)
The number of characters that a device can print in one second.

character string

  1. A contiguous sequence of characters that are treated as a unit.
  2. A contiguous sequence of characters terminated by and including the first null byte.
  3. A sequence of bytes that represents bit data, single-byte characters, or a mixture of single-byte and multibyte characters.

character string delimiter
A character that is used to identify the beginning and the end of a character string.

character substring
A contiguous portion of a character string.

character times
In CCP, the maximum number of times that the temporary text delay character can (a) be sent to a terminal before the operation stops; or (b) be sent between the end of a receive operation and the beginning of a transmit operation.

character translation
In international character support, the dd command and various conversion subroutines that translate between extended characters and ASCII escape strings to preserve unique character information.

character type
A data type that consists of alphanumeric characters.

character variable

  1. In the C language, a data object having a value that can be changed while a program is running and having a data type that is a signed or unsigned character.
  2. Character data with a value that is assigned or changed while the program is running.

charge
An assertion of a specific crime for which a suspect has been accused of committing.

charge and allowance code
An industry-standard identifier that the shipper assigns to each accessorial.

charge-back

  1. A financial penalty that is assigned to a vendor for violations to compliance rules and other criteria.
  2. The rate that is charged to the business for a specific application data source.

charge-back account
An account used for tracking computing resource usage by business departments or projects. Examples of charge-back accounts are "Marketing Department" or "Summer catalog project."

chargeback allocation
A charge category used for cost allocation.

charge-back identifier
A label, which is often tied to an algorithm or set of rules, that is not guaranteed to be unique, but is used to identify and distinguish a specific charge-back item or charge-back entity from others.

charge code
An accounting code that is used to register and categorize costs against project budgets.

charge feature
An optional feature for either software or hardware for which there is a charge.

charge out
To check out and track a physical record.

charge sequence
The sequence in which Sterling Selling and Fulfillment Foundation creates authorization or charge requests. For example, the charge sequence might specify that gift certificates are to be used before a credit card is charged.

charging requesting service
In X.25 communication, an optional facility that specifies that charging information (segment count data, monetary unit data, or call duration data) is required.

chart

  1. A visual representation of real-world objects, such as organizations, people, events, or locations, and the relationships between them.
  2. A picture defined in terms of graphics primitives and graphics attributes.

chart area
In the GDDM function, the part of the picture space in which a business chart is to be drawn.

chart format
In Business Graphics Utility, an object containing chart characteristics, such as the chart type, chart heading, legend position, and so on. The chart format does not include the data values to be plotted. The system-recognized identifier for the object type is *CHTFMT.

chart fragment
A view of a chart that highlights particular items of interest.

charting scheme
A definition that describes how item data behaves when it is visualized on a chart. For example, how data is copied into chart item properties, the chart template and labeling scheme to use, and whether to display attributes and pictures. See also chart template.

chart layer
A map layer that contains the items that have been sent from the chart surface to the mapping tool.

chart layout
In Business Graphics Utility, the arrangement of the various parts in the chart area and surrounding margins.

chart of accounts (COA)
A detailed listing of all the accounts used by a company.

chart property
A characteristic of a chart, such as its summary description, time zone, grid size, background color, or merge and paste rules. Chart properties are saved with the chart. See also chart template.

chart series
A selection of a category of data that will be represented by a chart in a report. A chart can have multiple chart series to represent multiple types of data.

chart template
An object that is used for chart creation that contains preconfigured chart properties, and lists of permitted entity types and link types. See also chart property, charting scheme.

CHASE
In SNA, a command used by the host system to determine when the secondary logical unit has finished processing all previously sent response units.

chassis
The metal frame in which various electronic components are mounted.

chassis detect-and-deploy profile
A profile that IBM Director automatically applies to all new BladeCenter chassis when they are discovered. The profile settings include management module name, network protocols, and static IP addresses. If Remote Deployment Manager (RDM) is installed on the management server, the chassis detect-and-deploy profile also can include deployment policies.

chat
The sending of typed messages between online participants. See also instant message.

chat script
In remote communication, a list of expect-send sequences that a modem uses to establish a communication link with another modem.

chat transcript
A file that contains a copy of the typed messages between participants in a chat meeting.

cheat sheet
An interface that guides users through the wizards and steps required to perform a complex task, and that links to relevant sections of the online help.

check

  1. A periodic inspection of an aircraft after a specified amount of time in service.
  2. A process for determining accuracy.
  3. In printers, an action message that instructs the printer operator to inspect a component. For example, the CHECK TONER COLLECTOR message means that the operator should look at the toner-collector bottle and make sure that it is physically present, in the proper place, and correctly installed.
  4. To look for a condition.

check box
A square box with associated text that represents a choice. When a user selects the choice, the check box is filled to indicate that the choice is selected. The user can clear the check box by selecting the choice again, thereby deselecting the choice.

check character
A character used for the purpose of performing a check.

CHECK clause
In SQL, an extension to the SQL CREATE TABLE and SQL ALTER TABLE statements that specifies a table check constraint.

check condition
A restricted form of search condition used in check constraints.

check constraint
A user-defined constraint that specifies the values that specific columns of a base table can contain. See also constraint.

check digit

  1. A check key consisting of a single digit.
  2. The far right number of a self-check field that is used to verify the accuracy of the field.

checked-out version
A copy of a file that corresponds to a version of an element. See also version.

check-in

  1. The action that creates a new version of an element on any branch of its version tree.
  2. The operation of returning code back into a code repository on source code control systems.

checkin
See check-in.

check in

  1. To upload the language of a checked out draft authored/received contract or amendment contract into the application.
  2. In certain software configuration management (SCM) systems, to copy files back into the repository after changing them.
  3. To replace an inactive document, project WBS element, scope element, requirement or resource record (with its modifications) to its repository directory so that others can view it or modify it.
  4. To save local changes in a change set that is part of a repository workspace. A checked-in change set can later be shared with a team by delivering the change set.

check-in screen
The screen identifying the host screen that should be active for a connection to be considered ready to be returned to the connection pool. If the application is not on the screen specified by the check-in screen, the connection will be discarded or recycled in attempt to return the connection to the host screen specified by the check-in screen. The check-in screen is only meaningful if connection pooling is specified for a connection.

check integrity
The condition that exists when each row in a table conforms to the check constraints that are defined on that table.

check out

  1. In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified. See also reservation version status.
  2. To remove an active document, project WBS element, scope element, requirement or resource record from its repository directory in order to modify it. Only one individual may check out the same element at a time.
  3. To download the language of a draft authored/received contract or amendment contract from the application to modify it.

check pending

  1. A state that occurs when data for a constraint cannot be verified as valid. A constraint could be either a referential constraint or a check constraint.
  2. In DB2 for z/OS, a state into which a table can be put where only limited activity is allowed on the table and constraints are not checked when the table is updated. See also set integrity pending.

checkpoint

  1. A compressed file that contains configuration data from a specific point in time.
  2. A point at which the database manager records internal status information in the log; the recovery process uses this information if the subsystem abnormally terminates.
  3. A place in a program at which a check is made, or at which a recording of data is made to allow the program to be restarted.
  4. To pause a running process and save its current state.

checkpoint algorithm
The algorithm that determines when to commit all global transactions for the job steps in a batch application. See also results algorithm.

checkpoint data set
A local data set that contains Common Queue Server (CQS) system checkpoint information about a group of shared queues.

checkpointing
The periodic copying of processing information to the checkpoint data set. Checkpointing ensures that information about in-storage job and output queues is not lost in the event of a hardware or software error.

checkpoint reconfiguration
A process that allows a user to dynamically redefine checkpoint data-set specification for the JES multi-access spool (MAS) configuration.

checkpoint reconfiguration dialog
An interactive form of a JES2 checkpoint reconfiguration that directs the reconfiguration process with replies to a series of WTOR messages.

checkpoint restart
The process of resuming a job at a checkpoint within the job step that caused abnormal termination. The restart can be automatic or deferred. A deferred restart requires that the job be resubmitted. See also automatic restart, deferred restart, step restart.

checkpoint/restart facility
A facility for restarting execution of a program at some point other than at the beginning, after the program was terminated due to a program or system failure. A restart can begin at a checkpoint or from the beginning of a job step, and uses checkpoint records to reinitialize the system.

checkpoint size
In OSI X.400, the maximum amount of data (in units of 1024 bytes) that can be sent between two minor synchronization points. The checkpoint size is used by the X.400 reliable transfer server.

check point snapshot
A snapshot, created at the end of a snapshot chain, that contains all changes from the last incremental delta block.

checkpoint write
Any write to the checkpoint data set. A checkpoint write is a primary, intermediate, or final write that updates a checkpoint data set.

checkstop
A severe error inside a processor core that causes a processor core to stop all processing activities.

checksum

  1. On a diskette, data written in a section for error detection purposes.
  2. A small piece of data that is derived from an arbitrary block of digital data for the purpose of detecting errors that might have been introduced during its transmission or storage.
  3. The sum of a group of data that is associated with another group of data and that is used for error detection.

checksum protection

  1. A function that protects data stored in an auxiliary storage pool from being lost because of the failure of a single disk. When checksum protection is in effect and a disk failure occurs, the system automatically reconstructs the data when the system program is loaded after the device is repaired. See also device parity protection, mirrored protection.
  2. In TCP/IP, the sum of a group of data associated with the group and used for error checking purposes.

checksum set
Units of auxiliary storage defined in groups to provide a way for the system to recover data if a disk failure occurs when checksum protection is in effect.

chicken role
In agile development, the peripheral participants in scrum development. This includes the product manager, testers, customers, customer advocates, and other stakeholders. See also pig role, scrum.

chiclet
An icon that represents the availability of an RSS feed on a web page or an option that allows users to share the information through social media.

chiclet keyboard
A keyboard with small, flat, rectangular keys that have straight instead of angled edges.

Chief Information Officer (CIO)

chief information security officer (CISO)
A person responsible for the protection of enterprise information and assets.

child

  1. In a generalization relationship, the specialization of another element, the parent.
  2. In a hierarchy or auto-level hierarchy, a member that has at least one parent.
  3. Pertaining to a secured resource, either a file or library, that uses the user list of a parent resource. See also parent.
  4. A node that is subordinate to another node in a tree structure. Only the root node is not a child.

child activity
An activity that is launched during the processing of another activity, which becomes the parent activity. See also parent activity.

child category
A category that is subordinate to another category in a hierarchy. See also category page, parent category.

child circuit
A circuit that is a subordinate circuit under a parent circuit.

child class
A class that inherits instance methods, attributes, and instance variables directly from the parent class (also known as the base class or superclass), or indirectly from an ancestor class.

child component
Optional second or lower level of a hierarchical item type. Each child component is directly associated with the level above it.

child device
A device that is connected to a parent device.

child document
A document that inherits its values from another document (the parent document).

child enclave
The nested enclave created as a result of certain commands being issued from a parent enclave. See also nested enclave, parent enclave.

child expression
A list of columns in a child table that relate to corresponding columns in a parent table. See also parent expression.

child item
An item that is a part of an item with variations and has the same set of attributes as the item with variations, with minor distinct differences.

child lock
In explicit hierarchical locking, a lock that is held on a table, a page, a row, or a large object. Each child lock has a parent lock. See also parent lock.

child node
A node within the scope of another node. See also parent node.

child order
For subscriptions or recurring orders, the subordinate to the parent order. For example, a parent order is the subscription to the magazine itself, while the child order is one of the monthly issues. See also parent order.

child organizational entity
One or more further levels of organizational entities that exist beneath the parent organizational entity.

child process
A process that is created by a parent process and that shares the resources of the parent process to carry out a request.

child resource
A secured resource, either a file or library, that uses the user list of a parent resource. A child resource can have only one parent resource.

child resource group
A resource group that depends on certain application services that a parent resource group provides. A child resource group is acquired on any node in the cluster only after the parent resource group has been activated. See also dependent resource groups, parent resource group.

child segment
In a database, any segment that is dependent on another segment above it (its parent) in the hierarchy.

child table
A table that has a referential constraint to a column in a different table; the referenced table is called a parent table. See also parent table.

child UR
A unit of recovery (UR) cascaded from a parent UR in a cascaded transaction.

child widget
In AIXwindows and Enhanced X-Windows, a widget that is managed by another widget, the parent. For example, Composite widgets typically manage the Primitive children widgets attached to them.

child window
A window that appears within the border of its parent window (either a primary window or another child window). When the parent window is resized, moved, or destroyed, the child window also is resized, moved, or destroyed. However, the child window can be moved or resized independently from the parent window, within the boundaries of the parent window.

child work item
A work item created for each participant in a multi-participant step and for each route taken simultaneously from an AND-split step.

China Association for Standards (CAS)
The national standards-setting organization in The Peoples' Republic of China.

Chinese numeral
One of the Chinese characters that represent numbers. For example, the Chinese characters for 1, 2, and 3 are written with one, two, and three horizontal brush strokes, respectively. See also Arabic numeral, Hindi numeral, number, Roman numeral.

CHIP
See Client Health Information Portal.

chip
See chad.

chi-square
A test statistic used to indicate the probability that two fields are unrelated, in which case any differences between observed and expected frequencies are the result of chance alone. If this probability is very small (typically less than 5%) the relationship between the two fields is said to be significant.

Chi-squared Automatic Interaction Detector algorithm (CHAID)
A decision tree algorithm that uses chi-square statistics to identify optimal splits. Unlike the C & R tree and QUEST nodes, CHAID can generate nonbinary trees, meaning that some splits have more than two branches. See also decision tree algorithm, regression tree algorithm.

choice
An option in a pop-up window or menu used to influence the operation of the system.

choice activity
One of three types of complex BPML activities. A choice activity is used to make decisions in the business process model and runs only one of the child activities it contains. The choice activity makes it possible to model branch processing.

choice list
A list of predefined property values. A choice list presents a list of valid choices, such as a list of states or ZIP codes.

choice point
A point that is set automatically by CP Optimizer as it executes a goal during the search for a solution. At the choice point, the engine records the current state of constraints, variables, and domains, along with other goals not yet executed. If execution of the goal leads to failure, CP Optimizer backtracks to the choice point, restores the state recorded, and tries one of the stored goals.

choice type
A group type with a subclass equal to choice that is used to define a selection from a set of components. A choice type defines a choice group, which is valid when the data matches one of the components in the choice group.

Cholesky factoring
A technique that is used to factor a matrix into the product of a lower triangular matrix and its conjugate transpose.

chord
A short line segment whose end points lie on a circle. Chords are a means for producing a circular image from straight lines.

chore
An object that executes one or more processes at a user-defined frequency.

choreography

  1. An ordered sequence of message exchanges between two or more participants. In a choreography there is no central controller, responsible entity, or observer of the process.
  2. An agreed upon sequence of business events that is allowed by a seller for each transaction.

CHP
See channel process.

CHPID
See channel-path identifier.

chromeless browser
A web browser window that does not have user interface elements such as borders, frames, menus, toolbars, or scroll bars. See also browser chrome.

CHS
See Simplified Chinese.

CHT
See Traditional Chinese.

cHTML
See Compact Hypertext Markup Language.

chunk

  1. A data storage location. For example, a raw disk device or a cooked file.
  2. A group of archived business processes.

chunked-transfer encoding
A data transfer mechanism in HTTP that sends data in smaller sections of data called “chunks” that allows for dynamic generation and transmission of content.

chunk step
A step that follows a preconfigured checkpoint policy. A chunk step performs item-oriented processing by using a reader-processor-writer batch pattern.

chute dedication
In a warehouse, the exclusive assignment of a dock door or chute to a particular carrier.

CI

  1. See callable interface.
  2. See configuration item.
  3. See control interval.
  4. See continuous integration.

CIB

  1. See condition information block.
  2. See cluster information base.

CIC

  1. See circuit identification code.
  2. See concurrent image copy.

cicero
In the didot point system, a unit of 0.1776 inch (4.512 millimeters) used in measuring typographical material.

CICS
An IBM licensed program that provides online transaction-processing services and management for business applications.

CICS attachment facility
A facility that provides a multithread connection to a DB2 database to allow applications that run in the CICS environment to execute DB2 commands.

CICS BTS
See business transaction services.

CICS bundle
A set of XML files that defines or references the resources for a component of an application or a whole application, or another artifact relating to applications, such as a policy. A CICS bundle is installed in a CICS region. Multiple CICS bundles can be referenced by a management bundle. See also application binding, bundle, management bundle, platform, stand-alone CICS bundle.

CICS-deployed JAR file
A deployed JAR file that has been produced specifically for the CICS EJB server and stored in the hierarchical file system.

CICS dynamic storage area (CDSA)
A storage area allocated from CICS-key storage below the 16 MB line. The CDSA is used for all non-reentrant CICS-key RMODE(24) programs, all CICS-key task-lifetime storage in 24-bit storage, and CICS control blocks that reside in 24-bit storage.

CICS EJB server
One or more CICS regions that support enterprise beans. A logical CICS EJB server typically consists of multiple (cloned) CICS listener regions and multiple (cloned) CICS AORs. The listener regions and AORs may be combined into listener/AORs.

CICS group
An i5/OS library containing the CICS resource definition for CICS tables.

CICS-IBM MQ API crossing exit
An exit that intercepts IBM MQ calls as they are being run, for monitoring, testing, maintenance, or security purposes.

CICS-key
Storage protection key in which CICS is given control (key 8) when CICS storage protection is used. This key is for CICS code and control blocks. CICS-key storage can be accessed and modified by CICS. Application programs in user-key cannot modify CICS-key storage, but they can read it. CICS-key storage is obtained in MVS key-8 storage. See also user-key storage.

CICS-maintained data table
A type of CICS data table, for which CICS automatically maintains consistency between the table and its source data set. All changes to the data table are reflected in the source data set and all changes to the source data set are reflected in the data table.

CICS monitoring facility
The CICS component responsible for monitoring and producing task-related statistics information, such as task CPU usage and waits for I/O request units on an individual task basis. Reporting is divided into classes.

CICSplex
A set of CICS systems that are managed and manipulated as if they were a single entity. A CICSplex can be managed by CICSPlex SM. See also multiregion operation.

CICSPlex SM address space (CMAS)
A CICSPlex SM component that is responsible for managing CICSplexes. A CMAS provides the single-system image for a CICSplex by serving as the interface to other CICSplexes and external programs. There must be at least one CMAS in each MVS image on which you are running CICSPlex SM. A single CMAS can manage CICS systems within one or more CICSplexes.

CICS primary connection region
The web owning region (WOR) of the Multi-Region Option (MRO) connected regions in a CICS test environment. This is the region in which the CICS resource definition server for Application Deployment Manager runs.

CICS region
An instance of CICS Transaction Server that runs in its own z/OS address space.

CICS region user ID
The user ID assigned to a CICS region at CICS initialization. It is specified either in the RACF started procedures table when CICS is started as a started task, or on the USER parameter of the JOB statement when CICS is started as a job.

CICS run unit
A set of statically bound, dynamically bound, or both, modules that can be loaded by a CICS loader.

CICS segment
The portion of a RACF profile containing data for CICS.

CICS system

  1. In CICSPlex SM topology, a definition referring to a CICS system that is to be managed by CICSPlex SM.
  2. The entire collection of hardware and software required by CICS.

CICS system definition data set (CSD)
A VSAM KSDS cluster that contains a resource definition record for every record defined to CICS using resource definition online (RDO).

CICS system group

  1. In CICS business transaction services (BTS), a BTS set, that is the set of CICS regions across which BTS processes and activities may execute.
  2. In CICSPlex SM topology, the user-defined name, description, and content information for a CICS system group. A CICS system group can be made up of CICS systems or other CICS system groups.
  3. A set of CICS systems within a CICSplex that can be managed as a single entity.

CICS Transaction Affinities Utility
A utility designed to detect potential causes of inter-transaction affinity and transaction-system affinity for those users planning to use dynamic transaction routing.

CICS-value data area (CVDA)
An argument to which CICS has assigned a specific and limited set of meaningful values. When a CVDA is specified in an EXEC CICS command, CICS converts the CVDA value name to the corresponding numeric representation.

CICS VSAM Recovery
An IBM product that recovers lost or damaged Virtual Storage Access Method (VSAM) data.

CID

  1. See communication identifier.
  2. See connection identifier.

CIDF
See control interval definition field.

CID methodology
An IBM-specified way to install and configure products on, or remove products from, remote workstations and hosts. Response files and redirected installation and configuration may be used by a CID-enabled product to eliminate or reduce user interaction with the CID-enabled product. See also response file.

CIDR
See Classless Inter-Domain Routing.

CIE
See customer impact event.

CIF

  1. See customer installable feature.
  2. See Common Interchange Format.
  3. See common interchange file.

CIFS
See Common Internet File System.

CII data format
See Center for the Information of Industry data format.

CII root element
A representation of the CII document that Sterling B2B Integrator is mapping. The CII root element is a group and can contain groups and segments.

CIM
See Common Information Model.

CIM agent
The code that consists of common building blocks that can be used instead of proprietary software or device-specific programming interfaces to manage devices that are compliant with the Common Information Model (CIM).

CIM object manager (CIMOM)
The common conceptual framework for data management that receives, validates, and authenticates the CIM requests from the client application. It then directs the requests to the appropriate component or service provider.

CIMOM
See CIM object manager.

CINET
See Common INET.

CINIT
See control initiate.

C interface
The interface that is defined at a level that depends on the variant of C standardized by ANSI.

CIO
See Chief Information Officer.

CIP

  1. See commit in progress.
  2. See customized installation package.

cipher
A cryptographic algorithm used to encrypt data that is unreadable until converted into plain data with a predefined key.

cipher block chaining (CBC)
A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted.

cipher spec
See cipher specification.

cipher specification (cipher spec)
A specification that indicates the data encryption algorithm and key size to use for secure connections.

cipher suite
The combination of authentication, key exchange algorithm, and the Secure Sockets Layer (SSL) cipher specification used for the secure exchange of data.

ciphertext
Data that is encrypted. Ciphertext is unreadable until it is converted into plaintext (decrypted) with a key. See also cleartext.

CIR
See Customer Initiated Release.

circle
An entity representation that can indicate an organization or a group on a chart. A circle is often used to enclose other entities. See also box, representation.

circuit

  1. One or more conductors through which an electric current can flow. See also link, packet switching.
  2. A telecommunication circuit such as a line, conductor, or conduit through which information is transmitted.
  3. In fibre-channel technology, an established communication path between two ports, which consists of two virtual circuits capable of transmitting in opposite directions. See also link.

circuit breaker
A switch that automatically interrupts an electric circuit because of an abnormal condition.

circuit identification code (CIC)
A 12-bit number that identifies a trunk and channel on which a call is carried.

circuit-switched data transmission service
A service that uses circuit switching to establish and maintain a connection before data can be transferred between data terminal equipment (DTE). See also packet-switched data transmission service.

circuit switching
A process that, on demand, connects two or more data terminal equipment (DTEs) and permits the exclusive use of a data circuit between them until the connection is released. See also message switching, packet switching.

circuit type
A template that specifies the layout for the type of circuit or service.

circuit type identifier
An identifier for an unmatched circuit. The identifier is based on the criteria that is stipulated against a specific invoice format.

circular file
A type of file that appends data until full; subsequent incoming data overwrites the data starting at the beginning of the file.

circular layout
A layout in which entities are arranged by type around the circumference of a circle. See also layout.

circular log
A database log in which records are overwritten if they are no longer needed by an active database. See also archive log.

circular logging
In IBM MQ on UNIX and Linux systems and IBM MQ for Windows, the process of keeping all restart data in a ring of log files. See also linear logging.

circular reference
A series of objects where the last object refers to the first object, which can cause the series of references to be unusable.

circular traceability relationship
A relationship between a requirement and itself, or an indirect relationship that leads back to a previously traced-from node. Traceability relationships cannot have circular references.

CISC
See complex instruction set computer.

CISO
See chief information security officer.

CIT
See central inventory team.

citation

  1. A regulation that governs the terms of use, disposal, storage, security, and so on, of a certain type of document or information. A citation is issued by a governing agency in a jurisdiction.
  2. An official order from a police officer to appear before a court for a minor offense.

citizen analyst
A business user who can take advantage of advanced analytics capabilities to derive insights from data. Historically, the use of advanced analytics was limited to data scientists with specialized training.

citizen-centric
Pertaining to improved government operations and services that are centered around a citizen's needs and preferences, and offer better public service processes.

CIU
See common interchange unit.

CKD

  1. See count-key-data device.
  2. See count key data.

CKD record
See count-key-data record.

CL

  1. See control language.
  2. See Command Language.

claim

  1. A request for reimbursement, replacement, or repair for an item or an asset that is under warranty.
  2. A notification to DB2 for z/OS that an object is being accessed. A claim prevents a drain from occurring until the claim is released, which usually occurs at a commit point. See also drain, logical claim.

claim class
A type of object access that can be defined by one of the following characteristics: cursor stability (CS), repeatable read (RR), or write.

C language
A language used to develop application programs in compact, efficient code that can be run on different types of computers with minimal change.

class

  1. A subdivision of a classification comprising of a group of suppliers that have common attributes or characteristics.
  2. An object that contains specifications, such as priority, maximum processing time, and maximum storage, to control the run-time environment of a job. The system-recognized identifier for the object type is *CLS.
  3. In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.
  4. An attribute that is related to a transaction code and a message region that is used to determine scheduling. See also message class, region class.
  5. A section of a module. A class can represent program text, that is, the instructions and data that are loaded into virtual storage during execution. Other classes, such as an external symbol dictionary (ESD) and a relocation dictionary (RLD), are required for binding and loading the program.
  6. A collection of processes (and their associated threads) that have a single set of resource limitation values and target shares applied to them.
  7. In printing, a single alphanumeric character assigned to a print job.
  8. In C++, a user-defined data type. A class data type can contain both data representations (data members) and functions (member functions).
  9. A basic unit of the classification hierarchy used in the Type Designer. There are three classes: item, group, and category.
  10. A grouping of projects that has global properties. The properties are used to manage completed jobs, typically deleting them periodically or starting another job that performs specific cleanup tasks.
  11. The syntactic category for a group of related values. A value can be assigned to different classes in different contexts or scenarios. See also classification, classification, pattern, value.
  12. In RACF, a collection of defined entities (users, groups, and resources) with similar characteristics.
  13. The definition of an object within a specific hierarchy. A class can have properties and methods and can serve as the target of an association.
  14. A description of a set of objects that share the same attributes, operations, methods, relationships, and semantics. A class can use a set of interfaces to specify collections of operations that it provides to its environment. See also interface.
  15. The set of all members of a type of object, such as all contracts, term definitions, organizations, and so on.
  16. In the Distributed Computing Environment (DCE), a category into which objects are placed based on their purpose and internal structure.

class 0
See transport class 0.

class 1
Service that provides a dedicated connection between two ports (also called connection-oriented service), with notification of delivery or nondelivery.

class 1 terminal
A terminal for which the alternate IMS pre-opens backup sessions for the primary sessions that the active IMS opens; VTAM/NCP switches sessions from primary to backup at takeover.

class 2

  1. Connectionless service between ports with notification of delivery or nondelivery.
  2. See transport class 2.

class 2 terminal
A terminal for which IMS in the alternate reestablishes service at takeover.

class 3
In fibre-channel technology, connectionless service between ports without notification of delivery. Other than notification, the transmission and routing of class 3 frames is identical to that of class 2 frames.

class 3 terminal
A terminal that communicates with XRF IMS but whose sessions are not automatically reestablished at takeover.

class 4
See transport class 4.

class A network
In Internet communications, a network in which the high-order (most significant) bit of the IP address is set to 0 and the host ID occupies the three low-order octets.

class assignment rule
A rule that determines which values within a set of process attributes result in a process being assigned to a particular class (superclass or subclass within a superclass).

class attribute
A value in a class object that controls the processing of routing steps in a job. These values include the run priority, time slice, eligibility for purge, default wait time, maximum processing unit time, and maximum temporary storage parameters.

class authority (CLAUTH)
An attribute that allows a user to define RACF profiles in a class defined in the class descriptor table. A user can have class authority to zero or more classes. See also authority.

class binding signature
A hexadecimal value that contains the class signature (obtained from the signature bank) and the inheritance level. The class binding signature is added to the Interface Definition Language (IDL) source file by the signature emitter.

class B network
In Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are set to 1 and 0, respectively, and the host ID occupies the two low-order octets.

Class Broker for Java (CBJ)
A Java tool that allows Java applications to run on a host system that does not have a graphical user interface (GUI). Because the IBM Developer Kit for Java Remote Abstract Window Toolkit is not recommended for complex graphics or highly interactive operations, CBJ for high-performance GUI services can be used.

class C network
In Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are both set to 1 and the next high-order bit is set to 0. The host ID occupies the low-order octet.

class condition
In COBOL, a condition that specifies the character content of a data item as all alphabetic or all numeric.

class descriptor table (CDT)
A table containing a definition of general resource classes. The CDT contains the classes supplied by IBM and the installation-defined classes.

class diagram
A diagram that shows a collection of declarative (static) model elements, such as classes, types, and their contents and relationships.

class F
Connectionless service for inter-switch control traffic, which provides notification of delivery or nondelivery between two expansion ports (E_ports).

class file
A compiled Java source file.

class hierarchy
The relationships between classes that share a single inheritance.

classic command
A supported non-IMSplex command. A classic command generally requires a leading slash, for example, /DBRECOVERY.

classic row compression
Data row compression that is provided by static, table-level compression dictionaries. See also adaptive compression.

class identifier (CLSID)
A Universally Unique Identifier (UUID) that identifies a COM component. Each COM component has its CLSID in the Registry so that it can be loaded by other applications.

classification

  1. The system that defines classes and the relationships among those classes. See also class.
  2. The process of grouping values into specific classes. See also class.
  3. A process for automatically acquiring document properties from the document content or another source.
  4. For Department of Defense (DoD), the value assigned to a declared document, for example, Top Secret, Secret, or Confidential.

classification and regression tree algorithm
A decision tree algorithm that uses recursive partitioning to split the training records into segments by minimizing the impurity at each step. See also Quick, Unbiased, Efficient Statistical Tree algorithm.

classification export utility
A utility that must be used to prepare a model for importing into IBM. data expert A person who understands both business processes and technical implementation.

classification guide
A Department of Defence (D0D) guide that details how information will be classified and marked in a records program.

classification hierarchy
The hierarchy of a type tree in the Type Designer. The deeper the subtype, the more specific the data characteristics are. See also compositional hierarchy.

classification mechanism
A set of class assignment rules that determine the classes to which processes are assigned.

classification model
A model that can be used with sets of training documents to help find other, similar documents. Classification models can be edited or updated, modifying the model file that is associated with that particular classification model.

classification purpose
The determination of how an item classification is used. For example, one classification may be used for receiving preference and another may be used for procurement purposes.

classification rule
A rule used by the workload manager component of z/OS to assign a service class.

classification scheme
See file plan.

classification value
A value within the classification hierarchy that can be associated to an item attribute.

classified
Pertaining to a record that has special access restrictions in addition to normal record security.

classified data model
For Department of Defense (DoD), a data model that implements an extra role that is called the Classification Guide Administrator. This data model consists of the following markings: Top Secret (highest in the hierarchy), Secret, Restricted, and Unclassified (lowest in the hierarchy).

classified record
For Department of Defense (DoD), a hierarchical classification level placed on a document. Other levels are non-classified, secret, top secret, and so on.

classifier

  1. In QoS, a control function that selects packets according to the content within the packet headers.
  2. A specialized attribute used for grouping and color-coding process elements.
  3. An XPath expression that determines the transformation to apply to an inbound event.

class inheritance
A feature that allows a subclass to inherit all of the properties of a superclass, which is its parent in a class hierarchy.

class key
One of the C++ keywords: class, struct, and union.

Classless Inter-Domain Routing (CIDR)
A method for adding class C Internet Protocol (IP) addresses. The addresses are given to Internet Service Providers (ISPs) for use by their customers. CIDR addresses reduce the size of routing tables and make more IP addresses available within organizations.

class library
In object-oriented programming, a collection of prewritten classes or coded templates, any of which can be specified and used by a programmer when developing an application.

class loader
Part of the Java virtual machine (JVM) that is responsible for finding and loading class files. A class loader affects the packaging of applications and the runtime behavior of packaged applications deployed on application servers.

class mask
A network mask that is derived solely on the basis of the network class of an Internet Protocol (IP) address.

class member operator
An operator used to access C++ class members through class objects or pointers to class objects. The class member operators are ., ->, .*, and ->*.

class method

  1. In Java, a method that is called without referring to a particular object. Class methods affect the class as a whole, not a particular instance of the class. See also instance method.
  2. A method that creates class instances.

class name

  1. In the X Window System, the name of a class of resources, widgets, or clients. Resource and widget class names are typically defined in the programming libraries used to create the client.
  2. A unique identifier of a class type that becomes a reserved word within its scope.

class-name
In COBOL, a user-defined word defined in the SPECIAL-NAMES paragraph of the Environment Division that assigns a name to the proposition, for which a truth value can be defined, to verify that the content of a data item consists exclusively of those characters listed in the definition of the class-name.

class object
An object that identifies the run attributes of a job. The system-recognized identifier for the object type is *CLS.

class of service

  1. A set of link and node characteristics, associated with a session or a set of sessions, that determine the route that is selected for the sessions through an APPN network.
  2. In fibre-channel technology, a specified set of delivery characteristics and attributes for frame delivery.
  3. A VTAM term for a list of routes through a network, arranged in an order of preference for their use.
  4. A set of characteristics (such as route security, transmission priority, and bandwidth) used to construct a route between session partners. The class of service is derived from a mode name specified by the initiator of a session.

class-of-service database
A database that is maintained independently by each network node, and optionally by APPN end nodes. The database contains one entry per class-of-service name. Each database entry contains: (a) A definition of the acceptable values for transmission group (TG) and node characteristics for routes described by that class-of-service name and the weight function to be used to compute the weights of nodes and TGs that meet the acceptable values; (b)The transmission priority to be used for traffic that flows on routes described by that class-of-service name.

class-of-service description
A system object created for Advanced Peer-to-Peer Networking (APPN) support that provides the information required to assign relative priority to the transmission groups and intermediate routing nodes for an APPN session. The system-recognized identifier for the object type is *COSD.

class path
A list of directories and JAR files that contain resource files or Java classes that a program can load dynamically at run time.

class scope
The scope of C++ class members. See also namespace scope.

class signature
A hexadecimal value obtained from a server and placed in a signature bank on the workstation. The signature bank uniquely identifies an Interface Definition Language (IDL) interface. Class signatures are added to the IDL source file by the signature emitter.

class statistics
Statistical information that includes information such as the number of instances of the class in the application, the CPU time spent in that class, the number of calls made to the class, and so on.

class style
A combination of formatting characteristics, such as font, font size, and border, that the user names and stores as a set.

class template
A blueprint describing how a set of related C++ classes can be constructed.

class template declaration
A class template declaration introduces the name of a class template and specifies its template parameter list. A class template declaration may optionally include a class template definition.

class template definition
A definition that describes various characteristics of the class types that are its specializations. These characteristics include the names and types of data members of specializations, the signatures and definitions of member functions, accessibility of members, and base classes. See also base class.

class tier
In AIX Workload management, the value that specifies which class is most important. If no tier value is used, all classes are equally important.

class transition
A change in an object's management class or storage class when an event occurs that brings about a change in an object's service level or management criteria. Class transition occurs during a storage management cycle.

clause

  1. A set of consecutive character strings that specify a characteristic of an entry. There are three types of clauses: data, environment, and file.
  2. A set of conditions and variable expressions that represent specific layers in a protocol stack.
  3. In SQL, a distinct part of a statement in the language structure, such as a SELECT clause or a WHERE clause.
  4. The fundamental grouping of REXX syntax. A clause is composed of zero or more blanks, a sequence of tokens, zero or more blanks, and the semicolon delimiter.
  5. A building block of the contract language that may contain legal language or line data.

clause instance
An occurrence of a clause in a contract where the term values are specific to the contract and the language of the clause may be modified to suit the current contract.

clause template
A template that contains the standard language of a clause and includes the legal language, terms, and other properties. See also template.

clause type
A defined clause category for purposes of information and search.

clause visibility feature
A feature which, if enabled, displays only those clauses in the contract language view for which read permission is granted.

CLAUTH
See class authority.

CLAW
See Common Link Access to Workstation.

CLB
See communication line block.

CLC
See Cognitive Learning Companion.

CLDR
See Common Locale Data Repository.

cleanse

  1. To transform the data extracted from operational systems to make it usable by a data warehouse.
  2. To ensure that all values in a data set are consistent and correctly recorded.

clean up
To remove or delete obsolete repository data.

cleanup
In SNA products, a network services request, sent by a system services control point (SSCP) to a logical unit (LU), that causes a particular LU-LU session with that LU to be ended immediately without requiring the participation of either the other LU or its SSCP.

cleanup interval
The length of time to wait before removing obsolete data.

cleanup period
The time period during which a database record that has reached its final state or condition is to remain in the database. After the cleanup period expires for such a record, database cleanup causes the record to be deleted from the database.

cleanup procedure
A procedure that instructs the system to attempt to remove software products that were partially installed and to revert to the previous version of the product. If the system successfully reverts to the previous version, it becomes the currently active version; otherwise, the software product is marked as broken.

clear
In X.25 communication, to reject a call (if it has not yet been accepted) or end a call.

clearance
The control and positioning of plant equipment for providing protection for personnel and equipment during work on plant devices.

clear area
In character recognition, a specified area that is to be kept free of printing or any other markings not related to machine reading. See also intercharacter gap.

ClearCase administrators group
A Windows domain group whose members have superuser access to ClearCase objects.

ClearCase registry
A network service that allows programs to access versioned object bases (VOBs) and views by name instead of network path.

clear cause
See cause code.

clear-confirmation packet
In X.25 communication, a packet transmitted by the DTE to inform the DCE that a call has been cleared.

clear data
See plain text.

clear diagnostic
See diagnostic code.

clear indication packet
In X.25 communications, a call supervision packet that a data circuit-terminating equipment (DCE) transmits to inform a data terminal equipment (DTE) that a call has been cleared.

clearinghouse

  1. A central registry that connects users from multiple instant messaging communities.
  2. In the Distributed Computing Environment (DCE), a collection of directory replicas on one Cell Directory Service (CDS) server. A clearinghouse takes the form of a database file. See also control access.

clearing task
A process of reviewing the registration submitted by a supplier and accepting or rejecting the supplier as per the business requirements.

clear key encryption
Any type of encryption key not protected by encryption under another key.

clear message
A message displayed by DirectTalk to tell the operator that a red or yellow error message has been cleared.

clear request packet
A call supervision packet transmitted by a data terminal equipment (DTE) to ask that a call be cleared.

clear session
A session in which only clear data is transmitted or received. See also cryptographic session, selective cryptographic session.

cleartext
A string of characters sent over a network in readable form. It might be encoded for the purposes of compression, but it can easily be decoded. See also ciphertext.

clear-text password
A password that is comprised of a string of characters sent over a network in readable form. It might be encoded for the purposes of compression, but it can easily be decoded.

cleartool
The primary command-line interface to ClearCase and ClearCase LT version-control and configuration management software.

clear to send (CTS)
In data communication, a signal raised by data circuit-terminating equipment (DCE) when it is ready to accept data, usually in response to request to send (RTS) being raised. See also request to send.

clear user data
In X.25 communications, data optionally included in the clear-request packet by the user application.

CLEM
See Common Language for Expression Manipulation.

clerical record
A record for which the matching process cannot definitively determine if the record is a duplicate record or a nonmatched record or if the record is a matched record or a nonmatched record. See also duplicate record, matched record, nonmatched record.

clerk

  1. In the DCE Distributed Time Service (DTS), a software component that synchronizes the clock for its client system by requesting time values from servers, computing a new time from the values, and supplying the computed time to client applications.
  2. In the DCE Cell Directory Service (CDS), a software component that receives CDS requests from a client application, ascertains an appropriate CDS server to process the requests, and returns the results of the requests to the client application.

CLI

  1. See call level interface.
  2. See command-line interface.

C library
A system library that contains common C language subroutines for file access, string operations, character operations, memory allocation, and other functions.

click
To press and release a mouse button without moving the pointer off the choice.

clickstream
In web advertising, the sequence of clicks or pages requested as a visitor explores a website.

clickthrough
A marketing tool that reports the number of times a customer clicks on the displayed content to find out more information about the subject.

clickthrough rate
In web advertising, the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page. See also impression.

Click-to-Action (C2A)
A method for implementing cooperative portlets, whereby users can click an icon on a source portlet to transfer data to one or more target portlets. See also cooperative portlets, wire.

click-to-call
A feature that allows a user to select two or more contacts and then call them at the same time, initiating an audio conference.

click-to-conference
A Sametime Unified Telephony feature that allows a user to select two or more contacts and then call them at the same time, initiating a conference.

client

  1. The user interface application installed at the customer site.
  2. A software program or computer that requests services from a server. See also host, server.
  3. A runtime component that provides access to queuing services on a server for local user applications. The queues used by the applications reside on the server. See also IBM MQ fully managed .NET client, IBM MQ Java client, IBM MQ MQI client.
  4. See customer.

client acceptor
A service that serves the Java applet for the web client to web browsers. On Windows systems, the client acceptor is installed and run as a service. On AIX, UNIX, and Linux systems, the client acceptor is run as a daemon.

client acceptor daemon (CAD)
See client acceptor.

client API
The interface used by client applications to invoke services in CICS using the facilities of the Client daemon. See also external call interface, external security interface.

client application

  1. A user application, written in a supported programming language other than Java, that communicates directly with the Client daemon.
  2. An application written with the Content Manager APIs to customize a user interface.
  3. An application that users the services of the database services by direct connection or via application servers. See also client/server architecture.
  4. An application written with object-oriented or Internet APIs to access content servers from Information Integrator for Content.
  5. A storage management program that initiates Common Information Model (CIM) requests to the CIM agent for the device.
  6. An application, running on a workstation and linked to a client, that gives the application access to queuing services on a server.

Client Application for Windows
A complete object management system provided with Content Manager and written with Content Manager APIs. It supports document and folder creation, storage, and presentation, processing, and access control.

client application thread
In DCE remote procedure call (RPC), a thread executing client application code that makes one or more RPCs.

client authentication

  1. The process by which a client's identity is verified.
  2. In CSIv2 security, a token-based client authentication mechanism for which Generic Security Services Username Password (GSSUP) is the minimum requirement, but additional requirements, such as Lightweight Third Party Authentication (LTPA), might exist.

client center
A center that provides an environment for clients, IBM Business Partners, and IBM employees to meet, and to access knowledge, expertise, and innovation.

client certificate
A certificate that is presented by the client to a server prior to forming an active connection.

client channel definition table (CCDT)
A file that contains one or more client-connection channel definitions.

client configuration tool
A Notes application that connects a Notes client to a cloud mail server.

client-connection channel type
The type of MQI channel definition associated with an IBM MQ client. See also server-connection channel type.

client context

  1. A mapping from keys to values. If a provider returns a client context for a particular object, that context is merged with the context specified through setClientContext(), if any. The client context can then be tailored for the specific objects being processed.
  2. In the Distributed Computing Environment (DCE), the state within a Remote Procedure Call (RPC) server generated by a set of remote procedures and maintained across a series of calls for a particular client.

Client daemon
A daemon that manages network connections to CICS servers. It processes ECI, EPI, and ESI requests, sending and receiving the appropriate flows from the CICS server to satisfy the application requests. The Client daemon (process cclclnt) exists only on distributed platforms.

client domain
The set of drives, file systems, or volumes that the user selects to back up or archive data, using the backup-archive client.

client end node
An end node for which the network node provides network services.

client framework
A set of scripts that are deployed with a web application or mobile native application to capture user interactions on the client that would not otherwise require a server interaction. By capturing these user interface events, a client framework can provide unique insight into the activities of visitors within their browsing devices.

client group
A group of clients that specify the volumes that are backed up. Client groups can also include SQL and Exchange databases for backup, even if they span across multiple disk volumes.

Client Health Information Portal (CHIP)
A tool that measures the health of the Integrated Technology (ITD) account portfolio. Analogous to the tool that a manufacturing company would use to keep track of manufacturing a physical object, CHIP keeps track of services delivery quality at the client accounts.

client ID
See client identifier.

client identifier (client ID)
A piece of information that identifies an individual application. An application can invoke an API only if it passes an application key that is recognized by the IBM API Management system and is granted access to the API. The application key is passed by the client by using an HTTP query parameter.

client initialization file
A file containing configuration information used to inform the CICS Client of the CICS servers it can connect to, and the communication protocols to be used.

Client Input Output Sockets (CLIO/S)
A set of commands and APIs that can be used for high-speed communication and to access tape devices on a network of AIX workstations and MVS mainframes.

client journey
The stages a client experiences before, during, and after making a buying decision. The four stages of this journey are discovery, engagement, conversion, and advocacy.

client locale
The locale that a client application uses to perform read and write operations on the client computer. See also locale, server locale.

client logical partition
A logical partition that uses the I/O resources of another logical partition, for example, a logical partition that uses the resources of a Virtual I/O Server logical partition.

client message
A message from a client application that is to be sent by means of a network to its destination, or a message that is routed to a client application to acknowledge the receipt of a client message by a network.

client node

  1. In a single system image (SSI), a WebSphere Voice Response system that handles interactions with callers. A client node must have a telephony connection. It does not store application or voice data; it gets data from the server node of the SSI.
  2. A file server or workstation on which the backup-archive client program has been installed, and which has been registered to the server.

client node session
A session in which a client node communicates with a server to perform backup, restore, archive, retrieve, migrate, or recall requests. See also administrative session.

client option set
A group of options that are defined on the server and used on client nodes in conjunction with client options files.

client options file
An editable file that identifies the server and communication method, and provides the configuration for backup, archive, hierarchical storage management, and scheduling.

client pattern
A method to determine which clients to monitor, and how to group them for reporting.

client-polling scheduling mode
A method of operation in which the client queries the server for work. See also server-prompted scheduling mode.

client process
A process that requests services from a server process. See also server process.

client product key
The customer's unique SKU identifier for this product.

client program

  1. A program that uses a C++ class.
  2. In dynamic routing the application program, running in the requesting region, that issues a remote link request.
  3. In the client/server model, the front-end transaction.

client project for RuleApps
A predefined project for Eclipse that contains a class to execute a ruleset within a RuleApp.

client proxy
An object on the client side of a network connection that provides a remote procedure call interface to a service on the server side.

client reroute
A method that allows a client application, upon the loss of communication with a database server and the predefinition of an alternative server, to continue working with the original database server or the alternative server with only minimal interruption of the work.

client schedule
A database record that describes the planned processing of a client operation during a specific time period. The client operation can be a backup, archive, restore, or retrieve operation, a client operating system command, or a macro. See also administrative command schedule, central scheduler, schedule.

client secret
A piece of information that is used with an application key to verify the identity of an application. An API can be configured to require that client applications supply their application secret with their application key. The application secret functions effectively as a password known only to the application. The application secret is passed by the client using an HTTP query parameter.

client/server
Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server. See also distributed application.

client/server architecture
A hardware and software design that allows the user interface and database server to reside on separate nodes or platforms on a single computer or over a network. See also client application, server-processing locale.

client/server connection statement
An SQL statement that can connect to a database. These statements include CONNECT, DISCONNECT, and SET CONNECTION.

client side
In an ebMS exchange, the partner using the service, or a service user.

client-side
Pertaining to an operation that is performed on the client application and not on the server.

client-side authentication component
A component that collects client information, then uses login modules to verify this information.

client-side human service
A human service that runs in the web browser and can call the server to obtain data. A client-side human service can be used to implement an interactive task, a dashboard, or a user interface for a case or process instance that users can use to manage cases or processes in an application. See also heritage human service, human service.

Client Solutions Executive (CSE)
An executive member of the Strategic Sales team who is focused on both new logo and base growth opportunities, and is responsible for successfully selling large, complex services opportunities.

client state manager (CSM)

  1. A component of the client kernel that provides protocol support for the client.
  2. A station that consists of a control unit (a cluster controller) and the terminals attached to it.

character precision
In architecture, the acceptable amount of variation in the appearance of a character on a physical medium from a specified ideal appearance, including no acceptable variation. Examples of appearance characteristics that can vary for a character are shape and position.

character printer
A device that prints a single character at a time. See also line printer.

character property
Any detail about how a character is printed relative to the other characters around it. Character properties are box size, horizontal and vertical character cell size, character ID, center line, baseline, left space, right space, above space, and below space.

character raster pattern
The scan (picture element) pattern for a character graphic of a particular size, weight, and style.

character recognition
The identification of geographic, phonic, or other characters by automatic, magnetic, optical, or mechanical means.

character reference point

  1. The point along the character baseline within the character box that coincides with the current print position.
  2. The point that corresponds to the origin of the character coordinate system. The character reference point coincides with the presentation position when the character is formed in the presentation process. See also current print position.

character rotation
The alignment of a character with respect to its character baseline, measured in degrees in a clockwise direction. See also orientation.

character set

  1. A set of binary codes that represent specific text characters.
  2. A list of characters (letters, numbers, and symbols such as #, $, and &) that are recognized by computer hardware and software.
  3. A defined set of characters with no coded representation assumed that can be recognized by a configured hardware or software system. A character set can be defined by alphabet, language, script, or any combination of these items.

character set attribute
In architecture, an attribute used to specify a coded font.

character set encoding
The ability to encode different character sets in mailings so that mailings can be sent in any language.

character set identifier 65534
The character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 ( FFFE ) is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs tagged for each individual field it contains. If the file is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.

character set identifier 65535
The character set identifier (CCSID) that is used to show that data associated with the CCSID should not be processed as coded-graphic-character data.

character set metric
One of the measurements used to describe a characteristic of the all the characters in that font. Examples are height, width, and character increment for each character of the font. See also character metric, font metric, relative metrics.

character shape
The visual representation of a graphic character.

character shape presentation
The formation of a character shape on a physical medium at an addressable position determined by the formatting process.

character shear
See shear.

character space
The horizontal space or size of a character. This size depends on the character, the font, and the device on which the character is printed.

character spacing
See character increment.

character special file
An interface file that provides access to an input or output device, which uses character I/0 instead of block I/0. See also block special file.

characters per inch (cpi)
The number of characters printed horizontally within an inch across a page.

characters per second (cps)
The number of characters that a device can print in one second.

character string

  1. A contiguous sequence of characters that are treated as a unit.
  2. A contiguous sequence of characters terminated by and including the first null byte.
  3. A sequence of bytes that represents bit data, single-byte characters, or a mixture of single-byte and multibyte characters.

character string delimiter
A character that is used to identify the beginning and the end of a character string.

character substring
A contiguous portion of a character string.

character times
In CCP, the maximum number of times that the temporary text delay character can (a) be sent to a terminal before the operation stops; or (b) be sent between the end of a receive operation and the beginning of a transmit operation.

character translation
In international character support, the dd command and various conversion subroutines that translate between extended characters and ASCII escape strings to preserve unique character information.

character type
A data type that consists of alphanumeric characters.

character variable

  1. In the C language, a data object having a value that can be changed while a program is running and having a data type that is a signed or unsigned character.
  2. Character data with a value that is assigned or changed while the program is running.

charge
An assertion of a specific crime for which a suspect has been accused of committing.

charge and allowance code
An industry-standard identifier that the shipper assigns to each accessorial.

charge-back

  1. A financial penalty that is assigned to a vendor for violations to compliance rules and other criteria.
  2. The rate that is charged to the business for a specific application data source.

charge-back account
An account used for tracking computing resource usage by business departments or projects. Examples of charge-back accounts are "Marketing Department" or "Summer catalog project."

chargeback allocation
A charge category used for cost allocation.

charge-back identifier
A label, which is often tied to an algorithm or set of rules, that is not guaranteed to be unique, but is used to identify and distinguish a specific charge-back item or charge-back entity from others.

charge code
An accounting code that is used to register and categorize costs against project budgets.

charge feature
An optional feature for either software or hardware for which there is a charge.

charge out
To check out and track a physical record.

charge sequence
The sequence in which Sterling Selling and Fulfillment Foundation creates authorization or charge requests. For example, the charge sequence might specify that gift certificates are to be used before a credit card is charged.

charging requesting service
In X.25 communication, an optional facility that specifies that charging information (segment count data, monetary unit data, or call duration data) is required.

chart

  1. A visual representation of real-world objects, such as organizations, people, events, or locations, and the relationships between them.
  2. A picture defined in terms of graphics primitives and graphics attributes.

chart area
In the GDDM function, the part of the picture space in which a business chart is to be drawn.

chart format
In Business Graphics Utility, an object containing chart characteristics, such as the chart type, chart heading, legend position, and so on. The chart format does not include the data values to be plotted. The system-recognized identifier for the object type is *CHTFMT.

chart fragment
A view of a chart that highlights particular items of interest.

charting scheme
A definition that describes how item data behaves when it is visualized on a chart. For example, how data is copied into chart item properties, the chart template and labeling scheme to use, and whether to display attributes and pictures. See also chart template.

chart layer
A map layer that contains the items that have been sent from the chart surface to the mapping tool.

chart layout
In Business Graphics Utility, the arrangement of the various parts in the chart area and surrounding margins.

chart of accounts (COA)
A detailed listing of all the accounts used by a company.

chart property
A characteristic of a chart, such as its summary description, time zone, grid size, background color, or merge and paste rules. Chart properties are saved with the chart. See also chart template.

chart series
A selection of a category of data that will be represented by a chart in a report. A chart can have multiple chart series to represent multiple types of data.

chart template
An object that is used for chart creation that contains preconfigured chart properties, and lists of permitted entity types and link types. See also chart property, charting scheme.

CHASE
In SNA, a command used by the host system to determine when the secondary logical unit has finished processing all previously sent response units.

chassis
The metal frame in which various electronic components are mounted.

chassis detect-and-deploy profile
A profile that IBM Director automatically applies to all new BladeCenter chassis when they are discovered. The profile settings include management module name, network protocols, and static IP addresses. If Remote Deployment Manager (RDM) is installed on the management server, the chassis detect-and-deploy profile also can include deployment policies.

chat
The sending of typed messages between online participants. See also instant message.

chat script
In remote communication, a list of expect-send sequences that a modem uses to establish a communication link with another modem.

chat transcript
A file that contains a copy of the typed messages between participants in a chat meeting.

cheat sheet
An interface that guides users through the wizards and steps required to perform a complex task, and that links to relevant sections of the online help.

check

  1. A periodic inspection of an aircraft after a specified amount of time in service.
  2. A process for determining accuracy.
  3. In printers, an action message that instructs the printer operator to inspect a component. For example, the CHECK TONER COLLECTOR message means that the operator should look at the toner-collector bottle and make sure that it is physically present, in the proper place, and correctly installed.
  4. To look for a condition.

check box
A square box with associated text that represents a choice. When a user selects the choice, the check box is filled to indicate that the choice is selected. The user can clear the check box by selecting the choice again, thereby deselecting the choice.

check character
A character used for the purpose of performing a check.

CHECK clause
In SQL, an extension to the SQL CREATE TABLE and SQL ALTER TABLE statements that specifies a table check constraint.

check condition
A restricted form of search condition used in check constraints.

check constraint
A user-defined constraint that specifies the values that specific columns of a base table can contain. See also constraint.

check digit

  1. A check key consisting of a single digit.
  2. The far right number of a self-check field that is used to verify the accuracy of the field.

checked-out version
A copy of a file that corresponds to a version of an element. See also version.

check-in

  1. The action that creates a new version of an element on any branch of its version tree.
  2. The operation of returning code back into a code repository on source code control systems.

checkin
See check-in.

check in

  1. To upload the language of a checked out draft authored/received contract or amendment contract into the application.
  2. In certain software configuration management (SCM) systems, to copy files back into the repository after changing them.
  3. To replace an inactive document, project WBS element, scope element, requirement or resource record (with its modifications) to its repository directory so that others can view it or modify it.
  4. To save local changes in a change set that is part of a repository workspace. A checked-in change set can later be shared with a team by delivering the change set.

check-in screen
The screen identifying the host screen that should be active for a connection to be considered ready to be returned to the connection pool. If the application is not on the screen specified by the check-in screen, the connection will be discarded or recycled in attempt to return the connection to the host screen specified by the check-in screen. The check-in screen is only meaningful if connection pooling is specified for a connection.

check integrity
The condition that exists when each row in a table conforms to the check constraints that are defined on that table.

check out

  1. In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified. See also reservation version status.
  2. To remove an active document, project WBS element, scope element, requirement or resource record from its repository directory in order to modify it. Only one individual may check out the same element at a time.
  3. To download the language of a draft authored/received contract or amendment contract from the application to modify it.

check pending

  1. A state that occurs when data for a constraint cannot be verified as valid. A constraint could be either a referential constraint or a check constraint.
  2. In DB2 for z/OS, a state into which a table can be put where only limited activity is allowed on the table and constraints are not checked when the table is updated. See also set integrity pending.

checkpoint

  1. A compressed file that contains configuration data from a specific point in time.
  2. A point at which the database manager records internal status information in the log; the recovery process uses this information if the subsystem abnormally terminates.
  3. A place in a program at which a check is made, or at which a recording of data is made to allow the program to be restarted.
  4. To pause a running process and save its current state.

checkpoint algorithm
The algorithm that determines when to commit all global transactions for the job steps in a batch application. See also results algorithm.

checkpoint data set
A local data set that contains Common Queue Server (CQS) system checkpoint information about a group of shared queues.

checkpointing
The periodic copying of processing information to the checkpoint data set. Checkpointing ensures that information about in-storage job and output queues is not lost in the event of a hardware or software error.

checkpoint reconfiguration
A process that allows a user to dynamically redefine checkpoint data-set specification for the JES multi-access spool (MAS) configuration.

checkpoint reconfiguration dialog
An interactive form of a JES2 checkpoint reconfiguration that directs the reconfiguration process with replies to a series of WTOR messages.

checkpoint restart
The process of resuming a job at a checkpoint within the job step that caused abnormal termination. The restart can be automatic or deferred. A deferred restart requires that the job be resubmitted. See also automatic restart, deferred restart, step restart.

checkpoint/restart facility
A facility for restarting execution of a program at some point other than at the beginning, after the program was terminated due to a program or system failure. A restart can begin at a checkpoint or from the beginning of a job step, and uses checkpoint records to reinitialize the system.

checkpoint size
In OSI X.400, the maximum amount of data (in units of 1024 bytes) that can be sent between two minor synchronization points. The checkpoint size is used by the X.400 reliable transfer server.

check point snapshot
A snapshot, created at the end of a snapshot chain, that contains all changes from the last incremental delta block.

checkpoint write
Any write to the checkpoint data set. A checkpoint write is a primary, intermediate, or final write that updates a checkpoint data set.

checkstop
A severe error inside a processor core that causes a processor core to stop all processing activities.

checksum

  1. On a diskette, data written in a section for error detection purposes.
  2. A small piece of data that is derived from an arbitrary block of digital data for the purpose of detecting errors that might have been introduced during its transmission or storage.
  3. The sum of a group of data that is associated with another group of data and that is used for error detection.

checksum protection

  1. A function that protects data stored in an auxiliary storage pool from being lost because of the failure of a single disk. When checksum protection is in effect and a disk failure occurs, the system automatically reconstructs the data when the system program is loaded after the device is repaired. See also device parity protection, mirrored protection.
  2. In TCP/IP, the sum of a group of data associated with the group and used for error checking purposes.

checksum set
Units of auxiliary storage defined in groups to provide a way for the system to recover data if a disk failure occurs when checksum protection is in effect.

chicken role
In agile development, the peripheral participants in scrum development. This includes the product manager, testers, customers, customer advocates, and other stakeholders. See also pig role, scrum.

chiclet
An icon that represents the availability of an RSS feed on a web page or an option that allows users to share the information through social media.

chiclet keyboard
A keyboard with small, flat, rectangular keys that have straight instead of angled edges.

Chief Information Officer (CIO)

chief information security officer (CISO)
A person responsible for the protection of enterprise information and assets.

child

  1. In a generalization relationship, the specialization of another element, the parent.
  2. In a hierarchy or auto-level hierarchy, a member that has at least one parent.
  3. Pertaining to a secured resource, either a file or library, that uses the user list of a parent resource. See also parent.
  4. A node that is subordinate to another node in a tree structure. Only the root node is not a child.

child activity
An activity that is launched during the processing of another activity, which becomes the parent activity. See also parent activity.

child category
A category that is subordinate to another category in a hierarchy. See also category page, parent category.

child circuit
A circuit that is a subordinate circuit under a parent circuit.

child class
A class that inherits instance methods, attributes, and instance variables directly from the parent class (also known as the base class or superclass), or indirectly from an ancestor class.

child component
Optional second or lower level of a hierarchical item type. Each child component is directly associated with the level above it.

child device
A device that is connected to a parent device.

child document
A document that inherits its values from another document (the parent document).

child enclave
The nested enclave created as a result of certain commands being issued from a parent enclave. See also nested enclave, parent enclave.

child expression
A list of columns in a child table that relate to corresponding columns in a parent table. See also parent expression.

child item
An item that is a part of an item with variations and has the same set of attributes as the item with variations, with minor distinct differences.

child lock
In explicit hierarchical locking, a lock that is held on a table, a page, a row, or a large object. Each child lock has a parent lock. See also parent lock.

child node
A node within the scope of another node. See also parent node.

child order
For subscriptions or recurring orders, the subordinate to the parent order. For example, a parent order is the subscription to the magazine itself, while the child order is one of the monthly issues. See also parent order.

child organizational entity
One or more further levels of organizational entities that exist beneath the parent organizational entity.

child process
A process that is created by a parent process and that shares the resources of the parent process to carry out a request.

child resource
A secured resource, either a file or library, that uses the user list of a parent resource. A child resource can have only one parent resource.

child resource group
A resource group that depends on certain application services that a parent resource group provides. A child resource group is acquired on any node in the cluster only after the parent resource group has been activated. See also dependent resource groups, parent resource group.

child segment
In a database, any segment that is dependent on another segment above it (its parent) in the hierarchy.

child table
A table that has a referential constraint to a column in a different table; the referenced table is called a parent table. See also parent table.

child UR
A unit of recovery (UR) cascaded from a parent UR in a cascaded transaction.

child widget
In AIXwindows and Enhanced X-Windows, a widget that is managed by another widget, the parent. For example, Composite widgets typically manage the Primitive children widgets attached to them.

child window
A window that appears within the border of its parent window (either a primary window or another child window). When the parent window is resized, moved, or destroyed, the child window also is resized, moved, or destroyed. However, the child window can be moved or resized independently from the parent window, within the boundaries of the parent window.

child work item
A work item created for each participant in a multi-participant step and for each route taken simultaneously from an AND-split step.

China Association for Standards (CAS)
The national standards-setting organization in The Peoples' Republic of China.

Chinese numeral
One of the Chinese characters that represent numbers. For example, the Chinese characters for 1, 2, and 3 are written with one, two, and three horizontal brush strokes, respectively. See also Arabic numeral, Hindi numeral, number, Roman numeral.

CHIP
See Client Health Information Portal.

chip
See chad.

chi-square
A test statistic used to indicate the probability that two fields are unrelated, in which case any differences between observed and expected frequencies are the result of chance alone. If this probability is very small (typically less than 5%) the relationship between the two fields is said to be significant.

Chi-squared Automatic Interaction Detector algorithm (CHAID)
A decision tree algorithm that uses chi-square statistics to identify optimal splits. Unlike the C & R tree and QUEST nodes, CHAID can generate nonbinary trees, meaning that some splits have more than two branches. See also decision tree algorithm, regression tree algorithm.

choice
An option in a pop-up window or menu used to influence the operation of the system.

choice activity
One of three types of complex BPML activities. A choice activity is used to make decisions in the business process model and runs only one of the child activities it contains. The choice activity makes it possible to model branch processing.

choice list
A list of predefined property values. A choice list presents a list of valid choices, such as a list of states or ZIP codes.

choice point
A point that is set automatically by CP Optimizer as it executes a goal during the search for a solution. At the choice point, the engine records the current state of constraints, variables, and domains, along with other goals not yet executed. If execution of the goal leads to failure, CP Optimizer backtracks to the choice point, restores the state recorded, and tries one of the stored goals.

choice type
A group type with a subclass equal to choice that is used to define a selection from a set of components. A choice type defines a choice group, which is valid when the data matches one of the components in the choice group.

Cholesky factoring
A technique that is used to factor a matrix into the product of a lower triangular matrix and its conjugate transpose.

chord
A short line segment whose end points lie on a circle. Chords are a means for producing a circular image from straight lines.

chore
An object that executes one or more processes at a user-defined frequency.

choreography

  1. An ordered sequence of message exchanges between two or more participants. In a choreography there is no central controller, responsible entity, or observer of the process.
  2. An agreed upon sequence of business events that is allowed by a seller for each transaction.

CHP
See channel process.

CHPID
See channel-path identifier.

chromeless browser
A web browser window that does not have user interface elements such as borders, frames, menus, toolbars, or scroll bars. See also browser chrome.

CHS
See Simplified Chinese.

CHT
See Traditional Chinese.

cHTML
See Compact Hypertext Markup Language.

chunk

  1. A data storage location. For example, a raw disk device or a cooked file.
  2. A group of archived business processes.

chunked-transfer encoding
A data transfer mechanism in HTTP that sends data in smaller sections of data called “chunks” that allows for dynamic generation and transmission of content.

chunk step
A step that follows a preconfigured checkpoint policy. A chunk step performs item-oriented processing by using a reader-processor-writer batch pattern.

chute dedication
In a warehouse, the exclusive assignment of a dock door or chute to a particular carrier.

CI

  1. See callable interface.
  2. See configuration item.
  3. See control interval.
  4. See continuous integration.

CIB

  1. See condition information block.
  2. See cluster information base.

CIC

  1. See circuit identification code.
  2. See concurrent image copy.

cicero
In the didot point system, a unit of 0.1776 inch (4.512 millimeters) used in measuring typographical material.

CICS
An IBM licensed program that provides online transaction-processing services and management for business applications.

CICS attachment facility
A facility that provides a multithread connection to a DB2 database to allow applications that run in the CICS environment to execute DB2 commands.

CICS BTS
See business transaction services.

CICS bundle
A set of XML files that defines or references the resources for a component of an application or a whole application, or another artifact relating to applications, such as a policy. A CICS bundle is installed in a CICS region. Multiple CICS bundles can be referenced by a management bundle. See also application binding, bundle, management bundle, platform, stand-alone CICS bundle.

CICS-deployed JAR file
A deployed JAR file that has been produced specifically for the CICS EJB server and stored in the hierarchical file system.

CICS dynamic storage area (CDSA)
A storage area allocated from CICS-key storage below the 16 MB line. The CDSA is used for all non-reentrant CICS-key RMODE(24) programs, all CICS-key task-lifetime storage in 24-bit storage, and CICS control blocks that reside in 24-bit storage.

CICS EJB server
One or more CICS regions that support enterprise beans. A logical CICS EJB server typically consists of multiple (cloned) CICS listener regions and multiple (cloned) CICS AORs. The listener regions and AORs may be combined into listener/AORs.

CICS group
An i5/OS library containing the CICS resource definition for CICS tables.

CICS-IBM MQ API crossing exit
An exit that intercepts IBM MQ calls as they are being run, for monitoring, testing, maintenance, or security purposes.

CICS-key
Storage protection key in which CICS is given control (key 8) when CICS storage protection is used. This key is for CICS code and control blocks. CICS-key storage can be accessed and modified by CICS. Application programs in user-key cannot modify CICS-key storage, but they can read it. CICS-key storage is obtained in MVS key-8 storage. See also user-key storage.

CICS-maintained data table
A type of CICS data table, for which CICS automatically maintains consistency between the table and its source data set. All changes to the data table are reflected in the source data set and all changes to the source data set are reflected in the data table.

CICS monitoring facility
The CICS component responsible for monitoring and producing task-related statistics information, such as task CPU usage and waits for I/O request units on an individual task basis. Reporting is divided into classes.

CICSplex
A set of CICS systems that are managed and manipulated as if they were a single entity. A CICSplex can be managed by CICSPlex SM. See also multiregion operation.

CICSPlex SM address space (CMAS)
A CICSPlex SM component that is responsible for managing CICSplexes. A CMAS provides the single-system image for a CICSplex by serving as the interface to other CICSplexes and external programs. There must be at least one CMAS in each MVS image on which you are running CICSPlex SM. A single CMAS can manage CICS systems within one or more CICSplexes.

CICS primary connection region
The web owning region (WOR) of the Multi-Region Option (MRO) connected regions in a CICS test environment. This is the region in which the CICS resource definition server for Application Deployment Manager runs.

CICS region
An instance of CICS Transaction Server that runs in its own z/OS address space.

CICS region user ID
The user ID assigned to a CICS region at CICS initialization. It is specified either in the RACF started procedures table when CICS is started as a started task, or on the USER parameter of the JOB statement when CICS is started as a job.

CICS run unit
A set of statically bound, dynamically bound, or both, modules that can be loaded by a CICS loader.

CICS segment
The portion of a RACF profile containing data for CICS.

CICS system

  1. In CICSPlex SM topology, a definition referring to a CICS system that is to be managed by CICSPlex SM.
  2. The entire collection of hardware and software required by CICS.

CICS system definition data set (CSD)
A VSAM KSDS cluster that contains a resource definition record for every record defined to CICS using resource definition online (RDO).

CICS system group

  1. In CICS business transaction services (BTS), a BTS set, that is the set of CICS regions across which BTS processes and activities may execute.
  2. In CICSPlex SM topology, the user-defined name, description, and content information for a CICS system group. A CICS system group can be made up of CICS systems or other CICS system groups.
  3. A set of CICS systems within a CICSplex that can be managed as a single entity.

CICS Transaction Affinities Utility
A utility designed to detect potential causes of inter-transaction affinity and transaction-system affinity for those users planning to use dynamic transaction routing.

CICS-value data area (CVDA)
An argument to which CICS has assigned a specific and limited set of meaningful values. When a CVDA is specified in an EXEC CICS command, CICS converts the CVDA value name to the corresponding numeric representation.

CICS VSAM Recovery
An IBM product that recovers lost or damaged Virtual Storage Access Method (VSAM) data.

CID

  1. See communication identifier.
  2. See connection identifier.

CIDF
See control interval definition field.

CID methodology
An IBM-specified way to install and configure products on, or remove products from, remote workstations and hosts. Response files and redirected installation and configuration may be used by a CID-enabled product to eliminate or reduce user interaction with the CID-enabled product. See also response file.

CIDR
See Classless Inter-Domain Routing.

CIE
See customer impact event.

CIF

  1. See customer installable feature.
  2. See Common Interchange Format.
  3. See common interchange file.

CIFS
See Common Internet File System.

CII data format
See Center for the Information of Industry data format.

CII root element
A representation of the CII document that Sterling B2B Integrator is mapping. The CII root element is a group and can contain groups and segments.

CIM
See Common Information Model.

CIM agent
The code that consists of common building blocks that can be used instead of proprietary software or device-specific programming interfaces to manage devices that are compliant with the Common Information Model (CIM).

CIM object manager (CIMOM)
The common conceptual framework for data management that receives, validates, and authenticates the CIM requests from the client application. It then directs the requests to the appropriate component or service provider.

CIMOM
See CIM object manager.

CINET
See Common INET.

CINIT
See control initiate.

C interface
The interface that is defined at a level that depends on the variant of C standardized by ANSI.

CIO
See Chief Information Officer.

CIP

  1. See commit in progress.
  2. See customized installation package.

cipher
A cryptographic algorithm used to encrypt data that is unreadable until converted into plain data with a predefined key.

cipher block chaining (CBC)
A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted.

cipher spec
See cipher specification.

cipher specification (cipher spec)
A specification that indicates the data encryption algorithm and key size to use for secure connections.

cipher suite
The combination of authentication, key exchange algorithm, and the Secure Sockets Layer (SSL) cipher specification used for the secure exchange of data.

ciphertext
Data that is encrypted. Ciphertext is unreadable until it is converted into plaintext (decrypted) with a key. See also cleartext.

CIR
See Customer Initiated Release.

circle
An entity representation that can indicate an organization or a group on a chart. A circle is often used to enclose other entities. See also box, representation.

circuit

  1. One or more conductors through which an electric current can flow. See also link, packet switching.
  2. A telecommunication circuit such as a line, conductor, or conduit through which information is transmitted.
  3. In fibre-channel technology, an established communication path between two ports, which consists of two virtual circuits capable of transmitting in opposite directions. See also link.

circuit breaker
A switch that automatically interrupts an electric circuit because of an abnormal condition.

circuit identification code (CIC)
A 12-bit number that identifies a trunk and channel on which a call is carried.

circuit-switched data transmission service
A service that uses circuit switching to establish and maintain a connection before data can be transferred between data terminal equipment (DTE). See also packet-switched data transmission service.

circuit switching
A process that, on demand, connects two or more data terminal equipment (DTEs) and permits the exclusive use of a data circuit between them until the connection is released. See also message switching, packet switching.

circuit type
A template that specifies the layout for the type of circuit or service.

circuit type identifier
An identifier for an unmatched circuit. The identifier is based on the criteria that is stipulated against a specific invoice format.

circular file
A type of file that appends data until full; subsequent incoming data overwrites the data starting at the beginning of the file.

circular layout
A layout in which entities are arranged by type around the circumference of a circle. See also layout.

circular log
A database log in which records are overwritten if they are no longer needed by an active database. See also archive log.

circular logging
In IBM MQ on UNIX and Linux systems and IBM MQ for Windows, the process of keeping all restart data in a ring of log files. See also linear logging.

circular reference
A series of objects where the last object refers to the first object, which can cause the series of references to be unusable.

circular traceability relationship
A relationship between a requirement and itself, or an indirect relationship that leads back to a previously traced-from node. Traceability relationships cannot have circular references.

CISC
See complex instruction set computer.

CISO
See chief information security officer.

CIT
See central inventory team.

citation

  1. A regulation that governs the terms of use, disposal, storage, security, and so on, of a certain type of document or information. A citation is issued by a governing agency in a jurisdiction.
  2. An official order from a police officer to appear before a court for a minor offense.

citizen analyst
A business user who can take advantage of advanced analytics capabilities to derive insights from data. Historically, the use of advanced analytics was limited to data scientists with specialized training.

citizen-centric
Pertaining to improved government operations and services that are centered around a citizen's needs and preferences, and offer better public service processes.

CIU
See common interchange unit.

CKD

  1. See count-key-data device.
  2. See count key data.

CKD record
See count-key-data record.

CL

  1. See control language.
  2. See Command Language.

claim

  1. A request for reimbursement, replacement, or repair for an item or an asset that is under warranty.
  2. A notification to DB2 for z/OS that an object is being accessed. A claim prevents a drain from occurring until the claim is released, which usually occurs at a commit point. See also drain, logical claim.

claim class
A type of object access that can be defined by one of the following characteristics: cursor stability (CS), repeatable read (RR), or write.

C language
A language used to develop application programs in compact, efficient code that can be run on different types of computers with minimal change.

class

  1. A subdivision of a classification comprising of a group of suppliers that have common attributes or characteristics.
  2. An object that contains specifications, such as priority, maximum processing time, and maximum storage, to control the run-time environment of a job. The system-recognized identifier for the object type is *CLS.
  3. In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.
  4. An attribute that is related to a transaction code and a message region that is used to determine scheduling. See also message class, region class.
  5. A section of a module. A class can represent program text, that is, the instructions and data that are loaded into virtual storage during execution. Other classes, such as an external symbol dictionary (ESD) and a relocation dictionary (RLD), are required for binding and loading the program.
  6. A collection of processes (and their associated threads) that have a single set of resource limitation values and target shares applied to them.
  7. In printing, a single alphanumeric character assigned to a print job.
  8. In C++, a user-defined data type. A class data type can contain both data representations (data members) and functions (member functions).
  9. A basic unit of the classification hierarchy used in the Type Designer. There are three classes: item, group, and category.
  10. A grouping of projects that has global properties. The properties are used to manage completed jobs, typically deleting them periodically or starting another job that performs specific cleanup tasks.
  11. The syntactic category for a group of related values. A value can be assigned to different classes in different contexts or scenarios. See also classification, classification, pattern, value.
  12. In RACF, a collection of defined entities (users, groups, and resources) with similar characteristics.
  13. The definition of an object within a specific hierarchy. A class can have properties and methods and can serve as the target of an association.
  14. A description of a set of objects that share the same attributes, operations, methods, relationships, and semantics. A class can use a set of interfaces to specify collections of operations that it provides to its environment. See also interface.
  15. The set of all members of a type of object, such as all contracts, term definitions, organizations, and so on.
  16. In the Distributed Computing Environment (DCE), a category into which objects are placed based on their purpose and internal structure.

class 0
See transport class 0.

class 1
Service that provides a dedicated connection between two ports (also called connection-oriented service), with notification of delivery or nondelivery.

class 1 terminal
A terminal for which the alternate IMS pre-opens backup sessions for the primary sessions that the active IMS opens; VTAM/NCP switches sessions from primary to backup at takeover.

class 2

  1. Connectionless service between ports with notification of delivery or nondelivery.
  2. See transport class 2.

class 2 terminal
A terminal for which IMS in the alternate reestablishes service at takeover.

class 3
In fibre-channel technology, connectionless service between ports without notification of delivery. Other than notification, the transmission and routing of class 3 frames is identical to that of class 2 frames.

class 3 terminal
A terminal that communicates with XRF IMS but whose sessions are not automatically reestablished at takeover.

class 4
See transport class 4.

class A network
In Internet communications, a network in which the high-order (most significant) bit of the IP address is set to 0 and the host ID occupies the three low-order octets.

class assignment rule
A rule that determines which values within a set of process attributes result in a process being assigned to a particular class (superclass or subclass within a superclass).

class attribute
A value in a class object that controls the processing of routing steps in a job. These values include the run priority, time slice, eligibility for purge, default wait time, maximum processing unit time, and maximum temporary storage parameters.

class authority (CLAUTH)
An attribute that allows a user to define RACF profiles in a class defined in the class descriptor table. A user can have class authority to zero or more classes. See also authority.

class binding signature
A hexadecimal value that contains the class signature (obtained from the signature bank) and the inheritance level. The class binding signature is added to the Interface Definition Language (IDL) source file by the signature emitter.

class B network
In Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are set to 1 and 0, respectively, and the host ID occupies the two low-order octets.

Class Broker for Java (CBJ)
A Java tool that allows Java applications to run on a host system that does not have a graphical user interface (GUI). Because the IBM Developer Kit for Java Remote Abstract Window Toolkit is not recommended for complex graphics or highly interactive operations, CBJ for high-performance GUI services can be used.

class C network
In Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are both set to 1 and the next high-order bit is set to 0. The host ID occupies the low-order octet.

class condition
In COBOL, a condition that specifies the character content of a data item as all alphabetic or all numeric.

class descriptor table (CDT)
A table containing a definition of general resource classes. The CDT contains the classes supplied by IBM and the installation-defined classes.

class diagram
A diagram that shows a collection of declarative (static) model elements, such as classes, types, and their contents and relationships.

class F
Connectionless service for inter-switch control traffic, which provides notification of delivery or nondelivery between two expansion ports (E_ports).

class file
A compiled Java source file.

class hierarchy
The relationships between classes that share a single inheritance.

classic command
A supported non-IMSplex command. A classic command generally requires a leading slash, for example, /DBRECOVERY.

classic row compression
Data row compression that is provided by static, table-level compression dictionaries. See also adaptive compression.

class identifier (CLSID)
A Universally Unique Identifier (UUID) that identifies a COM component. Each COM component has its CLSID in the Registry so that it can be loaded by other applications.

classification

  1. The system that defines classes and the relationships among those classes. See also class.
  2. The process of grouping values into specific classes. See also class.
  3. A process for automatically acquiring document properties from the document content or another source.
  4. For Department of Defense (DoD), the value assigned to a declared document, for example, Top Secret, Secret, or Confidential.

classification and regression tree algorithm
A decision tree algorithm that uses recursive partitioning to split the training records into segments by minimizing the impurity at each step. See also Quick, Unbiased, Efficient Statistical Tree algorithm.

classification export utility
A utility that must be used to prepare a model for importing into IBM. data expert A person who understands both business processes and technical implementation.

classification guide
A Department of Defence (D0D) guide that details how information will be classified and marked in a records program.

classification hierarchy
The hierarchy of a type tree in the Type Designer. The deeper the subtype, the more specific the data characteristics are. See also compositional hierarchy.

classification mechanism
A set of class assignment rules that determine the classes to which processes are assigned.

classification model
A model that can be used with sets of training documents to help find other, similar documents. Classification models can be edited or updated, modifying the model file that is associated with that particular classification model.

classification purpose
The determination of how an item classification is used. For example, one classification may be used for receiving preference and another may be used for procurement purposes.

classification rule
A rule used by the workload manager component of z/OS to assign a service class.

classification scheme
See file plan.

classification value
A value within the classification hierarchy that can be associated to an item attribute.

classified
Pertaining to a record that has special access restrictions in addition to normal record security.

classified data model
For Department of Defense (DoD), a data model that implements an extra role that is called the Classification Guide Administrator. This data model consists of the following markings: Top Secret (highest in the hierarchy), Secret, Restricted, and Unclassified (lowest in the hierarchy).

classified record
For Department of Defense (DoD), a hierarchical classification level placed on a document. Other levels are non-classified, secret, top secret, and so on.

classifier

  1. In QoS, a control function that selects packets according to the content within the packet headers.
  2. A specialized attribute used for grouping and color-coding process elements.
  3. An XPath expression that determines the transformation to apply to an inbound event.

class inheritance
A feature that allows a subclass to inherit all of the properties of a superclass, which is its parent in a class hierarchy.

class key
One of the C++ keywords: class, struct, and union.

Classless Inter-Domain Routing (CIDR)
A method for adding class C Internet Protocol (IP) addresses. The addresses are given to Internet Service Providers (ISPs) for use by their customers. CIDR addresses reduce the size of routing tables and make more IP addresses available within organizations.

class library
In object-oriented programming, a collection of prewritten classes or coded templates, any of which can be specified and used by a programmer when developing an application.

class loader
Part of the Java virtual machine (JVM) that is responsible for finding and loading class files. A class loader affects the packaging of applications and the runtime behavior of packaged applications deployed on application servers.

class mask
A network mask that is derived solely on the basis of the network class of an Internet Protocol (IP) address.

class member operator
An operator used to access C++ class members through class objects or pointers to class objects. The class member operators are ., ->, .*, and ->*.

class method

  1. In Java, a method that is called without referring to a particular object. Class methods affect the class as a whole, not a particular instance of the class. See also instance method.
  2. A method that creates class instances.

class name

  1. In the X Window System, the name of a class of resources, widgets, or clients. Resource and widget class names are typically defined in the programming libraries used to create the client.
  2. A unique identifier of a class type that becomes a reserved word within its scope.

class-name
In COBOL, a user-defined word defined in the SPECIAL-NAMES paragraph of the Environment Division that assigns a name to the proposition, for which a truth value can be defined, to verify that the content of a data item consists exclusively of those characters listed in the definition of the class-name.

class object
An object that identifies the run attributes of a job. The system-recognized identifier for the object type is *CLS.

class of service

  1. A set of link and node characteristics, associated with a session or a set of sessions, that determine the route that is selected for the sessions through an APPN network.
  2. In fibre-channel technology, a specified set of delivery characteristics and attributes for frame delivery.
  3. A VTAM term for a list of routes through a network, arranged in an order of preference for their use.
  4. A set of characteristics (such as route security, transmission priority, and bandwidth) used to construct a route between session partners. The class of service is derived from a mode name specified by the initiator of a session.

class-of-service database
A database that is maintained independently by each network node, and optionally by APPN end nodes. The database contains one entry per class-of-service name. Each database entry contains: (a) A definition of the acceptable values for transmission group (TG) and node characteristics for routes described by that class-of-service name and the weight function to be used to compute the weights of nodes and TGs that meet the acceptable values; (b)The transmission priority to be used for traffic that flows on routes described by that class-of-service name.

class-of-service description
A system object created for Advanced Peer-to-Peer Networking (APPN) support that provides the information required to assign relative priority to the transmission groups and intermediate routing nodes for an APPN session. The system-recognized identifier for the object type is *COSD.

class path
A list of directories and JAR files that contain resource files or Java classes that a program can load dynamically at run time.

class scope
The scope of C++ class members. See also namespace scope.

class signature
A hexadecimal value obtained from a server and placed in a signature bank on the workstation. The signature bank uniquely identifies an Interface Definition Language (IDL) interface. Class signatures are added to the IDL source file by the signature emitter.

class statistics
Statistical information that includes information such as the number of instances of the class in the application, the CPU time spent in that class, the number of calls made to the class, and so on.

class style
A combination of formatting characteristics, such as font, font size, and border, that the user names and stores as a set.

class template
A blueprint describing how a set of related C++ classes can be constructed.

class template declaration
A class template declaration introduces the name of a class template and specifies its template parameter list. A class template declaration may optionally include a class template definition.

class template definition
A definition that describes various characteristics of the class types that are its specializations. These characteristics include the names and types of data members of specializations, the signatures and definitions of member functions, accessibility of members, and base classes. See also base class.

class tier
In AIX Workload management, the value that specifies which class is most important. If no tier value is used, all classes are equally important.

class transition
A change in an object's management class or storage class when an event occurs that brings about a change in an object's service level or management criteria. Class transition occurs during a storage management cycle.

clause

  1. A set of consecutive character strings that specify a characteristic of an entry. There are three types of clauses: data, environment, and file.
  2. A set of conditions and variable expressions that represent specific layers in a protocol stack.
  3. In SQL, a distinct part of a statement in the language structure, such as a SELECT clause or a WHERE clause.
  4. The fundamental grouping of REXX syntax. A clause is composed of zero or more blanks, a sequence of tokens, zero or more blanks, and the semicolon delimiter.
  5. A building block of the contract language that may contain legal language or line data.

clause instance
An occurrence of a clause in a contract where the term values are specific to the contract and the language of the clause may be modified to suit the current contract.

clause template
A template that contains the standard language of a clause and includes the legal language, terms, and other properties. See also template.

clause type
A defined clause category for purposes of information and search.

clause visibility feature
A feature which, if enabled, displays only those clauses in the contract language view for which read permission is granted.

CLAUTH
See class authority.

CLAW
See Common Link Access to Workstation.

CLB
See communication line block.

CLC
See Cognitive Learning Companion.

CLDR
See Common Locale Data Repository.

cleanse

  1. To transform the data extracted from operational systems to make it usable by a data warehouse.
  2. To ensure that all values in a data set are consistent and correctly recorded.

clean up
To remove or delete obsolete repository data.

cleanup
In SNA products, a network services request, sent by a system services control point (SSCP) to a logical unit (LU), that causes a particular LU-LU session with that LU to be ended immediately without requiring the participation of either the other LU or its SSCP.

cleanup interval
The length of time to wait before removing obsolete data.

cleanup period
The time period during which a database record that has reached its final state or condition is to remain in the database. After the cleanup period expires for such a record, database cleanup causes the record to be deleted from the database.

cleanup procedure
A procedure that instructs the system to attempt to remove software products that were partially installed and to revert to the previous version of the product. If the system successfully reverts to the previous version, it becomes the currently active version; otherwise, the software product is marked as broken.

clear
In X.25 communication, to reject a call (if it has not yet been accepted) or end a call.

clearance
The control and positioning of plant equipment for providing protection for personnel and equipment during work on plant devices.

clear area
In character recognition, a specified area that is to be kept free of printing or any other markings not related to machine reading. See also intercharacter gap.

ClearCase administrators group
A Windows domain group whose members have superuser access to ClearCase objects.

ClearCase registry
A network service that allows programs to access versioned object bases (VOBs) and views by name instead of network path.

clear cause
See cause code.

clear-confirmation packet
In X.25 communication, a packet transmitted by the DTE to inform the DCE that a call has been cleared.

clear data
See plain text.

clear diagnostic
See diagnostic code.

clear indication packet
In X.25 communications, a call supervision packet that a data circuit-terminating equipment (DCE) transmits to inform a data terminal equipment (DTE) that a call has been cleared.

clearinghouse

  1. A central registry that connects users from multiple instant messaging communities.
  2. In the Distributed Computing Environment (DCE), a collection of directory replicas on one Cell Directory Service (CDS) server. A clearinghouse takes the form of a database file. See also control access.

clearing task
A process of reviewing the registration submitted by a supplier and accepting or rejecting the supplier as per the business requirements.

clear key encryption
Any type of encryption key not protected by encryption under another key.

clear message
A message displayed by DirectTalk to tell the operator that a red or yellow error message has been cleared.

clear request packet
A call supervision packet transmitted by a data terminal equipment (DTE) to ask that a call be cleared.

clear session
A session in which only clear data is transmitted or received. See also cryptographic session, selective cryptographic session.

cleartext
A string of characters sent over a network in readable form. It might be encoded for the purposes of compression, but it can easily be decoded. See also ciphertext.

clear-text password
A password that is comprised of a string of characters sent over a network in readable form. It might be encoded for the purposes of compression, but it can easily be decoded.

cleartool
The primary command-line interface to ClearCase and ClearCase LT version-control and configuration management software.

clear to send (CTS)
In data communication, a signal raised by data circuit-terminating equipment (DCE) when it is ready to accept data, usually in response to request to send (RTS) being raised. See also request to send.

clear user data
In X.25 communications, data optionally included in the clear-request packet by the user application.

CLEM
See Common Language for Expression Manipulation.

clerical record
A record for which the matching process cannot definitively determine if the record is a duplicate record or a nonmatched record or if the record is a matched record or a nonmatched record. See also duplicate record, matched record, nonmatched record.

clerk

  1. In the DCE Distributed Time Service (DTS), a software component that synchronizes the clock for its client system by requesting time values from servers, computing a new time from the values, and supplying the computed time to client applications.
  2. In the DCE Cell Directory Service (CDS), a software component that receives CDS requests from a client application, ascertains an appropriate CDS server to process the requests, and returns the results of the requests to the client application.

CLI

  1. See call level interface.
  2. See command-line interface.

C library
A system library that contains common C language subroutines for file access, string operations, character operations, memory allocation, and other functions.

click
To press and release a mouse button without moving the pointer off the choice.

clickstream
In web advertising, the sequence of clicks or pages requested as a visitor explores a website.

clickthrough
A marketing tool that reports the number of times a customer clicks on the displayed content to find out more information about the subject.

clickthrough rate
In web advertising, the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page. See also impression.

Click-to-Action (C2A)
A method for implementing cooperative portlets, whereby users can click an icon on a source portlet to transfer data to one or more target portlets. See also cooperative portlets, wire.

click-to-call
A feature that allows a user to select two or more contacts and then call them at the same time, initiating an audio conference.

click-to-conference
A Sametime Unified Telephony feature that allows a user to select two or more contacts and then call them at the same time, initiating a conference.

client

  1. The user interface application installed at the customer site.
  2. A software program or computer that requests services from a server. See also host, server.
  3. A runtime component that provides access to queuing services on a server for local user applications. The queues used by the applications reside on the server. See also IBM MQ fully managed .NET client, IBM MQ Java client, IBM MQ MQI client.
  4. See customer.

client acceptor
A service that serves the Java applet for the web client to web browsers. On Windows systems, the client acceptor is installed and run as a service. On AIX, UNIX, and Linux systems, the client acceptor is run as a daemon.

client acceptor daemon (CAD)
See client acceptor.

client API
The interface used by client applications to invoke services in CICS using the facilities of the Client daemon. See also external call interface, external security interface.

client application

  1. A user application, written in a supported programming language other than Java, that communicates directly with the Client daemon.
  2. An application written with the Content Manager APIs to customize a user interface.
  3. An application that users the services of the database services by direct connection or via application servers. See also client/server architecture.
  4. An application written with object-oriented or Internet APIs to access content servers from Information Integrator for Content.
  5. A storage management program that initiates Common Information Model (CIM) requests to the CIM agent for the device.
  6. An application, running on a workstation and linked to a client, that gives the application access to queuing services on a server.

Client Application for Windows
A complete object management system provided with Content Manager and written with Content Manager APIs. It supports document and folder creation, storage, and presentation, processing, and access control.

client application thread
In DCE remote procedure call (RPC), a thread executing client application code that makes one or more RPCs.

client authentication

  1. The process by which a client's identity is verified.
  2. In CSIv2 security, a token-based client authentication mechanism for which Generic Security Services Username Password (GSSUP) is the minimum requirement, but additional requirements, such as Lightweight Third Party Authentication (LTPA), might exist.

client center
A center that provides an environment for clients, IBM Business Partners, and IBM employees to meet, and to access knowledge, expertise, and innovation.

client certificate
A certificate that is presented by the client to a server prior to forming an active connection.

client channel definition table (CCDT)
A file that contains one or more client-connection channel definitions.

client configuration tool
A Notes application that connects a Notes client to a cloud mail server.

client-connection channel type
The type of MQI channel definition associated with an IBM MQ client. See also server-connection channel type.

client context

  1. A mapping from keys to values. If a provider returns a client context for a particular object, that context is merged with the context specified through setClientContext(), if any. The client context can then be tailored for the specific objects being processed.
  2. In the Distributed Computing Environment (DCE), the state within a Remote Procedure Call (RPC) server generated by a set of remote procedures and maintained across a series of calls for a particular client.

Client daemon
A daemon that manages network connections to CICS servers. It processes ECI, EPI, and ESI requests, sending and receiving the appropriate flows from the CICS server to satisfy the application requests. The Client daemon (process cclclnt) exists only on distributed platforms.

client domain
The set of drives, file systems, or volumes that the user selects to back up or archive data, using the backup-archive client.

client end node
An end node for which the network node provides network services.

client framework
A set of scripts that are deployed with a web application or mobile native application to capture user interactions on the client that would not otherwise require a server interaction. By capturing these user interface events, a client framework can provide unique insight into the activities of visitors within their browsing devices.

client group
A group of clients that specify the volumes that are backed up. Client groups can also include SQL and Exchange databases for backup, even if they span across multiple disk volumes.

Client Health Information Portal (CHIP)
A tool that measures the health of the Integrated Technology (ITD) account portfolio. Analogous to the tool that a manufacturing company would use to keep track of manufacturing a physical object, CHIP keeps track of services delivery quality at the client accounts.

client ID
See client identifier.

client identifier (client ID)
A piece of information that identifies an individual application. An application can invoke an API only if it passes an application key that is recognized by the IBM API Management system and is granted access to the API. The application key is passed by the client by using an HTTP query parameter.

client initialization file
A file containing configuration information used to inform the CICS Client of the CICS servers it can connect to, and the communication protocols to be used.

Client Input Output Sockets (CLIO/S)
A set of commands and APIs that can be used for high-speed communication and to access tape devices on a network of AIX workstations and MVS mainframes.

client journey
The stages a client experiences before, during, and after making a buying decision. The four stages of this journey are discovery, engagement, conversion, and advocacy.

client locale
The locale that a client application uses to perform read and write operations on the client computer. See also locale, server locale.

client logical partition
A logical partition that uses the I/O resources of another logical partition, for example, a logical partition that uses the resources of a Virtual I/O Server logical partition.

client message
A message from a client application that is to be sent by means of a network to its destination, or a message that is routed to a client application to acknowledge the receipt of a client message by a network.

client node

  1. In a single system image (SSI), a WebSphere Voice Response system that handles interactions with callers. A client node must have a telephony connection. It does not store application or voice data; it gets data from the server node of the SSI.
  2. A file server or workstation on which the backup-archive client program has been installed, and which has been registered to the server.

client node session
A session in which a client node communicates with a server to perform backup, restore, archive, retrieve, migrate, or recall requests. See also administrative session.

client option set
A group of options that are defined on the server and used on client nodes in conjunction with client options files.

client options file
An editable file that identifies the server and communication method, and provides the configuration for backup, archive, hierarchical storage management, and scheduling.

client pattern
A method to determine which clients to monitor, and how to group them for reporting.

client-polling scheduling mode
A method of operation in which the client queries the server for work. See also server-prompted scheduling mode.

client process
A process that requests services from a server process. See also server process.

client product key
The customer's unique SKU identifier for this product.

client program

  1. A program that uses a C++ class.
  2. In dynamic routing the application program, running in the requesting region, that issues a remote link request.
  3. In the client/server model, the front-end transaction.

client project for RuleApps
A predefined project for Eclipse that contains a class to execute a ruleset within a RuleApp.

client proxy
An object on the client side of a network connection that provides a remote procedure call interface to a service on the server side.

client reroute
A method that allows a client application, upon the loss of communication with a database server and the predefinition of an alternative server, to continue working with the original database server or the alternative server with only minimal interruption of the work.

client schedule
A database record that describes the planned processing of a client operation during a specific time period. The client operation can be a backup, archive, restore, or retrieve operation, a client operating system command, or a macro. See also administrative command schedule, central scheduler, schedule.

client secret
A piece of information that is used with an application key to verify the identity of an application. An API can be configured to require that client applications supply their application secret with their application key. The application secret functions effectively as a password known only to the application. The application secret is passed by the client using an HTTP query parameter.

client/server
Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server. See also distributed application.

client/server architecture
A hardware and software design that allows the user interface and database server to reside on separate nodes or platforms on a single computer or over a network. See also client application, server-processing locale.

client/server connection statement
An SQL statement that can connect to a database. These statements include CONNECT, DISCONNECT, and SET CONNECTION.

client side
In an ebMS exchange, the partner using the service, or a service user.

client-side
Pertaining to an operation that is performed on the client application and not on the server.

client-side authentication component
A component that collects client information, then uses login modules to verify this information.

client-side human service
A human service that runs in the web browser and can call the server to obtain data. A client-side human service can be used to implement an interactive task, a dashboard, or a user interface for a case or process instance that users can use to manage cases or processes in an application. See also heritage human service, human service.

Client Solutions Executive (CSE)
An executive member of the Strategic Sales team who is focused on both new logo and base growth opportunities, and is responsible for successfully selling large, complex services opportunities.

client state manager (CSM)

  1. A component of the client kernel that provides protocol support for the client.
  2. A station that consists of a control unit (a cluster controller) and the terminals attached to it.

client stub
In the Distributed Computing Environment (DCE), the surrogate code for a remote procedure call (RPC) interface that is linked with and called by the client application code. In addition to general operations such as marshaling data, a client stub calls the RPC runtime library to perform remote procedure calls and, optionally, to manage bindings.

client system-options file
A file, used on AIX, UNIX, or Linux system clients, containing a set of processing options that identify the servers to be contacted for services. This file also specifies communication methods and options for backup, archive, hierarchical storage management, and scheduling. See also client user-options file, options file.

client systems services
A broad set of capabilities integrating hardware, software and services to support user systems throughout the product lifecycle.

client tier
The client programs and consoles that are used for development, administration, and other tasks for the InfoSphere Information Server suite and product modules and the computers where they are installed.

client time

  1. The time that it takes to process and display a web page in a browser.
  2. The local time on a BigFix client's device.

client type detection
A process in which a servlet determines the markup language type required by a client and calls the appropriate JavaServer Pages file.

client user-options file
A file that contains the set of processing options that the clients on the system use. The set can include options that determine the server that the client contacts, and options that affect backup operations, archive operations, hierarchical storage management operations, and scheduled operations. This file is also called the dsm.opt file. For AIX, UNIX, or Linux systems, see also client system-options file. See also client system-options file, options file.

client value assessment (CVA)

client workstation
In the NetView Graphic Monitor Facility, a workstation that depends on a server workstation to provide it with views and status information. A client workstation receives status information from the server workstation over an LU 6.2 session.

Clinical Context Object Workgroup (CCOW)
A vendor independent standard, for the interchange of information between clinical applications in the healthcare industry.

CLIO/S
See Client Input Output Sockets.

CLIP
See calling line identification presentation.

clip
In computer graphics, to remove those parts of a display image that lie outside of a given boundary.

clipboard
An area of computer memory, or storage, that temporarily holds data. Data in the clipboard is available to other applications.

clipping

  1. In the GDDM function, the process of cutting off the image at the border of the display but allowing the coordinates of the lines to extend beyond.
  2. In computer graphics, removing those parts of display elements that lie outside of a given boundary.

clipping plane
In GL, primitive space that is mapped to normalized device coordinates before clipping occurs. The clipping planes x=+/-w; y=+/-w; or z=+/-w correspond to the left, right, top, bottom, near, and far planes bounding the viewing frustum.

clipping region
The image defined by the bitmap or rectangles used to restrict output to a particular region of a window.

CLI script
A script that manages filters and infosets within IBM StoredIQ Administrator.

CLIST
See command list.

clitic
A word that syntactically functions separately but is phonetically connected to another word. A clitic can be written as connected or separate from the word it is bound to. Common examples of clitics include the last part of a contraction in English 'wouldn't' or 'you're'.

cliticization
The process by which a complex word or expression is formed by attaching a clitic to another word. A common example of cliticization includes attaching a clitic to a verb, for example: "je t'aime" in French.

CLK
See clock.

CLM

  1. See Collaborative Lifecycle Management.
  2. See contract lifecycle management.

CL module
See control language module.

CLM project
A project that was created using IBM Collaborative Lifecycle Management tools.

CLNP
See connectionless-mode network protocol.

CLNS
See connectionless-mode network service.

CLNS path
In OSI, a path used when the connectionless-mode network service is used. Each CLNS path names data terminal equipment (DTE) to be used for outbound communication.

CLNS path maintenance
In OSI, an option of whether or not to maintain a CLNS path to an adjacent node permanently (until OSI Communications Subsystem is restarted), or release the path when no active CLNS connection uses it. These connections include both network management and directory service connections and connections between customer programs.

CLNS path set
In OSI, a path set used when the connectionless-mode network service is used.

cloaked item
An item whose existence is known to the user but whose information is hidden from the user. See also item, placeholder, signpost message.

cloak option
A customization option that restricts access to selected information in the cube. The cloak option removes a category and its descendants from a dimension, but summarizes the values in the ancestor categories.

CLOB
See character large object.

clobber
To delete a project and all of its associated jobs from the database.

clock (CLK)

  1. A device that generates periodic signals used for synchronization.
  2. In data communication, equipment that provides a time base used in a transmission system to control the timing of certain functions, such as sampling, and to control the duration of signal elements.

clock event
A special system event that is used to initiate a system-generated event.

clocking

  1. In communications, a method of controlling the number of data bits sent on a communications line in a specified time.
  2. In binary synchronous communication, the use of clock pulses to control synchronization of data and control characters.

clock time
The elapsed time in real time. Clock time differs from CPU time as thread switches and process context switches introduce uncertainty in performance calculation; clock time does not account for this execution behavior.

clone

  1. A copy of an application, created so that it can be customized while the original is retained.
  2. An identical copy of the latest approved version of a component, with a new unique component ID.
  3. A copy of a volume on a server at a particular point in time. The contents of the copy can be customized while the contents of the original volume are preserved.
  4. An identical copy of the data and configuration of a server at a particular point in time.
  5. In Git, a local copy of a repository, which can be edited offline, that is connected to and can be synchronized with the original remote version.
  6. To preserve the characteristics of the original but personalize instance-specific data. The result is a new instance of an entity (for example, of a virtual disk, a virtual computer system, or an operating system) rather than a backup of the original.
  7. To prepare a reference computer and create a system profile ready for deployment. See also unattended setup.
  8. In Git, to create a local copy of a repository, which can be edited offline, that is connected to and can be synchronized with the original remote version.
  9. An operation that enables an administrator to replicate profiles. This capability simplifies the task of creating multiple profiles with similar properties.

clone device
A STREAMS device that returns an unused major or minor device when initially opened, rather than requiring the minor device to be specified by name in the open call.

cloned IMSplex
A group of IMSs in a sysplex that share databases, queues, or both, and have identical resource definitions.

clone object
An object that is associated with a clone table, including the clone table itself and check constraints, indexes, and BEFORE triggers on the clone table.

clone table
A table that is structurally identical to a base table. The base and clone table each have separate underlying VSAM data sets, which are identified by their data set instance numbers. See also base table.

close

  1. To end an activity and remove that window from the display.
  2. To end processing by ending the connection between the file and a program.

closed application
An application that requires exclusive use of certain statements on certain DB2 objects, so that the objects are managed solely through the external interface of that application.

closed-circuit television (CCTV)
The use of video cameras to transmit a signal to a specific place, on a limited set of monitors.

closed registration
A registration process in which only an administrator can register workstations as client nodes with the server. See also open registration.

closed system
A system whose characteristics comply with proprietary standards and that therefore cannot readily be connected to other systems.

closed user group (CUG)
In data communication, a group of users who can communicate with other users in the group, but not with users outside the group. A data terminal equipment (DTE) may belong to more than one closed user group. See also bilateral closed user group.

closed workstation
A workstation that is unavailable to process work for a specific time, day, or period.

closeness
A measure of how quickly an entity can use links to get access to other entities on an association chart. Closeness is one of the centrality measures used in social network analysis. See also centrality.

close time
The time that is required to close an access item.

closing version
A reporting version that contains the reported values for a given period, plus one or more journal types.

closure line
In the GDDM function, a line added by the system to enclose an area being filled with a pattern, in instances when the routines that precede the GSENDA routine fail to form an enclosed area.

cloud
A network that delivers requested virtual resources as a service.

Cloud, Analytics, Mobile, and Social (CAMS)
See Cloud, Analytics, Mobile, Social, and Security.

Cloud, Analytics, Mobile, Social, and Security (CAMSS)
The third platform technologies that enable digital transformation, evolution, and expansion.

cloud application
An application that is extended to be accessible through the Internet. Cloud applications use large data centers and powerful servers that host web applications and web services.

cloud client
Software or hardware that is designed to deliver cloud services, or that relies on cloud computing to operate.

cloud computing
A computing platform where users can have access to applications or computing resources, as services, from anywhere through their connected devices. A simplified user interface or application programming interface (API), or both, makes the infrastructure supporting such services transparent to users. See also off-premises.

Cloud Computing Reference Architecture (CCRA)
A blueprint for IBM development teams and field practitioners to design public and private clouds.

cloud-container storage pool
A storage pool that a server uses to store data in cloud storage. The cloud storage can be located on premises or off premises. See also container storage pool, directory-container storage pool, storage pool.

cloud deployment
The process of installing and configuring a software application and all of its components onto a virtual server. See also deployment.

cloud discovery service
The component that provides information about available cloud resources, such as images and security groups, to the blueprint designer. See also blueprint design server, blueprint designer.

cloud-enabled
Pertaining to a model or implementation of a public, private, or hybrid cloud environment.

cloud enablement
In CICS, packaging a CICS application to use in a CICS cloud environment for deployment in a platform. Resources that comprise a CICS application are packaged into an application bundle to deploy, manage, and monitor the application as a single entity.

Cloud Foundry
An open platform-as-a-service (PaaS) composition technology that supports a choice of clouds, developer frameworks and application services. Cloud Foundry makes it faster and easier to build, test, deploy and scale applications.

cloud group
A collection of hypervisors from a single vendor.

cloud image
An information technology (IT) resource that can be provisioned for use on a cloud.

cloud infrastructure
See infrastructure as a service.

cloud instance
A piece of software or other information technology (IT) resource running on a cloud. Cloud instances are software instances created from cloud images.

cloud-oriented architecture (COA)
The design and optimization of architecture for use in cloud computing environments.

cloud platform
A model of production, integration, and distribution of IT services used to build, run and deliver applications through a hybrid cloud. A cloud platform provides customers with needed storage, compute, development, and analytics capabilities without the cost and complexity of acquiring and managing the underlying hardware and software directly. It combines the ability to access, integrate and develop services using both structured and unstructured data, across a variety of hybrid environments.

cloud portability
The ability to move applications and services across public or private cloud computing environments, or from different cloud providers.

cloud project
A functional ID with access to a cloud system. By accessing this cloud project, users can work with this functional ID to request cloud services that might not be available to their personal ID.

cloud provider
An organization that provides cloud computing resources.

cloud request
A description of resources to be provided by a cloud. Typically, a cloud request consists of a list of cloud images to be provided by the cloud and information about how those cloud instances are to be configured.

cloud service
A service that provides software that is accessed on servers on the Internet rather than on on-premises servers at a company site.

cloud service provider (CSP)
A service provider that offers storage or software services or solutions through a public, private, or hybrid cloud.

cloud storage
A storage resource provided by a cloud, or the storage of data on virtual public or private servers in the cloud.

cloud video platform
A platform that is built specifically to help companies deliver video and analyze the data generated from viewers.

CLP

  1. See communication line processor.
  2. See command line processor.
  3. See container load plan.
  4. See current line pointer.

CLPA
See create link pack area.

CL procedure
See control language procedure.

CL program
See control language program.

CLR
See common language runtime.

CLSID
See class identifier.

CLU
See control logical unit.

club card
See loyalty card program.

CLUSRCVR
See cluster-receiver channel.

CLUSSDR
See cluster-sender channel.

cluster

  1. A group of servers connected by a network and configured in such a way that if the primary server fails, a secondary server takes over.
  2. Two or more connected copies of Sterling B2B Integrator that share a database.
  3. A group of appliances in which one appliance acts as the central appliance, and the other appliances act as its clients.
  4. In IBM System Storage DS8000, a partition capable of performing all DS8000 series functions. With two clusters in the DS8000 storage unit, any operational cluster can take over the processing of a failing cluster.
  5. A group of application servers that collaborate for the purposes of workload balancing and failover.
  6. In Storwize® V7000, a pair of nodes that provides a single configuration and service interface.
  7. A set of independent systems or logical partitions (called nodes) that are organized into a network for the purpose of sharing resources and communicating with each other.
  8. In SNA, a group of stations that consist of a controller (cluster controller) and the workstations attached to it.
  9. A collection of one or more servers within a cloud that provide a specific function.
  10. A set of independent systems or nodes that are organized into a network. The purpose of the cluster is to define a set of resources, nodes, networks, and storage devices that will keep applications highly available.
  11. A related set of search results and their associated online resources that is automatically created.
  12. See clustered system.
  13. A group of two or more Domino servers that provides users with constant access to data, balances the workload among servers, improves server performance, and maintains performance when the size of an enterprise increases.
  14. A group of computers and other resources that operate together as a single system. See also clustered system, GPFS cluster.
  15. A loosely coupled collection of independent systems (or nodes) organized into a network for the purpose of sharing resources and communicating with each other. See also GPFS cluster.
  16. A group of entities that have more connections to each other than to entities outside the group.
  17. In Microsoft Cluster Server, a group of computers, connected together and configured in such a way that, if one fails, MSCS performs a failover, transferring the state data of applications from the failing computer to another computer in the cluster and reinitiating their operation there.
  18. A data set defined to VSAM. A cluster can be a key-sequenced data set, an entry-sequenced data set, or a relative record data set.
  19. In IBM MQ, a group of two or more queue managers on one or more computers, providing automatic interconnection, and allowing queues to be advertised among them for load balancing and redundancy.
  20. A collection of complete systems that work together to provide a single, unified computing capability.

Cluster Aware AIX (CAA)
A technology that builds clustering capabilities into the AIX operating system. This built-in clustering support provides commands and programming APIs to create a cluster from a group of AIX instances. CAA provides kernel-based heartbeat, monitoring, and event infrastructure.

cluster base table
In the Netezza database, a table that is organized on one to four columns, which collocates rows of the table in the same disk extents to improve query performance.

cluster caching facility (CF)
A subsystem, typically on a dedicated computer or LPAR, that assists in global locking and group buffer pool management for a DB2 pureScale instance on Linux and AIX operating systems. See also preferred primary cluster caching facility, primary cluster caching facility, secondary cluster caching facility.

cluster collection store
The set of machines on which the shards that are associated with a search collection are physically located. See also search collection, shard.

cluster configuration
A user definition of all cluster components. Component information is stored in the ODM. Components include cluster name and ID, and information about member nodes, network interface, and network modules. See also dynamic automatic reconfiguration.

cluster configuration data
The configuration data that is stored on the cluster configuration servers.

cluster configuration database
See Object Data Manager.

cluster controller
A device that can control the input/output operations of more than one device connected to it.

cluster domain
A virtual collection of physical elements such as computer systems and logical elements such as software instances that can provide services to a client as a single unit. See also cluster domain node.

cluster domain node
A physical element such as a computer system or a logical element such as a software instance in a cluster domain. See also cluster domain, management server domain, peer domain.

clustered hash table
A mechanism to enable the replicating and sharing of data between cluster nodes.

clustered index
An index whose sequence of key values closely corresponds to the sequence of rows stored in a table. The degree of correspondence is measured by statistics that are used by the optimizer.

clustered system
A collection of nodes that are placed in pairs (I/O groups) for redundancy, which provide a single management interface. See also cluster, GPFS cluster, system.

clustered trivial database (CTDB)
A cluster implementation of the trivial database (TDB) used by Samba and other projects to store temporary data.

cluster entry
A catalog entry that contains the following information about a key-sequenced or entry-sequenced Virtual Storage Access Method (VSAM) cluster: ownership, cluster attributes, and the cluster's passwords and protection attributes. A key-sequenced cluster entry points to both a data entry and an index entry; an entry-sequenced cluster entry points to a data entry only. See also alternate-index entry.

cluster environment

  1. A topology in which an application server is defined over several machines or CPUs. See also horizontal clustering, vertical clustering.
  2. See cluster configuration.

cluster event
Any state change in a resource that is defined to a cluster. A cluster event can be informational, such as a join adapter event which indicates that a failed adapter is now functional, or the event can be part of a recovery process, such as a node down event which includes the takeover of resources by a backup node. See also node down, node up.

Cluster feature
A feature that provides four cable connections and allows up to four work stations to be attached to a 5251 Model 12 Display Station.

cluster hardware
Hardware that is included in the cluster, such as disks and disk devices, processors, network interfaces, and networks.

cluster information base (CIB)
A replicated store of cluster-related information. It typically includes static configuration data which defines the resources, cluster nodes, and constraints (or dependencies) in the cluster, as well as information about the current state of the cluster.

clustering

  1. The process of grouping records together based on similarity. Similar records are labeled according to their group, so there is no predefined target field for the model to predict.
  2. The ability to group independent systems to work together as a single system.

clustering block index
See dimension block index.

clustering index
An index that determines how rows are physically ordered (clustered) in a table space. If a clustering index on a partitioned table is not a partitioning index, the rows are ordered in cluster sequence within each data partition instead of spanning the partitions.

cluster interconnect netname
The IP address or host name of the interconnect used for high-speed communication between members, or between members and cluster caching facilities, in a DB2 instance.

cluster joining
The process whereby additional nodes join an existing cluster when they can communicate with another active clustered node and can validate the node name and version compatibility.

cluster log
A log that maintains a history of routine activities and error conditions that are generated by all metadata servers in the cluster.

cluster manager

  1. The node that monitors node status using disk leases, detects failures, drives recovery, and selects file system managers. The cluster manager is the node with the lowest node number among the quorum nodes that are operating at a particular time.
  2. A software daemon that runs on every node in the cluster and is responsible for responding to failures and coordinating recovery actions.

cluster member
An identically configured copy of an object, such as an application server. Cluster members can be used for workload management purposes, for example, to support horizontal scaling and vertical scaling.

cluster membership list
A set of cluster nodes that have been configured for a cluster.

cluster name
A user-defined ASCII text string that uniquely identifies a cluster in a system.

cluster node
A system that is a member of a cluster. See also local node, remote node, system.

cluster processor complex (CPC)
The unit within a cluster that provides the management function for the ESS. It consists of cluster processors, cluster memory, and related logic.

cluster profile record (CPR)
A set of data that describes the VSAM data sets of various control-interval sizes for the storage of documents.

ClusterProven
An IBM designation that defines certain high-availability requirements that are applied to a software product either by itself or in combination with other software products. A solution that satisfies the technical criteria of these requirements can be validated with IBM and licensed to be marketed with IBM's ClusterProven trademark.

cluster queue
A local queue that is hosted by a cluster queue manager, and defined as a target for messages being put from an application connected to any queue manager within the cluster. All applications retrieving messages must be locally connected.

cluster queue manager
A queue manager that is a member of a cluster. A queue manager can be a member of more than one cluster.

cluster-ready hardware server (CRHS)
A software component that provides management subsystem communication and methods for discovering components within a management subsystem.

cluster-receiver channel (CLUSRCVR)
A channel on which a cluster queue manager can receive messages from other queue managers in the cluster, and cluster information from the repository queue managers.

cluster resource
Any part of the system that is available across multiple cluster nodes. The two types of system resources that can be resilient are the following: Objects that are kept up to date by using replication. A resilient application and its associated IP address, which can be switched.

cluster resource group (CRG)
A collection of related cluster resources that defines actions to be taken during a switchover or failover operation of the access point of resilient resources. The group describes a recovery domain and supplies the name of the cluster resource group exit program that manages the movement of an access point.

cluster resource group manager (CRGM)
A highly available client application that uses the integrated cluster resource services to configure, define, monitor, and administer a cluster of systems.

cluster resource service
An i5/OS system service function that supports cluster implementations.

cluster-root container
A special container that is the root of the global file system.

cluster-sender channel (CLUSSDR)
A channel on which a cluster queue manager can send messages to other queue managers in the cluster, and cluster information to the repository queue managers.

cluster service
A Windows (TM) service that manages the cluster specific activities and is installed on each node of the cluster. The components of the Cluster service provide high availability, easy management and enhanced scalability for Windows.

cluster services
The high availability services, such as the cluster manager and other services running on the nodes, that monitor the cluster resources. The resources and data maintained on the cluster for access by clients and their applications are cluster services.

cluster snapshot
An ASCII file containing a record of the data that defines a particular cluster configuration. Applying a cluster snapshot can save and restore a particular cluster configuration.

cluster split event
An event that occurs when one or more nodes that are actively running cluster services cannot communicate with other nodes that are also running cluster services.

cluster storage subsystem
A group of clusters where each cluster consists of one or more logical partitions that have a shared storage pool.

Cluster Systems Management (CSM)
Systems management software that is designed to scale to large-size clusters.

cluster takeover
The process of the DB2 product taking over the ownership of a user-managed GPFS cluster.

cluster template
A template that defines the tiers for a cluster in a system. Tiers work together to create a cluster for a specific application environment, for example a GPFS application environment.

cluster topic
An administrative topic that is defined on a cluster queue manager and made available to other queue managers in the cluster.

cluster transmission queue
A transmission queue that holds all messages from a queue manager destined for another queue manager that is in the same cluster. The queue is called SYSTEM.CLUSTER.TRANSMIT.QUEUE.

cluster virtual IP address
An IP address that is shared between the primary or secondary host and the HA cluster.

cluster VLAN
The virtual LAN that connects nodes to each other and to the management server through an Ethernet connection. Installation and administration tasks are done on the cluster VLAN.

CLUT
See color lookup table.

CLV
See customer lifetime value.

CL variable
See control language variable.

CM

  1. See Content Manager.
  2. See conversion mode.
  3. See configuration management.

cm
See centimeter.

CM*

  1. See conversion mode.
  2. See conversion mode*.

CMAS
See CICSPlex SM address space.

CMAS link
A communications link between one CICSPlex SM address space (CMAS) and another CMAS or a remote managed application system (remote MAS). CMAS links are defined when CICSPlex SM is configured.

CMC

  1. See Common Messaging Call.
  2. See communication management configuration.

CMDB
See Configuration Management Database.

cmdlet
In the Windows PowerShell environment, a single function command-line tool that can be called directly from the command line in the shell and run under the context of the shell, not as a separate process.

CMI
See control message interface.

CMIP
See Common Management Information Protocol.

CMIP services
The VTAM implementation of the Common Management Information Protocol (CMIP), which provides a common set of program services for application programmers to use in writing CMIP application programs. These services include controlling associations, converting basic encoding rules (BER) syntax, and validating protocols.

CMIS

  1. See Content Management Interoperability Services.
  2. See common management information service.

CM item
See configuration-managed item.

CMM

  1. See common management model.
  2. See common MPTN manager.

CMOS
See complementary metal-oxide semiconductor.

CMOT
See Common Management Information Protocol over TCP/IP.

CMP
See container-managed persistence.

CMPI
See Common Manageability Programming Interface.

CMRO task
See cross-memory resource-owning task.

CMS

  1. See Conversational Monitor System.
  2. See Central Message Store.
  3. See configuration management system.

CMS extended parameter list
A type of parameter list available in the CMS environment consisting of a string composed exactly as the user typed it at the terminal. There is no tokenization performed on the string.

CMS tokenized parameter list
A type of parameter list available in the CMS environment consisting of 8-byte tokens, which are folded to uppercase and end with a double word of FF.

CMVC
See Configuration Management and Version Control.

CNAME record
An entry in the Domain Name System that is used to define a host name alias for an Internet domain. The ability to create the record can be used to prove ownership of a domain.

CNM
See communication network management.

CNMI
See communication network management interface.

CNN
See composite network node.

CNOS
See change number of sessions.

CNT
See communication name table.

CO

  1. See configuration object.
  2. See central office.

COA

  1. See cloud-oriented architecture.
  2. See chart of accounts.

coach
A user interface, such as screens or forms, that process authors create to collect input from users that is required for an underlying service.

coach view
A reusable unit used in coaches and other coach views to generally define the user interface for a particular type of data. Coach views are responsive and run on multiple device types, such as mobile and desktop devices.

coalescing interval
The interval at which events are bundled. Event bundling occurs in 10 second intervals and begins with the first event that does not match any currently coalescing events. Within the coalescing interval, the first three matching events are bundled and sent to the event processor.

COA report
See confirm-on-arrival report.

coarse-grained
Pertaining to viewing a group of objects from an abstract or high level. See also fine-grained.

coated paper
Paper to which a surface coating is applied to make it smooth.

coattailing
The concept of VTAM's writing PIUs to NCP and reading PIUs from NCP with a single channel program. The values coded for the DELAY keywords on the VTAM PCCU definition statement and the NCP LINE definition statement affect the degree of coattailing. A user can increase the probability of VTAM's writing and reading PIUs with a single channel program by adjusting these DELAY keywords. An increase in the degree of coattailing improves channel efficiency but may increase response time.

coaxial cable
A cable consisting of one conductor, usually a small copper wire, within and insulated from another conductor of larger diameter, usually copper tubing or copper braid.

COBOL
See Common Business Oriented Language.

COBOL character
Any of the 51 characters of the COBOL character set.

COBOL run unit
A COBOL-specific term that defines the scope of language semantics. A COBOL run unit is equivalent to a Language Environment enclave.

COBOL word
In COBOL, a character string of not more than 30 characters that forms a user-defined word, a system-name, or a reserved word.

COBPACK
A collection of individual modules that are packaged into a single load module in order to reduce the time that would otherwise be needed to load the individual load modules.

cobrowsing
The interaction of multiple users sharing information about their individual web interactions. With this interaction users can share a view of the same web page simultaneously and share further interactions with the web page they are jointly viewing.

COC
See center of competency.

CoD
See capacity on demand.

COD

  1. See confirm on delivery.
  2. See confirmation of delivery.

Codabar
A bar code symbology characterized by a discrete, self-checking, numeric code with each character represented by a stand-alone group of four bars and the three spaces between them.

CODASYL
See Conference on Data Systems languages.

code

  1. To write instructions for the computer; to program.
  2. See auto requisition ID.
  3. A set of instructions for a computer.
  4. A system of bit patterns to which a specific graphic or a control meaning has been assigned.
  5. A representation of a condition, such as an error code.
  6. A number that uniquely identifies a catalog entry in the WebSphere Commerce system. A product code is used as the prefix for creating individual SKU codes.

Code 128
In architecture, a bar code symbology characterized by a variable-length, alphanumeric code with 128 characters.

Code 39
A bar code symbology characterized by a variable-length, bidirectional, discrete, self-checking, alphanumeric code. Three of the nine elements are wide and six are narrow. It is the standard for LOGMARS (the U.S. Department of Defense) and the AIAG.

code assist
See content assist.

codebase
Works together with the code attribute in the APPLET tag to give a complete specification of where to find the main applet class file: code specifies the name of the file, and codebase specifies the URL of the directory containing the file.(Sun)

codec

  1. A technology that compresses and decompresses data for the purpose of reducing the bandwidth required to send streaming data.
  2. A program that can encode and decode a digital data stream or signal. In mobile computing, there are separate codecs for multimedia processing and voice processing.

code churn
A report that shows the volume of changes in a project over time.

code completion
A feature of many IDEs and text editors that predictively completes content (words, phrases, tags, and so on) while the user types.

coded character
A control or graphic character with its assigned code point.

coded character set (CCS)
A set of unambiguous rules that establishes a character set and the one-to-one relationships between the characters of the set and their coded representations. See also invariant character set.

coded character set identifier (CCSID)
A 16-bit number that includes a specific set of encoding scheme identifiers, character set identifiers, code page identifiers, and other information that uniquely identifies the coded graphic-character representation. See also binary string.

coded character set identifier 65534 (CCSID 65534)
The coded character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 (X'FFFE') is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs that are tagged for each individual field it contains. If the field is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.

coded character set identifier 65535 (CCSID 65535)
An identifier that is used to show that the associated data should not be processed as coded-graphic-character data. CCSID 65535 ( FFFF ) cannot be represented in long form. Data that is associated with CCSID 65535 should be interpreted as actual representation is unknown as defined in Character Data Representation Architecture-Level 2, IBM Registry. You cannot convert data that is associated with CCSID 65535 from one CCSID to another. The coded character set identifier (CCSID) that is used to show that data associated with the CCSID should not be processed as coded-graphic-character data.

coded font
In AFP support, a font file that associates a code page and a font character set. For double-byte fonts, a coded font associates multiple pairs of code pages and font character sets.

coded font local identifier
A 1-byte identifier that the Map Coded Font structured field assigns to each coded font it selects. The identifier is then specified in the text-control sequence that precedes the string of text to be printed with the particular font. See also local identifier.

coded font section
A font character set and code page pair. A single-byte coded font consists of only one coded font section; a double-byte coded font can consist of more than one.

coded graphic character
A graphic character that has been assigned one or more code points within a code page.

coded graphic character set
A set of graphic characters with their assigned code points.

coded graphic character set global identifier (CGCSGID)
A 4-byte binary or a 10-digit decimal identifier consisting of the concatenation of a GCSGID and a CPGID. The CGCSGID identifies the code point assignments in the code page for a specific graphic character set, from among all the graphic characters that are assigned in the code page.

coded graphic character-set ID
A 10-digit identifier (two 5-digit identifiers separated by a space) that is the combination of a graphic character-set ID and a code-page ID. See also code page ID.

coded image
In computer graphics, a representation of a display image in a form suitable for storage and processing.

code division multiple access (CDMA)
The term that is generally used to reference a type of 2G cellular network (standardized by IS-95). See also 2G, Global System for Mobile Communications, IS-95.

coded overlay
An overlay loaded in a printer in a coded format, rather than as a raster pattern. See also raster pattern overlay.

code element set
The result of applying rules that map a numeric code value to each element of a character set. An element of a character set may be related to more than one numeric code value but the reverse is not true. However, for state-dependent encodings the relationship between numeric code values to elements of a character set may be further controlled by state information. The character set may contain fewer elements than the total number of possible numeric code values; that is, some code values may be unassigned. X/Open.

code extension method
A method prescribed in an encoding scheme for representing characters that cannot be accommodated within the limits of the basic structure of the code. It prescribes a method to alter the interpretation of one or more code points that follow a prescribed single control character or a control sequence.

code generation template
The mixed-mode source file that is used by a generic operator to generate specific customizations. See also generic operator.

code generator
The part of the compiler that physically generates the object code.

code group
In a computer security code system, an apparently meaningless sequence of letters, digits, or both, that represents a plaintext element, which may be a word, phrase, or sentence.

code injection
A technique that introduces new code into an application. Code injection can be used by an attacker to introduce code into a computer program to change the course of execution.

code list

  1. A list that contains codes corresponding to the services provided by service providers.
  2. One or many dynamic pairs of code values that contains sender code and receiver code. Each code pair has one description and up to four additional codes relating to the pair.

code list table
A repository for lists of codes that can further define fields.

code load
In System Manager, the type of product load that contains all of the product code that does not require translation to other languages, such as the code for displays, menus, and messages. However, if a product is never going to be translated, the code may contain all the product code.

code page

  1. A specification of code points from a defined encoding structure for each graphic character in a set or in a collection of graphic character sets. Within a code page, a code point can have only one specific meaning. See also invariant character set.
  2. A particular assignment of code points to graphic characters. Within a given code page, a code point can have only one specific meaning. A code page also identifies how undefined code points are handled. See also code point.
  3. An ordered set of up to 256 predefined display symbols. The first 32 code points of each code page are reserved for control codes and are the same for all code pages, leaving up to 224 distinct display symbols per page.
  4.  

code page global identifier (CPGID)
A 5-digit decimal or 2-byte binary identifier that is assigned to a code page. The range of values is 00001 to 65534 (X'0001' to X'FFFE').

code page ID
A 5-digit registered identifier used to specify a particular assignment of code points to graphic characters. The code-page ID is the second part of the QCHRID system value or the CHRID parameter value. See also coded graphic character-set ID.

code point

  1. In QoS, pertaining to a specific value in the Differentiated Services field of a data packet that signals to a network the behavior that is assigned to that packet.
  2. An identifier in an alert description that represents a short unit of text. The code point is replaced with the text by an alert display program.
  3. A unique bit pattern defined in a code. Depending on the code, a code point can be 7-bits, 8-bits, 16-bits, or other. Code points are assigned graphic characters in a code page.
  4. A unique bit pattern that represents a character in a code page. See also code page.
  5. For SNA alerts, a 1-or 2-byte hexadecimal code that designates a particular piece of text to be displayed at the focal point.

code respect
In programming, a feature that preserves the order of elements in the original code structure during code generation.

code server
A system that provides a code service for other computers on a network.

code set

  1. A set of unambiguous rules that establish a character set and the one-to-one relationship between each character of the set and its bit representation.
  2. See code page.

CodeStation
The artifact repository for IBM UrbanCode Deploy. CodeStation tracks artifact versions as they change and maintains an archive for each artifact.

code table
In architecture, a table showing the character allocated to each code point in a code.

code type
A code category. Standard 2x code types are: req code, job code, and source code.

code unit
The fundamental binary width in a computer architecture that is used for representing character data, such as 7 bits, 8 bits, 16 bits, or 32 bits. Depending on the character encoding form that is used, each code point in a coded character set (CCS) can be represented by one or more code units.

coding
The process by which the responses to open-ended questions are sorted into categories.

coding variable
A categorical variable that stores the responses to an open-ended question after they have been sorted into categories.

COD report
See confirm-on-delivery report.

co-edit
To collaborate on a single file with one or more other people. Updates to the file are made at the time that people make the edits, whether at the same time or different times.

coefficient
A number representing the relationship between a dependent variable (for example, sales volume or share) and an independent variable (for example, base price or discount).

coexistence

  1. The ability of two or more entities to function in the same system or network.
  2. The ability of two or more different versions of IBM MQ to function on the same computer.
  3. The state during which two QMF releases exist in the same database.
  4. During migration, the state during which two releases exist in the same data sharing group.

cognitive analytics
A set of technologies and processes that analyze data for the purposes of learning, contextualization, and making recommendations.

cognitive API
An interface that serves as a messenger between data and the cognitive computing capabilities of Watson.

cognitive business
An IBM strategy that builds on digital business and digital intelligence with systems that can understand, reason, and learn to leverage data to create deeper engagement and personalization, enhanced expertise, and cognitive products, services, operations, and processes.

cognitive car
A car that has the technology to predict vehicle malfunctions before they happen, divert drivers to less congested routes, and help reduce traffic accidents.

cognitive computing
A category of technologies that uses natural language processing and machine learning to enable people and machines to interact more naturally to extend and magnify human expertise and cognition.

cognitive environment
An infrastructure that uses specialized software agents and devices that act as one shared integrated resource, enabling fast and efficient human-computer collaboration.

Cognitive Learning Companion (CLC)
A suite of cognitive capabilities developed by IBM Research to support multiple modes of learning, enabled on mobile and delivered through the cloud.

cognitive system
A category of technologies that uses natural language processing and machine learning to enable people and machines to interact more naturally to extend and magnify human expertise and cognition. Watson is an example of a cognitive system.

cognitive tutor
An intelligent system that interacts with the learner as they engage in learning materials by providing feedback, support, and instruction.

COGS
See cost of goods sold.

coherency check
Verification that the current state of an object satisfies the programmer-defined invariant properties of its class.

coherent
Pertaining to an object in which all data values satisfy the invariant properties. If any invariant property is not satisfied, the object is not coherent.

Coherent Accelerator Processor Interface (CAPI)
A port that is used to connect auxiliary specialized processors for external communication.

coherent cache
Cache that maintains integrity so that all clients see the same data.

cohort
A list of security tags that specify the level of user access to the row.

col
A typesetter postprocessor that buffers typeset output so that printers and workstations that do not support backscrolling can print.

cold backup
For programs that are resident on backup systems, a configuration in which a copy of the program is installed for backup purposes, but has not been started. See also hot backup, warm backup.

cold project
A project that contains only a work breakdown structure and schedule that are imported from another project-scheduling tool.

cold queue
A Common Queue Server (CQS) private queue type that contains in-doubt data objects for a client that had a cold start or a CQS that had a cold start.

cold standby
A recovery method in which backup servers with installed applications are in place and in a stopped state.

cold start

  1. The starting of IMS when it is initialized for the first time or when some error condition prevents a warm or emergency restart. See also emergency restart, normal restart.
  2. A method of starting CICS where all local resources are refreshed, but information relating to remote systems and resource managers is preserved.
  3. The process of starting an existing data replication configuration without regard for prior replication activity, causing reinitialization of all subscriptions.
  4. A process in which the system is initialized. All jobs that were active or in the job queue at the time of the cold start are removed from the system. See also warm start.
  5. A process by which DB2 restarts without processing any log records. See also warm start.
  6. The process of starting a system or program using an initial program load procedure.

collaboration

  1. A diagram that shows the exchange of messages between two or more participants in a BPMN model.
  2. The ability to connect customers, employees, or business partners to the people and processes in a business or organization, in order to facilitate improved decision-making. Collaboration involves two or more individuals with complementary skills interacting together to resolve a business problem. See also web-based editor.

collaboration area
A runtime instance of a workflow for a specific hierarchy or catalog. A collaboration area provides a staging area where entries from that container can be modified without affecting the original entry. These changes can be copied back to the original or discarded when the entry completes the workflow. Each collaboration area must be associated with a workflow (but not vice versa). See also container, workflow.

collaboration portfolio
The set of collaboration-based offerings and solutions within a brand unit or business unit. For example, IBM's collaboration portfolio includes IBM Connections, IBM Lotus Sametime Connect, and IBM SmartCloud and other applications.

collaboration service
A service that connects customers, employees, or business partners to the people and processes in a business or organization, in order to facilitate improved decision-making.

collaboration subscription
An account subscription that provides access to a collaboration service.

collaborative components
UI-neutral API methods and tag libraries that allow developers to add collaborative functionality to their portlets.

collaborative filtering
Personalization technology that calculates the similarity between users based on the behaviors of a number of other people and uses that information to make recommendations for the current user.

Collaborative Lifecycle Management (CLM)
The integration of products on Jazz technology to connect the work of analysts with development and test teams. These integrations provide a common approach to artifact linking, dashboards, security, and user interface frameworks.

collaborative planning, forecasting, and replenishment (CPFR)
A concept that allows working together across the supply chain, using a set of process and technology models that are: open, yet allow secure communications; flexible across the industry; extensible to all supply chain processes; supportive of a broad set of requirements.

collaborative unit
The configuration of the part of a deployment environment that delivers required behavior to an application module. For example, a messaging collaborative unit includes the host of the messaging engine and deployment targets of the application module, and provides messaging support to the application module.

collapse
To compact a hierarchical view so that only higher levels or organization are displayed.

collapsed subprocess
A subprocess that hides its flow details. The collapsed subprocess object has a marker that distinguishes it as a subprocess, rather than a task.

collate

  1. To determine the sorting order of strings of characters.
  2. To combine and arrange in order.

collateral
In securing a loan, the pledging of an asset to a lender for use as recourse in the event of a default.

collateral damage potential (CDP)
A measurement of the potential impact of an exploited vulnerability on a physical asset or on an organization.

collating element

  1. One or more characters that match a sequence in a regular expression.
  2. The smallest entity used to determine the logical ordering of strings. A collating element consists of either a single character, or two or more characters collating as a single entity. The value of the LC_COLLATE category in the current locale determines the current set of collating elements. See also collating sequence.

collating sequence

  1. An ordering assigned to a set of items, such that any two sets in that assigned order can be collated.
  2. The relative ordering of collating elements as determined by the setting of the LC_COLLATE category in the current locale. The character order, as defined for the LC_COLLATE category in the current locale, defines the relative order of all collating elements, such that each element occupies a unique position in the order.
  3. The sequence in which the characters are ordered for the purpose of sorting, merging, comparing, and processing indexed data sequentially.
  4. A specified arrangement used in sequencing. See also collating element.

collation

  1. The separation of storage types into general categories (i.e. pallet, case, and single unit) that require very different means of handling.
  2. The logical ordering of characters and strings according to defined rules.

collation order
The logical order that character-string values in a database are sorted and indexed by. The ordering is either based on the order of the code set or a locale-specific order.

collation table
A table that provides an ordered character set and character equivalence classes used by functions.

collator
A device that combines and arranges pages in order.

collect - credited to customer payment method
A payment method in which the consignee pays for the freight charges and is reimbursed by the shipper.

collection

  1. A group of objects that typically have similar performance, availability, backup, retention, and class transition characteristics. A collection is used to catalog a large number of objects which, if cataloged separately, could require an extremely large catalog.
  2. A set of data sources and options for crawling, parsing, indexing, and searching those data sources.
  3. An instance of a collection data type; a group of elements of the same data type stored in a SET, MULTISET, or LIST data type.
  4. Data obtained by a collector that represents the system status at a given point in time. Collections are timestamped and stored in a management collection object. See also schema.
  5. An abstract class without any ordering, element properties, or key properties.
  6. The process of locating and gathering documents related to a case from data sources.
  7. A container that provides a single view of related resources.
  8. A data type. The three types of collections are a list, set, or map.
  9. A logical container for storing archived documents, as well as the retention and access policies that specify how the documents are managed. Each collection is represented by a separate file system. See also file archive collection, System Storage Archive Manager collection.
  10. A distinct named set of data that is associated with a case. For example, an ordered set of captured network packets.
  11. A group of objects with a similar set of management rules.
  12. The process of monitoring and storing application performance data, aggregating it to a time interval, and saving it into data files on the endpoint.
  13. In Ada language, the entire set of objects created by evaluation of allocators for an access type.
  14. A group of packages that have the same qualifier.

collection certificate store
A collection of intermediate certificates or certificate revocation lists (CRL) that are used by a certificate path to build up a certificate chain for validation.

Collection Class Library
A complete set of abstract data structure such as trees, stacks, queues, and linked lists.

collection cursor
A database cursor that has an IBM Informix ESQL/C collection variable associated with it and provides access to the individual elements of a column whose data type is a collection data type.

collection data type
A complex data type whose instances are groups of elements of the same data type, which can be any opaque data type, distinct data type, built-in data type, collection data type, or row data type. See also complex data type.

collection-derived table
In Informix, a table that can be mapped to a transient table, and its elements can be mapped to rows of the transient table.

collection page
A type of page in the administrative console that displays a collection list of administrative objects. From this type of page, you can typically select objects to act on or to display other pages for.

collection plan
A set of instructions that define what information to collect.

collection point block (CPB)
In the NetView Performance Monitor (NPM), a control block used to coordinate the collection of network and session data.

collection processing engine (CPE)
An engine that performs collection processing through the combination of a collection reader, an optional CAS Initializer, an analysis engine, and one or more CAS Consumers.

collection processing manager (CPM)
A module in the framework that manages the execution of collection processing, routing CASs from the collection reader to an analysis engine, and then to the CAS Consumers. The CPM provides feedback such as performance statistics and error reporting, and may implement features such as parallelization.

collection reader
A component that reads documents from a source, such as a file system or database, and returns each document as a CAS that may be processed by analysis engines.

collection resource
A resource that provides access to information about a set of artifacts of the same type, such as jobs, operators, or processing elements.

Collection Services
A System i Navigator tool that collects performance data independent of the system monitors in System i Navigator. This function is intended for subsequent analysis by performance personnel either by writing queries against the collected data or by reviewing reports produced by the Performance Tools for i5/OS licensed program.

collection subquery
A collection subquery enables users to construct a collection expression from a subquery expression.

collection variable
An IBM Informix ESQL/C host variable or SPL variable that holds an entire collection and provides access, through a collection cursor, to the individual elements of the collection.

collective

  1. A set of appliances that are grouped together for scalability and management purposes.
  2. A set of Liberty servers in one management domain that has at least one server with the collective-controller feature enabled.

collective communication
A communication operation that involves more than two processes or tasks. Broadcasts and reductions are examples of collective communication operations. All tasks in a communicator must participate.

collective controller
A centralized administrative control point where operations such as MBean routing, file transfer, and cluster management in a collective are performed. A core role of the collective controller is to receive information from the members within the collective so that the data can be retrieved readily without having to invoke an operation on each individual member.

collector

  1. In an AIX PowerSC environment, an AIX logical partition or a virtual machine that has VTPM enabled and has the OpenPTS.collector fileset installed.
  2. An object that determines what information is collected from, or assigned to, server resources. The information is specified through properties in the collector. The collector, assigned to a server, serves as a specification for the server’s manifest.
  3. A generic name for a program that at regular intervals collects data about the status of the system.
  4. A web service that accepts uploads of recordings and stores them into a permanent storage medium. This web service is a component of the session recording server.

collector system
For directory shadowing, a system that receives initial or changed Enterprise Address Book (EAB) data from a supplier system in a network. See also supplier system.

collect payment method
A payment method in which the consignee pays for the freight charges.

collision

  1. In X.25 communication, a condition that occurs when data terminal equipment (DTE) and data circuit-terminating equipment (DCE) simultaneously transmit packets (for instance, a clear request packet and a clear indication packet) over the same logical channel. The types of collision are clear collision, call collision, or reset collision.
  2. An unwanted condition that results from concurrent transmissions on a channel, causing the transmissions to be unintelligible.

collision arbiter
A plug-in that specifies how to handle change collisions in map entries.

collision avoidance
In carrier sense multiple access with collision avoidance (CSMA/CA), the process of sending a jam signal and waiting for a variable time before transmitting data. The process is designed to avoid two or more simultaneous transmissions.

collision detect
In Performance Tools, a counter that counts the total number of times the terminal equipment (TE) detected that the frames it transmitted were damaged by another TE trying to use the same bus.

collision detection
In carrier sense multiple access with collision detection (CSMA/CD), a signal indicating that two or more stations are transmitting simultaneously.

collocated join
The result of two tables being joined under one of two conditions. The first condition is where the tables are located in a single-partition database partition group in the same database partition. The second condition is where the tables are in the same database partition group, the number of partitioning columns is the same, the columns are partition compatible, both tables use the same partitioning function, and pairs of the corresponding partitioning key columns participate in the equijoin predicates. See also partition-compatible join.

collocation

  1. An optional policy which can be applied to certain cluster resources such as persistent IP addresses and resource groups. Collocation specifies that, whenever possible, the entity will be brought online using the same resources as another cluster entity. For example, if a persistent IP address is configured to collocate with a service IP address, the persistent and service IP addresses will both be placed on the same network interface. See also anti-collocation, distribution preference.
  2. See table collocation.
  3. The process of keeping all data belonging to a single-client file space, a single client node, or a group of client nodes on a minimal number of sequential-access volumes within a storage pool. Collocation can reduce the number of volumes that must be accessed when a large amount of data must be restored. See also anti-collocation, distribution preference.

collocation frequency
A statistic that indicates the likelihood of certain words occurring together in text.

collocation group
A user-defined group of client nodes whose data is stored on a minimal number of volumes through the process of collocation.

colon format
A format into which data files can be organized. Each data record consists of one line in the colon file, and data fields in each data record are separated by colons.

colony
In Sterling Order Management and Sterling Configure, Price, Quote, a set of database shards required to provide complete sharding functionality.

colony address space
An address space in which a physical file system (PFS) can be initialized. The address space can be viewed as a logical extension to the kernel address space.

colony prefix
See primary key prefix.

color
In computer systems, a color is usually represented by a triplet called RGB (red, green, and blue) signals. Most computer monitors require RGB signals to drive the 3-colored phosphors of a color monitor.

color attribute
An attribute that affects the color values provided in a graphics primitive, a text control sequence, or an IPDS command; for example, foreground color and background color.

color cell
In Enhanced X-Windows, an entry in a color map that consists of three values based on red, green, and blue intensities. The values are 16-bit, unsigned numbers. Zero represents the minimum intensity. The values are scaled by the server to match the particular display in use.

color depth
The number of screen colors that are available to visitors that are accessing a website.

color display
A display device capable of displaying more than two colors and the shades produced by combinations of two colors, as opposed to a monochrome display.

color image
In architecture, images whose image data elements are represented by multiple bits or whose image data element values are mapped to color values. Constructs that map image-data-element values to color values are look-up tables and image-data-element structure parameters.

color lookup table (CLUT)
See color map.

color map

  1. A lookup table in which each index is associated with a red, green, and blue value.
  2. A set of color cells. A pixel value indexes the color map to produce RGB-intensities. A color map consists of a set of entries defining color values that, when associated with a window, is used to display the contents of the window.

color mapping file
File CICSCOL.INI used by the CICS Transaction Gateway to customize the 3270 screen color attributes on client workstations.

color mapping table
An architected MO:DCA object that is used to map color values specified in a source color space to color values specified in a target color space. This object is loaded into printers that support the color mapping table.

color model
A technique for describing a color. For example, the RGB color model specifies color in terms of three intensities for red (R), green (G), and blue (B).

color palette

  1. See color map.
  2. A set of colors that can be displayed on the display at one time. This can be standard set used for all images or a set that can be customized for each image.
  3. In Business Graphics Utility, the range of colors defined by hue, lightness, and saturation to be used when a chart is displayed on a graphics-capable display.

color ramp
A progression of colors in a color map. Most color ramps are smooth and have only a small number, if any, of discontinuities. For instance, if the full set of colors of the rainbow were loaded into the color map, that would constitute a color ramp.

color selection
The ability to specify a color other than black to print data in more than one color. Some printers support selection of several colors, depending upon the color of ribbon installed in the printer. Other printers support the selection of black or "color of media," which can cause white lettering on a background that has been shaded black, for example.

color separation
The process of making separate masters of a document for color printing.

color table

  1. In AFP architecture, a collection of color element sets. The table can also specify the method used to combine the intensity levels of each element in an element set to produce a specific color. Examples of methods used to combine intensity levels are the additive method and the subtractive method. See also lookup table.
  2. See color map.

column

  1. A character position within a print line or on a display. The positions are numbered consecutively from 1, starting at the leftmost character position and extending to the rightmost position.
  2. A subdivision of a band, such as baseline or actual.
  3. In a relational database, a field defined for a given record or row.
  4. The vertical component of a database table. A column has a name and a particular data type (for example, character, decimal, or integer).
  5. In FD:OCA, a subarray consisting of all elements that have an identical position within the low dimension of a regular two-dimensional array. See also row.

column analysis
A data quality process that describes the condition of data at the field level.

columnar vector memory
Sort heap memory that is used in the vector processing of data that is stored in column-organized tables.

column balancing
The process of redistributing lines of text among a set of columns so that the amount of text in each column is as equal as possible.

column compression dictionary
A column-level dictionary that is used to compress data in a column of a column-organized table.

column constraint
A rule that limits the values that can be inserted, deleted, or updated in a table column.

column data
The data in a column of a relational database table or view. The type of the data can be any data type supported by the database manager.

column distribution value
See data distribution.

column expression
An expression that includes a column name and optionally uses column subscripts to define a column substring.

column function
See aggregate function.

column heading
Text appearing near the top of a column of data for the purpose of identifying or titling the data in the column.

column inch
A unit of measure for printed text. One column inch is the amount of text contained in an inch of type depth, one column wide.

column-major order
A way of storing array elements such that the leftmost subscript varies most rapidly as memory-adjacent elements are accessed.

column map
A map that defines the specifications for mapping columns of compatible data between source and destination tables.

column option
In a federated system, a parameter of the CREATE NICKNAME and ALTER NICKNAME statements that describes the values in certain columns of the data source object that a nickname references. This information is added to the global catalog and used by the query optimizer to develop better access plans.

column-organized table
A table where the data pages contain column data instead of row data. See also row-organized table.

column position
A unit of horizontal measure related to characters in a line. It is assumed that each character in a character set has an intrinsic column width independent of any output device. Each printable character in the portable character set has a column width of one. The standard utilities, when used as described in this document set, assume that all characters have integral column widths. The column width of a character is not necessarily related to the internal representation of the character (numbers of bits or bytes). The column position of a character in a line is defined as one plus the sum of the column widths of the preceding characters in the line. Column positions are numbered starting from 1. X/Open.

column separator
A symbol on each side of a position of a field on a display. This symbol does not occupy a position on the display.

column token
A level attribute that has certain properties, irrespective of the reference structure level. For example, the level attribute that provides the identifier for each row of data is represented by the $ID column token.

column width
The width of each text column on a page.

column wrapping
The formatting of values in a report so that the values occupy several lines within a column. Column wrapping is often used when a column contains a value with a length that exceeds the column width.

COM

  1. See Component Object Model.
  2. See computer output microfilm.

C++
An enhancement of the C language that adds features supporting object-oriented programming.

C++ language
An object-oriented high-level language that evolved from the C language. C++ takes advantage of the benefits of object-oriented technology such as code modularity, portability, and reuse.

C++ library
A system library that contains common C++ language subroutines for file access, memory allocation, and other functions.

C2
A level of security defined in the Trusted Computer System Evaluation Criteria (TCSEC) published by the United States Government. To meet C2 requirements, a system must perform discretionary access control, authentication and verification, object reuse protection, and auditing of security-relevant events.

C2A
See Click-to-Action.

C/370 common anchor area (C-CAA)
A common anchor area (CAA), specific to the C/370, in the runtime environment.

C5.0
A rule induction algorithm that builds either a decision tree or a rule set. The model works by splitting the sample based on the field that provides the maximum information gain at each level. See also rule induction.

CA

  1. See control area.
  2. See channel adapter.
  3. See certificate authority.
  4. See change accumulation.
  5.  

CAA

  1. See Cluster Aware AIX.
  2. See common anchor area.

CaaS
See capabilities as a service.

cable
A physical medium for transmitting signals. Cables include copper conductors and optical fibers.

cable modem
A modem that provides Internet access over cable TV networks (which use fiber-optic or coaxial cables). A cable modem is generally faster than a modem that uses phone lines.

cable path
A series of cables connected in sequence.

cable segment
A section of cable between components or devices on a network. A segment may consist of a single patch cable, multiple patch cables that are connected to one another, or a combination of building cable and patch cables that are connected to one another.

cable-through
Pertaining to a function or feature of a display station that allows multiple work stations to be attached to one cable path.

CA certificate
See certificate authority certificate.

cache

  1. To place a duplicate copy of a file on random access media when the server migrates a file to another storage pool in the hierarchy.
  2. Storage or memory that is used to improve access times to instructions, data, or both. For example, data that resides in cache memory is normally a copy of data that resides elsewhere in slower, less expensive storage, such as on a disk or on another network node.
  3. To place, hide, or store frequently used information locally for quick retrieval.
  4. A buffer that contains frequently accessed instructions and data; it is used to reduce access time.

cache coherency
Consistency of data in caches on multiple processors so that changing a single cache line does not create inconsistent versions of the cache line in the different caches.

cached inventory
Products that have their information, such as item attributes, inventory balance, or availability, stored in a local data cache. The consuming application, such as a web store, can access the information from the cache, reducing synchronous queries to the order management system.

cache eviction
A process by which data associated with a file is removed from the cache system. The data is removed either by using a Least Recently Used (LRU) algorithm when configured General Parallel File System (GPFS) hard or soft quota limits are exceeded or by issuing a command. When referenced again in the cache system, the data that is associated with the file is retrieved from the home system.

cache fast write
A storage control capability in which data is written directly to cache without using nonvolatile storage. Cache fast write is useful for temporary data or data that is readily re-created. See also DASD fast write.

cache file
A snapshot of a logical volume created by Logical Volume Snapshot Agent. Blocks are saved immediately before they are modified during the image backup and their logical extents are saved in the cache files.

cache hit

  1. A processor storage reference that is satisfied by information from a cache.
  2. An event that satisfies a read operation by retrieving data from cache instead of retrieving it from the intended storage or a lower level of cache. See also cache miss.

cache instance resource
A location where any Java Platform, Enterprise Edition (Java EE) application can store, distribute, and share data.

cache line

  1. A record that contains relevant information about the user data that is currently in the subsystem cache memory. Examples of this information include the current state of the data and the intended location of the data on one or more disks.
  2. The cache component that is normally loaded, stored, and interrogated during cache lookup.

cache miss

  1. An event that satisfies a read operation by retrieving data from the intended storage or a lower level of cache because the requested data is not available in the only level or a higher level of cache. See also cache hit.
  2. A delay that occurs when the processor references data or instructions that are not already in the data cache or instruction cache.

cache replication
The sharing of cache IDs, cache entries, and cache invalidations with other servers in the same replication domain.

cache set
A storage-class parameter, defined in the base configuration information, that maps a logical name to cache structure names in a coupling facility (CF).

cache structure
A coupling facility structure that stores data that can be available to all members of a Sysplex. A DB2 data sharing group uses cache structures as group buffer pools. See also group buffer pool.

cache table
In a federated system, a logical table object that is used to cache data from a data source table. A cache table comprises a nickname that identifies the data source table, one or more materialized query tables, and a schedule for replicating the data in each materialized query table.

cache timeout
The length of time that is allowed to pass before the cache is updated.

caching
The process of storing frequently used results from a request to memory for quick retrieval, until it is time to refresh the information. The DB2 database manager provides many forms of caching, such as directory caching, package caching, file system caching, and LDAP caching.

caching inhibited
Pertaining to a memory update policy in which the cache is bypassed, and the load or store is performed to or from main memory.

caching I/O group
The I/O group in the system that performs the cache function for a volume.

caching proxy server
A proxy server that stores the documents that it retrieves from other servers in a local cache. The caching proxy server can then respond to subsequent requests for these documents without retrieving them from the other servers. This can improve response time.

CAD
See client acceptor daemon.

cadence
The modulated and rhythmic recurrence of an audio signal. For example, a series of beeps or a series of rings.

CAF
See call attachment facility.

cage
See I/O cage.

CA key
See command attention key.

CAL
See customer acceptance laboratory.

CalConn server task
A Domino server task that is a component of calendar scheduling.

calc script
See calculation script.

calculated category
A category created based on a calculation. Calculated categories become part of the cube and can be applied to any measure.

calculated column
A column whose values are calculated from other columns, calculated columns, functions, and constants to derive new data for a model.

calculated expression
An expression that is not constant, but whose value depends upon other values. To be evaluated, a calculated expression must obtain and compute values from other sources, normally in other fields or rows.

calculated measure
A measure whose values are calculated from other measures, calculated measures, functions, and numeric constants in an arithmetic equation.

calculated member
A member of a dimension whose measure values are not stored but are calculated at run time using an expression. See also input member.

calculated metric
A metric that can be defined using a formula that is constructed from one or more existing metrics, operators, or constants. For example, users can create a metric named Repeat Visitor % using a calculated metric of [(Unique Visitors –New Visitors)/Unique Visitors].

calculation

  1. A metric that is the main focus of a metric report.
  2. The process used to transform a series of records into a new result. Typically a calculation is mathematical, but may also include sorting, shifting, or adding to a prior result. Calculations enable the model admin to select records from their source data, perform operations on the data, segment results, and begin another calculation based on those results.
  3. An equation within a database outline, a calculation script, or a report script that is used to determine a value for a particular member or point in a report.

calculation account
An account used for calculating rations and formulas in reports. The abbreviation for calculation account is CALC account.

calculation code
A code associated with order items, catalog entries, or catalog groups to specify how discounts, shipping charges, sales or use taxes, and shipping taxes should be calculated.

calculation context
A configuration setting that forecasts a promotion in a specific context in order to account for historical levels of promotion on non-promoted products.

calculation framework
A flexible, generic framework provided by the WebSphere Commerce order subsystem, used to implement calculations and apply them to the applicable business objects.

calculation method
A reference task command that implement parts of calculation framework.

calculation rule
A rule that defines how a calculation will be done.

calculation scale
A set of ranges that can be used by a calculation rule. For example, for shipping charges, there can be a set of weight ranges that each correspond to a particular cost. That is, a product that weighs between 0 to 5 kg might cost $10.00 to ship, while a product weighing 5 to 10 kg might cost $15.00 to ship.

calculation script (calc script)
A text file that contains instructions for how specified data sets within a database should be calculated.

calculation specification
In RPG, a specification on which the programmer describes the processing to be done by the program.

calculation strategy
The strategy used to calculate the final score of a scorecard table.

calculation usage
A type of calculation that the calculation framework performs.

CalDAV
An Internet standard allowing a client to access scheduling information on a remote server. It extends the WebDAV (HTTP-based protocol for data manipulation) specification and uses iCalendar format for the data. The access protocol is defined by RFC 4791.

CalDAV account
A calendar that has been set up using CalDAV.

calendar

  1. A list of scheduling dates. Calendars are defined in the database and are mostly assigned to run cycles. Calendars can be used either to identify the dates when job streams or jobs can be run (when used with inclusive run cycles), or when they cannot be run (when used with exclusive run cycles). A calendar can also be designated for use as a non-working days calendar in a job stream. See also exclusive run cycle, holidays calendar, iCalendar, inclusive run cycle, non-working days calendar, run cycle.
  2. A view in the Notes mail database that can be used to manage time and schedule meetings. Users can add appointments, meetings, reminders, events, and anniversaries to the Calendar view.

calendar exception
A partial or full day during which a resource does not work on a project

calendaring
Software that provides users with the ability to schedule appointments and view contacts. Calendaring software generally works in accordance with other time management software and can be synchronized with additional devices (such as smartphones). See also synchronize.

calendar schedule
A schedule that defines both the days and time that processing occurs. For example, one could use a calendar schedule to make sure that a process runs every Tuesday starting between 19:00 and 19:30 and ending between midnight and 00:30.

calender
A process to make paper smooth or glossy by passing it through a series of metal rollers during the last steps of a paper-making machine.

calender cut
Slits, glazed lines, or discolored lines across paper caused when wrinkles pass through the calender rolls.

calibration

  1. The comparison and adjustment of an instrument to a standard of known accuracy.
  2. In capacity planning, the process of refining a model so that it represents the system the user is modeling. The predicted and measured values should match as closely as possible, with no more than a 10% difference for resource utilization, and no more than a 20% difference for response times.

calibration drift
The difference between the as left value of the previous measurement compared to the as found value of the current measurement for an asset.

calibration point
The calibration requirement for each asset function.

caliper
The thickness of forms, usually expressed in thousandths of an inch.

call

  1. To start a program or procedure, usually by specifying the entry conditions and transferring control to an entry point.
  2. A single runtime instance of a voice application.
  3. A physical or logical connection between one or more parties in a telephone call.

callable interface (CI)

  1. The name of the interface program, the definition of the arguments passed to the interface program, and the definition of the data structures passed to the interface program.
  2. The application server to which the QMF session is currently connected. After the connection is made, this server processes all SQL statements.
  3. In query management, the Common Programming Interface (CPI) that includes the definitions of the control blocks and constants used for the interface. See also command interface.

callable service

  1. A program service provided through a programming interface. See also action service.
  2. A set of documented interfaces between the z/OS operating system and higher level applications that want to access functions specified in the Single UNIX Specification and earlier standards. See also system call.
  3. Services that are provided by IMS for use by IMS exit routines. These services provide clearly defined interfaces that allow exit routines to request various functions, such as acquiring storage or finding an IMS control block.

call-accepted packet
A call supervision packet that a called data terminal equipment (DTE) transmits to indicate to the data circuit-terminating equipment (DCE) that it accepts the incoming call. See also call connected packet, call request packet.

call analysis dimension
A category display that shows dispatch types along with location map and dispatch documents.

call attachment facility (CAF)
A DB2 for z/OS attachment facility for application programs that run in TSO or z/OS batch. The CAF is an alternative to the DSN command processor and provides greater control over the execution environment. See also Resource Recovery Services attachment facility.

call back
To invoke a callback or upcall.

callback

  1. Pertaining to a characteristic that tells a remote system whether the local system it tries to access will verify its identity.
  2. In the AIX operating system, a procedure that is called if and when certain specified conditions are met.
  3. A message consumer or an event handler routine.
  4. A way for one thread to notify another application thread that an event has happened.

callback function
Executable code that allows a lower-level software layer to call a function defined in a higher-level layer.

callback handler
A mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the web service security run time for propagation in the web service security header.

callback mechanism
A method for authentication of a voice user who is requesting a system API. This mechanism places a callback request to VoiceLogistics Pro (VLP) to verify whether the user is logged into VLP.

callback registration
The identification and registration of a callback routine.

callback routine
A procedure that is called if and when certain specified conditions are met. This is accomplished by specifying the procedure in a callback list.

callback URL
A URL that is supplied in a call to an API method. The API will call that URL, usually when the API has finished its task.

call center
A center that handles a large number of calls to either take orders or provide customer service.

call center dashboard
A user interface that provides information on how the telesales service representative, shift, or call center is performing.

call chain
A trace of all active routines and subroutines, such as the names of routines and the locations of save areas, that can be constructed from information included in a system dump.

call connected packet
In X.25 communications, a call supervision packet transmitted by a DCE to inform the calling DTE of the complete establishment of the call. See also call request packet, call-accepted packet.

call control
That set of telephony functions that includes call establishment, call transfer, and call disconnection (the program control of a telephone call).

call detail
A list of calls made or received on a device and plan.

call detail record (CDR)
In telephony, a unit of information containing data about a completed call, such as the time the call began, its duration and date, the originating extension, and the number called.

called DLS user
The data link service (DLS) user in connection mode that processes requests for connections from other DLS users. See also Data Link Service.

called NS user
A network service (NS) with which a calling NS user wants to establish a network connection.

called number
See dialed number identification service.

called party

  1. On a switched line, the location to which a connection is established.
  2. Any person, device, or system that receives a telephone call. See also caller.

called program
A program that is the object of a CALL statement combined at run time with the calling program to produce a run unit.

called routine
A program or sequence of instructions that is invoked by another program.

called segment
A segment that is called from another segment. It can be regarded as an extension of the calling segment, but some actions take place at the call and others at the return. Examples of actions are saving the addresses of the current position and the next order on the segment call stack at the call, and restoring those saved addressed at the return.

caller

  1. The requester of a service.
  2. A function that calls another function.
  3. Any person, device, or system that makes a telephone call. See also called party.

caller ID
A feature that displays the phone number of the incoming caller.

call establishment
The complete sequence of events that is necessary to establish a data connection.

call forward
To send an incoming call to a different number.

call forwarding
The process of sending incoming calls to a different number.

callgate
A method for CSM code to request that an agent function is executed. The callgate request contains the function, along with an instruction on which nodes should execute the function. For example, a CSM callgate could request that the agent code checks a user privilege level, and that would only be executed on the active configuration node.

call graph
A graph that uses lines represents the flow of data between subroutines in a program.

call hold
A feature that places callers on hold while the user does something else (or answers another call).

call home
A communication link established between a product and a service provider. The product can use this link to place a call to IBM or to another service provider when it requires service. With access to the machine, service personnel can perform service tasks, such as viewing error and problem logs or initiating trace and dump retrievals.

CALLIN
The logical channel type on which the data terminal equipment (DTE) can receive a call, but cannot send one.

calling
In X.25 communications, pertaining to the location or user that makes a call.

calling address
See network user address.

calling command ID
A numeric identifier for a command that calls an API function.

calling convention
A specified way for routines and subroutines to exchange data with each other.

calling DLS user
In OSI networking, the Data Link Service (DLS) user in connection mode who establishes a data link connection.

calling line identification presentation (CLIP)
An ISDN supplementary service that advises the called party of the caller's number: for example, by displaying it on a telephone display panel.

calling party
On a switched line, the location that originates a connection.

calling program
A program that calls another program.

calling thread
The task in progress in a multitasking environment.

call intercept
A feature that prevents a call from being answered under certain conditions; for example, when the caller's phone number is invalid or unrecognized.

CALL interface
A part of the external CICS interface (EXCI). The CALL interface consists of six commands that allow you to allocate and open sessions to a CICS system from non-CICS programs running under MVS; issue DPL requests on these sessions from the non-CICS programs; and close and deallocate the sessions on completion of the DPL requests.

CALLIO
The logical channel type on which the data terminal equipment (DTE) can send or receive a call.

call level
The position of an entry (program or procedure) in the call stack. The first entry has a call level of 1. Any entry called by a level 1 entry has a call level of 2, and so on.

call level interface (CLI)

  1. An API for database access that provides a standard set of functions to process SQL statements, XQuery expressions, and related services at run time. See also embedded SQL.
  2. A callable application programming interface (API) for database access, which is an alternative to using embedded SQL.

call level number
A unique number assigned by the system to each call stack entry.

call merging
A feature that allows a user who is on a call to accept a second call and merge it into the first, converting the two separate calls into a multi-person conference.

call message queue
A message queue that exists for each call stack entry within a job.

CALLOUT
The logical channel type on which the data terminal equipment (DTE) can send a call, but cannot receive one.

callout

  1. The action of bringing a computer program, a routine, or a subroutine into effect.
  2. A kernel parameter that establishes the maximum number of scheduled activities that can be pending simultaneously.
  3. An outbound message to request services or data from an enterprise application or web service.

callout node
The connection point in a mediation request flow from which a service message is sent to a target. There must be one callout node for each target operation.

callout response node
The starting point for a mediation response flow. There must be one callout response node for each target.

callout table
A kernel table that keeps track of all sleeping processes and the channel on which each is waiting.

CallPath
Software that provides basic computer-telephony integration (CTI) enablement and comprehensive CTI functionality. This includes access to, and management of, inbound and outbound telecommunications.

call profile
In telephony, a set of characteristics that may be used when establishing or manipulating a program-controlled telephone call.

call progress signal
A call control signal transmitted from the data circuit-terminating equipment (DCE) to the calling data terminal equipment (DTE) to indicate the progress of the establishment of a call, the reason why the connection could not be established, or any other network condition.

call redirection notification
In X.25 communications, an optional CCITT-specified facility that informs the caller that the call has been redirected to another DTE.

call request packet
A call supervision packet that a data terminal equipment (DTE) transmits to ask that a connection for a call be established throughout the network. See also call connected packet, call-accepted packet.

call request signal
During the establishment of a connection for a call, a signal that informs the data circuit-terminating equipment (DCE) that a data terminal equipment (DTE) has asked to make a call.

call session
The sequence of events that occurs from the time a call is initiated to the time all activities related to answering and processing the call are completed.

call stack

  1. The ordered list of all programs or procedures currently started for a job. The programs and procedures can be started explicitly with the CALL instruction, or implicitly from some other event.
  2. A list of data elements that is constructed and maintained by the Java virtual machine (JVM) for a program to successfully call and return from a method.

call stack entry
A program or procedure in the call stack.

call supervision packet
A packet used to establish or clear a call at the interface between the data terminal equipment (DTE) and the data circuit-terminating equipment (DCE).

call thread
In the Distributed Computing Environment (DCE), a thread created by a remote procedure call (RPC) server's run time to execute remote procedures. When engaged by an RPC, a call thread temporarily forms part of the RPC thread of the call.

call to action (CTA)
An instruction or a graphic within a piece of marketing content that engages users to click through and continue the conversation.

call transfer
A series of actions that directs a call to another telephone number.

call user data (CUD)
User-specified data that can be placed in an X.25 call request packet to be sent to the adjacent node.

CAM
See content-addressable memory.

camera definition
The set of parameters that enable the software to communicate with the VMS to analyze the data from the camera. The camera definition can also include camera location information, such as latitude and longitude coordinates.

camera ID
A unique numeric identifier for a camera.

camera-ready copy
Copy which is ready for photographic typesetting.

campaign

  1. A marketing effort that is defined by a business objective, a corporate-defined initiative, and a date range.
  2. A planned series of operations including advertisements and suggestive selling techniques, that are pursued to achieve a defined set of business objectives. In the Management Center, campaigns are used to coordinate and aggregate groups of campaign initiatives.

CAMS
See Cloud, Analytics, Mobile, and Social.

CAMSS
See Cloud, Analytics, Mobile, Social, and Security.

Canadian Anti-Spam Legislation (CASL)
Canadian legislation that establishes rules for the sending of commercial electronic messages (CEMs) and the installation of computer programs. CASL also prohibits the unauthorized alteration of transmission data.

Canadian Standards Association (CSA)
A not-for-profit membership-based association dedicated to standards development for business, industry, government and consumers in Canada and the global marketplace. See also CSA International.

cancel
To end a task before it is completed.

cancelability point
A specific point within the current thread that is enabled to solicit cancel requests.

cancel closedown
A closedown in which a program is abnormally terminated either because of an unexpected situation or as the result of an operator command. See also orderly closedown, quick closedown.

cancellation cleanup handler
A function that you can specify to perform an action, such as releasing resources, that occurs after the thread returns from the start routine and calls pthread_exit() or after a cancellation request is performed on the thread.

cancellation point
A function that causes a pending cancellation request to be delivered if the cancellation state is enabled and the cancellation type is deferred.

cancellation state
One of two values, which are either enabled or disabled, that describe whether cancellation requests in the current thread are acted on or held in a pending state. If the value is enabled, the cancellation request is acted on immediately and is based on the current cancellation type. If the value is disabled, the cancellation request is held in a pending state until it is enabled.

cancellation type
One of two values (deferred or asynchronous) that describe how cancellation requests in the current thread are acted on when the cancellation state is enabled. If the value is deferred, the cancellation request is held pending. If the value is asynchronous, the cancel request is acted on immediately, thus ending the thread with a status of PTHREAD_CANCELED.

candidate

  1. An applicant profile that has been submitted in response to either a contingent staff or hybrid request.
  2. An individual who has applied to requisition. A candidate must have expressed an interest in the position using electronic means, must be considered by the potential employer, must have the basic qualifications for the job, and cannot withdraw before an offer is made. Unless a candidate meets each criterion, that candidate is not an internet applicant for record-keeping purposes.

candidate answer
An answer that is generated by the system which is evaluated for correctness and might be returned as the correct answer.

candidate column
A column that is used as a placeholder in a mapping.

candidate endpoint
A known service endpoint that implements an interface for a particular request. The set of candidates is then filtered by the dynamic assembler to select the best endpoint out of all the candidates.

candidate form
An electronic document that captures the full set of candidate data.

candidate form association
The field bindings that allow a user to designate which field values drive (pre-populate) other field values.

candidate form field association
A field association that enables form fields to be content filters. Once a field is selected a subset of available options display.

candidate list
A short list of entities that are potential matches of the incoming identity because they share certain attributes. See also attribute.

candidate role
An aggregation of entitlements that are provided as output of the role mining process (see also access optimizer). It can be considered an "advised role" to be added into the role set of a company or organization.

candidate score
A score based on the comparison of information in a candidate's resume to the job description. The score can be 1 to 1,000. The score can be used as a starting point in a search for qualified candidates, but is not a final indicator of qualifications.

candidate term
A term in a business glossary that is being considered but that has not yet become standard or accepted. See also accepted term, standard term.

candidate threshold
The minimum score at which a particular attribute value must match between the incoming identity and an existing entity to satisfy the resolution rule. See also resolution rule.

candidate tier
A structure that contains multiple layers of candidates within a req folder, based upon sets of automated rules (such as proximity to the req’s location).

candidate type
A category that distinguishes candidates. The standard candidate types are: external, internal, former employee, inactive, temporary/contractor, co-op/intern, and employee referral.

canister
A single processing unit within a storage system.

cannibalization

  1. A process that uses a working component from an aircraft that is not in service and replaces a broken component on an aircraft that is in service.
  2. The negative effect on the sale of a product when a consumer purchases one product instead of another. For example, when a new flavor of yogurt is introduced the increased sales of the new flavor affect the sales of the other flavors of yogurt.

canonical address
In LANs, the IEEE 802.1 format for the transmission of medium access control (MAC) addresses for token-ring and Ethernet adapters. In canonical format, the least significant (rightmost) bit of each address byte is transmitted first. See also noncanonical address.

canonical format
A format for storing hierarchical names that displays the hierarchical attribute of each component of the name. For example, the canonical format for the name Reuben D. Smith/Ottawa/Renovations/CA is: CN=Reuben D. Smith/OU=Ottawa/O=Renovations/C=CA where: CN is the common name, OU is the organizational unit, O is the organization, and C is the region or country code.

canonical host name
A host name that is not an alias.

canonicalization
In computer science, a process that converts data with more than one possible representation to a standard, or canonical, form.

canonical mode
See line mode.

canonical processing
Processing that occurs according to a defined set of rules. Canonical processing is typically used by the shell and simple commands.

canonical XML
A standard format that defines the physical changes that can be made to the document without changing the logical representation of the document.

canvas
An area within a dashboard or workspace that users interact with to create, view, and manipulate content and data.

CAP
See Common Alerting Protocol.

capabilities as a service (CaaS)
The delivery of enterprise functions as IT solutions.

capability

  1. Specific features or characteristics of a piece of software, such as the database version.
  2. A group of functions and features that can be hidden or revealed to simplify the user interface. Capabilities can be enabled or disabled by changing preference settings, or they can be controlled through an administration interface.
  3. A function or feature that is made available by an application, tool, or product.

capability data
In OSI, a confirmed data transfer service provided by the session layer to transfer a limited amount of data outside of an activity. Capability data can be used by two peers to exchange information about their capability to start an activity.

capability exchange
A series of messages that pass between two CICS regions to establish if they can communicate using IP interconnectivity (IPIC). The capability exchange determines the security controls that are applied to the connection, the number of sessions to be made available, and resynchronizes any outstanding work if the connection has previously failed.

capability list
A list of associated resources and their corresponding privileges per user.

capability matrix
A data structure that represents the linguistic capabilities available within multiple language dictionaries, and allows searching for appropriate dictionaries.

capability type
A category, such as "database" or "hardware" that is used to group characteristics of a piece of software. For example, the "hardware" capability type includes characteristics such the BIOS vendor and BIOS version.

capable to promise (CTP)
Pertaining to the ability to fill and deliver an order in a specific time frame.

capacitor
An electronic part that permits storage of electricity.

capacity

  1. The actual number of parallel servers and workstation resources available during a specified open interval.
  2. A measure of how much volume or revenue can be handled by a specific resource.

capacity break
In logistics, a level of shipment size at which the cost changes.

capacity ceiling
The maximum number of operations that a workstation can handle simultaneously.

capacity constraint
A rule that governs the amount of items that can be awarded to a supplier. Using a capacity constraint, business can be awarded to a preferred supplier or the volume of business for a supplier can be limited.

capacity licensing
A licensing model that licenses features with a price-per-terabyte model. Licensed features are FlashCopy, and Metro Mirror and Global Mirror, and virtualization. See also FlashCopy, Metro Mirror, virtualization.

capacity on demand (CoD)
The ability of a computing system to increase or decrease its performance capacity as needed to meet fluctuations in demand.

capacity optimization
See data deduplication.

capacity organization
An organization definition for which all resource capacity information is consolidated.

capacity override
Override of typical capacity plans when additional capacity is required for specific date/time slot combinations to handle planned spikes in demand or shortfalls in resources.

capacity planner
A function that uses information about the system, such as a description of the system's workload, performance objectives, and configuration, to determine how the data processing needs of the system can best be met. The capacity planner then recommends, through the use of printed reports and graphs, ways to enhance performance, such as hardware upgrades, performance tuning, or system configuration changes.

capacity planning

  1. The process of determining the hardware and software configuration that is required to accommodate the anticipated workload on a system.
  2. The process of scheduling the resources required to perform project work.

capacity requirements planning (CRP)
The process of specifying the level of resources (facilities, equipment, and labor force size) that best supports the competitive strategy for production of the enterprise.

capacity type
A predefined value that determines the capacity units for licensing, such as online processors, configured processors, physical disks or physical memory.

Capacity Upgrade on Demand (CUoD)
The capability to permanently activate one or more inactive processors without having to restart the server or interrupt the data flow of the business, through the purchase of a permanent processor activation. This capability adds significant value by enabling a fast and economical way to add capacity for new workloads, enabling the server to adapt to unexpected performance demands. See also activation code, application provisioning, dynamic LPAR, free pool, Hardware Management Console.

CAPI

  1. See computer assisted personal interviewing.
  2. See cryptographic application programming interface.
  3. See Coherent Accelerator Processor Interface.

capital letter
An uppercase letter. See also simple letter.

capital lock (caps lock)
The keyboard function that invokes the uppercase of alphabetic characters, but does not change the response of numeric and other keys. This function is convenient for combining uppercase letters with numbers as in the string “M3C 1H7”. Capital Lock is a toggle key.

capitals lock state
A state that, if activated, will result in the generation of the capital form of all graphic characters on the keyboard for which such a form exists. National standards or usage may determine which graphic characters are affected by this state (see ISO/IEC 9995-1).

cap-M height
The average height of the uppercase characters in a font. This value is specified by the designer of a font and is usually the height of the uppercase M.

capped partition
A logical partition in a shared processor pool whose processor use cannnot exceeds its assigned processing capacity.

caps lock
See capital lock.

caption

  1. A description associated with an identifier. The caption is often used in preference to the identifier in reports to make them more comprehensible.
  2. A National Language Support-enabled text string in a policy expression that describes the policy.
  3. Text associated with, and describing, a table or figure.

capture

  1. The process by which an acquirer receives payment from the customer's financial institution and remits the payment. A "capture" is the guarantee that the funds are available and that the transfer will take place.
  2. The process by which some printers can save downloaded fonts as temporary printer-resident fonts.
  3. To digitize an image into the video memory of the M-Video Capture Adapter.
  4. In SQL replication, event publishing, and Q replication, to gather changes from a source database. These changes can come from the DB2 log or journal or from source transactions in a relational database that is not a DB2 database.

Capture control server
In SQL replication, a database or subsystem that contains the Capture control tables, which store information about registered replication source tables. The Capture program runs on the Capture control server.

capture data
The business information collected by CICS for inclusion in an event.

capture device
See packet capture appliance.

captured UCB
A virtual window into the actual unit control block (UCB). Captured UCB resides in private storage below 16 MB. All the virtual windows on the actual UCB view the same data at the same time. Only actual UCBs above 16 MB are captured. See also actual UCB, unit control block.

capture file
A file used by a communication program to capture, or record, data being transmitted from a remote system or device.

capture filter
A software filter that collects the visitor-site traffic stream data.

Capture latency
In SQL replication, an approximate difference between the time that source data was changed and the time that the Capture program made the data available to the Apply program by committing the data to a CD table. Capture latency is a subset of the end-to-end latency in a replication configuration. See also Apply latency, end-to-end latency, latency, Q Apply latency, Q Capture latency.

capture point
A point in application logic or CICS system activity where an event is generated. Capture points are defined in a capture specification.

Capture program
In SQL replication, a program that reads database log or journal records to capture changes that are made to DB2 database source tables and store them in staging tables. See also Apply program, Capture trigger, Q Capture program.

Capture schema
In SQL replication, a name that identifies the control tables that are used by an instance of the Capture program.

capture specification
A capture specification provides the information that CICS will use to detect an event within an application or in the system. The capture specification can include the capture point, capture data, and predicates for filtering and is defined in the event binding file.

capture stream
The flow of hits (request/response combinations) through a system.

capture to file
To save data into a file.

Capture trigger
In SQL replication, a mechanism that captures delete, update, or insert operations that are performed on source tables other than DB2 source tables. See also Apply program, Capture program.

carbon cap
A limit on carbon emissions.

carbon copy
A process that allows a shipper to generate a copy of an outbound data exchange transaction, which is sent to other organizations.

carbon credit
A transferrable permit that allows an organization to release one ton of carbon dioxide into the environment. The implementation of carbon credits is an attempt to reduce the amount of greenhouse gases that are being produced.

carbon emission sink
Carbon that is sequestered in forestry management, agricultural management, and other land management.

carbon footprint
The amount of greenhouse gas that a person or organization is responsible for producing. A smaller carbon footprint is associated with having less detrimental effect on the environment.

Carbon Responsibility Factor (CRF)
The percentage of a vehicle's carbon emissions that are attributable to the supply chain.

carbon sequestration
The removal and storage of carbon dioxide from the atmosphere, through natural or man-made means.

card

  1. A Wireless Markup Language (WML) document that provides user-interface and navigational settings to display content on mobile devices. See also deck.
  2. An electronic circuit board that is plugged into a slot in a system to give it added capabilities.
  3. A record of information attached to an item. An item can have multiple cards.
  4. In the Map Designer, a data object. There are two types of map cards: input and output.

card column
The column from a punch card that was used in early computers to read information. Punch cards typically contained 80 columns of 12 rows.

CardDAV
See Card Distributed Authoring and Versioning protocol.

Card Distributed Authoring and Versioning protocol (CardDAV)
An address book client or server protocol designed to allow users to access and share contact data on a server. The CardDAV protocol was developed by the IETF and was published as RFC 6352 in August 2011. CardDAV is based on WebDAV, which is based on HTTP, and it uses vCard for contact data.

card enclosure
The area in the system that contains the logic cards.

card image
A one-to-one representation of the hole patterns of a punched card; for example, a card image might be a matrix in which a one represents a punch and a zero represents the absence of a punch.

cardinality

  1. For OLAP data sources, the number of members in a hierarchy. The cardinality property for a hierarchy is used to assign solve orders to expressions.
  2. In information analysis, a measure of the number of unique values in a column.
  3. The number of rows in a database table or the number of elements in an array. See also associative array.
  4. For relational data sources, a numerical indication of the relationship between two query subjects, query items, or other model objects.
  5. The number of elements in a set.

card object
An object used in the TX Programming Interface that represents an input or output card of a map in program memory.

Card Serial Number (CSN)
A unique data item that identifies a hybrid smart card. It has no relation to the certificates installed in the smart card.

card type
A 4-digit identifier printed on the logic card.

card verification value authorization code (CVV auth code)
A separate authorization code that might be returned in addition to a credit card authorization code when a financial institution approves a credit card transaction.

career pathway
An analytics solution that helps high school and college students achieve their career aspirations by aligning the learning with the job market in a personalized way. Further, it supports employees’ career growth and transition in corporations.

care management platform
A software platform that is used to manage care across the care continuum. It can identify clients in need of care, assess their needs, establish the appropriate care plan to support their needs, and manage the care and monitor results and outcomes.

CARMA
See Continuous Association Rule Mining Algorithm.

carousel

  1. A revolving type of contained storage system that brings locations to the operator.
  2. An interface item that consists of a series of thumbnails or points with directional indicators on either side of the series that allows the user to scroll through options without presenting them all on screen simultaneously.

car probe data
Data from in-vehicle sensors, for example speed and braking information. See also contextual data.

carriage control character
A character that is used to specify a write, space, or skip operation. See also control character.

carriage control data set
A data set whose records are preceded by carriage controls.

carriage control print job
A print job whose records are preceded by carriage controls.

carriage return

  1. A keystroke generally indicating the end of a command line.
  2. The action that indicates that printing is to be continued at the left margin of the next line. A carriage return is equivalent to the carriage return of a typewriter.
  3. The movement of the printing position or display position to the first position on the same line.

carriage return character
A character that in the output stream indicates that printing should start at the beginning of the same physical line in which the carriage-return character occurred.

carrier

  1. A continuous frequency (a pulse train, or an electric or electromagnetic wave) that may be varied by a signal bearing information to be transmitted over a communication system.
  2. The backing material for labels. Labels consist of the printable medium, the adhesive, and the carrier.
  3. A transportation service provider that provides delivery and shipping services between buyers, sellers, and customers.
  4. A service provider that provides the telecom services to customers.

carrier hole
One of many holes in the side margins on continuous-forms paper. When placed on the tractor pins, the holes maintain paper alignment and registration, and control the movement of the paper.

carrier ID
A code that identifies a carrier organization in regions outside North America, which do not use a SCAC as an identifier. See also Standard Carrier Alpha Code.

carrier management system
A network management product that a communication common carrier provides to a customer; this product monitors and manages the telecommunication equipment that the communication common carrier provides for the customer's network.

carrier PRO number
A reference number that the carrier can assign to each shipment.

carrier sense
In a local area network, an ongoing activity of a data station to detect whether another station is transmitting.

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
An arbitration protocol in which multiple stations access the network without explicit coordination, avoiding contention by checking for other signals (sensing the carrier) and deferring if a signal is already present. Should two signals collide, each station detects the collision and transmits again after a random amount of time.

carrier service capacity
The unit of measure that is maintained for a carrier service item. For example, the unit of measure could be defined as truck space for delivery items.

carrier signal
A signal with a constant frequency that can be modulated to carry a data signal.

carrier strip
The half-inch side margin of continuous forms containing the carrier holes.

carrier type
A method for classifying carriers as primary, secondary, or backup carriers.

CART
See command and response token.

cart bar code
A number or bar code stuck on a cart that is used to identify a specific cart.

Cartesian product
The resulting set from performing a multiple-table query without any specified joining conditions among the tables.

carton
A standard container with specific dimensions used in both storage and shipping of loose items.

carton flow rack
Storage rack consisting of multiple lanes of gravity fed carton flow conveyors. The lanes are replenished from the rear. The material flows through the rack and is picked from the front.

cartonization
The process by which loose items from a common order or common customer are placed in standard cartons in preparation for shipment.

carton manifest
The list of cartons in a parcel carrier shipment.

cartridge eject
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the act of physically removing a tape cartridge, usually under robot control, by placing it in an output station. The software logically removes the cartridge by deleting or updating the tape volume record in the tape configuration database (TCDB). For a manual tape library, cartridge eject is the logical removal of a tape cartridge from the manual tape library by deleting or updating the tape volume record in the TCDB.

cartridge entry
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the process of logically adding a tape cartridge to the library by creating or updating the tape volume record in the tape configuration database (TCDB). The cartridge entry process includes the assignment of the cartridge to the scratch or private category in the library.

cartridge loader
A feature that allows a user to place tape cartridges in a loading rack for automatic loading. Manual loading of single tape cartridges is also possible.

Cartridge System Tape
The base tape-cartridge medium used with the IBM 3480 Magnetic Tape Subsystem and IBM 3490 Magnetic Tape Subsystem.

CAS

  1. See common analysis structure.
  2. See channel associated signaling.
  3. See configuration auditing system.
  4. See China Association for Standards.

cascade

  1. In AIX, to arrange in a series.
  2. To connect in a series or in a succession of stages so that each stage derives from or acts upon the product of the preceding stage. For instance, network controllers might be cascaded in a succession of levels in order to concentrate many more lines than a single level permits.
  3. In certain printers, the layout of procedure windows on the operator console. Each new procedure window overlays the previous one, with only the previous window's title bar in view.
  4. An operation that propagates the exact same operation to all dependant objects.

cascade delete
A process by which the DB2 database manager enforces referential constraints by deleting all descendent rows of a deleted parent row.

cascaded initiator
An intermediate node in a transaction program network that uses the two-phase commit protocol.

cascaded menu
A menu that appears from, and contains choices related to, a cascading choice in another menu.

cascaded transaction
A transaction that spans nodes and is coordinated by Resource Recovery Services (RRS). cascaded multisystem transaction. A transaction that spans systems in a sysplex and is coordinated by Resource Recovery Services (RRS).

cascaded UR family
A collection of nodes consisting of a unit of recovery (UR) and its descendants.

cascading choice
A choice on a menu that, when selected, presents another menu with additional related choices.

cascading delete
The process of deleting rows from a child table when the foreign key is deleted from the parent table. When any rows are deleted from the primary key column of a table, cascading deletes, if enabled, delete identical information from any foreign-key column in a related table.

cascading menu
A submenu of related choices that is invoked when the parent item is selected.

cascading permission
A permission of a parent folder in the content repository that has been propagated to its child objects.

cascading prompt
A prompt that uses values from a previous prompt to filter the values in the current prompt or pick list.

cascading replication
A replication topology in which there are multiple tiers of servers. A peer/master server replicates to a small set of read-only servers which in turn replicate to other servers. Such a topology off-loads replication work from the master servers.

cascading resource
A resource that can be taken over by more than one node. A takeover priority is assigned to each configured cluster resource group on a per-node basis. In the event of a takeover, the node with the highest priority acquires the resource group. If that node is unavailable, the node with the next-highest priority acquires the resource group, and so on.

Cascading Style Sheets (CSS)
A language that defines a hierarchical set of style rules for controlling the rendering of HTML or XML files in browsers, viewers, or in print.

Cascading Style Sheets positioning (CSS-P)
Use of Cascading Style Sheets to position web page elements using pixel locations or locations relative to other elements.

cascading switches
Switches that are interconnected to build large fabrics.

case

  1. The information that is contained within a database that pertains to a particular investigation.
  2. A container that holds a specified quantity of identical items (SKU) as packaged by a vendor. Cases are identified by license plate number and are generally put away into storage, in their original condition until picked.
  3. A group of related activities that address a specific business situation. The user or predefined conditions, instead of a defined flow, determines the sequence in which activities are performed. See also case type, process.
  4. The basic unit of analysis. In a data set based on a simple survey, a case generally corresponds to a respondent.

CASE
See Computer Assisted Software Engineering.

case allowance
A discount of a fixed dollar amount on the price of a case of a product. For example, the manufacturer offers a reduction in the price per case of product in order to offload inventory quickly.

case analytics tool
A tool that can be used to monitor and manage daily business operations. The tools can also provide historical trend information that can be used to adjust future operations as needed.

case clause
In a C or C++ switch statement, a CASE label followed by any number of statements.

case code
See factory carton code.

case cube
The volume of a product when packed in a case form.

case data
The data that is recorded for each case. In a market research survey, the case data stores the answers given by each respondent.

Case Data Model (CDM)
A model that defines access to the case data that is stored in a standard database or in a proprietary format.

case data source component (CDSC)
A data source component (DSC) that exposes case data to the Provider.

case document
A document that is associated with a case and made available from the Documents tab.

CASE expression
An expression that is selected based on the evaluation of one or more conditions.

case folder
A folder that holds information pertaining to a case. The case folder stores case related information obtained from search queries. A case folder contains the tasks, history, and comments that are associated with the case.

case history
The history of a case that shows information such as creation dates, comments, and so forth. Event log data is included in the case history, which uses the same security as is applied to case instances.

case ID
A unique identifier for a case or carton stored in the warehouse.

case identifier
A predefined property assigned to a case. The case identifier is displayed at the top of the Case Information widget with a link to open the case in the Case Details page. For example, a case type named Credit Application with a unique identifier of EXPL_CreditApplication might have a case identifier of EXPL_CreditApplication_00000010001.

case label

  1. The word case followed by a constant expression and a colon. When the selector is evaluated to the value of the constant expression, the statements following the case label are processed.
  2. In Pascal, a value or range of values that comes before a statement in a CASE statement branch. When the selector is evaluated to the value of a CASE label, the statement following the case label is processed.

case list cost
The manufacturer's cost of a product in case form.

case management master group
A group that controls access to a case management object store.

case operation
An operation that is used to perform a case-related action like creating a case by using a specified case type or adding a comment to a current case.

case pack
The number of units of a product when packed in case form.

case pick
The process of picking unbroken cases from bulk case storage for shipment.

case sensitive
Pertaining to the ability to distinguish between uppercase and lowercase letters.

case-sensitive search
A search in which a result will be found for the search string only if the particular combination of uppercase and lowercase letters are exactly matched.

case status
A label that is applied to a case by the Data Collection system that indicates its current level of completion.

case synchronizer utility
A utility that can be run to update existing instances to match the changes that were made after modifying a solution after it is deployed.

case title property
The specific title property that can be controlled on an individual case type. By default, the case title property is Case Identifier.

case type

  1. See process.
  2. The definition of the activities that must be completed to address a specific type of business situation. For each activity, the case type specifies the document types that are required to support the activity, the user interface in the activity, and the teams that must complete the activity. Case types make up a case. See also case.

case volume lift percentage
The percentage of cases that will be sold as a result of a promotion.

case weight (CW)
In cultural sorting, the combined weight value of case, subscripting, superscripting, fractions, and other factors. For example, the lowercase letter a precedes the uppercase letter A, and middle Arabic shapes precede final Arabic shapes. See also alphanumeric weight, diacritical weight, indifferent weight, level 3, mark weight, special weight.

cash-and-carry
A delivery method by which orders are fulfilled directly from a store and paid in full at the time of transaction. Cash-and-carry transactions require no additional processing.

cashback
A service that provides customers with the ability to receive cash in addition to the goods that they purchased in a store using an alternate payment method. The total amount of the transaction, which includes the cost of the purchased goods and the amount of the cash received, is debited from the customer's account. For example, a customer might charge $37 to their credit card for a $17 item in order to get that item and $20 back from the store.

CASI
See computer assisted self-interviewing.

CA-signed certificate
A certificate that is signed using a key maintained by a certificate authority. Before issuing a certificate, the certificate authority evaluates a certificate requestor to determine that the requestor is the certificate holder referenced in the certificate.

CASL
See Canadian Anti-Spam Legislation.

CAS processor
See common analysis structure processor.

cassette
In cut-sheet printers, a removable container for a supply of paper.

cast

  1. In programming languages, an expression that converts the value of its operand to a specified type.
  2. A database object and an operator for converting data from one data type to another. Built-in data types have built-in casts to compatible data types within database server. See also explicit cast, implicit cast, user-defined cast.

cast expression
An expression that converts or reinterprets its operand.

cast function
A function that is used to convert instances of a source data type into instances of a different target data type. In general, a cast function has the name of the target data type and has one single argument whose type is the source data type. Its return type is the target data type.

casting
Converting a value with a given data type to a different data type or to the same data type with a different length, precision or scale. See also downcasting, upcasting.

CAS tone
See Customer Premise Equipment Alerting Signal tone.

cast operator
An operator that is used for explicit type conversions.

castout
The process of writing changed pages from a group buffer pool to disk.

castout owner
The DB2 member that is responsible for casting out a particular page set or partition.

cast support function
A function that is used to implement an implicit or explicit cast by performing the necessary operations for conversion between two data types.

casual connection
In an APPN network, a connection between an end node and a network node with different network identifiers.

CAT
See Customer Analysis Tool.

catalog

  1. A container for one or more offerings that a user can request.
  2. A container that stores items. An item can belong to only one catalog. Each catalog must be associated with at least one hierarchy, the primary hierarchy, and can be associated with one or more secondary hierarchies. See also item.
  3. A collection of apps.
  4. A repository for storing specifications for builds, reference structures, connections, and other components.
  5. A directory of files and libraries, with reference to their locations.
  6. A data set that contains information about other data sets.
  7. A collection of services.
  8. To enter information about a data set or a library into a catalog.
  9. See process library.
  10. The highest level of the category hierarchy. All of the groupings that exist below the catalog are referred to as categories.
  11. To specify the record class and file plan location when declaring a record.
  12. A container that, depending on the container type, holds processes, data, resources, organizations, or reports in the project tree.
  13. A collection of tables and views that contains descriptions of objects such as tables, views, and indexes.
  14. A selection of wireless devices and plans that are configured in the application and made available for purchase.
  15. A group of connected external identity repositories. See also store.

catalog asset store
A collection of catalog artifacts that creates a virtual catalog. See also asset store, storefront asset store.

catalog cleanup
A process that deletes entries for which volumes are no longer available; catalog cleanup also allows deletion of a catalog even though it is not empty.

catalog connector
A catalog entry, either a user catalog entry or a catalog connector entry, in the master catalog that points to a user catalog's volume (that is, it contains the volume serial number of the direct access volume that contains the user catalog).

cataloged data set
A data set that is represented in an index or hierarchy of indexes that provide the means for locating it.

cataloged procedure
A set of job control language (JCL) statements that has been placed in a library and that is retrievable by name.

catalog entry
An object in an online catalog. An entry has a name, description, list price, and other details. The entry can be as simple as a SKU; it may also be a product that is automatically broken down into its component items such as a bundle or package. See also list price.

catalog filter
A filter that controls product entitlement by dividing catalogs into subsets as defined by the business owner. Catalog filters can also be used as one of the price rules conditions when determining the prices for the set of catalog entries that a set of customers are entitled to.

Catalog Filter and Pricing tool
A Management Center feature that is used to create and manage catalog filters, price lists, and price rules.

catalog group
A collection of one or more catalog entries or catalog groups which create a navigational hierarchy for an online catalog.

catalog index
A searchable index file that is built from the item data in an order management database. This index provides fast search capability on catalog items.

catalog member
The member in an installation that acts as an index to the information stored in the container server members and supports the data grid.

catalog node
See catalog partition.

catalog organization
An organization definition for which an item master is defined.

catalog partition
In a partitioned database environment, the database partition where the catalog tables for the database are stored. Each database in a partitioned database environment can have its catalog partition on a different database partition server. The catalog partition for a database is automatically created on the database partition server where the CREATE DATABASE command is run.

catalog recovery area (CRA)
An entry-sequenced data set (ESDS) that exists on each volume owned by a recoverable catalog, including the volume on which the catalog resides. The CRA contains copies of the catalog's records and can be used to recover a damaged catalog.

catalog request
One or more offerings that have been ordered by a service requester. Catalog requests are fulfilled via the activities of the Service Catalog approval workflow.

catalog rule
A rule that pertains to catalog management.

Catalog Search Interface
In z/OS, a particular application programming interface (API) that allows programs written in assembler or a high-level language to read information from a catalog.

catalog server
One of the four member types in an installation, the catalog server member acts as an index to the information stored in the container server members and supports the data grid.

catalog service
A service that controls placement of shards and discovers and monitors the health of containers.

catalog service domain
A highly available collection of catalog service processes.

Catalogs tool
A Management Center feature that can be used to manage catalogs, categories, catalog entries, merchandising associations, product attributes and attachments in your store.

catalog table
A table that is automatically created in the DB2 database catalog when a database is created. Catalog tables contain information about a database and its objects. See also catalog view.

catalog view

  1. In DB2 for Linux, UNIX, and Windows, a SYSCAT or SYSSTAT view on the catalog table.
  2. One of a set of views automatically created when a database is created. Catalog views contain information about the database and the objects in that database. Examples of information about the database are definitions of database objects and information about the authority that users have on these objects. See also catalog table.

catch block
A block associated with a try block that receives control when an exception matching its argument is thrown. See also try block.

catcher
A server that service personnel use to collect and retain status data that other machines, such as the TotalStorage Enterprise Storage Server (ESS), send to it. See also catcher telephone number.

catcher telephone number
The telephone number that connects the ESS to the support-catcher server and enables the ESS to receive a trace or dump package. See also catcher, Remote Technical Assistance and Information Network.

catching message intermediate event
An intermediate event that is triggered when a specific message is received. See also intermediate event.

catch-up
In a remote journal network, the process of replicating journal entries that existed in the journal receivers of the source journal before the remote journal was activated.

catch-up mount
A local mount that z/OS UNIX automatically issues to every other system's physical file system that is running sysplex-aware for that mode (read-write or read-only) when a file system mount is successful on a system in a shared file system environment.

catch-up processing
In an RSR environment, the process by which tracked log data is used to make all recoverable resources (for example, shadow databases) current with those resources on the active IMS.

catchup state
In high availability disaster recovery, a state in which the standby database might not have applied all logged operations that occurred on the primary database. In this state, the standby database retrieves and applies previously generated log data to synchronize with the primary database. There are two types of catchup states: local and remote.

categorical question
A question that has a limited number of categories with a choice of possible answers. Categorical questions can be single response or multiple response.

categorical response
A response that has a limited number of categories that represent the possible responses. Categorical responses can be single response or multiple response.

categorical variable
A variable that has a limited number of distinct values or categories, such as a variable that is based on a question that has a predefined set of answers. Categorical variables can be single response or multiple response.

category

  1. A type class that is used to organize types in a type tree in the Type Designer. Categories organize types that have common properties.
  2. An optional grouping of messages that are related in some way. For example, messages that relate to a particular application might be included in a single category. See also message.
  3. A word, phrase, or number used to group documents in a view.
  4. A classification of an item. Hierarchies are made up of categories and items. Items in a catalog can be associated to one or more categories from the specifications of the catalog. Items can also be unassigned, which is their default state, which means they are not in any category yet. Every hierarchy has exactly one root category. Every category can have any number of additional categories within it, called sub-categories. See also container, hierarchy.
  5. A property that is set on an element of the business object model (BOM) and can be applied to business classes and filtered in business rules. This property allows the user to specify whether a business class and its members are visible in a rule.
  6. A group within a system of classification whose contents share similar properties. See also category page.
  7. A logical subset of volumes in a tape library. A category can be assigned by the library manager (for example, the insert category) or by the software (such as, the private or scratch categories).
  8. One possible answer in a set of answers that are defined in the category list of a categorical or grid question.
  9. A set of catalog items in a number of different hierarchical and searchable groupings.
  10. A set of items that are grouped according to a specific description or classification. Categories can be different levels of information within a dimension.
  11. An area of spend. Categories can then each have subcategories. For example, hardware, software, IT services, and telecommunications are all subcategories within the IT category.
  12. A closed-ended response to a question or item in a shared list.
  13. A word or phrase that classifies and organizes terms in the business glossary. A category can contain other categories, and it can also contain terms. In addition, a category can reference terms that it does not contain. See also business glossary.
  14. A set of catalog items in a number of different hierarchical and searchable groupings.
  15. A classification of elements for documentation or analyses.
  16. A container that groups a set of related records within a file plan.
  17. The recommended security specifications needed for both the CICS transaction definitions and the corresponding RACF profiles.
  18. A container used in a structure diagram to group elements based on a shared attribute or quality.

category 1 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are never associated with a terminal: that is, they are for CICS internal use only and should not be invoked from a user terminal. For this reason, CICS does not perform any security checks when it initiates transactions in this category for its own use.

category 2 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either initiated by the terminal user or are associated with a terminal. You should restrict authorization to initiate these transactions to user IDs belonging to specific RACF groups.

category 3 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either invoked by the terminal user or associated with a terminal. All CICS users, whether they are signed on or not, require access to transactions in this category. For this reason, they are exempt from any security checks and CICS permits any terminal user to initiate these transactions. Examples of category 3 transactions are CESN and CESF, to sign on and off, respectively.

category attribute
An attribute instance on a category. The attribute is defined in the specification of the owning hierarchy or by a secondary specification associated to that category. See also attribute instance.

category bag
A container for keyed reference pairs used to aid discovery of a published web service. Each category bag includes a name and the value of a category to which the published item belongs.

category code
A value that uniquely identifies every category within a dimension. See also member unique name.

category count
A measure that records the number of unique, non-zero and non-missing values for the categories in the dimension and level specified by the user.

category distribution
The placement of categories among the columns of a category list that is displayed in more than one column or row.

category field
An additional field that is created by a buyer user to gather more information about categories and items. A category property is specific to the category for which it is created and applies only to items of that category.

category filter
A filter that is set on a business rule and removes the business element to which a category was attached from the completion menu.

category list
A list of predefined answers that are in a categorical or grid question. The respondent selects the answers to the question from this list. For example, a list of brand names is a category list.

category management

  1. The process of determining the price, promotions, assortment, and the shelving of a product category.
  2. A systematic approach that a sourcing team uses to allocate and then distribute spend. It involves facilitating solutions that support both category needs and strategic business objectives.

category manager

  1. A person responsible for all merchandising activities for a category of products, including price, promotion, placement, and assortment.
  2. A defined role in WebSphere Commerce that manages the category hierarchy by creating, modifying, and deleting categories. The category hierarchy organizes products or services offered by the store. The category manager also manages products, expected inventory records, vendor information, inventory, and return reasons.

category page
A web page in an online store that displays product categories. Category pages connect customers to child category pages or to products that belong to the selected category. See also category, child category.

category plan
All promotions for one category that intersect in time with a specified date range.

category recommendation
A recommendation based on the category of a target product.

category replication
The answer portion of categorical, grid, and numeric grid Looks. The category replication controls which category rows in a Look are repeated when the Look is applied to a question.

category schema
A reusable group of categories and subcategories. Assets can be organized in repositories according to their category schemas.

category set
A subset of the categories in a dimension, either from a single level or from different levels in the same dimension. See also set.

category-specific item attribute
An attribute instance that applies to an item because of the presence of that item in a given category. A secondary specification with additional attributes is applied to that category, and all items in that category gain those extra fields. See also attribute instance.

category tree

  1. A hierarchy of categories. See also taxonomy.
  2. See hierarchy.

category viewer
The portion (right pane) of the Categories diagram that shows the category hierarchy of the selected dimension and provides a mechanism for manipulating the categories.

cathode ray tube (CRT)
A vacuum tube in which a beam of electrons can be moved to draw lines or to form characters or symbols on its luminescent screen.

CATI
See computer assisted telephone interviewing.

cause code
In X.25 communications, a 1-byte code included in clear-indication and reset-indication packets that indicates the origin of the packet and the reason for sending it.

CAW

  1. See channel address word.
  2. See cube adjusted weight.

CBC
See cipher block chaining.

CBD
See component-based development.

CBIC
See control blocks in common.

CBJ
See Class Broker for Java.

CBM

  1. See component business modeling.
  2. See component business model.

CBPDO
See Custom-built Product Delivery Option.

CBR

  1. See content-based retrieval.
  2. See content based routing.

CBS
See composite business service.

CBX
See computerized branch exchange.

CC
See change control.

CC&CA
See Corporate Citizenship & Corporate Affairs.

CCA
See Common Cryptographic Architecture.

C-CAA
See C/370 common anchor area.

CCB

  1. See command control block.
  2. See conversation control block.
  3. See connection control block.

CC-compatible SnapShot
See concurrent copy-compatible snapshot.

CCCS
See Common Customs Classification System.

CCDT
See client channel definition table.

CCD table
See consistent-change-data table.

CCF

  1. See channel control function.
  2. See Common Connector Framework.

CCI

  1. See common client interface.
  2. See Common Console Interface.

CCIN
See custom card identification number.

CCITT
See Comité consultatif international télégraphique et téléphonique.

CCL
See common communication layer.

CCM
See change and configuration management.

CCOW
See Clinical Context Object Workgroup.

CCP
See Configuration Control Program.

CCR
See channel command retry.

CCRA
See Cloud Computing Reference Architecture.

CCS

  1. See coded character set.
  2. See Common Communications Support.
  3. See console communication service.
  4. See common channel signaling.

CCSID
See coded character set identifier.

CCSID 65534
See coded character set identifier 65534.

CCSID 65535
See coded character set identifier 65535.

CCSID resource
A representation of the various elements associated with a CCSID in a system in a machine readable form.

CCSID resource repository
An organized collection of CCSID resources that are maintained by a service provider in a system.

CCTL

  1. See coordinator control subsystem.
  2. See coordinator controller.

CCTV
See closed-circuit television.

CCU
See central control unit.

CCW
See channel command word.

CD

  1. See continuous delivery.
  2. See compact disc.

CDA
See Common Data Administration.

CDB

  1. See conversation data block.
  2. See communications database.

CDD

  1. See common data set descriptor record.
  2. See customization definition document.

CDE

  1. See Common Desktop Environment.
  2. See component descriptor editor.

CDF
See channel definition file.

CDI
See Contexts and Dependency Injection.

CDL
See configuration deviation list.

CDLC
See Channel Data Link Control protocol.

CDLC protocol
See Channel Data Link Control protocol.

CDLI
See Common Data Link Interface.

CDM
See Case Data Model.

CDMA
See code division multiple access.

CDMF
See Commercial Data Masking Facility.

CDNM session
See cross-domain network manager session.

CDP

  1. See collateral damage potential.
  2. See Continuous Data Protection.

CDPD
See cellular digital packet data.

CDR

  1. See call detail record.
  2. See critical design review.

CD-R
See compact disc recordable.

CDRA
See Character Data Representation Architecture.

CDRFS
See CD-ROM file system.

CDRM
See cross-domain resource manager.

CD-ROM
See compact-disc read-only memory.

CD-ROM drive
High-capacity read-only memory in the form of an optically read compact disc.

CD-ROM file system (CDRFS)
An implementation of a read-only local file system that can be stored on CD-ROM media, write-protected CD-RW media, or DVD-ROM media.

CDRSC
See cross-domain resource.

CDS

  1. See Cell Directory Service.
  2. See central directory server.
  3. See couple data set.
  4. See control data set.

CDSA
See CICS dynamic storage area.

CDSC
See case data source component.

CDS clerk
The software that provides an interface between client applications and Cell Directory Service (CDS) servers.

CDS control program (CDSCP)
In the Distributed Computing Environment (DCE), a program that Cell Directory Service (CDS) administrators use to control CDS servers and clerks.

CDSCP
See CDS control program.

CDSQ serialization
A technique that serializes DFSMShsm control data sets (CDSs) with a global enqueue product, such as global resource serialization (GRS).

CDSR serialization
A technique that serializes DFSMShsm control data sets (CDSs) with volume reserves.

CDSTL
See connect data set to line.

CDT

  1. See common development test.
  2. See class descriptor table.

CD table
See change-data table.

CEB
See conditional end bracket.

CEC
See central electronics complex.

CECP
See country extended code page.

CEEDUMP
A dump of the run-time environment for Language Environment and the member language libraries. Sections of the dump are selectively included, depending on options specified on the dump invocation. This is not a dump of the full address space, but a dump of storage and control blocks that Language Environment and its members control.

CEE switch
See Converged Enhanced Ethernet switch.

CEI
See Common Event Infrastructure.

CEI event
An event generated over the Common Event Infrastructure (CEI) and logged in a CEI data store.

ceiling
The smallest integer that is greater than the floating-point number under consideration. For example, the ceiling of 3.5 is 4.

ceiling price
The cut-off value entered by the supplier for a bid in forward auction.

ceiling rate
The maximum price allowed for a product or a service.

CEI target
An application server or server cluster where the Common Event Infrastructure (CEI) server is enabled.

CEL
See Command Execution Language.

cell

  1. The rectangular juncture of a horizontal row and a vertical column. Examples include the cells of an electronic spreadsheet and the cells utilized by an XmRowColumn widget in an AIXwindows graphic interface.
  2. A group of WebSphere Application Server nodes in a single administrative domain that is controlled by a deployment manager application.
  3. One or more processes that each host runtime components. Each has one or more named core groups.
  4. A logical grouping of users, computers, data, and other resources that share either a common purpose or a common level of trust.
  5. In asynchronous transfer mode (ATM), a medium access control (MAC) protocol data unit (PDU) of fixed size.
  6. A group of managed processes that are federated to the same deployment manager and can include high-availability core groups.
  7. In mobile computing, an area of radio coverage that is transmitted from a base station. See also base station, radio.
  8. A subsection of a road link. A link can be divided into a series of cells, for example to select the range of traffic cameras. A cell can terminate at a node or at the next cell. See also link, node.
  9. A list of identifiers that is the result of data processing and manipulation. For example, a Select process can generate an output cell consisting of males between the ages of 25 and 34.
  10. In a multidimensional clustering table, a unique combination of dimension values. Physically, a cell is made up of blocks of pages whose records all share the same values for each dimension column.
  11. A single cartridge location within an Automated Tape Library Dataserver (ATLDS). See also rack number, slot.

cell code
An identifier for each segment in a campaign flowchart or in the target cell spreadsheet.

cell cube
In MSS, a block of 32 cartridge cells, four X addresses by four Y addresses by two Z addresses.

Cell Directory Service (CDS)
A Distributed Computing Environment (DCE) component that manages a database of information about the resources within a cell. See also Global Directory Service.

cell phone
A portable telephone that operates on a cellular radio network instead of a traditional wired network over a fiber optic network or the Internet. See also mobile phone.

cell-relative name
See local name.

cell-scoped binding
A binding scope where the binding is not specific to, and not associated with any node or server. This type of name binding is created under the persistent root context of a cell.

cell security
The access control level assigned to a single cell in a cube.

cell tower
See base station.

cellular digital packet data (CDPD)
A standard for transmitting data over a cellular network that places the data in digital electronic envelopes and sends it at high speed through underused radio channels or during pauses in cellular phone conversations. See also packet switching.

cell UUID
A Universally Unique Identifier for a cell that is based on the unique system ID of the workstation and a time stamp.

Celsius
Pertaining to a thermometric scale at which water boils at 100 degrees and freezes at 0 degrees in standard atmospheric pressure.

CEM
See commercial electronic message.

CEMA
See Central Europe, Middle East, and Africa.

center cell
The only cell in a star topology with the ability to make autonomic decisions.

Center for the Information of Industry data format (CII data format)
Data format that provides the Japanese syntax definition for EDI messages within Sterling B2B Integrator.

centering identifier
The category item with which all other identifiers have interacted. The centering identifier is the central item in an investigation.

center of competency (COC)

centimeter (cm)
One hundredth of a meter; 0.39 inch.

central control unit (CCU)
The communication controller hardware unit that contains the circuits and data flow paths needed to execute instructions and to control controller storage and the attached adapters.

central data warehouse
The component of Tivoli Enterprise Data Warehouse that contains the cleansed historical data. Data in the central data warehouse is derived from operational data, although operational data is not stored directly in the central data warehouse.

central data warehouse ETL
In Tivoli Enterprise Data Warehouse, the extract, transform, and load (ETL) process that reads the data from the operational data stores of the application that collects it (for example, a log file, a Tivoli Inventory repository, or a Tivoli Enterprise Console database), verifies the data, makes the data conform to the Tivoli Enterprise Data Warehouse schema, and places the data into the central data warehouse. See also data mart ETL.

central directory
A repository for storing resource location information centrally registered by network nodes or cached as the result of network searches.

central directory architecture
Directory architecture in a Domino domain in which some servers store configuration directories and use primary Domino Directories on remote servers for lookups.

central directory server (CDS)
A network node that provides a repository for information on network resource locations. It also reduces the number of network searches by providing a focal point for queries and broadcast searches, and by storing the results of network searches to avoid later broadcasts for the same information.

central electronic complex
See central processor complex.

central electronics complex (CEC)
See central processor complex.

Central Europe, Middle East, and Africa (CEMA)
For organizational, legal, or administrative purposes, the region comprising Bulgaria, Croatia, Czech Republic, Egypt, Hungary, Pakistan, Poland, Romania, Russia, Serbia and Montenegro, Slovakia, Slovenia, and IBM Middle East. See also Northeast Europe.

Central File Management (CFM)
A central location that receives files for translation from development and, using Translation Workbench (TWB), creates project folders, performs English-to-English word count, and helps identify the appropriate TM translation memories.

central inventory team (CIT)

centrality
The relative importance of one entity compared to other entities in social network analysis, as determined by its relationships. See also authority, betweenness, closeness, degree, eigenvector, hub, social network analysis.

centralized control
A type of control in which in which all the primary station functions of the data link are centralized in one data station. See also independent control.

centralized directory service
In OSI, a method of organizing directory services so that one node provides directory service for other nodes. OSI Communications Subsystem supports only centralized directory service.

centralized installation manager
A component that remotely installs and uninstalls product and maintenance packages in server environments.

centralized processing
In CICS, processing in which the application is processed on a central processor, which users access using a terminal.

centrally managed service
A pureScale service that is fully managed by IBM Systems Director.

Central Message Store (CMS)
A mailbox system that processes documents and controls services such as messaging, archiving and queuing.

central office (CO)
A telephone switching system that connects customer-premise business and subscriber lines to other customer lines or trunks, both locally or remotely. A central office is located on the edge of the telephone service provider's network, rather than on a customer's premises.

central processing unit (CPU)

  1. See processor.
  2. See workstation.

central processor (CP)
The part of the computer that contains the sequencing and processing facilities for instruction execution, initial program load, and other machine operations.

central processor complex (CPC)
A physical collection of hardware that consists of main storage, one or more central processors, timers, and channels.

central registry
A server's database that logs requests for licenses, upgrades for licenses, and journals all license activity in a tamper-proof auditable file. The central registry is a component of the License Use Management network topology.

central resource registration
A process in which an APPN network node sends information about itself and its client end nodes to a central directory server.

central scheduler
A function that permits an administrator to schedule client operations and administrative commands. The operations can be scheduled to occur periodically or on a specific date. See also administrative command schedule, client schedule.

central service
In MERVA, a service that uses resources that either require serialization of access, or are only available in the MERVA nucleus.

central site
In a network of systems, the system licensed to receive program temporary fixes (PTFs) and distribution media from IBM. This system is also used to provide problem handling support to other systems in a network. In a distributed data processing network, the central site is usually defined as the focal point in a communications network for alerts, application design, and remote system management tasks such as problem management.

central site control facility (CSCF)
In Tivoli NetView for OS/390, NetView for VM, and NetView for VSE, a function that allows a network operator to run the test facilities of the IBM 3172 Nways Interconnect Controller and the IBM 3174 Establishment Controller remotely from the NetView console.

central storage
Storage that is an integral part of the processor unit. Central storage includes both main storage and the hardware system area. UNIX-experienced users refer to central storage as memory.

central system
A single system that handles all of the communications to an endpoint system.

centroid
A virtual point in an organizational unit hierarchy that is geometrically collocated close to the area of the hierarchy where the presence of a certain entitlement is a concentrated.

CEP
See complex event processing.

CEPT

  1. See Conference Europeenne des Administrations des Postes et Telecommunications.
  2. See Commission of European Post and Telegraph.

CERT/CC
See CERT Coordination Center.

CERT Coordination Center (CERT/CC)
A major reporting center for Internet security problems. Staff members provide technical advice and coordinate responses to security compromises, identify trends in intruder activity, work with other security experts to identify solutions to security problems, and disseminate information to the broad community. The CERT/CC also analyzes product vulnerabilities, publishes technical documents, and presents training courses.

certificate
A digital document that binds a public key to the identity of the certificate owner, thereby enabling the certificate owner to be authenticated. A certificate is issued by a certificate authority and is digitally signed by that authority. See also certificate authority, certificate signing request, SSL server authentication.

certificate alias
A group that contains one or two certificates. If there are two certificates in the alias, one is the primary and one is the backup, based on the earlier effective from date.

certificate authority (CA)

  1. A trusted third-party organization or company that issues the digital certificates. The certificate authority typically verifies the identity of the individuals who are granted the unique certificate. See also certificate, Globus certificate service, intermediate certificate, Secure Sockets Layer, SSL server authentication, trusted root.
  2. A component that issues certificates to each computer on which components are installed.

certificate authority certificate (CA certificate)

  1. A digital certificate that is issued by a certificate authority. The CA verifies trusted certificates for trusted roots.
  2. In computer security, a digital document that identifies an organization that issues certificates. See also digital certificate.

certificate authority enterprise application
A company application that provides certificates and private keys for its client applications.

certificate chain
A path that traces certificates from a branch in the hierarchy to the primary CA certificate.

certificate filter
A filter that defines a set of similar distinguished name certificate attributes for a group of certificates in an X.509 source user registry.

certificate name filter
A general resource profile that maps multiple user IDs to a digital certificate in order to simplify administration of certificates, conserve storage space in the RACF database, maintain accountability, or maintain access control granularity.

Certificate of Origin
A document used in international trade to authenticate the country of origin of the merchandise being shipped.

certificate revocation list (CRL)
A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a Secure Sockets Layer (SSL) handshake to ensure that the certificates involved have not been revoked.

certificate signing request (CSR)
An electronic message that an organization sends to a certificate authority (CA) to obtain a certificate. The request includes a public key and is signed with a private key; the CA returns the certificate after signing with its own private key. See also certificate, keystore.

certificate store

  1. A collection of certificates.
  2. The Windows name for a key repository.

certification
A process that creates special signed messages called certificates, which state that a particular public key is associated with a particular user or server name.

certification campaign
See attestation campaign.

certifier ID
A file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.

certifier ID file
A file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.

CES

  1. See Complex Engagement Services.
  2. See connection event sequence.

CEVAs
See content-enabled vertical applications.

CF

  1. See coupling facility.
  2. See cluster caching facility.

CF cache structure
See coupling facility cache structure.

CFIOP
See combined function IOP.

CF key
See command function key.

CF lock structure
See coupling facility lock structure.

CFM

  1. See Central File Management.
  2. See Configuration File Manager.

CF message
See confirmed message.

CFRM
See coupling facility resource management.

CFRM policy
See coupling facility resource management policy.

CFS
See continuous-forms stacker.

CFSTRUCT
An IBM MQ object used to describe the queue manager's use of a Coupling Facility list structure

CGCSGID
See coded graphic character set global identifier.

CGI
See Common Gateway Interface.

CGI program
See CGI script.

CGI script
A computer program that runs on a web server and uses the Common Gateway Interface (CGI) to perform tasks that are not usually done by a web server (for example, database access and form processing).

CGM
See Computer Graphics Metafile.

CGU
See character generator utility.

chad
The material separated from a data medium when punching a hole or from the carrier holes in continuous forms.

CHAID
See Chi-squared Automatic Interaction Detector algorithm.

chain

  1. In DFU, a way to change from one display format to another after the user signals that the first display format was completed.
  2. In RPG, an operation code that reads input records identified by specified relative record numbers or keys.
  3. A group of request units delimited by begin-chain and end-chain. Responses are always single-unit chains.
  4. The name of a channel framework connection that contains an endpoint definition.
  5. A group of logically linked records that are transferred over a communications line.
  6. A set of enclosures that are attached to provide redundant access to the drives inside the enclosures. Each control enclosure can have one or more chains.
  7. A branded collection of stores with a single owner.

chain assembly
In CICS intercommunication, a grouping of one or more request units to satisfy a single request. Instead of an input request being satisfied by one RU at a time until the chain is complete, the whole chain is assembled and sent to the CICS application satisfying just one request. This ensures that the integrity of the whole chain is known before it is presented to the application program.

chain auditor
A blockchain role that has permission to interrogate transactions and other actions affecting the blockchain system.

chaincode
Executable code that is deployed on a blockchain network, where it is executed and validated by chain validators together during the consensus process. Developers can use chaincodes to interact with a network's shared ledger, develop business contracts, asset definitions, and collectively-managed decentralized applications.

chained order
An order that must finish its fulfillment process before its parent order can be considered fulfilled. An order is chained when a parent order must communicate some portion of the order fulfillment execution to a third party.

chain erase
The process of erasing a snapshot chain.

chaining

  1. In the Distributed Computing Environment (DCE), a mode of interaction optionally used by a directory system agent (DSA) that cannot perform an operation by itself. The DSA chains by invoking the operation in another DSA and then relaying the outcome to the original requester.
  2. A method of storing records in which each record belongs to a list or group of records and has a linking field for tracing the chain.

chain member
A blockchain role that helps maintain the integrity of a network, but does not participate in the validation process.

chain transactor
A blockchain role that has permission to create transactions and query network data.

chain validator
A blockchain role that owns a stake of a chain network. Each chain validator can decide whether a transaction is valid and can interrogate all transactions sent to their chain.

challenge
A request for certain information to a system. The information, which is sent back to the server in response to this request, is necessary for client authentication.

challenge handler
A client-side component that issues a sequence of challenges on the server side and responds on the client side. See also authenticator.

Challenge Handshake Authentication Protocol (CHAP)
An authentication protocol that protects against eavesdropping by encrypting the user name and password. See also Password Authentication Protocol.

challenge-response authentication
An authentication method that requires users to respond to a prompt by providing information to verify their identity when they log in to the system. For example, when users forget their password, they are prompted (challenged) with a question to which they must provide an answer (response) in order to either receive a new password or receive a hint for specifying the correct password. See also knowledge-based authentication.

chameleon schema
A schema that inherits a target namespace from a schema that includes the chameleon schema.

change

  1. A function or mode that enables a user to modify a specified character string in previously entered text.
  2. An artifact that represents a generalized notion of a development work product, such as a task, defect report, or enhancement request. See also initiative.

changeable media origin
In printers, the ability to accept a command that changes the point on the medium where printing begins.

change accumulation

  1. The process of merging log data sets and reducing the information they contain to the minimum required to perform recovery on a particular database or group of databases.
  2. The process of creating a compacted version of one or more IMS log data sets by eliminating records not related to recovery, and by merging multiple changes to a single segment into a single change.

change aggregate table
In SQL replication, a type of replication target table that contains data aggregations that are based on the contents of a CD table. See also base aggregate table.

change and configuration management (CCM)
A systematic approach to establish and maintain the consistent performance of a system or product throughout its lifecycle, and to effectively manage changes in that product or system.

change authority
An object authority that allows a user to perform all operations on the object except those limited to the owner or controlled by object existence authority, object management authority, object alter authority, and object reference authority. The user can add, change, and delete entries in an object, or read the contents of an entry in the object. Change authority combines object operational authority and all the data authorities.

change bar

  1. A character used in the left margin to indicate that a document line is changed.
  2. An indicator that displays when an object was last changed.

change basis version
The version of the server partition that changes were made against.

change-capture replication
The process of capturing changes that are made to a replication source table and applying them to a replication target table. See also full refresh.

change control (CC)
The use of change management commands for the installation or removal of software or data.

change control administrator
A person responsible for software distribution and change control activities.

change control client
A workstation that (a) receives software and data files from its change control server and (b) installs and removes software and data files as instructed by its change control server. See also change control single node.

change control domain
A change control server and its change control clients.

change control server
A system that controls and tracks the distribution of software and data files to other workstations. See also change control single node.

change control single node
A workstation that controls, tracks, installs, and removes software and data files for itself. A CC single node can also prepare software for distribution. See also change control client, change control server.

change-data table (CD table)
In SQL replication, a replication table on the Capture control server that contains changed data for a replication source table. See also synchpoint.

change-direction protocol
In SNA, a data flow control protocol in which the sending logical unit (LU) stops sending normal-flow requests, signals this fact to the receiving LU using the change-direction indicator (in the request header of the last request of the last chain), and prepares to receive requests.

changed subfile record
A subfile record into which the work station user has entered data, or a subfile record for which a write or change operation was issued with the DDS keyword SFLNXTCHG or DSPATR(MDT) in effect.

change file
A file formatted to the specifications outlined by LLIS. A change file is used for bulk changes to existing user accounts.

change history
A section that displays modifications in the data records, such as supplier records and organization records.

change implementation schedule
A view in change management that shows the start and end dates for changes to selected configuration items in the environment, the RFC that defines the change, and other details.

change listener
In Java, a listener that is notified when an object is changed in any way.

change log

  1. The area of the checkpoint data set that contains the specific control blocks changed by the last member of the multi-access spool configuration to own the checkpoint data set.
  2. For directory shadowing, a record of changes made to directory entries, departments, and locations for the purpose of sending only the updates and not the entire directory to collecting systems.

change-managed relationship
A relationship between two artifacts. A change to either artifact affects the relationship. See also suspect relationship state.

change management

  1. The process of controlling and tracking modifications to artifacts.
  2. The process of planning (for example, scheduling) and controlling (for example, distributing, installing, and tracking) software changes over a network.
  3. The process of planning for and executing changes to configuration items in the information technology environment. The primary objective of change management is to enable beneficial changes to be made with minimum disruption to services.

change notice
An optional hold notice issuance that tells custodians who already confirmed their preservation obligation for a specific initial notice that the search criteria or other aspect of the initial notice changed. The change notices can require reconfirmation or can be issued for information only.

change number of sessions (CNOS)
An internal transaction program that regulates the number of parallel sessions between the partner LUs with specific characteristics.

change order

  1. An update to a purchase order that is already approved or printed and that changes information such as quantity or vendor.
  2. A record of the changes made during the course of a contract or project execution.

change ownership
A method of transferring ownership of a case or a document to another user using Intel L.E.A.D.

change project
A project that is implemented on a staging or a testing environment before being implemented on a production environment to mitigate and minimize operational errors.

change proposal system
A system that allows users to review modules and suggest changes to them.

change record
A recorded instance that is created with each write action to the repository. The change record contains metadata about all repository changes (such as who was responsible for a commit action) and can be used as a version history view of the repository.

change request (CR)

  1. A request from a stakeholder to change an artifact or process. See also defect, enhancement request.
  2. In System Manager, an instance of a change request description that has been submitted to run or is running. A change request is uniquely identified by the change request name and a sequence number.
  3. A request to change some aspect of the project, project plan, activity definition, or document.
  4. A request created in the Telecom Portal application to replace a device, or change a rate plan.
  5. A small, independent unit of work into which each change project is divided.

change request description (CRQD)
An i5/OS object that describes a change to be made to the computing environment. The object, which is maintained only at the central site system or systems, consists of a list of activities that describe the steps needed to make the change.

change request element
An object that is used to track requests for change during the project.

change set

  1. A list of versions of elements that are associated with a Unified Change Management (UCM) activity.
  2. A group of related changes to artifacts in a workspace or stream.
  3. A cohesive unit consisting of a number of related changes that need to be made together.

change table
A table that is used to change company codes, account codes, extended dimension codes, or to merge accounts or dimensions.

change volume
A volume that is used in Global Mirror that holds earlier consistent revisions of data when changes are made.

change window
A period of time defined for one or more configuration items, which specifies when the CIs can be taken out of service for changes to be made, with minimal impact on services.

change window conflict
A condition that occurs when implementation tasks have been scheduled for a CI outside its change window.

channel

  1. A collection of test environment properties that describes a delivery platform in your test effort.
  2. A defined view of a camera, or an input from a related device, that is identified by a uniquely assigned channel ID.
  3. A link along which signals can be sent, such as the channel that handles the transfer of data between processor storage and local peripheral equipment. See also trunk.
  4. An IBM MQ object that defines a communication link between two queue managers (message channel) or between a client and a queue manager (MQI channel). See also message channel, MQI channel, queue manager.
  5. In mainframe computing, the part of a channel subsystem that manages a single I/O interface between a channel subsystem and a set of control units.
  6. The means of distribution of a company's products. Examples are e-commerce and physical stores.
  7. A unidirectional, function-specific register or queue. Channels are the primary means of communication between a synergistic processor unit (SPU) and a memory flow controller (MFC) in a synergistic processor element (SPE), which in turn mediates communication with the PowerPC processor element (PPE), other SPEs, and other devices.
  8. A means of reaching customers, such as mobile, email, direct mail, websites, or retail.
  9. A specialized web application within a portal to which a user can subscribe.
  10. A communication path through a chain to an endpoint.

channel action
A business function that can be issued on a channel. Channel actions are role specific and an authorization policy makes it possible to control which role can perform which action in a channel.

channel adapter (CA)
A communication controller hardware unit that is used to attach the communication controller to a host channel.

channel address word (CAW)
An area in storage that specifies the location in main storage at which a channel program begins.

channel application
An application that is used to place an order in a store or online call center of a retail business.

channel associated signaling (CAS)
A method of communicating telephony supervisory or line signaling (on-hook and off-hook) and address signaling on T1 and E1 digital links. See also common channel signaling.

channel-attached

  1. Pertaining to the attachment of devices directly by input/output channels to a host processor.
  2. Pertaining to devices attached to a controlling unit by cables, rather than by telecommunication lines. See also link-attached.

channel-attachment major node
A major node that may include minor nodes that are resources (host processors, NCPs, line groups, lines, SNA physical units and logical units, cluster controllers, and terminals) attached through a communication adapter.

channel bank
A device that converts an analog line signal to a digital trunk signal.

channel callback
A mechanism that ensures that the channel connection is established to the correct machine. In a channel callback, a sender channel calls back the original requester channel using the sender's definition.

channel code

  1. A number from 1 to 12 that identifies a position in a forms-control buffer or a page definition.
  2. A designation by IBM Sales & Distribution to indicate accounting revenue split by channel/subchannel.

channel command
An instruction that directs a data channel, control unit, or device to perform an operation or set of operations.

channel command retry (CCR)
In mainframe computing, the protocol used between a channel and a control unit that enables the control unit to request that the channel reissue the current command.

channel command word (CCW)
In zSeries systems, an 8-byte command issued to the channel subsystem by a central processor and operating asynchronously with the issuing processor.

channel-control check
A category of I/O errors affecting channel controls and sensed by the channel to which a device is attached.

channel control function (CCF)
A program to move messages from a transmission queue to a communication link, and from a communication link to a local queue, together with an operator panel interface to allow the setup and control of channels.

channel counter
A counting device that identifies how many pages have been successfully received.

channel-data check
A category of I/O errors, indicating a machine error in transferring data to or from storage and sensed by the channel to which a device is attached.

Channel Data Link Control protocol (CDLC, CDLC protocol)
A channel communications protocol that is used to communicate between VTAM and a front end processor (either hardware or emulated).

channel definition file (CDF)
A file containing communication channel definitions that associate transmission queues with communication links.

channel event
An event reporting conditions detected during channel operations, such as when a channel instance is started or stopped. Channel events are generated on the queue managers at both ends of the channel.

channel exit program
A user-written program that is called from one of a defined number of places in the processing sequence of a message channel agent (MCA).

channel framework
A common model for connection management, thread usage, channel management, and message access within an application server.

channel group
A collection of channels, typically created for geographic areas, such as floors of a building, sections of a city, or sections of a region. Groups can be used to limit or filter the channels that can be accessed in the Intelligent Video Analytics operator client.

channel ID
An identification number that is passed back from a multiplexed device to the file system as a result of calling the device driver multiplex (ddmpx) entry point.

channel initiator
A component of IBM MQ distributed queuing that monitors the initiation queue and starts the sender channel when triggering criteria are met.

channel interface
The circuitry in a storage control that attaches storage paths to a host channel.

channel link
A System/390 I/O channel-to-control-unit interface that has an SNA network address. A channel link can be a subarea link, a peripheral link, a LEN link, or an APPN link. See also subarea link.

channel listener
A component of IBM MQ distributed queuing that monitors the network for a startup request and then starts the receiving channel.

channel number

  1. The identifying number assigned to a licensed channel on the T1 or E1 trunk that connects DirectTalk to the switch, channel bank, or channel service unit.
  2. A number that identifies the path by which data is transferred between a particular input or output device and the processor of the computer.

channel owner
A user who is responsible for creating the assets for a specific channel.

channel path

  1. In mainframe computing, the interconnection between a channel and its associated control units.
  2. A single interface attaching one or more control units.

channel-path identifier (CHPID)

  1. A value assigned to each installed channel path of the system that uniquely identifies that path to the system.
  2. In a channel subsystem, a value that is assigned to each installed channel path of the system that uniquely identifies that path to the system.

channel process

  1. In WebSphere Voice Server, the system process that manages call flow.
  2. The AIX process that executes the logic of the state table; each active caller session has one active channel process.

channel program
A sequence of one or more channel command words (CCWs) issued to one device.

channel service unit (CSU)

  1. An American Telephone and Telegraph (AT&T) unit that is part of the AT&T nonswitched digital data system.
  2. A device used to connect a digital phone line to a multiplexer, a channel bank, or directly to another device producing a digital signal. A CSU performs certain line-conditioning and equalization functions, and responds to loopback commands sent from the central office (CO). See also data service unit.

channel station
In certain printers, a page-counting device that counts the number of pages queued for printing.

channel status word (CSW)
A field that provides the program with the status of an I/O device or the conditions under which an I/O operation has been terminated.

channel subsystem (CSS)
A collection of subchannels that directs the flow of information between I/O devices and main storage, relieves the processor of communication tasks, and performs path management functions.

channel-subsystem image
In mainframe computing, the logical functions that a system requires to perform the function of a channel subsystem. With ESCON multiple image facility (EMIF), one channel-subsystem image exists in the channel subsystem for each logical partition (LPAR). Each image appears to be an independent channel-subsystem program, but all images share a common set of hardware facilities.

channel-to-channel (CTC)
Pertaining to the physical connection or the interaction of two devices.

channel-to-channel adapter (CTC adapter)
A device for connecting two channels on the same processor or on different processors.

chaotic relaxation
An iterative relaxation method that uses a combination of the Gauss-Seidel and Jacobi-Seidel methods. The array of discrete values is divided into subregions that can be operated on in parallel. The subregion boundaries are calculated using the Jacobi-Seidel method, while the subregion interiors are calculated using the Gauss-Seidel method. See also Gauss-Seidel.

CHAP
See Challenge Handshake Authentication Protocol.

CHAP secret
In the Challenge-Handshake Authentication Protocol (CHAP), a secret passphrase that is used to authenticate a storage system to iSCSI-attached hosts.

chapter
A group of people with similar skills and responsibilities within a tribe. For example, a squad might have one tester per squad and that tribe consists of ten squads, so the chapter of testers would be the ten testers (from each squad in the chapter). The chapter lead is typically a manager who has the same competencies as their chapter and is actively involved in day-to-day work so that they have a firm grasp of what’s happening within their chapter. Chapter leads focus on slowing down work and ensuring quality. See also guild, squad, tribe.

character

  1. In bar codes, a single group of bars and spaces that represent an individual number, letter, punctuation mark, or other symbol.
  2. A sequence of one or more bytes representing a single graphic symbol or control code.
  3. Any symbol that can be entered on a keyboard, printed, or displayed. For example, letters, numbers, and punctuation marks are all characters.
  4. In a computer system, a member of a set of elements that is used for the representation, organization, or control of data. See also glyph.

character angle
In architecture, the angle that is between the baseline of a character string and the horizontal axis of a presentation space or physical medium.

character arrangement table
An array of data that translates input data into printable characters and identifies associated character sets and graphic character modification modules.

character array
A named list or table of character data.

character attribute
A code that defines a single property of a character or characters; for example, extended color, character set, or extended highlighting. A character can have more than one defined character attribute.

character-based interface
A computer interface that shows only characters and no graphics on the screen.

character baseline
See baseline.

character box

  1. The imaginary parallelogram whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a graphics display device.
  2. The area that completely contains the character pattern.
  3. The maximum area in which a symbol and all associated elements, such as a cursor, an underline, or space surrounding the symbol to separate it from other symbols, can be printed or displayed.

character-box reference edge
In architecture, one of the four edges of a character box.

character cell

  1. See character box.
  2. An addressable location on a display surface or printing medium. The character cell defines the placement of characters with respect to preceding and following characters.
  3. In the GDDM function, the imaginary box whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a work station.
  4. As defined in ISO/IEC 10646, the place within a row at which an individual graphic character may be allocated.
  5. The maximum physical boundary of a single character. For example on the IBM 3800 Printing Subsystem, a cell is made up of 24 rows with total height of 4.23 mm and 18 bit positions having a total width of 2.54 mm.
  6. The physical width and height in pels of a font.

character cell size
In architecture, the size of a rectangle in a drawing space used to scale font symbols into the drawing space.

character class
A named set of characters sharing an attribute associated with the name of the class. The classes and the characters that they contain are dependent on the value of the LC_CTYPE category in the current locale.

character code

  1. An element of a code page or a cell in a code table to which a character can be assigned. The element is associated with a binary value.
  2. In System i Access, an ASCII or EBCDIC value assigned to the symbols or functions that are used by a computer.

character concatenated expression
A concatenated expression that consists of one or more character columns, string literals, or substrings of character columns.

character constant

  1. The actual character value (a symbol, quantity, or constant) in a source program that is itself data, instead of a reference to a field that contains the data. See also numeric constant.
  2. In the C language, a character or an escape sequence enclosed in quotation marks.

character conversion
The process of changing data from one character coding representation to another.

character conversion table
A table that converts one or more characters to alternative characters using hexadecimal encoding for the character sets. The character sets are defined in code pages.

character coordinate system
An orthogonal coordinate system that defines font and character measurement distances.

character data

  1. Data that has an associated coding representation that defines how to interpret each specific pattern of bits that are grouped into one or more bytes.
  2. Data in the form of letters and special characters, such as punctuation marks.

Character Data Representation Architecture (CDRA)
An IBM architecture that defines a set of identifiers, resources, services, and conventions to achieve consistent representation, processing, and interchange of graphic character data in heterogeneous environments.

character data representation identifier
A tag that is used to achieve data integrity. The Character Data Representation Architecture specifies that you should tag all character data as it flows through the system. You can tag using a short-form or a long-form identifier. A coded character set identifier (CCSID) is an example of a character data representation identifier.

character density
A measure of the horizontal spacing of characters.

character device
A device that handles data one character at a time.

character direction
In Graphic Object Content Architecture, an attribute controlling the direction in which a character string grows relative to the inline direction. Values are left-to-right, right-to-left, top-to-bottom, and bottom-to-top. See also escapement direction.

character display
A display that uses a character generator to display predefined character boxes of images (characters) on the screen. This kind of display cannot address the screen any less than one character box at a time.

character encoding

  1. A character set consisting of a code that pairs a sequence of characters from a given set with something else, such as a sequence of natural numbers, octets or electrical pulses. Encoding facilitates the storage and transmission of text through telecommunication networks.
  2. The mapping from a character (a letter of the alphabet) to a numeric value in a character code set. For example, the ASCII character code set encodes the letter "A" as 65, while the EBCIDIC character set encodes this letter as 43. The character code set contains encodings for all characters in one or more language alphabets.

character entity reference
A character string of the form &#xdddd or &#dddd, where dddd is the hexadecimal or decimal equivalent of the Unicode code point of a character. For example, &#x003E and &#0062 are both character entity references to the > (greater-than) sign.

character escapement point
The point where the next character reference point is usually positioned.

character expression
A character constant, a simple character variable, an element of a character array, a character-valued function reference, a substring reference, or a sequence of the above separated by the concatenation operator and parentheses.

character field
An area that is reserved for information that can contain any of the characters in the character set. See also numeric field.

character format
In REXX, a format that is used in the REXX conversion functions to indicate that data is in a textual form as opposed to machine-readable form.

character generator

  1. In word processing, the way to generate visual characters and symbols for coded data.
  2. In computer graphics, a function that converts the coded representation of a graphic character into the shape of the character for display or print.

character generator utility (CGU)
A function of the Application Development ToolSet feature that is used to define and maintain user-defined double-byte characters and related sort information.

character graphic

  1. The visual representation of a character, defined by toned or untoned picture elements. See also graphic character, graphic character.
  2. An image that is composed of symbols printed in a monospace font. Some symbols are standalone; others are intended for assembling larger figures.

character grid
In Business Graphics Utility, an invisible network of uniformly spaced horizontal and vertical lines covering the chart area. Used by the Business Graphics Utility to determine the physical dimensions of the chart and the placement of the data on it.

character grid unit
In Business Graphics Utility, the distance between two adjacent horizontal or vertical lines on a character grid.

character group
Any number of character graphics and character properties.

character ID
See character identifier.

character identifier (character ID)

  1. The standard identifier for a character, regardless of its style. For example, all uppercase A's have the same character identifier.
  2. On a system, a 4-byte binary value. The value is a concatenation of the graphic character set global identifier followed by the code page global identifier. For example, the character identifier for German (feature 2929) is 00697 00273.

character image
See glyph.

character increment
The distance from the character reference point to the character escapement point. Character increment is the sum of the A-space, B-space, and C-space. Usually the distance between the current print position and the next print position.

character-increment adjustment
In a scaled font, an adjustment to character increment values. The adjustment value is derived from the kerning track values for the font used to present the characters.

characteristic
A user-defined trait or property that is associated with an identity that is not commonly expressed as a name, number, address, or email. This attribute allows users to extend the product by defining customizable entity attributes that are meaningful to their data sources. See also attribute, identity.

characteristic type
A specific classification of a characteristic. Examples of characteristic types include gender and date of birth, but additional characteristic types can be defined.

character large object (CLOB)

  1. A character string that contains single-byte characters with an associated code page.
  2. A data type whose value is a sequence of characters (single byte, multibyte, or both) that can range in size from 0 bytes to 2 gigabytes less 1 byte. In general, the CLOB data type is used whenever a character string might exceed the limits of the VARCHAR data type. See also large object.

character literal
A literal that represents character data.

character mapping
The association of code-page code points to the appropriate graphic-character identifiers in a font.

character metric
Measurement information that defines an individual character value such as height, width, or space. Character metrics may be expressed in specific fixed units, such as pels, or in relative units that are independent of both the resolution and size of the font. Often included as part of the general term font metrics. See also character set metric.

character name
See character identifier.

character normalization
A process in which the variant forms of a character, such as capitalization and diacritical marks, are reduced to a common form.

character operator
A symbol representing an operation to be performed on character data, such as concatenation (joining the data or fields) in the control language (CL).

character pattern
See character raster pattern.

character-pattern descriptor
In architecture, information that the printer needs to separate font raster patterns. Each character pattern descriptor is 8 bytes long and specifies both the character box size and an offset value.

character position
On a display, the location of a character.

character positioning
The process of determining where a character is to appear on a presentation surface.

character precision
In architecture, the acceptable amount of variation in the appearance of a character on a physical medium from a specified ideal appearance, including no acceptable variation. Examples of appearance characteristics that can vary for a character are shape and position.

character printer
A device that prints a single character at a time. See also line printer.

character property
Any detail about how a character is printed relative to the other characters around it. Character properties are box size, horizontal and vertical character cell size, character ID, center line, baseline, left space, right space, above space, and below space.

character raster pattern
The scan (picture element) pattern for a character graphic of a particular size, weight, and style.

character recognition
The identification of geographic, phonic, or other characters by automatic, magnetic, optical, or mechanical means.

character reference point

  1. The point along the character baseline within the character box that coincides with the current print position.
  2. The point that corresponds to the origin of the character coordinate system. The character reference point coincides with the presentation position when the character is formed in the presentation process. See also current print position.

character rotation
The alignment of a character with respect to its character baseline, measured in degrees in a clockwise direction. See also orientation.

character set

  1. A set of binary codes that represent specific text characters.
  2. A list of characters (letters, numbers, and symbols such as #, $, and &) that are recognized by computer hardware and software.
  3. A defined set of characters with no coded representation assumed that can be recognized by a configured hardware or software system. A character set can be defined by alphabet, language, script, or any combination of these items.

character set attribute
In architecture, an attribute used to specify a coded font.

character set encoding
The ability to encode different character sets in mailings so that mailings can be sent in any language.

character set identifier 65534
The character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 ( FFFE ) is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs tagged for each individual field it contains. If the file is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.

character set identifier 65535
The character set identifier (CCSID) that is used to show that data associated with the CCSID should not be processed as coded-graphic-character data.

character set metric
One of the measurements used to describe a characteristic of the all the characters in that font. Examples are height, width, and character increment for each character of the font. See also character metric, font metric, relative metrics.

character shape
The visual representation of a graphic character.

character shape presentation
The formation of a character shape on a physical medium at an addressable position determined by the formatting process.

character shear
See shear.

character space
The horizontal space or size of a character. This size depends on the character, the font, and the device on which the character is printed.

character spacing
See character increment.

character special file
An interface file that provides access to an input or output device, which uses character I/0 instead of block I/0. See also block special file.

characters per inch (cpi)
The number of characters printed horizontally within an inch across a page.

characters per second (cps)
The number of characters that a device can print in one second.

character string

  1. A contiguous sequence of characters that are treated as a unit.
  2. A contiguous sequence of characters terminated by and including the first null byte.
  3. A sequence of bytes that represents bit data, single-byte characters, or a mixture of single-byte and multibyte characters.

character string delimiter
A character that is used to identify the beginning and the end of a character string.

character substring
A contiguous portion of a character string.

character times
In CCP, the maximum number of times that the temporary text delay character can (a) be sent to a terminal before the operation stops; or (b) be sent between the end of a receive operation and the beginning of a transmit operation.

character translation
In international character support, the dd command and various conversion subroutines that translate between extended characters and ASCII escape strings to preserve unique character information.

character type
A data type that consists of alphanumeric characters.

character variable

  1. In the C language, a data object having a value that can be changed while a program is running and having a data type that is a signed or unsigned character.
  2. Character data with a value that is assigned or changed while the program is running.

charge
An assertion of a specific crime for which a suspect has been accused of committing.

charge and allowance code
An industry-standard identifier that the shipper assigns to each accessorial.

charge-back

  1. A financial penalty that is assigned to a vendor for violations to compliance rules and other criteria.
  2. The rate that is charged to the business for a specific application data source.

charge-back account
An account used for tracking computing resource usage by business departments or projects. Examples of charge-back accounts are "Marketing Department" or "Summer catalog project."

chargeback allocation
A charge category used for cost allocation.

charge-back identifier
A label, which is often tied to an algorithm or set of rules, that is not guaranteed to be unique, but is used to identify and distinguish a specific charge-back item or charge-back entity from others.

charge code
An accounting code that is used to register and categorize costs against project budgets.

charge feature
An optional feature for either software or hardware for which there is a charge.

charge out
To check out and track a physical record.

charge sequence
The sequence in which Sterling Selling and Fulfillment Foundation creates authorization or charge requests. For example, the charge sequence might specify that gift certificates are to be used before a credit card is charged.

charging requesting service
In X.25 communication, an optional facility that specifies that charging information (segment count data, monetary unit data, or call duration data) is required.

chart

  1. A visual representation of real-world objects, such as organizations, people, events, or locations, and the relationships between them.
  2. A picture defined in terms of graphics primitives and graphics attributes.

chart area
In the GDDM function, the part of the picture space in which a business chart is to be drawn.

chart format
In Business Graphics Utility, an object containing chart characteristics, such as the chart type, chart heading, legend position, and so on. The chart format does not include the data values to be plotted. The system-recognized identifier for the object type is *CHTFMT.

chart fragment
A view of a chart that highlights particular items of interest.

charting scheme
A definition that describes how item data behaves when it is visualized on a chart. For example, how data is copied into chart item properties, the chart template and labeling scheme to use, and whether to display attributes and pictures. See also chart template.

chart layer
A map layer that contains the items that have been sent from the chart surface to the mapping tool.

chart layout
In Business Graphics Utility, the arrangement of the various parts in the chart area and surrounding margins.

chart of accounts (COA)
A detailed listing of all the accounts used by a company.

chart property
A characteristic of a chart, such as its summary description, time zone, grid size, background color, or merge and paste rules. Chart properties are saved with the chart. See also chart template.

chart series
A selection of a category of data that will be represented by a chart in a report. A chart can have multiple chart series to represent multiple types of data.

chart template
An object that is used for chart creation that contains preconfigured chart properties, and lists of permitted entity types and link types. See also chart property, charting scheme.

CHASE
In SNA, a command used by the host system to determine when the secondary logical unit has finished processing all previously sent response units.

chassis
The metal frame in which various electronic components are mounted.

chassis detect-and-deploy profile
A profile that IBM Director automatically applies to all new BladeCenter chassis when they are discovered. The profile settings include management module name, network protocols, and static IP addresses. If Remote Deployment Manager (RDM) is installed on the management server, the chassis detect-and-deploy profile also can include deployment policies.

chat
The sending of typed messages between online participants. See also instant message.

chat script
In remote communication, a list of expect-send sequences that a modem uses to establish a communication link with another modem.

chat transcript
A file that contains a copy of the typed messages between participants in a chat meeting.

cheat sheet
An interface that guides users through the wizards and steps required to perform a complex task, and that links to relevant sections of the online help.

check

  1. A periodic inspection of an aircraft after a specified amount of time in service.
  2. A process for determining accuracy.
  3. In printers, an action message that instructs the printer operator to inspect a component. For example, the CHECK TONER COLLECTOR message means that the operator should look at the toner-collector bottle and make sure that it is physically present, in the proper place, and correctly installed.
  4. To look for a condition.

check box
A square box with associated text that represents a choice. When a user selects the choice, the check box is filled to indicate that the choice is selected. The user can clear the check box by selecting the choice again, thereby deselecting the choice.

check character
A character used for the purpose of performing a check.

CHECK clause
In SQL, an extension to the SQL CREATE TABLE and SQL ALTER TABLE statements that specifies a table check constraint.

check condition
A restricted form of search condition used in check constraints.

check constraint
A user-defined constraint that specifies the values that specific columns of a base table can contain. See also constraint.

check digit

  1. A check key consisting of a single digit.
  2. The far right number of a self-check field that is used to verify the accuracy of the field.

checked-out version
A copy of a file that corresponds to a version of an element. See also version.

check-in

  1. The action that creates a new version of an element on any branch of its version tree.
  2. The operation of returning code back into a code repository on source code control systems.

checkin
See check-in.

check in

  1. To upload the language of a checked out draft authored/received contract or amendment contract into the application.
  2. In certain software configuration management (SCM) systems, to copy files back into the repository after changing them.
  3. To replace an inactive document, project WBS element, scope element, requirement or resource record (with its modifications) to its repository directory so that others can view it or modify it.
  4. To save local changes in a change set that is part of a repository workspace. A checked-in change set can later be shared with a team by delivering the change set.

check-in screen
The screen identifying the host screen that should be active for a connection to be considered ready to be returned to the connection pool. If the application is not on the screen specified by the check-in screen, the connection will be discarded or recycled in attempt to return the connection to the host screen specified by the check-in screen. The check-in screen is only meaningful if connection pooling is specified for a connection.

check integrity
The condition that exists when each row in a table conforms to the check constraints that are defined on that table.

check out

  1. In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified. See also reservation version status.
  2. To remove an active document, project WBS element, scope element, requirement or resource record from its repository directory in order to modify it. Only one individual may check out the same element at a time.
  3. To download the language of a draft authored/received contract or amendment contract from the application to modify it.

check pending

  1. A state that occurs when data for a constraint cannot be verified as valid. A constraint could be either a referential constraint or a check constraint.
  2. In DB2 for z/OS, a state into which a table can be put where only limited activity is allowed on the table and constraints are not checked when the table is updated. See also set integrity pending.

checkpoint

  1. A compressed file that contains configuration data from a specific point in time.
  2. A point at which the database manager records internal status information in the log; the recovery process uses this information if the subsystem abnormally terminates.
  3. A place in a program at which a check is made, or at which a recording of data is made to allow the program to be restarted.
  4. To pause a running process and save its current state.

checkpoint algorithm
The algorithm that determines when to commit all global transactions for the job steps in a batch application. See also results algorithm.

checkpoint data set
A local data set that contains Common Queue Server (CQS) system checkpoint information about a group of shared queues.

checkpointing
The periodic copying of processing information to the checkpoint data set. Checkpointing ensures that information about in-storage job and output queues is not lost in the event of a hardware or software error.

checkpoint reconfiguration
A process that allows a user to dynamically redefine checkpoint data-set specification for the JES multi-access spool (MAS) configuration.

checkpoint reconfiguration dialog
An interactive form of a JES2 checkpoint reconfiguration that directs the reconfiguration process with replies to a series of WTOR messages.

checkpoint restart
The process of resuming a job at a checkpoint within the job step that caused abnormal termination. The restart can be automatic or deferred. A deferred restart requires that the job be resubmitted. See also automatic restart, deferred restart, step restart.

checkpoint/restart facility
A facility for restarting execution of a program at some point other than at the beginning, after the program was terminated due to a program or system failure. A restart can begin at a checkpoint or from the beginning of a job step, and uses checkpoint records to reinitialize the system.

checkpoint size
In OSI X.400, the maximum amount of data (in units of 1024 bytes) that can be sent between two minor synchronization points. The checkpoint size is used by the X.400 reliable transfer server.

check point snapshot
A snapshot, created at the end of a snapshot chain, that contains all changes from the last incremental delta block.

checkpoint write
Any write to the checkpoint data set. A checkpoint write is a primary, intermediate, or final write that updates a checkpoint data set.

checkstop
A severe error inside a processor core that causes a processor core to stop all processing activities.

checksum

  1. On a diskette, data written in a section for error detection purposes.
  2. A small piece of data that is derived from an arbitrary block of digital data for the purpose of detecting errors that might have been introduced during its transmission or storage.
  3. The sum of a group of data that is associated with another group of data and that is used for error detection.

checksum protection

  1. A function that protects data stored in an auxiliary storage pool from being lost because of the failure of a single disk. When checksum protection is in effect and a disk failure occurs, the system automatically reconstructs the data when the system program is loaded after the device is repaired. See also device parity protection, mirrored protection.
  2. In TCP/IP, the sum of a group of data associated with the group and used for error checking purposes.

checksum set
Units of auxiliary storage defined in groups to provide a way for the system to recover data if a disk failure occurs when checksum protection is in effect.

chicken role
In agile development, the peripheral participants in scrum development. This includes the product manager, testers, customers, customer advocates, and other stakeholders. See also pig role, scrum.

chiclet
An icon that represents the availability of an RSS feed on a web page or an option that allows users to share the information through social media.

chiclet keyboard
A keyboard with small, flat, rectangular keys that have straight instead of angled edges.

Chief Information Officer (CIO)

chief information security officer (CISO)
A person responsible for the protection of enterprise information and assets.

child

  1. In a generalization relationship, the specialization of another element, the parent.
  2. In a hierarchy or auto-level hierarchy, a member that has at least one parent.
  3. Pertaining to a secured resource, either a file or library, that uses the user list of a parent resource. See also parent.
  4. A node that is subordinate to another node in a tree structure. Only the root node is not a child.

child activity
An activity that is launched during the processing of another activity, which becomes the parent activity. See also parent activity.

child category
A category that is subordinate to another category in a hierarchy. See also category page, parent category.

child circuit
A circuit that is a subordinate circuit under a parent circuit.

child class
A class that inherits instance methods, attributes, and instance variables directly from the parent class (also known as the base class or superclass), or indirectly from an ancestor class.

child component
Optional second or lower level of a hierarchical item type. Each child component is directly associated with the level above it.

child device
A device that is connected to a parent device.

child document
A document that inherits its values from another document (the parent document).

child enclave
The nested enclave created as a result of certain commands being issued from a parent enclave. See also nested enclave, parent enclave.

child expression
A list of columns in a child table that relate to corresponding columns in a parent table. See also parent expression.

child item
An item that is a part of an item with variations and has the same set of attributes as the item with variations, with minor distinct differences.

child lock
In explicit hierarchical locking, a lock that is held on a table, a page, a row, or a large object. Each child lock has a parent lock. See also parent lock.

child node
A node within the scope of another node. See also parent node.

child order
For subscriptions or recurring orders, the subordinate to the parent order. For example, a parent order is the subscription to the magazine itself, while the child order is one of the monthly issues. See also parent order.

child organizational entity
One or more further levels of organizational entities that exist beneath the parent organizational entity.

child process
A process that is created by a parent process and that shares the resources of the parent process to carry out a request.

child resource
A secured resource, either a file or library, that uses the user list of a parent resource. A child resource can have only one parent resource.

child resource group
A resource group that depends on certain application services that a parent resource group provides. A child resource group is acquired on any node in the cluster only after the parent resource group has been activated. See also dependent resource groups, parent resource group.

child segment
In a database, any segment that is dependent on another segment above it (its parent) in the hierarchy.

child table
A table that has a referential constraint to a column in a different table; the referenced table is called a parent table. See also parent table.

child UR
A unit of recovery (UR) cascaded from a parent UR in a cascaded transaction.

child widget
In AIXwindows and Enhanced X-Windows, a widget that is managed by another widget, the parent. For example, Composite widgets typically manage the Primitive children widgets attached to them.

child window
A window that appears within the border of its parent window (either a primary window or another child window). When the parent window is resized, moved, or destroyed, the child window also is resized, moved, or destroyed. However, the child window can be moved or resized independently from the parent window, within the boundaries of the parent window.

child work item
A work item created for each participant in a multi-participant step and for each route taken simultaneously from an AND-split step.

China Association for Standards (CAS)
The national standards-setting organization in The Peoples' Republic of China.

Chinese numeral
One of the Chinese characters that represent numbers. For example, the Chinese characters for 1, 2, and 3 are written with one, two, and three horizontal brush strokes, respectively. See also Arabic numeral, Hindi numeral, number, Roman numeral.

CHIP
See Client Health Information Portal.

chip
See chad.

chi-square
A test statistic used to indicate the probability that two fields are unrelated, in which case any differences between observed and expected frequencies are the result of chance alone. If this probability is very small (typically less than 5%) the relationship between the two fields is said to be significant.

Chi-squared Automatic Interaction Detector algorithm (CHAID)
A decision tree algorithm that uses chi-square statistics to identify optimal splits. Unlike the C & R tree and QUEST nodes, CHAID can generate nonbinary trees, meaning that some splits have more than two branches. See also decision tree algorithm, regression tree algorithm.

choice
An option in a pop-up window or menu used to influence the operation of the system.

choice activity
One of three types of complex BPML activities. A choice activity is used to make decisions in the business process model and runs only one of the child activities it contains. The choice activity makes it possible to model branch processing.

choice list
A list of predefined property values. A choice list presents a list of valid choices, such as a list of states or ZIP codes.

choice point
A point that is set automatically by CP Optimizer as it executes a goal during the search for a solution. At the choice point, the engine records the current state of constraints, variables, and domains, along with other goals not yet executed. If execution of the goal leads to failure, CP Optimizer backtracks to the choice point, restores the state recorded, and tries one of the stored goals.

choice type
A group type with a subclass equal to choice that is used to define a selection from a set of components. A choice type defines a choice group, which is valid when the data matches one of the components in the choice group.

Cholesky factoring
A technique that is used to factor a matrix into the product of a lower triangular matrix and its conjugate transpose.

chord
A short line segment whose end points lie on a circle. Chords are a means for producing a circular image from straight lines.

chore
An object that executes one or more processes at a user-defined frequency.

choreography

  1. An ordered sequence of message exchanges between two or more participants. In a choreography there is no central controller, responsible entity, or observer of the process.
  2. An agreed upon sequence of business events that is allowed by a seller for each transaction.

CHP
See channel process.

CHPID
See channel-path identifier.

chromeless browser
A web browser window that does not have user interface elements such as borders, frames, menus, toolbars, or scroll bars. See also browser chrome.

CHS
See Simplified Chinese.

CHT
See Traditional Chinese.

cHTML
See Compact Hypertext Markup Language.

chunk

  1. A data storage location. For example, a raw disk device or a cooked file.
  2. A group of archived business processes.

chunked-transfer encoding
A data transfer mechanism in HTTP that sends data in smaller sections of data called “chunks” that allows for dynamic generation and transmission of content.

chunk step
A step that follows a preconfigured checkpoint policy. A chunk step performs item-oriented processing by using a reader-processor-writer batch pattern.

chute dedication
In a warehouse, the exclusive assignment of a dock door or chute to a particular carrier.

CI

  1. See callable interface.
  2. See configuration item.
  3. See control interval.
  4. See continuous integration.

CIB

  1. See condition information block.
  2. See cluster information base.

CIC

  1. See circuit identification code.
  2. See concurrent image copy.

cicero
In the didot point system, a unit of 0.1776 inch (4.512 millimeters) used in measuring typographical material.

CICS
An IBM licensed program that provides online transaction-processing services and management for business applications.

CICS attachment facility
A facility that provides a multithread connection to a DB2 database to allow applications that run in the CICS environment to execute DB2 commands.

CICS BTS
See business transaction services.

CICS bundle
A set of XML files that defines or references the resources for a component of an application or a whole application, or another artifact relating to applications, such as a policy. A CICS bundle is installed in a CICS region. Multiple CICS bundles can be referenced by a management bundle. See also application binding, bundle, management bundle, platform, stand-alone CICS bundle.

CICS-deployed JAR file
A deployed JAR file that has been produced specifically for the CICS EJB server and stored in the hierarchical file system.

CICS dynamic storage area (CDSA)
A storage area allocated from CICS-key storage below the 16 MB line. The CDSA is used for all non-reentrant CICS-key RMODE(24) programs, all CICS-key task-lifetime storage in 24-bit storage, and CICS control blocks that reside in 24-bit storage.

CICS EJB server
One or more CICS regions that support enterprise beans. A logical CICS EJB server typically consists of multiple (cloned) CICS listener regions and multiple (cloned) CICS AORs. The listener regions and AORs may be combined into listener/AORs.

CICS group
An i5/OS library containing the CICS resource definition for CICS tables.

CICS-IBM MQ API crossing exit
An exit that intercepts IBM MQ calls as they are being run, for monitoring, testing, maintenance, or security purposes.

CICS-key
Storage protection key in which CICS is given control (key 8) when CICS storage protection is used. This key is for CICS code and control blocks. CICS-key storage can be accessed and modified by CICS. Application programs in user-key cannot modify CICS-key storage, but they can read it. CICS-key storage is obtained in MVS key-8 storage. See also user-key storage.

CICS-maintained data table
A type of CICS data table, for which CICS automatically maintains consistency between the table and its source data set. All changes to the data table are reflected in the source data set and all changes to the source data set are reflected in the data table.

CICS monitoring facility
The CICS component responsible for monitoring and producing task-related statistics information, such as task CPU usage and waits for I/O request units on an individual task basis. Reporting is divided into classes.

CICSplex
A set of CICS systems that are managed and manipulated as if they were a single entity. A CICSplex can be managed by CICSPlex SM. See also multiregion operation.

CICSPlex SM address space (CMAS)
A CICSPlex SM component that is responsible for managing CICSplexes. A CMAS provides the single-system image for a CICSplex by serving as the interface to other CICSplexes and external programs. There must be at least one CMAS in each MVS image on which you are running CICSPlex SM. A single CMAS can manage CICS systems within one or more CICSplexes.

CICS primary connection region
The web owning region (WOR) of the Multi-Region Option (MRO) connected regions in a CICS test environment. This is the region in which the CICS resource definition server for Application Deployment Manager runs.

CICS region
An instance of CICS Transaction Server that runs in its own z/OS address space.

CICS region user ID
The user ID assigned to a CICS region at CICS initialization. It is specified either in the RACF started procedures table when CICS is started as a started task, or on the USER parameter of the JOB statement when CICS is started as a job.

CICS run unit
A set of statically bound, dynamically bound, or both, modules that can be loaded by a CICS loader.

CICS segment
The portion of a RACF profile containing data for CICS.

CICS system

  1. In CICSPlex SM topology, a definition referring to a CICS system that is to be managed by CICSPlex SM.
  2. The entire collection of hardware and software required by CICS.

CICS system definition data set (CSD)
A VSAM KSDS cluster that contains a resource definition record for every record defined to CICS using resource definition online (RDO).

CICS system group

  1. In CICS business transaction services (BTS), a BTS set, that is the set of CICS regions across which BTS processes and activities may execute.
  2. In CICSPlex SM topology, the user-defined name, description, and content information for a CICS system group. A CICS system group can be made up of CICS systems or other CICS system groups.
  3. A set of CICS systems within a CICSplex that can be managed as a single entity.

CICS Transaction Affinities Utility
A utility designed to detect potential causes of inter-transaction affinity and transaction-system affinity for those users planning to use dynamic transaction routing.

CICS-value data area (CVDA)
An argument to which CICS has assigned a specific and limited set of meaningful values. When a CVDA is specified in an EXEC CICS command, CICS converts the CVDA value name to the corresponding numeric representation.

CICS VSAM Recovery
An IBM product that recovers lost or damaged Virtual Storage Access Method (VSAM) data.

CID

  1. See communication identifier.
  2. See connection identifier.

CIDF
See control interval definition field.

CID methodology
An IBM-specified way to install and configure products on, or remove products from, remote workstations and hosts. Response files and redirected installation and configuration may be used by a CID-enabled product to eliminate or reduce user interaction with the CID-enabled product. See also response file.

CIDR
See Classless Inter-Domain Routing.

CIE
See customer impact event.

CIF

  1. See customer installable feature.
  2. See Common Interchange Format.
  3. See common interchange file.

CIFS
See Common Internet File System.

CII data format
See Center for the Information of Industry data format.

CII root element
A representation of the CII document that Sterling B2B Integrator is mapping. The CII root element is a group and can contain groups and segments.

CIM
See Common Information Model.

CIM agent
The code that consists of common building blocks that can be used instead of proprietary software or device-specific programming interfaces to manage devices that are compliant with the Common Information Model (CIM).

CIM object manager (CIMOM)
The common conceptual framework for data management that receives, validates, and authenticates the CIM requests from the client application. It then directs the requests to the appropriate component or service provider.

CIMOM
See CIM object manager.

CINET
See Common INET.

CINIT
See control initiate.

C interface
The interface that is defined at a level that depends on the variant of C standardized by ANSI.

CIO
See Chief Information Officer.

CIP

  1. See commit in progress.
  2. See customized installation package.

cipher
A cryptographic algorithm used to encrypt data that is unreadable until converted into plain data with a predefined key.

cipher block chaining (CBC)
A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted.

cipher spec
See cipher specification.

cipher specification (cipher spec)
A specification that indicates the data encryption algorithm and key size to use for secure connections.

cipher suite
The combination of authentication, key exchange algorithm, and the Secure Sockets Layer (SSL) cipher specification used for the secure exchange of data.

ciphertext
Data that is encrypted. Ciphertext is unreadable until it is converted into plaintext (decrypted) with a key. See also cleartext.

CIR
See Customer Initiated Release.

circle
An entity representation that can indicate an organization or a group on a chart. A circle is often used to enclose other entities. See also box, representation.

circuit

  1. One or more conductors through which an electric current can flow. See also link, packet switching.
  2. A telecommunication circuit such as a line, conductor, or conduit through which information is transmitted.
  3. In fibre-channel technology, an established communication path between two ports, which consists of two virtual circuits capable of transmitting in opposite directions. See also link.

circuit breaker
A switch that automatically interrupts an electric circuit because of an abnormal condition.

circuit identification code (CIC)
A 12-bit number that identifies a trunk and channel on which a call is carried.

circuit-switched data transmission service
A service that uses circuit switching to establish and maintain a connection before data can be transferred between data terminal equipment (DTE). See also packet-switched data transmission service.

circuit switching
A process that, on demand, connects two or more data terminal equipment (DTEs) and permits the exclusive use of a data circuit between them until the connection is released. See also message switching, packet switching.

circuit type
A template that specifies the layout for the type of circuit or service.

circuit type identifier
An identifier for an unmatched circuit. The identifier is based on the criteria that is stipulated against a specific invoice format.

circular file
A type of file that appends data until full; subsequent incoming data overwrites the data starting at the beginning of the file.

circular layout
A layout in which entities are arranged by type around the circumference of a circle. See also layout.

circular log
A database log in which records are overwritten if they are no longer needed by an active database. See also archive log.

circular logging
In IBM MQ on UNIX and Linux systems and IBM MQ for Windows, the process of keeping all restart data in a ring of log files. See also linear logging.

circular reference
A series of objects where the last object refers to the first object, which can cause the series of references to be unusable.

circular traceability relationship
A relationship between a requirement and itself, or an indirect relationship that leads back to a previously traced-from node. Traceability relationships cannot have circular references.

CISC
See complex instruction set computer.

CISO
See chief information security officer.

CIT
See central inventory team.

citation

  1. A regulation that governs the terms of use, disposal, storage, security, and so on, of a certain type of document or information. A citation is issued by a governing agency in a jurisdiction.
  2. An official order from a police officer to appear before a court for a minor offense.

citizen analyst
A business user who can take advantage of advanced analytics capabilities to derive insights from data. Historically, the use of advanced analytics was limited to data scientists with specialized training.

citizen-centric
Pertaining to improved government operations and services that are centered around a citizen's needs and preferences, and offer better public service processes.

CIU
See common interchange unit.

CKD

  1. See count-key-data device.
  2. See count key data.

CKD record
See count-key-data record.

CL

  1. See control language.
  2. See Command Language.

claim

  1. A request for reimbursement, replacement, or repair for an item or an asset that is under warranty.
  2. A notification to DB2 for z/OS that an object is being accessed. A claim prevents a drain from occurring until the claim is released, which usually occurs at a commit point. See also drain, logical claim.

claim class
A type of object access that can be defined by one of the following characteristics: cursor stability (CS), repeatable read (RR), or write.

C language
A language used to develop application programs in compact, efficient code that can be run on different types of computers with minimal change.

class

  1. A subdivision of a classification comprising of a group of suppliers that have common attributes or characteristics.
  2. An object that contains specifications, such as priority, maximum processing time, and maximum storage, to control the run-time environment of a job. The system-recognized identifier for the object type is *CLS.
  3. In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.
  4. An attribute that is related to a transaction code and a message region that is used to determine scheduling. See also message class, region class.
  5. A section of a module. A class can represent program text, that is, the instructions and data that are loaded into virtual storage during execution. Other classes, such as an external symbol dictionary (ESD) and a relocation dictionary (RLD), are required for binding and loading the program.
  6. A collection of processes (and their associated threads) that have a single set of resource limitation values and target shares applied to them.
  7. In printing, a single alphanumeric character assigned to a print job.
  8. In C++, a user-defined data type. A class data type can contain both data representations (data members) and functions (member functions).
  9. A basic unit of the classification hierarchy used in the Type Designer. There are three classes: item, group, and category.
  10. A grouping of projects that has global properties. The properties are used to manage completed jobs, typically deleting them periodically or starting another job that performs specific cleanup tasks.
  11. The syntactic category for a group of related values. A value can be assigned to different classes in different contexts or scenarios. See also classification, classification, pattern, value.
  12. In RACF, a collection of defined entities (users, groups, and resources) with similar characteristics.
  13. The definition of an object within a specific hierarchy. A class can have properties and methods and can serve as the target of an association.
  14. A description of a set of objects that share the same attributes, operations, methods, relationships, and semantics. A class can use a set of interfaces to specify collections of operations that it provides to its environment. See also interface.
  15. The set of all members of a type of object, such as all contracts, term definitions, organizations, and so on.
  16. In the Distributed Computing Environment (DCE), a category into which objects are placed based on their purpose and internal structure.

class 0
See transport class 0.

class 1
Service that provides a dedicated connection between two ports (also called connection-oriented service), with notification of delivery or nondelivery.

class 1 terminal
A terminal for which the alternate IMS pre-opens backup sessions for the primary sessions that the active IMS opens; VTAM/NCP switches sessions from primary to backup at takeover.

class 2

  1. Connectionless service between ports with notification of delivery or nondelivery.
  2. See transport class 2.

class 2 terminal
A terminal for which IMS in the alternate reestablishes service at takeover.

class 3
In fibre-channel technology, connectionless service between ports without notification of delivery. Other than notification, the transmission and routing of class 3 frames is identical to that of class 2 frames.

class 3 terminal
A terminal that communicates with XRF IMS but whose sessions are not automatically reestablished at takeover.

class 4
See transport class 4.

class A network
In Internet communications, a network in which the high-order (most significant) bit of the IP address is set to 0 and the host ID occupies the three low-order octets.

class assignment rule
A rule that determines which values within a set of process attributes result in a process being assigned to a particular class (superclass or subclass within a superclass).

class attribute
A value in a class object that controls the processing of routing steps in a job. These values include the run priority, time slice, eligibility for purge, default wait time, maximum processing unit time, and maximum temporary storage parameters.

class authority (CLAUTH)
An attribute that allows a user to define RACF profiles in a class defined in the class descriptor table. A user can have class authority to zero or more classes. See also authority.

class binding signature
A hexadecimal value that contains the class signature (obtained from the signature bank) and the inheritance level. The class binding signature is added to the Interface Definition Language (IDL) source file by the signature emitter.

class B network
In Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are set to 1 and 0, respectively, and the host ID occupies the two low-order octets.

Class Broker for Java (CBJ)
A Java tool that allows Java applications to run on a host system that does not have a graphical user interface (GUI). Because the IBM Developer Kit for Java Remote Abstract Window Toolkit is not recommended for complex graphics or highly interactive operations, CBJ for high-performance GUI services can be used.

class C network
In Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are both set to 1 and the next high-order bit is set to 0. The host ID occupies the low-order octet.

class condition
In COBOL, a condition that specifies the character content of a data item as all alphabetic or all numeric.

class descriptor table (CDT)
A table containing a definition of general resource classes. The CDT contains the classes supplied by IBM and the installation-defined classes.

class diagram
A diagram that shows a collection of declarative (static) model elements, such as classes, types, and their contents and relationships.

class F
Connectionless service for inter-switch control traffic, which provides notification of delivery or nondelivery between two expansion ports (E_ports).

class file
A compiled Java source file.

class hierarchy
The relationships between classes that share a single inheritance.

classic command
A supported non-IMSplex command. A classic command generally requires a leading slash, for example, /DBRECOVERY.

classic row compression
Data row compression that is provided by static, table-level compression dictionaries. See also adaptive compression.

class identifier (CLSID)
A Universally Unique Identifier (UUID) that identifies a COM component. Each COM component has its CLSID in the Registry so that it can be loaded by other applications.

classification

  1. The system that defines classes and the relationships among those classes. See also class.
  2. The process of grouping values into specific classes. See also class.
  3. A process for automatically acquiring document properties from the document content or another source.
  4. For Department of Defense (DoD), the value assigned to a declared document, for example, Top Secret, Secret, or Confidential.

classification and regression tree algorithm
A decision tree algorithm that uses recursive partitioning to split the training records into segments by minimizing the impurity at each step. See also Quick, Unbiased, Efficient Statistical Tree algorithm.

classification export utility
A utility that must be used to prepare a model for importing into IBM. data expert A person who understands both business processes and technical implementation.

classification guide
A Department of Defence (D0D) guide that details how information will be classified and marked in a records program.

classification hierarchy
The hierarchy of a type tree in the Type Designer. The deeper the subtype, the more specific the data characteristics are. See also compositional hierarchy.

classification mechanism
A set of class assignment rules that determine the classes to which processes are assigned.

classification model
A model that can be used with sets of training documents to help find other, similar documents. Classification models can be edited or updated, modifying the model file that is associated with that particular classification model.

classification purpose
The determination of how an item classification is used. For example, one classification may be used for receiving preference and another may be used for procurement purposes.

classification rule
A rule used by the workload manager component of z/OS to assign a service class.

classification scheme
See file plan.

classification value
A value within the classification hierarchy that can be associated to an item attribute.

classified
Pertaining to a record that has special access restrictions in addition to normal record security.

classified data model
For Department of Defense (DoD), a data model that implements an extra role that is called the Classification Guide Administrator. This data model consists of the following markings: Top Secret (highest in the hierarchy), Secret, Restricted, and Unclassified (lowest in the hierarchy).

classified record
For Department of Defense (DoD), a hierarchical classification level placed on a document. Other levels are non-classified, secret, top secret, and so on.

classifier

  1. In QoS, a control function that selects packets according to the content within the packet headers.
  2. A specialized attribute used for grouping and color-coding process elements.
  3. An XPath expression that determines the transformation to apply to an inbound event.

class inheritance
A feature that allows a subclass to inherit all of the properties of a superclass, which is its parent in a class hierarchy.

class key
One of the C++ keywords: class, struct, and union.

Classless Inter-Domain Routing (CIDR)
A method for adding class C Internet Protocol (IP) addresses. The addresses are given to Internet Service Providers (ISPs) for use by their customers. CIDR addresses reduce the size of routing tables and make more IP addresses available within organizations.

class library
In object-oriented programming, a collection of prewritten classes or coded templates, any of which can be specified and used by a programmer when developing an application.

class loader
Part of the Java virtual machine (JVM) that is responsible for finding and loading class files. A class loader affects the packaging of applications and the runtime behavior of packaged applications deployed on application servers.

class mask
A network mask that is derived solely on the basis of the network class of an Internet Protocol (IP) address.

class member operator
An operator used to access C++ class members through class objects or pointers to class objects. The class member operators are ., ->, .*, and ->*.

class method

  1. In Java, a method that is called without referring to a particular object. Class methods affect the class as a whole, not a particular instance of the class. See also instance method.
  2. A method that creates class instances.

class name

  1. In the X Window System, the name of a class of resources, widgets, or clients. Resource and widget class names are typically defined in the programming libraries used to create the client.
  2. A unique identifier of a class type that becomes a reserved word within its scope.

class-name
In COBOL, a user-defined word defined in the SPECIAL-NAMES paragraph of the Environment Division that assigns a name to the proposition, for which a truth value can be defined, to verify that the content of a data item consists exclusively of those characters listed in the definition of the class-name.

class object
An object that identifies the run attributes of a job. The system-recognized identifier for the object type is *CLS.

class of service

  1. A set of link and node characteristics, associated with a session or a set of sessions, that determine the route that is selected for the sessions through an APPN network.
  2. In fibre-channel technology, a specified set of delivery characteristics and attributes for frame delivery.
  3. A VTAM term for a list of routes through a network, arranged in an order of preference for their use.
  4. A set of characteristics (such as route security, transmission priority, and bandwidth) used to construct a route between session partners. The class of service is derived from a mode name specified by the initiator of a session.

class-of-service database
A database that is maintained independently by each network node, and optionally by APPN end nodes. The database contains one entry per class-of-service name. Each database entry contains: (a) A definition of the acceptable values for transmission group (TG) and node characteristics for routes described by that class-of-service name and the weight function to be used to compute the weights of nodes and TGs that meet the acceptable values; (b)The transmission priority to be used for traffic that flows on routes described by that class-of-service name.

class-of-service description
A system object created for Advanced Peer-to-Peer Networking (APPN) support that provides the information required to assign relative priority to the transmission groups and intermediate routing nodes for an APPN session. The system-recognized identifier for the object type is *COSD.

class path
A list of directories and JAR files that contain resource files or Java classes that a program can load dynamically at run time.

class scope
The scope of C++ class members. See also namespace scope.

class signature
A hexadecimal value obtained from a server and placed in a signature bank on the workstation. The signature bank uniquely identifies an Interface Definition Language (IDL) interface. Class signatures are added to the IDL source file by the signature emitter.

class statistics
Statistical information that includes information such as the number of instances of the class in the application, the CPU time spent in that class, the number of calls made to the class, and so on.

class style
A combination of formatting characteristics, such as font, font size, and border, that the user names and stores as a set.

class template
A blueprint describing how a set of related C++ classes can be constructed.

class template declaration
A class template declaration introduces the name of a class template and specifies its template parameter list. A class template declaration may optionally include a class template definition.

class template definition
A definition that describes various characteristics of the class types that are its specializations. These characteristics include the names and types of data members of specializations, the signatures and definitions of member functions, accessibility of members, and base classes. See also base class.

class tier
In AIX Workload management, the value that specifies which class is most important. If no tier value is used, all classes are equally important.

class transition
A change in an object's management class or storage class when an event occurs that brings about a change in an object's service level or management criteria. Class transition occurs during a storage management cycle.

clause

  1. A set of consecutive character strings that specify a characteristic of an entry. There are three types of clauses: data, environment, and file.
  2. A set of conditions and variable expressions that represent specific layers in a protocol stack.
  3. In SQL, a distinct part of a statement in the language structure, such as a SELECT clause or a WHERE clause.
  4. The fundamental grouping of REXX syntax. A clause is composed of zero or more blanks, a sequence of tokens, zero or more blanks, and the semicolon delimiter.
  5. A building block of the contract language that may contain legal language or line data.

clause instance
An occurrence of a clause in a contract where the term values are specific to the contract and the language of the clause may be modified to suit the current contract.

clause template
A template that contains the standard language of a clause and includes the legal language, terms, and other properties. See also template.

clause type
A defined clause category for purposes of information and search.

clause visibility feature
A feature which, if enabled, displays only those clauses in the contract language view for which read permission is granted.

CLAUTH
See class authority.

CLAW
See Common Link Access to Workstation.

CLB
See communication line block.

CLC
See Cognitive Learning Companion.

CLDR
See Common Locale Data Repository.

cleanse

  1. To transform the data extracted from operational systems to make it usable by a data warehouse.
  2. To ensure that all values in a data set are consistent and correctly recorded.

clean up
To remove or delete obsolete repository data.

cleanup
In SNA products, a network services request, sent by a system services control point (SSCP) to a logical unit (LU), that causes a particular LU-LU session with that LU to be ended immediately without requiring the participation of either the other LU or its SSCP.

cleanup interval
The length of time to wait before removing obsolete data.

cleanup period
The time period during which a database record that has reached its final state or condition is to remain in the database. After the cleanup period expires for such a record, database cleanup causes the record to be deleted from the database.

cleanup procedure
A procedure that instructs the system to attempt to remove software products that were partially installed and to revert to the previous version of the product. If the system successfully reverts to the previous version, it becomes the currently active version; otherwise, the software product is marked as broken.

clear
In X.25 communication, to reject a call (if it has not yet been accepted) or end a call.

clearance
The control and positioning of plant equipment for providing protection for personnel and equipment during work on plant devices.

clear area
In character recognition, a specified area that is to be kept free of printing or any other markings not related to machine reading. See also intercharacter gap.

ClearCase administrators group
A Windows domain group whose members have superuser access to ClearCase objects.

ClearCase registry
A network service that allows programs to access versioned object bases (VOBs) and views by name instead of network path.

clear cause
See cause code.

clear-confirmation packet
In X.25 communication, a packet transmitted by the DTE to inform the DCE that a call has been cleared.

clear data
See plain text.

clear diagnostic
See diagnostic code.

clear indication packet
In X.25 communications, a call supervision packet that a data circuit-terminating equipment (DCE) transmits to inform a data terminal equipment (DTE) that a call has been cleared.

clearinghouse

  1. A central registry that connects users from multiple instant messaging communities.
  2. In the Distributed Computing Environment (DCE), a collection of directory replicas on one Cell Directory Service (CDS) server. A clearinghouse takes the form of a database file. See also control access.

clearing task
A process of reviewing the registration submitted by a supplier and accepting or rejecting the supplier as per the business requirements.

clear key encryption
Any type of encryption key not protected by encryption under another key.

clear message
A message displayed by DirectTalk to tell the operator that a red or yellow error message has been cleared.

clear request packet
A call supervision packet transmitted by a data terminal equipment (DTE) to ask that a call be cleared.

clear session
A session in which only clear data is transmitted or received. See also cryptographic session, selective cryptographic session.

cleartext
A string of characters sent over a network in readable form. It might be encoded for the purposes of compression, but it can easily be decoded. See also ciphertext.

clear-text password
A password that is comprised of a string of characters sent over a network in readable form. It might be encoded for the purposes of compression, but it can easily be decoded.

cleartool
The primary command-line interface to ClearCase and ClearCase LT version-control and configuration management software.

clear to send (CTS)
In data communication, a signal raised by data circuit-terminating equipment (DCE) when it is ready to accept data, usually in response to request to send (RTS) being raised. See also request to send.

clear user data
In X.25 communications, data optionally included in the clear-request packet by the user application.

CLEM
See Common Language for Expression Manipulation.

clerical record
A record for which the matching process cannot definitively determine if the record is a duplicate record or a nonmatched record or if the record is a matched record or a nonmatched record. See also duplicate record, matched record, nonmatched record.

clerk

  1. In the DCE Distributed Time Service (DTS), a software component that synchronizes the clock for its client system by requesting time values from servers, computing a new time from the values, and supplying the computed time to client applications.
  2. In the DCE Cell Directory Service (CDS), a software component that receives CDS requests from a client application, ascertains an appropriate CDS server to process the requests, and returns the results of the requests to the client application.

CLI

  1. See call level interface.
  2. See command-line interface.

C library
A system library that contains common C language subroutines for file access, string operations, character operations, memory allocation, and other functions.

click
To press and release a mouse button without moving the pointer off the choice.

clickstream
In web advertising, the sequence of clicks or pages requested as a visitor explores a website.

clickthrough
A marketing tool that reports the number of times a customer clicks on the displayed content to find out more information about the subject.

clickthrough rate
In web advertising, the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page. See also impression.

Click-to-Action (C2A)
A method for implementing cooperative portlets, whereby users can click an icon on a source portlet to transfer data to one or more target portlets. See also cooperative portlets, wire.

click-to-call
A feature that allows a user to select two or more contacts and then call them at the same time, initiating an audio conference.

click-to-conference
A Sametime Unified Telephony feature that allows a user to select two or more contacts and then call them at the same time, initiating a conference.

client

  1. The user interface application installed at the customer site.
  2. A software program or computer that requests services from a server. See also host, server.
  3. A runtime component that provides access to queuing services on a server for local user applications. The queues used by the applications reside on the server. See also IBM MQ fully managed .NET client, IBM MQ Java client, IBM MQ MQI client.
  4. See customer.

client acceptor
A service that serves the Java applet for the web client to web browsers. On Windows systems, the client acceptor is installed and run as a service. On AIX, UNIX, and Linux systems, the client acceptor is run as a daemon.

client acceptor daemon (CAD)
See client acceptor.

client API
The interface used by client applications to invoke services in CICS using the facilities of the Client daemon. See also external call interface, external security interface.

client application

  1. A user application, written in a supported programming language other than Java, that communicates directly with the Client daemon.
  2. An application written with the Content Manager APIs to customize a user interface.
  3. An application that users the services of the database services by direct connection or via application servers. See also client/server architecture.
  4. An application written with object-oriented or Internet APIs to access content servers from Information Integrator for Content.
  5. A storage management program that initiates Common Information Model (CIM) requests to the CIM agent for the device.
  6. An application, running on a workstation and linked to a client, that gives the application access to queuing services on a server.

Client Application for Windows
A complete object management system provided with Content Manager and written with Content Manager APIs. It supports document and folder creation, storage, and presentation, processing, and access control.

client application thread
In DCE remote procedure call (RPC), a thread executing client application code that makes one or more RPCs.

client authentication

  1. The process by which a client's identity is verified.
  2. In CSIv2 security, a token-based client authentication mechanism for which Generic Security Services Username Password (GSSUP) is the minimum requirement, but additional requirements, such as Lightweight Third Party Authentication (LTPA), might exist.

client center
A center that provides an environment for clients, IBM Business Partners, and IBM employees to meet, and to access knowledge, expertise, and innovation.

client certificate
A certificate that is presented by the client to a server prior to forming an active connection.

client channel definition table (CCDT)
A file that contains one or more client-connection channel definitions.

client configuration tool
A Notes application that connects a Notes client to a cloud mail server.

client-connection channel type
The type of MQI channel definition associated with an IBM MQ client. See also server-connection channel type.

client context

  1. A mapping from keys to values. If a provider returns a client context for a particular object, that context is merged with the context specified through setClientContext(), if any. The client context can then be tailored for the specific objects being processed.
  2. In the Distributed Computing Environment (DCE), the state within a Remote Procedure Call (RPC) server generated by a set of remote procedures and maintained across a series of calls for a particular client.

Client daemon
A daemon that manages network connections to CICS servers. It processes ECI, EPI, and ESI requests, sending and receiving the appropriate flows from the CICS server to satisfy the application requests. The Client daemon (process cclclnt) exists only on distributed platforms.

client domain
The set of drives, file systems, or volumes that the user selects to back up or archive data, using the backup-archive client.

client end node
An end node for which the network node provides network services.

client framework
A set of scripts that are deployed with a web application or mobile native application to capture user interactions on the client that would not otherwise require a server interaction. By capturing these user interface events, a client framework can provide unique insight into the activities of visitors within their browsing devices.

client group
A group of clients that specify the volumes that are backed up. Client groups can also include SQL and Exchange databases for backup, even if they span across multiple disk volumes.

Client Health Information Portal (CHIP)
A tool that measures the health of the Integrated Technology (ITD) account portfolio. Analogous to the tool that a manufacturing company would use to keep track of manufacturing a physical object, CHIP keeps track of services delivery quality at the client accounts.

client ID
See client identifier.

client identifier (client ID)
A piece of information that identifies an individual application. An application can invoke an API only if it passes an application key that is recognized by the IBM API Management system and is granted access to the API. The application key is passed by the client by using an HTTP query parameter.

client initialization file
A file containing configuration information used to inform the CICS Client of the CICS servers it can connect to, and the communication protocols to be used.

Client Input Output Sockets (CLIO/S)
A set of commands and APIs that can be used for high-speed communication and to access tape devices on a network of AIX workstations and MVS mainframes.

client journey
The stages a client experiences before, during, and after making a buying decision. The four stages of this journey are discovery, engagement, conversion, and advocacy.

client locale
The locale that a client application uses to perform read and write operations on the client computer. See also locale, server locale.

client logical partition
A logical partition that uses the I/O resources of another logical partition, for example, a logical partition that uses the resources of a Virtual I/O Server logical partition.

client message
A message from a client application that is to be sent by means of a network to its destination, or a message that is routed to a client application to acknowledge the receipt of a client message by a network.

client node

  1. In a single system image (SSI), a WebSphere Voice Response system that handles interactions with callers. A client node must have a telephony connection. It does not store application or voice data; it gets data from the server node of the SSI.
  2. A file server or workstation on which the backup-archive client program has been installed, and which has been registered to the server.

client node session
A session in which a client node communicates with a server to perform backup, restore, archive, retrieve, migrate, or recall requests. See also administrative session.

client option set
A group of options that are defined on the server and used on client nodes in conjunction with client options files.

client options file
An editable file that identifies the server and communication method, and provides the configuration for backup, archive, hierarchical storage management, and scheduling.

client pattern
A method to determine which clients to monitor, and how to group them for reporting.

client-polling scheduling mode
A method of operation in which the client queries the server for work. See also server-prompted scheduling mode.

client process
A process that requests services from a server process. See also server process.

client product key
The customer's unique SKU identifier for this product.

client program

  1. A program that uses a C++ class.
  2. In dynamic routing the application program, running in the requesting region, that issues a remote link request.
  3. In the client/server model, the front-end transaction.

client project for RuleApps
A predefined project for Eclipse that contains a class to execute a ruleset within a RuleApp.

client proxy
An object on the client side of a network connection that provides a remote procedure call interface to a service on the server side.

client reroute
A method that allows a client application, upon the loss of communication with a database server and the predefinition of an alternative server, to continue working with the original database server or the alternative server with only minimal interruption of the work.

client schedule
A database record that describes the planned processing of a client operation during a specific time period. The client operation can be a backup, archive, restore, or retrieve operation, a client operating system command, or a macro. See also administrative command schedule, central scheduler, schedule.

client secret
A piece of information that is used with an application key to verify the identity of an application. An API can be configured to require that client applications supply their application secret with their application key. The application secret functions effectively as a password known only to the application. The application secret is passed by the client using an HTTP query parameter.

client/server
Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server. See also distributed application.

client/server architecture
A hardware and software design that allows the user interface and database server to reside on separate nodes or platforms on a single computer or over a network. See also client application, server-processing locale.

client/server connection statement
An SQL statement that can connect to a database. These statements include CONNECT, DISCONNECT, and SET CONNECTION.

client side
In an ebMS exchange, the partner using the service, or a service user.

client-side
Pertaining to an operation that is performed on the client application and not on the server.

client-side authentication component
A component that collects client information, then uses login modules to verify this information.

client-side human service
A human service that runs in the web browser and can call the server to obtain data. A client-side human service can be used to implement an interactive task, a dashboard, or a user interface for a case or process instance that users can use to manage cases or processes in an application. See also heritage human service, human service.

Client Solutions Executive (CSE)
An executive member of the Strategic Sales team who is focused on both new logo and base growth opportunities, and is responsible for successfully selling large, complex services opportunities.

client state manager (CSM)

  1. A component of the client kernel that provides protocol support for the client.
  2. A station that consists of a control unit (a cluster controller) and the terminals attached to it.

client stub
In the Distributed Computing Environment (DCE), the surrogate code for a remote procedure call (RPC) interface that is linked with and called by the client application code. In addition to general operations such as marshaling data, a client stub calls the RPC runtime library to perform remote procedure calls and, optionally, to manage bindings.

client system-options file
A file, used on AIX, UNIX, or Linux system clients, containing a set of processing options that identify the servers to be contacted for services. This file also specifies communication methods and options for backup, archive, hierarchical storage management, and scheduling. See also client user-options file, options file.

client systems services
A broad set of capabilities integrating hardware, software and services to support user systems throughout the product lifecycle.

client tier
The client programs and consoles that are used for development, administration, and other tasks for the InfoSphere Information Server suite and product modules and the computers where they are installed.

client time

  1. The time that it takes to process and display a web page in a browser.
  2. The local time on a BigFix client's device.

client type detection
A process in which a servlet determines the markup language type required by a client and calls the appropriate JavaServer Pages file.

client user-options file
A file that contains the set of processing options that the clients on the system use. The set can include options that determine the server that the client contacts, and options that affect backup operations, archive operations, hierarchical storage management operations, and scheduled operations. This file is also called the dsm.opt file. For AIX, UNIX, or Linux systems, see also client system-options file. See also client system-options file, options file.

client value assessment (CVA)

client workstation
In the NetView Graphic Monitor Facility, a workstation that depends on a server workstation to provide it with views and status information. A client workstation receives status information from the server workstation over an LU 6.2 session.

Clinical Context Object Workgroup (CCOW)
A vendor independent standard, for the interchange of information between clinical applications in the healthcare industry.

CLIO/S
See Client Input Output Sockets.

CLIP
See calling line identification presentation.

clip
In computer graphics, to remove those parts of a display image that lie outside of a given boundary.

clipboard
An area of computer memory, or storage, that temporarily holds data. Data in the clipboard is available to other applications.

clipping

  1. In the GDDM function, the process of cutting off the image at the border of the display but allowing the coordinates of the lines to extend beyond.
  2. In computer graphics, removing those parts of display elements that lie outside of a given boundary.

clipping plane
In GL, primitive space that is mapped to normalized device coordinates before clipping occurs. The clipping planes x=+/-w; y=+/-w; or z=+/-w correspond to the left, right, top, bottom, near, and far planes bounding the viewing frustum.

clipping region
The image defined by the bitmap or rectangles used to restrict output to a particular region of a window.

CLI script
A script that manages filters and infosets within IBM StoredIQ Administrator.

CLIST
See command list.

clitic
A word that syntactically functions separately but is phonetically connected to another word. A clitic can be written as connected or separate from the word it is bound to. Common examples of clitics include the last part of a contraction in English 'wouldn't' or 'you're'.

cliticization
The process by which a complex word or expression is formed by attaching a clitic to another word. A common example of cliticization includes attaching a clitic to a verb, for example: "je t'aime" in French.

CLK
See clock.

CLM

  1. See Collaborative Lifecycle Management.
  2. See contract lifecycle management.

CL module
See control language module.

CLM project
A project that was created using IBM Collaborative Lifecycle Management tools.

CLNP
See connectionless-mode network protocol.

CLNS
See connectionless-mode network service.

CLNS path
In OSI, a path used when the connectionless-mode network service is used. Each CLNS path names data terminal equipment (DTE) to be used for outbound communication.

CLNS path maintenance
In OSI, an option of whether or not to maintain a CLNS path to an adjacent node permanently (until OSI Communications Subsystem is restarted), or release the path when no active CLNS connection uses it. These connections include both network management and directory service connections and connections between customer programs.

CLNS path set
In OSI, a path set used when the connectionless-mode network service is used.

cloaked item
An item whose existence is known to the user but whose information is hidden from the user. See also item, placeholder, signpost message.

cloak option
A customization option that restricts access to selected information in the cube. The cloak option removes a category and its descendants from a dimension, but summarizes the values in the ancestor categories.

CLOB
See character large object.

clobber
To delete a project and all of its associated jobs from the database.

clock (CLK)

  1. A device that generates periodic signals used for synchronization.
  2. In data communication, equipment that provides a time base used in a transmission system to control the timing of certain functions, such as sampling, and to control the duration of signal elements.

clock event
A special system event that is used to initiate a system-generated event.

clocking

  1. In communications, a method of controlling the number of data bits sent on a communications line in a specified time.
  2. In binary synchronous communication, the use of clock pulses to control synchronization of data and control characters.

clock time
The elapsed time in real time. Clock time differs from CPU time as thread switches and process context switches introduce uncertainty in performance calculation; clock time does not account for this execution behavior.

clone

  1. A copy of an application, created so that it can be customized while the original is retained.
  2. An identical copy of the latest approved version of a component, with a new unique component ID.
  3. A copy of a volume on a server at a particular point in time. The contents of the copy can be customized while the contents of the original volume are preserved.
  4. An identical copy of the data and configuration of a server at a particular point in time.
  5. In Git, a local copy of a repository, which can be edited offline, that is connected to and can be synchronized with the original remote version.
  6. To preserve the characteristics of the original but personalize instance-specific data. The result is a new instance of an entity (for example, of a virtual disk, a virtual computer system, or an operating system) rather than a backup of the original.
  7. To prepare a reference computer and create a system profile ready for deployment. See also unattended setup.
  8. In Git, to create a local copy of a repository, which can be edited offline, that is connected to and can be synchronized with the original remote version.
  9. An operation that enables an administrator to replicate profiles. This capability simplifies the task of creating multiple profiles with similar properties.

clone device
A STREAMS device that returns an unused major or minor device when initially opened, rather than requiring the minor device to be specified by name in the open call.

cloned IMSplex
A group of IMSs in a sysplex that share databases, queues, or both, and have identical resource definitions.

clone object
An object that is associated with a clone table, including the clone table itself and check constraints, indexes, and BEFORE triggers on the clone table.

clone table
A table that is structurally identical to a base table. The base and clone table each have separate underlying VSAM data sets, which are identified by their data set instance numbers. See also base table.

close

  1. To end an activity and remove that window from the display.
  2. To end processing by ending the connection between the file and a program.

closed application
An application that requires exclusive use of certain statements on certain DB2 objects, so that the objects are managed solely through the external interface of that application.

closed-circuit television (CCTV)
The use of video cameras to transmit a signal to a specific place, on a limited set of monitors.

closed registration
A registration process in which only an administrator can register workstations as client nodes with the server. See also open registration.

closed system
A system whose characteristics comply with proprietary standards and that therefore cannot readily be connected to other systems.

closed user group (CUG)
In data communication, a group of users who can communicate with other users in the group, but not with users outside the group. A data terminal equipment (DTE) may belong to more than one closed user group. See also bilateral closed user group.

closed workstation
A workstation that is unavailable to process work for a specific time, day, or period.

closeness
A measure of how quickly an entity can use links to get access to other entities on an association chart. Closeness is one of the centrality measures used in social network analysis. See also centrality.

close time
The time that is required to close an access item.

closing version
A reporting version that contains the reported values for a given period, plus one or more journal types.

closure line
In the GDDM function, a line added by the system to enclose an area being filled with a pattern, in instances when the routines that precede the GSENDA routine fail to form an enclosed area.

cloud
A network that delivers requested virtual resources as a service.

Cloud, Analytics, Mobile, and Social (CAMS)
See Cloud, Analytics, Mobile, Social, and Security.

Cloud, Analytics, Mobile, Social, and Security (CAMSS)
The third platform technologies that enable digital transformation, evolution, and expansion.

cloud application
An application that is extended to be accessible through the Internet. Cloud applications use large data centers and powerful servers that host web applications and web services.

cloud client
Software or hardware that is designed to deliver cloud services, or that relies on cloud computing to operate.

cloud computing
A computing platform where users can have access to applications or computing resources, as services, from anywhere through their connected devices. A simplified user interface or application programming interface (API), or both, makes the infrastructure supporting such services transparent to users. See also off-premises.

Cloud Computing Reference Architecture (CCRA)
A blueprint for IBM development teams and field practitioners to design public and private clouds.

cloud-container storage pool
A storage pool that a server uses to store data in cloud storage. The cloud storage can be located on premises or off premises. See also container storage pool, directory-container storage pool, storage pool.

cloud deployment
The process of installing and configuring a software application and all of its components onto a virtual server. See also deployment.

cloud discovery service
The component that provides information about available cloud resources, such as images and security groups, to the blueprint designer. See also blueprint design server, blueprint designer.

cloud-enabled
Pertaining to a model or implementation of a public, private, or hybrid cloud environment.

cloud enablement
In CICS, packaging a CICS application to use in a CICS cloud environment for deployment in a platform. Resources that comprise a CICS application are packaged into an application bundle to deploy, manage, and monitor the application as a single entity.

Cloud Foundry
An open platform-as-a-service (PaaS) composition technology that supports a choice of clouds, developer frameworks and application services. Cloud Foundry makes it faster and easier to build, test, deploy and scale applications.

cloud group
A collection of hypervisors from a single vendor.

cloud image
An information technology (IT) resource that can be provisioned for use on a cloud.

cloud infrastructure
See infrastructure as a service.

cloud instance
A piece of software or other information technology (IT) resource running on a cloud. Cloud instances are software instances created from cloud images.

cloud-oriented architecture (COA)
The design and optimization of architecture for use in cloud computing environments.

cloud platform
A model of production, integration, and distribution of IT services used to build, run and deliver applications through a hybrid cloud. A cloud platform provides customers with needed storage, compute, development, and analytics capabilities without the cost and complexity of acquiring and managing the underlying hardware and software directly. It combines the ability to access, integrate and develop services using both structured and unstructured data, across a variety of hybrid environments.

cloud portability
The ability to move applications and services across public or private cloud computing environments, or from different cloud providers.

cloud project
A functional ID with access to a cloud system. By accessing this cloud project, users can work with this functional ID to request cloud services that might not be available to their personal ID.

cloud provider
An organization that provides cloud computing resources.

cloud request
A description of resources to be provided by a cloud. Typically, a cloud request consists of a list of cloud images to be provided by the cloud and information about how those cloud instances are to be configured.

cloud service
A service that provides software that is accessed on servers on the Internet rather than on on-premises servers at a company site.

cloud service provider (CSP)
A service provider that offers storage or software services or solutions through a public, private, or hybrid cloud.

cloud storage
A storage resource provided by a cloud, or the storage of data on virtual public or private servers in the cloud.

cloud video platform
A platform that is built specifically to help companies deliver video and analyze the data generated from viewers.

CLP

  1. See communication line processor.
  2. See command line processor.
  3. See container load plan.
  4. See current line pointer.

CLPA
See create link pack area.

CL procedure
See control language procedure.

CL program
See control language program.

CLR
See common language runtime.

CLSID
See class identifier.

CLU
See control logical unit.

club card
See loyalty card program.

CLUSRCVR
See cluster-receiver channel.

CLUSSDR
See cluster-sender channel.

cluster

  1. A group of servers connected by a network and configured in such a way that if the primary server fails, a secondary server takes over.
  2. Two or more connected copies of Sterling B2B Integrator that share a database.
  3. A group of appliances in which one appliance acts as the central appliance, and the other appliances act as its clients.
  4. In IBM System Storage DS8000, a partition capable of performing all DS8000 series functions. With two clusters in the DS8000 storage unit, any operational cluster can take over the processing of a failing cluster.
  5. A group of application servers that collaborate for the purposes of workload balancing and failover.
  6. In Storwize® V7000, a pair of nodes that provides a single configuration and service interface.
  7. A set of independent systems or logical partitions (called nodes) that are organized into a network for the purpose of sharing resources and communicating with each other.
  8. In SNA, a group of stations that consist of a controller (cluster controller) and the workstations attached to it.
  9. A collection of one or more servers within a cloud that provide a specific function.
  10. A set of independent systems or nodes that are organized into a network. The purpose of the cluster is to define a set of resources, nodes, networks, and storage devices that will keep applications highly available.
  11. A related set of search results and their associated online resources that is automatically created.
  12. See clustered system.
  13. A group of two or more Domino servers that provides users with constant access to data, balances the workload among servers, improves server performance, and maintains performance when the size of an enterprise increases.
  14. A group of computers and other resources that operate together as a single system. See also clustered system, GPFS cluster.
  15. A loosely coupled collection of independent systems (or nodes) organized into a network for the purpose of sharing resources and communicating with each other. See also GPFS cluster.
  16. A group of entities that have more connections to each other than to entities outside the group.
  17. In Microsoft Cluster Server, a group of computers, connected together and configured in such a way that, if one fails, MSCS performs a failover, transferring the state data of applications from the failing computer to another computer in the cluster and reinitiating their operation there.
  18. A data set defined to VSAM. A cluster can be a key-sequenced data set, an entry-sequenced data set, or a relative record data set.
  19. In IBM MQ, a group of two or more queue managers on one or more computers, providing automatic interconnection, and allowing queues to be advertised among them for load balancing and redundancy.
  20. A collection of complete systems that work together to provide a single, unified computing capability.

Cluster Aware AIX (CAA)
A technology that builds clustering capabilities into the AIX operating system. This built-in clustering support provides commands and programming APIs to create a cluster from a group of AIX instances. CAA provides kernel-based heartbeat, monitoring, and event infrastructure.

cluster base table
In the Netezza database, a table that is organized on one to four columns, which collocates rows of the table in the same disk extents to improve query performance.

cluster caching facility (CF)
A subsystem, typically on a dedicated computer or LPAR, that assists in global locking and group buffer pool management for a DB2 pureScale instance on Linux and AIX operating systems. See also preferred primary cluster caching facility, primary cluster caching facility, secondary cluster caching facility.

cluster collection store
The set of machines on which the shards that are associated with a search collection are physically located. See also search collection, shard.

cluster configuration
A user definition of all cluster components. Component information is stored in the ODM. Components include cluster name and ID, and information about member nodes, network interface, and network modules. See also dynamic automatic reconfiguration.

cluster configuration data
The configuration data that is stored on the cluster configuration servers.

cluster configuration database
See Object Data Manager.

cluster controller
A device that can control the input/output operations of more than one device connected to it.

cluster domain
A virtual collection of physical elements such as computer systems and logical elements such as software instances that can provide services to a client as a single unit. See also cluster domain node.

cluster domain node
A physical element such as a computer system or a logical element such as a software instance in a cluster domain. See also cluster domain, management server domain, peer domain.

clustered hash table
A mechanism to enable the replicating and sharing of data between cluster nodes.

clustered index
An index whose sequence of key values closely corresponds to the sequence of rows stored in a table. The degree of correspondence is measured by statistics that are used by the optimizer.

clustered system
A collection of nodes that are placed in pairs (I/O groups) for redundancy, which provide a single management interface. See also cluster, GPFS cluster, system.

clustered trivial database (CTDB)
A cluster implementation of the trivial database (TDB) used by Samba and other projects to store temporary data.

cluster entry
A catalog entry that contains the following information about a key-sequenced or entry-sequenced Virtual Storage Access Method (VSAM) cluster: ownership, cluster attributes, and the cluster's passwords and protection attributes. A key-sequenced cluster entry points to both a data entry and an index entry; an entry-sequenced cluster entry points to a data entry only. See also alternate-index entry.

cluster environment

  1. A topology in which an application server is defined over several machines or CPUs. See also horizontal clustering, vertical clustering.
  2. See cluster configuration.

cluster event
Any state change in a resource that is defined to a cluster. A cluster event can be informational, such as a join adapter event which indicates that a failed adapter is now functional, or the event can be part of a recovery process, such as a node down event which includes the takeover of resources by a backup node. See also node down, node up.

Cluster feature
A feature that provides four cable connections and allows up to four work stations to be attached to a 5251 Model 12 Display Station.

cluster hardware
Hardware that is included in the cluster, such as disks and disk devices, processors, network interfaces, and networks.

cluster information base (CIB)
A replicated store of cluster-related information. It typically includes static configuration data which defines the resources, cluster nodes, and constraints (or dependencies) in the cluster, as well as information about the current state of the cluster.

clustering

  1. The process of grouping records together based on similarity. Similar records are labeled according to their group, so there is no predefined target field for the model to predict.
  2. The ability to group independent systems to work together as a single system.

clustering block index
See dimension block index.

clustering index
An index that determines how rows are physically ordered (clustered) in a table space. If a clustering index on a partitioned table is not a partitioning index, the rows are ordered in cluster sequence within each data partition instead of spanning the partitions.

cluster interconnect netname
The IP address or host name of the interconnect used for high-speed communication between members, or between members and cluster caching facilities, in a DB2 instance.

cluster joining
The process whereby additional nodes join an existing cluster when they can communicate with another active clustered node and can validate the node name and version compatibility.

cluster log
A log that maintains a history of routine activities and error conditions that are generated by all metadata servers in the cluster.

cluster manager

  1. The node that monitors node status using disk leases, detects failures, drives recovery, and selects file system managers. The cluster manager is the node with the lowest node number among the quorum nodes that are operating at a particular time.
  2. A software daemon that runs on every node in the cluster and is responsible for responding to failures and coordinating recovery actions.

cluster member
An identically configured copy of an object, such as an application server. Cluster members can be used for workload management purposes, for example, to support horizontal scaling and vertical scaling.

cluster membership list
A set of cluster nodes that have been configured for a cluster.

cluster name
A user-defined ASCII text string that uniquely identifies a cluster in a system.

cluster node
A system that is a member of a cluster. See also local node, remote node, system.

cluster processor complex (CPC)
The unit within a cluster that provides the management function for the ESS. It consists of cluster processors, cluster memory, and related logic.

cluster profile record (CPR)
A set of data that describes the VSAM data sets of various control-interval sizes for the storage of documents.

ClusterProven
An IBM designation that defines certain high-availability requirements that are applied to a software product either by itself or in combination with other software products. A solution that satisfies the technical criteria of these requirements can be validated with IBM and licensed to be marketed with IBM's ClusterProven trademark.

cluster queue
A local queue that is hosted by a cluster queue manager, and defined as a target for messages being put from an application connected to any queue manager within the cluster. All applications retrieving messages must be locally connected.

cluster queue manager
A queue manager that is a member of a cluster. A queue manager can be a member of more than one cluster.

cluster-ready hardware server (CRHS)
A software component that provides management subsystem communication and methods for discovering components within a management subsystem.

cluster-receiver channel (CLUSRCVR)
A channel on which a cluster queue manager can receive messages from other queue managers in the cluster, and cluster information from the repository queue managers.

cluster resource
Any part of the system that is available across multiple cluster nodes. The two types of system resources that can be resilient are the following: Objects that are kept up to date by using replication. A resilient application and its associated IP address, which can be switched.

cluster resource group (CRG)
A collection of related cluster resources that defines actions to be taken during a switchover or failover operation of the access point of resilient resources. The group describes a recovery domain and supplies the name of the cluster resource group exit program that manages the movement of an access point.

cluster resource group manager (CRGM)
A highly available client application that uses the integrated cluster resource services to configure, define, monitor, and administer a cluster of systems.

cluster resource service
An i5/OS system service function that supports cluster implementations.

cluster-root container
A special container that is the root of the global file system.

cluster-sender channel (CLUSSDR)
A channel on which a cluster queue manager can send messages to other queue managers in the cluster, and cluster information to the repository queue managers.

cluster service
A Windows (TM) service that manages the cluster specific activities and is installed on each node of the cluster. The components of the Cluster service provide high availability, easy management and enhanced scalability for Windows.

cluster services
The high availability services, such as the cluster manager and other services running on the nodes, that monitor the cluster resources. The resources and data maintained on the cluster for access by clients and their applications are cluster services.

cluster snapshot
An ASCII file containing a record of the data that defines a particular cluster configuration. Applying a cluster snapshot can save and restore a particular cluster configuration.

cluster split event
An event that occurs when one or more nodes that are actively running cluster services cannot communicate with other nodes that are also running cluster services.

cluster storage subsystem
A group of clusters where each cluster consists of one or more logical partitions that have a shared storage pool.

Cluster Systems Management (CSM)
Systems management software that is designed to scale to large-size clusters.

cluster takeover
The process of the DB2 product taking over the ownership of a user-managed GPFS cluster.

cluster template
A template that defines the tiers for a cluster in a system. Tiers work together to create a cluster for a specific application environment, for example a GPFS application environment.

cluster topic
An administrative topic that is defined on a cluster queue manager and made available to other queue managers in the cluster.

cluster transmission queue
A transmission queue that holds all messages from a queue manager destined for another queue manager that is in the same cluster. The queue is called SYSTEM.CLUSTER.TRANSMIT.QUEUE.

cluster virtual IP address
An IP address that is shared between the primary or secondary host and the HA cluster.

cluster VLAN
The virtual LAN that connects nodes to each other and to the management server through an Ethernet connection. Installation and administration tasks are done on the cluster VLAN.

CLUT
See color lookup table.

CLV
See customer lifetime value.

CL variable
See control language variable.

CM

  1. See Content Manager.
  2. See conversion mode.
  3. See configuration management.

cm
See centimeter.

CM*

  1. See conversion mode.
  2. See conversion mode*.

CMAS
See CICSPlex SM address space.

CMAS link
A communications link between one CICSPlex SM address space (CMAS) and another CMAS or a remote managed application system (remote MAS). CMAS links are defined when CICSPlex SM is configured.

CMC

  1. See Common Messaging Call.
  2. See communication management configuration.

CMDB
See Configuration Management Database.

cmdlet
In the Windows PowerShell environment, a single function command-line tool that can be called directly from the command line in the shell and run under the context of the shell, not as a separate process.

CMI
See control message interface.

CMIP
See Common Management Information Protocol.

CMIP services
The VTAM implementation of the Common Management Information Protocol (CMIP), which provides a common set of program services for application programmers to use in writing CMIP application programs. These services include controlling associations, converting basic encoding rules (BER) syntax, and validating protocols.

CMIS

  1. See Content Management Interoperability Services.
  2. See common management information service.

CM item
See configuration-managed item.

CMM

  1. See common management model.
  2. See common MPTN manager.

CMOS
See complementary metal-oxide semiconductor.

CMOT
See Common Management Information Protocol over TCP/IP.

CMP
See container-managed persistence.

CMPI
See Common Manageability Programming Interface.

CMRO task
See cross-memory resource-owning task.

CMS

  1. See Conversational Monitor System.
  2. See Central Message Store.
  3. See configuration management system.

CMS extended parameter list
A type of parameter list available in the CMS environment consisting of a string composed exactly as the user typed it at the terminal. There is no tokenization performed on the string.

CMS tokenized parameter list
A type of parameter list available in the CMS environment consisting of 8-byte tokens, which are folded to uppercase and end with a double word of FF.

CMVC
See Configuration Management and Version Control.

CNAME record
An entry in the Domain Name System that is used to define a host name alias for an Internet domain. The ability to create the record can be used to prove ownership of a domain.

CNM
See communication network management.

CNMI
See communication network management interface.

CNN
See composite network node.

CNOS
See change number of sessions.

CNT
See communication name table.

CO

  1. See configuration object.
  2. See central office.

COA

  1. See cloud-oriented architecture.
  2. See chart of accounts.

coach
A user interface, such as screens or forms, that process authors create to collect input from users that is required for an underlying service.

coach view
A reusable unit used in coaches and other coach views to generally define the user interface for a particular type of data. Coach views are responsive and run on multiple device types, such as mobile and desktop devices.

coalescing interval
The interval at which events are bundled. Event bundling occurs in 10 second intervals and begins with the first event that does not match any currently coalescing events. Within the coalescing interval, the first three matching events are bundled and sent to the event processor.

COA report
See confirm-on-arrival report.

coarse-grained
Pertaining to viewing a group of objects from an abstract or high level. See also fine-grained.

coated paper
Paper to which a surface coating is applied to make it smooth.

coattailing
The concept of VTAM's writing PIUs to NCP and reading PIUs from NCP with a single channel program. The values coded for the DELAY keywords on the VTAM PCCU definition statement and the NCP LINE definition statement affect the degree of coattailing. A user can increase the probability of VTAM's writing and reading PIUs with a single channel program by adjusting these DELAY keywords. An increase in the degree of coattailing improves channel efficiency but may increase response time.

coaxial cable
A cable consisting of one conductor, usually a small copper wire, within and insulated from another conductor of larger diameter, usually copper tubing or copper braid.

COBOL
See Common Business Oriented Language.

COBOL character
Any of the 51 characters of the COBOL character set.

COBOL run unit
A COBOL-specific term that defines the scope of language semantics. A COBOL run unit is equivalent to a Language Environment enclave.

COBOL word
In COBOL, a character string of not more than 30 characters that forms a user-defined word, a system-name, or a reserved word.

COBPACK
A collection of individual modules that are packaged into a single load module in order to reduce the time that would otherwise be needed to load the individual load modules.

cobrowsing
The interaction of multiple users sharing information about their individual web interactions. With this interaction users can share a view of the same web page simultaneously and share further interactions with the web page they are jointly viewing.

COC
See center of competency.

CoD
See capacity on demand.

COD

  1. See confirm on delivery.
  2. See confirmation of delivery.

Codabar
A bar code symbology characterized by a discrete, self-checking, numeric code with each character represented by a stand-alone group of four bars and the three spaces between them.

CODASYL
See Conference on Data Systems languages.

code

  1. To write instructions for the computer; to program.
  2. See auto requisition ID.
  3. A set of instructions for a computer.
  4. A system of bit patterns to which a specific graphic or a control meaning has been assigned.
  5. A representation of a condition, such as an error code.
  6. A number that uniquely identifies a catalog entry in the WebSphere Commerce system. A product code is used as the prefix for creating individual SKU codes.

Code 128
In architecture, a bar code symbology characterized by a variable-length, alphanumeric code with 128 characters.

Code 39
A bar code symbology characterized by a variable-length, bidirectional, discrete, self-checking, alphanumeric code. Three of the nine elements are wide and six are narrow. It is the standard for LOGMARS (the U.S. Department of Defense) and the AIAG.

code assist
See content assist.

codebase
Works together with the code attribute in the APPLET tag to give a complete specification of where to find the main applet class file: code specifies the name of the file, and codebase specifies the URL of the directory containing the file.(Sun)

codec

  1. A technology that compresses and decompresses data for the purpose of reducing the bandwidth required to send streaming data.
  2. A program that can encode and decode a digital data stream or signal. In mobile computing, there are separate codecs for multimedia processing and voice processing.

code churn
A report that shows the volume of changes in a project over time.

code completion
A feature of many IDEs and text editors that predictively completes content (words, phrases, tags, and so on) while the user types.

coded character
A control or graphic character with its assigned code point.

coded character set (CCS)
A set of unambiguous rules that establishes a character set and the one-to-one relationships between the characters of the set and their coded representations. See also invariant character set.

coded character set identifier (CCSID)
A 16-bit number that includes a specific set of encoding scheme identifiers, character set identifiers, code page identifiers, and other information that uniquely identifies the coded graphic-character representation. See also binary string.

coded character set identifier 65534 (CCSID 65534)
The coded character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 (X'FFFE') is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs that are tagged for each individual field it contains. If the field is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.

coded character set identifier 65535 (CCSID 65535)
An identifier that is used to show that the associated data should not be processed as coded-graphic-character data. CCSID 65535 ( FFFF ) cannot be represented in long form. Data that is associated with CCSID 65535 should be interpreted as actual representation is unknown as defined in Character Data Representation Architecture-Level 2, IBM Registry. You cannot convert data that is associated with CCSID 65535 from one CCSID to another. The coded character set identifier (CCSID) that is used to show that data associated with the CCSID should not be processed as coded-graphic-character data.

coded font
In AFP support, a font file that associates a code page and a font character set. For double-byte fonts, a coded font associates multiple pairs of code pages and font character sets.

coded font local identifier
A 1-byte identifier that the Map Coded Font structured field assigns to each coded font it selects. The identifier is then specified in the text-control sequence that precedes the string of text to be printed with the particular font. See also local identifier.

coded font section
A font character set and code page pair. A single-byte coded font consists of only one coded font section; a double-byte coded font can consist of more than one.

coded graphic character
A graphic character that has been assigned one or more code points within a code page.

coded graphic character set
A set of graphic characters with their assigned code points.

coded graphic character set global identifier (CGCSGID)
A 4-byte binary or a 10-digit decimal identifier consisting of the concatenation of a GCSGID and a CPGID. The CGCSGID identifies the code point assignments in the code page for a specific graphic character set, from among all the graphic characters that are assigned in the code page.

coded graphic character-set ID
A 10-digit identifier (two 5-digit identifiers separated by a space) that is the combination of a graphic character-set ID and a code-page ID. See also code page ID.

coded image
In computer graphics, a representation of a display image in a form suitable for storage and processing.

code division multiple access (CDMA)
The term that is generally used to reference a type of 2G cellular network (standardized by IS-95). See also 2G, Global System for Mobile Communications, IS-95.

coded overlay
An overlay loaded in a printer in a coded format, rather than as a raster pattern. See also raster pattern overlay.

code element set
The result of applying rules that map a numeric code value to each element of a character set. An element of a character set may be related to more than one numeric code value but the reverse is not true. However, for state-dependent encodings the relationship between numeric code values to elements of a character set may be further controlled by state information. The character set may contain fewer elements than the total number of possible numeric code values; that is, some code values may be unassigned. X/Open.

code extension method
A method prescribed in an encoding scheme for representing characters that cannot be accommodated within the limits of the basic structure of the code. It prescribes a method to alter the interpretation of one or more code points that follow a prescribed single control character or a control sequence.

code generation template
The mixed-mode source file that is used by a generic operator to generate specific customizations. See also generic operator.

code generator
The part of the compiler that physically generates the object code.

code group
In a computer security code system, an apparently meaningless sequence of letters, digits, or both, that represents a plaintext element, which may be a word, phrase, or sentence.

code injection
A technique that introduces new code into an application. Code injection can be used by an attacker to introduce code into a computer program to change the course of execution.

code list

  1. A list that contains codes corresponding to the services provided by service providers.
  2. One or many dynamic pairs of code values that contains sender code and receiver code. Each code pair has one description and up to four additional codes relating to the pair.

code list table
A repository for lists of codes that can further define fields.

code load
In System Manager, the type of product load that contains all of the product code that does not require translation to other languages, such as the code for displays, menus, and messages. However, if a product is never going to be translated, the code may contain all the product code.

code page

  1. A specification of code points from a defined encoding structure for each graphic character in a set or in a collection of graphic character sets. Within a code page, a code point can have only one specific meaning. See also invariant character set.
  2. A particular assignment of code points to graphic characters. Within a given code page, a code point can have only one specific meaning. A code page also identifies how undefined code points are handled. See also code point.
  3. An ordered set of up to 256 predefined display symbols. The first 32 code points of each code page are reserved for control codes and are the same for all code pages, leaving up to 224 distinct display symbols per page.
  4.  

code page global identifier (CPGID)
A 5-digit decimal or 2-byte binary identifier that is assigned to a code page. The range of values is 00001 to 65534 (X'0001' to X'FFFE').

code page ID
A 5-digit registered identifier used to specify a particular assignment of code points to graphic characters. The code-page ID is the second part of the QCHRID system value or the CHRID parameter value. See also coded graphic character-set ID.

code point

  1. In QoS, pertaining to a specific value in the Differentiated Services field of a data packet that signals to a network the behavior that is assigned to that packet.
  2. An identifier in an alert description that represents a short unit of text. The code point is replaced with the text by an alert display program.
  3. A unique bit pattern defined in a code. Depending on the code, a code point can be 7-bits, 8-bits, 16-bits, or other. Code points are assigned graphic characters in a code page.
  4. A unique bit pattern that represents a character in a code page. See also code page.
  5. For SNA alerts, a 1-or 2-byte hexadecimal code that designates a particular piece of text to be displayed at the focal point.

code respect
In programming, a feature that preserves the order of elements in the original code structure during code generation.