A B C D E F G H I J K L M N O P Q R S T U V W X Y and Z Special characters and Numerics

This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.


An enhancement of the C language that adds features supporting object-oriented programming.

C++ language
An object-oriented high-level language that evolved from the C language. C++ takes advantage of the benefits of object-oriented technology such as code modularity, portability, and reuse.

C++ library
A system library that contains common C++ language subroutines for file access, memory allocation, and other functions.

A level of security defined in the Trusted Computer System Evaluation Criteria (TCSEC) published by the United States Government. To meet C2 requirements, a system must perform discretionary access control, authentication and verification, object reuse protection, and auditing of security-relevant events.

See Click-to-Action.

C/370 common anchor area (C-CAA)
A common anchor area (CAA), specific to the C/370, in the runtime environment.

A rule induction algorithm that builds either a decision tree or a rule set. The model works by splitting the sample based on the field that provides the maximum information gain at each level. See also rule induction.


  1. See certificate authority.
  2. See channel adapter.
  3. See control area.
  4. See change accumulation.


  1. See common anchor area.
  2. See Cluster Aware AIX.

A physical medium for transmitting signals. Cables include copper conductors and optical fibers.

cable modem
A modem that provides Internet access over cable TV networks (which use fiber-optic or coaxial cables). A cable modem is generally faster than a modem that uses phone lines.

cable path
A series of cables connected in sequence.

cable segment
A section of cable between components or devices on a network. A segment may consist of a single patch cable, multiple patch cables that are connected to one another, or a combination of building cable and patch cables that are connected to one another.

Pertaining to a function or feature of a display station that allows multiple work stations to be attached to one cable path.

CA certificate
See certificate authority certificate.


  1. A buffer that contains frequently accessed instructions and data; it is used to reduce access time.
  2. To place a duplicate copy of a file on random access media when the server migrates a file to another storage pool in the hierarchy.
  3. Storage used to improve access times to instructions, data, or both. For example, data that resides in cache memory is normally a copy of data that resides elsewhere in slower, less expensive storage, such as on a disk or on another network node.
  4. To place, hide, or store frequently used information locally for quick retrieval.
  5. Memory used to improve access times to instructions, data, or both. Data that resides in cache memory is normally a copy of data that resides elsewhere in slower, less expensive storage, such as on a disk or on another network node.

cache coherency
Consistency of data in caches on multiple processors so that changing a single cache line does not create inconsistent versions of the cache line in the different caches.

cached inventory
Products that have their information, such as item attributes, inventory balance, or availability, stored in a local data cache. The consuming application, such as a web store, can access the information from the cache, reducing synchronous queries to the order management system.

cache eviction
A process by which data associated with a file is removed from the cache system. The data is removed either by using a Least Recently Used (LRU) algorithm when configured General Parallel File System (GPFS) hard or soft quota limits are exceeded or by issuing a command. When referenced again in the cache system, the data that is associated with the file is retrieved from the home system.

cache fast write
A storage control capability in which data is written directly to cache without using nonvolatile storage. Cache fast write is useful for temporary data or data that is readily re-created. See also DASD fast write.

cache file
A snapshot of a logical volume created by Logical Volume Snapshot Agent. Blocks are saved immediately before they are modified during the image backup and their logical extents are saved in the cache files.

cache grid
The cache memory that is used instead of a database for quicker access to data during operations.

cache hit

  1. A processor storage reference that is satisfied by information from a cache.
  2. An event that satisfies a read operation by retrieving data from cache instead of retrieving it from the intended storage or a lower level of cache. See also cache miss.

cache instance resource
A location where any Java Platform, Enterprise Edition (Java EE) application can store, distribute, and share data.

cache line

  1. A record that contains relevant information about the user data that is currently in the subsystem cache memory. Examples of this information include the current state of the data and the intended location of the data on one or more disks.
  2. The cache component that is normally loaded, stored, and interrogated during cache lookup.

cache miss

  1. A delay that occurs when the processor references data or instructions that are not already in the data cache or instruction cache.
  2. An event that satisfies a read operation by retrieving data from the intended storage or a lower level of cache because the requested data is not available in the only level or a higher level of cache. See also cache hit.

cache replication
The sharing of cache IDs, cache entries, and cache invalidations with other servers in the same replication domain.

cache set
A storage-class parameter, defined in the base configuration information, that maps a logical name to cache structure names in a coupling facility (CF).

cache structure
A coupling facility structure that stores data that can be available to all members of a Sysplex. A DB2 data sharing group uses cache structures as group buffer pools. See also group buffer pool.

cache table
In a federated system, a logical table object that is used to cache data from a data source table. A cache table comprises a nickname that identifies the data source table, one or more materialized query tables, and a schedule for replicating the data in each materialized query table.

cache timeout
The length of time that is allowed to pass before the cache is updated.

The process of storing frequently used results from a request to memory for quick retrieval, until it is time to refresh the information. The DB2 database manager provides many forms of caching, such as directory caching, package caching, file system caching, and LDAP caching.

caching I/O group
The I/O group in the system that performs the cache function for a volume.

caching proxy server
A proxy server that stores the documents that it retrieves from other servers in a local cache. The caching proxy server can then respond to subsequent requests for these documents without retrieving them from the other servers. This can improve response time.

See client acceptor daemon.

The modulated and rhythmic recurrence of an audio signal. For example, a series of beeps or a series of rings.

See call attachment facility.

See I/O cage.

CA key
See command attention key.

See customer acceptance laboratory.

calc script
See calculation script.

calculated category
A category created based on a calculation. Calculated categories become part of the cube and can be applied to any measure.

calculated column
A column whose values are calculated from other columns, calculated columns, functions, and constants to derive new data for a model.

calculated expression
An expression that is not constant, but whose value depends upon other values. To be evaluated, a calculated expression must obtain and compute values from other sources, normally in other fields or rows.

calculated measure
A measure whose values are calculated from other measures, calculated measures, functions, and numeric constants in an arithmetic equation.

calculated member
A member of a dimension whose measure values are not stored but are calculated at run time using an expression. See also input member.


  1. The process used to transform a series of records into a new result. Typically a calculation is mathematical, but may also include sorting, shifting, or adding to a prior result. Calculations enable the model admin to select records from their source data, perform operations on the data, segment results, and begin another calculation based on those results.
  2. An equation within a database outline, a calculation script, or a report script that is used to determine a value for a particular member or point in a report.

calculation account
An account used for calculating rations and formulas in reports. The abbreviation for calculation account is CALC account.

calculation code
A code associated with order items, catalog entries, or catalog groups to specify how discounts, shipping charges, sales or use taxes, and shipping taxes should be calculated.

calculation framework
A flexible, generic framework provided by the WebSphere Commerce order subsystem, used to implement calculations and apply them to the applicable business objects.

calculation method
A reference task command that implement parts of calculation framework.

calculation rule
A rule that defines how a calculation will be done.

calculation scale
A set of ranges that can be used by a calculation rule. For example, for shipping charges, there can be a set of weight ranges that each correspond to a particular cost. That is, a product that weighs between 0 to 5 kg might cost $10.00 to ship, while a product weighing 5 to 10 kg might cost $15.00 to ship.

calculation script (calc script)
A text file that contains instructions for how specified data sets within a database should be calculated.

calculation specification
In RPG, a specification on which the programmer describes the processing to be done by the program.

calculation strategy
The strategy used to calculate the final score of a scorecard table.

calculation usage
A type of calculation that the calculation framework performs.


  1. A view in the Notes mail database that can be used to manage time and schedule meetings. Users can add appointments, meetings, reminders, events, and anniversaries to the Calendar view.
  2. A list of scheduling dates. Calendars are defined in the database and are mostly assigned to run cycles. Calendars can be used either to identify the dates when job streams or jobs can be run (when used with inclusive run cycles), or when they cannot be run (when used with exclusive run cycles). A calendar can also be designated for use as a non-working days calendar in a job stream. See also exclusive run cycle, holidays calendar, iCalendar, inclusive run cycle, non-working days calendar.

calendar exception
A partial or full day during which a resource does not work on a project

Software that provides users with the ability to schedule appointments and view contacts. Calendaring software generally works in accordance with other time management software and can be synchronized with additional devices (such as smartphones). See also synchronize.

calendar schedule
A schedule that defines both the days and time that processing occurs. For example, one could use a calendar schedule to make sure that a process runs every Tuesday starting between 19:00 and 19:30 and ending between midnight and 00:30.

A process to make paper smooth or glossy by passing it through a series of metal rollers during the last steps of a paper-making machine.

calender cut
Slits, glazed lines, or discolored lines across paper caused when wrinkles pass through the calender rolls.


  1. The comparison and adjustment of an instrument to a standard of known accuracy.
  2. In capacity planning, the process of refining a model so that it represents the system the user is modeling. The predicted and measured values should match as closely as possible, with no more than a 10% difference for resource utilization, and no more than a 20% difference for response times.

calibration drift
The difference between the as left value of the previous measurement compared to the as found value of the current measurement for an asset.

calibration point
The calibration requirement for each asset function.

The thickness of forms, usually expressed in thousandths of an inch.


  1. To start a program or procedure, usually by specifying the entry conditions and transferring control to an entry point.
  2. A single runtime instance of a voice application.
  3. A physical or logical connection between one or more parties in a telephone call.

callable interface

  1. The application server to which the QMF session is currently connected. After the connection is made, this server processes all SQL statements.
  2. The name of the interface program, the definition of the arguments passed to the interface program, and the definition of the data structures passed to the interface program.
  3. In query management, the Common Programming Interface (CPI) that includes the definitions of the control blocks and constants used for the interface. See also command interface.

callable service

  1. A set of documented interfaces between the z/OS operating system and higher level applications that want to access functions specified in the Single UNIX Specification and earlier standards. See also system call.
  2. A program service provided through a programming interface. See also action service.
  3. Services that are provided by IMS for use by IMS exit routines. These services provide clearly defined interfaces that allow exit routines to request various functions, such as acquiring storage or finding an IMS control block.

call-accepted packet
A call supervision packet that a called data terminal equipment (DTE) transmits to indicate to the data circuit-terminating equipment (DCE) that it accepts the incoming call. See also call connected packet, call request packet.

call attachment facility (CAF)
A DB2 for z/OS attachment facility for application programs that run in TSO or z/OS batch. The CAF is an alternative to the DSN command processor and provides greater control over the execution environment. See also Resource Recovery Services attachment facility.

call back
To invoke a callback or upcall.


  1. In the AIX operating system, a procedure that is called if and when certain specified conditions are met.
  2. A way for one thread to notify another application thread that an event has happened.
  3. A message consumer or an event handler routine.
  4. Pertaining to a characteristic that tells a remote system whether the local system it tries to access will verify its identity.

callback function
Executable code that allows a lower-level software layer to call a function defined in a higher-level layer.

callback handler
A mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the web service security run time for propagation in the web service security header.

callback mechanism
A method for authentication of a voice user who is requesting a system API. This mechanism places a callback request to VoiceLogistics Pro (VLP) to verify whether the user is logged into VLP.

callback registration
The identification and registration of a callback routine.

callback routine
A procedure that is called if and when certain specified conditions are met. This is accomplished by specifying the procedure in a callback list.

call center

  1. A central point at which all inbound calls are handled by a group of individuals on a controlled sequential basis. Call centers are usually a front end to a business such as airline ticketing or mail order.
  2. A center that handles a large number of calls to either take orders or provide customer service.

call center dashboard
A user interface that provides information on how the telesales service representative, shift, or call center is performing.

call chain
A trace of all active routines and subroutines, such as the names of routines and the locations of save areas, that can be constructed from information included in a system dump.

call connected packet
In X.25 communications, a call supervision packet transmitted by a DCE to inform the calling DTE of the complete establishment of the call. See also call request packet, call-accepted packet.

call control
That set of telephony functions that includes call establishment, call transfer, and call disconnection (the program control of a telephone call).

call detail
A list of calls made or received on a device and plan.

call detail record (CDR)
In telephony, a unit of information containing data about a completed call, such as the time the call began, its duration and date, the originating extension, and the number called.

called DLS user
The data link service (DLS) user in connection mode that processes requests for connections from other DLS users. See also Data Link Service.

called NS user
A network service (NS) with which a calling NS user wants to establish a network connection.

called number
See dialed number identification service.

called party

  1. On a switched line, the location to which a connection is established.
  2. Any person, device, or system that receives a telephone call. See also caller.

called program
A program that is the object of a CALL statement combined at run time with the calling program to produce a run unit.

called routine
A program or sequence of instructions that is invoked by another program.

called segment
A segment that is called from another segment. It can be regarded as an extension of the calling segment, but some actions take place at the call and others at the return. Examples of actions are saving the addresses of the current position and the next order on the segment call stack at the call, and restoring those saved addressed at the return.


  1. The requester of a service.
  2. A function that calls another function.
  3. Any person, device, or system that makes a telephone call. See also called party.

caller ID
A feature that displays the phone number of the incoming caller.

call establishment
The complete sequence of events that is necessary to establish a data connection.

call forward
To send an incoming call to a different number.

call forwarding
The process of sending incoming calls to a different number.

call graph
A graph that uses lines represents the flow of data between subroutines in a program.

call hold
A feature that places callers on hold while the user does something else (or answers another call).

call home
A communication link established between a product and a service provider. The product can use this link to place a call to IBM or to another service provider when it requires service. With access to the machine, service personnel can perform service tasks, such as viewing error and problem logs or initiating trace and dump retrievals.

The logical channel type on which the data terminal equipment (DTE) can receive a call, but cannot send one.

In X.25 communications, pertaining to the location or user that makes a call.

calling address
See network user address.

calling command ID
A numeric identifier for a command that calls an API function.

calling convention
A specified way for routines and subroutines to exchange data with each other.

calling DLS user
In OSI networking, the Data Link Service (DLS) user in connection mode who establishes a data link connection.

calling line identification presentation (CLIP)
An ISDN supplementary service that advises the called party of the caller's number: for example, by displaying it on a telephone display panel.

calling party
On a switched line, the location that originates a connection.

calling program
A program that calls another program.

calling thread
The task in progress in a multitasking environment.

call intercept
A Sametime Unified Telephony feature that prevents a call from being answered under certain conditions.

CALL interface
A part of the external CICS interface (EXCI). The CALL interface consists of six commands that allow you to allocate and open sessions to a CICS system from non-CICS programs running under MVS; issue DPL requests on these sessions from the non-CICS programs; and close and deallocate the sessions on completion of the DPL requests.

The logical channel type on which the data terminal equipment (DTE) can send or receive a call.

call level
The position of an entry (program or procedure) in the call stack. The first entry has a call level of 1. Any entry called by a level 1 entry has a call level of 2, and so on.

call level interface

  1. A callable application programming interface (API) for database access, which is an alternative to using embedded SQL.
  2. An API for database access that provides a standard set of functions to process SQL statements, XQuery expressions, and related services at run time. See also embedded SQL.

call level number
A unique number assigned by the system to each call stack entry.

call merging
A Sametime Unified Telephony feature that allows a user who is on a call to accept a second call and merge it into the first, converting the two separate calls into a multi-person conference.

call message queue
A message queue that exists for each call stack entry within a job.

The logical channel type on which the data terminal equipment (DTE) can send a call, but cannot receive one.


  1. An outbound message to request services or data from an enterprise application or web service.
  2. The action of bringing a computer program, a routine, or a subroutine into effect.
  3. A kernel parameter that establishes the maximum number of scheduled activities that can be pending simultaneously.

callout node
The connection point in a mediation request flow from which a service message is sent to a target. There must be one callout node for each target operation.

callout response node
The starting point for a mediation response flow. There must be one callout response node for each target.

callout table
A kernel table that keeps track of all sleeping processes and the channel on which each is waiting.

Software that provides basic computer-telephony integration (CTI) enablement and comprehensive CTI functionality. This includes access to, and management of, inbound and outbound telecommunications.

call profile
In telephony, a set of characteristics that may be used when establishing or manipulating a program-controlled telephone call.

call progress signal
A call control signal transmitted from the data circuit-terminating equipment (DCE) to the calling data terminal equipment (DTE) to indicate the progress of the establishment of a call, the reason why the connection could not be established, or any other network condition.

call redirection notification
In X.25 communications, an optional CCITT-specified facility that informs the caller that the call has been redirected to another DTE.

call request packet
A call supervision packet that a data terminal equipment (DTE) transmits to ask that a connection for a call be established throughout the network. See also call connected packet, call-accepted packet.

call request signal
During the establishment of a connection for a call, a signal that informs the data circuit-terminating equipment (DCE) that a data terminal equipment (DTE) has asked to make a call.

call session
The sequence of events that occurs from the time a call is initiated to the time all activities related to answering and processing the call are completed.

call stack

  1. A list of data elements that is constructed and maintained by the Java virtual machine (JVM) for a program to successfully call and return from a method.
  2. The ordered list of all programs or procedures currently started for a job. The programs and procedures can be started explicitly with the CALL instruction, or implicitly from some other event.

call stack entry
A program or procedure in the call stack.

call supervision packet
A packet used to establish or clear a call at the interface between the data terminal equipment (DTE) and the data circuit-terminating equipment (DCE).

call thread
In the Distributed Computing Environment (DCE), a thread created by a remote procedure call (RPC) server's run time to execute remote procedures. When engaged by an RPC, a call thread temporarily forms part of the RPC thread of the call.

call transfer
A series of actions that directs a call to another telephone number.

call-triggered flow
A data flow triggered by a direct call that the collaboration receives through the Server Access Interface. An access client initiates a call-triggered flow.

call user data (CUD)
User-specified data that can be placed in an X.25 call request packet to be sent to the adjacent node.

camera-ready copy
Copy which is ready for photographic typesetting.

A planned series of operations including advertisements and suggestive selling techniques, that are pursued to achieve a defined set of business objectives. In the WebSphere Commerce Accelerator, campaigns are used to coordinate and aggregate groups of campaign initiatives.

Canadian Standards Association (CSA)
A not-for-profit membership-based association dedicated to standards development for business, industry, government and consumers in Canada and the global marketplace. See also CSA International.

To end a task before it is completed.

cancelability point
A specific point within the current thread that is enabled to solicit cancel requests.

cancel closedown
A closedown in which a program is abnormally terminated either because of an unexpected situation or as the result of an operator command. See also orderly closedown, quick closedown.

cancellation cleanup handler
A function that you can specify to perform an action, such as releasing resources, that occurs after the thread returns from the start routine and calls pthread_exit() or after a cancellation request is performed on the thread.

cancellation point
A function that causes a pending cancellation request to be delivered if the cancellation state is enabled and the cancellation type is deferred.

cancellation state
One of two values, which are either enabled or disabled, that describe whether cancellation requests in the current thread are acted on or held in a pending state. If the value is enabled, the cancellation request is acted on immediately and is based on the current cancellation type. If the value is disabled, the cancellation request is held in a pending state until it is enabled.

cancellation type
One of two values (deferred or asynchronous) that describe how cancellation requests in the current thread are acted on when the cancellation state is enabled. If the value is deferred, the cancellation request is held pending. If the value is asynchronous, the cancel request is acted on immediately, thus ending the thread with a status of PTHREAD_CANCELED.

An applicant profile that has been submitted in response to either a contingent staff or hybrid request.

candidate column
A column that is used as a placeholder in a mapping.

candidate endpoint
A known service endpoint that implements an interface for a particular request. The set of candidates is then filtered by the dynamic assembler to select the best endpoint out of all the candidates.

candidate list
A short list of entities that are potential matches of the incoming identity because they share certain attributes. See also attribute.

candidate term
A term in a business glossary that is being considered but that has not yet become standard or accepted. See also accepted term, standard term.

candidate threshold
The minimum score at which a particular attribute value must match between the incoming identity and an existing entity to satisfy the resolution rule. See also resolution rule.

A single processing unit within a storage system.

canonical address
In LANs, the IEEE 802.1 format for the transmission of medium access control (MAC) addresses for token-ring and Ethernet adapters. In canonical format, the least significant (rightmost) bit of each address byte is transmitted first. See also noncanonical address.

canonical format
A format for storing hierarchical names that displays the hierarchical attribute of each component of the name. For example, the canonical format for the name Reuben D. Smith/Ottawa/Acme/CA is: CN=Reuben D. Smith/OU=Ottawa/O=Acme/C=CA where: CN is the common name, OU is the organizational unit, O is the organization, and C is the region or country code.

canonical host name
A host name that is not an alias.

In computer science, a process that converts data with more than one possible representation to a standard, or canonical, form.

canonical mode
See line mode.

canonical processing
Processing that occurs according to a defined set of rules. Canonical processing is typically used by the shell and simple commands.

canonical XML
A standard format that defines the physical changes that can be made to the document without changing the logical representation of the document.

An area within a dashboard or workspace that users interact with to create, view, and manipulate content and data.

See Common Alerting Protocol.


  1. Specific features or characteristics of a piece of software, such as the database version.
  2. A group of functions and features that can be hidden or revealed to simplify the user interface. Capabilities can be enabled or disabled by changing preference settings, or they can be controlled through an administration interface.
  3. A function or feature that is made available by an application, tool, or product.

capability data
In OSI, a confirmed data transfer service provided by the session layer to transfer a limited amount of data outside of an activity. Capability data can be used by two peers to exchange information about their capability to start an activity.

capability exchange
A series of messages that pass between two CICS regions to establish if they can communicate using IP interconnectivity (IPIC). The capability exchange determines the security controls that are applied to the connection, the number of sessions to be made available, and resynchronizes any outstanding work if the connection has previously failed.

capability list
A list of associated resources and their corresponding privileges per user.

capability matrix
A data structure that represents the linguistic capabilities available within multiple language dictionaries, and allows searching for appropriate dictionaries.

capability type
A category, such as "database" or "hardware" that is used to group characteristics of a piece of software. For example, the "hardware" capability type includes characteristics such the BIOS vendor and BIOS version.

capable to promise (CTP)
Pertaining to the ability to fill and deliver an order in a specific time frame.

An electronic part that permits storage of electricity.


  1. The actual number of parallel servers and workstation resources available during a specified open interval.
  2. A measure of how much volume or revenue can be handled by a specific resource.

capacity break
In logistics, a level of shipment size at which the cost changes.

capacity ceiling
The maximum number of operations that a workstation can handle simultaneously.

capacity constraint
A rule that governs the amount of items that can be awarded to a supplier. Using a capacity constraint, business can be awarded to a preferred supplier or the volume of business for a supplier can be limited.

capacity licensing
A licensing model that licenses features with a price-per-terabyte model. Licensed features are FlashCopy, and Metro Mirror and Global Mirror, and virtualization. See also FlashCopy, Metro Mirror, virtualization.

capacity on demand (CoD)
The ability of a computing system to increase or decrease its performance capacity as needed to meet fluctuations in demand.

capacity organization
An organization definition for which all resource capacity information is consolidated.

capacity override
Override of typical capacity plans when additional capacity is required for specific date/time slot combinations to handle planned spikes in demand or shortfalls in resources.

capacity planing
The process of determining the hardware and software configuration that is required to accommodate the anticipated workload on a system.

capacity planner
A function that uses information about the system, such as a description of the system's workload, performance objectives, and configuration, to determine how the data processing needs of the system can best be met. The capacity planner then recommends, through the use of printed reports and graphs, ways to enhance performance, such as hardware upgrades, performance tuning, or system configuration changes.

capacity planning

  1. The process of scheduling the resources required to perform project work.
  2. The process of determining the hardware and software configuration that is required to accommodate the anticipated workload on a system.

capacity requirements planning (CRP)
The process of specifying the level of resources (facilities, equipment, and labor force size) that best supports the competitive strategy for production of the enterprise.

capacity type
A predefined value that determines the capacity units for licensing, such as online processors, configured processors, physical disks or physical memory.

Capacity Upgrade on Demand (CUoD)
The capability to permanently activate one or more inactive processors without having to restart the server or interrupt the data flow of the business, through the purchase of a permanent processor activation. This capability adds significant value by enabling a fast and economical way to add capacity for new workloads, enabling the server to adapt to unexpected performance demands. See also activation code, application provisioning, dynamic LPAR, free pool, Hardware Management Console.


  1. See cryptographic application programming interface.
  2. See computer assisted personal interviewing.

capital letter
An uppercase letter. See also simple letter.

capital lock (caps lock)
The keyboard function that invokes the uppercase of alphabetic characters, but does not change the response of numeric and other keys. This function is convenient for combining uppercase letters with numbers as in the string “M3C 1H7”. Capital Lock is a toggle key.

capitals lock state
A state that, if activated, will result in the generation of the capital form of all graphic characters on the keyboard for which such a form exists. National standards or usage may determine which graphic characters are affected by this state (see ISO/IEC 9995-1).

cap-M height
The average height of the uppercase characters in a font. This value is specified by the designer of a font and is usually the height of the uppercase M.

capped partition
A logical partition in a shared processor pool whose processor use never exceeds its assigned processing capacity.

caps lock
See capital lock.


  1. A description associated with an identifier. The caption is often used in preference to the identifier in reports to make them more comprehensible.
  2. A National Language Support-enabled text string in a policy expression that describes the policy.
  3. Text associated with, and describing, a table or figure.


  1. In SQL replication, event publishing, and Q replication, to gather changes from a source database. These changes can come from the DB2 log or journal or from source transactions in a relational database that is not a DB2 database.
  2. The process by which an acquirer receives payment from the customer's financial institution and remits the payment. A "capture" is the guarantee that the funds are available and that the transfer will take place.
  3. The process by which some printers can save downloaded fonts as temporary printer-resident fonts.
  4. To digitize an image into the video memory of the M-Video Capture Adapter.

Capture control server
In SQL replication, a database or subsystem that contains the Capture control tables, which store information about registered replication source tables. The Capture program runs on the Capture control server.

capture data
The business information collected by CICS for inclusion in an event.

captured UCB
A virtual window into the actual unit control block (UCB). Captured UCB resides in private storage below 16 MB. All the virtual windows on the actual UCB view the same data at the same time. Only actual UCBs above 16 MB are captured. See also actual UCB, unit control block.

capture file
A file used by a communication program to capture, or record, data being transmitted from a remote system or device.

capture filter
A software filter that collects the visitor-site traffic stream data.

Capture latency
In SQL replication, an approximate difference between the time that source data was changed and the time that the Capture program made the data available to the Apply program by committing the data to a CD table. Capture latency is a subset of the end-to-end latency in a replication configuration. See also Apply latency, end-to-end latency, latency, Q Apply latency, Q Capture latency.

capture point
A point in application logic or CICS system activity where an event is generated. Capture points are defined in a capture specification.

Capture program
In SQL replication, a program that reads database log or journal records to capture changes that are made to DB2 database source tables and store them in staging tables. See also Apply program, Capture trigger, Q Capture program.

Capture schema
In SQL replication, a name that identifies the control tables that are used by an instance of the Capture program.

capture specification
A capture specification provides the information that CICS will use to detect an event within an application or in the system. The capture specification can include the capture point, capture data, and predicates for filtering and is defined in the event binding file.

capture stream
The flow of hits (request/response combinations) through a system.

capture to file
To save data into a file.

Capture trigger
In SQL replication, a mechanism that captures delete, update, or insert operations that are performed on source tables other than DB2 source tables. See also Apply program, Capture program.

carbon cap
A limit on carbon emissions.

carbon copy
A process that allows a shipper to generate a copy of an outbound data exchange transaction, which is sent to other organizations.

carbon credit
A transferrable permit that allows an organization to release one ton of carbon dioxide into the environment. The implementation of carbon credits is an attempt to reduce the amount of greenhouse gases that are being produced.

carbon emission sink
Carbon that is sequestered in forestry management, agricultural management, and other land management.

carbon footprint
The amount of greenhouse gas that a person or organization is responsible for producing. A smaller carbon footprint is associated with having less detrimental effect on the environment.

Carbon Responsibility Factor (CRF)
The percentage of a vehicle's carbon emissions that are attributable to the supply chain.


  1. A record of information attached to an item. An item can have multiple cards.
  2. An electronic circuit board that is plugged into a slot in a system to give it added capabilities.
  3. A Wireless Markup Language (WML) document that provides user-interface and navigational settings to display content on mobile devices. See also deck.
  4. An item of equipment that is inserted in a shelf. A card is a predefined business object.
  5. In the Map Designer, a data object. There are two types of map cards: input and output.

card carrier
A container for shelf item objects that can associate more than one card with a single slot. A card carrier is a predefined business object.

card column
The column from a punch card that was used in early computers to read information. Punch cards typically contained 80 columns of 12 rows.

card enclosure
The area in the system that contains the logic cards.

card image
A one-to-one representation of the hole patterns of a punched card; for example, a card image might be a matrix in which a one represents a punch and a zero represents the absence of a punch.


  1. The number of elements in a set. See also multiplicity.
  2. For OLAP data sources, the number of members in a hierarchy. The cardinality property for a hierarchy is used to assign solve orders to expressions.
  3. For relational data sources, a numerical indication of the relationship between two query subjects, query items, or other model objects.
  4. The number of rows in a database table or the number of elements in an array. See also associative array.
  5. In information analysis, a measure of the number of unique values in a column.

card object
An object used in the TX Programming Interface that represents an input or output card of a map in program memory.

Card Serial Number (CSN)
A unique data item that identifies a hybrid smart card. It has no relation to the certificates installed in the smart card.

card type
A 4-digit identifier printed on the logic card.

card verification value authorization code (CVV auth code)
A separate authorization code that might be returned in addition to a credit card authorization code when a financial institution approves a credit card transaction.

See Continuous Association Rule Mining Algorithm.

A revolving type of contained storage system that brings locations to the operator.

carriage control character
A character that is used to specify a write, space, or skip operation. See also control character.

carriage control data set
A data set whose records are preceded by carriage controls.

carriage control print job
A print job whose records are preceded by carriage controls.

carriage return

  1. A keystroke generally indicating the end of a command line.
  2. The movement of the printing position or display position to the first position on the same line.
  3. The action that indicates that printing is to be continued at the left margin of the next line. A carriage return is equivalent to the carriage return of a typewriter.

carriage return character
A character that in the output stream indicates that printing should start at the beginning of the same physical line in which the carriage-return character occurred.


  1. The backing material for labels. Labels consist of the printable medium, the adhesive, and the carrier.
  2. A continuous frequency (a pulse train, or an electric or electromagnetic wave) that may be varied by a signal bearing information to be transmitted over a communication system.
  3. A service provider that provides the telecom services to customers.
  4. A transportation service provider that provides delivery and shipping services between buyers, sellers, and customers.

carrier hole
One of many holes in the side margins on continuous-forms paper. When placed on the tractor pins, the holes maintain paper alignment and registration, and control the movement of the paper.

carrier ID
A code that identifies a carrier organization in regions outside North America, which do not use a SCAC as an identifier. See also Standard Carrier Alpha Code.

carrier management system
A network management product that a communication common carrier provides to a customer; this product monitors and manages the telecommunication equipment that the communication common carrier provides for the customer's network.

carrier PRO number
A reference number that the carrier can assign to each shipment.

carrier sense
In a local area network, an ongoing activity of a data station to detect whether another station is transmitting.

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
An arbitration protocol in which multiple stations access the network without explicit coordination, avoiding contention by checking for other signals (sensing the carrier) and deferring if a signal is already present. Should two signals collide, each station detects the collision and transmits again after a random amount of time.

carrier service capacity
The unit of measure that is maintained for a carrier service item. For example, the unit of measure could be defined as truck space for delivery items.

carrier signal
A signal with a constant frequency that can be modulated to carry a data signal.

carrier strip
The half-inch side margin of continuous forms containing the carrier holes.

carrier type
A method for classifying carriers as primary, secondary, or backup carriers.

See command and response token.

cart bar code
A number or bar code stuck on a cart that is used to identify a specific cart.

Cartesian product
The resulting set from performing a multiple-table query without any specified joining conditions among the tables.

A standard container with specific dimensions used in both storage and shipping of loose items.

carton flow rack
Storage rack consisting of multiple lanes of gravity fed carton flow conveyors. The lanes are replenished from the rear. The material flows through the rack and is picked from the front.

The process by which loose items from a common order or common customer are placed in standard cartons in preparation for shipment.

carton manifest
The list of cartons in a parcel carrier shipment.

cartridge eject
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the act of physically removing a tape cartridge, usually under robot control, by placing it in an output station. The software logically removes the cartridge by deleting or updating the tape volume record in the tape configuration database (TCDB). For a manual tape library, cartridge eject is the logical removal of a tape cartridge from the manual tape library by deleting or updating the tape volume record in the TCDB.

cartridge entry
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the process of logically adding a tape cartridge to the library by creating or updating the tape volume record in the tape configuration database (TCDB). The cartridge entry process includes the assignment of the cartridge to the scratch or private category in the library.

cartridge loader
A feature that allows a user to place tape cartridges in a loading rack for automatic loading. Manual loading of single tape cartridges is also possible.

Cartridge System Tape
The base tape-cartridge medium used with the IBM 3480 Magnetic Tape Subsystem and IBM 3490 Magnetic Tape Subsystem.


  1. See channel associated signaling.
  2. See China Association for Standards.
  3. See Common Analysis Structure.


  1. An operation that propagates the exact same operation to all dependant objects.
  2. In AIX, to arrange in a series.
  3. In certain printers, the layout of procedure windows on the operator console. Each new procedure window overlays the previous one, with only the previous window's title bar in view.
  4. To connect in a series or in a succession of stages so that each stage derives from or acts upon the product of the preceding stage. For instance, network controllers might be cascaded in a succession of levels in order to concentrate many more lines than a single level permits.

cascade delete
A process by which the DB2 database manager enforces referential constraints by deleting all descendent rows of a deleted parent row.

cascaded initiator
An intermediate node in a transaction program network that uses the two-phase commit protocol.

cascaded menu
A menu that appears from, and contains choices related to, a cascading choice in another menu.

cascaded transaction
A transaction that spans nodes and is coordinated by Resource Recovery Services (RRS). cascaded multisystem transaction. A transaction that spans systems in a sysplex and is coordinated by Resource Recovery Services (RRS).

cascaded UR family
A collection of nodes consisting of a unit of recovery (UR) and its descendants.

cascading choice
A choice on a menu that, when selected, presents another menu with additional related choices.

cascading delete
The process of deleting rows from a child table when the foreign key is deleted from the parent table. When any rows are deleted from the primary key column of a table, cascading deletes, if enabled, delete identical information from any foreign-key column in a related table.

cascading menu
A submenu of related choices that is invoked when the parent item is selected.

cascading permission
A permission of a parent folder in the content repository that has been propagated to its child objects.

cascading prompt
A prompt that uses values from a previous prompt to filter the values in the current prompt or pick list.

cascading replication
A replication topology in which there are multiple tiers of servers. A peer/master server replicates to a small set of read-only servers which in turn replicate to other servers. Such a topology off-loads replication work from the master servers.

cascading resource
A resource that can be taken over by more than one node. A takeover priority is assigned to each configured cluster resource group on a per-node basis. In the event of a takeover, the node with the highest priority acquires the resource group. If that node is unavailable, the node with the next-highest priority acquires the resource group, and so on.

Cascading Style Sheets (CSS)
A language that defines a hierarchical set of style rules for controlling the rendering of HTML or XML files in browsers, viewers, or in print.

Cascading Style Sheets positioning (CSS-P)
Use of Cascading Style Sheets to position web page elements using pixel locations or locations relative to other elements.

cascading switches
Switches that are interconnected to build large fabrics.


  1. The information that is contained within a database that pertains to a particular investigation.
  2. The basic unit of analysis. In a data set based on a simple survey, a case generally corresponds to a respondent.
  3. A container that holds a specified quantity of identical items (SKU) as packaged by a vendor. Cases are identified by license plate number and are generally put away into storage, in their original condition until picked.
  4. A group of related activities that address a specific business situation. The user or predefined conditions, instead of a defined flow, determines the sequence in which activities are performed. See also business process definition, case type.

See Computer Assisted Software Engineering.

case clause
In a C or C++ switch statement, a CASE label followed by any number of statements.

case code
See factory carton code.

case data
The data that is recorded for each case. In a market research survey, the case data stores the answers given by each respondent.

Case Data Model (CDM)
A model that defines access to the case data that is stored in a standard database or in a proprietary format.

case data source component (CDSC)
A data source component (DSC) that exposes case data to the Provider.

CASE expression
An expression that is selected based on the evaluation of one or more conditions.

case ID
A unique identifier for a case or carton stored in the warehouse.

case label

  1. The word case followed by a constant expression and a colon. When the selector is evaluated to the value of the constant expression, the statements following the case label are processed.
  2. In Pascal, a value or range of values that comes before a statement in a CASE statement branch. When the selector is evaluated to the value of a CASE label, the statement following the case label is processed.

case pick
The process of picking unbroken cases from bulk case storage for shipment.

case sensitive
Pertaining to the ability to distinguish between uppercase and lowercase letters.

case-sensitive search
A search in which a result will be found for the search string only if the particular combination of uppercase and lowercase letters are exactly matched.

case status
A label that is applied to a case by the Data Collection system that indicates its current level of completion.

case type
The definition of the activities that must be completed to address a specific type of business situation. For each activity, the case type specifies the document types that are required to support the activity, the user interface in the activity, and the teams that must complete the activity. Case types make up a case. See also case.

case weight (CW)
In cultural sorting, the combined weight value of case, subscripting, superscripting, fractions, and other factors. For example, the lowercase letter a precedes the uppercase letter A, and middle Arabic shapes precede final Arabic shapes. See also alphanumeric weight, diacritical weight, indifferent weight, level 3, mark weight, special weight.

A delivery method by which orders are fulfilled directly from a store and paid in full at the time of transaction. Cash-and-carry transactions require no additional processing.

A service that provides customers with the ability to receive cash in addition to the goods that they purchased in a store using an alternate payment method. The total amount of the transaction, which includes the cost of the purchased goods and the amount of the cash received, is debited from the customer's account. For example, a customer might charge $37 to their credit card for a $17 item in order to get that item and $20 back from the store.

See computer assisted self-interviewing.

CA-signed certificate
A certificate that is signed using a key maintained by a certificate authority. Before issuing a certificate, the certificate authority evaluates a certificate requestor to determine that the requestor is the certificate holder referenced in the certificate.

CAS processor
See common analysis structure processor.


  1. A software component which supports a particular payment protocol.
  2. In cut-sheet printers, a removable container for a supply of paper.


  1. In programming languages, an expression that converts the value of its operand to a specified type.
  2. A database object and an operator for converting data from one data type to another. Built-in data types have built-in casts to compatible data types within database server. See also explicit cast, implicit cast, user-defined cast.

cast expression
An expression that converts or reinterprets its operand.

cast function
A function that is used to convert instances of a source data type into instances of a different target data type. In general, a cast function has the name of the target data type and has one single argument whose type is the source data type. Its return type is the target data type.

Converting a value with a given data type to a different data type or to the same data type with a different length, precision or scale. See also downcasting, upcasting.

CAS tone
See Customer Premise Equipment Alerting Signal tone.

cast operator
An operator that is used for explicit type conversions.

The process of writing changed pages from a group buffer pool to disk.

castout owner
The DB2 member that is responsible for casting out a particular page set or partition.

cast support function
A function that is used to implement an implicit or explicit cast by performing the necessary operations for conversion between two data types.

casual connection
In an APPN network, a connection between an end node and a network node with different network identifiers.


  1. A container that, depending on the container type, holds processes, data, resources, organizations, or reports in the project tree.
  2. A directory of files and libraries, with reference to their locations.
  3. To specify the record class and file plan location when declaring a record.
  4. A data set that contains information about other data sets.
  5. The highest level of the category hierarchy. All of the groupings that exist below the catalog are referred to as categories.
  6. A container that stores items. An item can belong to only one catalog. Each catalog must be associated with at least one hierarchy, the primary hierarchy, and can be associated with one or more secondary hierarchies. See also item.
  7. A container for one or more offerings that a user can request.
  8. A repository for storing specifications for builds, reference structures, connections, and other components.
  9. A collection of apps.
  10. To enter information about a data set or a library into a catalog.
  11. A selection of wireless devices and plans that are configured in the application and made available for purchase.
  12. A collection of tables and views that contains descriptions of objects such as tables, views, and indexes.

catalog asset store
A collection of catalog artifacts that creates a virtual catalog. See also asset store, storefront asset store.

catalog cleanup
A process that deletes entries for which volumes are no longer available; catalog cleanup also allows deletion of a catalog even though it is not empty.

catalog connector
A catalog entry, either a user catalog entry or a catalog connector entry, in the master catalog that points to a user catalog's volume (that is, it contains the volume serial number of the direct access volume that contains the user catalog).

cataloged data set
A data set that is represented in an index or hierarchy of indexes that provide the means for locating it.

cataloged procedure
A set of job control language (JCL) statements that has been placed in a library and that is retrievable by name.

catalog entry
An object in an online catalog. An entry has a name, description, list price, and other details. The entry can be as simple as a SKU; it may also be a product that is automatically broken down into its component items such as a bundle or package. See also list price.

catalog filter
A filter that controls product entitlement by dividing catalogs into subsets as defined by the business owner. Catalog filters can also be used as one of the price rules conditions when determining the prices for the set of catalog entries that a set of customers are entitled to.

Catalog Filter and Pricing tool
A Management Center feature that is used to create and manage catalog filters, price lists, and price rules.

catalog group
A collection of one or more catalog entries or catalog groups which create a navigational hierarchy for an online catalog.

catalog index
A searchable index file that is built from the item data in an order management database. This index provides fast search capability on catalog items.

catalog member
The member in an installation that acts as an index to the information stored in the container server members and supports the cache grid.

catalog node
See catalog partition.

catalog organization
An organization definition for which an item master is defined.

catalog partition

  1. In a partitioned database environment, the database partition where the catalog tables for the database are stored. Each database in a partitioned database environment can have its catalog partition on a different database partition server. The catalog partition for a database is automatically created on the database partition server where the CREATE DATABASE command is run.
  2. In a partitioned database environment, the database partition where the catalog tables for the database are stored. Each database in a partitioned database environment can have its catalog partition on a different database partition server.

catalog recovery area (CRA)
An entry-sequenced data set (ESDS) that exists on each volume owned by a recoverable catalog, including the volume on which the catalog resides. The CRA contains copies of the catalog's records and can be used to recover a damaged catalog.

catalog request
One or more offerings that have been ordered by a service requester. Catalog requests are fulfilled via the activities of the Service Catalog approval workflow.

catalog rule
A rule that pertains to catalog management.

Catalog Search Interface
In z/OS, a particular application programming interface (API) that allows programs written in assembler or a high-level language to read information from a catalog.

catalog server
One of the four member types in an installation, the catalog server member acts as an index to the information stored in the container server members and supports the cache grid.

catalog service
A service that controls placement of shards and discovers and monitors the health of containers.

catalog service domain
A highly available collection of catalog service processes.

Catalogs tool
A Management Center feature that can be used to manage catalogs, categories, catalog entries, merchandising associations, product attributes and attachments in your store.

catalog table
A table that is automatically created in the DB2 database catalog when a database is created. Catalog tables contain information about a database and its objects. See also catalog view.

catalog view

  1. In DB2 for Linux, UNIX, and Windows, a SYSCAT or SYSSTAT view on the catalog table.
  2. One of a set of views automatically created when a database is created. Catalog views contain information about the database and the objects in that database. Examples of information about the database are definitions of database objects and information about the authority that users have on these objects. See also catalog table.

catch block
A block associated with a try block that receives control when an exception matching its argument is thrown. See also try block.

A server that service personnel use to collect and retain status data that other machines, such as the TotalStorage Enterprise Storage Server (ESS), send to it. See also catcher telephone number.

catcher telephone number
The telephone number that connects the ESS to the support-catcher server and enables the ESS to receive a trace or dump package. See also catcher, Remote Technical Assistance and Information Network.

catching message intermediate event
An intermediate event that is triggered when a specific message is received. See also intermediate event.

In a remote journal network, the process of replicating journal entries that existed in the journal receivers of the source journal before the remote journal was activated.

catch-up mount
A local mount that z/OS UNIX automatically issues to every other system's physical file system that is running sysplex-aware for that mode (read-write or read-only) when a file system mount is successful on a system in a shared file system environment.

catch-up processing
In an RSR environment, the process by which tracked log data is used to make all recoverable resources (for example, shadow databases) current with those resources on the active IMS.

catchup state
In high availability disaster recovery, a state in which the standby database might not have applied all logged operations that occurred on the primary database. In this state, the standby database retrieves and applies previously generated log data to synchronize with the primary database. There are two types of catchup states: local and remote.

categorical question
A question that has a limited number of categories with a choice of possible answers. Categorical questions can be single response or multiple response.

categorical response
A response that has a limited number of categories that represent the possible responses. Categorical responses can be single response or multiple response.

categorical variable
A variable that has a limited number of distinct values or categories, such as a variable that is based on a question that has a predefined set of answers. Categorical variables can be single response or multiple response.


  1. One possible answer in a set of answers that are defined in the category list of a categorical or grid question.
  2. A set of catalog items in a number of different hierarchical and searchable groupings.
  3. The recommended security specifications needed for both the CICS transaction definitions and the corresponding RACF profiles.
  4. A classification of elements for documentation or analyses.
  5. A group within a system of classification whose contents share similar properties. See also category page.
  6. A word or phrase that classifies and organizes terms in the business glossary. A category can contain other categories, and it can also contain terms. In addition, a category can reference terms that it does not contain. See also business glossary.
  7. A type class that is used to organize types in a type tree in the Type Designer. Categories organize types that have common properties.
  8. A closed-ended response to a question or item in a shared list.
  9. A container that groups a set of related records within a file plan.
  10. A logical subset of volumes in a tape library. A category can be assigned by the library manager (for example, the insert category) or by the software (such as, the private or scratch categories).
  11. An optional grouping of messages that are related in some way. For example, messages that relate to a particular application might be included in a single category. See also message.
  12. A set of items that are grouped according to a specific description or classification. Categories can be different levels of information within a dimension. See also member.
  13. A container used in a structure diagram to group elements based on a shared attribute or quality.
  14. A word, phrase, or number used to group documents in a view.
  15. A classification of an item. Hierarchies are made up of categories and items. Items in a catalog can be associated to one or more categories from the specifications of the catalog. Items can also be unassigned, which is their default state, which means they are not in any category yet. Every hierarchy has exactly one root category. Every category can have any number of additional categories within it, called sub-categories. See also container, hierarchy.
  16. A property that is set on an element of the business object model (BOM) and can be applied to business classes and filtered in business rules. This property allows the user to specify whether a business class and its members are visible in a rule.

category 1 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are never associated with a terminal: that is, they are for CICS internal use only and should not be invoked from a user terminal. For this reason, CICS does not perform any security checks when it initiates transactions in this category for its own use.

category 2 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either initiated by the terminal user or are associated with a terminal. You should restrict authorization to initiate these transactions to user IDs belonging to specific RACF groups.

category 3 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either invoked by the terminal user or associated with a terminal. All CICS users, whether they are signed on or not, require access to transactions in this category. For this reason, they are exempt from any security checks and CICS permits any terminal user to initiate these transactions. Examples of category 3 transactions are CESN and CESF, to sign on and off, respectively.

category attribute
An attribute instance on a category. The attribute is defined in the specification of the owning hierarchy or by a secondary specification associated to that category. See also attribute instance.

category bag
A container for keyed reference pairs used to aid discovery of a published web service. Each category bag includes a name and the value of a category to which the published item belongs.

category bean
A bean that logs information about content categories.

category code
A value that uniquely identifies every category within a dimension. See also member unique name.

category count
A measure that records the number of unique, non-zero and non-missing values for the categories in the dimension and level specified by the user.

category data set
A data set in which the user can specify whether x-values should be stored in memory or computed according to the indices of data points. The x-values correspond to a category number.

category distribution
The placement of categories among the columns of a category list that is displayed in more than one column or row.

category field
An additional field that is created by a buyer user to gather more information about categories and items. A category property is specific to the category for which it is created and applies only to items of that category.

category filter
A filter that is set on a business rule and removes the business element to which a category was attached from the completion menu.

category list
A list of predefined answers that are in a categorical or grid question. The respondent selects the answers to the question from this list. For example, a list of brand names is a category list.

category manager
A defined role in WebSphere Commerce that manages the category hierarchy by creating, modifying, and deleting categories. The category hierarchy organizes products or services offered by the store. The category manager also manages products, expected inventory records, vendor information, inventory, and return reasons.

category page
A web page in an online store that displays product categories. Category pages connect customers to child category pages or to products that belong to the selected category. See also category, child category.

category recommendation
A recommendation based on the category of a target product.

category replication
The answer portion of categorical, grid, and numeric grid Looks. The category replication controls which category rows in a Look are repeated when the Look is applied to a question.

category schema
A reusable group of categories and subcategories. Assets can be organized in repositories according to their category schemas.

category set
A subset of the categories in a dimension, either from a single level or from different levels in the same dimension. See also set.

category-specific item attribute
An attribute instance that applies to an item because of the presence of that item in a given category. A secondary specification with additional attributes is applied to that category, and all items in that category gain those extra fields. See also attribute instance.

category tree

  1. A hierarchy of categories. See also taxonomy.
  2. See hierarchy.

category viewer
The portion (right pane) of the Categories diagram that shows the category hierarchy of the selected dimension and provides a mechanism for manipulating the categories.

cathode ray tube (CRT)
A vacuum tube in which a beam of electrons can be moved to draw lines or to form characters or symbols on its luminescent screen.

See computer assisted telephone interviewing.

cause code
In X.25 communications, a 1-byte code included in clear-indication and reset-indication packets that indicates the origin of the packet and the reason for sending it.


  1. See channel address word.
  2. See cube adjusted weight.

See cipher block chaining.

See component-based development.

See control blocks in common.

See Class Broker for Java.

See Custom-built Product Delivery Option.


  1. See content-based retrieval.
  2. See content based routing.

See composite business service.

See computerized branch exchange.


  1. See change control.
  2. See clearing channel.

See Common Cryptographic Architecture.

See C/370 common anchor area.


  1. See connection control block.
  2. See command control block.
  3. See conversation control block.

CC-compatible SnapShot
See concurrent copy-compatible snapshot.

See client channel definition table.

CCD table
See consistent-change-data table.


  1. See channel control function.
  2. See Common Connector Framework.

See common client interface.

See custom card identification number.

See Comité consultatif international télégraphique et téléphonique.

See common communication layer.

See change and configuration management.

See Clinical Context Object Workgroup.

See Configuration Control Program.

See channel command retry.


  1. See common channel signaling.
  2. See Common Communications Support.
  3. See coded character set.
  4. See console communication service.

See coded character set identifier.

CCSID 65534
See coded character set identifier 65534.

CCSID 65535
See coded character set identifier 65535.

CCSID resource
A representation of the various elements associated with a CCSID in a system in a machine readable form.

CCSID resource repository
An organized collection of CCSID resources that are maintained by a service provider in a system.


  1. See coordinator control subsystem.
  2. See coordinator controller.

See closed-circuit television.

See central control unit.

See channel command word.

See compact disc.


  1. See communications database.
  2. See conversation data block.


  1. See customization definition document.
  2. See common data set descriptor record.


  1. See Common Desktop Environment.
  2. See component descriptor editor.

See channel definition file.

See connector development kit.

See Channel Data Link Control protocol.

CDLC protocol
See Channel Data Link Control protocol.

See Common Data Link Interface.

See Case Data Model.

See code division multiple access.

See Commercial Data Masking Facility.

CDNM session
See cross-domain network manager session.


  1. See collateral damage potential.
  2. See Continuous Data Protection.

See cellular digital packet data.

See call detail record.

See compact disc recordable.

See Character Data Representation Architecture.

See CD-ROM file system.

See cross-domain resource manager.

See compact-disc read-only memory.

CD-ROM file system (CDRFS)
An implementation of a read-only local file system that can be stored on CD-ROM media, write-protected CD-RW media, or DVD-ROM media.

See cross-domain resource.


  1. See central directory server.
  2. See Cell Directory Service.
  3. See couple data set.
  4. See control data set.

See CICS dynamic storage area.

See case data source component.

CDS clerk
The software that provides an interface between client applications and Cell Directory Service (CDS) servers.

CDS control program (CDSCP)
In the Distributed Computing Environment (DCE), a program that Cell Directory Service (CDS) administrators use to control CDS servers and clerks.

See CDS control program.

CDSQ serialization
A technique that serializes DFSMShsm control data sets (CDSs) with a global enqueue product, such as global resource serialization (GRS).

CDSR serialization
A technique that serializes DFSMShsm control data sets (CDSs) with volume reserves.

See connect data set to line.

See class descriptor table.

CD table
See change-data table.

See conditional end bracket.

See country extended code page.

A dump of the run-time environment for Language Environment and the member language libraries. Sections of the dump are selectively included, depending on options specified on the dump invocation. This is not a dump of the full address space, but a dump of storage and control blocks that Language Environment and its members control.

See Common Event Infrastructure.

CEI event
An event generated over the Common Event Infrastructure (CEI) and logged in a CEI data store.

The smallest integer that is greater than the floating-point number under consideration. For example, the ceiling of 3.5 is 4.

ceiling price
The cut-off value entered by the supplier for a bid in forward auction.

ceiling rate
The maximum price allowed for a product or a service.

CEI target
An application server or server cluster where the Common Event Infrastructure (CEI) server is enabled.

See Command Execution Language.


  1. In mobile computing, an area of radio coverage that is transmitted from a base station. See also base station, radio.
  2. In a multidimensional clustering table, a unique combination of dimension values. Physically, a cell is made up of blocks of pages whose records all share the same values for each dimension column.
  3. A group of managed processes that are federated to the same deployment manager and can include high-availability core groups.
  4. In a WebSphere Application Server distributed network, an arbitrary, logical grouping of one or more nodes that are managed together.
  5. One or more processes that each host runtime components. Each has one or more named core groups.
  6. The rectangular juncture of a horizontal row and a vertical column. Examples include the cells of an electronic spreadsheet and the cells utilized by an XmRowColumn widget in an AIXwindows graphic interface.
  7. A group of WebSphere Application Server nodes in a single administrative domain that is controlled by a deployment manager application.
  8. In asynchronous transfer mode (ATM), a medium access control (MAC) protocol data unit (PDU) of fixed size.
  9. A logical grouping of users, computers, data, and other resources that share either a common purpose or a common level of trust.
  10. A single cartridge location within an Automated Tape Library Dataserver (ATLDS). See also rack number, slot.

Cell B.E. processor
See Cell Broadband Engine processor.

Cell Broadband Engine processor (Cell B.E. processor)
A single-chip multiprocessor consisting of one or more PowerPC Processor Elements (PPEs) and one or more (typically eight) Synergistic Processor Elements (SPEs). It is used for distributed processing and media-rich applications. See also PowerPC Processor Element, Synergistic Processor Element.

cell code
An identifier for each segment in a campaign flowchart or in the target cell spreadsheet.

cell cube
In MSS, a block of 32 cartridge cells, four X addresses by four Y addresses by two Z addresses.

Cell Directory Service (CDS)
A Distributed Computing Environment (DCE) component that manages a database of information about the resources within a cell. See also Global Directory Service.

cell phone
A portable telephone that operates on a cellular radio network instead of a traditional wired network over a fiber optic network or the Internet. See also mobile phone.

cell range
The scope that contains one cell or multiple cells.

cell-relative name
See local name.

cell-scoped binding
A binding scope where the binding is not specific to, and not associated with any node or server. This type of name binding is created under the persistent root context of a cell.

cell security
The access control level assigned to a single cell in a cube.

cell tower
See base station.

cellular digital packet data (CDPD)
A standard for transmitting data over a cellular network that places the data in digital electronic envelopes and sends it at high speed through underused radio channels or during pauses in cellular phone conversations. See also packet switching.

Cellular Telecommunications Industry Association (CTIA)
A trade group that represents cellular, PCS, and enhanced specialized mobile radio carriers.

cell UUID
A Universally Unique Identifier for a cell that is based on the unique system ID of the workstation and a time stamp.

Pertaining to a thermometric scale at which water boils at 100 degrees and freezes at 0 degrees in standard atmospheric pressure.

See Central Europe, Middle East, and Africa.

center cell
The only cell in a star topology with the ability to make autonomic decisions.

Center for the Information of Industry data format (CII data format)
Data format that provides the Japanese syntax definition for EDI messages within Sterling B2B Integrator.

centimeter (cm)
One hundredth of a meter; 0.39 inch.

central control unit (CCU)
The communication controller hardware unit that contains the circuits and data flow paths needed to execute instructions and to control controller storage and the attached adapters.

central data warehouse
The component of Tivoli Enterprise Data Warehouse that contains the cleansed historical data. Data in the central data warehouse is derived from operational data, although operational data is not stored directly in the central data warehouse.

central data warehouse ETL
In Tivoli Enterprise Data Warehouse, the extract, transform, and load (ETL) process that reads the data from the operational data stores of the application that collects it (for example, a log file, a Tivoli Inventory repository, or a Tivoli Enterprise Console database), verifies the data, makes the data conform to the Tivoli Enterprise Data Warehouse schema, and places the data into the central data warehouse. See also data mart ETL.

central directory
A repository for storing resource location information centrally registered by network nodes or cached as the result of network searches.

central directory architecture
Directory architecture in a Domino domain in which some servers store configuration directories and use primary Domino Directories on remote servers for lookups.

central directory server (CDS)
A network node that provides a repository for information on network resource locations. It also reduces the number of network searches by providing a focal point for queries and broadcast searches, and by storing the results of network searches to avoid later broadcasts for the same information.

central electronic complex
See central processor complex.

Central Europe, Middle East, and Africa (CEMA)
For organizational, legal, or administrative purposes, the region comprising Bulgaria, Croatia, Czech Republic, Egypt, Hungary, Pakistan, Poland, Romania, Russia, Serbia and Montenegro, Slovakia, Slovenia, and IBM Middle East. See also Northeast Europe.

Central File Management (CFM)
A central location that receives files for translation from development and, using Translation Workbench (TWB), creates project folders, performs English-to-English word count, and helps identify the appropriate TM translation memories.

central institution
An organization that performs clearing, netting, or settlement for a financial community. Typically, but not necessarily, a national or central bank.

The relative importance of one entity compared to other entities in social network analysis, as determined by its relationships. See also authority, betweenness, closeness, degree, eigenvector, hub, social network analysis.

centralized control
A type of control in which in which all the primary station functions of the data link are centralized in one data station. See also independent control.

centralized directory service
In OSI, a method of organizing directory services so that one node provides directory service for other nodes. OSI Communications Subsystem supports only centralized directory service.

centralized installation manager
A component that remotely installs and uninstalls product and maintenance packages in server environments.

centralized processing
In CICS, processing in which the application is processed on a central processor, which users access using a terminal.

centrally managed service
A pureScale service that is fully managed by IBM Systems Director.

Central Message Store (CMS)
A mailbox system that processes documents and controls services such as messaging, archiving and queuing.

central office (CO)
A telephone switching system that connects customer-premise business and subscriber lines to other customer lines or trunks, both locally or remotely. A central office is located on the edge of the telephone service provider's network, rather than on a customer's premises.

central processing unit (CPU)
See processor.

central processor (CP)
The part of the computer that contains the sequencing and processing facilities for instruction execution, initial program load, and other machine operations.

central processor complex (CPC)
A physical collection of hardware that consists of main storage, one or more central processors, timers, and channels.

central registry
A server's database that logs requests for licenses, upgrades for licenses, and journals all license activity in a tamper-proof auditable file. The central registry is a component of the License Use Management network topology.

central resource registration
A process in which an APPN network node sends information about itself and its client end nodes to a central directory server.

central scheduler
A function that permits an administrator to schedule client operations and administrative commands. The operations can be scheduled to occur periodically or on a specific date. See also administrative command schedule, client schedule.

central service
In MERVA, a service that uses resources that either require serialization of access, or are only available in the MERVA nucleus.

central site
In a network of systems, the system licensed to receive program temporary fixes (PTFs) and distribution media from IBM. This system is also used to provide problem handling support to other systems in a network. In a distributed data processing network, the central site is usually defined as the focal point in a communications network for alerts, application design, and remote system management tasks such as problem management.

central site control facility (CSCF)
In Tivoli NetView for OS/390, NetView for VM, and NetView for VSE, a function that allows a network operator to run the test facilities of the IBM 3172 Nways Interconnect Controller and the IBM 3174 Establishment Controller remotely from the NetView console.

central storage
Storage that is an integral part of the processor unit. Central storage includes both main storage and the hardware system area. UNIX-experienced users refer to central storage as memory.

central system
A single system that handles all of the communications to an endpoint system.

See complex event processing.


  1. See Commission of European Post and Telegraph.
  2. See Conference Europeenne des Administrations des Postes et Telecommunications.

See CERT Coordination Center.

CERT Coordination Center (CERT/CC)
A major reporting center for Internet security problems. Staff members provide technical advice and coordinate responses to security compromises, identify trends in intruder activity, work with other security experts to identify solutions to security problems, and disseminate information to the broad community. The CERT/CC also analyzes product vulnerabilities, publishes technical documents, and presents training courses.

In computer security, a digital document that binds a public key to the identity of the certificate owner, thereby enabling the certificate owner to be authenticated. A certificate is issued by a certificate authority and is digitally signed by that authority. See also certificate authority, certificate signing request, SSL server authentication.

certificate alias
A group that contains one or two certificates. If there are two certificates in the alias, one is the primary and one is the backup, based on the earlier effective from date.

certificate authority (CA)

  1. A trusted third-party organization or company that issues the digital certificates. The certificate authority typically verifies the identity of the individuals who are granted the unique certificate. See also certificate, Globus certificate service, Secure Sockets Layer, SSL server authentication.
  2. A component that issues certificates to each computer on which components are installed.

certificate authority certificate (CA certificate)

  1. In computer security, a digital document that identifies an organization that issues certificates. See also digital certificate.
  2. A digital certificate that is issued by a certificate authority. The CA verifies trusted certificates for trusted roots.

certificate authority enterprise application
A company application that provides certificates and private keys for its client applications.

certificate chain
A path that traces certificates from a branch in the hierarchy to the primary CA certificate.

certificate filter
A filter that defines a set of similar distinguished name certificate attributes for a group of certificates in an X.509 source user registry.

certificate name filter
A general resource profile that maps multiple user IDs to a digital certificate in order to simplify administration of certificates, conserve storage space in the RACF database, maintain accountability, or maintain access control granularity.

certificate revocation list (CRL)
A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a Secure Sockets Layer (SSL) handshake to ensure that the certificates involved have not been revoked.

certificate set
A set of primary and secondary certificates that can be associated to a participant connection.

certificate signing request (CSR)
An electronic message that an organization sends to a certificate authority (CA) to obtain a certificate. The request includes a public key and is signed with a private key; the CA returns the certificate after signing with its own private key. See also certificate, keystore.

certificate store

  1. The Windows name for a key repository.
  2. A collection of certificates.

A process that creates special signed messages called certificates, which state that a particular public key is associated with a particular user or server name.

certifier ID
A file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.

See connection event sequence.


  1. See coupling facility.
  2. See cluster caching facility.

CF cache structure
See coupling facility cache structure.

See combined function IOP.

CF key
See command function key.

CF lock structure
See coupling facility lock structure.


  1. See Configuration File Manager.
  2. See Central File Management.

CF message
See confirmed message.

See coupling facility resource management.

CFRM policy
See coupling facility resource management policy.

See continuous-forms stacker.

A WebSphere MQ object used to describe the queue manager's use of a Coupling Facility list structure

See coded graphic character set global identifier.

See Common Gateway Interface.

CGI program
See CGI script.

CGI script
A computer program that runs on a web server and uses the Common Gateway Interface (CGI) to perform tasks that are not usually done by a web server (for example, database access and form processing).

See Computer Graphics Metafile.

See character generator utility.

The material separated from a data medium when punching a hole or from the carrier holes in continuous forms.

See Chi-squared Automatic Interaction Detector algorithm.


  1. In DFU, a way to change from one display format to another after the user signals that the first display format was completed.
  2. A set of enclosures that are attached to provide redundant access to the drives inside the enclosures. Each control enclosure can have one or more chains.
  3. In RPG, an operation code that reads input records identified by specified relative record numbers or keys.
  4. The name of a channel framework connection that contains an endpoint definition.
  5. A group of logically linked records that are transferred over a communications line.
  6. A group of request units delimited by begin-chain and end-chain. Responses are always single-unit chains.

chain assembly
In CICS intercommunication, a grouping of one or more request units to satisfy a single request. Instead of an input request being satisfied by one RU at a time until the chain is complete, the whole chain is assembled and sent to the CICS application satisfying just one request. This ensures that the integrity of the whole chain is known before it is presented to the application program.

chained order
An order that must finish its fulfillment process before its parent order can be considered fulfilled. An order is chained when a parent order must communicate some portion of the order fulfillment execution to a third party.

chain erase
The process of erasing a snapshot chain.


  1. In the Distributed Computing Environment (DCE), a mode of interaction optionally used by a directory system agent (DSA) that cannot perform an operation by itself. The DSA chains by invoking the operation in another DSA and then relaying the outcome to the original requester.
  2. A method of storing records in which each record belongs to a list or group of records and has a linking field for tracing the chain.

A request for certain information to a system. The information, which is sent back to the server in response to this request, is necessary for client authentication.

challenge handler
A client-side component that issues a sequence of challenges on the server side and responds on the client side. See also authenticator.

Challenge Handshake Authentication Protocol (CHAP)
An authentication protocol that protects against eavesdropping by encrypting the user name and password. See also Password Authentication Protocol.

challenge-response authentication
An authentication method that requires users to respond to a prompt by providing information to verify their identity when they log in to the system. For example, when users forget their password, they are prompted (challenged) with a question to which they must provide an answer (response) in order to either receive a new password or receive a hint for specifying the correct password.

chameleon schema
A schema that inherits a target namespace from a schema that includes the chameleon schema.

A function or mode that enables a user to modify a specified character string in previously entered text.

changeable media origin
In printers, the ability to accept a command that changes the point on the medium where printing begins.

change accumulation (CA)

  1. The process of creating a compacted version of one or more IMS log data sets by eliminating records not related to recovery, and by merging multiple changes to a single segment into a single change.
  2. The process of merging log data sets and reducing the information they contain to the minimum required to perform recovery on a particular database or group of databases.

change aggregate table
In SQL replication, a type of replication target table that contains data aggregations that are based on the contents of a CD table. See also base aggregate table.

change and configuration management (CCM)
A systematic approach to establish and maintain the consistent performance of a system or product throughout its lifecycle, and to effectively manage changes in that product or system.

change authority
An object authority that allows a user to perform all operations on the object except those limited to the owner or controlled by object existence authority, object management authority, object alter authority, and object reference authority. The user can add, change, and delete entries in an object, or read the contents of an entry in the object. Change authority combines object operational authority and all the data authorities.

change bar

  1. A character used in the left margin to indicate that a document line is changed.
  2. An indicator that displays when an object was last changed.

change basis version
The version of the server partition that changes were made against.

change-capture replication
The process of capturing changes that are made to a replication source table and applying them to a replication target table. See also full refresh.

change control (CC)
The use of change management commands for the installation or removal of software or data.

change control administrator
A person responsible for software distribution and change control activities.

change control client
A workstation that (a) receives software and data files from its change control server and (b) installs and removes software and data files as instructed by its change control server. See also change control single node.

change control domain
A change control server and its change control clients.

change control server
A system that controls and tracks the distribution of software and data files to other workstations. See also change control single node.

change control single node
A workstation that controls, tracks, installs, and removes software and data files for itself. A CC single node can also prepare software for distribution. See also change control client, change control server.

change-data table (CD table)
In SQL replication, a replication table on the Capture control server that contains changed data for a replication source table. See also synchpoint.

change-direction protocol
In SNA, a data flow control protocol in which the sending logical unit (LU) stops sending normal-flow requests, signals this fact to the receiving LU using the change-direction indicator (in the request header of the last request of the last chain), and prepares to receive requests.

changed subfile record
A subfile record into which the work station user has entered data, or a subfile record for which a write or change operation was issued with the DDS keyword SFLNXTCHG or DSPATR(MDT) in effect.

change history

  1. A section that displays modifications in the data records, such as supplier records and organization records.
  2. The list of audit entries recorded for a resource.

change implementation schedule
A view in change management that shows the start and end dates for changes to selected configuration items in the environment, the RFC that defines the change, and other details.

change listener
In Java, a listener that is notified when an object is changed in any way.

change log

  1. The area of the checkpoint data set that contains the specific control blocks changed by the last member of the multi-access spool configuration to own the checkpoint data set.
  2. For directory shadowing, a record of changes made to directory entries, departments, and locations for the purpose of sending only the updates and not the entire directory to collecting systems.

change-managed relationship
A relationship between two artifacts. A change to either artifact affects the relationship. See also suspect relationship state.

change management

  1. The process of planning (for example, scheduling) and controlling (for example, distributing, installing, and tracking) software changes over a network.
  2. The process of planning for and executing changes to configuration items in the information technology environment. The primary objective of change management is to enable beneficial changes to be made with minimum disruption to services.
  3. The process of controlling and tracking modifications to artifacts.

change manager
The deployment management component that decomposes aggregated installable unit (IUs) and coordinates the change management operations across the hosting environments. See also aggregated installable unit, hosting environment.

change number of sessions (CNOS)
An internal transaction program that regulates the number of parallel sessions between the partner LUs with specific characteristics.

change order

  1. A record of the changes made during the course of a contract or project execution.
  2. An update to a purchase order that is already approved or printed and that changes information such as quantity or vendor.

change project
A project that is implemented on a staging or a testing environment before being implemented on a production environment to mitigate and minimize operational errors.

change proposal system
A system that allows users to review modules and suggest changes to them.

change record
A recorded instance that is created with each write action to the repository. The change record contains metadata about all repository changes (such as who was responsible for a commit action) and can be used as a version history view of the repository.

change request (CR)

  1. A request from a stakeholder to change an artifact or process. See also defect, enhancement request.
  2. A request to change some aspect of the project, project plan, activity definition, or document.
  3. In System Manager, an instance of a change request description that has been submitted to run or is running. A change request is uniquely identified by the change request name and a sequence number.
  4. A request created in the Telecom Portal application to replace a device, or change a rate plan.
  5. A small, independent unit of work into which each change project is divided.

change request description (CRQD)
An i5/OS object that describes a change to be made to the computing environment. The object, which is maintained only at the central site system or systems, consists of a list of activities that describe the steps needed to make the change.

change set

  1. A group of related changes to files, folders, or symbolic links in a workspace or stream.
  2. A cohesive unit consisting of a number of related changes that need to be made together.
  3. A list of versions of elements that are associated with a Unified Change Management (UCM) activity.

change table
A table that is used to change company codes, account codes, extended dimension codes, or to merge accounts or dimensions.

change volume
A volume that is used in Global Mirror that holds earlier consistent revisions of data when changes are made.

change window
A period of time defined for one or more configuration items, which specifies when the CIs can be taken out of service for changes to be made, with minimal impact on services.

change window conflict
A condition that occurs when implementation tasks have been scheduled for a CI outside its change window.


  1. A specialized web application within a portal to which a user can subscribe.
  2. A communication path through a chain to an endpoint.
  3. In mainframe computing, the part of a channel subsystem that manages a single I/O interface between a channel subsystem and a set of control units.
  4. The means of distribution of a company's products. Examples are e-commerce and physical stores.
  5. A link along which signals can be sent, such as the channel that handles the transfer of data between processor storage and local peripheral equipment. See also trunk.
  6. A collection of test environment properties that describes a delivery platform in your test effort.
  7. A WebSphere MQ object that defines a communication link between two queue managers (message channel) or between a client and a queue manager (MQI channel). See also message channel, MQI channel, queue manager.

channel action
A business function that can be issued on a channel. Channel actions are role specific and an authorization policy makes it possible to control which role can perform which action in a channel.

channel adapter (CA)
A communication controller hardware unit that is used to attach the communication controller to a host channel.

channel address word (CAW)
An area in storage that specifies the location in main storage at which a channel program begins.

channel application
An application that is used to place an order in a store or online call center of a retail business.

channel associated signaling (CAS)
A method of communicating telephony supervisory or line signaling (on-hook and off-hook) and address signaling on T1 and E1 digital links. See also common channel signaling.


  1. Pertaining to devices attached to a controlling unit by cables, rather than by telecommunication lines. See also link-attached.
  2. Pertaining to the attachment of devices directly by input/output channels to a host processor.

channel-attachment major node
A major node that may include minor nodes that are resources (host processors, NCPs, line groups, lines, SNA physical units and logical units, cluster controllers, and terminals) attached through a communication adapter.

channel bank
A device that converts an analog line signal to a digital trunk signal.

channel callback
A mechanism that ensures that the channel connection is established to the correct machine. In a channel callback, a sender channel calls back the original requester channel using the sender's definition.

channel code
A number from 1 to 12 that identifies a position in a forms-control buffer or a page definition.

channel command
An instruction that directs a data channel, control unit, or device to perform an operation or set of operations.

channel command retry (CCR)
In mainframe computing, the protocol used between a channel and a control unit that enables the control unit to request that the channel reissue the current command.

channel command word (CCW)
In zSeries systems, an 8-byte command issued to the channel subsystem by a central processor and operating asynchronously with the issuing processor.

channel-control check
A category of I/O errors affecting channel controls and sensed by the channel to which a device is attached.

channel control function (CCF)
A program to move messages from a transmission queue to a communication link, and from a communication link to a local queue, together with an operator panel interface to allow the setup and control of channels.

channel counter
A counting device that identifies how many pages have been successfully received.

channel-data check
A category of I/O errors, indicating a machine error in transferring data to or from storage and sensed by the channel to which a device is attached.

Channel Data Link Control protocol (CDLC, CDLC protocol)
A channel communications protocol that is used to communicate between VTAM and a front end processor (either hardware or emulated).

channel definition file (CDF)
A file containing communication channel definitions that associate transmission queues with communication links.

channel event
An event reporting conditions detected during channel operations, such as when a channel instance is started or stopped. Channel events are generated on the queue managers at both ends of the channel.

channel exit program
A user-written program that is called from one of a defined number of places in the processing sequence of a message channel agent (MCA).

channel framework
A common model for connection management, thread usage, channel management, and message access within an application server.

channel group
A group of channels defined for a particular MERVA Liquidity Manager installation. The channels in a group need not all use the same currency.

channel ID
An identification number that is passed back from a multiplexed device to the file system as a result of calling the device driver multiplex (ddmpx) entry point.

channel initiator
A component of WebSphere MQ distributed queuing that monitors the initiation queue and starts the sender channel when triggering criteria are met.

channel interface
The circuitry in a storage control that attaches storage paths to a host channel.

channel link
A System/390 I/O channel-to-control-unit interface that has an SNA network address. A channel link can be a subarea link, a peripheral link, a LEN link, or an APPN link. See also subarea link.

channel listener
A component of WebSphere MQ distributed queuing that monitors the network for a startup request and then starts the receiving channel.

channel manager
A defined role in WebSphere Commerce that manages the channel hub, as well as the distributors and resellers associated with that hub, including creating and importing distributor and reseller contracts.

channel number

  1. The identifying number assigned to a licensed channel on the T1 or E1 trunk that connects DirectTalk to the switch, channel bank, or channel service unit.
  2. A number that identifies the path by which data is transferred between a particular input or output device and the processor of the computer.

channel path

  1. In mainframe computing, the interconnection between a channel and its associated control units.
  2. A single interface attaching one or more control units.

channel-path identifier (CHPID)
A value assigned to each installed channel path of the system that uniquely identifies that path to the system.

channel process

  1. In WebSphere Voice Server, the system process that manages call flow.
  2. The AIX process that executes the logic of the state table; each active caller session has one active channel process.

channel program
A sequence of one or more channel command words (CCWs) issued to one device.

channel service unit (CSU)

  1. A device used to connect a digital phone line to a multiplexer, a channel bank, or directly to another device producing a digital signal. A CSU performs certain line-conditioning and equalization functions, and responds to loopback commands sent from the central office (CO). See also data service unit.
  2. An American Telephone and Telegraph (AT&T) unit that is part of the AT&T nonswitched digital data system.

channel station
In certain printers, a page-counting device that counts the number of pages queued for printing.

channel status word (CSW)
A field that provides the program with the status of an I/O device or the conditions under which an I/O operation has been terminated.

channel subsystem (CSS)
A collection of subchannels that directs the flow of information between I/O devices and main storage, relieves the processor of communication tasks, and performs path management functions.

channel-subsystem image
In mainframe computing, the logical functions that a system requires to perform the function of a channel subsystem. With ESCON multiple image facility (EMIF), one channel-subsystem image exists in the channel subsystem for each logical partition (LPAR). Each image appears to be an independent channel-subsystem program, but all images share a common set of hardware facilities.

channel switch
The rerouting of an outgoing and not yet scheduled message to another clearing channel.

channel-to-channel (CTC)
Pertaining to the physical connection or the interaction of two devices.

channel-to-channel adapter (CTC adapter)
A device for connecting two channels on the same processor or on different processors.

chaotic relaxation
An iterative relaxation method that uses a combination of the Gauss-Seidel and Jacobi-Seidel methods. The array of discrete values is divided into subregions that can be operated on in parallel. The subregion boundaries are calculated using the Jacobi-Seidel method, while the subregion interiors are calculated using the Gauss-Seidel method. See also Gauss-Seidel.

See Challenge Handshake Authentication Protocol.

See Clearing House Automated Payment System.

CHAP secret
In the Challenge-Handshake Authentication Protocol (CHAP), a secret passphrase that is used to authenticate a storage system to iSCSI-attached hosts.

The Euro-denominated RTGS payment system operated by the CHAPS Clearing Company Ltd. and comprising a network, central message handling software, elements of members' interfaces to the network, and the Bank of England's central interface.


  1. In bar codes, a single group of bars and spaces that represent an individual number, letter, punctuation mark, or other symbol.
  2. A sequence of one or more bytes representing a single graphic symbol or control code.
  3. Any symbol that can be entered on a keyboard, printed, or displayed. For example, letters, numbers, and punctuation marks are all characters.
  4. In a computer system, a member of a set of elements that is used for the representation, organization, or control of data. See also glyph.

character angle
In architecture, the angle that is between the baseline of a character string and the horizontal axis of a presentation space or physical medium.

character arrangement table
An array of data that translates input data into printable characters and identifies associated character sets and graphic character modification modules.

character array
A named list or table of character data.

character attribute
A code that defines a single property of a character or characters; for example, extended color, character set, or extended highlighting. A character can have more than one defined character attribute.

character-based interface
A computer interface that shows only characters and no graphics on the screen.

character baseline
See baseline.

character box

  1. The area that completely contains the character pattern.
  2. The maximum area in which a symbol and all associated elements, such as a cursor, an underline, or space surrounding the symbol to separate it from other symbols, can be printed or displayed.
  3. The imaginary parallelogram whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a graphics display device.

character-box reference edge
In architecture, one of the four edges of a character box.

character cell

  1. An addressable location on a display surface or printing medium. The character cell defines the placement of characters with respect to preceding and following characters.
  2. The physical width and height in pels of a font.
  3. The maximum physical boundary of a single character. For example on the IBM 3800 Printing Subsystem, a cell is made up of 24 rows with total height of 4.23 mm and 18 bit positions having a total width of 2.54 mm.
  4. See character box.
  5. As defined in ISO/IEC 10646, the place within a row at which an individual graphic character may be allocated.
  6. In the GDDM function, the imaginary box whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a work station.

character cell size
In architecture, the size of a rectangle in a drawing space used to scale font symbols into the drawing space.

character class
A named set of characters sharing an attribute associated with the name of the class. The classes and the characters that they contain are dependent on the value of the LC_CTYPE category in the current locale.

character code

  1. In System i Access, an ASCII or EBCDIC value assigned to the symbols or functions that are used by a computer.
  2. An element of a code page or a cell in a code table to which a character can be assigned. The element is associated with a binary value.

character concatenated expression
A concatenated expression that consists of one or more character columns, string literals, or substrings of character columns.

character constant

  1. The actual character value (a symbol, quantity, or constant) in a source program that is itself data, instead of a reference to a field that contains the data. See also numeric constant.
  2. In the C language, a character or an escape sequence enclosed in quotation marks.

character conversion
The process of changing data from one character coding representation to another.

character conversion table
A table that converts one or more characters to alternative characters using hexadecimal encoding for the character sets. The character sets are defined in code pages.

character coordinate system
An orthogonal coordinate system that defines font and character measurement distances.

character data

  1. Data that has an associated coding representation that defines how to interpret each specific pattern of bits that are grouped into one or more bytes.
  2. Data in the form of letters and special characters, such as punctuation marks.

Character Data Representation Architecture (CDRA)
An IBM architecture that defines a set of identifiers, resources, services, and conventions to achieve consistent representation, processing, and interchange of graphic character data in heterogeneous environments.

character data representation identifier
A tag that is used to achieve data integrity. The Character Data Representation Architecture specifies that you should tag all character data as it flows through the system. You can tag using a short-form or a long-form identifier. A coded character set identifier (CCSID) is an example of a character data representation identifier.

character density
A measure of the horizontal spacing of characters.

character device
A device that handles data one character at a time.

character direction
In Graphic Object Content Architecture, an attribute controlling the direction in which a character string grows relative to the inline direction. Values are left-to-right, right-to-left, top-to-bottom, and bottom-to-top. See also escapement direction.

character display
A display that uses a character generator to display predefined character boxes of images (characters) on the screen. This kind of display cannot address the screen any less than one character box at a time.

character encoding

  1. A character set consisting of a code that pairs a sequence of characters from a given set with something else, such as a sequence of natural numbers, octets or electrical pulses. Encoding facilitates the storage and transmission of text through telecommunication networks.
  2. The mapping from a character (a letter of the alphabet) to a numeric value in a character code set. For example, the ASCII character code set encodes the letter "A" as 65, while the EBCIDIC character set encodes this letter as 43. The character code set contains encodings for all characters in one or more language alphabets.

character entity reference
A character string of the form &#xdddd or &#dddd, where dddd is the hexadecimal or decimal equivalent of the Unicode code point of a character. For example, &#x003E and &#0062 are both character entity references to the > (greater-than) sign.

character escapement point
The point where the next character reference point is usually positioned.

character expression
A character constant, a simple character variable, an element of a character array, a character-valued function reference, a substring reference, or a sequence of the above separated by the concatenation operator and parentheses.

character field
An area that is reserved for information that can contain any of the characters in the character set. See also numeric field.

character format
In REXX, a format that is used in the REXX conversion functions to indicate that data is in a textual form as opposed to machine-readable form.

character generator

  1. In word processing, the way to generate visual characters and symbols for coded data.
  2. In computer graphics, a function that converts the coded representation of a graphic character into the shape of the character for display or print.

character generator utility (CGU)
A function of the Application Development ToolSet feature that is used to define and maintain user-defined double-byte characters and related sort information.

character graphic

  1. An image that is composed of symbols printed in a monospace font. Some symbols are standalone; others are intended for assembling larger figures.
  2. The visual representation of a character, defined by toned or untoned picture elements. See also graphic character, graphic character.

character grid
In Business Graphics Utility, an invisible network of uniformly spaced horizontal and vertical lines covering the chart area. Used by the Business Graphics Utility to determine the physical dimensions of the chart and the placement of the data on it.

character grid unit
In Business Graphics Utility, the distance between two adjacent horizontal or vertical lines on a character grid.

character group
Any number of character graphics and character properties.

character ID
See character identifier.

character identifier (character ID)

  1. The standard identifier for a character, regardless of its style. For example, all uppercase A's have the same character identifier.
  2. On a system, a 4-byte binary value. The value is a concatenation of the graphic character set global identifier followed by the code page global identifier. For example, the character identifier for German (feature 2929) is 00697 00273.

character image
See glyph.

character increment
The distance from the character reference point to the character escapement point. Character increment is the sum of the A-space, B-space, and C-space. Usually the distance between the current print position and the next print position.

character-increment adjustment
In a scaled font, an adjustment to character increment values. The adjustment value is derived from the kerning track values for the font used to present the characters.

A user-defined trait or property that is associated with an identity that is not commonly expressed as a name, number, address, or email. This attribute allows users to extend the product by defining customizable entity attributes that are meaningful to their data sources. See also attribute, identity.

characteristic type
A specific classification of a characteristic. Examples of characteristic types include gender and date of birth, but additional characteristic types can be defined.

character large object (CLOB)

  1. A character string that contains single-byte characters with an associated code page.
  2. A data type whose value is a sequence of characters (single byte, multibyte, or both) that can range in size from 0 bytes to 2 gigabytes less 1 byte. In general, the CLOB data type is used whenever a character string might exceed the limits of the VARCHAR data type. See also large object.

character literal
A literal that represents character data.

character mapping
The association of code-page code points to the appropriate graphic-character identifiers in a font.

character metric
Measurement information that defines an individual character value such as height, width, or space. Character metrics may be expressed in specific fixed units, such as pels, or in relative units that are independent of both the resolution and size of the font. Often included as part of the general term font metrics. See also character set metric.

character name
See character identifier.

character normalization
A process in which the variant forms of a character, such as capitalization and diacritical marks, are reduced to a common form.

character operator
A symbol representing an operation to be performed on character data, such as concatenation (joining the data or fields) in the control language (CL).

character pattern
See character raster pattern.

character-pattern descriptor
In architecture, information that the printer needs to separate font raster patterns. Each character pattern descriptor is 8 bytes long and specifies both the character box size and an offset value.

character position
On a display, the location of a character.

character positioning
The process of determining where a character is to appear on a presentation surface.

character precision
In architecture, the acceptable amount of variation in the appearance of a character on a physical medium from a specified ideal appearance, including no acceptable variation. Examples of appearance characteristics that can vary for a character are shape and position.

character printer
A device that prints a single character at a time. See also line printer.

character property
Any detail about how a character is printed relative to the other characters around it. Character properties are box size, horizontal and vertical character cell size, character ID, center line, baseline, left space, right space, above space, and below space.

character raster pattern
The scan (picture element) pattern for a character graphic of a particular size, weight, and style.

character recognition
The identification of geographic, phonic, or other characters by automatic, magnetic, optical, or mechanical means.

character reference point

  1. The point along the character baseline within the character box that coincides with the current print position.
  2. The point that corresponds to the origin of the character coordinate system. The character reference point coincides with the presentation position when the character is formed in the presentation process. See also current print position.

character rotation
The alignment of a character with respect to its character baseline, measured in degrees in a clockwise direction. See also orientation.

character set

  1. A list of characters (letters, numbers, and symbols such as #, $, and &) that are recognized by computer hardware and software.
  2. A defined set of characters with no coded representation assumed that can be recognized by a configured hardware or software system. A character set can be defined by alphabet, language, script, or any combination of these items.
  3. A set of binary codes that represent specific text characters.

character set attribute
In architecture, an attribute used to specify a coded font.

character set identifier 65534
The character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 ( FFFE ) is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs tagged for each individual field it contains. If the file is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.

character set identifier 65535
The character set identifier (CCSID) that is used to show that data associated with the CCSID should not be processed as coded-graphic-character data.

character set metric
One of the measurements used to describe a characteristic of the all the characters in that font. Examples are height, width, and character increment for each character of the font. See also character metric, font metric, relative metrics.

character shape
The visual representation of a graphic character.

character shape presentation
The formation of a character shape on a physical medium at an addressable position determined by the formatting process.

character shear
See shear.

character space
The horizontal space or size of a character. This size depends on the character, the font, and the device on which the character is printed.

character spacing
See character increment.

character special file
An interface file that provides access to an input or output device, which uses character I/0 instead of block I/0. See also block special file.

characters per inch (cpi)
The number of characters printed horizontally within an inch across a page.

characters per second (cps)
The number of characters that a device can print in one second.

character string

  1. A contiguous sequence of characters that are treated as a unit.
  2. A sequence of bytes that represents bit data, single-byte characters, or a mixture of single-byte and multibyte characters.
  3. A contiguous sequence of characters terminated by and including the first null byte.

character string delimiter
A character that is used to identify the beginning and the end of a character string.

character substring
A contiguous portion of a character string.

character times
In CCP, the maximum number of times that the temporary text delay character can (a) be sent to a terminal before the operation stops; or (b) be sent between the end of a receive operation and the beginning of a transmit operation.

character translation
In international character support, the dd command and various conversion subroutines that translate between extended characters and ASCII escape strings to preserve unique character information.

character type
A data type that consists of alphanumeric characters.

character variable

  1. In the C language, a data object having a value that can be changed while a program is running and having a data type that is a signed or unsigned character.
  2. Character data with a valuethat is assigned or changed while the program is running.

charge and allowance code
An industry-standard identifier that the shipper assigns to each accessorial.

A financial penalty that is assigned to a vendor for violations to compliance rules and other criteria.

charge-back account
An account used for tracking computing resource usage by business departments or projects. Examples of charge-back accounts are "Marketing Department" or "Summer catalog project."

chargeback allocation
A charge category used for cost allocation.

charge-back identifier
A label, which is often tied to an algorithm or set of rules, that is not guaranteed to be unique, but is used to identify and distinguish a specific charge-back item or charge-back entity from others.

charge code
An accounting code that is used to register and categorize costs against project budgets.

charge feature
An optional feature for either software or hardware for which there is a charge.

charge out
To check out and track a physical record.

charge sequence
The sequence in which Sterling Selling and Fulfillment Foundation creates authorization or charge requests. For example, the charge sequence might specify that gift certificates are to be used before a credit card is charged.

charging requesting service
In X.25 communication, an optional facility that specifies that charging information (segment count data, monetary unit data, or call duration data) is required.


  1. A picture defined in terms of graphics primitives and graphics attributes.
  2. A visual representation of real-world objects, such as organizations, people, events, or locations, and the relationships between them.

chart area
In the GDDM function, the part of the picture space in which a business chart is to be drawn.

chart format
In Business Graphics Utility, an object containing chart characteristics, such as the chart type, chart heading, legend position, and so on. The chart format does not include the data values to be plotted. The system-recognized identifier for the object type is *CHTFMT.

chart fragment
A view of a chart that highlights particular items of interest.

charting scheme
A definition that describes how item data behaves when it is visualized on a chart. For example, how data is copied into chart item properties, the chart template and labeling scheme to use, and whether to display attributes and pictures. See also chart template.

chart layer
A map layer that contains the items that have been sent from the chart surface to the mapping tool.

chart layout
In Business Graphics Utility, the arrangement of the various parts in the chart area and surrounding margins.

chart of accounts (COA)
A detailed listing of all the accounts used by a company.

chart property
A characteristic of a chart, such as its summary description, time zone, grid size, background color, or merge and paste rules. Chart properties are saved with the chart. See also chart template.

chart series
A selection of a category of data that will be represented by a chart in a report. A chart can have multiple chart series to represent multiple types of data.

chart template
An object that is used for chart creation that contains preconfigured chart properties, and lists of permitted entity types and link types. See also chart property, charting scheme.

In SNA, a command used by the host system to determine when the secondary logical unit has finished processing all previously sent response units.

The metal frame in which various electronic components are mounted.

chassis detect-and-deploy profile
A profile that IBM Director automatically applies to all new BladeCenter chassis when they are discovered. The profile settings include management module name, network protocols, and static IP addresses. If Remote Deployment Manager (RDM) is installed on the management server, the chassis detect-and-deploy profile also can include deployment policies.

The sending of typed messages between online participants. See also instant message.

chat script
In remote communication, a list of expect-send sequences that a modem uses to establish a communication link with another modem.

chat transcript
A file that contains a copy of the typed messages between participants in a chat meeting.

cheat sheet
An interface that guides users through the wizards and steps required to perform a complex task, and that links to relevant sections of the online help.


  1. To look for a condition.
  2. In printers, an action message that instructs the printer operator to inspect a component. For example, the CHECK TONER COLLECTOR message means that the operator should look at the toner-collector bottle and make sure that it is physically present, in the proper place, and correctly installed.
  3. The process of determining whether a component is appropriate or meets the necessary requirements. For example, an environment check verifies that the target systems contain the appropriate operating systems and software for an operation.
  4. To determine whether a component is appropriate or meets the necessary requirements.
  5. A process for determining accuracy.

check box
A square box with associated text that represents a choice. When a user selects the choice, the check box is filled to indicate that the choice is selected. The user can clear the check box by selecting the choice again, thereby deselecting the choice.

check character
A character used for the purpose of performing a check.

CHECK clause
In SQL, an extension to the SQL CREATE TABLE and SQL ALTER TABLE statements that specifies a table check constraint.

check condition
A restricted form of search condition used in check constraints.

check constraint
A user-defined constraint that specifies the values that specific columns of a base table can contain. See also constraint.

check digit

  1. The far right number of a self-check field that is used to verify the accuracy of the field.
  2. A check key consisting of a single digit.

checked-out version
A copy of a file that corresponds to a version of an element. See also version.

The action that creates a new version of an element on any branch of its version tree.

See check-in.

check in

  1. To save local changes in a change set that is part of a repository workspace. A checked-in change set can later be shared with a team by delivering the change set.
  2. In certain software configuration management (SCM) systems, to copy files back into the repository after changing them.
  3. To replace an inactive document, project WBS element, scope element, requirement or resource record (with its modifications) to its repository directory so that others can view it or modify it.
  4. To upload the language of a checked out draft authored/received contract or amendment contract into the application.

check-in screen
The screen identifying the host screen that should be active for a connection to be considered ready to be returned to the connection pool. If the application is not on the screen specified by the check-in screen, the connection will be discarded or recycled in attempt to return the connection to the host screen specified by the check-in screen. The check-in screen is only meaningful if connection pooling is specified for a connection.

check integrity
The condition that exists when each row in a table conforms to the check constraints that are defined on that table.

check out

  1. To download the language of a draft authored/received contract or amendment contract from the application to modify it.
  2. In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified. See also reservation version status.
  3. To remove an active document, project WBS element, scope element, requirement or resource record from its repository directory in order to modify it. Only one individual may check out the same element at a time.

check pending

  1. In DB2 for z/OS, a state into which a table can be put where only limited activity is allowed on the table and constraints are not checked when the table is updated. See also set integrity pending.
  2. A state that occurs when data for a constraint cannot be verified as valid. A constraint could be either a referential constraint or a check constraint.


  1. A point at which the database manager records internal status information in the log; the recovery process uses this information if the subsystem abnormally terminates.
  2. A place in a program at which a check is made, or at which a recording of data is made to allow the program to be restarted in case of interruption.
  3. A compressed file that contains configuration data from a specific point in time.

checkpoint algorithm
The algorithm that determines when to commit all global transactions for the job steps in a batch application. See also results algorithm.

checkpoint data set
A local data set that contains Common Queue Server (CQS) system checkpoint information about a group of shared queues.

The periodic copying of processing information to the checkpoint data set. Checkpointing ensures that information about in-storage job and output queues is not lost in the event of a hardware or software error.

checkpoint reconfiguration
A process that allows a user to dynamically redefine checkpoint data-set specification for the JES multi-access spool (MAS) configuration.

checkpoint reconfiguration dialog
An interactive form of a JES2 checkpoint reconfiguration that directs the reconfiguration process with replies to a series of WTOR messages.

checkpoint restart
The process of resuming a job at a checkpoint within the job step that caused abnormal termination. The restart can be automatic or deferred. A deferred restart requires that the job be resubmitted. See also automatic restart, deferred restart, step restart.

checkpoint/restart facility
A facility for restarting execution of a program at some point other than at the beginning, after the program was terminated due to a program or system failure. A restart can begin at a checkpoint or from the beginning of a job step, and uses checkpoint records to reinitialize the system.

checkpoint size
In OSI X.400, the maximum amount of data (in units of 1024 bytes) that can be sent between two minor synchronization points. The checkpoint size is used by the X.400 reliable transfer server.

check point snapshot
A snapshot, created at the end of a snapshot chain, that contains all changes from the last incremental delta block.

checkpoint write
Any write to the checkpoint data set. A checkpoint write is a primary, intermediate, or final write that updates a checkpoint data set.

A severe error inside a processor core that causes a processor core to stop all processing activities.


  1. The sum of a group of data that is associated with a group of data and that is used for error detection.
  2. On a diskette, data written in a section for error detection purposes.

checksum protection

  1. A function that protects data stored in an auxiliary storage pool from being lost because of the failure of a single disk. When checksum protection is in effect and a disk failure occurs, the system automatically reconstructs the data when the system program is loaded after the device is repaired. See also device parity protection, mirrored protection.
  2. In TCP/IP, the sum of a group of data associated with the group and used for error checking purposes.

checksum set
Units of auxiliary storage defined in groups to provide a way for the system to recover data if a disk failure occurs when checksum protection is in effect.

chicken role
In agile development, the peripheral participants in scrum development. This includes the product manager, testers, customers, customer advocates, and other stakeholders. See also pig role, scrum.

chief information security officer (CISO)
A person responsible for the protection of enterprise information and assets.


  1. In a generalization relationship, the specialization of another element, the parent. See also parent.
  2. In a hierarchy or auto-level hierarchy, a member that has at least one parent.
  3. Pertaining to a secured resource, either a file or library, that uses the user list of a parent resource. See also parent.
  4. A node that is subordinate to another node in a tree structure. Only the root node is not a child.

child activity
An activity that is launched during the processing of another activity, which becomes the parent activity. See also parent activity.

child business object
A business object that is contained or referenced by another business object. When the full child business object is part of its parent hierarchy, the child is contained by the parent. See also array attribute, foreign key attribute, single-cardinality attribute.

child category
A category that is subordinate to another category in a hierarchy. See also category page, parent category.

child circuit
A circuit that is a subordinate circuit under a parent circuit.

child class
A class that inherits instance methods, attributes, and instance variables directly from the parent class (also known as the base class or superclass), or indirectly from an ancestor class.

child component
Optional second or lower level of a hierarchical item type. Each child component is directly associated with the level above it.

child device
A device that is connected to a parent device.

child document
A document that inherits its values from another document (the parent document).

child enclave
The nested enclave created as a result of certain commands being issued from a parent enclave. See also nested enclave, parent enclave.

child expression
A list of columns in a child table that relate to corresponding columns in a parent table. See also parent expression.

child item
An item that is a part of an item with variations and has the same set of attributes as the item with variations, with minor distinct differences.

child lock
In explicit hierarchical locking, a lock that is held on a table, a page, a row, or a large object. Each child lock has a parent lock. See also parent lock.

child node
A node within the scope of another node. See also parent node.

child order
For subscriptions or recurring orders, the subordinate to the parent order. For example, a parent order is the subscription to the magazine itself, while the child order is one of the monthly issues.

child organizational entity
One or more further levels of organizational entities that exist beneath the parent organizational entity.

child process
A process that is created by a parent process and that shares the resources of the parent process to carry out a request.

child resource
A secured resource, either a file or library, that uses the user list of a parent resource. A child resource can have only one parent resource.

child resource group
A resource group that depends on certain application services that a parent resource group provides. A child resource group is acquired on any node in the cluster only after the parent resource group has been activated. See also dependent resource groups, parent resource group.

child segment
In a database, any segment that is dependent on another segment above it (its parent) in the hierarchy.

child table
A table that has a referential constraint to a column in a different table; the referenced table is called a parent table. See also parent table.

child UR
A unit of recovery (UR) cascaded from a parent UR in a cascaded transaction.

child widget
In AIXwindows and Enhanced X-Windows, a widget that is managed by another widget, the parent. For example, Composite widgets typically manage the Primitive children widgets attached to them.

child window
A window that appears within the border of its parent window (either a primary window or another child window). When the parent window is resized, moved, or destroyed, the child window also is resized, moved, or destroyed. However, the child window can be moved or resized independently from the parent window, within the boundaries of the parent window.

child work item
A work item created for each participant in a multi-participant step and for each route taken simultaneously from an AND-split step.

China Association for Standards (CAS)
The national standards-setting organization in The Peoples' Republic of China.

Chinese numeral
One of the Chinese characters that represent numbers. For example, the Chinese characters for 1, 2, and 3 are written with one, two, and three horizontal brush strokes, respectively. See also Arabic numeral, Hindi numeral, number, Roman numeral.

See chad.

A test statistic used to indicate the probability that two fields are unrelated, in which case any differences between observed and expected frequencies are the result of chance alone. If this probability is very small (typically less than 5%) the relationship between the two fields is said to be significant.

Chi-squared Automatic Interaction Detector algorithm (CHAID)
A decision tree algorithm that uses chi-square statistics to identify optimal splits. Unlike the C & R tree and QUEST nodes, CHAID can generate nonbinary trees, meaning that some splits have more than two branches. See also decision tree algorithm, regression tree algorithm.

An option in a pop-up window or menu used to influence the operation of the system.

choice activity
One of three types of complex BPML activities. A choice activity is used to make decisions in the business process model and runs only one of the child activities it contains. The choice activity makes it possible to model branch processing.

choice list
A list of predefined property values. A choice list presents a list of valid choices, such as a list of states or ZIP codes.

choice point
A point that is set automatically by CP Optimizer as it executes a goal during the search for a solution. At the choice point, the engine records the current state of constraints, variables, and domains, along with other goals not yet executed. If execution of the goal leads to failure, CP Optimizer backtracks to the choice point, restores the state recorded, and tries one of the stored goals.

choice type
A group type with a subclass equal to choice that is used to define a selection from a set of components. A choice type defines a choice group, which is valid when the data matches one of the components in the choice group.

Cholesky factoring
A technique that is used to factor a matrix into the product of a lower triangular matrix and its conjugate transpose.

A short line segment whose end points lie on a circle. Chords are a means for producing a circular image from straight lines.

An object that executes one or more processes at a user-defined frequency.


  1. An agreed upon sequence of business events that is allowed by a seller for each transaction.
  2. An ordered sequence of message exchanges between two or more participants. In a choreography there is no central controller, responsible entity, or observer of the process.

See channel process.

See channel-path identifier.

See Simplified Chinese.

See Traditional Chinese.

See Compact Hypertext Markup Language.


  1. A group of archived business processes.
  2. A data storage location. For example, a raw disk device or a cooked file.

chute dedication
In a warehouse, the exclusive assignment of a dock door or chute to a particular carrier.


  1. See control interval.
  2. See configuration item.
  3. See callable interface.
  4. See continuous integration.


  1. See condition information block.
  2. See cluster information base.


  1. See circuit identification code.
  2. See concurrent image copy.

In the didot point system, a unit of 0.1776 inch (4.512 millimeters) used in measuring typographical material.

An IBM licensed program that provides online transaction-processing services and management for business applications.

CICS attachment facility
A facility that provides a multithread connection to a DB2 database to allow applications that run in the CICS environment to execute DB2 commands.

See business transaction services.

CICS bundle
A set of XML files that defines or references the resources for a component of an application or a whole application, or another artifact relating to applications, such as a policy. A CICS bundle is installed in a CICS region. Multiple CICS bundles can be referenced by a management bundle. See also bundle, management bundle.

CICS-deployed JAR file
A deployed JAR file that has been produced specifically for the CICS EJB server and stored in the hierarchical file system.

CICS dynamic storage area (CDSA)
A storage area allocated from CICS-key storage below the 16 MB line. The CDSA is used for all non-reentrant CICS-key RMODE(24) programs, all CICS-key task-lifetime storage in 24-bit storage, and CICS control blocks that reside in 24-bit storage.

CICS EJB server
One or more CICS regions that support enterprise beans. A logical CICS EJB server typically consists of multiple (cloned) CICS listener regions and multiple (cloned) CICS AORs. The listener regions and AORs may be combined into listener/AORs.

CICS group
An i5/OS library containing the CICS resource definition for CICS tables.

Storage protection key in which CICS is given control (key 8) when CICS storage protection is used. This key is for CICS code and control blocks. CICS-key storage can be accessed and modified by CICS. Application programs in user-key cannot modify CICS-key storage, but they can read it. CICS-key storage is obtained in MVS key-8 storage. See also user-key storage.

CICS-maintained data table
A type of CICS data table, for which CICS automatically maintains consistency between the table and its source data set. All changes to the data table are reflected in the source data set and all changes to the source data set are reflected in the data table.

CICS monitoring facility
The CICS component responsible for monitoring and producing task-related statistics information, such as task CPU usage and waits for I/O request units on an individual task basis. Reporting is divided into classes.

A set of CICS systems that are managed and manipulated as if they were a single entity. A CICSplex can be managed by CICSPlex SM. See also multiregion operation.

CICSPlex SM address space (CMAS)
A CICSPlex SM component that is responsible for managing CICSplexes. A CMAS provides the single-system image for a CICSplex by serving as the interface to other CICSplexes and external programs. There must be at least one CMAS in each MVS image on which you are running CICSPlex SM. A single CMAS can manage CICS systems within one or more CICSplexes.

CICS primary connection region
The web owning region (WOR) of the Multi-Region Option (MRO) connected regions in a CICS test environment. This is the region in which the CICS resource definition server for Application Deployment Manager runs.

CICS region
An instance of CICS Transaction Server that runs in its own z/OS address space.

CICS region user ID
The user ID assigned to a CICS region at CICS initialization. It is specified either in the RACF started procedures table when CICS is started as a started task, or on the USER parameter of the JOB statement when CICS is started as a job.

CICS run unit
A set of statically bound, dynamically bound, or both, modules that can be loaded by a CICS loader.

CICS segment
The portion of a RACF profile containing data for CICS.

CICS system

  1. In CICSPlex SM topology, a definition referring to a CICS system that is to be managed by CICSPlex SM.
  2. The entire collection of hardware and software required by CICS.

CICS system definition data set (CSD)
A VSAM KSDS cluster that contains a resource definition record for every record defined to CICS using resource definition online (RDO).

CICS system group

  1. In CICS business transaction services (BTS), a BTS set, that is the set of CICS regions across which BTS processes and activities may execute.
  2. A set of CICS systems within a CICSplex that can be managed as a single entity.
  3. In CICSPlex SM topology, the user-defined name, description, and content information for a CICS system group. A CICS system group can be made up of CICS systems or other CICS system groups.

CICS Transaction Affinities Utility
A utility designed to detect potential causes of inter-transaction affinity and transaction-system affinity for those users planning to use dynamic transaction routing.

CICS-value data area (CVDA)
An argument to which CICS has assigned a specific and limited set of meaningful values. When a CVDA is specified in an EXEC CICS command, CICS converts the CVDA value name to the corresponding numeric representation.

CICS VSAM Recovery
An IBM product that recovers lost or damaged Virtual Storage Access Method (VSAM) data.

CICS-WebSphere MQ API crossing exit
An exit that intercepts WebSphere MQ calls as they are being run, for monitoring, testing, maintenance, or security purposes.


  1. See communication identifier.
  2. See connection identifier.

See control interval definition field.

CID methodology
An IBM-specified way to install and configure products on, or remove products from, remote workstations and hosts. Response files and redirected installation and configuration may be used by a CID-enabled product to eliminate or reduce user interaction with the CID-enabled product. See also response file.

See Classless Inter-Domain Routing.


  1. See common interchange file.
  2. See customer installable feature.

See Common Internet File System.

CII data format
See Center for the Information of Industry data format.

See Common Information Model.

CIM agent
The code that consists of common building blocks that can be used instead of proprietary software or device-specific programming interfaces to manage devices that are compliant with the Common Information Model (CIM).

CIM object manager (CIMOM)
The common conceptual framework for data management that receives, validates, and authenticates the CIM requests from the client application. It then directs the requests to the appropriate component or service provider.

See CIM object manager.

See Common INET.

See control initiate.

C interface
The interface that is defined at a level that depends on the variant of C standardized by ANSI.


  1. See customized installation package.
  2. See commit in progress.

A cryptographic algorithm used to encrypt data that is unreadable until converted into plain data with a predefined key.

cipher block chaining (CBC)
A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted.

cipher spec
See cipher specifications.

cipher specifications (cipher spec)
Specifications that indicate the data encryption algorithm and key size to use for secure connections.

cipher suite
The combination of authentication, key exchange algorithm, and the Secure Sockets Layer (SSL) cipher specification used for the secure exchange of data.

Data that is encrypted. Ciphertext is unreadable until it is converted into plaintext (decrypted) with a key. See also cleartext.

An entity representation that can indicate an organization or a group on a chart. A circle is often used to enclose other entities. See also box, representation.


  1. One or more conductors through which an electric current can flow. See also link, packet switching.
  2. A telecommunication circuit such as a line, conductor, or conduit through which information is transmitted.
  3. In fibre-channel technology, an established communication path between two ports, which consists of two virtual circuits capable of transmitting in opposite directions. See also link.

circuit breaker
A switch that automatically interrupts an electric circuit because of an abnormal condition.

circuit identification code (CIC)
A 12-bit number that identifies a trunk and channel on which a call is carried.

circuit-switched data transmission service
A service that uses circuit switching to establish and maintain a connection before data can be transferred between data terminal equipment (DTE). See also packet-switched data transmission service.

circuit switching
A process that, on demand, connects two or more data terminal equipment (DTEs) and permits the exclusive use of a data circuit between them until the connection is released. See also message switching, packet switching.

circuit type
A template that specifies the layout for the type of circuit or service.

circuit type identifier
An identifier for an unmatched circuit. The identifier is based on the criteria that is stipulated against a specific invoice format.

circular file
A type of file that appends data until full; subsequent incoming data overwrites the data starting at the beginning of the file.

circular layout
A layout in which entities are arranged by type around the circumference of a circle. See also layout.

circular log
A database log in which records are overwritten if they are no longer needed by an active database. See also archive log.

circular logging
In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, the process of keeping all restart data in a ring of log files. See also linear logging.

circular reference
A series of objects where the last object refers to the first object, which can cause the series of references to be unusable.

circular traceability relationship
A relationship between a requirement and itself, or an indirect relationship that leads back to a previously traced-from node. Traceability relationships cannot have circular references.

See complex instruction set computer.

See chief information security officer.

Pertaining to improved government operations and services that are centered around a citizen's needs and preferences, and offer better public service processes.


  1. See common interchange unit.
  2. See container installable unit.


  1. See count key data.
  2. See count-key-data device.


  1. See Command Language.
  2. See control language.


  1. A notification to DB2 for z/OS that an object is being accessed. A claim prevents a drain from occurring until the claim is released, which usually occurs at a commit point. See also drain, logical claim.
  2. A request for reimbursement, replacement, or repair for an item or an asset that is under warranty.

claim class
A type of object access that can be defined by one of the following characteristics: cursor stability (CS), repeatable read (RR), or write.

C language
A language used to develop application programs in compact, efficient code that can be run on different types of computers with minimal change.


  1. A grouping of projects that has global properties. The properties are used to manage completed jobs, typically deleting them periodically or starting another job that performs specific cleanup tasks.
  2. An attribute that is related to a transaction code and a message region that is used to determine scheduling. See also message class, region class.
  3. A description of a set of objects that share the same attributes, operations, methods, relationships, and semantics. A class can use a set of interfaces to specify collections of operations that it provides to its environment. See also interface, object.
  4. The syntactic category for a group of related values. A value can be assigned to different classes in different contexts or scenarios. See also classification, classification, pattern, value.
  5. In RACF, a collection of defined entities (users, groups, and resources) with similar characteristics.
  6. An object that contains specifications, such as priority, maximum processing time, and maximum storage, to control the run-time environment of a job. The system-recognized identifier for the object type is *CLS.
  7. A section of a module. A class can represent program text, that is, the instructions and data that are loaded into virtual storage during execution. Other classes, such as an external symbol dictionary (ESD) and a relocation dictionary (RLD), are required for binding and loading the program.
  8. In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.
  9. In C++, a user-defined data type. A class data type can contain both data representations (data members) and functions (member functions).
  10. In the Distributed Computing Environment (DCE), a category into which objects are placed based on their purpose and internal structure.
  11. A collection of processes (and their associated threads) that have a single set of resource limitation values and target shares applied to them.
  12. The set of all members of a type of object, such as all contracts, term definitions, organizations, and so on.
  13. In printing, a single alphanumeric character assigned to a print job.
  14. A subdivision of a classification comprising of a group of suppliers that have common attributes or characteristics.
  15. The definition of an object within a specific hierarchy. A class can have properties and methods and can serve as the target of an association.
  16. A basic unit of the classification hierarchy used in the Type Designer. There are three classes: item, group, and category.

class 0
See transport class 0.

class 1
Service that provides a dedicated connection between two ports (also called connection-oriented service), with notification of delivery or nondelivery.

class 1 terminal
A terminal for which the alternate IMS pre-opens backup sessions for the primary sessions that the active IMS opens; VTAM/NCP switches sessions from primary to backup at takeover.

class 2

  1. Connectionless service between ports with notification of delivery or nondelivery.
  2. See transport class 2.

class 2 terminal
A terminal for which IMS in the alternate reestablishes service at takeover.

class 3
In fibre-channel technology, connectionless service between ports without notification of delivery. Other than notification, the transmission and routing of class 3 frames is identical to that of class 2 frames.

class 3 terminal
A terminal that communicates with XRF IMS but whose sessions are not automatically reestablished at takeover.

class 4
See transport class 4.

class A network
In Internet communications, a network in which the high-order (most significant) bit of the IP address is set to 0 and the host ID occupies the three low-order octets.

class assignment rule
A rule that determines which values within a set of process attributes result in a process being assigned to a particular class (superclass or subclass within a superclass).

class attribute
A value in a class object that controls the processing of routing steps in a job. These values include the run priority, time slice, eligibility for purge, default wait time, maximum processing unit time, and maximum temporary storage parameters.

country extended code page (CECP)
A single-byte EBCDIC code page in the IBM corporate registry that contains the 190 characters found in character set 00697. While each CECP contains the same set of characters (allowing for conversion of data without loss), the code point allocation of the characters is not identical. For example, all CECPs contain the character backwards slash, however in code page 500 it is located at code point x'E0' and in code page 280 it is located at code point x'48'.

country ID
See country identifier.

country identifier (country ID)
The 2-character representation for the country associated with an object. For example, documents and user profiles can have a country associated with them.

country/region code
See territory code.

count sheet
A data entry form used in batched counting tasks. A count sheet is used to enter the counts and later reconciled on the system.

count zone
A specific area set up to help manage cycle counting activities. Generally, cycle counters are assigned all of the counting responsibilities of a zone.

couple data set (CDS)
A data set that contains information related to a sysplex, its systems, cross-system coupling facility (XCF) groups, and their members. See also sysplex couple data set.

coupled extended remote copy (CXRC)
In z/OS or S/390 environments, a technique that supports synchronous copy operations in large environments that have an expanded number of primary-storage controls and direct access storage device (DASD) volumes; this number is in excess of those supported by a single data-mover configuration. Installations can have configurations consisting of thousands of volumes in multiple extended remote copy (XRC) sessions; coordination among the sessions ensures that all volumes will be recovered to a consistent time. CXRC greatly expands upon the ability of XRC to provide remote disaster-recovery protection across a sysplex.

A device that connects a modem to a telephone network.


  1. A process that adds an already existing EDI to another node within the network.
  2. The dependency that components have on one another.
  3. Two volumes that are paired for a remote mirroring purpose.

coupling facility (CF)
A special logical partition that provides high-speed caching, list processing, and locking functions in a sysplex.

coupling facility cache structure (CF cache structure)
The hardware that provides a data cache.

coupling facility channel
A high-bandwidth fiber-optic channel that provides the high-speed connectivity required for data sharing between a coupling facility and the central processor complexes (CPCs) directly attached to it.

coupling facility lock structure (CF lock structure)
The hardware that supports sysplex-wide locking.

coupling facility resource management (CFRM)
A component of z/OS that provides the services to manage coupling facility resources in a Parallel Sysplex. This management includes the enforcement of CFRM policies to ensure that the coupling facility and structure requirements are satisfied.

coupling facility resource management policy (CFRM policy)
The allocation rules for a coupling facility structure that are declared by a z/OS administrator.

coupling service
A function of the cross-system coupling facility (XCF) that transfers data and status information among the members of a group that reside in one or more of the MVS systems in a sysplex.

A ticket or document that can be exchanged for a financial discount on a product.

courier server
In the DCE Distributed Time Service, a local server that requests a time value from a randomly selected global server. The time value returned is used to synchronize a local access network (LAN) with all other parts of the network.


  1. The body of content that is taught, including general information such as the course description for the course catalog, an outline of materials covered, a schedule of sessions, and, optionally, assessments such as tests or evaluations. More than one person can be listed as an instructor for each course.
  2. A set of learning activities designed to meet one or more specific objectives. A course is stored in the LMS as a master. from which multiple offerings can be created.

course catalog
A list of courses available; also, the module where administrators manage course masters and offerings.

course master
The structure and metadata information that is extracted from a course package and stored in the Lotus Learning Management System so that course offerings can be created from it.

course offering
A specific instance of a course, based on a course master and offered at a particular date and time.

course package
A compressed package interchange file (PIF) containing course structure and metadata, and possibly course content. This is the form in which courses are imported into the Lotus Learning Management System.

course profile
The label assigned to a course, which can locate the course when used as a search criterion in the course catalog.

course structure
The navigational map, typically presented as a tree, used to combine learning resources into a cohesive unit of instruction.


  1. The network area covered by the service provider.
  2. The range of a received radio signal and its boundary. The coverage area of a cellular device is limited by the range of the radio network relative to its base station. The coverage area of a satellite phone is the entire earth because the radio signal is transmitted by satellites. See also base station.

covered database
A database or area in an RSR environment that is tracked by a tracking subsystem. Recovery information is not maintained by the tracking subsystem for databases or areas that are not covered.

cover sheet
A page on which the user can view and edit the summary and custom properties of a chart.

Cox regression algorithm
An algorithm that produces a survival function that predicts the probability that the event of interest has occurred at a given time for given values of the predictor variables.


  1. See control point.
  2. See constraint programming.
  3. See central processor.
  4. See control program.

See collection point block.


  1. See central processor complex.
  2. See current processor capacity.
  3. See cluster processor complex.

CP capabilities
The level of network services provided by the control point (CP) in an APPN end node or network node. CP capabilities information is exchanged during the activation of CP-CP sessions between two nodes. A node's CP capabilities are encoded in the CP capabilities (X'12C1') GDS variable.

CPCB operation code
See control point control block operation code.

CP-CP session
In SNA, one of the parallel sessions between two control points, using LU 6.2 protocols and a mode name of CPSVCMG, on which network services requests and replies are exchanged. Each CP of a given pair has one contention-winner session and one contention-loser session with the other.

CP-CP session-capable connection
A link over which a node permits CP-CP sessions to be established.


  1. See customer premises equipment.
  2. See collection processing engine.


  1. See command prefix facility.
  2. See command prefix.

See collaborative planning, forecasting, and replenishment.

See consumer packaged goods.

See code page global identifier.


  1. See cost performance index.
  2. See Common Programming Interface.

See characters per inch.

See Common Programming Interface for Communications.

CPI-C driven application program
An application program that uses CPI for Communications calls to receive an incoming message and to send a reply.


  1. See continuously powered main storage.
  2. See collection processing manager.

See control point management services.

See control point management services unit.

See command processing program.

See command processor parameter list.

See cluster profile record.

CP receive session
A CP-CP session that is also a contention-loser session. On this session, directory services in a CP receives a Locate search or registration request from a partner CP.

See characters per second.

See compressed-pattern storage.

CP send session
A CP-CP session that is also a contention-winner session. On this session, directory services in a CP sends a Locate search or registration request to a partner CP.

See control point server.

CP-SVR pipe
A pair of LU 6.2 sessions, between the control points in dependent-LU-requester (DLUR) and dependent-LU-server (DLUS) nodes, that carry the flows of SSCP services, which are encapsulated in APPN formats.

See central processing unit.

CPU entitlement
The percentage of CPU resources on a host or LPAR that the WLM dispatcher considers a service class to be entitled to use based on its CPU shares attributes.

CPU limit
The maximum percentage of CPU resources that can be consumed by work executing in a specified service class, regardless of relinquished CPU resources becoming available. This percentage is allocated to each LPAR or physical host where the DB2 database manager is running.

CPU time

  1. The processor time used by a job. See also duration.
  2. The amount of time a program is running in the CPU or is being serviced by the operating system. Does not include time associated with the program's I/O or time in which other processes preempt the program's use of the CPU.

See commercial processing workload.

See Common Queue Server.


  1. See carriage return.
  2. See change request.

See catalog recovery area.

Someone, usually with malicious intent, who tries to circumvent or subvert system protection mechanisms. See also hacker.

The part of a telephone that holds the handset or receiver.

A work activity performed by a labor, for example, "plumbing."

A heuristic capable of generating a starting point for an algorithm.

crash recovery
The process of bringing a database back to a consistent and usable state after a failure. See also rollforward recovery, version recovery.

To search for information across various web pages on the Internet or on an intranet. See also crawler.

A software program that retrieves documents from data sources and gathers information that can be used to create search indexes. See also crawl.

crawl space
A set of sources that match specified patterns, such as database names, file system paths, domain names, IP addresses, and Uniform Resource Locators (URLs), that a crawler reads from to retrieve items for indexing.


  1. See cyclic redundancy check.
  2. See command recognition character.

See conditional restart control record.

create access list
A list that restricts a form, so that only specified users can create documents using the form.

create data
The data necessary to convert code to machine instructions.

create date

  1. In DFSMSrmm, the date that a data set is written to tape.
  2. The date that a data set was read if it was created before DFSMSrmm was in use. The create date is updated each time a data set is replaced and not extended.
  3. The date that volumes and other resources are defined to DFSMSrmm or the date specified on the command as the create date.

created region
A CICS region that is defined in the platform environment specifically for use in a platform. See also adopted region, adopted region type, created region type.

created region type
A container for CICS regions that are defined for use in a platform, enabling the regions to be managed as a unit in the platform. See also adopted region, adopted region type, created region.

created temporary table
A table whose definition is persistent and shared between sessions but whose data is deleted when the session in which the table was instantiated ends. The data in the table is available only within the session in which the table was instantiated. The table is defined by using the SQL statement CREATE GLOBAL TEMPORARY TABLE. See also base table, declared temporary table, temporary table.

create link pack area (CLPA)
An option that is used during initial program load to initialize the link pack pageable area.

create method
In enterprise beans, a method defined in the home interface and invoked by a client to create an enterprise bean. (Sun)

creation date
The system date when an object is created.

creation factory
A URI that is used to create new resources by using HTTP POST.

creation time
The total time that an asset owner takes to create an asset, measured in hours, days, months, or years.

creation time stamp (CTS)
In the Distributed Computing Environment (DCE), an attribute of all Cell Directory Service clearinghouses, directories, soft links, child pointers, and object entries that contains a unique value reflecting the date and time the name was created.

creator ID
See creator identifier.

creator identifier (creator ID)
A unique 4-character identifier for an organization, product, or file format.


  1. A set of information that grants a user or process certain access rights.
  2. Information acquired during authentication that describes a user, group associations, or other security-related identity attributes, and that is used to perform services such as authorization, auditing, or delegation. For example, a user ID and password are credentials that allow access to network and system resources. See also shared access.
  3. A course, certificate, or regulatory license that is required by either the insurance carrier or a government regulator to sell an insurance product.
  4. In the Java Authentication and Authorization Service (JAAS) framework, a subject class that owns security-related attributes. These attributes can contain information used to authenticate the subject to new services.

credential mapper
The component of Web Express Logon that handles requests for host credentials, which have been previously authenticated by a network security layer. See also network security layer.

credential pool
A group of credentials with similar access privileges. The pool can be defined as a service group or a set of service groups.

credential prediction
A method of hijacking or impersonating a website user by guessing the unique value that identifies a particular session or user.

credential token
A discrete data object, created from a credential, that can be used to gain access rights.

credential vault
A configured repository that stores credentials for shared access management.

A numeric rating between 0-10 that is used to determine the integrity of an event or an offense. Credibility increases as multiple sources report the same event or offense.

In Fibre Channel technology, the number of receive buffers allocated to a transmitting node port (N_port), node loop port (NL_port), or fabric port (F_port). The credit is the maximum number of outstanding frames that can be transmitted by that N_port, NL_port, or F_port without causing a buffer overrun condition at the receiver.

credit cap
A limit for credit payments. MERVA Liquidity Manager issues a warning when it is reached.

credit card
A method of payment for goods or services where the buyer pays a lender incremental payments until the debt is paid in full.

credit payment
A payment that credits the bank's account. It can be received as an incoming message from another bank, as an in-house message, or as a credit confirmation.

See Consortium for Research and Education Network.


  1. One or more workers with the appropriate skills and tools to perform the work required to resolve work order.
  2. A collection of resources that work together to perform a specific type of work. For example, an OHLINE crew might consist of 3 people and a bucket truck (a tool) that work together to build or repair overhead electrical power lines.

crew type
A template that identifies the crafts, qualifications, and tools that are required to perform the work.

See Carbon Responsibility Factor.

See cluster resource group.

See cluster resource group manager.

See cluster-ready hardware server.


  1. A standard on which a judgment or decision may be based.
  2. A statement or a question against which an evaluator analyzes the strategic importance of a supplier.

critical answer
An answer consequence type for a question that is marked as crucial and that requires a mandatory "Yes".

A rating, assigned by the user, which represents the potential vulnerability of an asset to a malicious exploit. The criticality rating contributes to the overall risk score of an asset.

critical path

  1. The processing path that takes the longest time to complete of all parallel paths in a process instance, where each path considered begins at a start node or an input to the process and ends at a terminate node.
  2. A series of activities that determines the earliest completion of a project; the critical path changes as activities or tasks are completed ahead or behind the original schedule estimates.

critical path method
A technique that is used to identify and predict project duration by analyzing which sequence of activities has the least amount of scheduling flexibility.

critical ratio
A relationship of the time scheduled to complete a task to the time available to perform it. Critical ratios are used to measure how closely a task is adhering to its schedule.

critical resource
The system resource whose speed and/or size limits the speed with which a particular workload can be processed.

critical result
The result that is derived when an assessment value is outside the defined tolerance threshold. It is indicative of a serious risk.

critical section
A portion of shared data to which simultaneous access by multiple threads or applications must be prevented.

See certificate revocation list.

See customer relationship management.

A command that is used to schedule a job or process.

cron table
A table that is used to schedule application programs and processes.

cron task
A task that is set to run automatically at an appointed time.

In image processing and in multimedia applications, to cut off or trim.

cross-cell communication
The process of information sharing and request routing between cells.

cross-cell environment
A production environment in which one or more servers in one cell can receive events from another server or set of servers in another cell.

A certificate in the Personal Address Book or Domino Directory that indicates trust in an Internet certificate or trust in a certificate from a foreign Domino domain.

A compiler that produces executable files that run on a platform other than the one on which the compiler is installed.

cross-cutting concern
A software concern (synchronization, logging, memory allocation, and so forth) that is external and orthogonal to the problem that a software component is designed to address.

cross-dimensional formula
A formula that references members from more than one dimension.

cross-dock facility
A stopping point during the delivery. When orders are unloaded and loaded at a cross-dock facility, the freight is not taken into the inventory. The shipper manages all legs of the shipment. See also pool point.

Eliminating the storage process by moving items directly from the receiving dock to the shipping dock or forward pick areas.

Pertaining to control or resources involving more than one domain. See also same-domain.

cross-domain analysis
A data analysis that identifies the overlap of data values between two columns of data.

cross-domain key

  1. In SNA, a pair of cryptographic keys that are used by a system services control point (SSCP) during the initiation of cross-domain LU-LU sessions that use session-level cryptography. The keys are used to encipher the session cryptography key that is sent to another SSCP and to decipher the session cryptography key that is received from the other SSCP.
  2. In Cryptographic Support, a type of key-encrypting key used to encrypt a data-encrypting key that is being sent across a data line or being stored in a file.

cross-domain key table
In Cryptographic Support, a table in the system-supplied physical file QACRKTBL in library QUSRSYS used to store all key-encrypting keys other than the host master key and its variants. Each record of the file contains the name of the key, its use, and its value. The three types of uses are sending, receiving, and personal identification numbers (PINs).

cross-domain link

  1. A link physically connecting two domains.
  2. A subarea link connecting two subareas that are in different domains.

cross-domain network manager session (CDNM session)
A session between two network managers in separate domains.

cross-domain resource (CDRSC)
A representation for a logical unit that is owned by another domain and is referenced by a symbolic name, which can be qualified by a network identifier.

cross-domain resource manager (CDRM)
In VTAM, the function in the system services control point (SSCP) that controls initiation and termination of cross-domain sessions.

Features, changes, or other characteristics that affect more than one DFSMS element.

Cross-Industry Standard Process for Data Mining
A process model for data mining that identifies six phases in the lifecycle of a data mining project: business understanding, data understanding, data preparation, modeling, evaluation, and deployment.

cross join
See Cartesian product.

cross key

cross-memory linkage
In a z/OS environment, a method for invoking a program in a different address space. The invocation is synchronous with respect to the caller.

cross-memory mode
A synchronous method of communication between address spaces.

cross-memory resource-owning task (CMRO task)
A job step in an address space that owns the cross-memory resources. The CMRO task is the top, or first, job step task in the address space.

In SNA, pertaining to control or resources involving more than one network.

cross-network session
An LU-LU or SSCP-SSCP session whose path traverses more than one SNA network.

The change from the barrier algorithm to the primal or dual simplex algorithm.

crossover domain
A domain that returns a value from a field in one application to a field in another application.

crossover field
An application field that links to other fields, allowing a user to link data between certain applications.

cross-project traceability
A feature that establishes traceability relationships between requirements that reside in different projects. See also external project, external traceability.

A pointer to a preferred term (see reference) or to additional information (see also reference).

cross-reference listing
The part of the compiler listing that tells where files, fields, and indicators are defined, referred to, and changed in a program.

cross-reference organization
The organization responsible for defining or maintaining items in multiple catalogs that are supported (referenced) through a single mechanism, such as a Global Trade Item Number (GTIN).

cross-reference table
A table that is created in Partner Editor and is used to convert the user's values to a trading partner's values during outbound processing, or a partner's values to the user's values during inbound processing.

A product recommendation that is related or complementary to the currently displayed or selected product. See also accessory, up-sell.

cross-sell association
An association category to an item, so that all the items in a category are associated to the item as cross-sell items.

Encouraging customers to buy products from other departments or categories, beyond the initial offering.

cross-server migration
The process of migrating an existing product installation to a new version by installing the product on a new server, transferring data to the new installation, and converting the data to the new version.

cross-server query
See distributed query.

cross-site mirroring (XSM)
A function of i5/OS High Available Switchable Resources, Option 41, that provides geographic mirroring and the services to switch over or automatically cause a failover to a secondary copy, potentially at another location, in the event of an outage at the primary location.

cross-site scripting (XSS)
An attack technique that forces a website to echo client-supplied data, which execute in a user's web browser.

cross-system coupling facility (XCF)
A component of z/OS that provides functions to support cooperation between authorized programs running within a sysplex.

cross-system extended services (XES)
A set of z/OS services with which multiple instances of an application or subsystem, running on different systems in a sysplex environment, can implement high-performance, high-availability data sharing by using a coupling facility.

cross-system restart
A process during which automatic restart management restarts elements on another eligible system in the sysplex when a system fails.

See cross tabulation.

cross-table analysis
A data analysis that combines foreign key analysis and cross-domain analysis. Foreign keys reference primary keys that are already defined or identified during primary key analysis.

cross tabulation (crosstab)
A statistical technique used to display the relationships between two or more variables in a table.

A technique for testing how well a model generalizes in the absence of a holdout test sample. Cross-validation divides the training data into a number of subsets, and then builds the same number of models, with each subset held out in turn. Each of those models is tested on the holdout sample, and the average accuracy of the models on those holdout samples is used to estimate the accuracy of the model when applied to new data. See also overfitting.

cross-volume consistency
A consistency group property that guarantees consistency between volumes when an application issues dependent write operations that span multiple volumes.


  1. See capacity requirements planning.
  2. See configuration report program.

See change request.

See change request description.

See configuration report server.

See cathode ray tube.

See customer-replaceable unit.

The process of compressing a problem to make it manageable at intermediate steps in an algorithm. See also uncrush.

In Cryptographic Support, a specialist in solving cryptographic problems.

Pertaining to transformation of data to conceal meaning. See also decipher, encipher.

cryptographic adapter
An expansion board that provides a comprehensive set of cryptographic functions for the network security processor and the workstation in the TSS family of products.

cryptographic algorithm
A set of rules that specify the mathematical steps required to encrypt and decrypt data.

cryptographic application programming interface (CAPI)
An application programming interface that provides services to enable developers to secure applications using cryptography. It is a set of dynamically-linked libraries that provides an abstraction layer which isolates programmers from the code used to encrypt the data.

Cryptographic Coprocessor
In iSeries, a hardware module that can be added to a system to provide enhanced cryptographic processing capabilities.

cryptographic key
A parameter that determines a cryptographic transformation between plaintext and ciphertext.

Cryptographic Service Provider (CSP)
A feature of the i5/OS operating system that provides APIs. The CCA Cryptographic Service Provider enables a user to run functions on the 4758 Coprocessor.

cryptographic session
In SNA products, an LU-LU session in which a function management data (FMD) request can be enciphered before it is transmitted, and then deciphered after it is received. See also clear session, required cryptographic session, selective cryptographic session.

Cryptographic Support
The IBM licensed program that provides support for the encryption and decryption of data, according to the Data Encryption Algorithm, and for the management of cryptographic keys and personal identification numbers (PINs).

cryptographic token
A logical view of a hardware device that performs cryptographic functions and stores cryptographic keys, certificates, and user data.


  1. The transformation of data to conceal its information content and to prevent its unauthorized use or undetected modification.
  2. A method for protecting information by transforming it (encrypting it) into an unreadable format, called ciphertext. Only users who possess a secret key can decipher (or decrypt) the message into plaintext.

cryptography verification request
A request unit that is sent by the primary logical unit (PLU) to the secondary logical unit (SLU) as part of cryptographic session establishment. The request unit allows the SLU to verify that the PLU is using the correct session cryptography key and initialization vector (IV).

See cursor stability.


  1. See common storage area.
  2. See common system area.
  3. See Canadian Standards Association.
  4. See common service area.

CSA International
A leading provider of product testing and certification services for products sold in the U.S., Canada and around the world. See also Canadian Standards Association.

See central site control facility.

See CICS system definition data set.

See control section.

C shell
A command line processor for UNIX that provides interactive features such as job control and command history.

See consolidated software inventory.

CSI MasterFormat
A standard that is used in North America for organizing information about commercial and institutional building projects.

See Common Service Layer.

CSL client
See Common Service Layer client.


  1. See communications storage manager.
  2. See Cluster Systems Management.
  3. See client state manager.

See Carrier Sense Multiple Access with Collision Detection.

CSM database
A repository of cluster, node, and node group information that is created and used by Cluster Systems Management (CSM).

CSM-only installation
The process of installing only Cluster Systems Management (CSM) on the nodes, as opposed to a full installation, which involves installing both CSM and the operating system on the nodes.

See Card Serial Number.

See Computer Science Network.

See combined sewer overflow.


  1. See Cryptographic Service Provider.
  2. See communication scanner processor.


  1. In architecture, the distance from the most positive character coordinate system X-axis value of a character shape to the character's escapement point. C-space can be positive, zero, or negative.
  2. In font design, the distance in pels, measured in the inline (print) direction, between the toned pel furthest from the character reference point and the escapement point.


  1. See certificate signing request.
  2. See customer service representative.


  1. See combined sewer system.
  2. See channel subsystem.
  3. See connectivity subsystem.
  4. See Cascading Style Sheets.

CSS class
An optional part of a selector. A CSS class is a word that is preceded by a dot, which represents a user-defined type to be used in pattern-matching.

CSS for Java
An implementation of Cascading Style Sheets (CSS) for use in styling Java objects.

See Cascading Style Sheets positioning.


  1. See channel service unit.
  2. See customer setup.

CSV file
A text file that contains comma-separated values. A CSV file is commonly used to exchange files between database systems and applications that use different formats.

See channel status word.


  1. See configuration object type.
  2. See cursor table.

See channel-to-channel.

CTC adapter
See channel-to-channel adapter.

See clustered trivial database.

See computer-telephony integration.

See Cellular Telecommunications Industry Association.

See complex text language.

See controller description.

See capable to promise.

See component trace.


  1. See clear to send.
  2. See common transport semantics.
  3. See creation time stamp.


  1. See compatible unit.
  2. See control unit.

See Common User Access.


  1. A multidimensional representation of data needed for online analytical processing, multidimensional reporting, or multidimensional planning applications. See also D-cube.
  2. See multidimensional array.

cube adjusted weight (CAW)
A weight measurement for items that have low weight with respect to the space they occupy.

cube group
A set of similar cubes where each cube group relates to a single level in one dimension of the model. Each member of the group is targeted at one of the categories in the level.

cube object
The object in a model that corresponds to a cube. The cube object specifies how to build the cube and how to reflect the status once the cube has been built.

cube server
A high-performance, scalable cubing engine that is designed to support queries from many users against many different OLAP cubes.

cubic measurement
The volume calculation used to determine the amount of space required to store or ship material as well as the amount of space that can be accommodated by storage units or shipping modes. Used in capacity planning.

See call user data.

See closed user group.

See control-unit initiated reconfiguration.

In GL, the process whereby a primitive that is smaller than the minimum size specified in the command is not rendered: no further commands in the primitive are interpreted.

cultural sort
Sorting of words or strings as a unit, rather than as individual characters. Cultural (or lexical) sort is the type used to order words in dictionaries, glossaries, indexes, and so on. See also sorting.

cumulative backup

  1. The process of copying only data sets that have changed since the last backup of any type. See also full backup, incremental backup.
  2. A type of backup that includes the changes since the most recent full backup. The cumulative backup consolidates and replaces all previous differential backups.

cumulative function
A function that is used to model a quantity that varies over time and whose value depends on other decision variables of the problem. For example, a given capacity or physical resource can be modeled with a cumul function, and the cumulated contribution of intervals (activities) on the resource is represented by a function of time. cumulFunction is a CP keyword but is accepted as a CPLEX identifier.

cumulative mapping
A form of BMS output mapping in which data stream generation is delayed until a SEND PAGE command is received or a page overflow occurs.

cumulative PTF package
Media containing the program temporary fixes (PTFs) for i5/OS that have been accumulated from the start of the current release. PTFs requiring special handling are not included in a cumulative PTF package.

cumulative service tape
A tape that is sent with a new function order and that contains all current PTFs for that function.

cumulative time
The time that a method spends on the execution stack, including both time spent in the method itself and in other methods that it calls.

See Capacity Upgrade on Demand.

In printers, to dry ink sufficiently for minimum transfer of the ink to any parts of the printer it contacts.

A command line tool for retrieving and posting files using URL syntax.

For an Ada-language compilation unit, the state where none of that unit's supporters has been recompiled since the unit itself was compiled. This implies that all of the supporters exist, since the Ada language requires this in order for the program to be compiled. Currency implies that all supporters of a unit were compiled in the correct order, as defined by Ada language rules.

currency advice
An advice that is not assigned to a particular channel.

currency code file
A file containing the currency codes, together with the name, fraction length, country code, and country names.

currency conversion

  1. A factor that converts monetary values in a database from one country's monetary system into another without altering the original data.
  2. A process used to configure conversion rates between the currencies used by organizations in their respective locales.

currency credit advice
A credit advice that is not assigned to a particular channel.

currency debit advice
A debit advice that is not assigned to a particular channel.

currency definition
Mechanism used to define a monetary symbol and indicate Euro currency membership and expiration date, if applicable.

currency format
An alpha-numeric unique code of a currency.

currency partition
A dimension type that separates local currency members for a base currency defined in an application. A currency partition also identifies currency types such as actual, budget, and forecast.

currency record
Information that is used in reporting components to display data in different currencies.

currency sign
In COBOL, the character $.

currency symbol

  1. A character such as the dollar sign ($) used to identify monetary values.
  2. In COBOL, the character defined by the CURRENCY SIGN clause in the SPECIAL-NAMES paragraph. If no CURRENCY SIGN clause is present in a COBOL source program, the currency symbol is identical to the currency sign.

currency table
A table of information about currencies that the user maintains in Transformer or loads from an external data source.

currency time
The time at which a user reads news items. The news command considers only the items posted after this time to be current for the user.

current backup version
In DFSMShsm, a backup copy of the data set that was created on a date after the data set was last updated.

current baseline print coordinate (bc)
In IPDS architecture, the baseline coordinate corresponding to the current print position on a logical page. The current baseline print coordinate is a coordinate in an I,B coordinate system.

current character position
The two-dimensional screen coordinates where the next character string or pixel read/write operation will occur.

current charge
In an advanced order, the set of charges a customer incurs for order items that can be shipped at once. See also total charge.

current color
The color that is employed to color all subsequent drawing primitives. All drawing primitives are drawn with this color until it is changed.

current connect group
In RACF, during a terminal session or batch job, the group with which a user is associated for access checking purposes. On MVS, if a user does not specify the current connect group on the LOGON command or batch JOB statement, the current connect group is the user's default group. On CICS, users cannot specify a group other than their default group. If list-of-groups processing is in effect, users are associated with all the groups to which they are connected. See also default group.

current customization definition
A customization definition that describes an instance for which the corresponding resources have already been deployed and are running.

current data
Data within a host structure that is current with (that is, identical to) the data within the base table.

current directory
See working directory.

current drawing attribute
In architecture, an attribute used at the present time to direct a drawing process. See also default drawing attribute.

current drawing control
In architecture, a drawing control used at the present time to direct a drawing process. See also default drawing control.

current file

  1. In the make command, the file that the make command is working with at a given moment. The make command replaces the $* macro with the name of the current file.
  2. The file being edited. If multiple windows are in use, the current file is the file containing the cursor.

current files library
The files library to search for database files to be used by the System/36 environment for the current job.

current folder
In CDE, the currently opened folder in an active File Manager view.

current form
In query management, the form being applied against the data to produce the report being displayed or printed.

current heap
In Pascal, the area of storage where dynamic variables allocated by calls to NEW reside. Other heaps can exist at the same time, but only one is current.

current host
See local host.

current inline coordinate
See current inline presentation coordinate.

current inline presentation coordinate
The inline presentation position at the present time. This inline presentation position is the summation of the increments of all inline controls since the inline coordinate was established in the presentation space. An inline presentation position is established in a presentation space either as part of the initialization procedures for processing an object or by an Absolute Move Inline control sequence.

current inline print coordinate
In IPDS architecture, the inline coordinate corresponding to the current print position on a logical page. The current inline print coordinate is a coordinate in an I,B coordinate system.

current interrupted job
When a job is interrupted by pressing the Attn key, another job can be started from a command line. This job can also be interrupted by pressing the Attn key again. The current interrupted job is the most recently interrupted. The job name for the current interrupted job is displayed at the top of the Inquiry Options menu.

current inventory
Items currently available for shipment from a node.

current left margin
In DCF, the left limit of a column that is in effect for formatting.

current library
The library that is specified to be the first user library searched for objects requested by a user. The name for the current library can be specified on the Sign-On display or in a user profile. When you specify an object name (such as the name of a file or program) on a command, but do not specify a library name, the system searches the libraries in the system part of the library list, then searches the current library before searching the user part of the library list. The current library is also the library that the system uses when you create a new object, if you do not specify a library name.

current line
The line on which the cursor is located.

current line pointer (CLP)
In systems with time sharing, a pointer that indicates the display line on which operations are being performed.

current list
A list name, specified with a resource definition online command, that is "remembered" until another list name is used.

current logical page
In architecture, the logical page presentation space that is currently being used to process the data within a page object or an overlay object.

currently committed
A state that increases the concurrency of read-only data access by allowing the committed version of a row to be processed when a lock is encountered instead of requiring the query to wait for the lock to be released. See also optimistic locking, pessimistic locking.

current mode
In the GDDM function, the characteristics of the controlling session. For example, when a color is defined, everything the program draws uses that color until the color is changed.

current object
The application server to which the QMF session is currently connected. After the connection is made, this server processes all SQL statements.

current owner
In Contributor, the person who is editing or last opened an e.List item for edit.

current page
An open console page that is fully visible at a given moment or in focus. This is in contrast to other open pages that are in the background.

current path
See SQL path.

current plan
A detailed plan of system activity that covers a period of at least 1 minute, and not more than 21 days. A current plan typically covers 1 or 2 days.

current position

  1. In computer graphics, the position, in user coordinates, that becomes the starting point for the next graphics routine, if that routine does not explicitly specify a starting point.
  2. In architecture, the position identified by the current presentation space coordinates; for example, the coordinate position reached after the execution of a drawing order. See also given position.
  3. In an IMS database, the place immediately preceding the segment occurrence that IMS retrieves if the user immediately issues an unqualified retrieval call.

current print position

  1. The picture element that defines the character reference point or the upper-left corner of an image.
  2. The point on the page where the printer is currently logically positioned; the position were the next pel will be printed if no move text controls are executed. When the character is placed on the page, the character reference point coincides with the current print position. See also character reference point.

current processor capacity (CPC)
The amount of processor capacity (in units of 1/100 of a physical processor) that is assigned to a logical partition.

current record

  1. In COBOL, the record that is available in the record area associated with the file.
  2. The record pointed to by the current line pointer.

current record pointer
In COBOL, a method of identifying a record that is used in the sequential processing of the next record.

current release
The latest available release of the system that replaced the Licensed Internal Code, operating system, or both.

current row
The most recently retrieved row of the active set of a query.

current security label
The security label that RACF uses in RACF authorization checking if the SECLABEL class is active.

current selection
A highlighted text block or element.

current session
In CDE, the session saved by Session Manager when you log off. At the next login, unless you specify otherwise, this session automatically opens, enabling work to continue where you left off. See also home session.

current SQL ID
In DB2 for z/OS, an identifier that, at a single point in time, holds the privileges that are exercised when certain dynamic SQL statements run. The current SQL ID can be a primary authorization ID or a secondary authorization ID.

current state
In DB2 for i5/OS, the state of a connection when it is the one used for SQL statements that are executed. See also dormant state.

current status rebuild
The second phase of restart processing during which the status of the subsystem is reconstructed from information on the log.

current version
The latest checked-in version in the version series of a document. Only the current version can be checked out or promoted.

current volume pointer
In COBOL, a conceptual entity that points to the current volume of a sequential file.

current window
The window to which the system directs the output from graphics routines.

current working directory
See working directory.

A series of courses that together satisfy a specific set of learning objectives. A student can enroll in a curriculum rather than each of the individual courses it contains, and progress can be tracked over the curriculum as a whole.

cursive script
A script whose adjacent characters might touch or be connected to each other. For example, Arabic script is cursive.


  1. A reference to an element at a specific position in a data structure.
  2. A named control structure used by an application program to point to and select a row of data from a set. See also asensitive cursor, cursor sensitivity, dynamic cursor, insensitive cursor, parameterized cursor, sensitive cursor, static cursor.
  3. During a HALDB online reorganization, a marker in a database partition that separates the copied database records from the records that have not been copied. The cursor indicates the progress of the reorganization through the HALDB partition.
  4. A movable symbol on a display, often a blinking or solid block of light, that identifies a choice to select, indicates where user interaction with the keyboard will appear, or indicates a position of interest on the display surface.
  5. A displayed symbol that acts as a marker to help the user locate a point in text, in a system command, or in storage. Cursors mark file position and access information in distributed data management (DDM) architecture.
  6. In SQL, an identifier associated with a group of rows or with a collection.

cursor-active status
For high availability large database (HALDB) online reorganization, the status in the recovery control data set (RECON data set) that alerts Database Recovery Control (DBRC) that an online reorganization has started.

cursor blocking
See blocking.

cursor column indicator
In System z LPEX Editor, a visual indicator of the column in which the cursor is currently located.

cursor function
A user-defined routine that returns one or more rows of data and therefore requires a cursor to execute. See also function cursor, noncursor function.

cursor manipulation statement
An SQL statement that controls cursors; specifically, the CLOSE, DECLARE, FETCH, FLUSH, OPEN, and PUT statements.

cursor movement key
A key that a user presses to move the cursor on the screen.

cursor operation record
A record that contains instructions for the translator on moving through the result set returned by a query to a new record. Each operation record is associated with a single SQL statement record that returns a result set. The translator performs cursor operations as it encounters them while processing the map.

cursor sensitivity
The degree to which database updates made by the same application process or another application process are incorporated in the data returned by FETCH statements for a cursor after the database updates. See also asensitive cursor, cursor, insensitive cursor, sensitive cursor.

cursor stability (CS)

  1. An isolation level under which a query in a transaction is prevented from reading any changes made to rows by statements in other transactions until the changes have been committed. A transaction using CS with an updatable cursor prevents statements in other transactions from changing and possibly reading a row until the cursor has moved from that row. See also isolation level, read stability, repeatable read, uncommitted read.
  2. An isolation level that locks any row accessed by a transaction of an application while the cursor is positioned on the row. The lock remains in effect until the next row is fetched or the transaction is terminated. If any data is changed in a row, the lock is held until the change is committed to the database.

cursor table (CT)
The internal representation of a cursor.

cursor variable
A global variable, local variable, or parameter of a cursor data type.

curve fitting
See smoothness of curve.

See control interval update sequence number.

custom action

  1. An action for a file or project that is created using the Menu Manager preferences pages and is displayed on pop-up menus.
  2. An action on a business object that runs code for specific state transitions. This action can be a Java class method or an EJB name.
  3. In JSP programming, an action described in a portable manner by a tag library descriptor and a collection of Java classes and imported into a JSP page by a taglib directive. (Sun)
  4. A Java or non-Java process definition that a user can define as a part of a health policy action plan or elasticity operation.

custom adapter
An adapter that is created by users or consultants and is not shipped with Sterling B2B Integrator. Custom adapters can integrate custom applications and legacy systems with Sterling B2B Integrator.

custom attribute

  1. A user-defined property for an asset that further describes assets of that type. For example, a custom attribute for database tables might be "Expected maximum row count." The custom attribute would be available for every database table, and might contain different values for different database tables.
  2. User-defined characteristics of an asset, for example: support contact and confidential.

Custom-built Product Delivery Option (CBPDO)
A software delivery package consisting of uninstalled products and unintegrated service. Installation requires the use of SMP/E. CBPDO is one of the two entitled methods for installing z/OS; the other method is ServerPac.

custom card identification number (CCIN)
A unique alphanumeric number that is assigned many individual hardware parts or assemblies.

custom configuration
A selected combination of products tailored by a vendor to the needs of one or more users. Each custom configuration is identified by unique serial number, which is incorporated into the custom configuration.

custom dashboard
A dashboard that is created by the user from widgets and various data sources to meet specific requirements. It is not supplied with the application. See also fixed dashboard.


  1. A user of an online store.
  2. A group or organization that is associated with one or more applications. A customer can be an external organization that accesses a data center or an internal department within a company.

customer acceptance laboratory (CAL)
An environment set up to run with a perspective purchaser's sample data to ensure favorable performance.

customer account
Credit that is assigned to a customer by the corresponding enterprise.

customer appeasement
The process of satisfying customers when they are displeased with any service provided.

customer assignment
The assignment of pricing entities such as price lists, pricing rules, and coupons to customers so that the prices of items and pricing adjustments are applied to those customers.

customer base
The primary market for a product or store.

customer churn
The proportion of contractual customers or subscribers who leave a supplier during a given time period. Churn rate is a possible indicator of customer dissatisfaction, cheaper and/or better offers from the competition, more successful sales and/or marketing by the competition, or reasons having to do with the customer life cycle. Churn rate can be thought of as the inverse of retention rate.

customer compliance
The tasks that must be performed to comply with a specific customer's needs, such as placing special labels on cartons that are shipped to a particular customer.

Customer Console
A user interface to a server.

customer entitlement
An entitlement, defined by an enterprise, that defines the items that a customer can buy.

customer-facing store
An online site where users may obtain information regarding products and conduct business transactions regarding these products. WebSphere Commerce supports the following customer-facing stores: hub store, direct sales store, and extended site store.

customer grade
A grade that is assigned to a customer, based on the customer's rating within the organization. For example, a customer may be assigned a grade of A, indicating that the customer is an excellent customer, or B, indicating that the customer is an average customer. These grades determine how approval rules for quotes can be applied.

customer group
A type of member group consisting of a collection of customers who have been grouped by a site administrator because they share similar shopping patterns or characteristics. See also site administrator.

customer installable feature (CIF)
An assembly or part that a customer can replace.

customer-managed use control
A level of password use control in which the customer manages compliance with the terms of the software product acquisition. See also password use control level, vendor-managed use control.

customer order
A list of items being purchased by a customer. The customer order contains customer data, ship-to information, bill-to information, delivery dates, and line items that list SKUs being purchased.

customer pick
The process where a customer visits a store to pick up a product that has been previously ordered.

Customer Premise Equipment Alerting Signal tone (CAS tone)
In ADSI, this tone is sent to the ADSI telephone to switch the phone to data mode.

customer premises equipment (CPE)
Telephony equipment which is on the premises of a business or domestic customer of the telephone company. An example is a private branch exchange (PBX).

customer profile
A collection of attributes that collectively describe a typical customer.

customer relationship management (CRM)
One of two major corporate business processes (with Integrated Product Development) within IBM. CRM defines standards for responding to customers, particularly in the delivery of services engagements.

customer-replaceable unit (CRU)
An assembly or part that a customer can replace.

custom error page
A feature of most web server software that allows the user to replace default error messages with messages that are custom designed for the application.

customer segment
All information about the customer that is held by the seller. This can include basic demographics, order history, or operational data such as the user ID and shipping address. Customer segments are dynamic; marketing managers define the criteria for including a customer in a customer segment. Customer segments can be the targets of campaigns.

customer service optimization
The practice of improving customer service operations, which is often measured by first call resolution rates, average call time, customer satisfaction with service, and other factors.

customer service representative (CSR)

  1. A defined role in WebSphere Commerce that manages customer inquiries. The customer service representative also processes customer registration, orders, and returns. See also customer service supervisor, order, script.
  2. A person who processes customer purchases, orders, returns, inquiries, and store registration.

customer service supervisor
A defined role in WebSphere Commerce that has access to all customer service tasks. The customer service supervisor manages customer inquiries (such as customer registration, orders, returns, and auctions) and has authority to complete tasks that cannot be accessed by a customer service representative, such as approving system-denied returns records, and contacting customers regarding payment exceptions (such as credit card authorization failures). See also customer service representative.

customer session data
Information gathered from customers during the time they visit an online store.

customer setup (CSU)
The unpacking, setup, and checkout of machines by customer personnel, according to a sequence of instructions provided by the manufacturers, without the use of tools or the assistance of trained service personnel.

customer type
An identifying type for a customer, such as a business customer or a consumer customer.

customer vertical
The sector to which a customer belongs, such as educational institutions or government.

custom event
An event that is customized by a buyer or a seller to monitor the lifecycle events of a purchase order that is not preconfigured in the solution.

custom field
A field in a user or group profile that can be used to store installation data, and for which the installation can customize the keyword name and attributes.

custom finder
See finder method.

custom Greex rule

  1. An advanced XML condition that supplements the set of defined functions that are provided in the Greex library and are used to evaluate conditions on input data.
  2. An advanced XML condition that is configurable to meet specific validation scenarios.

custom group
A group that is used to organize report objects in a report according to their purpose or content. All other report objects are filtered out if they are not assigned to the custom group.


  1. The ability to change how objects on a personal computer look and work. For example, a user can tailor what objects are in a work area by creating, moving, or copying objects to the work area.
  2. The modification of a portal page or portlet by a user. WebSphere Portal enables a user to customize a portal page by modifying the page layout and by selecting which portlets will display per device. See also personalization.
  3. The process of describing optional changes to defaults of a software program that is already installed on the system and configured so that it can be used. See also configuration.
  4. The process of designing a data processing installation or network to meet the requirements of particular users. Activities can include installing additional products, taking advantage of new software features and functions, and enabling or disabling optional features.

customization definition document (CDD)
An XML document that describes the layout of an instance (that is, its organizational units (OUs) and servers, and which service bundles are assigned to each server-OU combination). The Customization Definition Program (CDP) uses a CDD to determine which deployment data to produce for an instance.

customization definition report
A report that describes the servers, organizational units (OUs), and services of an instance, and how they are distributed within the instance.

customization set
A collection of settings that match users to a custom user interface.

customization time data
See build time data.


  1. To describe optional preferences or changes to defaults in a software program that is already installed and configured.
  2. To describe to the system the devices, programs, users, and user defaults for a particular data processing system or network.

customized database
An entity within the Object Data Manager (ODM) that contains configuration data for defined or available devices in the system.

Customized Devices Object Class
A representation within the Object Data Manager (ODM) of each device instance as distinguished by a unique logical name. The Customized Devices Object Class contains basic information about the device such as device status and how to access the information contained in other object classes.

customized installation package (CIP)
A customized installation image that can include one or more maintenance packages, a configuration archive file from a stand-alone server profile, one or more enterprise archive files, scripts, and other files that help customize the resulting installation.

A Java class (implementing the java.beans.Customizer interface) that is associated with a bean to provide a richer user interface for the properties of that bean.

custom node
A virtual image part that provides an unconfigured node for a pattern that has a deployment manager or a control node as its base.

custom object
A generic business object that can be stored in a folder. A custom object cannot have versions, lifecycles, or content.

custom operator
An operator written in the Streams Processing Language (SPL). See also operator, primitive operator.

custom profile
A profile that describes an empty node, which becomes operational, as a managed node, when federated into a network deployment cell.

custom property

  1. A property that consists of a name and value and applies to an organization, product, or contract for informational and search puropses.
  2. A user-defined property, as opposed to a system-defined property. The user can assign custom properties to a class. See also property.

custom relationship
An association between two or more data entities as provided by the user.

custom screen record
A runtime view of the screen that allows access to available screen fields.

custom server
A C language or C++ language program that provides data manipulation and local or remote data stream, database, or other services beyond those provided by the state table interface. Custom servers provide an interface between DirectTalk and business applications, functions, or other processes to give callers access to business information and voice processing functions such as speech recognition. See also 3270 server.

custom service
A configurable service that defines a hook that runs when the server starts and shuts down when the server stops.

custom set
In Analysis Studio, a named object which can include filter rules, calculations, and sort rules. Custom sets can define a set of members that is different from any set originally defined in the cube model. See also predefined set, set.

custom tag
An extension to the JavaServer Pages (JSP) language that performs a specialized task. Custom tags are typically distributed in the form of a tag library, which also contains the Java classes that implement the tags.

custom text analysis engine
A text analysis engine that is created using the Unstructured Information Management Architecture (UIMA) SDK and can be added to the set of standard enterprise search text analysis engines. See also analysis engine, enterprise search base annotator.

custom tool
A type of script that is used to create customized applications, user interfaces, and updates the menu structure of the user interface.

custom user
A user type that has the same permissions of a standard user plus the ability to create projects, archive data, partition data, create groups, create users, or manage the database.

custom user registry
A customer-implemented user registry that implements the UserRegistry Java interface. This registry type can support virtually any kind of accounts repository from a relational database and can provide flexibility in adapting product security to various environments.

custom view
A view that uses actions such as summarize, cloak, exclude, and apex to limit access to information in a cube to members of a given user class. User class views are replaced by custom views associated with the users, groups, or roles in a configured namespace.

custom volume
A volume in count-key-data (CKD) format that is not a standard volume, which means that it does not necessarily present the same number of cylinders and capacity to its assigned logical control unit as provided by one of the standard S/390 volume types. See also count key data, interleave, standard volume.

Custom Wire Format (CWF)
The physical representation of a message in the MRM domain that is composed of a number of fixed format data structures or elements, which are not separated by delimiter characters.


  1. A way of eliminating part of the search space without losing any feasible or optimal solutions.
  2. An action that identifies a page, object, or picture that is to be deleted or moved to another place in the same or different document or file
  3. In multimedia applications, the process of instantly replacing a picture from one source with a picture from another. This is the most common form of editing scene to scene.
  4. The severed part of a perforation. Cuts are separated by ties.

cut and paste
A type of dictionary gloss used to restore the lemma form the surface form by cutting and pasting new characters.

cut-down model
A customized copy of the master model definition that has been cut down to include only the specific elements required for a particular e.List item.

An edge that results in a graph being no longer connected, if the edge is removed from the graph.

cut form
A single form not connected to other forms. The form may have an original and one or more copies. Cut forms are fed separately into a printer. See also continuous forms.

CUT mode
See control unit terminal mode.

A node that results in a graph being no longer connected, if the node is removed from the graph.

A threshold that specifies how the scored record pairs are categorized as matched, nonmatched, or clerical records based on the weight generated by the matching process.

cut-off time
The time the clearing channel is cut off, that is, the time after which it no longer settles payments.

cutoff workflow
A workflow that is launched by the cutoff event. It ensures that the records manager reviews the entity after the cutoff trigger and approves the cutoff date.

A part of a form that has been eliminated or perforated for subsequent removal, for example, corner cuts and binder holes.

The point of change from a development CICS system to a production CICS system, or between different releases of CICS.

cut-sheet media
In architecture, unconnected sheets. See also continuous-form media.

cut-sheet paper
Paper that is cut into uniform-size sheets before being loaded into the printer. See also continuous forms.

cut-sheet printer
A printer that requires cut-sheet paper. See also continuous-forms printer.

In fibre-channel technology, a switching technique that allows a routing decision to be made and acted upon as soon as the destination address of a frame is received. See also route.

cut-through channel
A channel of voice data which has been passed through echo cancellation algorithms. The channel provides echo-cancelled voice data which can then be used by the engine in a recognition attempt.

cut-to-tie ratio
The ratio of the length of the cut and the length of the tie in the perforations between continuous forms.

See cost variance.

See cost variance at completion.

See common VTOC access facility.

See CICS-value data area.

See Concurrent Versions System.

CVS repository
A storage space where a Concurrent Versions System (CVS) stores file version information.

See Common Vulnerability Scoring System.

See communication vector table.

CVV auth code
See card verification value authorization code.

See case weight.

See common work area.

An NCP threshold of buffer availability, below which the NCP will accept only high-priority path information units (PIUs).

See Custom Wire Format.

See common warehouse metamodel.

See hundredweight.

See coupled extended remote copy.

A color model used by the printing industry based on mixing cyan, magenta, and yellow. See also cyan/magenta/yellow/black.

A color model used by the printing industry based on mixing cyan, magenta, yellow, and black. CMYK is an enhancement of the cyan/magenta/yellow (CMY) model, created after printers discovered they could obtain a darker black using special black colorants rather than by combining cyan, magenta, and yellow alone. See also cyan/magenta/yellow.

The protection of online information from attack or unauthorized use.


  1. A path of a graph that begins and ends on the same node.
  2. A set of tables that can be ordered so that each table is a descendent of the one before it, and the first table is a descendent of the last table. A self-referencing table is a cycle with a single member. See also referential cycle.
  3. To end a management collection object that is currently in use and to open a new object for storing future collections. This process prevents collection objects from becoming too large.

cycle count
The process of counting items in storage and reconciling the actual count (resolving count variances) to system inventory records.

cycle start date
In DFSMShsm, the date a backup cycle, dump cycle, or migration cleanup cycle is started.

cycle time

  1. The time required for a process instance in a process simulation run to finish processing its inputs. Cycle time includes idle time when an activity in the process is waiting for a resource to become available.
  2. The time elapsed during one cycle of the processor. Cycle time varies from one type of processor to another.
  3. The minimum time interval between starts of successive read/write cycles of a storage device.

cyclic graph
A graph that contains cycles.

cyclic interval
The number of days in a cyclic period.

cyclic period
A period that represents a constant number of days. There are two types of cyclic periods: Work-days-only cyclic period, where only the work days are counted when calculating the number of days in the period and All-days cyclic period, where all days are counted.

cyclic redundancy check (CRC)
A redundancy check in which the check key is generated by a cyclic algorithm

cyclomatic number
A number that is equal to m - n + 1, where m = number of edges and n = number of nodes.


  1. A unit of storage on a count-key-data (CKD) device with a fixed number of tracks.
  2. On a magnetic disk or in an assembly of disks, the set of all tracks that can be accessed by all the magnetic heads of a comb in a given position, without repositioning the access mechanism.

See Complete Zip Auditing and Rating.