Glossary
This glossary defines the special terms, abbreviations, and acronyms that are used in this publication. If
you do not find the term that you are looking for, refer to the index or to the Dictionary of Computing,
1994.
Numbers
2:1 compression
The relationship between the quantity of data that can be stored with compression as compared
to the quantity of data that can be stored without compression. In 2:1 compression, twice as much
data can be stored with compression as can be stored without compression.
A
A Ampere.
ac Alternating current.
access method
A technique for moving data between main storage and input or output devices.
accessor
This component contains the library robot and bar code reader. The accessor moves cartridges to
and from the I/O station, storage slots, and tape drives.
adapter card
A circuit board that adds function to a computer.
adj Adjustment.
AES Advanced Encryption Standard. A data encryption technique that improved upon and officially
replaced the Data Encryption Standard (DES).
AH Authentication Header. An Internet Protocol intended to guarantee connectionless integrity and
data origin authentication of IP datagrams. Further, it can optionally protect against replay attacks
by using the sliding window technique and discarding old packets.
AIX Advanced Interactive Executive. IBM's implementation of the UNIX operating system. The
System p system, among others, uses AIX as its operating system.
alphanumeric
Pertaining to a character set that contains letters, numerals, and other characters, such as
punctuation marks.
alter To change.
ambient temperature
The temperature of air or other media in a designated area, particularly the area that is
surrounding equipment.
AME Application Managed Encryption.
ampere (A)
A unit of measure for electric current that is equivalent to a flow of 1 coulomb per second, or to
the current produced by 1 volt applied across a resistance of 1 ohm.
ANSI American National Standards Institute.
application-managed encryption
Tape encryption that is controlled by an application.
© Copyright IBM Corp. 2009, 2018 237
||
|