《Computer Engineering and Technology 1》Acronyms used in Computer Engineering and Technology
Advertisement
ADSL Asymmetric Digital Subscriber Line
AGP Accelerated Graphics Port
AIFF Audio Interchange File Format
ANSI American National Standards Institute
API Application Program Interface
ASCII American Standard Code for Information Interchange
ATA Advanced Technology Attachment
ATM Asynchronous Transfer Mode
Bcc Blind Carbon Copy
BIOS Basic Input/Output System
BMP Bitmap
Cc Carbon Copy
CCD Charged Coupled Device
CD Compact Disc
CD-R Compact Disc Recordable
CD-ROM Compact Disc Read-Only Memory
CD-RW Compact Disc Re-Writable
CPU Central Processing Unit
CRT Cathode Ray Tube
DDR Double Data Rate
DDR2 Double Data Rate 2
DDR3 Double Data Rate Type 3
DFS Distributed File System
DHCP Dynamic Host Configuration Protocol
DIMM Dual In-Line Memory Module
DLL Dynamic Link Library
DMA Direct Memory Access
DNS Domain Name System
DOS Disk Operating System
DPI Dots Per Inch
DRAM Dynamic Random Access Memory
DRM Digital Rights Management
DSL Digital Subscriber Line
DV Digital Video
DVD Digital Versatile Disc
DVD+R Digital Versatile Disc Recordable
DVD+RW Digital Versatile Disk Rewritable
DVD-R Digital Versatile Disc Recordable
DVD-RAM Digital Versatile Disc Random Access Memory
DVD-RW Digital Versatile Disk Rewritable
DVI Digital Video Interface
DVR Digital Video Recorder
ECC Error Correction Code
EDI Electronic Data Interchange
EIDE Enhanced Integrated Drive Electronics
EPS Encapsulated PostScript
FAQ Frequently Asked Questions
FIFO First In, First Out
FiOS Fiber Optic Service
FLOPS Floating Point Operations Per Second
FPU Floating Point Unit
FSB Frontside Bus
FTP File Transfer Protocol
Gbps Gigabits Per Second
GIF Graphics Interchange Format
GIGO Garbage In, Garbage Out
GIS Geographic Information Systems
GPS Global Positioning System
GPU Graphics Processing Unit
GUI Graphical User Interface
HDD Hard Disk Drive
HDMI High-Definition Multimedia Interface
HDTV High Definition Televsion
HDV High-Definition Video
HTML Hyper-Text Markup Language
HTTP HyperText Transfer Protocol
HTTPS HyperText Transport Protocol Secure
I/O Input/Output
ICANN Internet Corporation For Assigned Names and Numbers
ICF Internet Connection Firewall
ICMP Internet Control Message Protocol
Advertisement
ICS Internet Connection Sharing
ICT Information and Communication Technologies
IDE Integrated Device Electronics or Integrated Development Environment
IEEE Institute of Electrical and Electronics Engineers
IGP Integrated Graphics Processor
IM Instant Message
IMAP Internet Message Access Protocol
InterNIC Internet Network Information Center
IP Internet Protocol
IPX Internetwork Packet Exchange
IRC Internet Relay Chat
IRQ Interrupt Request
ISA Industry Standard Architecture
ISDN Integrated Services Digital Network
ISO International Organization for Standardization
ISP Internet Service Provider
IT Information Technology
IVR Interactive Voice Response
JPEG Joint Photographic Experts Group
JRE Java Runtime Environment
Kbps Kilobits Per Second
KVM Switch Keyboard, Video, and Mouse Switch
LAN Local Area Network
LCD Liquid Crystal Display
LED Light-Emitting Diode
LIFO Last In, First Out
LPI Lines Per Inch
LTE Long Term Evolution
LUN Logical Unit Number
MAC Address Media Access Control Address
Mbps Megabits Per Second
MBR Master Boot Record
MCA Micro Channel Architecture
MIDI Musical Instrument Digital Interface
MIPS Million Instructions Per Second
MMS Multimedia Messaging Service
MP3 MPEG-1 Audio Layer-3
MPEG Moving Picture Experts Group
MTU Maximum Transmission Unit
NAT Network Address Translation
NetBIOS Network Basic Input/Output System
NIC Network Interface Card
NNTP Network News Transfer Protocol
NOC Network Operations Center
NTFS New Technology File System
OCR Optical Character Recognition
ODBC Open Database Connectivity
OEM Original Equipment Manufacturer
OLE Object Linking and Embedding
OOP Object-Oriented Programming
OSD On Screen Display
P2P Peer To Peer
PC Personal Computer
PCB Printed Circuit Board
PCI Peripheral Component Interconnect
PCI-X Peripheral Component Interconnect Extended
PCMCIA Personal Computer Memory Card International Association
PDA Personal Digital Assistant
PDF Portable Document Format
PHP Hypertext Preprocessor
PIM Personal Information Manager
PMU Power Management Unit
PNG Portable Network Graphic
POP3 Post Office Protocol
PPGA Plastic Pin Grid Array
PPI Pixels Per Inch
PPM Pages Per Minute
PPP Point to Point Protocol
PPPoE Point-to-Point Protocol over Ethernet
Advertisement
PPTP Point-to-Point Tunneling Protocol
PRAM Parameter Random Access Memory
PROM Programmable Read-Only Memory
RAID Redundant Array of Independent Disks
RAM Random Access Memory
RDRAM Rambus Dynamic Random Access Memory
RFID Radio-Frequency Identification
RGB Red Green Blue
RISC Reduced Instruction Set Computing
ROM Read-Only Memory
RTE Runtime Environment
RTF Rich Text Format
SATA Serial Advanced Technology Attachment
SCSI Small Computer System Interface
SD Secure Digital
SDK Software Development Kit
SDRAM Synchronous Dynamic Random Access Memory
SDSL Symmetric Digital Subscriber Line
SEO Search Engine Optimization
SERP Search Engine Results Page
SIMM Single In-Line Memory Module
SKU Stock Keeping Unit
SLA Software License or Service Level Agreement
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SO-DIMM Small Outline Dual In-Line Memory Module
SOA Service Oriented Architecture
SOAP Simple Object Access Protocol
SQL Structured Query Language
SRAM Static Random Access Memory
sRGB Standard Red Green Blue
SSD Solid State Drive
SSH Secure Shell
SSID Service Set Identifier
SSL Secure Sockets Layer
TCP/IP Transmission Control Protocol/Internet Protocol
TFT Thin-Film Transistor
TIFF Tagged Image File Format
TTL Time To Live
TWAIN Toolkit Without An Informative Name
UAT User Acceptance Testing
UDDI Universal Description Discovery and Integration
UDP User Datagram Protocol
UPnP Universal Plug and Play
UPS Uninterruptible Power Supply
URI Uniform Resource Identifier
URL Uniform Resource Locator
USB Universal Serial Bus
UTF Unicode Transformation Format
VCI Virtual Channel Identifier
VDSL Very High Bit Rate Digital Subscriber Line
VDU Visual Display Unit
VFAT Virtual File Allocation Table
VGA Video Graphics Array
VLB VESA Local Bus
VLE Virtual Learning Environment
VoIP Voice Over Internet Protocol
VPI Virtual Path Identifier
VPN Virtual Private Network
VRAM Video Random Access Memory
VRML Virtual Reality Modeling Language
W3C World Wide Web Consortium
WAIS Wide Area Information Server
WAN Wide Area Network
WDDM Windows Display Driver Model
WEP Wired Equivalent Privacy
Wi-Fi Wireless Fidelity
WINS Windows Internet Name Service
WPA Wi-Fi Protected Access
WWW World Wide Web
XHTML Extensible Hypertext Markup Language
XML Extensible Markup Language
XSLT Extensible Style Sheet Language Transformation
ZIF Zero Insertion Force
Advertisement
- In Serial40 Chapters
Keys of the Endpoint
Keys of the Endpoint is an illustrated web serial about the re-birth of civilization in a fantastical world suffering from a recent apocalyptic event. Every day, people appear from the storms that ravage the Endpoint. Whisked away from their own time and place by storms in their homelands, these newcomers find themselves in a hostile place made up of ruins and people from every timeline imaginable. Stranger still, they all soon discover they're carrying silver keys that grant each holder incredible powers. On Earth, most people have mundane excuses for the disappearances, but not Isaac. Having lost his brother Finn to one of these storms, Isaac becomes obsessed with finding a pattern. Not to prevent more people disappearing, but rather to get taken by the storms himself in order to find his brother. While chasing Finn’s faint trail, Isaac soon discovers how little he really knew about himself, his brother and how much loss one person can take. In Keys of the Endpoint there's portal fantasy, personal drama, magic (useable by everyone), plenty of combat, power progression, mysteries, factions, feuds and eventually war (in that order). The magic system is well defined and modular with nigh infinite combinations. The story starts out with one of the two main characters looking for his lost brother but quickly expands in scope from that point on. Links: Website, Discord, Patreon, Subreddit, Twitter, Artist Instagram
8 77 - In Serial99 Chapters
Journey of 365 Days (((Kind of Completed)))
365 days, 365 scenes.Battles among supreme beings.Poems about losing love.Dragons showing mercy.Kids stumbling upon magic. This journey involves my answering of 365 creative writing prompts in a desperate bid to overcome my laziness.The prompts come from https://thinkwritten.com/365-creative-writing-prompts/ and I used to write one a day, but since I've been making progress with overcoming my laziness I'm spending much more time working on my Works in Progress (real novels). THE SITUATION RIGHT NOW: I've gotten over the majority of my laziness. I'm unlikely to update this much. It's pretty much complete. The novel I'm working on is Dark Seas Leading Demise
8 55 - In Serial30 Chapters
Attached
The Miller woods is a vast mysterious forest, known for numerous cold-case unsolved disappearances. Cory Dunn was only fourteen when he got lost in The Miller Woods, spending a night in it. He was the only one to return after several hours, ending up in a psychiatric ward when he reappeared the next day. After the incident, the local government issued the order that the woods are now off-limits to everybody. Questions still remain unanswered about what happened as large fences with barbed wire and electricity on it are needed to keep thrill-seekers out. Now Cory is sixteen and rejoining society, starting school at Miller high, joining Sid and his friends in class. With his appearance, rumours start making their rounds again, about what supposedly happened to him. Sid and his friends love anything that has to do with horror, thriller, and mystery. And Cory Dunn's story is filled with those elements, as the boy never told anyone what happened in the woods. Adamant about finding answers to the mystery, Sid and his friends use a major power outage all over town to sneak into the woods. What they didn't anticipate on, is the fact something might follow them out of the woods...
8 88 - In Serial12 Chapters
The Noble's Undead
The noblewoman seeks change. The hunter seeks riches. The undead seeks purpose. When Eliza runs from her noble house to pursue a life of adventure and fails miserably, her life takes a sudden change in direction when she meets a sentient, but mute, undead. Meanwhile the hunter Rorik pursues her, dissatisfied but determined to achieve a better life by claiming her bounty. Three people seeking individual goals that will stir Patriam into war. (High fantasy with three protagonists, one of which is an undead. Expect fantasy action, my weak attempt at humour and medieval politics. This is my first work on RR, so feedback is very much appreciated to let me know what I'm doing right or wrong. Hope ya enjoy.)
8 167 - In Serial18 Chapters
The Assassin Chronicles: Part I
Iryal and McKayla Asha are not normal. They were raised by their uncle and trained at a highly secret academy in the northern mountains of Scotland. One became a deadly, highly skilled, and talented assassin. The other became a gifted alchemist. Together, they form one of the most formidible teams within the whole of the Assassins. Dean and Sam Winchester have been hunting monsters for as long as either can remember. After finding a Men of Letters bunker, they surreptitiously become members. The bunker holds a treasure trove of knowledge, including a scant amount on the Assassins. Little do they know that their two worlds are about to collide, in a very big way.
8 89 - In Serial28 Chapters
Captain (Glamrock foxy x male reader)
Y/N loved building little machines when he was younger. But life was hard for him, exceptionally since he was super shy. He needed a job, so after looking for a while he finds a job as a mechanic for the Mega Pizza Plex. But during there he finds a fox that will change his life.Fnaf is owned by Scott Cawthon. The fictional characters is owned by me. You own you. I don't own the pictures unless I I say I made them.Minor swearing,
8 269

