ARCHIVED: Glossary

This content has been archived, and is no longer maintained by Indiana University. Information here may no longer be accurate, and links may no longer be available or reliable.

This listing contains a small selection of the Knowledge Base, with links to introductory documents that define computing terms. You can also search for particular words or phrases throughout the entire Knowledge Base with the full-text search. ARCHIVED: Help is available on using the glossary.

A
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
A+ certification About the CompTIA A+ certification
Active Directory About Active Directory and the ADS domain
Assistive Technology and Accessibility Centers Assistive technology services at IU
AIX ARCHIVED: What is AIX?
ATAC Assistive technology services at IU
awk ARCHIVED: What is awk, and how do I use it?
B
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
batch job About batch jobs
Big Red II ARCHIVED: About Big Red II at Indiana University (Retired)
block Block definition
C
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
CampusAccess Card ARCHIVED: About CampusAccess cards at IUB (Retired)
Carry-in Consulting ARCHIVED: IUB Carry-in Consulting services and pricing
CAS ARCHIVED: CAS at IU
Central Authentication Service ARCHIVED: CAS at IU
certificate authority About certificate authorities
chain mail About chain mail
chfn ARCHIVED: In Unix, what is chfn?
chsh ARCHIVED: In Unix, what is chsh, and how do I use it to change my shell?
CNC About the IUPUI Computer Network Center
Computer Network Center About the IUPUI Computer Network Center
computer virus About viruses, worms, and Trojan horses
Connect Meeting ARCHIVED: About Adobe Connect at IU (Retired)
cron ARCHIVED: What are cron and crontab, and how do I use them?
Cyberinfrastructure ARCHIVED: About cyberinfrastructure
Cyberinfrastructure Gateway ARCHIVED: About the IU Cyberinfrastructure Gateway
D
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
daemon About daemons in Unix
Data Capacitor II
DC-WAN
 
ARCHIVED: About Data Capacitor II (Retired)
DHCP About DHCP
disk quota About disk quota in Unix
distribution lists ARCHIVED: About distribution lists
domain About domains
DVI ARCHIVED: What is a DVI file?
dynamic linking ARCHIVED: About linkers and dynamic and static linking
E
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
EdCert program About EdCert classes at IU
Emacs byte-compilation ARCHIVED: In Emacs, what is byte-compilation?
Extreme Science and Engineering Discovery Environment (XSEDE) ARCHIVED: About the XSEDE 2.0 project (Retired)
IU Exchange account ARCHIVED: Exchange accounts at IU
ezreset ARCHIVED: Use ezreset to reset your accounts to their default settings
F
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Faculty/Staff Directory Revise or hide your information in the IU Directory
File Transfer Protocol Use FTP to transfer files
firewall About firewalls
FSF ARCHIVED: What do the acronyms FSF, GPL, LPF, and RMS mean?
FTP Use FTP to transfer files
fully qualified domain name About fully qualified domain names (FQDNs)
G
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
GAL About the IU Global Address List (GAL)
Global Address List About the IU Global Address List (GAL)
GNU About the GNU project
Gnuplot ARCHIVED: Plot a graph in Unix
grep About grep
groff About groff in Unix
Guest account About IU Guest accounts
H
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
High Performance Storage System About HPSS at IU
HPSS About HPSS at IU
I
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
I-Light You do not have sufficient permission to view this document.
IMAP ARCHIVED: Use IMAP at IU
ITHelpLive About ITHelpLive
ITNow ARCHIVED: What is ITNow 2.0, and how do I subscribe to it?
IT Training workshops About IT Training workshops
iTunes ARCHIVED: What is iTunes and what does it do?
IU Cyberinfrastructure Gateway ARCHIVED: About the IU Cyberinfrastructure Gateway
IU List About IU List
IU Secure About IU Secure wireless
IU/Microsoft Campus Agreement ARCHIVED: IU's software agreement with Microsoft
IUCAT About IUCAT
IUIE
IUware About IUware
J
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
JagJobs About JagJobs at IUPUI
Jagtag ARCHIVED: About Jagtags at IUPUI (Retired)
K
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Karst ARCHIVED: About Karst at Indiana University (Retired)
Kerberos ARCHIVED: What is Kerberos?
Kuali Time About the Timekeeping system
L
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
legacy system ARCHIVED: At IU, what is a legacy system?
linker ARCHIVED: About linkers and dynamic and static linking
local account About local accounts
lpr ARCHIVED: In Unix, how do I print files and list or remove print jobs?
Lync ARCHIVED: About Microsoft Lync
M
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
macro virus About viruses, worms, and Trojan horses
man Use the Unix man command to read manual pages
Mason ARCHIVED: Mason at IU (Retired)
Mercury ARCHIVED: About Mercury at IU
metadata About metadata
Moab ARCHIVED: About Moab
mode line ARCHIVED: In Emacs, what is the mode line, and what information does it contain?
Monitor About the UITS Monitor newsletter
N
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
NCFTP ARCHIVED: What is NCFTP?
netpbm utilities ARCHIVED: In Unix, what are the netpbm utilities and how do I use them to convert one type of image file to another?
Network ID Your University account (formerly Network ID)
Network+ certification About the CompTIA Network+ certification
NFS About NFS
O
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Oncourse ARCHIVED: What is Oncourse?
One.IU About One.IU
Open Group ARCHIVED: What are the Open Group, X/Open, and OSF?
Open Software Foundation ARCHIVED: What are the Open Group, X/Open, and OSF?
open source About open source software and the Open Source Initiative
OpenAFS ARCHIVED: What is OpenAFS?
Outlook Web App About Outlook on the web at IU
P
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Parameter RAM About the PRAM and NVRAM in macOS
passphrase Your IU passphrase
petaFLOPS Understand measures of supercomputer performance and storage system capacity
phishing Avoid phishing scams
PHP About PHP
Pico About Nano
podcast ARCHIVED: What is podcasting?
podcatcher ARCHIVED: What is a podcatcher?
POP mail ARCHIVED: What is POP mail?
PRAM About the PRAM and NVRAM in macOS
printing allotment Allotment and print funding at IU
Python ARCHIVED: About Python
Q
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Quarry ARCHIVED: Quarry at Indiana University
R
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
rcp ARCHIVED: In Unix, what is rcp, and how do I use it?
relational database Flat file and relational databases
Research Database Complex (RDC) About the Research Database Complex (RDC) at Indiana University
Research File System (RFS) ARCHIVED: Research File System (RFS) at Indiana University
Research Technologies ARCHIVED: At IU, what is the Research Technologies division of UITS?
Residential Technology Center (RTC) About the IU RTCs
S
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Scholarly Data Archive (SDA) About the Scholarly Data Archive (SDA) at Indiana University
scp Use SCP to securely transfer files between two Unix computers
screen About the screen program in Unix
secure FTP (SFTP) Use SFTP to transfer files
shadow password About shadow passwords
shell About the shell in Unix
Slashtmp ARCHIVED: About Slashtmp at IU (Retired)
SMTP server SMTP server address at IU
Solaris ARCHIVED: What are SunOS and Solaris?
spam About spam
spinweb ARCHIVED: Use spinweb on Mercury/Pages
SQL SQL example statements for retrieving data from a table
SSH About SSH
SSL About secure websites and SSL/TLS certificates
SSL VPN Connect to IU's SSL VPN using Ivanti Secure Access (formerly Pulse Secure) in Windows or macOS
Starter Kit About the account Starter Kit
Stata ARCHIVED: About Stata at IU
static linking ARCHIVED: About linkers and dynamic and static linking
Student Technology Center (STC) About the IU STCs (computing labs)
Student Technology Fee Use of the Student Technology Fee at IU
SunOS ARCHIVED: What are SunOS and Solaris?
swap file ARCHIVED: What is a swap file?
T
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
tar Use tar to combine multiple files into an archive file
TCP/IP About TCP/IP
telnet About telnet
teraFLOPS Understand measures of supercomputer performance and storage system capacity
TeraGrid ARCHIVED: What was the TeraGrid?
terminal type Set a terminal type or terminal emulation
TORQUE ARCHIVED: Use TORQUE to submit and manage jobs on high performance computing systems
Transform ARCHIVED: About Transform (Retired)
Trojan horse About viruses, worms, and Trojan horses
U
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
UIPO About the University Information Policy Office (UIPO)
UISO About the University Information Security Office (UISO)
UITS About UITS
UITS Monitor About the UITS Monitor newsletter
UMS ARCHIVED: About the Unified Messaging Service (UMS) at IU
UniCom ARCHIVED: About UniCom at IU
Unified Messaging Service ARCHIVED: About the Unified Messaging Service (UMS) at IU
University ID About your IU University ID
University Information Policy Office About the University Information Policy Office (UIPO)
University Information Security Office About the University Information Security Office (UISO)
Unix About Unix
up ARCHIVED: In Unix, what are the up, 2up, 4up, 8up, and 16up utilities, and how do I use them to manipulate PostScript files?
ups ARCHIVED: In Unix, what is ups, and how can I use it? x
V
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Variations ARCHIVED: What is Variations, and where can I use it?
vi Use the vi text editor
virtual private network About the IU VPN
virus About viruses, worms, and Trojan horses
VPN About the IU VPN
W
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
web search robot Web search robots
WebDAV ARCHIVED: What is WebDAV?
WeBWorK ARCHIVED: About WeBWorK at IUB (Retired)
Windows Vista ARCHIVED: About Windows Vista
X
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
XSEDE ARCHIVED: About the XSEDE 2.0 project (Retired)
X Window Manager ARCHIVED: In the X Window System, what is a window manager, and how do I find out which window managers are available?
X/Open ARCHIVED: What are the Open Group, X/Open, and OSF?
Z
Top | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

This is document glos in the Knowledge Base.
Last modified on 2023-09-22 17:36:18.