Flylib.com
Newton[ap]s Telecom Dictionary
Newton[ap]s Telecom Dictionary
ISBN: 979387345
EAN: N/A
Year: 2004
Pages: 133
BUY ON AMAZON
Table of Contents
BackCover
Newton s Telecom Dictionary, 20th Edition
The Best Dollar-Saving Tips
Why Is It So Hard To Buy?
Disaster Recovery Planning
Rules Followed In This Dictionary
Numbers: -
100Base-T2-1394
144-line Weighting-1914
1915-1970
1971-56 Kbps Modem
56Flex-
A: A-Azimuth Beam Width
ABF-Access Code
Access Contention-ACO
ACOM-Addressable
Addressable Programming-Aircraft Station
Airdome Control Station-Apocalypse, Four Horsemen Of
Apogee-Audible Indication Control
Audible Ring-Azimuth Beam Width
B: B-BZT
Bad-Bar Code
Bar Mitzvah-BCSM
BD-BIFF
Bifurcated Routing-Blind Carbon Copy
Blind Dialing-Broadband Wireless Local Loop
Broadcast-BZT
C: C-Cyperpunk
Cable Television-Call Card
Call Center-CallPath
Callpath CallCoordinator-Case Sensitive
CASE Tools-Cellular Modern
Cellular On Light Truck-Clickstreams
Clickthrough-Composite Materials
Composite Second Order-Cyberpunk
D: D-Dynamotor
Data Rate Mismatch-DB2
DBA-Decibel
Decide-Dialing Plan
Dialing Report-DOE
Dog-Dynamotor
E: E-EZTV
eCommerce-EFMA
EFOC-Electronic Mail Gateways
Electronic Mall-Ephemeris
Epitaxy-EZTV
F: F-FZA
Fast IR-FCC Tariff 15
FCFS-FFT
FG-Fireplug
Fireproof-Forecasting
Foreground Processing-FZA
G: G-Gzip
Geek Gab-Gigaplane
GIGAPOP-GR-303
GR-485-CORE-Gzip
H: H-Hz
Hardwire-Heavy Iron
HEC-Home Run Cabling
Home Tandem-Hz
I: I-iXXX
Idle Cell-IMA
Image Antenna-INF File
Inference Engine-Interaction Recording
Interactive-Internet Fax Protocol
Internet Firewall-iXXX
J: J Box-JVM
Jithead-JVM
K: K-KWH
Key Pad-KWH
L: L-LZW
Layer Entity-LES
Less Than-Line Voltage
Linea de Abonado Digital-Lock Out
Locked Mode-LZW
M: m-MZI
Maintenance Limit-Marquee Client
Martian-MDA
MDBS-Metering Pulses
Method-Moderator
Modified Final Judgment-MZI
N: N-NZDF
NCCF-Netmask
NetMeeting-NexGen
NEXT-Nortel
North American Area Codes-NZDF
O: O-Oxymoron
Offered Call-OMNIPoint
OMR-Optical Fiber Patch Panel
Optical Fiber Preform-Oxymoron
P: P Connector-Pyramidal Horn
PalmOS-Password Control Of Changes
Pastoral Call-PDF
PDH-Physical Address
Physical Change-Power Line Carrier
Power Line Filter-Pyramidal Horn
Q: Q-QZ
R: R-RZ Code
Rate Period Indicator-Recovery
Rectifier-Remote Site Location
Remote Station-Ringer Isolator
Ringing-RZ Code
S: S-Systemview
Satellite Closet-Screen Response Time
Screen Synch-Secure Voice Cord Board
Security-Session Lead-Out
Set-Single Attachment Station
Single Channel Broadband-SSH
SSL-Systemview
T: T-Typing Reperforator
TAPI 3.0-TDMS
TDOA-Telephone Management System
Telephone Manager-Token Latency
Token Passing-Typing Reperforator
U: U-UXTMN
UNMR-UXTMN
V: V-Vyvx
Value Chain-Verifier
Verizon-VLC
VLD-Vyvx
W: W-WZ1
Wetting Agent-Windows 95
Windows 98-WZ1
X: X-XWindows
Y: Y-Dimension Of Recorded Spot-YUV9
Z: Z-ZZF
Appendix: Standards Organizations, Special Telecom Interest Groups, Computer and Telecom Publications, International Calling Codes, Plugs and Connectors
Publications, Computer Telecom
International Calling Codes
Plugs and Connectors
List of Tables
Newton[ap]s Telecom Dictionary
ISBN: 979387345
EAN: N/A
Year: 2004
Pages: 133
BUY ON AMAZON
Java I/O
Subclassing OutputStream
Multitarget Output Streams
The MessageDigest Class
Object Serialization
Converting Between Byte Arrays and Strings
MySQL Stored Procedure Programming
Handling SQL Errors: A Preview
Error Handling
Working with Savepoints
Transaction Design Guidelines
Using MySQL Stored Programs with Java
The .NET Developers Guide to Directory Services Programming
Using Attribute Scope Query
Understanding the ADSI Property Cache
COM Interop Data Types
Determining User Group Membership in Active Directory and ADAM
Appendix A. Three Approaches to COM Interop with ADSI
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Summary
Introduction to the CIPS 5.x Command-Line Interface
Remote Access VPN
Monitoring and Troubleshooting Cisco Remote Access VPN
Remote System Management
.NET-A Complete Development Cycle
The C# Language
Prototyping
GDI+ Graphics Extensions
GDI+ Programming
Adding 3D Text to the Photo Editor Application
The Oracle Hackers Handbook: Hacking and Defending Oracle
Oracle and PL/SQL
Triggers
Indirect Privilege Escalation
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies