Copyright © 2014 Connet, Inc. All Rights Reserved. Create at AgencyofRecord.com.
K for key
|k||kilo||This is 210 or 1024 in computer terminology.|
|k-map||knowledge map||A representation of concepts and their relationships (e.g., hierarchy, taxonomy and network). A K-map is a navigational aid that enables a user to hone in rapidly on the desired concept, and then follow links to relevant knowledge sources (information or people).|
|kaid||Kai console daemon||a service that provides tunneling for console games that do not have an inherent connection to the Internet. Although the label refers to XBOX, the daemon works well with PS2, and Gamecube consoles as well|
|Kb||Kilobit||One thousand bits (103) or 1024 bits (210). A unit of measurement of the capacity of memory integrated circuits.|
|kB||Kilobyte||One thousand bytes (103) or 1024 (210) bytes. A unit of measurement used for computer file sizes.|
|KBE||knowledge-based engineering||A system that encapsulates design knowledge that can be recalled, reused and extended to create product designs.|
|Kbps||Kilobits Per Second||
Don't confuse this with Kilobytes per second (which is 8 times more data per second). This term is commonly used in describing data transfer rates. For example, two common modem speeds are 33.6 Kbps and 56 Kbps.
|KBS||Knowledge-Based System||A computer system that is programmed to imitate human problem-solving by means of artificial intelligence and reference to a database of knowledge on a particular subject.|
|KBMS||KeyBoard/MouSe||Connector. It's simply a duplicate of the PS/2 ports and it's used to connect other devices that use the PS/2 without having to give up the keyboard and mouse, and also is convenient for things that you need to mount internally|
|KBW||keyboard wedge||KBW can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader ( MSR ) into keyboard strokes for a computer. The software form of a keyboard wedge intercepts the dignal signals from the reader when they arrive at the computer and instantly translates them into keyboard strokes.|
|KCC||Knowledge Consistency Checker||A domain service that creates and modifies the replication topology of AD|
|KDC||Key Distribution Center||A network service that provides tickets and temporary session keys. The KDC maintains a database of principals (users and services) and their associated secret keys.|
|KDD||Knowledge Discovery in Databases||A branch of Artificial Intelligence Artificial-Intelligence.|
|KDE||K Desktop Environment||KDE is an open source graphical desktop environment for Unix workstations. Initially called the Kool Desktop Environment, KDE is anongoing project with development taking place on the Internet and discussionsheld through the official KDE mailing list, numerous newsgroups, and IRC channels.|
|KDSI||thousand (K) Delivered Source Instructions||It is a measure of a programmer's productivity or a project productivity.|
|keychan||Key changer||a small program/software, that can change a software license key to another key. A key changer is not illegal, since it only changes a key|
|keygen||Key Generator||Refers to a program that will automatically generate a registration or serial number. Its usual purpose is to eliminate software piracy.|
|keylogging||keystroke logging||the act of recording the keys that a person presses as he or she uses a computer. Keystroke logging is often done surreptitiously by malicious SPYWARE in an attempt to capture passwords.|
|KGD||Known Good Die||a process where customers can get fully tested, bare-die flash devices. No additional packaging, like a TSOP, is provided.|
|KIPS||Thousands of instructions per second||a unit used to measure the speed at which a processor executes instructions. See also MIPS.|
|KIS||Knowbot Information Service||A directory retrieval service for Internet addresses, that uses intelligent agents to process requests. Also called netaddress.|
|KISS||Keep It Simple, Stupid||The New Hacker's Dictionary, edited by Eric Raymond, says that the KISS Principle is sometimes cited on a development project to fend off feature creep. The somewhat related idea of Ockham's razor is about always looking for the simplest explanation.|
|KLOC||thousands of lines of code||a traditional measure of how large a computer program is or how long or how many people it will take to write it. The code measured is usually source code . Since a higher-level source language compiles into more lines of machine code than a lower-level language, a KLOC of C++ statements would generate a larger program than a KLOC of assembler language statements.|
|KM||knowledge management||A business process that formalizes the management and use of an enterprise's intellectual assets. KM promotes a collaborative and integrative approach to the creation, capture, organization, access and use of information assets.|
|KML||Keyhole Markup Language||KML is an XML-based markup language designed to annotate and overlay visualizations on various two-dimensional, Web-based online maps or three-dimensional Earth browsers (such as Google Earth). In fact, KML was initially developed for use with Google Earth. When Google acquired Keyhole in 2004, that project came with it and eventually became Google Earth.|
Key Management Server
Knowledge Management System
Mostly used in Microsoft Exchange to issue security certificates
a distributed hypermedia system for managing knowledge in organisations
|KNI||Katmai New Instructions||This is the original code-name for Intel’s SSE instruction set, named after the first Pentium III processor core, code-named “Katmai.”|
|knowbot||Knowledge robots||designed to search files on the Internet "a robotic librarian." It is a registered trademark of the Corporation for national Research Initiatives.|
|KOLs||Key opinion leaders||more discerning in who they accept information from
and with whom they will work.
|KPCMS||Kodak Precision Color Management System||Kodak Precision Color Management System|
|KPN||(formerly) Koninklijke PTT Nederland||a Dutch landline and mobile telecommunications company http://www.kpn.com|
|KPI||key performance indicator||KPIs are applied in BI to gauge business trends and advise tactical courses of action.|
|KPO||Knowledge Processing Outsourcing||he combination of BPO, Research Process Outsourcing (RPO) and Analysis Proves Outsourcing (APO). KPO business entities provide typical domain-based processes, advanced analytical skills and business expertise, rather than just process expertise.|
|KSAM||Keyed Sequential Access Method||Accessing a flat file using a simple or compound key|
A command interpreter for UNIX.
An interactive command interpreter and a command programming language.
|KSR||Keyboard Send/Receive||A teletypewriter transmitter and receiver operated by means of a keyboard, with no monitor.|
|KSU||Key Service Unit||a telephony term. A central control cabinet serving many multi-button key telephones. Contains equipment which enables the user to pick up and hold PABX or Central Office (CO) lines and provide flashing line, steady, busy and wink hold signals. Dial intercom service is also an option. May all be contained in a computer-like device cabinet or chassis.|
|KTM||kernel transaction manager||A transaction management service that enables you to create a transaction processing system (TPS) in user mode or kernel mode (or both).|
|KTS||Key Telephone System||
The KTS provides communications services to small businesses that require typically between 2 and 100 telephones and have a large number of internal intercom calls in relation to the number of inbound or outbound calls. Unlike a PBX, a key telephone system is not a switch.
|KUIP||Kernel User Interface Package||the human interface to PAW PAW.|
|KVA||Kilo Volt Amp||A term describing power in a relationship of both thousands of volts|
K Virtual Machine
Keyboard, Video, and Mouse
A virtual machine designed from the ground up with the constraints of inexpensive mobile devices in mind
a KVM switch allows you to used multiple computers with the same keyboard, video display, and mouse.
|kW||kilowatt||A unit of electrical power, equal to 1,000 watts.|
|KWH||KiloWatt Hour||A measure of the amount of watts of energy used. Electricity is measured in units of power called watts.|
|KYC||Know Your Customer||a broad variety of products designed to help companies avoid initiating or maintaining commercial relationships with parties that are regulatory-inappropriate or otherwise undesirable.|
|Ka-Band||the bandwidth of electromagnetic wave between 33 GHz to 36 GHz, which is primarily used in satellites operating at 30 GHz uplink and 20 GHz downlink for mobile voice communications.|
|keiretsu||a collection of companies that band together for mutual benefit. This Japanese word came into popular use as venture capitalists began building startup keiretsu, companies that benefit from each other's success.|
|Kerberos||derived from Greek mythology which refers to the three-headed dog that guarded the gates of Hades. Kerberos is most widely used in a network to provide secure network authentication. Usually to authenticate users of the network.|
A terminal program and file transfer protocol, kermit can be used to download files from a remote system to your home computer.
A protocol used for transferring files over a dial-up connection that is commonly used on BBS systems.
|kernel||The heart of an operating system. The kernel is the part of the operating system that interconnects with the hardware.|
|key||In cryptography, a key is a value that determines the output of an encryption algorithm when transforming plain text to encrypted text.|
|Key logging||Key logging software runs in the background, in a stealth mode that isn't easy to detect on a PC. It collects every keystroke and hides that information in a file.|
|Keyboard Wedge||a hardware device installed between a computer's keyboard and POS terminal that translates digital signals from a barcode reader or magnetic strip reader into keyboard strokes|
|killer app (application)||a computer program that is so useful or desirable that it proves the value of some underlying technology, such as a gaming console, operating system, or piece of computer hardware or deploying an entire network. Killer applications are very rare.|
|Kindle||The Amazon Kindle is a series of e-book readers designed and marketed by Amazon.com. The Kindle name was devised by branding consultant Michael Cronan who was asked by Lab 126 to name the product. Cronan and partner Karin Hibma suggested Kindle, meaning to light a fire. They felt this was an apt metaphor for reading and intellectual excitement.|
|Kiosk||Free-standing, interactive devices installed for customer self-service. Besides the computer monitor, a kiosk can have a keyboard or scanner attached for input and a printer attached for output.|
|Klez||pronounced KLEHZ, an Internet worm that launches automatically when a user previews or reads an e-mail message containing Klez on a system that has not been patched for a vulnerability in Microsoft Internet Explorer mail clients. It is not necessary for a user to explicitly open an attachment in order for Klez to execute. There have been more than a half-dozen variations of Klez since it was first reported in October of 2001.|
|Ku-Band||the bandwidth of electromagnetic wave between 12 GHz to 14 GHz, which is primarily used in satellites operating at 14 GHz uplink and 11 GHz downlink in supporting braodband TV and DBS system (DSS).|