m362glossary Part 1 Flashcards Preview

M362 glossary > m362glossary Part 1 > Flashcards

Flashcards in m362glossary Part 1 Deck (368)
Loading flashcards...
1

abort

Deliberately stop something that has started.

2

Aborted (transaction state)

The state a transaction is in after it has been rolled back to undo any partially completed actions of the transaction.

3

access controller

A component used by the security manager to check permissions belonging to classes.

4

ACID properties

The desirable properties of a transaction: atomicity, consistency, isolation and durability.

5

acquire phase

The phase in two-phase locking in which the locks are gradually acquired, and in which no locks can be released.

6

action (in a policy file)

In Java, the part of an entry in a policy file that describes the kinds of action that may be performed with respect to some target.

7

action-oriented model

A software model in which the actions carried out by processors are central, as opposed to an object-oriented model where objects are central, or a data- oriented model where data is central.

8

activation frames

A data structure storing information about a method call in Java that allows the method to resume after being placed on a stack.

9

Active (transaction state)

The state a transaction is in as soon as it has started, and in which it remains while executing.

10

addressing

Identifying a particular computer on the internet using either a symbolic address or a numeric address.

11

ad-hoc network

A network with dynamic routing and without dedicated nodes like routers and hubs, thereby allowing nodes to easily join and leave the network.

12

after image

In logging, the name given to the value of a variable after an update is made.

13

annotation

A Java language construct that provides additional information about the class, method, variable, etc. that is being annotated. The information can be used at compile time or at runtime, typically to generate code, enforce additional constraints, or provide extra documentation. Each annotation has zero or more elements, each being a name- value pair.

14

applet

A block of compiled Java (in bytecode form) that can be downloaded along with a web page and that runs within suitable browsers.

15

application (Java)

A Java program that can run independently of a browser.

16

application client

A Java EE client implemented as a Java application, running on the client computer either in its own JVM or in an application client container.

17

application client container

A software environment for application clients that takes care of many of the routine requirements of communication, security and so on. In particular, it facilitates access from an application client to remote EJB session beans running on the server.

18

application domain

A domain containing less privileged (non-system domain) classes in a protection domain.

19

application framework

A set of classes, libraries and other software that provides a structure to help construct systems for standard types of application - for example, Apache Struts or JavaServer Faces are web application frameworks.

20

application gateway

A kind of firewall providing a proxy service.

21

application object (CORBA)

A user-defined object in a CORBA application.

22

application portability

The ability to adapt an application to a different platform. The easier the adaptation is the more portable the application is said to be.

23

application programming interface (API)

An interface provided by a computer system or program library. Services specified in a computer system/library can be made available to and called on by computer programs. The software that provides the functionality described by an API is said to be an implementation of the API.

24

application server

A server dedicated to running a number of applications.

25

application service provider (ASP)

An organisation offering access to application software run on centralised servers and accessed over the internet using a browser or specialised client software.

26

application software

Software designed to carry out a function for the user, e.g. a payroll application or a word processing program (as opposed to systems software like the operating system or middleware).

27

application-managed entity manager

An entity manager that has to be explicitly created and closed by the application.

28

asymmetric cryptography

A code in which the encoding key is different from the decoding key, but is related to it in a non-trivial way (an example of this is public key cryptography).

29

asymmetric replication

See master-slave ownership.

30

asynchronous message passing

A form of communication in which the sending and receiving processes do not have to be at their synchronisation points at the same time. This form of message passing requires a buffer in order to store messages in the case of the receiving process not being ready to receive the message.