ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzaat_5.4.0.1/rzaatk.htm

271 lines
13 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="dc.language" scheme="rfc1766" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<meta name="dc.date" scheme="iso8601" content="2005-09-06" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1997, 2006" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow"/>
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="owner" content="RCHCLERK@us.ibm.com" />
<title>K</title>
<link rel="stylesheet" type="text/css" href="ibmidwb.css" />
<link rel="stylesheet" type="text/css" href="ic.css" />
</head>
<body>
<a id="Top_Of_Page" name="Top_Of_Page"></a><!-- Java sync-link -->
<script language = "Javascript" src = "../rzahg/synch.js" type="text/javascript"></script>
<a name="k"></a>
<h2 id="k">K</h2>
<p>Return to <a href="as4glos.htm#as4glos">Glossary</a>.</p>
<dl>
<dt id="x2057628" class="bold">
<a name="x2057628"></a>Kanji</dt>
<dd>A graphic character set consisting
of symbols used in Japanese ideographic alphabets. Each character is represented
by 2 bytes.</dd>
<dt id="x2057633" class="bold">
<a name="x2057633"></a>Katakana</dt>
<dd>A Japanese phonetic syllabary
used primarily for foreign names and place names and words of foreign origin.
The symbols are angular, while those of Hiragana are cursive. Katakana is
written left to right, or top to bottom. See also <a href="rzaatk.htm#x2057628">Kanji</a>.</dd>
<dt id="x2210106" class="bold">
<a name="x2210106"></a>KDC</dt>
<dd>See <a href="rzaatk.htm#x2028006">key
distribution center</a>.</dd>
<dt id="x2027948" class="bold">
<a name="x2027948"></a>keep-alive</dt>
<dd>Pertaining to the amount
of time that elapses before a message is sent to verify a connection.</dd>
<dt id="x2027953" class="bold">
<a name="x2027953"></a>Kerberos</dt>
<dd>The security system of Massachusetts
Institute of Technology's (MIT) Project Athena. It uses symmetric key cryptography
to provide security services to users in a network.</dd>
<dt id="x2027958" class="bold">
<a name="x2027958"></a>kernel</dt>
<dd>In OSI, a session-layer functional
unit that supports the basic session services required to establish connections,
transfer normal data, and release connections.</dd>
<dt id="x2027963" class="bold">
<a name="x2027963"></a>kernel thread</dt>
<dd>A one-to-one mapping
between program threads and process threads where each thread is assigned
to a machine task.</dd>
<dt id="x2002682" class="bold">
<a name="x2002682"></a>key</dt>
<dd>(1) A field used to search for a
database segment or a record, or to sort a set of records.</dd>
<dd>(2) A column
or an ordered collection of columns that is identified in the description
of a table, index, or referential constraint. The same column can be part
of more than one key.</dd>
<dd>(3) In computer security, a sequence of symbols
that is used with a cryptographic algorithm for encrypting or decrypting
data. See also <a href="rzaatp.htm#x2034701">private key</a>, <a href="rzaatp.htm#x2035427">public key</a>.</dd>
<dt id="x2027986" class="bold">
<a name="x2027986"></a>keyboard profile</dt>
<dd>In iSeries&trade; Access, a
file that defines the way characters and functions are mapped to keys on the
keyboard when the personal computer is emulating a host session.</dd>
<dt id="x2027991" class="bold">
<a name="x2027991"></a>keyboard shift</dt>
<dd>In DDS, a characteristic
that can be specified for a field in a display file that automatically shifts
the display station keyboard to control what the display station user can
enter into the field. In IDDU and DDS, the keyboard shift can also be specified
in database files, but only applies when these fields are referred to in a
display file.</dd>
<dt id="x2186192" class="bold">
<a name="x2186192"></a>keyboard shortcut</dt>
<dd>A key or combination
of keys that a user can press to perform an action that is available from
a menu.</dd>
<dt id="x2027996" class="bold">
<a name="x2027996"></a>keyboard style</dt>
<dd>In iSeries Access, the
keyboard key assignments that are changed to match a particular keyboard type
or user-defined arrangement.</dd>
<dt id="x2028001" class="bold">
<a name="x2028001"></a>keyboard type</dt>
<dd>The physical key arrangement
and assignments for the keyboard shipped from the factory.</dd>
<dt id="x2028006" class="bold">
<a name="x2028006"></a>key distribution center (KDC)</dt>
<dd>(1) A network
service that provides tickets and temporary session keys. The KDC maintains
a database of principals (users and services) and their associated secret
keys. It is composed of the authentication server and the ticket granting
ticket server. It is important to use a secure machine to act as the KDC.
Otherwise, the entire realm could be compromised.</dd>
<dd>(2) In the Kerberos
protocol, the central server, which includes both the authentication server
and the ticket-granting server. The KDC is sometimes referred to as the Kerberos
server.</dd>
<dt id="x2028011" class="bold">
<a name="x2028011"></a>keyed compliance</dt>
<dd>A requirement whereby
the user must have a license key (code) from the software provider to be able
to change the usage limit or the expiration date of the license information.</dd>
<dt id="x2028016" class="bold">
<a name="x2028016"></a>keyed data queue</dt>
<dd>An i5/OS&trade; data queue
that contains individual pieces of data (messages) that are associated with
a key value. Messages can be received from a keyed data queue by specifying
the key value or a relational operator. The system-recognized identifier for
the object type is *DTAQ.</dd>
<dt id="x2028021" class="bold">
<a name="x2028021"></a>keyed sequence</dt>
<dd>An order in which
records are retrieved that is based on the contents of key fields in records.
See also <a href="rzaata.htm#x2014083">arrival sequence</a>.</dd>
<dt id="x2028026" class="bold">
<a name="x2028026"></a>keyed sequence access path</dt>
<dd>An access
path to a database file that is arranged according to the contents of key
fields contained in the individual records.</dd>
<dt id="x2028031" class="bold">
<a name="x2028031"></a>key-encrypting key</dt>
<dd>In Cryptographic
Support, a key used to encrypt another cryptographic key.</dd>
<dt id="x2028036" class="bold">
<a name="x2028036"></a>key entry area</dt>
<dd>In AFP&trade; Utilities, an
area shown at the lower part of the image area for entering the parameters
for an element.</dd>
<dt id="x2028041" class="bold">
<a name="x2028041"></a>key field</dt>
<dd>A field used to arrange
the records of a particular type within a file member.</dd>
<dt id="x2028046" class="bold">
<a name="x2028046"></a>key field level specification</dt>
<dd>Data
description specification coded on the lines following the last field specification.
Key field level specifications are permitted only for physical files or logical
files.</dd>
<dt id="x2086352" class="bold">
<a name="x2086352"></a>keylock feature</dt>
<dd>A security feature
in which a lock and key can be used to restrict the use of the display station.</dd>
<dt id="x2028061" class="bold">
<a name="x2028061"></a>keylock switch</dt>
<dd>A switch on the control
panel that can be set to one of four different positions to establish the
power-on and power-off modes allowed for the system.</dd>
<dt id="x2028071" class="bold">
<a name="x2028071"></a>key of reference</dt>
<dd>In COBOL, the key,
either prime or alternate, currently being used to access records within an
indexed file.</dd>
<dt id="x2028076" class="bold">
<a name="x2028076"></a>key pair</dt>
<dd>In computer security, a
public key and a private key. The sender uses the private key to encrypt the
message. The recipient uses the public key to decrypt the message. Because
the private key holds more of the encryption pattern than the public key does,
the key pair is called asymmetric.</dd>
<dt id="x2028081" class="bold">
<a name="x2028081"></a>key policy</dt>
<dd>A single, key-protection
transform that the initiating key server offers to the responding key server.
A key policy governs Phase I negotiations.</dd>
<dt id="x2028086" class="bold">
<a name="x2028086"></a>key ring</dt>
<dd>In computer security, a
file that contains public keys, private keys, trusted roots, and certificates.</dd>
<dt id="x2028091" class="bold">
<a name="x2028091"></a>key schedule</dt>
<dd>In Cryptographic Support,
sixteen 8-byte keys created by the Data Encryption Algorithm from the supplied
cryptographic key that are used to encrypt or decrypt the supplied data.</dd>
<dt id="x2028096" class="bold">
<a name="x2028096"></a>key server</dt>
<dd>A server that negotiates
the values that determine the characteristics of a dynamic virtual private
network (VPN) connection that is established between two endpoints.</dd>
<dt id="x2028101" class="bold">
<a name="x2028101"></a>key system</dt>
<dd>In telephony, the type
of telephone system that provides telephones with more than one line for users.
Outside lines appear directly on the telephones instead of being routed through
an operator and transferred, as in PBX systems.</dd>
<dt id="x2028106" class="bold">
<a name="x2028106"></a>key table</dt>
<dd>(1) A file on the service's
host system. Each entry in the file contains the service principal's name
and secret key. On i5/OS, a key table file is created during configuration
of network authentication service. When a service requests authentication
to i5/OS with Network Authentication Service configured, that i5/OS checks the
key table file for that service's credentials. To ensure that users and services
are authenticated properly, you must have users and services enrolled on the
KDC and on i5/OS.</dd>
<dd>(2) In the Kerberos protocol, a file that contains service
principal names and secret keys. The secret keys should be known only to the
services that use the key table file and to the key distribution center (KDC).</dd>
<dt id="x2028113" class="bold">
<a name="x2028113"></a>key/think time</dt>
<dd>In capacity planning,
the time between interactive transactions such as typing, thinking, idle time,
and so on. As an interactive user's proficiency with the application improves,
the user's key/think time is likely to reduce, which can result in an increase
in the observed throughput.</dd>
<dt id="x2028118" class="bold">
<a name="x2028118"></a>key translation</dt>
<dd>In Cryptographic
Support, the conversion of a data encrypting key from encryption under a previous
key-encrypting key to encryption under another key-encrypting key.</dd>
<dt id="x2002697" class="bold">
<a name="x2002697"></a>keyword</dt>
<dd>(1) One of the predefined words
of a programming language, artificial language, application, or command.</dd>
<dd>(2) A name that identifies an option used in an SQL statement.</dd>
<dt id="x2028141" class="bold">
<a name="x2028141"></a>keyword functions</dt>
<dd>The result of processing
DDS keywords in a record format specified on an operation.</dd>
<dt id="x2028146" class="bold">
<a name="x2028146"></a>keyword instruction</dt>
<dd>In REXX, one
or more clauses, the first of which starts with a keyword that identifies
the instruction. Some keyword instructions affect the flow of control, while
others provide services to the programmer. CALL, DO, and PARSE are examples
of keyword instructions.</dd>
<dt id="x2045026" class="bold">
<a name="x2045026"></a>Kilovolt ampere (kVA)</dt>
<dd>A unit of power.</dd>
<dt id="x2028151" class="bold">
<a name="x2028151"></a>Korean double-byte character set</dt>
<dd>An IBM-defined double-byte character set for Korean, consisting of Korean
non-Hangeul/non-Hanja set, Hangeul set, Hanja set and up to 1,880 user-definable
characters.</dd>
<dt id="x2028156" class="bold">
<a name="x2028156"></a>Korean Hangeul character set</dt>
<dd>A subset
of the Korean DBCS, consisting of 2672 Hangeul characters and 52 Jamo characters.</dd>
<dt id="x2028161" class="bold">
<a name="x2028161"></a>Korean Hanja character set</dt>
<dd>A subset
of the Korean DBCS, consisting of 5265 Hanja characters.</dd>
<dt id="x2028166" class="bold">
<a name="x2028166"></a>Korean non-Hangeul/non-Hanja character set</dt>
<dd>A subset of the Korean DBCS, consisting of non-Hangeul/non-Hanja characters,
such as Greek, Russian, Roman numeric, alphanumeric and related symbols, Katakana,
Hiragana, and special symbols. There are 940 characters in this set.</dd>
<dt id="x2395101" class="bold">
<a name="x2395101"></a>kVA</dt>
<dd>See <a href="rzaatk.htm#x2045026">Kilovolt
ampere</a>.</dd></dl>
<a id="Bot_Of_Page" name="Bot_Of_Page"></a>
</body>
</html>