K

Return to Glossary.

Kanji
A graphic character set consisting of symbols used in Japanese ideographic alphabets. Each character is represented by 2 bytes.
Katakana
A Japanese phonetic syllabary used primarily for foreign names and place names and words of foreign origin. The symbols are angular, while those of Hiragana are cursive. Katakana is written left to right, or top to bottom. See also Kanji.
KDC
See key distribution center.
keep-alive
Pertaining to the amount of time that elapses before a message is sent to verify a connection.
Kerberos
The security system of Massachusetts Institute of Technology's (MIT) Project Athena. It uses symmetric key cryptography to provide security services to users in a network.
kernel
In OSI, a session-layer functional unit that supports the basic session services required to establish connections, transfer normal data, and release connections.
kernel thread
A one-to-one mapping between program threads and process threads where each thread is assigned to a machine task.
key
(1) A field used to search for a database segment or a record, or to sort a set of records.
(2) A column or an ordered collection of columns that is identified in the description of a table, index, or referential constraint. The same column can be part of more than one key.
(3) In computer security, a sequence of symbols that is used with a cryptographic algorithm for encrypting or decrypting data. See also private key, public key.
keyboard profile
In iSeries™ Access, a file that defines the way characters and functions are mapped to keys on the keyboard when the personal computer is emulating a host session.
keyboard shift
In DDS, a characteristic that can be specified for a field in a display file that automatically shifts the display station keyboard to control what the display station user can enter into the field. In IDDU and DDS, the keyboard shift can also be specified in database files, but only applies when these fields are referred to in a display file.
keyboard shortcut
A key or combination of keys that a user can press to perform an action that is available from a menu.
keyboard style
In iSeries Access, the keyboard key assignments that are changed to match a particular keyboard type or user-defined arrangement.
keyboard type
The physical key arrangement and assignments for the keyboard shipped from the factory.
key distribution center (KDC)
(1) A network service that provides tickets and temporary session keys. The KDC maintains a database of principals (users and services) and their associated secret keys. It is composed of the authentication server and the ticket granting ticket server. It is important to use a secure machine to act as the KDC. Otherwise, the entire realm could be compromised.
(2) In the Kerberos protocol, the central server, which includes both the authentication server and the ticket-granting server. The KDC is sometimes referred to as the Kerberos server.
keyed compliance
A requirement whereby the user must have a license key (code) from the software provider to be able to change the usage limit or the expiration date of the license information.
keyed data queue
An i5/OS™ data queue that contains individual pieces of data (messages) that are associated with a key value. Messages can be received from a keyed data queue by specifying the key value or a relational operator. The system-recognized identifier for the object type is *DTAQ.
keyed sequence
An order in which records are retrieved that is based on the contents of key fields in records. See also arrival sequence.
keyed sequence access path
An access path to a database file that is arranged according to the contents of key fields contained in the individual records.
key-encrypting key
In Cryptographic Support, a key used to encrypt another cryptographic key.
key entry area
In AFP™ Utilities, an area shown at the lower part of the image area for entering the parameters for an element.
key field
A field used to arrange the records of a particular type within a file member.
key field level specification
Data description specification coded on the lines following the last field specification. Key field level specifications are permitted only for physical files or logical files.
keylock feature
A security feature in which a lock and key can be used to restrict the use of the display station.
keylock switch
A switch on the control panel that can be set to one of four different positions to establish the power-on and power-off modes allowed for the system.
key of reference
In COBOL, the key, either prime or alternate, currently being used to access records within an indexed file.
key pair
In computer security, a public key and a private key. The sender uses the private key to encrypt the message. The recipient uses the public key to decrypt the message. Because the private key holds more of the encryption pattern than the public key does, the key pair is called asymmetric.
key policy
A single, key-protection transform that the initiating key server offers to the responding key server. A key policy governs Phase I negotiations.
key ring
In computer security, a file that contains public keys, private keys, trusted roots, and certificates.
key schedule
In Cryptographic Support, sixteen 8-byte keys created by the Data Encryption Algorithm from the supplied cryptographic key that are used to encrypt or decrypt the supplied data.
key server
A server that negotiates the values that determine the characteristics of a dynamic virtual private network (VPN) connection that is established between two endpoints.
key system
In telephony, the type of telephone system that provides telephones with more than one line for users. Outside lines appear directly on the telephones instead of being routed through an operator and transferred, as in PBX systems.
key table
(1) A file on the service's host system. Each entry in the file contains the service principal's name and secret key. On i5/OS, a key table file is created during configuration of network authentication service. When a service requests authentication to i5/OS with Network Authentication Service configured, that i5/OS checks the key table file for that service's credentials. To ensure that users and services are authenticated properly, you must have users and services enrolled on the KDC and on i5/OS.
(2) In the Kerberos protocol, a file that contains service principal names and secret keys. The secret keys should be known only to the services that use the key table file and to the key distribution center (KDC).
key/think time
In capacity planning, the time between interactive transactions such as typing, thinking, idle time, and so on. As an interactive user's proficiency with the application improves, the user's key/think time is likely to reduce, which can result in an increase in the observed throughput.
key translation
In Cryptographic Support, the conversion of a data encrypting key from encryption under a previous key-encrypting key to encryption under another key-encrypting key.
keyword
(1) One of the predefined words of a programming language, artificial language, application, or command.
(2) A name that identifies an option used in an SQL statement.
keyword functions
The result of processing DDS keywords in a record format specified on an operation.
keyword instruction
In REXX, one or more clauses, the first of which starts with a keyword that identifies the instruction. Some keyword instructions affect the flow of control, while others provide services to the programmer. CALL, DO, and PARSE are examples of keyword instructions.
Kilovolt ampere (kVA)
A unit of power.
Korean double-byte character set
An IBM-defined double-byte character set for Korean, consisting of Korean non-Hangeul/non-Hanja set, Hangeul set, Hanja set and up to 1,880 user-definable characters.
Korean Hangeul character set
A subset of the Korean DBCS, consisting of 2672 Hangeul characters and 52 Jamo characters.
Korean Hanja character set
A subset of the Korean DBCS, consisting of 5265 Hanja characters.
Korean non-Hangeul/non-Hanja character set
A subset of the Korean DBCS, consisting of non-Hangeul/non-Hanja characters, such as Greek, Russian, Roman numeric, alphanumeric and related symbols, Katakana, Hiragana, and special symbols. There are 940 characters in this set.
kVA
See Kilovolt ampere.