Sei sulla pagina 1di 126

)253 (

projet "Un ordinateur


pour chacun"
300

established in Kuwait in 1972, under the name of T.M.P


Agents in a time when Intellectual Property (IP) protection
was still in its early stages of development in the Arab
region. However, since our launch, AGIP has consistently
been at the forefront of efforts to improve the
infrastructure of IP in the Arab world

50

organisation de
proprit
intellectuelle d'Abu
ghazaleh

accs
indicateurs d'accs et
d'infrastructure

252

251

300

In computer BIOS settings for Intel desktop boards, Access


Level is a maintenance option that displays the current
user's access level
In computer networking, a wireless access point (WAP) is a
device that allows wireless communication devices to
connect to a wireless network using Wi-Fi, Bluetooth or
related standards. The WAP usually connects to a wired
network, and can relay data between the wireless devices
(such as computers or printers) and wired devices on the
network.
Interference that is caused by a transmitter operating in an
adjacent channel.

niveau d'accs

point d'accs

taux de protection du
brouillage des canaux
contigus
initiative de plaidoyer

the act of advocating, or speaking or writing in support (of


something)
Conclusion drawn from the analysis of the 'life cycle cost' of abordabilit
a proposed acquisition, that the purchase is in accord with
the resources and long term requirements of the acquirer.

251

entity whose primary activities are developing,


coordinating, promulgating, revising, amending, reissuing,
interpreting, or otherwise maintaining standards that
address the interests of a wide base of users outside the
standards development organization.

organisation rgionale
africaine de
standardisation

250

A composition technique for building a new object from


agrgation
one or more existing objects that support some or all of the
new object's required interfaces
sollicitation d'un appel
tlphonique agressif


) (

"
"

PCA

"PC for All" project

1972
.

. ) (

AGIP

Abu-Ghazaleh
Intellectual Property,
Jordan

.


) (


. BIOS
.
WAP

. BlueTooth WiFi

) (
.

access

access and
infrastructure indicators

access level

AP

advocacy initiative

" "

affordability

Page 1

ACPR

access point

ARSO

adjacent channel
protection ratio

African Regional
Organization for
Standardization, Kenya

aggregation

aggressive telephone
solicitation

)253 (

Alcatels Digital Bridge Initiative seeks to create win-win


solutions based on innovative
use of Information and Communication Technologies (ICT)
in under-served, usually rural
areas, in emerging countries. This is undertaken with the
active involvement of local
players, in order to create high added value services and
applications designed to
answer the needs of the local population.

initiative d'Alcatel pour


combler le foss
numrique

Alcatel's digital bridge


initiative

NA

allocation et usage de
ressources rares

allocation and use of


scarce resources

251

processes and techniques that fall outside of the


government judicial process.

251

service that runs Internet servers, allowing organizations


and individuals to serve content to the Internet

rglement
extrajudiciaire de
conflits
hbergement
d'application

) (
.HTTP

groupe de conseillers
arabes

AAG

club arabe d'information

Arabcin

50

250

250

300

300

interface de
programmes
d'applications
serveur d'application

Production programs run on a mid-sized computer that


handle all application operations between browser-based
computers and an organisation's back-end business
applications or databases. The application server works as
a translator, allowing, for example, a customer with a
browser to search an online retailer's database for pricing
information
A service (usually a business) that provides remote access fournisseur de services
to an application program across a network protocol,
d'application
typically HTTP. A common example is a web site that other
web sites use for accepting payment by credit card as part
of their online ordering systems
The reversible transformation of data from the original (the chiffrement d'application
plaintext) to a difficult-to-interpret format (the ciphertext)
as a mechanism for protecting its confidentiality, integrity
and sometimes its authenticity. Encryption uses an
encryption algorithm and one or more encryption keys
a member of the Arab Jordan Investment Bank Group, is a
specialized research, analysis and consulting company
focused on the communications, media, technology and
financial markets throughout the Arab World (MENA)
region.
Scientific cooperative non-governmental Arab institution,
believes in common Arab action that aims at finding a joint
Arab strategy to face the challenges of the Age of
Information.

Page 2

ADR

alternative dispute
resolution
application hosting

API

application program
interface
application server

ASP

application service
provider

applications encryption

Arab Advisors Group

Arab Club for


Information

)253 (

300

251

300

300

fonds arabes pour le


dveloppement
conomique et social

AFESD

Arab Fund for


Economic and Social
Development, Kuwait
Arab Industrial
Development and
Mining Organization,
Morocco

In a summit in Kuwait 1966 the Arab League Council


decided to establish an organization to improve and
develop the Industry in general. The decision was
approved by the Arab Economic Council in 1968. The
headquarters was decided to be established in Cairo. In
1975, the Arab Ministries of Industries decided to free the
organization from Arab League influence and was claimed
as an independent organization. The organization's
headquarters was moved from Cairo to Tunis temporarily
from 1979 to 1980
established in August 29, 1989, in Buffalo-New York City USA, and registered officially in Amman on October 10,
1990 under the name of the Arab Management Society.
Its vision is to To play a pioneering role in organizing,
directing, motivating, and developing the capacities of Arab
individuals and institutions in order to create an Arab
Knowledge Community

organisation arabe pour


le dveloppement
industriels et les mines

1966
.
.1968
1975 .

.

AIDMO

socit arabe de gestion


des connaissances

( 1989
1990 ()
)
." "

.

AKMS

Arab Knowledge
Management Society
(AKMS)

Meetings, Conversations and Developing.

groupe des utilisateurs


arabes de linux

ALUG

Arab Linux User Group

socit arabe de la
proprit intellectuelle

ASIP

Arab Society for


Intellectual Property,
Lebanon

1989

AIDMO
) (

ASMO

Arab Standards and


Metrology Organization

300

300

.
.

one of the Arab League organizations till 1989 when it was


dissolved and replaced by a center attached to The Arab
Industrial Development and Mining Organization (AIDMO),
called Center for Standardization and Metrology (CSM),
with the head-quarter in Rabat

organisation arabe de
standards et de
mtrologie

The aim of the Arab TeleMedicine Network (ATMN) was


constructed to facilitate the exchange of medical data
among the hospitals and medical centers in the Arab
countries and other international centers and hospital.
Providing online medical consultation for Arabic citizen and
their doctors to advise , follow up or diagnose their medical
state.
The Arabian Knowledge Economy Association (AKEA) is an
international association targeting the Arab world, aiming
to draw attention to such issues as education/learning,
intellectual capital, innovation, entrepreneurship, research
and technology

rseau arabe de
tlmdecine

ATMN

Arab TeleMedicine
Network

association arabe de
l'conomie du savoir

AKEA

Arabian Knowledge
Economy Association
(located in Saudi
Arabia)

Page 3

)253 (

NA

groupe de contenu arabe

main goal of this project is to demand the adoption of the


Arabic domain names as one of the Arab nations rights.

noms de domaines
arabes

300

using the Arabic language to express Internet domain


names . a hierarchical naming system for computers,
services, or any resource connected to the Internet or a
private network. It associates various information with
domain names assigned to each of the participants. Most
importantly, it translates domain names meaningful to
humans into the numerical (binary) identifiers associated
with networking equipment for the purpose of locating and
addressing these devices worldwide

systme de noms des


domaines arabes

300

was formed under the auspices of United Nations Economic groupe de travail sur
and Social Commission for Western Asia (ESCWA), and the systme de noms de
guidance of Multilingual Internet Names ADNS through a
domaine arabes
Request For Comments (RFC) document(MINC); one of its
main objectives was to help define standards forConsortium

300

non-profit, non-governmental, international organization. It consortium arabe pour


focuses on developing and promoting a truly multilingual
les noms d'internet
Internet domain names and keywords, internationalization
of Internet names standards and protocols, technical
coordination and liaison with other international bodies.
Coordinate the efforts of various national and regional
initiatives, through an international forum and platform,
which can be the unified voice for all Arabic speaking
communities world wide, to ensure that the Arabic Based
Languages script is one of the first languages to beenabled
on the Internet domain names space.

(
)
: .

NA

comit linguistique arabe

2001

It is an effort to put a description


of Arabic software especially these available on the
Internet. It also has
references to other resources on the Internet concerning
the Arabic language
and the Arabic world.

carte gographique des


logiciels arabes

faithful support for a cause or political party or religion

politique d'adhrence
l'architecture

Page 4

ACG

Arabic Content Group

ADN

Arabic Domain Names

ADNS

Arabic Domain Names


System

ADNTF

Arabic Domain Names


Task Force

AINC

Arabic Internet Names


Consortium

ALC/AINC Arabic Linguistic


Committee of the
Arabic Internet Names
Consortium

ASM
Arabic Software Map

architecture adherence
policy

)253 (

300

251

300

Description: An ACE is a string of characters resulting from


a particular Algorithm for transforming multilingual
character information into an ASCII-based alphanumeric
form acceptable by the existing DNS. This means that an
ACE encoded string must conform to the LDH restrictions
for strings
an organisation for ccTLD (country-code Top Level Domain)
registries in Asia Pacific region. APTLD was originally
established in 1998, and in 2003 legally established in
Malaysia
to assist the members and associate members of ESCAP
through strengthening their capabilities to develop and
manage national innovation systems;develop, transfer,
adapt and apply technology; improve the terms of transfer
of technology; and identify and promote the development
and transfer of technologies relevant to the region

codage compatible avec


ASCII

association des noms de


domaines haut niveau
de l'Asie pacifique


""



1998 .
2003

ACE

APTLD

ASCII Compatible
Encoding

Asia Pacific Top Level


Domain Association
(APTLD)

APCTT

Asian and Pacific


Centre for Transfer of
Technology, India

was established on 8 August 1967 in Bangkok, Thailand,


association des nations
with the signing of the ASEAN Declaration (Bangkok
de l'Asie du sud-est
Declaration) by the Founding Fathers of ASEAN, namely
Indonesia, Malaysia, Philippines, Singapore and Thailand
Its aims include the acceleration of economic growth, social
progress, cultural development among its members, the
protection of the peace and stability of the region, and to
provide opportunities for member countries to discuss
differences peacefully

- 1967
) (ASEAN
. : .ASEAN


.

ASEAN

Association of
Southeast Asian
Nations, Indonesia

A form of Digital Subscriber Line in which the bandwidth


available for downstream connection is significantly larger
then for upstream. Although designed to minimise the
effect of crosstalk between the upstream and downstream
channels this setup is well suited for web browsing and
client-server applications as well as for some emerging
applications such as video on demand.

ligne d'abonn
numrique dbit
asymtrique


.


/ 9
/ 800

ADSL

asymmetric digital
subscriber line

If you split the distribution in half at its mean (or median),


then the distribution of values on the two sides of this
central point would not be the same (i.e., not symmetrical)
and the distribution would be considered "skewed."

distribution asymtrique

50

mode de transfert
asynchrone


.
.

50

authentification

50
250

centre du transfert de
technologie de l'Asie
pacifique


-
.

Page 5

asymmetrical
distribution

ATM

asynchronous transfer
mode

authentication

)253 (

251

the process where one entity verifies another entity's claim authentification,
to holding a specific digital identity. The function that the
autorisation,
middle "A" in AAA actually refers to is "access control", i.e. comptabilit
the granting or refusing of privileges to an entity for
accessing specific services. accounting refers to the
tracking of the consumption of network resources by users.
This information may be used for management, planning,
billing, or other purposes.

251

a computerized system designed by the UNCTAD to


administer a countrie's customs.
a computerized telecommunications device that provides
the clients of a financial institution with access to financial
transactions in a public space without the need for a
cashier, human clerk or bank teller

systme douanier
automatis
guichet automatique
bancaire

Automatically switching to a different, redundant system


upon failure or abnormal termination of the currently active
system. Failover can be applied to a cluster of servers, to
network or storage components or any other set of
redundant devices that must provide high availability
because down-time would be expensive or inconvenient. It
may be implemented in hardware, software or a
combination.
converts spoken words to text. Speech recognition is a
broad term which means it can recognize almost anybody's
speech - such as a call-centre system designed to
recognize many voices. Voice recognition is a system
trained to a particular user, where it recognizes their
speech based on their unique vocal sound.

basculement
automatique

An economic policy or program that increases or decreases


automatically to offset the current economic trend without
government assistance.
sub-field of computational linguistics that investigates the
use of computer software to translate text or speech from
one natural language to another.

A calculation often used to determine the overall value of


an application. It is also used to rate particular customers,
especially in the wireless space, by comparing someone's
account to the overall average.

revenu moyen par


abonn

251

251

251

50

300

50


.
.

.

UNCTAD


.

.

stabilisateur
automatique

traduction automatique



.



.

disponibilit

rseau fdrateur


.
.

Page 6

authentication,
authorization and
accounting

ASYCUDA automated system for



customs data

ATM
automated teller
machine


.
.

reconnaissance de
parole automatique

AAA

automatic failover

ASR

automatic stabilizer

automatic translation

automatic speech
recognition

availability

ARPU

average revenue per


user

backbone network

)253 (

BITS provides leadership in Information and


Communications Technologies (ICT) by developing and
promoting professional development. By endorsing,
reviewing developing, information, quality standards,
practices, research, and certification within a professional
framework.
BIS strives to serve the community of Bahrain by spreading
awareness on the benefits of Internet and ICT. BIS also
strives to engage in ICT Development toward eBahrain.
300

251

251

250

251

association
Bahrenienne de
technologie
d'information
socit Bahrenienne
d'Internet

bande passante

In the area of wireless computer networking, a base station station de base


is a radio receiver/transmitter that serves as the hub of the
local wireless network, and may also be the gateway
between a wired network and the wireless network. It
typically consists of a low-power transmitter and wireless
router
is the section of a traditional cellular telephone network
contrleur de stations
which is responsible for handling traffic and signaling
de base
between a mobile phone and the network switching
subsystem. The BSS carries out transcoding of speech
channels, allocation of radio channels to mobile phones,
paging, quality management of transmission and reception
over the air interface and many other tasks related to the
radio network.
The part of the system software of the IBM PC and
systme
compatibles that provides the lowest level interface to
d'entres/sorties de base
peripheral devices and controls the first stage of the
bootstrap process, including installing the operating
system. The BIOS is stored in ROM, or equivalent, in every
PC. Its main task is to load and execute the operating
system which is usually stored on the computer's hard disk,
but may be loaded from CD-ROM or floppy disk at install
time.
an Integrated Services Digital Network (ISDN)
accs dbit de base
configuration defined in the physical layer standard I.430
produced by the ITU. It is one of two configurations for use
in the access network, the other being primary rate
interface. The BRI configuration provides two 64 kbit/s
"bearer" channels (B channels) and one 16 kbit/s "Delta"
channel (D channel). The B channels are used for voice or
user data, and the D channel is used for any combination
of: data, control/signalling and X.25 packet networking.
The two B channels can be bonded together giving a total
data rate of 128 kbit/s. BRI is the kind of ISDN interface
most likely to be found in residential service


3000 .
) 3300( ) 300(
.

()
/
.
.

BITS

Bahrain Information
Technology Society

Bahrain Internet
Society

bandwidth

BS

BSC

base station controller

IBM PC


.

CD-ROM
.

BIOS

basic input output


system

ISDN
.
.
B 64Kbits/s
.D 16Kbits/s
.

Page 7

base station

basic rate access

)253 (

Entering a group of source documents into the computer

donnes du lot

An operating mode in which a program requires no input


from the user apart from the initial command which
actually starts the program. The information necessary for
the operation of a program in this mode must be gleaned
from an initialisation file which contains all the commands
to perform in a specified order

mode du lot

50

251

251

conduite de tests de
performance

the most commonly used Domain Name System (DNS)


noms de domaine
server on the Internet. BIND was originally created by four d'internet de Berkeley
graduate students at the Computer Systems Research
Group at the University of California, Berkeley, and was
first released with 4.3BSD.
a technique, method, process, activity, incentive, or reward pratiques d'excellence
that is believed to be more effective at delivering a
particular outcome than any other technique, method,
process, etc. when applied to a particular condition or
circumstance. The idea is that with proper processes,
checks, and testing, a desired outcome can be delivered
with fewer problems and unforeseen complications. Best
practices can also be defined as the most efficient (least
amount of effort) and effective (best results) way of
accomplishing a task, based on repeatable procedures that
have proven themselves over time for large numbers of
people
Refers to the base-two number system. The system
contains only two numbers, 0 and 1. In computer-like
circuits, the presence of a voltage, current or other such
signal indicates a "1" whereas the absence of the same
signal indicates "0".

binaire

Bio-puce

251

the application of information technology to the field of


bioinformatique
molecular biology. The primary goal of bioinformatics is to
increase our understanding of biological processes. What
sets it apart from other approaches, however, is its focus
on developing and applying computationally intensive
techniques (e.g., pattern recognition, data mining, machine
learning algorithms, and visualization) to achieve this goal
bit
matriciel

.

:

.

.

4 .

4.3BSD

.


. 2
1 0




.
.


.0 1

Page 8

batch data
batch mode

benchmarking

BIND

best practices

binary

biochip

bioinformatics

Berkeley Internet
Name Domain

bit
BMP

bitmap

)253 (

251

a blending of different learning environments. This can


apprentissage mixte
mean also blending methods, techniques or resources and
applying them in an interactively meaningful learning
environment. Learners should have easy access to different
learning resources in order to apply the knowledge and
skills they learn under the supervision and support of the
teacher inside and outside the classroom. This approach
will combine face-to-face instruction with computermediated instruction

.


.

.

251

a type of website, usually maintained by an individual with


regular entries of commentary, descriptions of events, or
other material such as graphics or video. A typical blog
combines text, images, and links to other blogs, Web
pages, and other media related to its topic. The ability for
readers to leave comments in an interactive format is an
important part of many blogs


.
.

(

)



.


56kbps
.


.


blogage

technologie sans fil


Bluetooth
the toolkit draws on existing resources, identifies relevant
local and international stakeholders, and takes into
consideration the specific constraints of developing
economies. The toolkit seeks to raise awareness among
Member States of the growing threats posed by botnets
and the linkage with criminal activities and incorporates
policy, technical and social aspects of mitigating the effects
of botnets.
50

251

250

bote outils pour


limiter les rseaux de
zombies

large bande

a high data rate Internet accesstypically contrasted with


dial-up access using a 56k modem.
A high-speed connection. It typically refers to DSL or cable
access to the Internet
A transmission medium capable of supporting a wide range
of frequencies, typically from audio up to video
frequencies. It can carry multiple signals by dividing the
total capacity of the medium into multiple, independent
bandwidth channels, where each channel operates only on
a specific range of frequencies.

accs large bande


connexion large bande
rseaux de donnes
large bande

services d'internet
large bande
License de large bande

Page 9

blended learning

blog

Bluetooth

botnet mitigation
toolkit

broadband

broadband access

broadband connectivity

broadband data
networks

broadband Internet
services

BL

broadband license

)253 (

251

The standard broadband technologies in most areas are


technologies large
DSL and cable modems. Newer technologies in use include bande
VDSL and pushing optical fiber connections closer to the
subscriber in both telephone and cable plants. Fiber-optic
communication, while only recently being used in fiber to
the premises and fiber to the curb schemes, has played a
crucial role in enabling Broadband Internet access by
making transmission of information over larger distances
much more cost-effective than copper wire technology. In
a few areas not served by cable or ADSL, community
organizations have begun to install Wi-Fi networks, and in
some cities and towns local governments are installing
municipal Wi-Fi networks. As of 2006, broadband mobile
Internet access has become available at the consumer level
in some countries, using the HSDPA and EV-DO
technologies. The newest technology being deployed for
mobile and stationary broadband access is WiMAX

DSL
VDSL .


.
HSDPA
.

251

a fairly new technology that provides high-speed wireless


accs sans fil large
internet and data network access over a wide area.
bande
According to the 802.16-2004 standard, broadband means
'having instantaneous bandwidth greater than around 1
MHz and supporting data rates greater than about 1.5
Mbit/s. This means that Wireless Broadband features
speeds roughly equivalent to wired broadband access, such
as that of ADSL or a cable modem.


-802.16 .
" " 2004
.1.5Mb/s 1MHz

. ADSL


.
ICANN
.) (
.






.

.

1988
.

"large bande pour tous"


300

251

251

The Business Constituency (BC) is the voice of commercial


Internet users within ICANN - the Internet Corporation for
Assigned Names and Numbers. ICANN is a global body
with responsibility for certain policies that make the
Internet work

circonscription d'entrepri
se

plan de continuit des


activits

are programs designed to accelerate the successful


ppinire d'entreprises
development of entrepreneurial companies through an
array of business support resources and services,
developed and orchestrated by incubator management and
offered both in the incubator and through its network of
contacts
is a trade group established in 1988 and representing a
alliance de socits de
number of the world's largest software makers. Its principal logiciels
activity is trying to stop copyright infringement of software
produced by its members

Page 10

broadband technologies

BWA

broadband wireless
access

broadband-for-all
BC

business constituency

business continuity plan

business incubator

BSA

business software
alliance

)253 (

250

Electronic commerce between businesses, as opposed to


between a consumer and a business (B2C). While derived
from "business to business", "B2B" is narrower in meaning

service interentreprises


)(

B2B

business-to-business

251

describes activities of businesses serving end consumers


with products and/or services

service d'une entreprise


au consommateur


) (

B2C

business-to-consumer

50
251

cble
is a system of providing television to consumers via radio
frequency signals transmitted to televisions through fixed
optical fibers or coaxial cables as opposed to the over-theair method used in traditional television broadcasting (via
radio waves) in which a television antenna is required

50

cblodistribution

procdure de rappel


.


.

centre d'appels



.


.

251

is a feature on some telephone networks. If a calling party


places a call to a called party which is otherwise engaged,
and the called party has the call waiting feature enabled,
the called party is able to suspend the current telephone
call and switch to the new incoming call (Typically, this is
done by pushing the flash button), and can then negotiate
with the new or the current caller an appropriate time to
ring back if the message is important, or to quickly handle
a separate incoming call

appel en attente

251

was formed in 1968 by the Canadian government. CIDA


administers foreign aid programs in developing countries,
and operates in partnership with other Canadian
organizations in the public and private sectors as well as
other international organization
Funds used by a company to acquire or upgrade physical
assets such as property, industrial buildings or equipment.
This type of outlay is made by companies to maintain or
increase the scope of their operations. These
expenditures can include everything from repairing a roof
to building a brand new factory.

agence de
dveloppement
internationale
canadienne

300

Money received by a firm as a result of its operating


activities, investment activities, and financing activities.

encaissement

300

Money paid out by a firm as a result of its operating


activities, investment activities, and financing activities.

sorties de fonds

300

dpense
d'investissement

CTV

cable television

call-back

call centre

. 1968


Page 11

cable

call waiting

CIDA

CAPEX

Canadian International
Development Agency,
Canada
capital expenditure

cash inflows

cash outflows

( )253

Central Agency for


Information
Technology, Kuwait

Central Organization
& for Standardization
Quality Control

central processing unit

agence centrale de
technologie
d'information au Kuwait

COSQC

1979 :
-1 .
-2 .
-3
.
-4
.
-5 .
-6
.
-7 .
-8 .
-9
.
-10

.

organisation centrale de
normalisation et de
contrle de qualit

CPU


.
(
) .

.

Unit centrale de
traitement
plateforme centrale
technique

central technical
platform

Centre for Excellence in


Education, USA

CEE

Page 12

centre d'excellence en
ducation

a platform describes some sort of hardware architecture or


software framework (including application frameworks),
that allows software to run. Typical platforms include a
computer's architecture, operating system, programming
languages and related runtime libraries or graphical user
interface.

nurtures careers of excellence and leadership in science


and technology for academically talented high school and
college students

251

)253 (

300

251

A team of people that promote collaboration and using


best practices around a specific focus area to drive
business results. This team could be staffed with full- or
part-time members
consists of a code that pairs each character from a given
repertoire with something else, such as a sequence of
natural numbers, octets or electrical pulses, in order to
facilitate the transmission of data (generally numbers
and/or text) through telecommunication networks or
storage of text in computers

50

establishes a dedicated physical connection between end


points for the duration of that communication session
50

centres d'excellence


.
.

COE

Centre of Excellence

CES

character encoding
scheme

plan de codage de
caractres



/ (
.)

sites web de dialogue en


ligne


.


.

chat websites

) (

circuit switch


. :

.

liaison commute

commutation de circuits

251

is a second-level Cisco Career certification that indicates a


foundation in apprentice knowledge of networking. CCNA
certification validates the ability to install, configure,
operate, and troubleshoot medium-size routed and
switched networks, including implementation and
verification of connections to remote sites in a WAN

251

related to network technology, is a 3 bit field within an


classe de service
Ethernet frame header when using 802.1Q tagging. The
field specifies a priority value of between 0 and 7 inclusive
that can be used by Quality of Service (QoS) disciplines to
differentiate traffic. While CoS operates only on Ethernet at
the data link layer, other QoS mechanisms (such as
DiffServ) operate at the network layer and higher. Others
operate on other physical layer

3 .
0 ( .
) 7
.

COS

class of service

the use of video cameras to transmit a signal to a specific


place, on a limited set of monitors

tlvision en circuit
ferm
grappe



.

.

CCTV

closed-circuit television

The art of recovering original data (the plaintext) that has


been encrypted (turned into ciphertext) without having
access to the correct key used in the encryption process.
When new encryption algorithms are introduced,
cryptanalysis determines how hard it is to break the code

craquage

) (

.

50

certifi de Cisco comme


"associ en rseaux"




.
.WAN

circuit switching

Page 13

CCNA

Cisco certified network


associate

cluster

code cracking

)253 (

50

300

accs multiple division


de code

identifies a set of characters that are relevant and should


be identifiable for some Character Set. It does not,
however, specify the actual encoding of these characters,
which is done by one or more CESs.
Cybercrime is criminal activity done using computers and
the Internet. This includes anything from downloading
illegal music files to stealing millions of dollars from online
bank accounts. Cybercrime also includes non-monetary
offenses, such as creating and distributing viruses on other
computers or posting confidential business information on
the Internet

ensemble de caractres
codes

combattre les crimes


informatiques


.
.

intentional deception resulting in injury to another. Fraud


usually consists of a misrepresentation, concealment, or
nondisclosure of a material fact, or at least misleading
conduct, devices, or contrivance
An architecture for providing high security for transactions
over the Internet. It makes extensive use of security
certificates and portable digital tokens which store KEYS
and carry out ENCRYPTION and DECRYPTION.

fraude commerciale

.
CGI
.

architecture commune
de scurit de donnes

is a standard protocol that defines how webserver software standard CGI


can delegate the generation of webpages to a console
application. Such applications are known as CGI scripts;
they can be written in any programming language,
although scripting languages are often used
is a system of providing television to consumers via radio
frequency signals transmitted to televisions through fixed
optical fibers or coaxial cables as opposed to the over-theair method used in traditional television broadcasting (via
radio waves) in which a television antenna is required. FM
radio programming, high-speed Internet, telephony, and
similar non-television services may also be provided
251



.
.

.
CES

cblodistribution

A telecentre is a public place where people can access


tl
computers, the Internet, and other digital technologies that centre communautaire
enable them to gather information, create, learn, and
communicate with others while they develop essential
digital skills. While each telecentre is different, their
common focus is on the use of digital technologies to
support community, economic, educational, and social
developmentreducing isolation, bridging the digital
divide, promoting health issues, creating economic
opportunities, and reaching out to youth for example
NA

projets de communaut


.

. FM



.


.

Page 14

CDMA

CSS

code division multiple


access

coded character set

combating cybercrime

commercial fraud

CDSA

CGI

CATV

common data security


architecture

common gateway
interface

community antenna
television

community telecentre

community-based
projects

)253 (

a compact disk that is used with a computer (rather than


with an audio system); a large amount of digital
information can be stored and accessed but it cannot be
altered by the user

cdrom

donnes comparables
entre pays
Institut d'ordinateurs et
d'Electronique, Arabie
Saoudite

251

250

CD-ROM

compact disk read only


memory

( 1412
)1992

.


CERI

Computer and
Electronics Research
Institute, Saudi Arabia

CERT

computer emergency
response team

comparable crosscountry data

An organisation formed by DARPA in November 1988 in


response to the needs exhibited during the Internet worm
incident. The CERT charter is to work with the Internet
community to facilitate its response to computer security
events involving Internet hosts, to take proactive steps to
raise the community's awareness of computer security
issues and to conduct research targeted at improving the
security of existing systems. CERT products and services
include 24-hour technical assistance for responding to
computer security incidents, product vulnerability
assistance, technical documents and tutorials.

quipe de rponse aux


urgences d'ordinateurs

1988 DARPA
.


.

is a branch of forensic science pertaining to legal evidence


found in computers and digital storage media.

expertise judiciaire en
informatique

Production fonde sur le principe de l'automatisation souple


et qui fait appel l'informatique industrielle et aux diverses
techniques permettant d'accrotre la productivit par un
traitement intgr des donnes.
is the use of computer technology for the design of objects,
real or virtual.
computer-automated system in which individual
engineering, production, marketing, and support functions
of a manufacturing enterprise are organized; functional
areas such as design, analysis, planning, purchasing, cost
accounting, inventory control, and distribution are linked
through the computer with factory floor functions such as
materials handling and management, providing direct
control and monitoring of all process operations

productique

(
. )

CIM

computer integrated
manufacture


.

.

CAD

computer-aided design

CAM

computer-aided
manufacturing

A technique for using computers to help with one or more


phases of the software life-cycle, including the systematic
analysis, design, implementation and maintenance of
software. Adopting the CASE approach to building and
maintaining systems involves software tools and training
for the developers who will use them

gnie-logicielle assiste
par ordinateur

CASE

computer-aided
software engineering

conception assiste par


ordinateur
fabrication assiste par
ordinateur

Page 15

computer forensics

)253 (

enseignement assist
par ordinateur

251

is a form of translation wherein a human translator


translates texts using computer software designed to
support and facilitate the translation process
the use of computers as a key compoent of the
educational environment
services d'tablissement dont le rle est de diriger vers un
point de traitement ou de secours appropri une personne
en dtresse
the automation of machine tools that are operated by
abstractly programmed commands encoded on a storage
medium, as opposed to manually controlled via handwheels
or levers, or mechanically automated via cams alone

traduction assiste par


ordinateur

form of crime where the Internet or computers are used as


a medium to commit crime. Issues surrounding this type of
crime have become high-profile, particularly those
surrounding hacking, copyright infringement, child
pornography, and child grooming. There are also problems
of privacy when confidential information is lost or
intercepted, lawfully or otherwise

crime informatique

enseignement base sur


ordinateur
services de centre
d'aiguillage
commande numrique
informatise

251

a range of software systems that allow users to interact


rseau social assiste par
and share data. social network : a social structure made of ordinateur
individuals (or organizations) called "nodes," which are tied
(connected) by one or more specific types of
interdependency, such as friendship, kinship, financial
exchange, dislike, sexual relationships, or relationships of
beliefs, knowledge or prestige.

251

usually defined as the activity of using and developing


computer technology, computer hardware and software. It
is the computer-specific part of information technology

calcul informatis

a conceptual model represents 'concepts' (entities) and


relationships between them. Conceptual modelling is a well
known technique of data modelling, together with logical
modelling and physical modelling. The conceptual model is
explicitly chosen to be independent of implementation
details, such as concurrency or data storage. The aim of
conceptual model is to express the meaning of terms and
concepts used by domain experts to discuss the problem,
and to find the correct relationships between different
concepts

modle conceptuel


.

.


.

CAL

computer-assisted
learning

CAT

computer-assisted
translation



()
.

.
.


) ( .


.
.

.
.
.

Page 16

CNC

computer-based
learning
computerized
information referral
service
computerized
numerical control

computer-related crime

CSSN

computer-supported
social network

computing

conceptual model

)253 (

The establishment of the Consultative Committee was


approved during the Commission's 21st Ministerial Session
on May 11, 2001 by Resolution 225 (XXI). The Committee
shall be composed of experts from public institutions,
private sectors, civil society and research centres, and shall
have the following duties:
To advise on the endeavors exerted by member countries
with a view to acquiring modern technology and support
such endeavors with regional and international expertise,
with particular reference to information and
communications technology, biotechnology and new
materials technology;
To propose ways of integrating and coordinating efforts
aimed at transferring, adapting and mastering this
technology, and promoting regional cooperation in these
fields;
To advise on priorities related to the programmes of work
and medium-term plans adopted by UN-ESCWA in the
fields of developing scientific and technological capabilities
and technological innovation;
To follow up on the resolutions and recommendations of
international and regional conferences relating to the
development of scientific and technological capabilities and
technological innovation, which are attended by member
countries; and to coordinate efforts related to the
implementation of such resolutions and recommendations

300

Comit de conseils sur le


dveloppement
technologique et
scientifique, et de
l'innovation
technologique, de
l'ESCWA

2001

.


.

a collection of procedures used to manage work flow in a


systme de gestion du
collaborative environment. In a CMS, data can be defined
contenu
as almost anything - documents, movies, pictures, phone
numbers, scientific data, etc. CMSs are frequently used for
storing, controlling, revising, and publishing
documentation. Content that is controlled is industryspecific. (Entertainment content differs from the design of a
fighter jet). There are various terms for systems (related
processes) that do this. Examples include: Web Content
Management, Digital Asset Management, Digital Records
Management, Electronic Content Management (and
others). Synchronization of intermediate steps, and
collation into a final product are common goals of each.


.
.
.
:

.

is the technical underpinning of a content application, like a rfrentiel du contenu


Content Management System or a Document Management
System to be more specific. It functions as the logical
storage facility for content
crime de contenu

The integration of the telephone system with IP-based data rseaux converges
networks

Page 17

Consultative
Committee on
Scientific and
Technological
Development and
Technological
Innovation of ESCWA

CMS

content management
system

content repository

content-related crimes
converged networks

)253 (

250

<storage> Main memory or RAM. This term dates from the noyau
days of ferrite core memory; now archaic most places
outside IBM, but also still used in the Unix community and
by old-time hackers or those who would sound like them.
<processor> An integrated circuit design, usually for a
microprocessor, which includes only the CPU and which is
intended to form part of a complete circuit design which
incorporates other circuits on the same chip such as cache,
memory . <language> A varient on kernel as used to
describe features built into a language as opposed to those
provided by libraries.
management unit, I/O ports and timers.

251

the central part of a telecom network that provides various


services to customers who are connected by the access
network.

Method in which a fixed sum or a percentage of the total


cost is added (as income or profit) to the cost of the
product to arrive at its selling price
entered into force in July 2004, is the only binding
international treaty on the subject to have been adopted to
date. It lays down guidelines for all governments wishing to
develop legislation against cybercrime.


.

.

.

) (

)(

")( "

fixation des prix base


des couts

convention du conseil de
l'Europe pour les crimes
informatiques

2004
.


. .

rseau fdrateur

transmission sur le
rseau fdrateur
rseau fdrateur

core

core network

core transmission
core transmission
networks
cost-based pricing

Council of Europe
Convention on
Cybercrime

Open to signature by non-European states, the convention


also provides a framework for international co-operation in
this field. An additional Protocol outlaws acts of a racist and
xenophobic nature committed through computer systems.

251

an Internet top-level domain generally used or reserved for domaine national


a country (a sovereign state or a dependent territory).

251

part of a system of payments named after the small plastic


card issued to users of the system. It is a card entitling its
holder to buy goods and services based on the holder's
promise to pay for these goods and services

carte de crdit


.

.

A type of fraud in which the numbers on a credit card are


recorded and then transferred to a duplicate card. This is
done without the knowledge of the original credit card
holder
a concept that relates to the preparedness and response to
serious incidents that involve the critical infrastructure of a
region or nation

fraude des cartes de


crdit

) (
.

protection de
l'infrastructure
d'information critique

Page 18

ccTLD

country code top-level


domain
credit card

credit card skimming

CIIP

critical information
infrastructure
protection

)253 (

251

251

251

the smallest amount of fissile material needed for a


masse critique
sustained nuclear chain reaction. The critical mass of a
fissionable material depends upon its nuclear properties
(e.g. the nuclear fission cross-section), its density, its
shape, its enrichment, its purity, its temperature, and its
surroundings
a term that encapsulates the legal issues related to use of
loi du cyberespace
communicative, transactional, and distributive aspects of
networked information devices and technologies. It is less a
distinct field of law in the way that property or contract are,
as it is a domain covering many areas of law and regulation


.
.

critical mass

cyber law

the global domain of electromagnetics as accessed and


cyberespace
exploited through electronic technology and the modulation
of electromagnetic energy to achieve a wide range of
communication and control system capabilities

an organization that facilitates online transactions without


owning the products or services

251

251

mdiateur cyberntique

describes an institution that teaches courses entirely or


cole cyberntique
primarily through online methods. Though there are tens of
thousands of commercial and non-accredited courses
available online, the term "virtual school" is generally
reserved for accredited schools that teach a full-time (or
nearly full-time) course of instruction designed to lead to a
degree
a branch of computer technology known as information
scurit Internet
security as applied to computers and networks. The
objective of computer security includes protection of
information and property from theft, corruption, or natural
disaster, while allowing the information and property to
remain accessible and productive to its intended users


)(

Page 19

cyber space

cybermediary

cyber-school

cybersecurity

)253 (

The toolkit is intended to assist national government


officials at the
management level in examining their existing national
policies,
procedures, norms, institutions, and relationships in light of
the Report. It
assists in identifying:
major players involved in cybersecurity/critical information
infrastructure protection (CIIP) in a country; and
their roles and their means of coordination, interaction, and
cooperation.
The toolkit assists policy makers and managers from
relevant agencies and
institutions to discuss among themselves their nations
cybersecurity
efforts and arrangements.

boite outils pour la


cyber
scurit/protection de
l'infrastructure
d'information critique




.

.

The deliberate, large-scale disruption of networks of


computers, especially of personal computers attached to
the Internet, by means of viruses etc
In computer science, data is anything in a form suitable for
use with a computer.
In computing, a buffer is a region of memory used to
temporarily hold data while it is being moved from one
place to another.
A hardware signal defined by the RS-232-C standard that
indicates that the device, usually a modem, is online and
ready for transmission.

terrorisme informatique

cyberterrorism

data

In telecommunication, data compaction is the reduction of


the number of data elements, bandwidth, cost, and time
for the generation, transmission, and storage of data
without loss of information by eliminating unnecessary
redundancy, removing irrelevancy, or using special coding.

compactation des
donnes

donnes
tampon de donnes

dtection de porteuse de
donnes

Able to share data or commands with older versions of


compatibilit de donnes
itself, or sometimes other older systems, particularly
systems it intends to supplant. Sometimes backward
compatibility is limited to being able to read old data but
does not extend to being able to write data in a format that
can be read by old versions
50
50

compression des
donnes
standard d'encryptions
des donnes

cybersecurity/CIIP selfassessment toolkit

data buffer

data compatibility


.
IBM
.1976
. 56

data compression

Page 20

data carrier detected

data compaction

DES

data encryption
standard

)253 (

is a nonparametric method in operations research and


economics for the estimation of production frontiers. It is
used to empirically measure productive efficiency of
decision making units (or DMUs).
A device that converts one protocol or format to another. A
network gateway converts packets from one protocol to
another. An application gateway converts commands
and/or data from one format to another.

analyse
d'enveloppement des
donnes

data envelopment
analysis

passerelle de donnes

.

/
.

enables mobile operators to offer enhanced location-based


data services (such as 411/Where's the Nearest, Buddy
Finder, and Fleet Tracking) that enhance subscriber
offerings, increase ARPU, and improve customer loyalty

systme de
positionnement de
plateformes, et relais de
donnes

Data Replication is the process of copying the data from a


certain data source to another source while maintaining
identical copies of the data that are syncronized.

solution de rplication
des donnes


.
.

data replication
solution

restriction de donnes

data restriction


.


.


.
.

data warehousing
application

database

database manufacture

data gateway

data relay and platform


location system

Any changes made to the original content should be posted


to the copy of the data at the oth[er location.
This will enable two or more copies of data to be available

50

entrept de donnes

A database is an integrated collection of logically-related


records or files consolidated into a common pool that
provides data for one or more multiple uses. One way of
classifying databases involves the type of content, for
example: bibliographic, full-text, numeric, image. Other
classification methods start from examining database
models or database architectures: see below

50

base de donnes

fabrique de bases de
donnes
exploration de donnes

pratique trompeuse
50

ligne d'accs ddie

remise de contenu
lectronique aux classes



.


.
.
T1

Page 21

data-mining

deceptive practice

dedicated access line

delivery of electronic
content in the
classroom

)253 (

251

251

an attempt to make a computer resource unavailable to its


intended users. Although the means to carry out, motives
for, and targets of a DoS attack may vary, it generally
consists of the concerted efforts of a person or people to
prevent an Internet site or service from functioning
efficiently or at all, temporarily or indefinitely. Perpetrators
of DoS attacks typically target sites or services hosted on
high-profile web servers such as banks, credit card
payment gateways, and even root nameservers.

<communications> (WDM) Multiplexing several Optical


Carrier n signals on a single optical fibre by using different
wavelengths (colours) of laser light to carry different
signals.

50

dni de service

attaque de dni de
service
multiplexage en
longueur d'onde dense


.
" "


) (
.

privation d'accs aux


donnes
modem composition
automatique


.

.


TDM

DWDM

systmes d'accs
numrique
interconnectes

251

measures the overall ability of individuals in


a country to access and use Information and
Communication Technology.
The DAI is computed using the methodology of the
International
Telecommunications Union (ITU).

indice d'accs numrique

DAII is a project of G3ict to create a database which can


be used to sort signatory countries of the Convention on
the Rights of Persons with Disabilities by the degree to
which they adhere to Article 9 of the protocol, which
focuses on accessibility for persons with disabilities

indice de disponibilit et
d'inclusion numrique

G3ICT

9

dense wavelength
division multiplexing

deprivation of access
to data
dial-up modem

is a piece of circuit-switched network equipment, used in


telecommunications networks, that allows lower-level TDM
bit streams, such as DS0 bit streams, to be rearranged and
interconnected among higher-level TDM signals, such as
DS1 bit streams. DCS units are available that operate on
both older T-carrier/E-carrier bit streams, as well as newer
SONET/SDH bit streams

denial of service

denial-of-service attack

251

Page 22

DOS

digital access crossconnect systems

DAI

digital access index

digital accessibility and


inclusion index

)253 (

300

D-AMPS is a North American 2G digital cellular radio


standard that essentially is a digital version of the earlier
analog AMPS specification. D-AMPS operates in the same
800 MHz band as AMPS and the two can coexist in the
same network. D-AMPS uses the same 30 kHz bands as
AMPS, and supports up to 416 frequency channels per
carrier. D-AMPS employs time division duplex (TDD) to
subdivide each frequency channel into six time slots, each
of which operates at 8 kbps. Each call initially uses two
time slots in each direction, for a total of 16 kbps

systme numrique
avance de tlphonie
mobile


.
800MHz
.

300

Products available in digital form. It typically refers to


music, information and images that are available for
download or distribution on electronic media
consists of management tasks and decisions surrounding
the ingestion, annotation, cataloguing, storage, retrieval
and distribution of digital assets. Digital photographs,
animations, videos and music are samples of media asset
management (a sub-category of DAM). Digital asset
management systems includes computer software and/or
hardware systems that aid in the process of digital asset
management

contenu numrique
arabe

.





.
.

Digital audio uses digital signals for sound reproduction.


This includes analog-to-digital conversion, digital-to-analog
conversion, storage, and transmission.

technologie
d'enregistrement audio
numrique

251

a generic term for any type of cable television distribution


using digital video compression or distribution. The
technology was originally developed by Motorola.

cble numrique

300

Using MPEG encoding, digital cable is an enhanced service


from the cable companies that provides an option to the
regular analog TV. Advantages are on-screen program
guides, a sharper picture and more channels of paid and
on-demand programs. Unlike "digital satellite TV," which
requires a dish on the roof, digital cable, also known as
"digital terrestrial TV (DTTV)," is delivered over the same
coaxial cable wired into the home or office

tlvision numrique par


cble

gestion du passif
lectronique

A digital camera (also digicam or camera for short) is a


appareil photo
camera that takes video or still photographs, or both,
numrique
digitally by recording images via an electronic image sensor.

To make a product that functions like another

.
.

D-AMPS

digital advanced
mobile phone system

DAC

digital Arabic content

digital asset
management

digital audio recording


technology

MPEG

.
.

.

digital cable tv

(
)

digital camera

digital cloning

clonage numrique

Page 23

digital cable

)253 (


.

.

300

a facility that provides free or low-cost computer access,


centre communautaire
and sometimes training, to people lacking the resources to numrique
have a computer in their home. Such facilities are generally
established through a collaborative effort on the part of
government and non-profit organizations, as well as
corporate and private citizens.

300

Products available in digital form. It typically refers to


music, information and images that are available for
download or distribution on electronic media
Petit appareil portatif qui permet d'enregistrer des
messages vocaux qui lui sont dicts et qu'il garde en
mmoire sous forme de donnes numriques.

contenu numrique

enregistreur vocal
numrique

Digital evidence or electronic evidence is any probative


information stored or transmitted in digital form that a
party to a court case may use at trial.

preuve numrique

()

A digital media receiver can connect to the home network


centre numrique
using either a wireless (IEEE 802.11a, b, g, and n) or wired
(Ethernet) connection. A DMR includes a user interface that
allows users to navigate through their digital media library,
search for, and play back media files. Different DMRs are
designed to handle different tasks


. IEEE802.11
)
(

.

is an action program that aims to implement a whole-ofprogramme d'inclusion


community approach to community building and economic numrique
development, using new technologies as tools to provide
equal access for all residents in disadvantaged communities

refers to the technique of transmitting information over


radiocommunication
microwave frequencies, using various integrated
numrique
technologies. The portion of the microwave spectrum called
millimeter wave is highly susceptible to attenuation by the
atmosphere (especially during wet weather).


.
) (

a vision of global development


based on the power of information technology to promote
sustainable growth, advance social
justice and strengthen democratic governance.

251

handles the input and enrollment of physical characteristics intelligence de mdias


such as face, voice and fingerprint, and supports database numriques
searches using biometrics

occasion numrique
pour tous

Page 24

DCC

digital community
centre

digital content

digital dictation
recording system

digital evidence

digital hub

digital inclusion
programme

digital media
intelligence

digital microwave
system

digital opportunity for


all

)253 (

251

251

an index published by the United Nations International


Telecommunication Union based on internationally-agreed
ICT indicators. This makes it a valuable tool for
benchmarking the most important indicators for measuring
the Information Society. The DOI is a standard tool that
governments, operators, development agencies,
researchers and others can use to measure the digital
divide and compare ICT performance within and across
countries
an area with a collection of buildings dedicated to scientific
research on a business footing. There are many
approximate synonyms for "science park", including
research park, technology park, technopolis and biomedical
park. The appropriate term typically depends on the type of
science and research in which the park's entities engage,
but many of these developments are named according to
which term gives the park the best profitability and naming
advantages. Often, science parks are associated with or
operated by institutions of higher education (colleges and
universities).

indice d'opportunit
numrique


.
.

jardin de technologie
numrique

) (
.
:
.
) (

was established in 2004 as a collaborative enforcement


operation to unite industry leaders in technology, banking,
financial services and online retail services with law
enforcement to combat "phishing," a destructive and
increasing form of fraud and identity theft.

organisation Phishnet

The Digital Signature Algorithm (DSA) is a United States


algorithme de signature
Federal Government standard or FIPS for digital signatures. numrique
It was proposed by the National Institute of Standards and
Technology (NIST) in August 1991 for use in their Digital
Signature Standard (DSS), specified in FIPS 186 [1],
adopted in 1993
<cryptography, standard> The NIST's standard for digital
standard de signature
signatures (authenticating both a message and the signer) numrique
that was first announced in 1991. It is based on an
algorithm using discrete logarithms, which is a variant of
the Elgamal algorithm with Schnorr's improvements. DSS's
security is currently considered very strong - comparable to
RSA. It is estimated that DSS's 1024-bit keys would take
1.4E16 MIPS-years to crack.

digital opportunity
index

digital park

2004

.

digital phishnet

.
1991
2003 DSS

DSA

digital signature
algorithm


.1991
.RSA .
1024
1.4x10^16 MIPS

DSS

digital signature
standard

Page 25

)253 (

251

251

<cryptography, standard> The NIST's standard for digital


standard de signature
signatures (authenticating both a message and the signer) numrique/algorithme
that was first announced in 1991. It is based on an
de signature numrique
algorithm using discrete logarithms, which is a variant of
the Elgamal algorithm with Schnorr's improvements. DSS's
security is currently considered very strong - comparable to
RSA. It is estimated that DSS's 1024-bit keys would take
1.4E16 MIPS-years to crack.

.1991
DSS/DSA
. /
.RSA

digital signature
standard/digital
signature algorithm
(DSS/DSA)

The Digital Solidarity Agenda aims at putting in place the


agenda de solidarit
conditions for mobilizing human, financial and technological numrique
resources for inclusion of all men and women in the
emerging Information Society. Close national, regional and
international cooperation among all stakeholders in the
implementation of this Agenda is vital. To overcome the
digital divide, we need to use more efficiently existing
approaches and mechanisms and fully explore new ones, in
order to provide financing for the development of
infrastructure, equipment, capacity building and content,
which are essential for participation in the Information
Society.



.

.

digital solidarity agenda

The Digital solidarity fund (DSF) was established following


talks which took place during the World Summit on the
Information Society in Tunis in 2005. The foundation
operates under Swiss law with its headquarters in Geneva
Switzerland.

fonds de solidarit
numriques


.2005
.
.

DSF

digital solidarity fund

ligne d'abonn
numrique
technologie numrique


.

.
.

DSL

digital subscriber line

The fund aims to reduce the global Digital divide.


50
Digital electronics are systems that represent signals as
discrete levels, rather than as a continuous range. In most
cases the number of states is two, and these states are
represented by two voltage levels: one near to zero volts
and one at a higher level depending on the supply voltage
in use
consists of privacy over the media of the Internet: the
ability to control what information one reveals about
oneself over the Internet, and to control who can access
that information. Many people use the term to mean
universal Internet privacy: every user of the Internet
possessing Internet privacy

trace numrique

Page 26

digital technology

digital trail

)253 (

251

300

50

251

the representation of an object, image, sound, document


numrisation
or a signal (usually an analog signal) by a discrete set of its
points or samples. The result is called digital
representation or, more specifically, a digital image , for
the object, and digital form , for the signal. Strictly
speaking, digitizing means simply capturing an analog
signal in digital form
An outside line connecting to the PSTN.
ligne non partage

is a PV system made up of modules


including concentrating optical components. The objective
of a C-System is to
improve the PV module performance by increasing the
sunlight intensity falling
on the cell

concentrateur
parabolique

was established in 1996 to guide countries that have, or


that might seek, access to international capital markets in
the dissemination of economic and financial data to the
public
a field of education that focuses on the pedagogy and
andragogy, technology, and instructional systems design
that aim to deliver education to students who are not
physically "on site".

bulletin sur la diffusion


des standards

50
251

300

organization or commercial entity, accredited by the


Internet Corporation for Assigned Names and Numbers
(ICANN) or by a national country code top-level domain
(ccTLD) authority, to manage the reservation of Internet
domain names in accordance with the guidelines of the
designated domain name registries and offer such services
to the public
Generic Names Supporting Organization (GNSO) of ICANN
is the successor to the responsibilities of the Domain Name
Supporting Organization that relate to the generic top-level
domains. ICANN's by-laws outline three supporting
organizations, of which the GNSO belongs. The SOs help to
promote the development of Internet policy and encourage
diverse and international participation in the technical
management of the Internet. Each SO names two Directors
to the ICANN Board

systme d'exploitation
disque

enseignement distance

numrisation des
documents
nom de domaine
registraire de nom de
domaine

organisation de
soutnement des noms
de domaines


.
.

) (


.


.
1996

.
.


.

. . . :
ICANN


.
.

Page 27

digitization

DEL

dish concentrator

DOS

disk operating system

dissemination
standards bulletin
board
distance learning

document digitization

domain name

direct exchange line

domain name registrar

DNSO

Domain Name
Supporting
Organization

)253 (

50,250

251

251

systme des noms de


domaines

To transfer (computer data, especially as one or more files) tlchargement


from a remote computer (server) to a local computer,
usually via a network.
a technology park under development in Dubai, United
oasis de silicium de
Arab Emirates which was launched in October 2002 by
Duba
Sheikh Mohammed bin Rashid Al Maktoum, UAE Vice
President & Prime Minister, & ruler of Dubai, aiming to
become a world centre for electronic innovation, research,
and development. The project's establishment was decreed
by the former ruler of Dubai, Sheikh Maktoum bin Rashid Al
Maktoum in September 2004, and is due for completion by
April 2007. The project is to span over 7 million square
meters and has entered phase one of the construction
which includes the construction of 560 residential villas
allows customers to conduct financial transactions on a
secure website operated by their retail or virtual bank,
credit union or building society
is the conduct of business on the Internet, not only buying
and selling but also servicing customers and collaborating
with business partners
commonly known as (electronic marketing) e-commerce or
eCommerce, consists of the buying and selling of products
or services over electronic systems such as the Internet
and other computer networks. The amount of trade
conducted electronically has grown extraordinarily with
widespread Internet usage. The use of commerce is
conducted in this way, spurring and drawing on innovations
in electronic funds transfer, supply chain management,
Internet marketing, online transaction processing,
electronic data interchange (EDI), inventory management
systems, and automated data collection systems

banque lectronique

251

art and culture innovation, organized by platforms, and


recognized by funders

251

used to refer to the use of information and communication


technology to provide and improve government services,
transactions and interactions with citizens, businesses, and
other arms of government.

251

statistiques des affaires


lectroniques
commerce lectronique


IP
IP

.

) (
.

2002

.
.
. 560 7

DNS

domain name system

download

Dubai Silicon Oasis


Authority

e-banking

e-business statistic

.

.


e-commerce

culture lectronique

e-culture

gouvernement
lectronique

Page 28

e-government

)253 (

autorit du
gouvernement
lectronique (Bahrenie)

initiative gyptienne de
la socit d'information

eGovernment
Authority, Bahrain

Egyptian information
society initiative

251

healthcare practice which is supported by electronic


processes and communication.The term is inconsistently
used: some would argue it is interchangeable with health
care informatics and a sub set of health informatics, while
others use it in the narrower sense of healthcare practice
using the Internet

251

used within the European Union to encompass activities


inclusion numrique
related to the achievement of an inclusive information
society. In this vein, new developments in technology turns
the risk of a digital divide into "digital cohesion" and
opportunity, bringing the benefit of the Internet and
related technology into all segments of the population,
including people who are disadvantaged due to education
(a specific subset called e-Competences), age (called eAgeing), gender, disabilities (called e-Accessibility),
ethnicity, and/or those living in remote regions (subject to
the geographical digital divide). E-inclusion covers mainly
the development of appropriate policies, maintenance of a
knowledge base, research & technology development and
deployment, & best practices dissemination. At EU level eInclusion is part ot the third pillar of the 2010 policy
initiative, managed by Directorate-General for Information
Society and Media of the European Commission.


.





.

e-inclusion

251

encompasses forms of technology-enhanced learning (TEL) formation en ligne


or very specific types of TEL such as online or Web-based
learning. Nevertheless, the term does not have a


.

.


.

e-learning

universally accepted definition[1] and there are divides in


the e-learning industry about whether a technologyenhanced system can be called e-learning if there is no set
pedagogy as some argue e-learning is: "pedagogy
empowered by digital technology" . in companies, it often
refers to the strategies that use the company network to
deliver training courses to employees and lately in most
Universities, e-learning is used to define a specific mode to
attend a course or program of study where the students
rarely or never meet face-to-face, nor access on-campus
educational facilities, because they study online.

sante lectronique

Page 29

e-health

)253 (

300
250

251

Hardware interfaces are the plugs, sockets, cables and


electrical signals traveling through them.
The exchange of standardised document forms between
computer systems for business use. EDI is part of
electronic commerce. EDI is most often used between
different companies ("trading partners") and uses some
variation of the ANSI X12 standard (USA) or EDIFACT (UN
sponsored global standard

interfaces lectriques




.
.

is the process of moving data from one computer system


directly to another. In our case, data is moving in one
direction, from the warehouseman's computer to the
examiner's computer

interface de donnes
numriques

hritage national sur la


documentation
numrique

the structured transmission of data between organizations change de formulaires


by electronic means. It is used to transfer electronic
informatis
documents from one computer system to another, i.e. from
one trading partner to another trading partner

blanchiment de l'argent
lectronique
plan de cours
lectronique
vandalisme numrique

groupe d'internet aux


Emirats

2006






e-ATA MyPDA (
)(
.
)

Interfacing also often refers to the connection of peripheral interfaage lectronique


devices to computers.
is usually a computerized legal medical record created in an dossier mdical
organization that delivers care, such as a hospital and
informatis
doctor's surgery.[1] Electronic medical records tend to be a
part of a local stand-alone health information system that
allows storage, retrieval and manipulation of records

A summary of topics which will be covered during an


academic course, or a text or lecture.
western industrial society is dependent upon complex data
processing and telecommunications systems. Damage to,
or interference with, any of these systems can lead to
catastrophic consequences

300

change de documents
informatiss

provides all the services offered in the current business


portals (MyDPA, e-MIRSAL, e-ATA and MyJAFZA) with a
single User Id and Password through a common interface

e-Mirsal (service)

Page 30

electrical interfaces
EDI

electronic data
interface

electronic data
interface

electronic
documentation of the
countrys heritage
EFI

electronic form
interchange

electronic interfacing
EMR

electronic medical
records

electronic moneylaundering
electronic syllabus
electronic vandalism

Emirates Internet
Group

e-mirsal (Internet site


for electronic clearing
procedures of the
dubai customs and
cargo sector)

)253 (

251

251

an XML standard for encoding archival finding aids,


maintained by the Library of Congress in partnership with
the Society of American Archivists.is a non-proprietary de
facto standard for the encoding of finding aids for use in a
networked (online) environment. Finding aids are
inventories, indexes, or guides that are created by archival
and manuscript repositories to provide information about
specific collections. While the finding aids may vary
somewhat in style, their common purpose is to provide
detailed description of the content and intellectual
organization of collections of archival materials. EAD allows
the standardization of collection information in finding aids
within and across repositories.

description d'archives
code

XML

.

.
.

A sequence of processes/functions used to provide a


specific service
is a term usually used in conjunction with ERP software or
an ERP system which is intended to manage all the
information and functions of a business or company from
shared data stores.An ERP system typically has modular
hardware and software units and "services" that
communicate on a local area network. The modular design
allows a business to add or reconfigure modules (perhaps
from different vendors) while preserving data integrity in
one shared database that may be centralized or distributed

logique de service de
l'utilisateur final
progiciel de gestion
intgr

/
.

.
ERP
.



.

.
.1800

a person who has possession of a new enterprise, venture Entrepreneur


or idea, and assumes significant accountability for the
inherent risks and the outcome. He or she is an ambitious
leader who combines land, labor, and capital to often
create and market new goods or services. ... [1] The term
is a loanword from French and was first defined by the
Irish economist Richard Cantillon. Entrepreneur in English
is a term applied to the type of personality who is willing to
take upon herself or himself a new venture or enterprise
and accepts full responsibility for the outcome. JeanBaptiste Say, a French economist, believed to have coined
the word Entrepreneur first in about at 1800. He said an
entrepreneur is "one who undertakes an enterprise,
especially a contractor, acting as intermediatory between
capital and labour"

Page 31

EAD

encoded archival
description

end-user service logic


ERP

enterprise resource
planning

entrepreneur

)253 (

251

251

251

is the act of being an entrepreneur, which is a French word esprit d'entreprise


meaning "one who undertakes an endeavor".
Entrepreneurs assemble resources including innovations,
finance and business acumen in an effort to transform
innovations into economic goods. This may result in new
organizations or may be part of revitalizing mature
organizations in response to a perceived opportunity. The
most obvious form of entrepreneurship is that of starting
new businesses; however, in recent years, the term has
been extended to include social and political forms of
entrepreneurial activity. When entrepreneurship is
describing activities within a firm or large organization it is
referred to as intra-preneurship and may include corporate
venturing, when large entities start spin-off organizations
encompass technologies that have the potential for
significantly improved environmental performance relative
to other technologies. Broadly speaking, these technologies
protect the environment
are less polluting
use resources in a sustainable manner
recycle more of their wastes and products
handle all residual wastes in a more environmentally
acceptable way than the technologies for which they are
substitutes
sometimes also known as supplier exchange) is the
business-to-business or business-to-consumer or Businessto-government purchase and sale of supplies, Work and
services through the Internet as well as other information
and networking systems, such as Electronic Data
Interchange and Enterprise Resource Planning.Typically, eprocurement Web sites allow qualified and registered users
to look for buyers or sellers of goods and services.
Depending on the approach, buyers or sellers may specify
costs or invite bids. Transactions can be initiated and
completed. Ongoing purchases may qualify customers for
volume discounts or special offers. E-procurement software
may make it possible to automate some buying and selling.
Companies participating expect to be able to control parts
inventories more effectively, reduce purchasing agent
overhead, and improve manufacturing cycles. Eprocurement is expected to be integrated into the wider
Purchase-to-pay (P2P) value chain with the trend toward
computerized supply chain management

technologies
appropries
l'environnement

The New Partnership for Africa's Development E-School


Programme run by NEPAD aims to provide computers and
internet access to all schools in Africa within 10 years, and
also to set up health points to tie in with Nepad's E-Health
program.

coles lectroniques

approvisionnement
lectronique

.
.

.

:

.


.

.
.


10

Page 32

entrepreneurship

ESTS

environmentally sound
technologies

e-procurment

e-schools

)253 (

300

300

250

251

251

300

the mission of the ESCWA TC is to assist


ESCWA member countries and their public and private
organizations to acquire the necessary capabilities to
accelerate socio-economic development in order to attain
technological parity with other nations

centre de technologie
l'ESCWA

An umbrella term for services on the Internet. E-services


include e-commerce transaction services for handling
online orders, application hosting by application service
providers (ASPs) and any processing capability that is
obtainable on the Web
is an application specially introduced to the factories within
the UAE. Factories owners not only
have the latest information regarding industrial promotion
but also apply for tax exemption and other industrial
services.

service lectronique

A local area network first described by Metcalfe & Boggs of


Xerox PARC in 1976. Specified by DEC, Intel and XEROX
(DIX) as IEEE 802.3 and now recognised as the industry
standard
is the principal financial instrument of the European Union
for the implementation of the Euro-Mediterranean
Partnership activities. EUMEDIS was initiated in the
Barcelona declaration in 1995. It is a 31 billion euro
program.

Ethernet

is a submarine communications cable linking Portugal and


Spain to South Africa, with connections to several West
African countries along the route
an industry association founded in 1961 and dedicated to
the standardization of Information and Communication
Technology (ICT) and Consumer Electronics (CE).

systme de cble
europen 3

eSinaee (service)

socit de
l'information euromditerranenne

groupe de travail arabe,


association de
fabrication d'ordinateurs
europenne

e-service


)(

e-sinaee

.1976
IEEE802.3
.

ethernet


1995 .
31



1961

Page 33

ESCWA Technology
Centre for Development

EUMEDIS Euro-Mediterranean
-
Information Society

Europe 3 cable system

ECMA

European Computer
Manufacturers
Association

)253 (

251

251

300

50

was initiated and improved upon in the wake of the


socit de l'information
economic successes of the American telecommunications
europenne
market throughout the 1980s and the 1990s (George
1995), and perceived European regression on economic
and technological fronts. In seeking to bring the
Information Society and the use of information and
communications technology (ICT) to Europe, the European
Commission has had been instrumental in opening access
and improving whatever existing individual initiatives have
had been made by other parties previously (Commission of
the European Communities, 2006), and its reach can be
very In addition to that, provision of structural funds (EU
Committee of the Regions, 2006) have also been used as a
means to improve that same access to communication
networks in backwater regions of Europe that have
otherwise been less integrated into the pan-European polity
than their more interconnected counterparts, such as
Germany and the Scandinavian nations

The Institute for European Administration offers two unique


distance learning programs, one in negotiation techniques,
one on the business environment within the EU internal
market
an independent, non-profit, standardization organization in
the telecommunications industry (equipment makers and
network operators) in Europe, with worldwide projection.
ETSI has been successful in standardizing the GSM cell
phone system and the TETRA professional mobile radio
system

Institut Europen de la
gestion des affaires

:


.

.
GSM
TETRA

To provide state-of-the-art Video, Audio, Cable TV and


Multimedia Services through differentiated product
offerings and superior customer service at affordable
prices.Launched in April 2000, Emirates Cable TV &
Multimedia (L.L.C), E-Vision, a subsidiary of the dynamic
Emirates Telecommunications Corporation, ETISALAT, was
created to meet the demand for a superior technology and
services. E-Vision decided to launch the first cable TV
network in the UAE and offers the ultimate in
Entertainment, Information, Education and Interactive
Multimedia Services that will be transmitted digitally across
the UAE.

E-vision


.
2000

.

.

institut de standards des


tlcoms europen

protocole simple de
transfert de courrier
tendu

Page 34

EIS

European Information
Society (eis)

European Institute of
Business Administration

ETSI

European
Telecommunications
Standards Institute

e-vision

ESMTP

extended simple mail


transfer protocol

)253 (

251
250

is a textual data format, with strong support via Unicode


for the languages of the world. Although XMLs design
focuses on documents, it is widely used for the
representation of arbitrary data structures, for example in
web services.

50

langage XML

Extranet

251

are the products that are sold quickly at relatively low cost. bien de grande
Though the absolute profit made on FMCG products is
consommation
relatively small, they generally sell in large quantities, so
the cumulative profit on such products can be large.
FMCG products are generally replaced or fully used up over
a short period of days, weeks, or months, and within one
year. This contrasts with durable goods or major appliances
such as kitchen appliances, which are generally replaced
over a period of several years.

251

are publicly announced standards developed by the United


States Federal government for use by all non-military
government agencies and by government contractors.
Many FIPS standards are modified versions of standards
used in the wider community (ANSI, IEEE, ISO, etc.)

standards fdraux de
traitement de
l'information

300

a submarine telecommunications cable linking the United


Arab Emirates, Qatar, Bahrain, and Kuwait

fibre optique connectant


le Golfe

is a glass or plastic fiber that carries light along its length.

fibre optique

a cable containing one or more optical fibers. The optical


fiber elements are typically individually coated with plastic
layers and contained in a protective tube suitable for the
environment where the cable will be deployed.

cble fibre optique

251

is a 28,000-kilometer-long submarine communications


liaison par fibre optique
cable containing optical fiber that connects the United
sur la Plante
Kingdom, Japan, and many places in between. The cable is
operated by India's Flag Telecom, a fully-owned subsidiary
of Reliance Communications. The system runs from the
eastern coast of North America to Japan.[1] Its Europe-Asia
segment is the fourth longest[2] cable in the world

W3C
.
.Unicode


.
.

.
.
.

XML

extensible markup
language

extranet

FMCG

fast moving consumer


goods




.
ANSI IEEE ISO

FIPS

federal information
processing standards

FOG

fiber optic gulf


submarine cable

.
.

28000
.
.

Page 35

fiber-optic
fiber-optic cable

FLAG

fibre link around the


globe

)253 (

251

Fiber to the x (FTTx) is a generic term for any broadband


fibre optique jusqu'
network architecture that uses optical fiber to replace all or l'immeuble
part of the usual metal local loop used for last mile
telecommunications. The generic term originated as a
generalization of several configurations of fiber deployment
(FTTN, FTTC, FTTB, FTTH...), all starting by FTT but
differentiated by the last letter, which is substituted by an x
in the generalization. Fiber-to-the-building or Fiber-to-thebasement - fiber reaches the boundary of the building,
such as the basement in an multidwelling unit, with the
final connection to the individual living space being made
via alterative means.

FTTx

()
x .
B .
.

FTTB

fibre-to-the-building

251

Fiber-to-the-cabinet or fiber-to-the-curb - fiber is


terminated in a street cabinet typically closer than 300m of
the customer premises, with the final connection being
copper

fibre optique jusqu'au


trottoir

FTTx


x .
C .

. 300

FTTCAB

fibre-to-the-cabinet

251

this term is used in several contexts: as a blanket term for


both FTTH and FTTB, or where the fiber network includes
both homes and small businesses

fibre optique jusqu'aux


locaux de l'abonn


)FTTB FTTH(

FTTP

transfert de fichiers


.
/
.TCP/IP
FTP
.

.

.

50
50

protocole de transfert de
fichiers

50

filtrage

50

mur coupe-feu


.

.


Page 36

fibre-to-the-premises

file transfer
FTP

file transfer protocol

filtering

) (

firewall

)253 (

251

300
251

is the tendency for different technological systems to


evolve towards performing similar tasks. Convergence can
refer to previously separate technologies such as voice
(and telephony features), data (and productivity
applications) and video that now share resources and
interact with each other, synergistically creating new
efficiencies.A clear trend is emerging in the form of fixed
and mobile telephony convergence (FMC). The aim is to
provide both services with a single phone, which could
switch between networks ad hoc. Several industry
standardisation activities have been completed in this area
such as the Voice call continuity (VCC) specifications
defined by the 3GPP
a single item from a related group considered as the most
important, often in establishing a public image
refers to a pricing structure that charges a single fixed fee
for a service, regardless of usage. Rarely, it may refer to a
rate that does not vary with usage or time of use. Another
term used is "flate", a hybrid of "flat" and "rate

convergence fixe-mobile

.



.
.

applications phares




.
.

flagship applications

flat rate


.
.ASCII

.

.) (
.
1.5
X.25 ./
.

format

forwarding

frame relay

tarif forfaitaire

50

format

50

renvoi automatique
d'appels
relais de trames

50

a fraud is an intentional deception made for personal gain


or to damage another individual; the related adjective is
fraudulent
is software that is liberally licensed to grant the right of
users to use, study, change, and improve its design
through the availability of its source code. This approach
has gained both momentum and acceptance as the
potential benefits have been increasingly recognized by
both individuals and corporate players

fraudeur mrite

logiciels code source


ouvert et libre

bunch and to coordinate competences provided by various centre de logiciels libres


local, national and international enterprises and institutions,
which are highly specialized in the Free Software area
50

modulation de frquence

Page 37

FMC

fixed mobile
convergence

fraudster

FOSS

free and open-source


software

free software centre

FM

frequency modulation

)253 (

300

250

the complete range of frequencies of electromagnetic


waves from the lowest to the highest, including, in order,
radio, infrared, visible light, ultraviolet, X-ray, and gamma
ray waves
<communications> (GPRS) A GSM data transmission
technique that does not set up a continuous channel from a
portable terminal for the transmission and reception of
data, but transmits and receives data in packets. It makes
very efficient use of available radio spectrum, and users
pay only for the volume of data sent and received

spectre de frquences

service gnral de
radiocommunication par
paquets

GSM

.

domaine gnrique
250

300

250

" "

frequency spectrum

GPRS

Gtld

generic top-level
domain
geographic information
system

<application> (GIS) A computer system for capturing,


storing, checking, integrating, manipulating, analysing and
displaying data related to positions on the Earth's surface.
Typically, a GIS is used for handling maps of one kind or
another. These might be represented as several different
layers where each layer holds data about a particular kind
of feature (e.g. roads). Each feature is linked to a position
on the graphical image of a map.

systme d'information
gographique


.
.
.

A unit of frequency equal to one billion (109) hertz


In telecommunications, bit rate or data transfer rate is the
average number of bits, characters, or blocks per unit time
passing between equipment in a data transmission system

giga hertz
giga bits par secondes



1073741824 .

GHz
Gbps

giga hertz
gigabits per second

is a joint department of the World Bank and the


International Finance Corporation (IFC). Bringing together
IFC's experience in private sector investment transactions
and the World Bank's expertise in policy and regulatory
matters, GICT promotes access to information and
communication technologies in developing countries.

dpartement de
technologies
d'information et de
communication globales

GICT

Global Information And


Communications
Technologies
Department

initiative globale pour


les technologies
d'information et
communication
inclusives
rseau global du savoir

G3ICT

global initiative for


inclusive ICTs

<communications> (GPS) A system for determining postion systme de localisation


on the Earth's surface by comparing radio signals from
GPS
several satellites. When completed the system will consist
of 24 satellites equipped with radio transmitters and atomic
clocks


24 .
.

Page 38

GIS

general packet radio


service

global knowledge
network

GPS

global positioning
system

)253 (

250
50

251

251

<communications> (GSM, originally "Groupe de travail


Spciale pour les services Mobiles") A standard for digital
cellular communications (in the process of being) adopted
by over 60 countries. The GSM standard is currently used
in the 900 MHz and 1800 MHz bands.

systme global de
communications mobiles

is the online non-commercial interaction between local and transactions G2B


central government and the commercial business sector,
rather than private individuals (G2C
is the communication link between a government and
transactions G2C
private individuals or residents. Such G2C communication
most often refers to that which takes place through
Information Communication Technologies (or ICTs), but
can also include direct mail and media campaigns. G2C can
take place at the federal, state, and local levels. G2C stands
in contrast to G2B, or Government-to-Business networks.
transactions G2E

251

is the online non-commercial interaction between


Government organisations, departments, and authorities
and other Government organisations, departments, and
authorities. Its use is common in the UK, along with G2C,
the online non-commercial interaction of local and central
Government and private individuals, and G2B the online
non-commercial interaction of local and central
Government and the commercial business sector

transactions G2G

251

GAFTA is a pact made by the Arab League to achieve a


complete Arab economic bloc that can compete
internationally. GAFTA is relatively similar to ASEAN
roaming is a general term that refers to the extending of
connectivity service in a location that is different from the
home location where the service was registered.

grande zone arabe de


libre-change

251

service d'itinrance
international GSM

People committed to circumvention of computer security.


pirate informatique
This primarily concerns unauthorized remote computer
break-ins via a communication networks such as the
Internet (Black hats), but also includes those who debug or
fix security problems (White hats), and the morally
ambiguous Grey hats.
technique de piratage
251

is a display device, worn on the head or as part of a


helmet, that has a small display optic in front of one
(monocular HMD) or each eye (binocular HMD).

afficheur facial


. 60
.1800MHz 900MHz
GSM .
.

GSM

global system for


mobile communications


)(

G2B

government to business

) (
.
)(

G2C

government-to-citizen

" "
)(

.
)(

G2E

government-toemployee
government-togovernment

G2G

GAFTA


GSM

GIRS


.
.

.



.

. ) (

Page 39

greater Arab free trade


area
GSM international
roaming service

hacker

hacking technique
HMD

head mounted display

)253 (

an arrangement of items (objects, names, values,


hirarchie
categories, etc.) in which the items are represented as
being "above," "below," or "at the same level as" one
another and with only one "neighbor" above and below
each level. These classifications are made with regard to
rank, importance, seniority, power status or authority. A
hierarchy of power is called a power structure. Abstractly, a
hierarchy is simply an ordered set or an acyclic graph


.
.

251

was the first DSL technology to use a higher frequency


spectrum of copper, twisted pair cables. HDSL was
developed in the USA, as a better technology for highspeed, synchronous circuits typically used to interconnect
local exchange carrier systems, and also to carry highspeed corporate data links and voice channels, using T1
lines. HDSL can be used either at the T1 rate (1.544
Mbit/s) or the E1 rate (2 Mbit/s). Slower speeds are
obtained by using multiples of 64 kbit/s channels, inside
the T1/E1 frame. This is usually known as channelized
T1/E1, and it's used to provide slow-speed data links to
customers. In this case, the line rate is still the full T1/E1
rate, but the customer only gets the limited (64 multiple)
data rate over the local serial interface. Unlike later ADSL,
HDSL did not allow POTS at baseband.

ligne d'abonn
numrique haut dbit

DSL
HDSL .


.T1
2Mbps 1.544Mbps
.64kbps

251

is an enhanced 3G (third generation) mobile telephony


communications protocol in the High-Speed Packet Access
(HSPA) family, also coined 3.5G, 3G+ or turbo 3G, which
allows networks based on Universal Mobile
Telecommunications System (UMTS) to have higher data
transfer speeds and capacity. Current HSDPA deployments
support down-link speeds of 1.8, 3.6, 7.2 and 14.0 Mbit/s.
Further speed increases are available with HSPA+, which
provides speeds of up to 42 Mbit/s downlink and 84 Mbit/s
with Release 9 of the 3GPP standards

accs par paquets en


liaison descendante
haut dbit

251

often shortened to just broadband, is a high data rate


Internet accesstypically contrasted with dial-up access
using a 56k modem

internet haute vitesse

.

56K

Page 40

hierarchy

HDSL

high bit-rate digital


subscriber line

HSDPA

high speed downlink


packet access

HIS

high speed Internet

)253 (

251

is a 3G mobile telephony protocol in the HSPA family with


up-link speeds up to 5.76 Mbit/s. The name HSUPA was
created by Nokia. The 3GPP does not support the name
'HSUPA', but instead uses the name Enhanced Uplink
(EUL).[1]

accs par paquets en


liaison montante haut
dbit


HSUPA .5.76Mbps HSPA
.
. UMTS

HSUPA

high speed uplink


packet access

The specifications for HSUPA are included in Universal


Mobile Telecommunications System Release 6 standard
published by 3GPP. "The technical purpose of the
Enhanced Uplink feature is to improve the performance of
uplink dedicated transport channels, i.e. to increase
capacity and throughput and reduce delay
cble fibre optique de
haute capacit
a computer that provides client stations with access to files hte
and printers as shared resources to a computer network
251

A web hosting service is a type of Internet hosting service


hbergement
that allows individuals and organizations to make their own
website accessible via the World Wide Web. Web hosts are
companies that provide space on a server they own or
lease for use by their clients as well as providing Internet
connectivity, typically in a data center. Web hosts can also
provide data center space and connectivity to the Internet
for servers they do not own to be located in their data
center, called colocation.

251

is a service that runs Internet servers, allowing


organizations and individuals to serve content to the
Internet. There are various levels of service and various
kinds of services offered.

50

service d'hbergement

50

point d'accs sans fil ;


tache lumineuse
serveur HTTP

50

couche concentratrice

.www




.


.


.
.

HTML HTTP
.

.
:

.

Page 41

high-capacity fiber
cable
host

hosting

hosting services

hotspot
HTTP server

hub layer

)253 (

251
50

50

300

is the predominant markup language for web pages. It


langage HTML
provides a means to create structured documents by
denoting structural semantics for text such as headings,
paragraphs, lists etc as well as for links, quotes, and other
items. It allows images and objects to be embedded and
can be used to create interactive forms. It is written in the
form of HTML elements consisting of "tags" surrounded by
angle brackets within the web page content. It can include
or can load scripts in languages such as JavaScript which
affect the behavior of HTML processors like Web browsers;
and Cascading Style Sheets (CSS) to define the appearance
and layout of text and other material. The W3C, maintainer
of both HTML and CSS standards, encourages the use of
CSS over explicit presentational markup
protocole HTTP

points d'accs bases sur


les TICs pour les
communauts
dfavorises
indice de diffusion de
Technologies
d'information et de
communication
indice de Technologie
d'Information et de
Communication
is the result of the merger
indice d'opportunit de
of two well-known projects, ITUs Digital Access Index
technologies
)DAI(2 and Orbicoms Digital Divide Index. ICT Opportunity d'information et de
Index so as
communication
to measure access to and usage of ICT by individuals
and households in its inclusive sense
an online
partenariat par les
forum in which feedback and comments about
Technologies
programmes, project proposals and funding opportunities
d'Information et de
can
Communication en ligne
be presented and solicited
Dpartement de
promotion de
Technologies
d'Information et de
Communication
(Jordanie)
has been developed to assist in the development of
carte de route pour les
security standards by bringing together information about
standards de scurit de
existing standards and current standards work in key
TICs
standards development organizations.

.

.

HTML .
.
SGML .
.

HTML

hypertext markup
language

/
HTML .
FTP
.

HTTP

hypertext transfer
protocol

UNCTAD
.



2005 ITU

.
:
Orbicom

ICT access points for


disadvantaged
communities
ict diffusion index

ict index

ict opportunity index

IPO

ict partnership online

ICT Promotion
Department, Jordan

ICT security standards


roadmap

Page 42

)253 (

300

It is intended to provide a Single Point of Contact ("SPOC") centre de services de


to meet the communications needs of both Users and IT
support pour les TICs
and to satisfy both Customer and IT Provider objectives

Measurement descriptions used to verify the impact or the


achievement of the project goal. Indicators must be
quantifiable and documented. Impact indicators include
target numbers and tracking systems. As of FY 2008, ANA
requires three impact indicators per project. Impact
indicators are separate from the results and benefits
section of the OWP

.
.
.

indicateurs d'impact

divulgation accidentelle
d'informations
300

300

Business : are programs designed to accelerate the


ppinire d'entreprises
successful development of entrepreneurial companies
through an array of business support resources and
services, developed and orchestrated by incubator
management and offered both in the incubator and
through its network of contacts. Incubators vary in the way
they deliver their services, in their organizational structure,
and in the types of clients they serve. Successful
completion of a business incubation program increases the
likelihood that a start-up company will stay in business for
the long term: Historically, 87% of incubator graduates
stay in business.[
entreprise incube
a numerical scale used to compare variables with one
indice
another or with some reference number
is a measure of performance.[1] Such measures are
indicateurs
commonly used to help an organization define and evaluate d'accomplissement
how successful it is, typically in terms of making progress
towards its long-term organizational goals[2]. KPIs can be
specified by answering the question, "What is really
important to different stakeholders?". KPIs may be
monitored using Business Intelligence techniques to assess
the present state of the business and to assist in
prescribing a course of action. The act of monitoring KPIs
in real-time is known as business activity monitoring (BAM
Mathematical induction is a method of mathematical proof
typically used to establish that a given statement is true of
all natural numbe

induction






.
.

" "

.

.
:


Page 43

ICT service desk


support

impact indicators

inadvertent disclosure

Incubator

incubee
index
indicator of
achievement

induction

)253 (

251

is a geographic concentration of interconnected businesses, grappe industrielle


suppliers, and associated institutions in a particular field.
Clusters are considered to increase the productivity with
which companies can compete, nationally and globally. In
urban study, the term agglomeration is used. This term
industry cluster, also known as a business cluster,
competitive cluster, or Porterian cluster, was introduced
and the term cluster popularized by Michael Porter in The
Competitive Advantage of Nations (1990). The importance
of economic geography, or more correctly geographical
economics, was also brought to attention by Paul Krugman
in Geography and Trade (1991). Cluster development has
since become a focus for many government programs. The
underlying concept, which economists have referred to as
agglomeration economies, dates back to 1890, and the
work of Alfred Marshall.


.

1990 .
.

) (

251

is "the study, design, development, implementation,


technologies
support or management of computer-based information
d'information et de
systems, particularly software applications and computer
communication
hardware."[1] IT deals with the use of electronic computers
and computer software to convert, store, protect, process,
transmit, and securely retrieve information

300

The Information and Communication Technology Division


(ICTD) aspires to play a major role with ESCWA member
countries in their transformation toward knowledge-based
society and global competitiveness in the market, while
striving to increase employment, reduce poverty and
enhance quality of life through state-of-the-art ICTs and
their applications.

ICTD

Information and
Communication
Technology Division

IKM

information and
knowledge
management

300
Knowledge Management )KM( is the set of professional
practices which improves the capabilities of the
organizations human resources and enhances their ability
to share what they know.

251

is a special program of the World Bank and many other


international development agencies focusing on how the
use of information and communication technologies (ICTs)
can help to combat poverty and promote opportunity,
empowerment and economic growth in developing
countries, a field of activity often referred to as 'ICT for
Development', or ICT4D for short

dpartement de
technologies
d'information et de
communication

gestion de l'information
et du savoir

capacit porter des


informations
information pour le
programme de
dveloppement


)(

Page 44

industrial clusters

ICT

InfoDev

information and
communication
technology

information carrying
capacity
Information for
Development
Programme

)253 (

251

251

300

is a society in which the manipulation of information is a


socit d'information
significant and sometimes measured amount of personal
activity. is a society in which the creation, distribution,
diffusion, use, integration and manipulation of information
is a significant economic, political, and cultural activity. The
knowledge economy is its economic counterpart whereby
wealth is created through the economic exploitation of
understanding. People that have the means to partake in
this form of society are sometimes called digital citizens. As
Beniger[1] shows, this is one of many dozen labels that
have been identified to suggest that we are entering a new
phase of society

.

.

.

portail de la socit
d'Information pour la
rgion d'ESCWA


) (

taxonomie
d'informations

technologie
d'information

2000

.




100 .


)(

the science of classification according to a pre-determined


system, with the resulting catalog used to provide a
conceptual framework for discussion, analysis, or
information retrieval
Information technology (IT), as defined by the Information
Technology Association of America (ITAA), is "the study,
design, development, implementation, support or
management of computer-based information systems,
particularly software applications and computer
hardware."[1] IT deals with the use of electronic computers
and computer software to convert, store, protect, process,
transmit, and securely retrieve information

is an Information and Communications Technology (ICT)


association de
industry-support association founded in 2000 with the aim technologie
of improving the dynamics of Jordan's ICT market and
d'information
developing the Kingdom's ICT related activities.
Membership is open to all companies operating in Jordan in
the fields of software development, support, application,
telecommunications, value-added assembly and distribution
of ICT products and services, and is also open to the
suppliers and users of these industries, along with
universities and other parties supporting ICT training and
promotion. The Association began with 53 members in
2000, ranging from the largest software developer to many
smaller start-up companies, and now boasts a number of
over 109 partners.

Page 45

information society

ISPER

information society
portal for the ESCWA
region

information taxonomy

IT

int@j

information technology

Information
Technology
Association, Jordan

)253 (

autorit de technologie
d'information d'Oman

300

is the Egyptian business partner making sure that you get


all the help you need. We are primarily concerned with
building the capacities of the local IT companies, attracting
and servicing multi-national IT companies, and growing a
qualified, sustainable, and deployable talent pool. ITIDA
adheres to a Public-Private Partnership mode to achieve
the goals of the IT industry and create for you a business
environment where cooperation is a salient feature.ITIDA is
the executive IT arm of the Ministry of Communications
and Information Technology, MCIT, and is located in the
heart of a modern business environment at the Smart
Village

agence de
dveloppement
industriel des
technologies
d'information

a violation of the rights secured by a copyright


251

251

251

contrefaon de la
proprit littraire
is a new way of doing something or "new stuff that is made innovation
useful"[1]. It may refer to incremental and emergent or
radical and revolutionary changes in thinking, products,
processes, or organizations
a Latin phrase meaning in the place. In the aerospace
in situ
industry, equipment on board aircraft must be tested in
situ, or in place, to confirm everything functions properly as
a system. Individually, each piece may work but
interference from nearby equipment may create problems
not anticipated. Special test equipment is available for this
in situ testing.
is a form of real-time communication between two or more
people based on typed text. The text is conveyed via
devices connected over a network such as the Internet

messagerie instantane

is an international non-profit, professional organization for


the advancement of technology related to electricity. It has
the most members of any technical professional
organization in the world, with more than 395,000
members in around 150 countries.

Institut d'Ingnieurs
Electriciens et
Electroniciens

IP3 provides training and consulting services on the


requisite legal, regulatory, financial, managerial, technical,
and institutional requirements for successful
program/project design, implementation, and monitoring.

Institut de Partenariat
entre le secteur public et
prive


.


.

.

Information
Technology Authority,
Oman

ITIDA

Information
Technology Industry
Development
Authority, Egypt

infringement of
copyright
innovation

." "
) (
.
.

) (


.
.


.
395000
150

IEEE

Institute of Electrical
and Electronic
Engineers

1994
.

IP3

Institute of Public
Private Partnerships

Page 46

in-situ

IM

instant messaging

)253 (

is a collective set of facts, concepts, experiences and know- mmoire institutionnelle


how held by a group of people As it transcends the
individual, it requires the ongoing transmission of these
memories between members of this group. Elements of
institutional memory may be found in corporations,
professional groups, government bodies, religious groups,
academic collaborations and by extension in entire cultures


.
.
.

251

is a set of communications standards enabling traditional


rseau numrique
telephone lines to carry voice, digital network services, and intgration de services
video. Prior to ISDN, the phone system was viewed as a
way to transport voice, with some special services available
for data. The key feature of the ISDN is that it integrates
speech and data on the same lines, adding features that
were not available in the classic telephone system. There
are several kinds of access interfaces to ISDN defined as
basic rate interface (BRI), primary rate interface (PRI) and
broadband ISDN (B-ISDN


.

.
.

PRI
BRI
.B-ISDN

300

In ICANN, it is one of the seven constituencies of the


Generic Names Supporting Organization (GNSO) charged
with the responsibility of advising the ICANN Board on
policy issues relating to the management of the domain
name system
is a number of distinct types of legal monopolies over
creations of the mind, both artistic and commercial, and
the corresponding fields of law.[1] Under intellectual
property law, owners are granted certain exclusive rights to
a variety of intangible assets, such as musical, literary, and
artistic works; discoveries and inventions; and words,
phrases, symbols, and designs. Common types of
intellectual property include copyrights, trademarks,
patents, industrial design rights and trade secrets in some
jurisdictions

circonscription de
proprit intellectuelle

ICANN

IPC

intellectual property
constituency

droits de proprit
intellectuelle


.

.
.

IPR

intellectual property
rights

NA

des liaisons fibre


optique
interactif

/

.
.

251

50

Page 47

institutional memory

ISDN

integrated services
digital network

inter- exchange fiber


optical links
interactive

)253 (

251

50

251

describes a number of techniques that allow viewers to


Tl interactive
interact with television content as they view it. Interactive
television represents a continuum from low interactivity (TV
on/off, volume, changing channels) to moderate
interactivity (simple movies on demand without player
controls) and high interactivity in which, for example, an
audience member affects the program being watched. The
most obvious example of this would be any kind of realtime voting on the screen, in which audience votes create
decisions that are reflected in how the show continues. A
return path to the program provider is not necessary to
have an interactive program experience. Once a movie is
downloaded for example, controls may all be local. The link
was needed to download the program, but texts and
software which can be executed locally at the set-top box
or IRD (Integrated Receiver Decoder) may occur
automatically, once the viewer enters the channel


.


.


.

is a technology that allows a computer to detect voice and


dual-tone multi-frequency signaling (DTMF) keypad inputs.
IVR technology is used extensively in telecommunication,
but is also being introduced into automobile systems for
hands-free operation

interface

:
: .

: ) (.
.

interference is anything which alters, modifies, or disrupts


a signal as it travels along a channel between a source and
a receiver. The term typically refers to the addition of
unwanted signals to a useful signal

interfrence

is one of five institutions that comprise the World Bank


Group. The IBRD is an international organization whose
original mission was to finance the reconstruction of
nations devastated by World War II. Now, its mission has
expanded to fight poverty by means of financing states. Its
operation is maintained through payments as regulated by
member states. It came into existence on December 27,
1945 following international ratification of the agreements
reached at the United Nations Monetary and Financial
Conference of July 1 to July 22, 1944 in Bretton Woods,
New Hampshire.

Banque internationale
pour la reconstruction et
le dveloppement

.

.
.
.1945

Page 48

interactive TV

IVR

interactive voice
response

interface

interference

IBRD

International Bank for


Reconstruction and
Development

)253 (

300

251

A carrier authorized to provide telecommunications services Tl-communicateurs


outside World Zone 1 using the international dialing plan;
internationaux
however, the carrier has the option of providing service to
World Zone 1 points outside the forty-eight contiguous
states of the United States
centre international des
recherches en
Agriculture dans les
zones sches

is the largest, most representative business organization in chambre de commerce


the world. Its hundreds of thousands of member
internationale
companies in over 130 countries have interests spanning
every sector of private enterprise. A world network of
national committees keeps the ICC International Secretariat
in Paris informed about national and regional business
priorities. More than 2,000 experts drawn from ICCs
member companies feed their knowledge and experience
into crafting the ICC stance on specific business issues.

international carriers





.
) CGIAR(
.

.
:


)FAO(
)IDRC(
)IFAD(

) (

)UNEP( )UNDP(
)USAID(



) (

ICARDA

ICC

Page 49

International Center
for Agricultural
Research in the Dry
Areas

International Chamber
of Commerce

)253 (

251

is a computer literacy certification programme provided by License internationale


the Dublin-based non-profit European Computer Driving
de conduite
Licence Foundation.
d'ordinateurs
In 2001, the certification programme was recommended by
the European Commission High Level Group ESDIS to be a
Europe-wide certification scheme. The foundation seeks to
make its certification a world-wide standard in computer
literacy. In addition, this project receives funding and is
indirectly supported by the European Commission through
ESPRIT and the Leonardo da Vinci programme. Foundation
claims the certification is recognised and supported by
governments, computer societies, international
organisations and commercial corporations

Founded in 1931 to promote international scientific activity


in the different branches of science and its application for
the benefit of humanity, the International Council for
Science (ICSU) is one of the oldest non-governmental
organizations in the world
is the worlds largest international police organization, with
188 member countries. Created in 1923, it facilitates crossborder police co-operation, and supports and assists all
organizations, authorities and services whose mission is to
prevent or combat international crime

.2001


conseil international des


Sciences

1931
.
) )

organisation
internationale de police
criminelle

. 188
1923

ICDL

International
Computer Driving
License

International Council
for Science

Interpol

International Criminal
Police Organization

251

is a not-for-profit, non-governmental international


commissariat
standards organization that prepares and publishes
international de
International Standards for all electrical, electronic and
l'Electrotechnique
related technologies collectively known as
"electrotechnology". IEC standards cover a vast range of
technologies from power generation, transmission and
distribution to home appliances and office equipment,
semiconductors, fibre optics, batteries, solar energy,
nanotechnology and marine energy as well as many others.
The IEC also manages three global conformity assessment
systems that certify whether equipment, system or
components conform to its International Standards


.




.

IEC

International
Electrotechnical
Commission

251

promotes sustainable private sector investment in


developing countries as a way to reduce poverty and
improve people's lives.IFC is a member of the World Bank
Group and is headquartered in Washington, DC. It shares
the primary objective of all World Bank Group institutions:
to improve the quality of the lives of people in its
developing member countries. Established in 1956, IFC is
the largest multilateral source of loan and equity financing
for private sector projects in the developing world.


.

.) (
.

1956
.

IFC

International Finance
Corporation

socit de financement
internationale

Page 50

)253 (

251

251

251

An International Gateway is a telephone number through


which calls are routed to get cheaper rates on international
long distance charges, [1] or to make calls through voice
over IP (VOIP) networks internationally. They also are
effective in making an international call into the United
States appear as if it is originating from a local number
rather than the real location

passerelles
internationales


.
.

is a non-profit foundation that specialises in information


and communication technology (ICT) as a tool for
development.IICD creates practical and sustainable
solutions using both modern media (such as computers,
Internet, email and multimedia) and traditional media
(such as radio and television) to connect people and enable
them to benefit from ICT,
The International Intellectual Property Alliance (IIPA),
formed in 1984, is a private sector coalition of seven trade
associations representing U.S. producers of content and
materials protected by copyright laws, including computer
software, films, television programs, music, books and
journals (in both electronic and print media), with the aim
of strengthening international protection and enforcement
of copyright by working with U.S. government, foreign
government and private sector representatives.

institut international de
communication et de
dveloppement

is the contracted capacity of international connections


between countries for transmitting Internet traffic.



(
) ( )

IICD

International Institute
for Communication and
Development

alliance internationale
de proprit
intellectuelle

7 1984


.
.

IIPA

International
Intellectual Property
Alliance

bande passante de
l'Internet international

The ILO was founded in 1919, in the wake of a destructive organisation de travail
war, to pursue a vision based on the premise that
internationale
universal, lasting peace can be established only if it is
based upon decent treatment of working people. The ILO
became the first specialized agency of the UN in 1946. Its
main aims are to promote rights at work, encourage decent
employment opportunities, enhance social protection and
strengthen dialogue in handling work-related issues.

1919
.
.1946


ILO

International Labour
Organization


1947 .
. .


.

ISO

International
Organization for
Standardization

is an international-standard-setting body composed of


representatives from various national standards
organizations. Founded on 23 February 1947, the
organization promulgates worldwide proprietary industrial
and commercial standards. It has its headquarters in
Geneva, Switzerland.[1] While ISO defines itself as a nongovernmental organization, its ability to set standards that
often become law, either through treaties or national
standards, makes it more powerful than most nongovernmental organizations.[citation needed] In practice,
ISO acts as a consortium with strong links to governments

Organisation
internationale de
normalisation

Page 51

international gateways

international Internet
bandwidth

)253 (

251

251

In wireless telecommunications, roaming is a general term services d'itinrance


that refers to the extending of connectivity service in a
internationaux
location that is different from the home location where the
service was registered. Internation roaming is type of
roaming refers to the ability to move to a foreign service
provider's network. It is, consequently, of particular interest
to international tourists and business travellers.
international roaming is easiest using the GSM standard, as
it is used by over 80% of the world's mobile operators.
However, even then, there may be problems, since
countries have allocated different frequency bands for GSM
communications (there are two groups of countries: most
GSM countries use 900/1800 MHz, but the United States
and some other countries in the Americas have allocated
850/1900 MHz): for a phone to work in a country with a
different frequency allocation, it must support one or both
of that country's frequencies, and thus be tri or quad band.




.
.
.

.

international roaming
services

organisation de
commerce lectronique
scurise

ISETO

is the eldest organization in the UN family still in existence. Union internationale de


It was founded as the International Telegraph Union in
Tlcommunication
Paris on 17 May 1865 and is today the leading United
Nations agency for information and communication
technology issues, and the global focal point for
governments and the private sector in developing networks
and services. For nearly 145 years, ITU has coordinated the
shared global use of the radio spectrum, promoted
international cooperation in assigning satellite orbits,
worked to improve telecommunication infrastructure in the
developing world, established the worldwide standards that
foster seamless interconnection of a vast range of
communications systems and addressed the global
challenges of our times, such as mitigating climate change
and strengthening cybersecurity


.
. 1865




ITU

Page 52

International Safe
Electronic Trading
Organization
International
Telecommunication
Union

)253 (

300
,251

A .com or .net domain name that is represented in nonnoms de domaines


English characters and symbols, with .com and .net
internationalises
appended at the end in English letters. IDN names are
encoded in Unicode and display in their native language
such as Chinese, Japanese or Korean. When entered into a
Web browser or other application for name resolution by
the DNS system, the Unicode is converted into ASCII
Compatible Encoding (ACE), also known as "Punycode."
The Punycode is an ASCII representation of the Unicode
characters and symbols. An internationalized domain name
(IDN) is an Internet domain name that contains at least
one label that is displayed in software applications, in
whole or in part, in a language-specific script or alphabet,
such as Chinese, Russian or the Latin-based languages with
diacritics, such as French. These writing systems are
encoded by computers in multi-byte Unicode.
Internationalized domain names are stored in the Domain
Name System as ASCII strings using Punycode
transcription.


.com. net.
( unicode
.)
DNS
.ACE

.
.Unicode

. Punycode

IDN

internationalized
domain name

251

Internationalizing Domain Names in Applications (IDNA) is noms de domaines


a mechanism defined in 2003 for handling internationalized internationalises dans
domain names containing non-ASCII characters. While
les applications
much of the Domain Name System can technically support
non-ASCII characters, applications such as e-mail and web
browsers restrict domain names to what can be used as a
hostname. Rather than redesigning the existing DNS
infrastructure, it was decided that non-ASCII domain
names should be converted to a suitable ASCII-based form
by web browsers and other user applications; IDNA
specifies how this conversion is to be done.

2003
.


.

IDNA .
.

IDNA

internationalized
domain names in
applications

tarif d'accs l'Internet

50

autorit pour assigner


les noms d'Internet

.


.
.
IP

Page 53

Internet access tariff

IANA

Internet Assigned
Number Authority

)253 (

251

was a speculative bubble covering roughly 19982000


(with a climax on March 10, 2000 with the NASDAQ
peaking at 5132.52) during which stock markets in
industrialized nations saw their equity value rise rapidly
from growth in the more recent Internet sector and related
fields. While the latter part was a boom and bust cycle, the
Internet boom sometimes is meant to refer to the steady
commercial growth of the Internet with the advent of the
world wide web as exemplified by the first release of the
Mosaic web browser in 1993 and continuing through the
1990s.
is one of the core protocols of the Internet Protocol Suite.
It is chiefly used by networked computers' operating
systems to send error messagesindicating, for instance,
that a requested service is not available or that a host or
router could not be reached

bulle d'internet

protocole Internet de
contrle de messages

2000 1998

.

.www

.


.

251

Headquartered in Marina Del Rey, California, United States, socit d'internet pour
ICANN is a non-profit corporation that was created on
l'allocation des noms et
September 18, 1998 and incorporated September 30,
des nombres
1998[1] in order to oversee a number of Internet-related
tasks previously performed directly on behalf of the U.S.
government by other organizations, notably the Internet
Assigned Numbers Authority (IANA).ICANN's tasks include
responsibility for Internet Protocol (IP) address space
allocation, protocol identifier assignment, generic (gTLD)
and country code (ccTLD) top-level domain name system
management, and root server system management
functions. More generically, ICANN is responsible for
managing the assignment of domain names and IP
addresses. To date, much of its work has concerned the
introduction of new generic top-level domains (TLDs). The
technical work of ICANN is referred to as the IANA function.

.) (
1998



.IANA

.


.IP

251

develops and promotes Internet standards, cooperating


closely with the W3C and ISO/IEC standard bodies and
dealing in particular with standards of the TCP/IP and
Internet protocol suite. It is an open standards
organization, with no formal membership or membership
requirements. All participants and managers are
volunteers, though their work is usually funded by their
employers or sponsors; for instance, the current
chairperson is funded by VeriSign and the U.S.
government's National Security Agency.[1]


.ISO/IEC W3C

.TCP/IP


. VeriSign

groupe de travail de
l'ingnierie d'Internet

interconnexion Internet

" "

Page 54

Internet bubble

ICMP

Internet control
message protocol

ICANN

Internet Corporation
for Assigned Names
and Numbers

IETF

Internet Engineering
task Force

Internet exchange

)253 (

251

is a physical infrastructure through which Internet service


providers (ISPs) exchange Internet traffic between their
networks (autonomous systems). IXPs reduce the portion
of an ISP's traffic which must be delivered via their
upstream transit providers, thereby reducing the average
per-bit delivery cost of their service. Furthermore, the
increased number of paths learned through the IXP
improves routing efficiency and fault-tolerance.

50

251

In computer networking, a network host, Internet host,


host, or Internet node is a computer connected to the
Internet - or more generically - to any type of data
network. A network host can host information resources as
well as application software for providing network services.

point d'interconnexion
Internet


.



.

navigateur web

1995
.Macintosh Windows

ActiveX
.Java

hbergement internet


.


.
.

.IPSec
-Diffie
.Hellman

IXP

Internet exchange
point

Internet explorer

Internet host

Every Internet host has one or more IP addresses uniquely


assigned to the host. The addresses are assigned either
manually by the computer administrator, or automatically
at start-up by means of the Dynamic Host Configuration
Protocol (DHCP).
An Internet host is a computer connected directly to the
hte Internet par
Internet; normally an Internet Service Provider's (ISP)
individu
computer is a host. Internet users may use either a hardwired terminal, at an institution with a mainframe computer
connected directly to the Internet, or may connect remotely
by way of a modem via telephone line, cable, or satellite to
the Internet Service Provider's host computer. The number
of hosts is one indicator of the extent of Internet
connectivity. Per capita figures expressed per million
population
251

is the protocol used to set up a security association (SA) in


the IPsec protocol suite. IKE uses a Diffie-Hellman key
exchange to set up a shared session secret, from which
cryptographic keys are derived. Public key techniques or,
alternatively, a pre-shared key, are used to mutually
authenticate the communicating parties

change de cls sur


internet

Page 55

Internet hosts per


capita

IKE

Internet key exchange

)253 (

251

250,
50

An Internet point of presence is an access point to the


point de prsence sur
Internet. It is a physical location that houses servers,
Internet
routers, ATM switches and digital/analog call aggregators.
It may be either part of the facilities of a
telecommunications provider that the Internet service
provider (ISP) rents or a location separate from the
telecommunications provider. ISPs typically have multiple
POPs, sometimes numbering in the thousands. POPs are
also located at Internet exchange points and colocation
centres.
<networking> (IP) The network layer for the TCP/IP
protocole d'Internet
protocol suite widely used on Ethernet networks, defined in
STD 5, RFC 791. IP is a connectionless, best-effort packet
switching protocol. It provides packet routing,
fragmentation and re-assembly through the data link layer.
IPv4 is the version in widespread use and IPv6 is just
beginning to come into use in 2000.

251

is a system through which digital television service is


tlvision base de
delivered using the architecture and networking methods of protocole d'Internet
the Internet Protocol Suite over a packet-switched network
infrastructure, e.g., the Internet and broadband Internet
access networks, instead of being delivered through
traditional radio frequency broadcast, satellite signal, and
cable television (CATV) formats. IPTV services may be
classified into three main groups: live television, timeshifted programming, and content (or video) on demand. It
is distinguished from general Internet-based or web-based
multimedia services by its on-going standardization process
(e.g., ETSI) and preferential deployment scenarios in
subscriber-based telecommunications networks with highspeed access channels into end-user premises via set-top
boxes or other customer-premises equipment.

251

is the next-generation Internet Protocol version designated


as the successor to IPv4, the first implementation used in
the Internet and still in dominant use currently[update]. It
is an Internet Layer protocol for packet-switched
internetworks. The main driving force for the redesign of
Internet Protocol was the foreseeable IPv4 address
exhaustion.IPv6 has a vastly larger address space than
IPv4. This results from the use of a 128-bit address,
whereas IPv4 uses only 32 bits. The new address space
thus supports 2128 (about 3.41038) addresses. This
expansion provides flexibility in allocating addresses and
routing traffic and eliminates the primary need for network
address translation (NAT), which gained widespread
deployment as an effort to alleviate IPv4 address
exhaustion

protocole d'Internet
version 6

.
.
POP
.

TCP/IP


.
TCP/IP .ISO/OSI

.RFC791

Internet point of
presence

IP

Internet protocol



.
: 3 IPTV
.

IP TV

Internet protocol
television



IPv4
.
128
. 32 IPv4

NAT
.IPv4


)(

IPv6

Internet protocol
version 6

Page 56

)253 (

service de bavardage
IRC

protocole de gestion de
cls et association de
scurit sur Internet



) (

50

fournisseur de services
d'internet


.

.

50

socit d'Internet


.
.
INET
.
1994
.
. 2004

)ftp.isc.org ( usenet
.

251

s a protocol for establishing Security Associations (SA) and


cryptographic keys in an Internet environment.ISAKMP
defines the procedures for authenticating a communicating
peer, creation and management of Security Associations,
key generation techniques, and threat mitigation (e.g.
denial of service and replay attacks).

251

ISC was founded in 1994 as Internet Software Consortium consortium de systmes


to develop and support a number of Internet software
d'Internet
reference implementations. In January 2004 the original
ISC's projects, assets and staff were transferred to Internet
Systems Consortium, Inc. ISC maintains and publishes (on
ftp.isc.org) the central Usenet moderators list and relays for
moderated groups so individual server operators don't have
to track moderator changes.

250

A server process running at a web site which sends out


web pages in response to HTTP requests from remote
browsers.
refers to the gap between people with effective access to
digital and information technology and those with very
limited or no access at all. It includes the imbalances in
physical access to technology as well as the imbalances in
resources and skills needed to effectively participate as a
digital citizen. In other words, it is the unequal access by
some members of society to information and
communication technology, and the unequal acquisition of
related skills

serveur web de l'Internet

foss numrique interne

is a device (or application) that monitors network and/or


systme de dtection
system activities for malicious activities or policy violations d'intrusion
and produces reports to a Management Station. Intrusion
detection is the process of monitoring the events occurring
in a computer system or network and analyzing them for
signs of possible incidents, which are violations or imminent
threats of violation of computer security policies,
acceptable use policies, or standard security practices


HTTP


.) (

.

.

/ ) (

.


.

Page 57

IRC

ISAKMP

Internet relay chat

Internet security
association key
management protocol

ISP

Internet service
provider

ISOC

Internet society

ISC

Internet systems
consortium

Internet web server

intra-digital divide

IDS

intrusion detection
system

)253 (

50

adresse IP

251

Multicast addressing is a network technology for the


multidiffusion vido par
delivery of information to a group of destinations
le protocole d'Internet
simultaneously using the most efficient strategy to deliver
the messages over each link of the network only once,
creating copies only when the links to the multiple
destinations split. The word "multicast" is typically used to
refer to IP multicast which is often employed for streaming
media and Internet television applications. In IP multicast
the implementation of the multicast concept occurs at the
IP routing level, where routers create optimal distribution
paths for datagrams sent to a multicast destination address
spanning tree in real-time. At the Data Link Layer, multicast
describes one-to-many distribution such as Ethernet
multicast addressing, Asynchronous Transfer Mode (ATM)
point-to-multipoint virtual circuits or Infiniband multicast.

251

is an architectural framework for delivering Internet


Protocol (IP) multimedia services. It was originally
designed by the wireless standards body 3rd Generation
Partnership Project (3GPP), as a part of the vision for
evolving mobile networks beyond GSM. Its original
formulation (3GPP R5) represented an approach to
delivering "Internet services" over GPRS. This vision was
later updated by 3GPP, 3GPP2 and TISPAN by requiring
support of networks other than GPRS, such as Wireless
LAN, CDMA2000 and fixed line.

sous-systme
multimdia IP

An IP phone uses Voice over IP technologies allowing


telephone calls to be made over an IP network such as the
internet instead of the ordinary PSTN system. Calls can
traverse the Internet, or a private IP Network such as that
of a company. The phones use control protocols such as
Session Initiation Protocol, IP phones can be simple
software-based Softphones or purpose-built hardware
devices that appear much like an ordinary telephone or a
cordless phone. Ordinary PSTN phones are used as IP
phones with analog telephony adapters (ATA).

systme de tlphonie
base sur Internet

32

4 .
.127.0.0.1




.
.



.

3GPP
.GPRS


IP
.
.

.
.ATA IP

Page 58

IP address

IP multicast video
streams

IMS

IP multimedia
subsystem

IP-based telephone
system

)253 (

251

Internet transit consists of two bundled services:

transit sur IP

the advertisement of customer routes to other ISPs,


thereby soliciting inbound traffic towards the customer
from them
the advertisement of others ISPs routes (usually but not
necessarily in the form of a default route or a full set of
routes to all of the destinations on the Internet) to the
ISP's customer, thereby soliciting outbound traffic from the
customer towards these networks
251

251

IP-transit

is a government-owned and operated corporation


responsible for providing telecommunication and mail
services in Iraq.

compagnie iraquienne
des Tlcoms et de la
Poste

deliberate radiation or reflection of electromagnetic energy


for the purpose of disrupting enemy use of electronic
devices or systems
an independent governmental agency that coordinates
official development assistance (ODA) for the government
of Japan. It is commonly known by the acronym "JICA". It
is chartered with assisting economic and social growth in
developing countries, and the promotion of international
cooperation

brouillage intentionnel

agence japonaise de
coopration
internationale


. .

1986



.

centre communautaire
Jordanien de
technologie
d'information


.
.


.

JITCC

centre d'innovation de
Jordanie




)EJADA (


JIC

association jordanienne
informatique

300

:


.

initiative, targets the Jordanian population at large with the


objective of creating a national information network. The
initiative is launched jointly by the Jordanian Ministry of
Planning and the UNDP. It entails the establishment of
Information Technology Community Centres, referred to as
Knowledge Stations, throughout Jordan to create ICT
awareness, provide access and train Jordanians on new
age skills. The objectives are to bridge the digital divide
among various communities and enhance capacity building
for local community development while promoting
economic opportunities.

Page 59

ITPC

Iraqi
Telecommunication
and Post Company
jamming

JICA

Japan International
Cooperation Agency

Jordan Computer
Society

Jordan Information
Technology Community
Centres

Jordan Innovation
Centre

)253 (

300

251

institution jordanienne
de standards et de
mtrologie

:




.

enregistreur de frappe

keystroke logging


.
4
:

knowledge economy
index

.
.

The Knowledge Index is the average of the rankings of the indice du savoir
performance of a country or region in three areas of the socalled Knowledge Economy, namely, education, innovation
and information and communications technology.

comprises a range of strategies and practices used in an


organization to identify, create, represent, distribute, and
enable adoption of insights and experiences. Such insights
and experiences comprise knowledge, either embodied in
individuals or embedded in organizational processes or
practice
Knowledge Networks is the term given to different types of
team or social networks and communities that are
recognised, from a KM perspective, to add significant value
to the creation, dissemination and application of better
knowledge at a much faster rate.




.
.

.


is the practice of tracking (or logging) the keys struck on a


keyboard, typically in a covert manner so that the person
using the keyboard is unaware that their actions are being
monitored. There are numerous keylogging methods,
ranging from hardware and software-based to
electromagnetic and acoustic analysis.

The Knowledge Economy Index (KEI) takes into account


indice de l'conomie du
whether the environment is conducive for knowledge to be savoir
used effectively for economic development. It is an
aggregate index that represents the overall level of
development of a country or region towards the Knowledge
Economy. The KEI is calculated based on the average of
the normalized performance scores of a country or region
on all 4 pillars related to the knowledge economy economic incentive and institutional regime, education and
human resources, the innovation system and ICT
300

A hub is a centre of activity or interest or a focal point. A


knowledge hub, therefore, is a centre or focal point for the
exchange of knowledge, support, development and ideas.

concentrateurs du savoir

programme de gestion
de connaissance

rseaux de savoir

Page 60

JISM

Jordan Institution for


Standards and
Metrology

knowledge hub

knowledge index

knowledge
management
programme

knowledge network

)253 (

To empower poor and disadvantaged communities through portail du rseau de


transforming selected existing ICT access points into
savoir dans la rgion
knowledge hubs of global knowledge networks, providing, d'ESCWA
developing, organizing, sharing and disseminating
knowledge pertinent to these communities

is a technology park located 30 kilometres from Muscat and oasis de savoir de Muscat
30
10 minutes drive from Muscat International Airport. KOM

neighbours Rusayl Industrial Estate - the Sultanate's largest
.
industrial park - and Sultan Qaboos University. KOM-based

. 300
companies vary in size, with organisations employing
anything from two people to over 300. They all benefit

from a range of core facilities, as well as business support
.
from the Public Establishment for Industrial Estates, which
manages the park.

is an activity through which knowledge (i.e. information,


skills, or expertise) is exchanged among people, friends, or
members of a family, a community (e.g. Wikipedia) or an
organization.

Established in 1989 the Korean Institute of Criminology


(KIC) is the only national crime and criminal justice
research agency in the Republic of Korea. In 1999, as a
member of the Korean Research Council for Humanities
and Social Sciences, the KIC became an entity within the
Office of the Prime Minister.
300

partage de savoir

knowledge network
portal of the ESCWA
region

Knowledge Oasis, Oman

(
)
.

knowledge sharing

station de savoir

knowledge station

Institut Coren de
Criminologie Seoul

1989
1999 .
.


1982 7
7/3/1990 .
23 . KCS
2002
. KITS


socit Koweitienne de
technologie
d'information

Page 61

Korean Institute of
Criminology in Seoul

KITS

Kuwait Information
Technology Society

KISR

Kuwait Institute for


Scientific Research
(KISR)

)253 (

300

institut Koweitien pour


la recherche scientifique

.MPLS
MPLS IP

.MPLS
MPLS
.IP


MPLS

label switching path


MAC
. NIC
ASIC

layer 2 switching

.1945 .
. 4 22


.

251

is a router that operates at the edge of an MPLS


network.When forwarding IP datagrams into the MPLS
domain, it uses routing information to determine
appropriate labels to be affixed, labels the packet
accordingly, and then forwards the labelled packets into
the MPLS domain.Likewise, upon receiving a labelled
packet which is destined to exit the MPLS domain, the LER
strips off the label and forwards the resulting IP packet
using normal IP forwarding rules

routeur priphrique
d'tiquettes

300

The specific path through a network that a datagram


follows, based on its MPLS labels.

chemin de commutation
d'tiquettes

251

Layer 2 switching is hardware based, which means it uses


the media access control address (MAC address) from the
host's network interface cards (NICs) to decide where to
forward frames. Switches use application-specific
integrated circuits (ASICs) to build and maintain filter
tables (also known as MAC address tables). One way to
think of a layer 2 switch is as a multiport bridge.

commutation la
deuxime couche

the Transport Layer is a group of methods and protocols


couche de transport
within a layered architecture of network components within
which it is responsible for encapsulating application data
blocks into data units (datagrams, segments) suitable for
transfer to the network infrastructure for transmission to
the destination host, or managing the reverse transaction
by abstracting network datagrams and delivering their
payload to an application
251

is a regional organization of Arab states in Southwest Asia, ligue arabe


and North and Northeast Africa. It was formed in Cairo on
March 22, 1945 with six members: Egypt, Iraq,
Transjordan (renamed Jordan after 1946), Lebanon, Saudi
Arabia, and Syria. Yemen joined as a member on May 5,
1945. The Arab League currently has 22 members and four
observers. The main goal of the league is to "draw closer
the relations between member States and co-ordinate
collaboration between them, to safeguard their
independence and sovereignty, and to consider in a
general way the affairs and interests of the Arab countries

Page 62

label edge routers

layer transport

LAS

League of Arab States

)253 (

251

50

is a software application for the administration,


documentation, tracking, and reporting of training
programs, classroom and online events, e-learning
programs, and training content

systme de gestion de
l'apprentissage

ligne loue

on the 9th November 2002 Berytech, the first Lebanese


zone de haute
technologycal pole, was inaugurated. Berytech relies on the technologie de Bierut
lebanese poles of excellence, identifies the promotion of
the pole and market survey.environment and the
companies hosted on the site. It coordinates, within a
network of clearly identified competences, the functions of
economic animation, strategic sectors to promote, and
implements a synergy between a high level university

LMS

learning management
systems

leased lines

" "2002 BERYTECH Lebanese Incubator for


.

Technology and Health


.
(Berytech)

300

LIBNOR is a public institution attached to the Ministry of


Industry. It was established by a law dated 23/7/1962 as
the sole authority to issue, publish and amend Lebanese
standards and to give the right to use the Lebanese
Conformity Mark (NL Mark).National standards cover all
products falling within the agro-food, chemical,
construction, mechanical, electrotechnical and
electromechanical sectors

institution libanaise de
standards

1962 .

.

.

300

The use of a target company's asset value to finance the


debt incurred in acquiring the company.

fonds d'acquisition par


emprunt

251

In financial accounting, a liability is defined as an obligation passifs


of an entity arising from past transactions or events, the
settlement of which may result in the transfer or use of
assets, provision of services or other yielding of economic
benefits in the future
Etablissement Libyen de
Telecom et de
Technologie


-9-1 1997
1999

flux optiques

Page 63

LIBNOR

LBO

Lebanese Standards
Institution

leveraged buy-out
funds

liabilities

Libya Telecom and


Technology

light streams

)253 (

251

is an open consortium of universities, companies and


consortium de donnes
government research laboratories. It creates, collects and
linguistiques
distributes speech and text databases, lexicons, and other
resources for linguistics research and development
purposes. The University of Pennsylvania is the LDC's host
institution. The LDC was founded in 1992 with a grant from
the Advanced Research Projects Agency (ARPA), and is
partly supported by grant IRI-9528587 from the
Information and Intelligent Systems division of the National
Science Foundation

50

251

250 ,
50

systme d'exploitation
Linux

is a private, generally non-profit or not-for-profit


groupe d'utilisateurs
organization that provides support and/or education for
Linux
Linux users, particularly for inexperienced users. The term
commonly refers to local groups that meet in person, but is
also used to refer to online support groups that may have
members spread over a very wide area and which do not
organize, or which are not based around, physical
meetings. Similar organizations such as FreeBSD User
Group (BUG) exist, although many LUGs encompass
FreeBSD and other free Unix-based operating systems
<networking> (LAN) A data communications network
rseau local
which is geographically limited (typically to a 1 km radius)
allowing easy interconnection of terminals, microprocessors
and computers within adjacent buildings. Ethernet and
FDDI are examples of standard LANs.
Because the network is known to cover only a small area,
optimisations can be made in the network signal protocols
that permit data rates up to 100Mb/s.

251

is the regulatory process of allowing multiple


dgroupage de boucle
telecommunications operators to use connections from the locale
telephone exchange's central office to the customer's
premises. The physical wire connection between customer
and company is known as a "local loop", and it is owned by
the incumbent local exchange carrier (also referred to as
the "ILEC," "local exchange," or in the United States either
a "Baby Bell" or an Independent telephone company). To
increase competition, other providers are granted
unbundled access

.

.
1992
ARPA
NSF

Linus Torvalds
.

. utilities
GNU



.

.

LDC

linguistic data
consortium

Linux operating system

LUG

Linux user group

(
) 1
.
.100Mbps


.

. .

) (

LAN

local area network


.

. ()
.

LLU

local loop unbundling

Page 64

)253 (

Mux layer means L4 of the OSI Model "Transport Layer"


which one its main operations is Multiplexing port numbers
for Applications , as each application has unique port
number , so there're souce port number and destination
port number , this function of Multiplexing exist regardless
u use TCP or UDP
includes businesses involved in the development,
maintenance and publication of computer software using
any business model. The industry also includes software
services, such as training, documentation, and consulting

couche locale de
multiplexeurs primaires

industrie de gnie
logiciel locale


.

.

300

a telephone call made outside the local calling area.

appel interurbain

300

radio broadcasting or receiving on waves of 1000 metres or onde kilomtrique


more in length
used in the field of library science. consist of the MARC
catalogage lisible par
formats, which are standards for the representation and
ordinateur
communication of bibliographic and related information in
machine-readable form, and related documentation. It
defines a bibliographic data format that was developed by
Henriette Avram at the Library of Congress beginning in
the 1960s. It provides the protocol by which computers
exchange, use, and interpret bibliographic information. Its
data elements make up the foundation of most library
catalogs used today.The record structure of MARC is an
implementation of ISO 2709, also known as ANSI/NISO
Z39.2.[1] MARC records are composed of three elements:
the record structure, the content designation, and the data
content of the record. The record structure implements
national and international standards (e.g., Z39.2,
ISO2709). The content designation is "the codes and
conventions established to identify explicitly and
characterize ... data elements within a record"[1] and
support their manipulation. The content of data elements in
MARC records is defined by standards outside the formats
such as AACR2, L.C. Subject Headings, and MeSH.

1000

251

300
300

large-scale; overall: the analysis of social events at the


macro level. Often contrasted with micro.
a Dubai Media City-based company established in June
2002 to conduct primary and secondary B2B research on
the Knowledge Economy in the Middle East. To provide
companies in the region with vital e-market data and
analyses, giving them a competitive edge by improving
their eBusiness planning and hence decision-making and
business performance. Additionally, to attract new
international clients who -- due to lack of accurate
information -- are not committed to venture out in the
region.

niveau macro
groupe de recherche
Madar

OSI


.UDP TCP

.

.

.ISO2709

-
) (
()
2002
.

.

Page 65


)(

local primary mux layer

local software industry

LW
MARC

long distance
communication
long wave
machine readable
cataloguing

macro level
Madar Research Group

)253 (

300

251

251

is a computer program used to manage email. is a program agent de courrier de


that allows you to receive and send e-mail messages; it's
l'utilisateur
usually just called an e-mail program. To use an MUA such
as Eudora or Microsoft Outlook, you install the MUA
program on your computer and then use it to download
and store e-mail messages to your computer; it will also
allow you to read or write messages offline. Web-based
MUAs, such as Hotmail and Yahoo, store messages on their
own mail servers and allow access to them through a Web
page.
a signal distribution frame for connecting equipment (inside rpartiteur d'entre
plant) to cables and subscriber carrier equipment (outside
plant). The MDF is a termination point within the local
Telephone exchange where exchange equipment and
terminations of local loops are connected by jumper wires
at the MDF. All cable copper pairs supplying services
through user telephone lines are terminated at the MDF
and distributed through the MDF to equipment within the
local Exchange e.g. repeaters and DSLAM. Cables to
intermediate distribution frames terminate at the MDF.
Trunk cables may terminate on the same MDF or on a
separate Trunk Main Distribution Frame (TMDF

.
.

MUA

mail user agent


.) (
()
.jumpers

.

MDF

main distribution frame

Ensemble des appareils de tlcommunication qui sont


installs chez un abonn et qui sont connects au rseau
d'un fournisseur de services.

quipement arrange des


locaux d'abonn

is the practice of maintenance and care of health records


by traditional and electronic means in hospitals, physician's
office clinics, health departments, health insurance
companies, and other facilities that provide health care or
maintenance of health records. Health informatics and
health information technology are utilized in information
management

systme de gestion des


information de sante




.
.

is a subset of the overall internal controls of a business


covering the application of people, documents,
technologies, and procedures by management accountants
to solve business problems such as costing a product,
service or a business-wide strategy. Management
information systems are distinct from regular information
systems in that they are used to analyze other information
systems applied in operational activities in the
organization.[1] Academically, the term is commonly used
to refer to the group of information management methods
tied to the automation or support of human decision
making, e.g. Decision Support Systems, Expert systems,
and Executive information systems

systme d'information
de gestion

Page 66

M-CPE

managed customer
premises equipment

management health
information system

MIS

management
information system

)253 (

300

Business approach or philosophy that focuses on identifying orient vers le march


and meeting the stated or hidden needs or wants of the
customers, through its own or acquired products.

300

.S. private university in Cambridge, famous for its scientific


and technological training and research. Founded in 1861,
MIT has schools of architecture and planning, engineering,
humanities and social sciences, management (the Sloan
School), and science and a college of health sciences and
technology. Though it is best known for its programs in
engineering and the physical sciences, other areas such as
economics, political science, urban studies, linguistics, and
philosophy are also strong. Among its facilities are a
nuclear reactor, a computation centre, geophysical and
astrophysical observatories, a linear accelerator, a space
research centre, supersonic wind tunnels, an artificialintelligence laboratory, a centre for cognitive science, and
an international-studies centre.


1861 .

.

.


refers to a development model elicited from actual data.


niveau de maturit
The data were collected from organizations that contracted
with the U.S. Department of Defense, who funded the
research, and they became the foundation from which CMU
created the Software Engineering Institute (SEI). Maturity
Levels: a 5-Level process maturity continuum - where the
uppermost (5th) level is a notional ideal state where
processes would be systematically managed by a
combination of process optimization and continuous
process improvement


5 .Carnegie Mellon


.

A device that converts multimedia input into a backbone


network and vice versa. A media gateway can be an IP
gateway, a circuit switch (telephone switch) or a modem
bank


IP .

1000000

MHz

mega hertz


1048576
1048576

flash
.

. MP3

Mbps

megabit per second

institut de technologie
de Massachusetts

passerelle de media

mga hertz
mgabit par seconde

50

Mga Octets (MB)


A memory card or flash card is an electronic flash memory
data storage device used for storing digital contents. They
are commonly used in many electronic devices, including
digital cameras, mobile phones, laptop computers, MP3
players, and video game consoles. They are small, rerecordable, and they can retain data without power.

carte mmoire

Page 67

market-orientation

MIT

Massachusetts
Institute of Technology

maturity level

media gateway

MB

megabyte
memory card

)253 (

50

rseau mtropolitain


. 75 / 200

.

MAN

)(

metropolitan area
network

300

Very small or microscopic. Basic or small-scale

niveau micro

251

broadly refers to all Microsoft certifications. But it can also


refer to an individual who completes any exam within the
program (subject to some exclusions).

ingnieur de systme
certifi de Microsoft

A system in which micromechanisms are coupled with


microelectronics, most commonly fabricated as
microsensors or microactuators. Abbreviated MEMS. Also
known as microsystem
digital wireless transmission system that works in the 2.22.4 GHz range. It requires line of sight between transmitter
and receiver, which can be 30 or more miles apart. It was
designed initially as a one-way service for bringing cable
TV to subscribers in remote areas or in locations that are
difficult to install cable. MMDS supports approximately 33
analog channels and more than 100 digital channels of TV.
In late 1998, the FCC opened up the technology for twoway transmission, enabling MMDS to provide data and
Internet services to subscribers.

microsystmes et
processus en sciences

service de distribution
multipoints des
microondes

2.4 2.2
.GHz

. 30

.

MMDS

microwave multipoint
distribution service

.

.
.

MENA

middle east and north


africa

300

micro level
MCSE

microsoft certified
systems engineer

micro-system and
process in science

251

often used in academic and business writing. The term


moyen orient et Afrique
generally covers an extensive region, extending from
de nord
Morocco in northwest Africa to Iran in southwest Asia. It
generally includes all the Arab Middle East and North Africa
countries, as well as Cyprus, Iran, Israel and Turkey

300

a subscription-only weekly newsletter focusing on the


regions energy strategies and developments, within their
economic and political contexts. MEES charts trends in oil
and gas, and the industries that rely on them

enqute conomique du
moyen orient

MEES

middle east economic


survey

300

The ICT Fund has a determined mission to provide


targeted funding and advisory services to companies,
organisations and individuals to empower them to develop
the innovation and knowledge capital of the UAE ICT sector
with their research, education and entrepreneurship. The
Fund strives to promote a culture of entrepreneurship in
the UAE ICT sector and improve linkage between industry
and academia to ultimately promote the involvement of
UAE nationals in the realm of scientific and technology
research to foster self-reliance of the UAE in technology
creation and development

fond de dveloppement
de technologies
d'information et de
communication en
moyen orient




.

.

ICTDF

Middle East
Information and
Communication
Technology
Development Fund

Page 68

)253 (

300

In September 2000, the largest ever gathering of Heads of dclaration du millnium


State ushered in the new millennium by adopting the UN
Millennium Declaration. By adopting the original declaration
in 2000, world leaders affirmed their faith in the
Organisation and its Charter as indispensable foundations
of a more peaceful, prosperous and just world. The
Millennium Declaration, endorsed by 189 countries, was
then translated into a roadmap setting out eight Millennium
Development Goals (MDGs) to be reached by 2015

251

are eight international development goals that 192 United


Nations member states and at least 23 international
organizations have agreed to achieve by the year 2015.
They include reducing extreme poverty, reducing child
mortality rates, fighting disease epidemics such as AIDS,
and developing a global partnership for developmen

300

Million bit par second


(Mb/s)
ministre de
communication et de
technologie
d'information
Established in 2002, the Ministry of Information and
ministre de technologie
Communications Technology [MoICT] is at the heart of the d'information et de
Kingdom's transformation into a knowledge based economy communication
that contributes to the socio-economic development of the
Kingdom. MoICT is the policy maker of information
technology, telecommunications, and post in Jordan. The
ministrys policy calls for market liberalization, ending
monopoly and withdrawal of the government from its
majority ownership position in telecom & postal operators
and public-private partnerships

300

300

objectifs de
dveloppement de
Millnium

Ministre de Telecom et
d'Information en
Palestine

2000
.

189 .
2015 8

192
23
.2015



20^2

/


)(

MD

MDG

millennium declaration

millennium
development goal

Million bit per second


(Mb/s)
Ministry of
Communications and
Information
Technology, Egypt
Ministry of Information
and Communications
Technology, Jordan

2002


.




)(

:




.

Ministry of Telecom
and Information
Technology, Palestine

mobile cellular tariffs

tarif de tlphonie
portable

Page 69

)253 (

251

In the field of computational linguistics, a morphological


analyse morphologique
dictionary is a file that contains correspondences between
surface form and lexical forms of words. Surface forms of
words are those found in any text. The corresponding
lexical form of a surface form is the lemma followed by
grammatical information (for example the part of speech,
gender and number). In English houses is a surface form of
the noun house. The lexical form would be "house", noun,
plural. There are two kinds of morphological dictionaries:
aligned and non-aligned.

50

multidiffusion

300

NA

300

The Multilingual Internet Names Consortium (MINC) first


origins may be traced to a research project on multilingual
Internet domain name.The consortium may consists of
various organizations and qualified individuals such as
software companies, ISPs, regional organizations, TLD
administrators, user organizations, and public organizations.

nom de domaine
multilingue
consortium des noms
d'Internet multilingues


(
) - - -


.

: .


morphological analysis

multicast
MLDN
MINC

multilingual domain
name
Multilingual Internet
Names Consortium

The multilingual names covered at the consortium include


the following areas multilingual domain names, and
multilingual keywords.
The consortium's activity may include the following areas:

Coordination of research and development on multilingual


names,
Coordination on technical aspects of deployment of the
multilingual names,
Coordination with the relevant organizations
Coordination for standards development on multilingual
names
251

50

251

is a web page archive format used to bind resources that


are typically represented by external links (such as images,
Flash animations, Java applets, audio files) together with
HTML code into a single file

langage HTML
multilingue

is a government-owned institution responsible for the


management of the Multimedia Super Corridor (MSC
Malaysia) in Malaysia as a technology industry and
commerce zone.

socit de
dveloppement
multimdia

multimdia



(
. HTML )
:

"
"

Page 70

M-HTML

multilingual-HTML

multimedia

Multimedia
Development
Corporation

)253 (

251

251

300

250,
251

is a standard way to send messages that include


message multimdia
multimedia content to and from mobile phones. It extends
the core SMS (Short Message Service) capability which only
allowed exchange of text messages up to 160 characters in
length.
the Multimedia Super Corridor is a Government designated super corridor
zone, designed to leapfrog Malaysia into the information
multimdia
and knowledge age. It includes an area of approximately
15x50 km which stretches from the Petronas Twin Towers
to the Kuala Lumpur International Airport and also includes
the towns of Putrajaya and Cyberjaya.
is a device that performs multiplexing; it selects one of
multiplexeur
many analog or digital input signals and forwards the
selected input into a single line
Multipoint refers to a communication configuration in which multipoint
several terminals or stations are connected together.
Multipoint is a single communications channel to which two
or more stations or logical units are attached although only
one can transmit at a time. Such arrangements usually
require a polling mechanism under the control of a master
station to ensure that only one device transmits at a time
<networking> (MPLS) A packet switching protocol
developed by the IETF. Initially developed to improve
switching speed, other benefits are now seen as being
more important.

commutation multi
protocole par tiquette

MPLS adds a 32-bit label to each packet to improve


network efficiency and to enable routers to direct packets
along predefined routes in accordance with the required
quality of service. The label is added when the packet
enters the MPLS network, and is based on an analysis of
the packet header. The label contains information on the
route along which the packet may travel, and the
forwarding equivalence class (FEC) of the packet. Packets
with the same FEC are routed through the network in the
same way.

251

Routers make forwarding decisions based purely on the


contents of the label. This simplifies the work done by the
router, leading to an increase in speed. At each router, the
label is replaced with a new label, which tells the next
router how to forward the packet. The label is removed
when the packet leaves the MPLS network.
is an Internet standard that extends the format of e-mail to protocole Mime
support:
Text in character sets other than ASCII
Non-text attachments
Message bodies with multiple parts
Header information in non-ASCII character sets


SMS .
1760

MMS

multimedia messaging
service



.
.

MSC

multimedia super
corridor

MUX

multiplexer

.

.
) (

.
.

.

.

.
. SONET ATM
.IETF
.
32

.

.
.

Page 71

multipoint

MPLS

multi-protocol label
switching

MIME

multipurpose Internet
mail extensions

)253 (

300

251

300

251

MTCCs should be seen as means for the delivery of


literacy, educational and cultural programmes to local
populations in order to allow them real opportunities for
accessing decent work; and as way of providing support for
small and micro enterprises in the region allowing them
opportunities for competition, subsequent growth and the
ability to provide a wider range of employment
opportunities.
MSPs are about partnerships that are greater than the sum
of its parts and about creating lasting and meaningful
impact at all levels of action. They are meant to promote a
more holistic approach to development and better
governance.
is a device that combines multiple network voice and data
communications functions into a single device.[1] Targeted
at small and medium enterprises (SMEs), the MSBG
integrates critical functions such as routing, VoIP, and
security (virtual private networking, firewall, intrusion
detection/prevention) into a single fault-tolerant platform,
with a common control & management plane oriented
around services. An MSBG may also include functionality
such as web/e-mail server and filtering, storage, and
wireless networking

centre de communaut
multi-usage

MTCC

partenariat multisecteurs


.
.

MSP

passerelle multiservices


.

.

A mutual fund is a professionally managed type of


collective investment scheme that pools money from many
investors and invests it in stocks, bonds, short-term money
market instruments, and/or other securities.[1] The mutual
fund will have a fund manager that trades the pooled
money on a regular basis. The net proceeds or losses are
then typically distributed to the investors annually

fonds mutuels

a program or computer server that implements a nameservice protocol. It maps a human-recognizable identifier to
a system-internal, often numeric, identification or
addressing component
an American stock exchange. The full form is National
Association of Securities and Dealers Automated Quotation.
It is the largest electronic screen-based equity securities
trading market in the United States. With approximately
3,700 companies and corporations, it has more trading
volume than any other stock exchange in the world.[1]

serveur des noms

National Association of
Security Dealers
(NASDAQ)


.

3700 .

License nationale de
large bande
infrastructure national
des technologies
d'information et de
communication




.

.

Page 72

multipurpose
technology community
centre

multi-sector
partnership

multi-service gateway

mutual funds

name server

NASDAQ

NBL

National Association of
Securities Dealers
Automated Quotations

national broadband
license
national ICT
infrastructure

)253 (

a physical location that provide tourist informations to the


visitors who tour the place or area locally

centre d'information
national de Ymen

centre national
d'information
centre national de
technologie
d'information



2003

1992

.




.

NIC

NITC

NIS

national innovation
system

NRC

national research
centre

is the flow of technology and information among people,


systme national
enterprises and institutions which is key to the innovative
d'innovation
process on the national level. According to innovation
system theory, innovation and technology development are
results of a complex set of relationships among actors in
the system, which includes enterprises, universities and
government research institutes.
is to conduct basic and applied research within the major
fields of interest in order to develop production and
services sectors

centre national de
recherche

In general, each country or economy has a single


recognized Standards Body (NSB). NSBs may be either
public or private sector organizations, or combinations of
the two
produces independent information to improve our
understanding of the UK's economy and society.

agence nationale de
normalisation

Reliable and impartial statistics are vital for planning the


proper allocation of resources, policy-making and decisionmaking to ensure a fair society

anneau national

bureaux nationaux de
statistiques


(
. .)..
.

Page 73

National Information
Center, Yemen

national information
centre
National Information
Technology Center,
Jordan

national ring

NSB

national
standardization body

NSO

national statistics office

)253 (

To design indicators for the measurement of S&T and


innovation in their region;
To provide the international comparability and
interchange of information on STI, and the
development of comparative studies;
To organize international and regional programmes for
compiling information on STI;
To organize international workshops and meetings about
the Network's main subjects;
To publish information, papers and analysis of indicators,
and to develop information processes on S&Tand
innovation;
To provide the interface for the relation with public S&T
statistics organisms;
To train experts on statistics and S&T indicators;
To promote the regions incorporation to the international
system of S&T indicators by adapting the
internationally accepted standards;
The generation of a Latin American standard adapted to
the regional specificities: the institutional parameters
according to the national organisms characteristics.
251

observatoire national
des indicateurs des
Sciences, Technologie,
et innovation

NSTIO

national STI
observatory


.
.

NVCA

National Venture
Capital Association

is a field of computer science and linguistics concerned


traitement de langage
with the interactions between computers and human
naturel
(natural) languages. Natural language generation systems
convert information from computer databases into readable
human language.

an interconnected system of
rseau
NNTP specifies a protocol for the distribution, inquiry,
protocole de transfert de
retrieval,
nouvelles sur le rseau
and posting of news articles using a reliable stream-based
transmission of news among the ARPA-Internet
community. NNTP is
designed so that news articles are stored in a central
database
allowing a subscriber to select only those items he wishes
to read.
Indexing, cross-referencing, and expiration of aged
messages are also
provided




.

.

is the leading trade association representing the venture


association nationale
capital industry in the U.S. The NVCA represents the
des capitaux risque
venture industry in public policy debates in Washington,
DC, and promotes high professional standards, professional
development, and interaction amongst member firms.

Page 74

NLP

NNTP

natural language
processing

network
network news transfer
protocol

)253 (

251

measures the propensity for countries to exploit the


indice de mise en tat
opportunities offered by information and communications
des rseaux
technology. It is published annually. The NRI seeks to
better comprehend the impact of ICT on the
competitiveness of nations. The NRI is a composite of three
components: the environment for ICT offered by a given
country or community, the readiness of the communitys
key stakeholders (individuals, businesses, and
governments) to use ICT, and finally the usage of ICT
amongst these stakeholders.


. .
: 3


.
3 .
:
.



.
.

.
) (
) ( 4

NRI

network readiness
index

The World Economic Forum together with INSEAD


publishes the Global Information Technology Report, which
makes use of the index.
The index was originally developed by the Information
Technology Group, which worked at Harvard University's
Center for International Development until 2002.
measures the propensity for countries to exploit the
indice de mise en tat de
opportunities offered by information and communications
rseau (issu du Forum
technology. It is published annually. The NRI seeks to
Mondial d'Economie)
better comprehend the impact of ICT on the
competitiveness of nations. The NRI is a composite of three
components: the environment for ICT offered by a given
country or community, the readiness of the communitys
key stakeholders (individuals, businesses, and
governments) to use ICT, and finally the usage of ICT
amongst these stakeholders
251

is an electronic device used to connect two or more


routeur de rseaux
computers or other electronic devices to each other, and
(routage)
usually to the Internet, by wire or radio signals. This allows
several computers to communicate with each other and to
the Internet at the same time. If wires are used, each
computer is connected by its own wire to the router.
Modern wired-only routers designed for the home or small
business typically have one "input" port (to the Internet)
and four "output" ports, one or more of which can be
connected to other computers

251

is the physical interconnections of the elements (links,


nodes, etc.) of a computer network
Hardware and software data communication systems.

250

The OSI seven layer model attempts to provide a way of


partitioning any computer network into independent
modules from the lowest (physical) layer to the highest
(application) layer. Many different specifications exist at
each of these layers.

topologie du rseau
rseautique



OSI .

.) ( ) (

Page 75

network readiness
index (issued by the
World Economic Forum)

network routing

network topology
networking

)253 (

connections nouvelles
251

is an economic development program of the African Union. nouveau partenariat


NEPAD was adopted at the 37th session of the Assembly of pour le dveloppement
Heads of State and Government in July 2001 in Lusaka,
de l'Afrique
Zambia. NEPAD aims to provide an overarching vision and
policy framework for accelerating economic co-operation
and integration among African countries.
nouvelle forme
institutionnelle base
sur la technologie

251

is a repository usually within the Usenet system, for


Newsgroups
messages posted from many users in different locations.
The term may be confusing to some, because it is usually a
discussion group. Newsgroups are technically distinct from,
but functionally similar to, discussion forums on the World
Wide Web. Newsreader software is used to read
newsgroups
rseau fdrateur de
nouvelle gnration IP



.2001 37

Usenet
.
.

" "

NEPAD

NTIF

is a broad term to describe some key architectural


rseau de nouvelle
evolutions in telecommunication core and access networks gnration
that will be deployed over the next 510 years.[when?] The
general idea behind NGN is that one network transports all
information and services (voice, data, and all sorts of media
such as video) by encapsulating these into packets, like it is
on the Internet. NGNs are commonly built around the
Internet Protocol, and therefore the term "all-IP" is also
sometimes used to describe the transformation toward
NGN.



.
(
.
.

251

A niche market is the subset of the market on which a


specific product is focusing on; Therefore the market niche
defines the specific product features aimed at satisfying
specific market needs, as well as the price range,
production quality and the demographics that is intended
to impact.

march de niche

300

service aspects that are not necessarily required by a firm


in fulfilling its value proposition to its customers, such as
installation, operation, or maintenance of a system, which
can be outsourced to third parties.

fonction non essentielle


...

New Partnership for


African Development

new technology-based
institutional form

newsgroup

251

Page 76

new connection

next generation IP
backbone network
NGN

next generation
networks

niche markets

non-core function

)253 (

251

is a term that has become widely accepted as referring to a organisation non


legally constituted, non-governmental organization created gouvernementale
by natural or legal persons with no participation or
representation of any government. In the cases in which
NGOs are funded totally or partially by governments, the
NGO maintains its non-governmental status and excludes
government representatives from membership in the
organization.

300

251

50

300

Tlcoms Omanaises

(
)

.

.

is a term used by many local authorities in the United


Kingdom to describe the facility they offer for their
residents to discuss and arrange services with officers of
the authority

guichet unique

enligne

:
: .

is a service offered by banks that allows account holders to


access their account data via the Internet. In order to take
advantage of online banking, an account holder would
need to meet several technological requirements, such as
having a personal computer with Internet access and web
browser

service de banque
enligne

50
251



. .

is an archive, consisting of an organization of people and


systme d'information
systems, that has accepted the responsibility to preserve
ouvert d'archivage
information and make it available for a Designated
Community
describes any kind of creative work, or content, published
contenu ouvert
under a license that explicitly allows copying and modifying
of its information by anyone, not exclusively by a closed
organization, firm or individual. Open content is an
alternative paradigm to the use of copyright to create
monopolies; rather than leading to monopoly, open content
facilitates the democratization of knowledge


(
)


Page 77

non-governmental
organization

Oman
Telecommunications
Company
one-stop-shop

systme ouvert
d'apprentissage

Omantel

communauts enligne

Distance learning means that you study on your own,


either at home or wherever suits you. Its open because
you learn in your own time, at home or wherever you
choose reading, watching or listening to material
supplied, doing course activities and assignments with
regular support from your tutor

NGO

online

online banking service

online community
OAIS

open archival
information system

open content

ODL

open distance learning

OSPF

open shortest path first

)253 (

251

is a dynamic routing protocol for use in Internet Protocol


(IP) networks. Specifically, it is a link-state routing protocol
and falls into the group of interior gateway protocols,
operating within a single autonomous system (AS). It is
defined as OSPF Version 2 in RFC 2328 (1998) for IPv4

protocole OSPF

Open source describes practices in production and


modle code source
development that promote access to the end product's
libre
source materialstypically, their source code.[1] Some
consider open source a philosophy, others consider it a
pragmatic methodology. Before the term open source
became widely adopted, developers and producers used a
variety of phrases to describe the concept; open source
gained hold with the rise of the Internet, and the attendant
need for massive retooling of the computing source code.
Opening the source code enabled a self-enhancing diversity
of production models, communication paths, and
interactive communities
250

251

A method and philosophy for software licensing and


logiciel code source
distribution designed to encourage use and improvement of disponible
software written by volunteers by ensuring that anyone can
copy the source code and modify it freely

is an ongoing cost for running a product, business, or


system. Its counterpart, a capital expenditure (CAPEX), is
the cost of developing or providing non-consumable parts
for the product or system. For example, the purchase of a
photocopier is the CAPEX, and the annual paper, toner,
power and maintenance cost is the OPEX. For larger
systems like businesses, OPEX may also include the cost of
workers and facility expenses such as rent and utilities

solution code source


libre
dpenses d'exploitation

50

systme d'exploitation

50

reconnaissance optique
de caractres

.IP
.IPv4 RFC2328


.
.

.





.
CAPEX ) (
.

CAPEX

.OPEX

Page 78

open-source model

OSS

open-source software

open-source solution
OPEX

operating expenditure

OS

operating system

OCR

optical character
recognition

)253 (

251

is any form of telecommunication that uses light as the


transmission medium.

communication optique

The optical disk system is a hierarchical system with


primary storage on magnetic disk and secondary storage
on the optical disks. New files are written to the write
cache. Periodically the optical disk archiver copies the files
from the write cache to the optical disk. This process also
copies the files to the read cache and deletes them from
the write cache. The PPPL utilities and libraries that access
this data first check the magnetic cache. If the file is not
found, the optical disk indices are searched; if the file is
found, it is copied to the read cache. The data on the read
cache is skimmed by access date.

systme de disque
optique


.
.
.
.

.

optical disk system

A physical loop topology, either open or closed, employing


two optical fiber signal paths, one in each direction (i.e.
counter-rotating) forming a sequence of peer connections
between FDDI nodes. When the trunk forms a closed loop,
it is sometimes called a trunk ring.

jonction fibre optique



.FDDI

optical fiber trunk

Optical interconnect is a way of communication by optical


cables.[1] Compared to traditional cables, optical wires are
capable of a much higher bandwidth, from 10 Gb/s up to
100 Gb/s.[2]

interconnexion optique

.

.100Gbps

An optical communication system consists of a transmitter,


which encodes a message into an optical signal, a channel,
which carries the signal to its destination, and a receiver,
which reproduces the message from the received optical
signal.

optical communications

optical interconnection

The technology is currently being researched as a way to


link computers to mobile devices,[3] as well as on
motherboards and devices within computers
300

converts optical signals transmitted via fiber to electrical


units de rseaux
signals. These electrical signals are then sent to individual
optiques
subscribers. ONUs are commonly used in fiber-to-the-home
(FTTH) or fiber-to-the-curb (FTTC) applications. Silicon
Laboratories' proven SLIC and Power over Ethernet
solutions offer a one stop shop for high voltage ONU
solutions.

251

In telecommunication, an optical switch is a switch that


commutation optique
enables signals in optical fibers or integrated optical circuits
(IOCs) to be selectively switched from one circuit to another

Page 79

optical network unit

optical switching

)253 (

300

251

251

251

300
300

An all-optical fiber-optic switching device that maintains the technologie


signal as light from input to output. Traditional switches
commutation optique
that connect optical fiber lines are electro-optic. They
convert photons from the input side to electrons internally
in order to do the switching and then convert back to
photons on the output side

.
. ) (

-
.

In a telecommunications network, one begins at the


transmission optique
terminal site at the customer premises; the access part of
the process is the first mile. In essence, it is the part that
connects the end user to the first piece of equipment in the
network.
is a professional certification program offered by the Oracle professionnel certifie
Corporation. There are three levels of Oracle Certification in d'Oracle
several disciplines: Oracle Certified Associate (OCA), Oracle
Certified Professional (OCP), and Oracle Certified Master
(OCM).

3 .
OCA :
.OCM OCP

is a multinational computer-technology corporation that


Oracle (entreprise)
specializes in developing and marketing enterprise software
products particularly database management systems.
Headquartered in Redwood City, California, United States,
Oracle employs more than 73,201 people worldwide as of
2009[update]. It has enlarged its share of the software
market through organic growth and through a number of
high-profile acquisitions



) (
. 73

was established in 1972 to manage and operate the


telegraph and submarine telecommunications of Radio
Orient (the early 1900's company). It is 100% owned by
the government and acts under the supervision of the
Minister of Telecommunication.
is an international organisation of 30 countries that accept
the principles of representative democracy and free-market
economy. Most OECD members are high-income economies
with a high Human Development Index (HDI) and are
regarded as developed countries.

Organisme de Gestion et
dExploitation de lex
Radio Orient

1972
.)1900 (



) (

consequence: a phenomenon that follows and is caused by


some previous phenomenon;
Computing: Result produced by a computer that is internal
to the system (from one program or process to another) or
external to it (from a program or process to an output
device) but internal to an output device (modem, monitor,
printer, etc.).

rsultats

Organisation de
coopration et de
dveloppement
conomiques

sortie

30
.


) (
.) (

Page 80

optical switching
technology

optical transmission

OCP

oracle certified
professional

oracle corporation

OGERO

Organisme de Gestion
et dExploitation de lex
Radio Orient

OECD

Organization for
Economic Cooperation
and Development

outcome
output

)253 (

300

Contracting, sub-contracting, or 'externalizing' non-core


impartition
activities to free up cash, personnel, time, and facilities for
activities where the firm holds competitive advantage.
Firms having strengths in other areas may contract-out
data processing, legal, manufacturing, marketing, payroll
accounting, or other aspects of their businesses to
concentrate on what they do best and thus reduce average
unit cost. Outsourcing is often an integral part of
downsizing or reengineering. Also called contracting out.



.

. .

251

is a computer network which is built on top of another


rseau ddi
network. Nodes in the overlay can be thought of as being
connected by virtual or logical links, each of which
corresponds to a path, perhaps through many physical
links, in the underlying network. For example, many peerto-peer networks are overlay networks because they run on
top of the Internet. Dial-up Internet is an overlay upon the
telephone network.

.

.
.

is a website offering current and historical computer


security tools, exploits, and security advisories. It is
operated by a non-profit organization of hackers that
publish new security information and offer tools for
educational and testing purposes

Site (Packet Storm)

251

is the relaying of packets from one network segment to


another by nodes in a computer network.The simplest
forwarding model - unicasting - involves a packet being
relayed from link to link along a chain leading from the
packet's source to its destination. However, other
forwarding strategies are commonly used. Broadcasting
requires a packet to be duplicated and copies sent on
multiple links with the goal of delivering a copy to every
device on the network. In practice, broadcast packets are
not forwarded everywhere on a network, but only to
devices within a broadcast domain, making broadcast a
relative term. Less common than broadcasting, but perhaps
of greater utility and theoretical significance is multicasting,
where a packet is selectively duplicated and copies
delivered to each of a set of recipients

technologies de
commutation de
paquets et
racheminement de
paquets

300

The transmission of real time voice in a packet switching


network.

voie par paquets

50

commutation de paquets

outsourcing

overlay network

packet storm




.

.

) ( .

.

.

Page 81

packet switching

packet-forwarding and
packet-switching
technologies

PV

packetized voice

)253 (

50

Tlcoms Palestinienne

association
palestinienne d'Internet

PALTEL

.) ISOC.PS(

.



,2003 2002

)Palestine Internet Exchange(

.

Palestinian IT Association PITA was founded in 1999 by a association informatique


group of Palestinian entrepreneurs who wanted to create a palestinienne
non-government body to defend the interests of the ICT
sector. PITA was legally registered as a trade association
by Ministry of National Economy as a non-profit trade
organization and began operations in the city of Ramallah
in the West Bank with One employee and a member base
of 25 Palestinian ICT companies.

1999

.
25



""

PITA

institution Palestinienne
de standards


.

.


1994 .
,

PSI

garantie partielle du
crdit

Password cracking is the process of recovering passwords


craquage de mot de
from data that has been stored in or transmitted by a
passe
computer system. A common approach is to repeatedly try
guesses for the password. The purpose of password
cracking might be to help a user recover a forgotten
password (though installing an entirely new password is
less of a security risk, but involves system administration
privileges), to gain unauthorized access to a system, or as
a preventive measure by system administrators to check for
easily crackable passwords. On a file-by file basis,
password cracking is utilized to gain access to digital
evidence for which a judge has allowed access but the
particular file's access is restricted.


.

.


.

Page 82

Palestine
Telecommunications
Company
Palestinian Internet
Society Association

Palestinian IT
Association

Palestinian Standards
Institution

partial credit guarantee

password cracking

)253 (

300

A grant made by a government that confers upon the


brevet d'invention
creator of an invention the sole right to make, use, and sell
that invention for a set period of time
is an international patent law treaty, concluded in 1970. It trait de coopration
provides a unified procedure for filing patent applications to des brevets d'invention
protect inventions in each of its contracting states. A patent
application filed under the PCT is called an international
application, or PCT application.

251

is a patent law multilateral treaty concluded on 1 June


2000 in Geneva, Switzerland, by 53 States and the
European Patent Organisation (an intergovernmental
organization). Its aim is to harmonize formal procedures
such as the requirements to obtain a filing date for a
patent application, the form and content of a patent
application, and representation.

trait de loi de brevets


d'invention

2000
. 53

.

300

The amount of time taken to break even on an investment.


Since this method ignores the time value of money and
cash flows after the payback period, it can provide only a
partial picture of whether the investment is worthwhile

dlai de rcupration

300

third party that owns and operates payphones connected


to the public switched telephone network (PSTN) and
located on another party's premises.

service de tlphone
public


PSTN


.


.

251

systme de liste de paie

PiPOP is a program initiated by PCA in order to address the point de prsence


"digital divide" in the Lebanese society.For this purpose,
Internet de PCA
PCA is collaborating with several parties, civil public, and/or
international organizations to generate PiPOP centers in
various parts of the country. By launching this project PCA
had introduced the world of information technology to
communities who do not have access for this facility, for
income reason
50

251

appairage

1970

.

network in which each computer is capable of functioning


as a client and a server; users on the network can freely
share resources on their computer or access shared
resources on other computers

rseaux poste poste

in mobile phone, a term generally used to describe the


number of active mobile phone numbers (usually as a
percentage) within a specific population.

taux de pntration


) (
) 1000 (

Page 83

patent

PCT

patent cooperation
treaty

PLT

patent law treaty

payback period

payphone services

payroll system

PiPOP

PCA Internet point of


presence

peering

P2P

peer-to-peer networks

penetration rate

)253 (

300

is how organizations, public and private, measure the


quality of their activities and services

processus de mesure de
performance

50

ordinateur personnel

.

IBM .
. Macintosh

50

assistant numrique
personnel


(
. )
.


.

" "
.
.


) (

.

.

251

251

In the field of computer security, phishing is the criminally hameonnage


fraudulent process of attempting to acquire sensitive
information such as usernames, passwords and credit card
details by masquerading as a trustworthy entity in an
electronic communication. Communications purporting to
be from popular social web sites, auction sites, online
payment processors or IT administrators are commonly
used to lure the unsuspecting public. Phishing is typically
carried out by e-mail or instant messaging,[1] and it often
directs users to enter details at a fake website whose look
and feel are almost identical to the legitimate one. Even
when using server authentication, it may require
tremendous skill to detect that the website is fake. Phishing
is an example of social engineering techniques used to fool
users,[2] and exploits the poor usability of current web
security technologies.[3] Attempts to deal with the growing
number of reported phishing incidents include legislation,
user training, public awareness, and technical security
measures.
producing a voltage when exposed to radiant energy
(especially light))
refers to several practices which involve the unauthorized
copying of computer software. Copyright infringement of
this kind is extremely common. Most countries have
copyright laws which apply to software, but the degree of
enforcement varies

photovoltaque

the combination of a particular computer and a particular


operating system
is a technology used in telecommunications networks to
transport large quantities of data over digital transport
equipment such as fibre optic and microwave radio
systems. The term plesiochronous is derived from Greek
plesio, meaning near, and chronos, time, and refers to the
fact that PDH networks run in a state where different parts
of the network are nearly, but not quite perfectly,
synchronised.

plateforme

logiciel pirate

hirarchie numrique
plsiochrone

PC

PDA



PDH .
.

Page 84

performance
measurement process
personal computer

personal digital
assistant

phishing

PV

photovoltaic
pirate software

platform
plesiochronous digital
hierarchy

)253 (

50

251

251

point de prsence

is a network protocol for encapsulating Point-to-Point


liaison point point sur
Protocol (PPP) frames inside Ethernet frames. It is used
Ethernet
mainly with DSL services where individual users connect to
the DSL modem over Ethernet and in plain Metro Ethernet
networks
presents information from diverse sources in a unified way. portail
Apart from the standard search engine feature, web portals
offer other services such as e-mail, news, stock prices,
information, databases and entertainment. Portals provide
a way for enterprises to provide a consistent look and feel
with access control and procedures for multiple applications
and databases, which otherwise would have been different
entities altogether
victime potentielle

prsentation PowerPoint
300

is a telecommunications standard for carrying multiple DS0


voice and data transmissions between a network and a
user.
All data and voice channels are ISDN and operate at 64
kbit/s.

accs taux primaire

donateur ventuel

50

Protocole

50

serveur mandataire

251

is a network established and operated by a


rseau public de donnes
telecommunications administration, or a recognized private
operating agency, for the specific purpose of providing data
transmission services for the public


.
.

) (
DSL . PPP
. DSL

.

.

powerpoint


ISDN .
64kbps





.
(OSI 7
)

PPPoE

point of presence

point-to-point protocol
over ethernet

portal

potential victim

powerpoint
presentation
primary rate access

prospective donor


.

.

Page 85

PoP

protocol

proxy server

PDN

public data network

)253 (

300

A public Internet access centre (PIAC) is a site, location,


centre public d'accs
centre of instruction at which Internet access is made
l'Internet
available to the public, on a full-time or part-time basis.
This may include digital community centres, Internet cafs,
libraries, education centres and other similar
establishments, whenever they offer Internet access to the
general public. All such centres should have at least one
public computer for Internet access. It is very useful to
classify centres by type, as illustrated by way of example in
Figure 1. A further breakdown into private and
governmental establishments is also necessary.

251

describes a government service or private business venture partenariat entre le


which is funded and operated through a partnership of
secteur public et le
government and one or more private sector companies.PPP secteur priv
involves a contract between a public sector authority and a
private party, in which the private party provides a public
service or project and assumes substantial financial,
technical and operational risk in the project. In some types
of PPP, the cost of using the service is borne exclusively by
the users of the service and not by the taxpayer.

251

is the network of the world's public circuit-switched


telephone networks, in much the same way that the
Internet is the network of the world's public IP-based
packet-switched networks. Originally a network of fixed-line
analog telephone systems, the PSTN is now almost entirely
digital and includes mobile as well as fixed (POTS)
telephones
A wireless local area network (WLAN) links devices via a
wireless distribution method (typically spread-spectrum or
OFDM radio), and usually provides a connection through an
access point to the wider internet. This gives users the
mobility to move around within a local coverage area and
still be connected to the network
Pump and dump" is a form of microcap stock fraud that
involves artificially inflating the price of an owned stock
through false and misleading positive statements, in order
to sell the cheaply purchased stock at a higher price. Once
the operators of the scheme "dump" their overvalued
shares, the price falls and investors lose their money.
Stocks that are the subject of pump-and-dump schemes
are sometimes called "chop stocks
The purchasing power parity (PPP) theory uses the longterm equilibrium exchange rate of two currencies to
equalize their purchasing power. t is based on the law of
one price: the theory states that, in ideally efficient
markets, identical goods should have only one price

251

.

.

PIAC

public Internet access


centre


.


.

PPP

public private
partnership

rseaux de tlphones
publics commutation

.

.)POTS(

rseau local public sans


fil

plan de "gonfler pour


liquider"


.

.

parit de pouvoir d'achat

Page 86

PSTN

public switched
telephone network

PWLAN

public wireless local


area network

pump and dump


scheme

PPP

purchasing power
parity

)253 (

251

is a method of conversing on half-duplex communication


lines, including two-way radio, using a momentary button
to switch from voice reception mode to transmit mode

messagerie vocale
instantane

) (

push-to-talk

organisation gnrale de
Qatar pour les standards
et la mtrologie

:
.


Qatar General
Organization for
Standards and
Metrology

assurance de qualit

QA

quality assurance

contrle de qualit

) (
) (
.

QC

quality control

QFD

quality function
deployment (QFD)

QoS

quality of service


.) (
%1
TCP
TCP/IP

) (

jardin de science et de
technologie Qatar
refers to a program for the systematic monitoring and
evaluation of the various aspects of a project, service, or
facility to ensure that standards of quality are being met

300

251

is a method to transform user demands into design


dploiement de la
quality, to deploy the functions forming quality, and to
fonction qualit
deploy methods for achieving the design quality into
subsystems and component parts, and ultimately to specific
elements of the manufacturing process.
refers to resource reservation control mechanisms rather
qualit de service
than the achieved service quality. Quality of service is the
ability to provide different priority to different applications,
users, or data flows, or to guarantee a certain level of
performance to a data flow
Radio Link Protocol (RLP) is an automatic repeat request
(ARQ) fragmentation protocol used over a wireless
(typically cellular) air interface. Most wireless air interfaces
are tuned to provide 1% packet loss, and most Vocoders
are mutually tuned to sacrifice very little voice quality at
1% packet loss. However, 1% packet loss is intolerable to
all variants of TCP, and so something must be done to
improve reliability for voice networks carrying TCP/IP data.

liaison hertzienne

the most common computer memory which can be used by mmoire accs
programs to perform necessary tasks while the computer is alatoire
on; an integrated circuit memory chip allows information to
be stored or accessed in any order and all storage locations
are equally accessible

Page 87

Qatar Science and


Technology Park

radio link

RAM

random access memory

ADSL2
12Mbits/s ADSL
. 3.5Mbits/s

.DSLAM

READSL

)253 (

251

also referred to as ADSL2 or G.DMT.bis. It optionally


extends the capability of basic ADSL in data rates to 12
Mbit/s downstream and 3.5 Mbit/s upstream (with a
mandatory capability of ADSL2 transceivers of 8 Mbit/s
downstream and 800 Kbit/s upstream). Actual speeds may
reduce depending on line quality - usually the most
significant factor in line quality is the distance from the
DSLAM to the customer's equipment. reach extended :
Increases the range of the DSL service enabling the link to
work at a distance of 7 kilometers, or 23000 f

lignes d'abonn
numrique asymtrique
range tendue

300

Presented to HM King Abdullah II in October 1999, the


REACH report laid out a clear plan of action to bolster the
country's nascent IT sector and maximize its ability to
compete in local, regional, and global markets

dveloppement de cadre
de rgulations,
d'environnement
habilitant, de
programmes avances,
de capitaux, de
ressources humaines

1999





) (

300

Real-time communications (RTC) is any mode of


telecommunications in which all users can exchange
information instantly or with negligible latency. In this
context, the term "real-time" is synonymous with "live."

service de
communication en
temps rel




( IP .
)BGP ( )IPv6 IPv4

(
)
ICANN


redmarrage
251

A regional Internet registry (RIR) is an organization


overseeing the allocation and registration of Internet
number resources within a particular region of the world.
Resources include IP addresses (both IPv4 and IPv6) and
autonomous system numbers (for use in BGP routing

300

300
251

registre rgional
d'Internet

plan rgional d'Action

a person who is formally entered (along with others) in a


register (and who obtains certain rights thereby)
A domain name registrar is an organization or commercial
entity, accredited by the Internet Corporation for Assigned
Names and Numbers (ICANN) or by a national country
code top-level domain (ccTLD) authority, to manage the
reservation of Internet domain names in accordance with
the guidelines of the designated domain name registries
and offer such services to the public

inscrit
registraire de nom de
domaine

Page 88

range extended
asymmetric digital
subscriber line

REACH initiative,
Jordan

real time
communications service

reboot
RIR

RPoA

Regional Internet
Registry (RIR )

regional plan of action


for building the
information society
registrant
registrar

)253 (

50

oprateur de domaine
de tte



.


folders
.

50

fiabilit

) (
.

MTBF

accs distance et
mobilit

authentification

50

ouverture de session
distance


.
.
. telnet rlogin

50

document RFC


.



.

.

.

RFC

request for comments

RFP

request for proposal

RFQ

request for quotation

Basic Access refers to peoples ability to access goods,


services and activities that society considers particularly
important (also called essential or lifeline). Basic Mobility
refers to physical travel that provides Basic Access.

251

is an invitation for suppliers, often through a bidding


process, to submit a proposal on a specific commodity or
service. A bidding process is one of the best methods for
leveraging a company's negotiating ability and purchasing
power with suppliers. The RFP process brings structure to
the procurement decision and allows the risks and benefits
to be identified clearly upfront.[1] The RFP purchase
process is lengthier than others, so it is used only where its
many advantages outweigh any disadvantages and delays
caused. The added benefit of input from a broad spectrum
of functional experts ensures that the solution chosen will
suit the company's requirements

appel d'offres

251

is a standard business process whose purpose is to invite


suppliers into a bidding process to bid on specific products
or services.
An RFQ typically involves more than the price per item.
Information like payment terms, quality level per item or
contract length are possible to be requested during the
bidding process.

demande de prix

Page 89

Registry

reliability

remote access and


mobility

RADIUS

remote authentication
dual-in user service
protocol
remote login

)253 (

251

refers to "creative work undertaken on a systematic basis


in order to increase the stock of knowledge, including
knowledge of man, culture and society, and the use of this
stock of knowledge to devise new applications

300

The Research Development and Innovation (RDI)


recherche et
Programme aims at strengthening the links between the
dveloppement er
research sector and the industry while enhancing the
innovation
innovation and technology transfer culture. In addition, RDI
seeks to support the progressive integration of Egypt into
the European Research Area. Funded by the European
Commission with a grant of 11 million over a period of
three years, the RDI Programme is managed by a Project
Implementation Office set-up by the Ministry of Higher
Education and Scientific Research.

251

described in RFC 2205, is a Transport layer protocol


protocole de rservation
designed to reserve resources across a network for an
de ressources
integrated services Internet. "RSVP does not transport
application data but is rather an Internet control protocol,
like ICMP, IGMP, or routing protocols" - RFC 2205. RSVP
provides receiver-initiated setup of resource reservations
for multicast or unicast data flows with scaling and
robustness. RSVP can be used by either hosts or routers to
request or deliver specific levels of quality of service (QoS)
for application data streams or flows. RSVP defines how
applications place reservations and how they can relinquish
the reserved resources once the need for them has ended.
RSVP operation will generally result in resources being
reserved in each node along a path.

300

Results-based management is a life-cycle approach to


management that integrates strategy, people, resources,
processes and measurements to improve decision-making,
transparency, and accountability. The approach focuses on
achieving outcomes, implementing performance
measurement, learning and changing, and reporting
performance.
the amount, expressed as a percentage, that is earned on
a company's total capital calculated by dividing the total
capital into earnings before interest, taxes, or dividends are
paid)

300

50

recherche et
dveloppement

R&D

research and
development


.
.
3
.

RDI

research, development
and innovation

RFC2205

.
.

.
.

RBM

results-based
management

rendement du capital
investi

ROI

return on investment

algorithme RSA

- -
1978
) (
" "

RSA

Rivest-ShamirAdleman algorithm

gestion base de
rsultats

Page 90

resource reservation
protocol

)253 (

251

In wireless telecommunications, roaming is a general term itinrance


that refers to the extending of connectivity service in a
location that is different from the home location where the
service was registered. The term "roaming" originates from
the GSM (Global System for Mobile Communications)
sphere; the term "roaming" can also be applied to the
CDMA technology, see CDMA Roaming. Traditional GSM
Roaming is defined (cf. GSM Association Permanent
Reference Document AA.39) as the ability for a cellular
customer to automatically make and receive voice calls,
send and receive data, or access other services, including
home data services, when travelling outside the
geographical coverage area of the home network, by
means of using a visited network. This can be done by
using a communication terminal or else just by using the
subscriber identity in the visited network. Roaming is
technically supported by mobility management,
authentication, authorization and billing procedures


.

.CDMA


.

possesses
high success probability with low message overhead

IP

recherche robuste

serveur racine

50

routeur

The IDN WG's comparison document [IDNComp] describes codage compatible avec
three potential
ASCII base de ranges
main architectures for IDN: arch-1 (just send binary), arch2 (send
binary or ACE), and arch-3 (just send ACE). RACE is an
ACE, called
Row-based ACE or RACE, that can be used with protocols
that match arch-2
or arch-3. RACE specifies an ACE format as specified in ace1 in
[IDNComp]. Further, it specifies an identifying mechanism
for ace-2 in
[IDNComp], namely ace-2.1.1 (add hopefully-unique legal
tag to the
beginning of the name part).In formal terms, RACE
describes a character encoding scheme of the ISO
10646 [ISO10646] coded character set and the rules for
using that scheme
in the DNS

robust search

.
.

.

.

arch-2
.) (arch-3 ) (

. ISO10646


""

Page 91

roaming

root server

router

RACE

row-based ASCII
compatible encoding

)253 (

251

300

300

50

300

300

is a type of parabolic antenna designed to receive


tlvision par satellite
microwaves from communications satellites, which transmit antenne collective
data transmissions or broadcasts, such as satellite television

organisation de
standards en Arabie
Saoudite


3/3/1392 10 /
.

- :



.
.
.

association informatique
saoudienne

1408


.


.

centre d'information de
rseaux en Arabie
Saoudite


.
.2006

. ) .sa(

SaudiNIC Saudi Network



Information Center

extensibilit


.


" :

dveloppement
extensible
Science et Technologie

is a term of art used to encompass the relationship


between science and technology. It frequently appears
within titles of academic disciplines (science and technology
studies) and government offices
including new scientific and communications infrastructure, Science, Technologie, et
centres of research excellence, programs to assist business Innovation
to become more innovative and projects to maintain and
build a skilled and creative labour force

SMATV

SASO

satellite master
antenna television

Saudi Arabian
Standards Organization

Saudi Computer Society

scalability

scalable growth

S&T

science and technology

STI

science, technology
and innovation

Page 92

)253 (

251
250

A fiber-optic transmission system for high-speed digital


traffic. Employed by telephone companies and common
carriers, speeds range from 51 Mbps to 40 Gbps. An
international digital telecommunications network hierarchy
which standardises transmission around the bit rate of
51.84 megabits per second

hirarchie numrique
synchrone


.
40 / 50
. /

moteurs de recherche

.


FTP



.
.

this Conference has the following objectives:


- Review of actions taken by Arab countries to reduce the
digital divide in light of the outcome of the Geneva phase
of WSIS;
- Adoption of a Regional Plan of Action, based on the Arab
Strategy for Communications and Information, adopted by
the Arab Summit in Amman (March 2001) and the global
PoA adopted in the Geneva Summit;
- Active promotion of partnerships among the various
stakeholders of the information society, including
Government, private sector, non-governmental and
international/regional organizations, in order to implement
the Regional Plan of Action;
- Launching key regional projects that have the necessary
funding and partnership to insure a high rate of success

deuxime confrence
rgionale pour le la
prparation de sommet
mondial sur la socit
d'information

:



.

is a non-volatile memory card format developed by


Panasonic, SanDisk, and Toshiba for use in portable
devices. Currently it is widely used in digital cameras,
digital camcorders, handheld computers, netbook
computers, PDAs, media players, mobile phones, GPS
receivers, and video games. Standard SD card capacities
have a maximum of 2 GB.
A virtual private network , Platform for secure payments
(Banks, Financial Institutions, Public Sector)
Increased ability to manage market liquidity & risks
Electronic end-to-end processing at all levels of interaction
Assured reliability & integrity of strategic information
Electronic Reporting
Web-based Application
Real Time Settlement System
Automated Clearing House
Treasury Management System
Help desk

carte numrique
scurise


.

.
.2GB

systme et information
bancaire lectronique
scuris pour le Liban

(
.)


50

300

Page 93

SDH

SDH

search engines

second regional
preparatory conference
for the world summit
on the information
society

secure digital card

SEBIL

Secure Electronic
Banking and
Information for
Lebanon

)253 (

50

algorithme de hachage
scuris/systme de
hachage scuris

50

protocole S-HTTP

a highly secure and reliable network. Full redundancy,


rseau IP scurise
advanced recovery mechanisms and first class operations
and customer support services ensure continuous network
availability
a physical device that an authorized user of computer
jeton scurise
services is given to ease authentication. The term may also
refer to software tokens.
Security tokens are used to prove one's identity
electronically (as in the case of a customer trying to access
their bank account). The token is used in addition to or in
place of a password to prove that the customer is who they
claim to be. The token acts like an electronic key to access
something.

300

Secuity Software helps prevent viruses, remove spyware,


block hackers and safeguard your personal information

251

is a securities offering whereby one or more parties that


have some connection to a new enterprise invest the funds
necessary to start the business so that it has enough funds
to sustain itself for a period of development until it reaches
either a state where it is able to continue funding itself, or
has created something in value so that it is worthy of
future rounds of funding. Seed money refers to the money
so invested.

fraude dans les titres de


placement
logiciel de scurit

capital d'amorage

160
.


HTTP

phase de lancement

SHA

S-HTTP

SIPN

secure hash algorithm

secure hypertext
transfer protocol
secure IP network

security software

seed capital

" "

seed money

/
.

capitaux de lancement
Seed-Stage Financings are often comparatively modest
capital amounts provided to an inventor/entrepreneur to
finance the early development of a new product or service
concept. These early financings may involve product
development and market research or building a
management team and developing a business plan

Page 94

secure token

securities fraud

seed phase

)253 (

is a computer program that, when executed, outputs its


programme d'ordinateur
own code A more trivial approach is to write a program
autopropageable
that will make a copy of any stream of data that it is
directed to, and then direct it at itself. In this case the
program is treated as both executable code, and as data to
be manipulated.
This approach is common in most self-replicating systems,
including biological life, and is simpler in that it does not
require the program to contain a complete description of
itself.
In many programming languages an empty program is still
a legal program, which executes without producing errors
or any other output. The output is thus the same as the
source code, so the program is trivially self-reproducing.
251

is a method for eliciting and representing knowledge about analyse smantique


organisations. (Liu, 1991) Initially the problem must be
defined by domain experts and passed to the project
analyst(s). The next step is the generation of candidate
affordances. This step will generate a list of semantic units
that may be included in the schema. The candidate
grouping follows where some of the semantic units that will
appear in the schema are placed in simple groups. Finally
the groups will be integrated together into an ontology
chart. A case study of a library domain will be used to
illustrate the process of Semantic Analysis. Semantic
analysis always starts from the problem definition which if
not clear, require the analyst to employ relevant literature,
interviews with the stakeholders and other techniques
towards collecting supplementary information. All
assumptions made must be genuine and not limiting the
system.


.
.
" "
.

.
.
.
.

Page 95

self-replicating
computer programme

semantic analysis

)253 (

251

is an evolving development of the World Wide Web in


Web smantique
which the meaning (semantics) of information and services
on the web is defined, making it possible for the web to
"understand" and satisfy the requests of people and
machines to use the web content.[1][2] It derives from
World Wide Web Consortium director Sir Tim Berners-Lee's
vision of the Web as a universal medium for data,
information, and knowledge exchange. At its core, the
semantic web comprises a set of design principles,[4]
collaborative working groups, and a variety of enabling
technologies. Some elements of the semantic web are
expressed as prospective future possibilities that are yet to
be implemented or realized.[2] Other elements of the
semantic web are expressed in formal specifications.[5]
Some of these include Resource Description Framework
(RDF), a variety of data interchange formats (e.g.
RDF/XML, N3, Turtle, N-Triples), and notations such as RDF
Schema (RDFS) and the Web Ontology Language (OWL),
all of which are intended to provide a formal description of
concepts, terms, and relationships within a given
knowledge domain

50

semi conducteurs

is a device that uses a semiconductor (usually silicon or


dtecteur semigermanium) to detect traversing charged particles or the
conducteurs
absorption of photons. In the field of particle physics, these
detectors are usually known as silicon detectors
Racial or ethnic origin;
Political opinions;
Religious or other similar beliefs;
Membership of trade unions;
Physical or mental health or condition;
Sexual life; and
Convictions, proceedings and criminal acts
50

information personnelle
sensible

protocole SLIP
serveur

A networking system that uses server / client technologies


to share resources over a network

rseau local serveur


central



.
Berners lee
.

.

(
. )

semantic web

semiconductor

semiconductor detector

sensitive personal
information




.
.

.
/

serial line Internet


protocol
server

server-based local area


network

Page 96

)253 (

251

Telecommunications convergence is a concept dating back


to AT&T in 1928 but has evolved in the 21st century to
dominate the market positioning of telecoms operators. It
is reflected in the product portfolio operators offer (vertical
integration), and in the channels through which their
products are sold and serviced (horizontal integration).
Telecommunication convergence is a disruptive technology

convergence de services

1928

( .
)
.

251

Service level measures the performance of a system.


Certain goals are defined and the service level gives the
percentage to which they should be achieved.

accord sur les niveaux


de service

.

.

50

251

couche de contrle de
sessions
is a signaling protocol, widely used for controlling
protocole d'initiation de
multimedia communication sessions such as voice and
sessions
video calls over Internet Protocol (IP). The protocol can be
used for creating, modifying and terminating two-party
(unicast) or multiparty (multicast) sessions consisting of
one or several media streams. The modification can involve
changing addresses or ports, inviting more participants,
adding or deleting media streams, etc. Other feasible
application examples include video conferencing, streaming
multimedia distribution, instant messaging, presence
information and online games
is a collection of standards and specifications for webmodle de rfrence
based e-learning. It defines communications between client pour les objets de
side content and a host system called the run-time
contenu partage
environment (commonly a function of a learning
management system). SCORM also defines how content
may be packaged into a transferable ZIP file.

251

Short Message Service (SMS) is a communication service


standardized in the GSM mobile communication system,
using standardized communications protocols allowing the
interchange of short text messages between mobile
telephone devices. SMS text messaging is the most widely
used data application on the planet, with 2.4 billion active
users, or 74% of all mobile phone subscribers sending and
receiving text messages on their phones.[citation needed]
The SMS technology has facilitated the development and
growth of text messaging. The connection between the
phenomenon of text messaging and the underlying
technology is so great that in parts of the world the term
"SMS" is used as a synonym for a text message or the act
of sending a text message, even when a different protocol
is being used.

message SMS

OSI/ISO
.
.



.
.

.


ZIP




.
.

Page 97

service convergence

service-level guarantee

session control layer

SIP

session initiation
protocol



)(

SCORM

sharable content
object reference model

SMS

short message service

)253 (

251

Shortwave radio refers to radio broadcasts on a portion of onde courte


the radio spectrum in the frequency range of 3,00030,000
kHz )330 MHz(. Because smaller wavelengths correspond
to higher frequencies (given the inverse relationship
between frequency and wavelength), shortwave radio
received its name because its wavelengths are shorter than
the longer wavelengths used in early radio
communications. A longer wavelength example is the
medium wave AM broadcast band: 1 MHz = 300 meters.
An example of shortwave would be 10 MHz which is 30
meters
d'abord chemin le plus
court (protocole)
In the field of telecommunication, signalling (UK spelling)
signalisation
or signaling (US spelling) has the following meanings:
The use of signals for controlling communications.
In a telecommunications network, the information
exchange concerning the establishment and control of a
connection and the management of the network, in
contrast to user information transfer.
The sending of a signal from the transmitting end of a
circuit to inform a user at the receiving end that a message
is to be sent.
Signaling systems can be classified according to their
principal properties

50

protocole SMTP

250

<protocol> (SOAP) A minimal set of conventions for


invoking code using XML over HTTP.

protocole SOAP

251

are companies whose headcount or turnover falls below


petite et moyenne
certain limits. EU Member States traditionally have their
entreprise
own definition of what constitutes an SME, for example the
traditional definition in Germany had a limit of 250
employees, while, for example, in Belgium it could have
been 100. But now the EU has started to standardize the
concept. Its current definition categorizes companies with
fewer than 10 employees as "micro", those with fewer than
50 employees as "small", and those with fewer than 250 as
"medium" Small medium organizations need to have
between 20-500 employees .[1] By contrast, in the United
States, when small business is defined by the number of
employees, it often refers to those with fewer than 100
employees, while medium-sized business often refers to
those with fewer than 500 employees.


.kHz 30000-3000 :

.)AM (

" "
:


.

TCP/IP
.
.

.HTTP XML

.


50 10
. 500
100
. 500

Page 98

SW

short wave


)(

SPF

shortest path first


signaling

SMTP

simple mail transfer


protocol

SOAP

simple object access


protocol

SME

small and medium


enterprise

)253 (

300

251

The U.S. Small Business Administration (SBA) was created


in 1953 as an independent agency of the federal
government to aid, counsel, assist and protect the interests
of small business concerns, to preserve free competitive
enterprise and to maintain and strengthen the overall
economy of our nation.
Strengthen support for SMMEs' access to finance
Create an enabling regulatory environment
Expand market opportunities for specific categories of small
enterprises
Localise small business support through a grid of sedacoordinated information and advice access points
Initiate a national entrepreneurship drive and expand
education and training for small business
Co-fund minimum business infrastructure facilities in local
authority areas across the country

programme d'affaires,
d'innovation et de
recherche

A microenterprise is a type of small business that is often


unregistered and run by a poor individual. Specifically a
microenterprise is defined as a business having five or
fewer employees and a seed capital of not more than
$35,000[citation needed]. Because microenterprises
typically have no access to the commercial banking sector,
they often rely on "micro-loans" or microcredit in order to
be financed. Microfinance institutions often finance these
small loans, particularly in the Third World. Those who
found microenterprises are usually referred to as
entrepreneurs

50

1953

.

SBIR

small business
innovation research
programme

SED

small enterprise
development

petites, moyennes, et
micro entreprises


.
5 4
. 35
.

SMME

identit de carte puce


intelligente



.
) (

smart card ID

social networking

dveloppement de petite
entreprise

A social network is a social structure made of individuals


(or organizations) called "nodes," which are tied
(connected) by one or more specific types of
interdependency, such as friendship, kinship, financial
exchange, dislike, sexual relationships, or relationships of
beliefs, knowledge or prestige.

rseautage social

in 1973, Society for Worldwide Interbank Financial


Telecommunication (SWIFT) starts the mission of creating
a shared worldwide data processing and communications
link and a common language for international financial
transactions.SWIFT is the Society for Worldwide Interbank
Financial Telecommunication, a member-owned
cooperative through which the financial world conducts its
business operations with speed, certainty and confidence.

socit pour les


tlcommunications
financires entre les
banques

.1973



.
.
)(

Page 99

SWIFT

small, medium and


micro enterprise

society for worldwide


interbank financial
telecommunication

)253 (

50

logiciel

chambre de technologie
de communication et de
l'information, Egypte

250

are weblog sites which the author uses to promote


affiliated websites, to increase the search engine rankings
of associated sites or to simply sell links/ads.

blogage pourriel

) (



.
.
300GHz 3KHz

spectre
gestion de spectre

mystification par pourriel

300

computer software that obtains information from a user's


computer without the user's knowledge or consent

logiciel espion

langage SGML

organisation de
standards et de
mtrologie (pays de
Golfe)
comit de coordination
des standards



1986
.

.



.
IEEE

Page 100

software

piratage logiciel
pourriel

is a conceptual tool used to organize and map the physical


phenomena of electromagnetic waves. These waves
propagate through space at different frequencies, and the
set of all possible frequencies is called the electromagnetic
spectrum. The term radio spectrum typically refers to the
full frequency range from 3 kHz to 300 GHz that may be
used for wireless communication.

50

The unauthorized copying of software.


To post irrelevant or inappropriate messages to one or
more Usenet newsgroups, mailing lists, or other messaging
system in deliberate or accidental violation of netiquette.

50

300

.
:

.
1999
.

.2005



Software Information
and Communications
Technology Chamber,
Egypt

software piracy
spam

spam blog

spectrum
spectrum management

spoofing spam

spyware

SGML

standard generalized
markup language

Standardization and
Metrology
Organization, GCC
SCC10

Standards Coordinating
Committee 10

)253 (

is an independent, nonprofit research institute conducting


institut de recherche de
client-sponsored research and development for government Stanford
agencies, commercial businesses, foundations, and other
organizations. SRI also brings its innovations to the
marketplace by licensing its intellectual property and
creating new ventures
251

startup is a company with a limited operating history.


entreprise en dmarrage
These companies, generally newly created, are in a phase
of development and research for markets. The term
became popular internationally during the dot-com bubble
when a great number of dot-com companies were founded.
A high tech startup company is a startup company
specialized in a high tech industry.

300

is used to resolve disputes between Registrants and IP


Claimants over the registration or use of a domain name
that is subject to the IP Claim Service. STOP is exclusive to
the .biz top-level domain and may only be used by those IP
holders that submitted an IP Claim.

300

.
.

Stanford Research
Institute

start-up

politique d'entreprise en
dmarrage pour
opposer les marques de
commerce

stganographie



""

strategic action

.
:

strategic framework

an attempt or series of attempts to influence the price of


stocks by buying or selling in order to give the impression
that the stocks are widely traded

manipulation de marche
d'changes

Both people and organizations need to establish a strategic


framework for significant success. This framework consists
of:
a vision for your future,
a mission that defines what you are doing,
values that shape your actions,
strategies that zero in on your key success approaches,
and
goals and action plans to guide your daily, weekly and
monthly actions.
A ranking of an organization's strategic objectives by
importance; a description of what an organization's
decision-makers believe is more important or less
important; a basis (criterion) for evaluating the tactical
planning and budget-setting process

cadre stratgique

actions stratgiques

priorit stratgique

Page 101

STOP

start-up trademark
opposition policy

steganography

stock market
manipulation

strategic priority

)253 (

251

is a strategic planning method used to evaluate the


Strengths, Weaknesses, Opportunities, and Threats
involved in a project or in a business venture. It involves
specifying the objective of the business venture or project
and identifying the internal and external factors that are
favorable and unfavorable to achieving that objective. The
technique is credited to Albert Humphrey, who led a
convention at Stanford University in the 1960s and 1970s
using data from Fortune 500 companies

analyse de Forces,
faiblesses, possibilits,
et menaces



.
.

300

Cable designed to be placed underwater. Such cables must


be specially protected against moisture. At shallow depths
on continental shelves, submarine cables commonly are
plowed in and armored to protect them against ship
anchors, trawler nets, and sharks, which are attracted to
the electromagnetic fields and like to gnaw on the cables
and repeaters.
In information technology, a neural network is a system of
programs and data structures that approximates the
operation of the human brain. A neural network usually
involves a large number of processors operating in parallel,
each with its own small sphere of knowledge and access to
data in its local memory. Typically, a neural network is
initially "trained" or fed large amounts of data and rules
about data relationships (for example, "A grandfather is
older than a person's father"). A program can then tell the
network how to behave in response to an external stimulus
(for example, to input from a computer user who is
interacting with the network) or can initiate activity on its
own (within the limits of its access to the external world).

systme de cble sousmarin

.

.


.

.
.
.

SNN

sub-neural-network

Composante d'un systme de tlphonie mobile de type


GSM ayant pour fonction d'identifier un abonn

module d'identification
de l'abonn

GSM

)(

SIM

subscriber identity
module

300

sous rseaux de
neurones

infraction de
corroboration
association d'Internet
Soudanaise

Socit Soudanaise de
Tlphonie Mobile, SARL
(Mobitel)

2002

.



SWOT

strength, weakness,
opportunities and
threats

submarine cable system

substantive offence
Sudan Internet Society

MOBITEL Sudanese Mobile


""
Telephone Company
Ltd. "Mobitel"

Page 102

)253 (

Libraire nationale
Electronique du Soudan

Conseil Suprme de
technologie
d'information et de
communication Qatar

liaison de rseau SWIFT

50

commutation

50

ligne d'abonn
numrique dbit
symtrique
synchrone

300
250
50

251

300

300

digital communication) pertaining to a transmission


technique that requires a common clock signal (a timing
reference) between the communicating devices in order to
coordinate their transmissions)
Transmission of two or more signals on the same path, but
at different times.
A broadband networking standard based on point-to-point
optical fibre networks. SONET will provide a highbandwidth "pipe" to support ATM-based services.

In computer science and linguistics, parsing, or, more


formally, syntactic analysis, is the process of analyzing a
text, made of a sequence of tokens (for example, words),
to determine its grammatical structure with respect to a
given (more or less) formal grammar.

signal synchrone
multiplexe
rseau optique
synchrone

analyse syntactique

organisation arabe
syrienne de
normalisation et de
mtrologie
association informatique
syrienne





.
..


.


.





.

. / 384

ictQatar

SNL


) (


.
.

/ 2.48


)(


( )
.

Page 103

Sudanese National
Electronic Library

Supreme Council of
Information &
Communication
Technology, Qatar

swiftnet link

switching
SDSL

symmetric digital
subscriber line
synchronous

SONET

synchronous
multiplexed signal
synchronous optical
network

syntactic analysis

SASMO

Syrian Arab
Standardization and
Metrology Organization
Syrian Computer
Society

)253 (

300

The Ministry of Higher Education supervises Syria's


rseau arabe syrienne
universities: Damascus University, Tishreen University, the pour l'enseignement
University of Aleppo, and Al-Baath University. The ministry suprieur et la recherche
has worked cooperatively with the United Nations
Development Program (UNDP) and UNESCO to develop the
Syrian Higher Education and Research Network (SHERN), a
national network for higher education with connection to
the Internet. The project began in January 1999, and the
core development is scheduled for completion in mid-2001.
A presidential decree in 2000 led to the establishment of a
Faculty of Computer Science and Engineering at the four
universities with 150 openings at each site
Read more: Syria - Higher Education
http://education.stateuniversity.com/pages/1486/SyriaHIGHER-EDUCATION.html#ixzz0aRxLcyX0



UNDP
.
.2001 1999

SHERN

Syrian Higher
Education and
Research Network

A term normally used to refer to systems that offer users


an interface that screens them from the majority of the
details of the physical handling of the files, leaving them
free to concentrate on the logical properties of the data.

systme d'experts pour


la gestion intelligente de
donnes

SEIDAM

system of experts for


intelligent data
management

IBM's family of standard interfaces which enable software


to be written independently of hardware and operating
system.

architecture
d'applications de
systme

SAA



.
.

.


. 30

.
.

251

In online computer systems terminology, a tag is a nonbalise


hierarchical keyword or term assigned to a piece of
information (such as an internet bookmark, digital image,
or computer file). This kind of metadata helps describe an
item and allows it to be found again by browsing or
searching. Tags are generally chosen informally and
personally by the item's creator or by its viewer, depending
on the system.

300

As a pioneering Arab institution, Talal Abu-Ghazaleh


socit internationale de
Organization (TAGorg), has realized significant experience Talal Abu Ghazaleh
and achievements in the field of professional services Since
its establishment 33 years ago.
is a social construct used to describe innovative teams. "a
cyberteam of self-motivated people with a collective vision,
enabled by the Web to collaborate in achieving a common
goal by sharing ideas, information, and work."

taxinomie de liaisons en
rseaux d'innovation

is to make an analysis of structure change in organization,


in order to adjust to the impact brought about by
technology

adaptation
technologique

Page 104

systems application
architecture

tag

TAGI

Talal Abu-Ghazaleh
International

taxonomy of linkages
in innovation networks

technological
adaptation

)253 (

fond de dveloppement
de technologie (Egypte)

251

251

Technology transfer is the process of sharing of skills,


transfert de technologie
knowledge, technologies, methods of manufacturing,
samples of manufacturing and facilities among
governments and other institutions to ensure that scientific
and technological developments are accessible to a wider
range of users who can then further develop and exploit
the technology into new products, processes, applications,
materials or services. It is closely related to (and may
arguably be considered a subset of) Knowledge transfer.
Related terms, used almost synonymously, include
"technology valorisation" and "technology
commercialisation". While conceptually the practice has
been utilized for many years (in ancient times, Archimedes
was notable for applying science to practical problems), the
present-day volume of research, combined with high-profile
failures at Xerox PARC and elsewhere, has led to a focus on
the process itself.



.

.


.




. .

aims at harnessing selected new technologies for


employment creation and poverty alleviation. It is to act as
an umbrella to a host of national and regional programmes
designed to promote new technology inputs emphasizing
new ICTs, selected biotechnologies and new materials
technologies.

technologie, emploi, et
allgement de pauvret

capitale de technologie
incorpore

Technopole refers to a center of high-tech manufacturing


and information-based quaternary industry. These may be
developed by the private sector or by the co-operation or
partnership between the public and private sectors.
Governments of all levels promote them as a panacea for
economies hurt by economic restructuring. Large
corporations and small business locate in technopoles.
Networking between other firms is important and made
possible by technological advances.

technopole


.
.

.

Page 105

Technology
Development Fund,
Egypt

TT

technology transfer

TEPA

technology,
employment and
poverty alleviation

technology-embodied
capital
technopole

)253 (

251

A telephone card, calling card or phone card for short, is a carte de


small plastic card sized and shaped like a credit card, used tlcommunication
to pay for telephone services. In most or all cases the card
itself is not used, knowledge of the access telephone
number to dial and the PIN being sufficient. Standard cards
which can be purchased and used without any sort of
account facility give a fixed amount of credit and are
discarded when used up; others can be topped up, or
collect payment in arrears. The system for payment and
the way in which the card is used to place a telephone call
vary from card to card.


.
.

251

A telecentre is a public place where people can access


centres d'accs
computers, the Internet, and other digital technologies that
enable them to gather information, create, learn, and
communicate with others while they develop essential
digital skills. While each telecentre is different, their
common focus is on the use of digital technologies to
support community, economic, educational, and social
developmentreducing isolation, bridging the digital
divide, promoting health issues, creating economic
opportunities, and reaching out to youth for example

Authority is mandated to: ensuring adequacy of


rgulation de tlcoms
telecommunications services throughout the UAE; achieving
enhancement of services, both in terms of quality and
variety; ensuring quality of service and adherence to terms
of licenses by licensees; encouraging telecommunications
and IT services within the UAE; promoting and enhancing
the telecommunications sector within the UAE; promoting
and developing the telecommunications sector in the UAE
by training, development and the establishment of relevant
training institutions; resolving any disputes between the
licensed operators; establishing and implementing a
regulatory and policy framework; promoting new
technologies; ensuring that the UAE becomes the regional
ICT hub; developing the countrys human capital; and
encouraging research and development

Page 106

telecard

telecentre

telecom regulation

)253 (

251

The TRA is an independent body and its duties and powers


include:

autorit de rgulation
des Tlcoms


) (

(the use of the telephone as an interactive medium for


commercialisation
promotion and sales
distance
Description de la mission confie un comit ou un autre mandat
groupe, prcisant notamment les objectifs des travaux
excuter et dlimitant les sujets qui seront abords.

251

Tertiary education, also referred to as third stage, third


level, and post-secondary education, is the educational
level following the completion of a school providing a
secondary education, such as a high school, secondary
school, or gymnasium. Higher education is taken to include
undergraduate and postgraduate education, while
vocational education and training beyond secondary
education is known as further education in the United
Kingdom, or higher education in the United States

secteur d'enseignement
tertiaire


)(

250

Automatic conversion of text streams to voice

synthse de la parole
partir du texte

protecting the interests of subscribers and users, and


promoting effective and fair competition among established
and new licensed operators.
To develop the Kingdom of Bahrain as the regions most
modern communications hub and to facilitate the
development of the market.
To protect the interests of subscribers and users of
telecommunications services and maintain effective and fair
competition between established and new entrants to the
telecommunications market
autorit de rgulation de
tlcoms d'Oman
300

comit de rgulation des


Tlcoms

Page 107

TRA

TRC

Telecommunication
Regulatory Authority

Telecommunications
Regulatory Authority,
Oman
Telecommunications
Regulatory
Commission, Jordan

telemarketing
ToR

terms of reference

tertiary education
sector

TTS

text-to-speech
synthesis

)253 (

251

a family of standards for mobile telecommunications

3G


.CDMA2000 UMTS EDGE ITU

.
2.5

5.8Mbps 14Mbps
.

is a family of standards for mobile telecommunications


defined by the International Telecommunication Union,[1]
which includes GSM EDGE, UMTS, and CDMA2000 as well
as DECT and WiMAX. Services include wide-area wireless
voice telephone, video calls, and wireless data, all in a
mobile environment. Compared to 2G and 2.5G services,
3G allows simultaneous use of speech and data services
and higher data rates (up to 14.0 Mbit/s on the downlink
and 5.8 Mbit/s uplink ).

services de tlphonie
mobile de 3eme
gnration


WiMAX DECT EDGE

251

a collaboration between groups of telecommunications


associations, to make a globally applicable third generation
(3G) mobile phone system specification within the scope of
the International Mobile Telecommunications-2000 project
of the International Telecommunication Union (ITU). 3GPP
specifications are based on evolved Global System for
Mobile Communications (GSM) specifications. 3GPP
standardization encompasses Radio, Core Network and
Service architecture

projet de partenariat de
troisime gnration


3GPP .
GSM
.

251

is a channel access method for shared medium networks. It accs multiple par
allows several users to share the same frequency channel
rpartition dans le temps
by dividing the signal into different time slots. The users
transmit in rapid succession, one after the other, each
using his own time slot. This allows multiple stations to
share the same transmission medium (e.g. radio frequency
channel) while using only a part of its channel capacity.
TDMA is used in the digital 2G cellular systems such as
Global System for Mobile Communications (GSM), IS-136,
Personal Digital Cellular (PDC) and iDEN, and in the Digital
Enhanced Cordless Telecommunications (DECT) standard
for portable phones. It is also used extensively in satellite
systems, and combat-net radio systems

defined by the International Telecommunication Union,[1]


which includes GSM EDGE, UMTS, and CDMA2000 as well
as DECT and WiMAX. Services include wide-area wireless
voice telephone, video calls, and wireless data, all in a
mobile environment. Compared to 2G and 2.5G services,
3G allows simultaneous use of speech and data services
and higher data rates (up to 14.0 Mbit/s on the downlink
and 5.8 Mbit/s on the uplink with HSPA+). Thus, 3G
networks enable network operators to offer users a wider
range of more advanced services while achieving greater
network capacity through improved spectral efficiency.

3G

third generation
network

3G

third generation of
mobile services

3GPP

third generation
partnership project

.

.
.
.


.DECT

TDMA

time division multiple


access

Page 108

)253 (

251 Time-division multiplexing (TDM) is a type of digital or


multiplexage par

250 (rarely) analog multiplexing in which two or more signals or rpartition dans le temps

bit streams are transferred apparently simultaneously as
.
sub-channels in one communication channel, but are
.
physically taking turns on the channel. The time domain is

divided into several recurrent timeslots of fixed length, one
(
for each sub-channel. A type of multiplexing where two or
.)
more channels of information are transmitted over the
.
same link by allocating a different time interval ("slot" or
"slice") for the transmission of each channel. I.e. the
channels take turns to use the link. Some kind of periodic
synchronising signal or distinguishing identifier is usually
required so that the receiver can tell which channel is which
251

251

50

is an amount of time or a particular time interval. In sounds bloc de temps


and music, a duration is a property of a tone that becomes
one of the bases of rhythm.
is a limit on the period of time or number of iterations or
dure de vie
transmissions in computer and computer network
technology that a unit of data (e.g. a packet) can
experience before it should be discarded.
A token is a string of characters, categorized according to
jeton
the rules as a symbol (e.g. IDENTIFIER, NUMBER, COMMA,
etc.).
domaine de premier
niveau
is a financial estimate. Its purpose is to help consumers
cout total de proprit
and enterprise managers determine direct and indirect
costs of a product or system. It is a management
accounting concept that can be used in full cost accounting
or even Ecological economics where it includes social costs

251

50

Total quality management (TQM) is a management


gestion intgrale de la
philosophy that seeks to integrate all organizational
qualit
functions (marketing, finance, design, engineering, and
production, customer service, etc.) to focus on meeting
customer needs and organizational objectives [1]. TQM
empowers the Total organization, from the employee to the
CEO, with the responsibility of ensuring Quality in their
respective products and services, and Management of their
processes through the appropriate process improvement
channels.
In economics, the difference between the sale price of a
product and the cost of materials to produce it is the value
added

valeur ajoute totale

marque de commerce

(
)..


.
.org. edu. com.

.


- - - - - (
)
.

Page 109

time division
multiplexing

time frame

TTL

time to live

token

TLD


) (
TM

TDM

top-level domain

total cost of ownership

TQM

total quality
management

total value added

trademark

)253 (

50

251

50
251

251

faire une opration


.
.

) (

transaction

TERENA offers a forum to collaborate, innovate and share


knowledge in order to foster the development of Internet
technology, infrastructure and services to be used by the
research and education community

association de rseaux
transeuropens de
recherche et d'ducation

Conveyance of people or goods from one place to another,


especially on a local public transportation system

change de transit

transit exchange

couche transit

transit layer

Local Traffic originating on one Telecommunications


Service Providers network that is delivered by
BellSouth to a different Telecommunications Service
Providers network for termination

trafic transit

Transmission
is one of the core protocols of the Internet Protocol Suite.
protocole TCP
TCP is one of the two original components of the suite (the
other being Internet Protocol, or IP), so the entire suite is
commonly referred to as TCP/IP. Whereas IP handles lowerlevel transmissions from computer to computer as a
message makes its way across the Internet, TCP operates
at a higher level, concerned only with the two end systems,
for example a Web browser and a Web server. In
particular, TCP provides reliable, ordered delivery of a
stream of bytes from a program on one computer to
another program on another computer. Besides the Web,
other common applications of TCP include e-mail and file
transfer. Among its other management tasks, TCP controls
segment size, flow control, the rate at which data is
exchanged, and network traffic congestion
is the set of communications protocols used for the
protocole TCP/IP
Internet and other similar networks. It is named from two
of the most important protocols in it: the Transmission
Control Protocol (TCP) and the Internet Protocol (IP),
which were the first two networking protocols defined in
this standard. Today's IP networking represents a synthesis
of several developments that began to evolve in the 1960s
and 1970s, namely the Internet and LANs (Local Area
Networks), which emerged in the mid- to late-1980s,
together with the advent of the World Wide Web in the
early 1990s.


.
(
.)
.
.
.

) (


.
TCP :
.IP

Page 110

TERENA

Trans-European
Research And
Education Networking
Association

transit traffic

TCP

TCP/IP

transmission
transmission control
protocol

transmission control
protocol/Internet
protocol

)253 (

50

300

300

50
300

couche de transport et
de point limite

A triple-play network is one in which voice, video and data service triple
are all provided in a single access subscription. The most
common applications are Telephony, community antenna
television (CATV) and high-speed Internet service. The
transmission medium may be fiber optic, conventional
cable ("copper") or satellite. Triple-play networks exist in
many parts of the United States and in several other
countries.
A trunk is a line or link designed to handle many signals
rseau radiolectrique
simultaneously, and that connects major switching centers ressources partages
or nodes in a communications system. The transmitted
data can be voice (as in the conventional telephone
system) data, computer programs, images, video or control
signals.
transmission
ressources partages
an amount of capital which a person (the trustor) places in fiducie
custody of a trustee to be administered for the benefit of
another (the beneficiary).

agence tunisienne
d'Internet



.

: .


: .
. CATV

.
.


.
) (

triple play

trunk network

trunk transmission

300

Interactive Television is TV programming with interactive


vote par TV
content and/or enhancements. Interactive TV provides a
richer and more efficient television experience. It can
combine Traditional TV viewing with a back channel (return
path), thus offering the interactivity enjoyed by those
communicating through a network, such as the Internet.
Interactive TV programming can include interactive
advertising, electronic storefronts, electronic
communication with others, richer graphics and links to
Web (or web-like) sites such as walled gardens

.


.

251

is the regulatory process of allowing multiple


dgroupage de boucles
telecommunications operators to use connections from the locales
telephone exchange's central office to the customer's
premises. The physical wire connection between customer
and company is known as a "local loop", and it is owned by
the incumbent local exchange carrier (also referred to as
the "ILEC," "local exchange," or in the United States either
a "Baby Bell" or an Independent telephone company). To
increase competition, other providers are granted
unbundled access



.
.") ("
.

Page 111

transport and endpoint


layer

trust fund

TIA

Tunisian Internet
Agency
TV voting

unbundling local loops

)253 (

251

300

In computer networking, unicast transmission is the


envoi individuel
sending of messages to a single network destination host
on a packet switching network.
The term unicast is formed in analogy to the term
broadcast which means transmitting the same data to all
possible destinations. Another multi-destination distribution
method, multicasting, sends data only to interested
destinations by using special address assignments
format de transfert
Unicode
All registrars must follow the the Uniform Domain-Name
politique de rglement
Dispute-Resolution Policy (often referred to as the "UDRP"). des diffrends sur les
Under the policy, most types of trademark-based domainnoms de domaines
name disputes must be resolved by agreement, court
uniformes
action, or arbitration before a registrar will cancel, suspend,
or transfer a domain name. Disputes alleged to arise from
abusive registrations of domain names (for example,
cybersquatting) may be addressed by expedited
administrative proceedings that the holder of trademark
rights initiates by filing a complaint with an approved
dispute-resolution service provider.


.
""
.

" "


.
.

unicast

UTF
UDRP

unicode transfer format


uniform domain name
dispute resolution
policy

50

adresse universelle

URL .
.
.
.

URL

uniform resource
locator

50

systme d'alimentation
sans coupure


.




" "
.

UPS

uninterruptible power
supply

IJMA3 believes that ICT will serve as a powerful engine for


growth and development in the Middle East.

300

Union des associations


informatiques arabes
(Liban)

Catalogue of United Nations(UN) documents and


systme d'information
publications indexed by the UN Dag Hammarskjld Library bibliographique des
and the Library of the UN Office at Geneva. Also included
nations unies
are commercial publications and other non-UN sources held
in the collection of the Dag Hammarskjld Library. The
coverage of UNBISnet is from 1979 onward, however, older
documents are being added to the catalogue on a regular
basis as a result of retrospective conversion. UNBISnet also
provides instant access to a growing number of full text
resources in the six official languages of the UN (Arabic,
Chinese, English, French, Russian and Spanish), including
resolutions adopted by the General Assembly, the
Economic and Social Council and the Security Council from
1946 onward



.Dag-Hammarskjold
. 1979

- - - (
.) - -
1946

Page 112

Union of Arab ICT


Associations (based in
Lebanon)

UNBISnet United Nations



Bibliographic
Information System

)253 (

300

251

was established in 1964 as a permanent intergovernmental


body. It is the principal organ of the United Nations
General Assembly dealing with trade, investment, and
development issues.

commission des nations


unies pour les lois
internationales de
commerce


) 21- (2205 ( 1966 ) (
.)1966 / 17



UNCITRAL United Nations



Commission on
International Trade Law

confrence des Nations


Unies sur le commerce
et le dveloppement

. 1964

.

.

UNCTAD

compte de
dveloppement des
nations unies

.
.
19
. 28

UNDC

United Nations
Development Account

1976

.

UNIFEM

United Nations
Development Fund for
Women

United Nations
Conference on Trade
and Development

The organization's goals are to "maximize the trade,


investment and development opportunities of developing
countries and assist them in their efforts to integrate into
the world economy on an equitable basis." (from official
website). The creation of the conference was based on
concerns of developing countries over the international
market, multi-national corporations, and great disparity
between developed nations and developing nations.

is a capacity development programme of the United


Nations Secretariat aiming at enhancing capacities of
developing countries in the priority areas of the United
Nations Development Agenda. It is funded from the
Secretariats regular budget and has a biannual budget of
$19 million funding around 28 projects implemented by 10
entities of the Executive Committee of Economic and Social
Affairs
was established in December 1976 It provides financial
and technical assistance to innovative programmes and
strategies that promote womens human rights, political
participation and economic security. Since 1976 it has
supported womens empowerment and gender equality
through its programme offices and links with womens
organizations in the major regions of the world. Its work on
gender responsive budgets began in 1996 in Southern
Africa and has expanded to include East Africa, Southeast
Asia, South Asia, Central America and the Andean region.
It has worked to increase awareness throughout the UN
system of gender responsive budgets as a tool to
strengthen economic governance in all countries

fond des Nations Unies


pour le dveloppement
des Femmes

Page 113

)253 (

251

is the United Nations' global development network. It


advocates for change and connects countries to
knowledge, experience and resources to help people build
a better life. UNDP is on the ground in 166 countries,
working with them on their own solutions to global and
national development challenges. As they develop local
capacity, they draw on the people of UNDP and our wide
range of partners.

programme de
dveloppement des
nations unies

branche des Nations


Unies pour l'conomie
et l'administration
publique



166 .
.


.1999 .

UNDP

United Nations
Development
Programme

UNDPEPA United Nations Division



for Public Economics

and Public
Administration

251

was established in 1947[2][3] to encourage economic


commissariat
cooperation among its member States. It is one of five
conomique des Nations
regional commissions under the administrative direction of Unies pour l'Europe
United Nations headquarters. It has 56 member States, and
reports to the UN Economic and Social Council (ECOSOC).
As well as countries in Europe, it includes the United States
of America, Canada, Israel and the Central Asian republics.
The UNECE secretariat headquarters is in Geneva,
Switzerland and has a budget in the region of $50 million
[2].

1947
. .
56
.

UNECE

United Nations
Economic Commission
for Europe

251

is a specialized agency of the United Nations established on organisation des nations


16 November 1945. Its stated purpose is to contribute to
Unies pour l'ducation
peace and security by promoting international collaboration les Sciences, et la culture
through education, science, and culture in order to further
universal respect for justice, the rule of law, and the
human rights and fundamental freedoms proclaimed in the
UN Charter.[clarification needed][1] It is the heir of the
League of Nations' International Commission on Intellectual
Cooperation.

.1945


.



) (

UNESCO

United Nations
Educational, Scientific
and Cultural
Organization

alliance globale des


2006
nations unies pour les

TICs et le dveloppement

GAID

United Nations Global


Alliance for ICT and
Development

an initiative approved by the United Nations SecretaryGeneral in 2006, was launched after comprehensive
worldwide consultations with governments, the private
sector, civil society, the technical and Internet communities
and academia
is a specialized agency in the United Nations system,
headquartered in Vienna, Austria. The Organization's
primary objective is the promotion and acceleration of
industrial development in developing countries and
countries with economies in transition and the promotion of
international industrial cooperation

organisation des Nations


Unies pour le
dveloppement industriel

Page 114

UNIDO

United Nations
Industrial Development
Organization

)253 (

300

251

was created in November 2001 by the United Nations


Secretary, General Kofi Annan as requested by the
Economic and Social Council.The principal endeavor of the
UN ICT Task Force was to offer policy advice to
governments as well as international organizations in
bridging the digital divide
UNODC was established to assist the UN in better
addressing a coordinated, comprehensive response to the
interrelated issues of illicit trafficking in and abuse of drugs,
crime prevention and criminal justice, international
terrorism, and corruption
is the premier Web site which provides a Web interface to
the electronic resources of the libraries of the UN system of
organizations, and offers powerful search and retrieval
functionality. UNCAPS provides a single point of access to
library catalogs, indexes and abstract databases, library
holdings, links to full-text resources, and archives.

quipe de travail des


Nations Unies sur les
TICs

2001
.

UNICT

United Nations
Information and
Communication
Technologies Task
Force

bureau des Nations


Unies pour les drogues
et la crime

UNODC

United Nations Office


on Drugs and Crime



.

.

UNCAPS

United Nations Shared


Cataloguing and Public
Access System

in February 1998, addresses the growing threat of illicit


computer activity, particularly as it affects critical national
infrastructures. The mission of NIPC is to assess, warn of,
respond to, and investigate illegal acts involving computer
and information technologies, and unlawful acts that
threaten or target our critical infrastructures

centre amricain de
protection
d'infrastructure
nationale

1998


.

United States National


Infrastructure
Protection Centre

refers to the ability of all people to have equal opportunity


and access to a service or product from which they can
benefit, regardless of their social class, ethnicity,
background or physical disabilities. It is a vision, and is
some cases a legal term, that spans many fields, including
education, disability, telecommunications, and healthcare.
It is tied strongly to the concept of human rights.

accs universel

universal access

systme d'archivage
partage aux Nations
Unies

Page 115

)253 (

251

is one of the third-generation (3G) mobile


systme universel de
telecommunications technologies, which is also being
tlcommunication avec
developed into a 4G technology. The first deployment of
les mobiles
the UMTS is the release99 (R99) architecture. It is specified
by 3GPP and is part of the global ITU IMT-2000 standard.
The most common form of UMTS uses W-CDMA (IMT
Direct Spread) as the underlying air interface but the
system also covers TD-CDMA and TD-SCDMA (both IMT
CDMA TDD). Being a complete network system, UMTS also
covers the radio access network (UMTS Terrestrial Radio
Access Network; UTRAN), the core network (Mobile
Application Part; MAP) as well as authentication of users
via USIM cards (Subscriber Identity Module).
Unlike EDGE (IMT Single-Carrier, based on GSM) and
CDMA2000 (IMT Multi-Carrier), UMTS requires new cell
towers and new frequency allocations. However, it is
closely related to GSM/EDGE as it borrows and builds upon
concepts from GSM. Further, most UMTS handsets also
support GSM, allowing seamless dual-mode operation.
Therefore, UMTS is sometimes marketed as 3GSM,
emphasizing the close relationship with GSM and
differentiating it from competing technologies

251

defined by the International Standard ISO/IEC 10646,

jeu de caractres

Information technology Universal multiple-octet coded


universel code sur multicharacter set (UCS) (plus amendments to that standard), is octets
a standard set of characters upon which many character
encodings are based. The UCS contains nearly a hundred
thousand abstract characters, each identified by an
unambiguous name and an integer number called its code
point .
destruction irrversible
de donnes
is a subset of spam that involves nearly identical messages courriel non sollicite
sent to numerous recipients by e-mail. A common synonym
for spam is unsolicited bulk e-mail (UBE). Definitions of
spam usually include the aspects that email is unsolicited
and sent in bulk.
The university enrolled 16,384 undergraduate and 17,024
mise niveau
graduate students and awarded 4,676 bachelor's and 5,380
advanced degrees in 2007. USC's four year, full-time
undergraduate program is classified as "more selective,
higher transfer-in" by the Carnegie Foundation and was
ranked 26th among national universities by U.S. News &
World Report , which classified it as one of the "most
selective universities" for admitting 21% of the 35,809 who
applied for freshman admission in 2008


.
3GPP 1999
CDMA2000 EDGE .IMT-2000
.
GSM UMTS

ISO/IEC 10646

.

) (

.

) (

" "

Page 116

UMTS

universal mobile
telecommunications
system

universal multipleoctet coded character


set

unrecoverable
destruction of data
unsolicited e-mail

upgrade

)253 (

tl versement
rseau usenet

50

interface d'utilisateur

The dynamic modification of a user interface to only show


actions that the user is entitled to perform is often
regarded as an aspect of authorization
refers to various kinds of media content, publicly available,
that are produced by end-users.
The term user generated content entered mainstream
usage during 2005 having arisen in web publishing and
new media content production circles. Its use for a wide
range of applications including problem processing, news,
gossip and research reflects the expansion of media
production through new technologies that are accessible
and affordable to the general public

In computing, a user is a person who uses a computer or


Internet service. A user may have a user account that
identifies the user by a username (also user name)

personnalisation de
l'interface d'utilisateur






.
:


.

upload

usenet

user interface

user interface
customization

contenu gnr par


l'utilisateur


.
2005
.

user-generated content

site web gnr par


l'utilisateur
nom d'utilisateur

" "

user-generated website

251

is popular as a telecommunications industry term for nonservice valeur ajoute


core services or, in short, all services beyond standard
voice calls and fax transmissions but, it can be used in ANY
service industry (eg. Web 2.0) for the services providers
provide for no cost to promote their main service business.
In telecommunication industry on a conceptual level, valueadded services add value to the standard service offering,
spurring the subscriber to use their phone more and
allowing the operator to drive up their ARPU. For mobile
phones, while technologies like SMS, MMS and GPRS are
usually considered value-added services, a distinction may
also be made between standard (peer-to-peer) content and
premium-charged content.




) 2.0 (
.

.

300

Performing activities that increase the value of goods or


services to consumers

cration de valeur
Independence de
vendeur

Page 117

username

value added service

value creation
vendor independence

)253 (

251

250

250

is a type of private equity capital typically provided for


early-stage, high-potential, growth companies in the
interest of generating a return through an eventual
realization event such as an IPO or trade sale of the
company. Venture capital investments are generally made
as cash in exchange for shares in the invested company. It
is typical for venture capital investors to identify and back
companies in high technology industries such as
biotechnology and ICT (information and communication
technology).
<communications, protocol> (VDSL) A form of Digital
Subscriber Line similar to ADSL but providing higher speeds
at reduced lengths.
communications> (VSAT) A kind of ground station used to
contact a communications satellite such as INMARSAT

capital risque

ligne d'abonn
numrique trs haut
dbit
micro station terrienne

251

A videoconference or video conference (also known as a


systme de
videoteleconference ) is a set of interactive
visioconfrence
telecommunication technologies which allow two or more
locations to interact via two-way video and audio
transmissions simultaneously. It has also been called 'visual
collaboration' and is a type of groupware. It differs from a
videophone call in that it is designed to serve a conference
rather than individuals.

250

<storage> (DVD, formerly "Digital Video Disc") An optical


vidodisque
storage medium with improved capacity and bandwidth
compared with the Compact Disc. DVD, like CD, was initally
marketed for entertainment and later for computer users
Streaming is a technique for transferring data such that it
can be processed as a steady and continuous stream.
Video streaming technology is developed based on 2 key
technologies, the video coding technology and scalable
video distribution technology

250

251

technologie de flux de
donnes vido

visioconfrence
<communications> (VoD) A planned system using video
vido la demande
compression to supply programs to viewers when
requested, via ISDN or cable.
Virtual education refers to instruction in a learning
classe virtuelle
environment where teacher and student are separated by
time or space, or both, and the teacher provides course
content through course management applications,
multimedia resources, the Internet, videoconferencing, etc.
Students receive the content and communicate with the


IPO
.


ADSL

VDSL

very high speed digital


subscriber line


INMARSAT

VSAT

very small aperture


terminal


.CD
.


.
:

" "

()
ISDN


.

teacher via the same technologies.[1

Page 118

VC

venture capital

video conference
service

DVD

digital video disk

video stream
technology

VOD

videoconferencing
video-on-demand

virtual classroom

)253 (

The VERCON pilot was aimed at addressing in particular


the needs of small-scale Egyptian farmers through the
exchange of information between agricultural research and
extension, and indirectly the farmers themselves. Now,
government researchers and extension workers based in
rural villages can communicate with colleagues and experts
in the other pilot locations and the capital in seconds rather
than in days

rseau virtuel de
communication pour la
vulgarisation et la
recherche

enseignement virtuel
is a group of hosts with a common set of requirements that rseau local virtuel
communicate as if they were attached to the same
broadcast domain, regardless of their physical location. A
VLAN has the same attributes as a physical LAN, but it
allows for end stations to be grouped together even if they
are not located on the same network switch. Network
reconfiguration can be done through software instead of
physically relocating devices
251

is a provider of management services and a reseller of


operateur virtuel
network services from other telecommunications suppliers
that does not own the telecommunication infrastructure.
These network providers are categorized as virtual because
they provide network services to customers without owning
the underlying network. A VNO typically leases bandwidth
at the wholesale rates from various telecom providers in
order to provide solutions to their customers. The VNO
concept is relatively new in the North American market
when compared to the European and Asian markets.

panneau virtuel des


experts
50

rseau priv virtuel

50

ralit virtuelle


.

.

" "


.


. .


.

.


)(


.




.
.
.

Page 119

virtual extension and


research
communication
network

VLAN

virtual learning
virtual local area
network

virtual operator

VPE

virtual panel of experts

VPN

virtual private network

virtual reality

)253 (

251

is an organization's process of defining its strategy, or


direction, and making decisions on allocating its resources
to pursue this strategy, including its capital and people.
Various business analysis techniques can be used in
strategic planning, including SWOT analysis (Strengths,
Weaknesses, Opportunities, and Threats ), PEST analysis
(Political, Economic, Social, and Technological), STEER
analysis (Socio-cultural, Technological, Economic,
Ecological, and Regulatory factors), and EPISTEL
(Environment, Political, Informatic, Social, Technological,
Economic and Legal).

Vision

251

The 3GPP has defined the Voice Call Continuity (VCC)


specifications in order to describe how a voice call can be
persisted, as a mobile phone moves between circuit
switched and packet switched radio domains (3GPP TS
23.206).

appel vocal

300

Allows a telephone user to participate in conference


passerelle de voix
sessions.
<communications> (VoIP) Any technology providing voice voix sur IP
telephony services over IP connections. The IMTC's
Conferencing over IP Activity Group is trying to standardise
this around H.323.
Synonymous with IP telephony and voice over IP (VoIP), in paquets de voix
which a digital voice stream is broken up into small chunks
(packets) and transmitted over a packet-switched network.

250

300

300

A list of securities selected for special surveillance by a


brokerage, exchange or regulatory organization; firms on
the list are often takeover targets, companies planning to
issue new securities or stocks showing unusual activity

liste de surveillance

Watt
50

navigateur web

A website (also spelled Web site[1]) is a collection of


related web pages, images, videos or other digital assets
that are addressed relative to a common Uniform Resource
Locator (URL), often consisting of only the domain name,
or the IP address, and the root path ('/') in an Internet
Protocol-based network. A web site is hosted on at least
one web server, accessible via a network such as the
Internet or a private local area network.

publication sur web



.
PEST SWOT
.

3GPP

HTML
.

.

Page 120

vision

voice call

voice gateway
VoIP

voice over Internet


protocol

voice packet

watch list

watt
web browser

web publishing

)253 (

300

is content management system (CMS) software,


implemented as a Web application, for creating and
managing HTML content. It is used to manage and control
a large, dynamic collection of Web material (HTML
documents and their associated images). A WCMS
facilitates content creation, content control, editing, and
essential Web maintenance functions.

gestion de contenu web

A blog (a contraction of the term "web log")[1] is a type of


website, usually maintained by an individual with regular
entries of commentary, descriptions of events, or other
material such as graphics or video. Entries are commonly
displayed in reverse-chronological order. "Blog" can also be
used as a verb, meaning to maintain or add content to a
blog
is an attack on a website that changes the visual
appearance of the site. These are typically the work of
system crackers, who break into a web server and replace
the hosted website with one of their own.
A calculation of a firm's cost of capital in which each
category of capital is proportionately weighted. All capital
sources - common stock, preferred stock, bonds and any
other long-term debt - are included in a WACC calculation.
All else help equal, the WACC of a firm increases as the
beta and rate of return on equity increases, as an increase
in WACC notes a decrease in valuation and a higher risk.

blogage sur le web

50

251

dgradation de site web

cot moyen pondr du


capital

rseau tendu
large bande
is an air interface found in 3G mobile telecommunications
accs multiple par
networks. It is the basis of Japan's NTT DoCoMo's FOMA
rpartition en code
service and the most-commonly used member of the UMTS large bande
family and sometimes used as a synonym for UMTS.[1] It
utilizes the DS-CDMA channel access method and the FDD
duplexing method to achieve higher speeds and support
more users compared to most time division multiple access
(TDMA) schemes used today.

is an international treaty on copyright law adopted by the


member states of the World Intellectual Property
Organization (WIPO) in 1996. It provides additional
protections for copyright deemed necessary due to
advances in information technology since the formation of
previous copyright treaties before it.

composant d'interface
graphique
traite de droits d'auteurs
de WIPO

HTML
.


.

.

) (

web-content
management

weblog

website defacement

WACC

weighted average cost


of capital

WAN

wide area network

" "

wideband
.3G W-CDMA wideband code division
DS-CDMA

multiple access
FDD
TDMA

Page 121

widget
WCT

WIPO copyright treaty

)253 (

250

251

<protocol, standard> (WAP) An open international


standard for applications that use wireless communication,
e.g. Internet access from a mobile phone.

is a trademark of the Wi-Fi Alliance that may be used with


certified products that belong to a class of wireless local
area network (WLAN) devices based on the IEEE 802.11
standards. Because of the close relationship with its
underlying standard, the term Wi-Fi is often used as a
synonym for IEEE 802.11 technology.[1

protocole WAP

fournisseur de donnes
sans fil
technologie Wifi

Founded in 2002, the Wireless Internet Institute, LLC, is an institut d'Internet sans
independent forum bringing together stakeholders around fil
the world to accelerate the adoption of wireless Internet in
support of social and economic development and better
managed cities, communities and regions.
251

is a term for the use of a wireless communications link as boucle locale sans fil
the "last mile / first mile" connection for delivering plain old
telephone service (POTS) and/or broadband Internet to
telecommunications customers. Various types of WLL
systems and technologies exist.

WAP

wireless application
protocol

" "

WiFi

.IEEE802.11

Wi-Fi

wireless fidelity

2002

W2i

wireless Internet
institute


. /
.

WLL

wireless local loop

" "

wireless data provider

Other terms for this type of access include Broadband


Wireless Access (BWA), Radio In The Loop (RITL), FixedRadio Access (FRA) and Fixed Wireless Access (FWA).

300

300

Wireless communication is the transfer of information over plateforme sans fil


a distance without the use of electrical conductors or
"wires." The distances involved may be short (a few metres
as in television remote control using infrared light) or long
(thousands or millions of kilometres for radio
communications).
A form of eavesdropping involving physical connection to
disposition de
the communications channels to breach the confidentiality branchement clandestin
of communications. For example, many poorly-secured
buildings have unprotected telephone wiring closets where
intruders may connect unauthorized wires to listen in on
phone conversations and data communications
groupe de travail sur les
noms de domaines
arabes

Page 122

wireless platform

wiretapping provision

WG-AND working group on



Arabic domain names

)253 (

300

According to its terms of reference, the WPIIS monitors,


supervises, direct and co-ordinates the statistical work and
contributes to the development of indicators and
quantitative analyses needed to meet the requirements of
the OECD's Committee for Information, Computer and
Communications Policy (ICCP).

groupe de travail sur les


indicateurs de socit
d'information




OECD

WPIIS

working party on
indicators for the
information society

The WPIIS:
Ensures the continued improvement of the methodology
for the collection of internationally comparable data for
measuring the supply and demand for, and impacts of, ICTs
Compiles ICT statistics and assists in developing and
interpreting statistical indicators which aid formulation of
ICT and related policies, and monitoring progress.

251


.
.

WB

World Bank

is the Bank Groups principal provider of learning activities. institut de banque


It has delivered training courses and seminars since the
internationale
1950s, mostly for government officials in developing
countries on such topics as macroeconomic policy, poverty
reduction, health, education, and policy reform in other
economic sectors.


1950

) (
.

WBI

World Bank Institute

The World Intellectual Property Organization (WIPO) is one organisation mondiale


of the 16 specialized agencies of the United Nations. WIPO de proprit
was created in 1967 "to encourage creative activity, to
intellectuelle
promote the protection of intellectual property throughout
the world

16
1967 .

WIPO

World Intellectual
Property Organization

is an international financial institution that provides


leveraged loans[2] to developing countries for capital
programs. The World Bank has a stated goal of reducing
poverty.

Banque internationale

The World Bank differs from the World Bank Group, in that
the World Bank comprises only two institutions:
International Bank for Reconstruction and Development
(IBRD) and International Development Association (IDA).
Whereas the latter incorporates these two in addition to
three more:[3] International Finance Corporation (IFC),
Multilateral Investment Guarantee Agency (MIGA), and
International Centre for Settlement of Investment Disputes
(ICSID).

251

Page 123

)253 (

251

was a pair of United Nations-sponsored conferences about sommet mondial sur la


information, communication and, in broad terms, the
socit d'information
information society that took place in 2003 in Geneva and
in 2005 in Tunis. One of its chief aims was to bridge the socalled global digital divide separating rich countries from
poor countries by spreading access to the Internet in the
developing world. The conferences established 17 May as
World Information Society Day.


.
2005 2003

.

251

The World Trade Organization (WTO) is an international


organisation de
organization designed by its founders to supervise and
commerce mondial
liberalize international capital trade. The organization
officially commenced on January 1, 1995 under the
Marrakech Agreement, replacing the General Agreement on
Tariffs and Trade (GATT), which commenced in 1947. The
World Trade Organization deals with regulation of trade
between participating countries; it provides a framework
for negotiating and formalising trade agreements, and a
dispute resolution process aimed at enforcing participants'
adherence to WTO agreements which are signed by
representatives of member governments and ratified by
their parliaments.[4][5] Most of the issues that the WTO
focuses on derive from previous trade negotiations,
especially from the Uruguay Round (1986-1994).


1995 .
.GATT

.

50

251

is the main international standards organization for the


World Wide Web (abbreviated WWW or W3).
Founded and headed by Sir Tim Berners-Lee,[2] the
consortium is made up of member organizations which
maintain full-time staff for the purpose of working together
in the development of standards for the World Wide Web.
As of 8 September 2009, the World Wide Web Consortium
(W3C) has 356 members.[1]

Web


. HTTP
HTML
.


) (

consortium W3C

.
Tim Berners Lee
.
. 356 2009

W3C also engages in education and outreach, develops


software and serves as an open forum for discussion about
the Web.

Page 124

WSIS

World Summit on the


Information Society

WTO

World Trade
Organization

WWW

World Wide Web

W3C

World Wide Web


Consortium

)253 (

251

253

is a telecommunications technology that provides wireless


technologie d'accs Wi
transmission of data using a variety of transmission modes, MAX
from point-to-multipoint links to portable and fully mobile
internet access. The technology provides up to 10 Mbit/s
[1] broadband speed without the need for cables. The
technology is based on the IEEE 802.16 standard (also
called Broadband Wireless Access). The name "WiMAX"
was created by the WiMAX Forum, which was formed in
June 2001 to promote conformity and interoperability of
the standard. The forum describes WiMAX[2] as "a
standards-based technology enabling the delivery of last
mile wireless broadband access as an alternative to cable
and DSL".
ordinateur zombie



.
. 10Mbps
2001 WiMax

.DSL

Page 125

WiMAX

worldwide
interoperability for
microwave access

zombie

English
Date
2003

File
ICTD-0305E

2009

ictd-09-7-e

Title
Harmonization of ICT Standards Related to Arabic Language Use in Information
Society Applications
Internet Governance:Challenges and Opportunities for ESCWA Member Countries

2008
2007
2005
2005
2003
2003
2003
2007

ictd-09-3-e
ictd-07-6-e
ictd-05-tech2
ictd-05-1
ictd-03-14-e
ictd-03-12
ictd-03-11-e
ESCWA_ALCATEL_2007

Report on Knowledge Sharing and NETWORKING IN THE ESCWA REGION


ONLINE WORKSHOP ON E-GOVERNMENT: POLICIES AND STRATEGIES
Development of Arabic Domain Names
INFORMATION SOCIETY INDICATORS
ARABIC DOMAIN NAMES SYSTEM (ADNS)
BUILDING THE REGIONAL INFORMATION SOCIETY
REGIONAL PROFILE OF THE INFORMATION SOCIETY IN WESTERN ASIA
Broadband for Development in the ESCWA Region

102
103
104
105
106
107
108
109

2003
2003
2009

ictd-03-8
ictd-03-1-e
Preliminary List of ICT
Terms

TRADE AND TRANSPORT FACILITATION:e-buisness and ICT applications


REVIEW OF INFORMATION AND COMMUNICATIONS
external list (ESCWA)

110
111
200

IEEE-Computer Dictionary Online


wikipedia Online
webopedia.com
http://www.granddictionnaire.com/btml/fra/r_motclef/index800_1.asp
web sites

250
251
252
253
300

2009
2009
2010

Number
100
101

Arabic
Date

File

Title

Number

2004

ICTD-0406A

2009

ictd-09-9-a

2009

ictd-09-4-a

2008

ictd-09-2-a

2008

ictd-08-7-a

0 -

2008

ictd-08-3-a

9 -

2007

ictd-07-tech1-a

2007

ictd-07-16-a

8 -

2007

ictd-07-13-a

2007

ictd-07-12-a

10

2007

ictd-07-1-a

6 -

11

2006

ictd-06-wp-1-a

12

2006

ictd-06-3-a

5 -

13

2006

ictd-06-2-a

14

2005

ictd-05-7-a

4 -

15

2005

ictd-05-6-a

16

2005

ictd-05-5-a

17

2005

ictd-05-4-a

18

2004

ictd-04-4-a

19

2004

ictd-04-3-a

3 -

20

2003

ICTD-03W1-1A

21

2003

ictd-03-10-a

22

2003

ictd-03-9-a

23

2003

ictd-03-6-a

) ( :

24

2003

ictd-03-3-a

25

2003

ictd-03-2-a

26

2003

ictd-03-4-a

27

2000

) (

50

2007

) (

51

1999

) (

52

)(

53

Potrebbero piacerti anche