SlideShare a Scribd company logo
1 of 29
Download to read offline
Key                             Description
CTRL+(   Unhides any hidden rows within the selection.
CTRL+)   Unhides any hidden columns within the selection.
CTRL+&   Applies the outline border to the selected cells.
CTRL+_   Removes the outline border from the selected cells.
CTRL+~   Applies the General number format.
         Applies the Currency format with two decimal places
CTRL+$
         (negative numbers in parentheses).
CTRL+%   Applies the Percentage format with no decimal places.
         Applies the Exponential number format with two decimal
CTRL+^
         places.
CTRL+#   Applies the Date format with the day, month, and year.
         Applies the Time format with the hour and minute, and AM or
CTRL+@
         PM.
         Applies the Number format with two decimal places,
CTRL+!
         thousands separator, and minus sign (-) for negative values.
CTRL+-   Displays the Delete dialog box to delete the selected cells.
         Selects the current region around the active cell (the data area
CTRL+*   enclosed by blank rows and blank columns).
         In a PivotTable, it selects the entire PivotTable report.
CTRL+:   Enters the current time.
CTRL+;   Enters the current date.
         Alternates between displaying cell values and displaying
CTRL+`
         formulas in the worksheet.
         Copies a formula from the cell above the active cell into the
CTRL+'
         cell or the Formula Bar.
         Copies the value from the cell above the active cell into the
CTRL+"
         cell or the Formula Bar.
CTRL++   Displays the Insert dialog box to insert blank cells.
CTRL+1   Displays the Format Cells dialog box.
CTRL+2   Applies or removes bold formatting.
CTRL+3   Applies or removes italic formatting.
CTRL+4   Applies or removes underlining.
CTRL+5   Applies or removes strikethrough.
         Alternates between hiding objects, displaying objects, and
CTRL+6
         displaying placeholders for objects.
CTRL+7   Displays or hides the Standard toolbar.
CTRL+8   Displays or hides the outline symbols.
CTRL+9   Hides the selected rows.
CTRL+0   Hides the selected columns.
         Selects the entire worksheet.
         If the worksheet contains data, CTRL+A selects the current
         region. Pressing CTRL+A a second time selects the entire
         worksheet.
CTRL+A   When the insertion point is to the right of a function name in a
         formula, displays the Function Arguments dialog box.
         CTRL+SHIFT+A inserts the argument names and parentheses
         when the insertion point is to the right of a function name in a
         formula.
CTRL+B   Applies or removes bold formatting.
         Copies the selected cells.
CTRL+C   CTRL+C followed by another CTRL+C displays the
         Microsoft Office Clipboard.
         Uses the Fill Down command to copy the contents and format
CTRL+D
         of the topmost cell of a selected range into the cells below.
         Displays the Find dialog box.
CTRL+F   SHIFT+F5 also displays this dialog box, while SHIFT+F4
         repeats the last Find action.
         Displays the Go To dialog box.
CTRL+G
         F5 also displays this dialog box.
CTRL+H   Displays the Find and Replace dialog box.
CTRL+I   Applies or removes italic formatting.
         Displays the Insert Hyperlink dialog box for new hyperlinks
CTRL+K   or the Edit Hyperlink dialog box for selected existing
         hyperlinks.
CTRL+L   Displays the Create List dialog box.
CTRL+N   Creates a new, blank file.
         Displays the Open dialog box to open or find a file.
CTRL+O
         CTRL+SHIFT+O selects all cells that contain comments.
CTRL+P   Displays the Print dialog box.
         Uses the Fill Right command to copy the contents and format
CTRL+R   of the leftmost cell of a selected range into the cells to the
         right.
         Saves the active file with its current file name, location, and
CTRL+S
         file format.
CTRL+U   Applies or removes underlining.
Inserts the contents of the Clipboard at the insertion point and
CTRL+V   replaces any selection. Available only after you cut or copied
         an object, text, or cell contents.
CTRL+W   Closes the selected workbook window.
CTRL+X   Cuts the selected cells.
CTRL+Y   Repeats the last command or action, if possible.
         Uses the Undo command to reverse the last command or to
         delete the last entry you typed.
CTRL+Z   CTRL+SHIFT+Z uses the Undo or Redo command to reverse
         or restore the last automatic correction when AutoCorrect
         Smart Tags are displayed.




                     Function keys

 Key                              Description
         Displays the Help task pane.
         CTRL+F1 closes and reopens the current task pane.
  F1
         ALT+F1 creates a chart of the data in the current range.
         ALT+SHIFT+F1 inserts a new worksheet.
         Edits the active cell and positions the insertion point at the end
         of the cell contents. It also moves the insertion point into the
  F2     Formula Bar when editing in a cell is turned off.
         SHIFT+F2 edits a cell comment.
         Pastes a defined name into a formula.
  F3
         SHIFT+F3 displays the Insert Function dialog box.
         Repeats the last command or action, if possible.
  F4
         CTRL+F4 closes the selected workbook window.
         Displays the Go To dialog box.
  F5     CTRL+F5 restores the window size of the selected workbook
         window.
         Switches to the next pane in a worksheet that has been split
         (Window menu, Split command).
         SHIFT+F6 switches to the previous pane in a worksheet that
  F6
         has been split.
         CTRL+F6 switches to the next workbook window when more
         than one workbook window is open.
Note When the task pane is visible, F6 and SHIFT+F6
      include that pane when switching between panes.
      Displays the Spelling dialog box to check spelling in the
      active worksheet or selected range.
F7    CTRL+F7 performs the Move command on the workbook
      window when it is not maximized. Use the arrow keys to
      move the window, and when finished press ESC.
      Turns extend mode on or off. In extend mode, EXT appears in
      the status line, and the arrow keys extend the selection.
      SHIFT+F8 enables you to add a non-adjacent cell or range to a
      selection of cells by using the arrow keys.
F8    CTRL+F8 performs the Size command (on the Control menu
      for the workbook window) when a workbook is not
      maximized.
      ALT+F8 displays the Macro dialog box to run, edit, or delete
      a macro.
      Calculates all worksheets in all open workbooks.
      F9 followed by ENTER (or followed by
      CTRL+SHIFT+ENTER for array formulas) calculates the
      selected a portion of a formula and replaces the selected
      portion with the calculated value.
      SHIFT+F9 calculates the active worksheet.
F9    CTRL+ALT+F9 calculates all worksheets in all open
      workbooks, regardless of whether they have changed since the
      last calculation.
      CTRL+ALT+SHIFT+F9 rechecks dependent formulas, and
      then calculates all cells in all open workbooks, including cells
      not marked as needing to be calculated.
      CTRL+F9 minimizes a workbook window to an icon.
      Selects the menu bar or closes an open menu and submenu at
      the same time.
      SHIFT+F10 displays the shortcut menu for a selected item.

F10   ALT+SHIFT+F10 displays the menu or message for a smart
      tag. If more than one smart tag is present, it switches to the
      next smart tag and displays its menu or message.
      CTRL+F10 maximizes or restores the selected workbook
      window.
      Creates a chart of the data in the current range.
F11
      SHIFT+F11 inserts a new worksheet.
ALT+F11 opens the Visual Basic Editor, in which you can
             create a macro by using Visual Basic for Applications (VBA).
             ALT+SHIFT+F11 opens the Microsoft Script Editor, where
             you can add text, edit HTML tags, and modify any script code.
   F12       Displays the Save As dialog box.

                   Other useful shortcut keys

   Key                               Description
             Move one cell up, down, left, or right in a worksheet.
             CTRL+ARROW KEY moves to the edge of the current data
             region (data region: A range of cells that contains data and that is
             bounded by empty cells or datasheet borders.) in a worksheet.
             SHIFT+ARROW KEY extends the selection of cells by one
             cell.
             CTRL+SHIFT+ARROW KEY extends the selection of cells
             to the last nonblank cell in the same column or row as the
             active cell.
ARROW KEYS   LEFT ARROW or RIGHT ARROW selects the menu to the
             left or right when a menu is visible. When a submenu is open,
             these arrow keys switch between the main menu and the
             submenu.
             DOWN ARROW or UP ARROW selects the next or previous
             command when a menu or submenu is open.
             In a dialog box, arrow keys move between options in an open
             drop--down list, or between options in a group of options.
             ALT+DOWN ARROW opens a selected drop down list.
                                                         drop-down
             Deletes one character to the left in the Formula Bar.
BACKSPACE
             Also clears the content of the active cell.
             Removes the cell contents (data and formulas) from selected
             cells without affecting cell formats or comments.
  DELETE
             In cell editing mode, it deletes the character to the right of the
             insertion point.
             Moves to the cell in the lower
                                      lower-right corner of the window
             when SCROLL LOCK is turned on.
             Also selects the last command on the menu when a menu or
             submenu is visible.
   END
             CTRL+END moves to the last cell on a worksheet, in the
             lowest used row of the rightmost used column.
             CTRL+SHIFT+END extends the selection of cells to the last
             used cell on the worksheet (lower
                                        (lower-right corner).
Completes a cell entry from the cell or the Formula Bar, and
            selects the cell below (by default).
            In a data form, it moves to the first field in the next record.
            Opens a selected menu (press F10 to activate the menu bar) or
            performs the action for a selected command.
            In a dialog box, it performs the action for the default
  ENTER     command button in the dialog box (the button with the bold
            outline, often the OK button).
            ALT+ENTER starts a new line in the same cell.
            CTRL+ENTER fills the selected cell range with the current
            entry.
            SHIFT+ENTER completes a cell entry and selects the cell
            above.
            Cancels an entry in the cell or Formula Bar.
   ESC      It also closes an open menu or submenu, dialog box, or
            message window.
            Moves to the beginning of a row in a worksheet.
            Moves to the cell in the upper-left corner of the window when
            SCROLL LOCK is turned on.
            Selects the first command on the menu when a menu or
  HOME
            submenu is visible.
            CTRL+HOME moves to the beginning of a worksheet.
            CTRL+SHIFT+HOME extends the selection of cells to the
            beginning of the worksheet.
            Moves one screen down in a worksheet.
            ALT+PAGE DOWN moves one screen to the right in a
            worksheet.
PAGE DOWN
            CTRL+PAGE DOWN moves to the next sheet in a workbook.
            CTRL+SHIFT+PAGE DOWN selects the current and next
            sheet in a workbook.
            Moves one screen up in a worksheet.
            ALT+PAGE UP moves one screen to the left in a worksheet.
 PAGE UP    CTRL+PAGE UP moves to the previous sheet in a workbook.
            CTRL+SHIFT+PAGE UP selects the current and previous
            sheet in a workbook.
            In a dialog box, performs the action for the selected button, or
SPACEBAR    selects or clears a check box.
            CTRL+SPACEBAR selects an entire column in a worksheet.
SHIFT+SPACEBAR select an entire row in a worksheet.
      CTRL+SHIFT+SPACEBAR select the entire worksheet.
       If the worksheet contains data,
      CTRL+SHIFT+SPACEBAR selects the current region.
      Pressing CTRL+SHIFT+SPACEBAR a second time selects
      the entire worksheet. 
       When an object is selected, CTRL+SHIFT+SPACEBAR
      selects all objects on a worksheet.
      ALT+SPACEBAR displays the Control menu for the Excel
      window.
      Moves one cell to the right in a worksheet.
      Moves between unlocked cells in a protected worksheet.
      Moves to the next option or option group in a dialog box.
TAB   SHIFT+TAB moves to the previous cell in a worksheet or the
      previous option in a dialog box.
      CTRL+TAB switches to the next tab in dialog box.
      CTRL+SHIFT+TAB switches to the previous tab in a dialog
      box.
Control Systems
                Procurement & Maintenance Specifications Terms List

                              SCADA Procurement Project
                          Procurement Specifications Terms List
  The list of terms is critical to ensure there is a common understanding in developing procurement language. The
 objective was to provide definitions that are clear, concise and applicable to the procurement effort. This common
                   terms document will be a living document and can grow and change over time.


ACL (Access Control List) — An access control list is a concept in computer security,
used to enforce privilege separation. It is a means of enforcing the appropriate access rights to a
given object given certain aspects of the user process that is requesting them, principally the
process's user identity. On a router an access list specifies which addresses are allowed to access
services. Access lists can be used to control both inbound and outbound traffic on a router.

Active Directory — Active Directory is an implementation of LDAP directory services by
Microsoft for use in Windows environments. Active Directory allows administrators to assign
enterprise-wide policies, deploy programs to many computers, and apply critical updates to an
entire organization. An Active Directory stores information and settings relating to an
organization in a central, organized, accessible database. Active Directory networks can vary
from a small installation with a few hundred objects, to a large installation with millions of
objects.

AES — AES is the Advanced Encryption Standard (AES) that is a block cipher adopted as an
encryption standard by the US government. It is expected to be used worldwide and analyzed
extensively, as was the case with its predecessor, the Data Encryption Standard (DES). AES was
adopted by National Institute of Standards and Technology (NIST) as US FIPS PUB 197 in
November 2001.

AP (Access Point) — A wireless access point (WAP or AP) is a device that "connects"
wireless communication devices together to create a wireless network. The WAP is usually
connected to a wired network, and can relay data between devices on each side.

API (Application Programming Interface) — APIs are a set of definitions of the
ways in which one piece of computer software communicates with another. It is a method of
achieving abstraction, usually (but not necessarily) between lower-level and higher-level
software.

Asynchronous Transfer Mode (ATM) — ATM is a cell relay network protocol
which encodes data traffic into small fixed-sized (53 byte; 48 bytes of data and 5 bytes of header
information) cells instead of variable sized packets as in packet-switched networks (such as the
Internet Protocol or Ethernet). It is a connection-oriented technology, in which a connection is
established between the two endpoints before the actual data exchange begins.




5/13/2010                                                                                   Page 1 of 13
Control Systems
              Procurement & Maintenance Specifications Terms List

Authentication — Authentication is the process of verifying an identity claimed by or for a
system entity. Also, any security measure designed to establish the validity of a transmission,
message, or originator, or a means of verifying and individual’s eligibility to receive specific
categories of information [http://www.its.bldrdoc.gov/fs-1037/]. As perceived by a computer
user, authentication is generally associated with a password and/or token(s) entered into a host
system for the purpose of gaining access to computer application(s). As examples of user
authentication to a host computer, the authentication mechanism might be a password or string of
characters provided by the user at a prompt (something you know), and/or a token (something
you have), and/or a fingerprint (something you are).

Authorization — Authorization is a right or a permission that is granted to a system entity to
access a system resource.

BPL (Broadband over Power Lines) — Also known as Power Line Communications
(PLC), can transmit data at up to 200Mbps by utilizing normal electrical power lines. Users of
the service would plug their broadband modem into a normal power receptacle.

CHAP — The Challenge-Handshake Authentication Protocol (CHAP) authenticates a user to
an Internet access provider. RFC 1994: PPP Challenge Handshake Authentication Protocol
(CHAP) defines the protocol.


Cleartext — Data in which the semantic information content (i.e., the meaning) is intelligible
or is directly available as opposed to ciphertext which is encrypted.

Client — A Client is any computer whose identification and authorization privileges for
network connection are hosted by a server. An HMI interface (e.g., at operator desks in a
Control Room) is an example of a client computer configuration.


Common Criteria (CC) — ISO/IEC 15408, a standard for evaluating information
technology products and systems, such as operating systems, computer networks, distributed
systems, and applications. It states requirements for security functions and for assurance
measures, which
     addresses data confidentiality, data integrity, and availability,
     focuses on threats to information arising from human activities, malicious or otherwise,
     applies to security measures implemented in hardware, firmware, or software

Configuration Management — The term configuration management has the following
meanings:
    The management of features and assurances (including security) through control of
      changes made to hardware, software, firmware, documentation, test, test fixtures and test
      documentation of an automated information system, throughout the development and
      operational life of a system. Source Code Management or revision control is part of this.


5/13/2010                                                                   Page 2 of 13
Control Systems
              Procurement & Maintenance Specifications Terms List

      The control of changes made to the hardware, software, firmware, and documentation
       throughout the system lifecycle.

Control System — An interconnection of components (computers, sensors, actuators,
communication pathways, etc.) connected or related in such a manner as to command, direct, or
regulate itself or another system (e.g., chemical process plant equipment/system, oil refinery
equipment/systems, electric generation/distribution equipment/systems, water/waste water
systems, manufacturing control systems, etc.).

Data Acquisition — The sampling of the real world to acquire data that can be recorded
and/or manipulated by a computer. Sometimes abbreviated DAQ, data acquisition typically
involves acquisition of signals and waveforms and processing the signals to obtain desired
information.

Database Server — A server hosting a database system (usually an RDBMS) typically used
as a historian and/or business link to the process control environment.

Data Logger — A data logger is an electronic instrument that records digital or analog
measurements over time.

DCS (Distributed Control System) — Distributed control systems are used in
industrial and civil engineering applications to monitor and control distributed equipment with
remote human intervention.

DES — The Data Encryption Standard (DES) is a cipher (a method for encrypting
information) selected as an official Federal Information Processing Standard (FIPS) for the
United States in 1976, and which has subsequently enjoyed widespread use internationally. It is
being replaced by AES.

DNP3 (Distributed Network Protocol) — DNP3 is an open, standards-based
communication protocol commonly used in the utility industry. DNP3 provides multiplexing,
data fragmentation, error checking, link control, prioritization, and layer 2 addressing services
for user data.

DoS (Denial of Service) — An attack on a computer system or network that causes a loss
of service to users, typically the loss of network connectivity and services by consuming the
bandwidth of the victim network or overloading the computational resources of the victim
system. A DDoS (Distributed Denial of Service) attack consists of hundreds or thousands of
globally distributed sources.

Direct-sequence spread spectrum (DSSS) — In telecommunications, direct-
sequence spread spectrum is a modulation technique where the transmitted signal takes up



5/13/2010                                                                      Page 3 of 13
Control Systems
               Procurement & Maintenance Specifications Terms List
more bandwidth than the information signal that is being modulated, which is the reason that it is
called spread spectrum.

Discretionary Access Control (DAC) — Discretionary access control defines basic
access control policies to objects in a file system. Generally, these are done at the discretion of
the object owner -- file/directory permissions and user/group ownership.

Demilitarized Zone (DMZ) — Isolation zone between a protected control network (CN)
and external users, such that all production traffic “flowing” between the CN and those external
users actually flows through an access control device, such as a firewall.

DSL — Digital Subscriber Line (also, ADSL, RDSL) is the typical technology used for
delivering broadband communications over copper circuits. Widely used for home and small
office broadband connection.

EAP — Extensible Authentication Protocol, or EAP (pronounced "eep"), is a universal
authentication mechanism, frequently used in wireless networks and Point-to-Point connections.
Although the EAP protocol is not limited to wireless LAN networks and can be used for wired
LAN authentication, it is most often used in wireless LAN networks. The WPA and WPA2
standard has officially adopted five EAP types as its official authentication mechanisms.

Embedded System/OS — A special-purpose computer controlled electro-mechanical
system in which the computer is completely encapsulated by the device it controls. An embedded
system has specific requirements and performs pre-defined tasks, unlike a general-purpose
personal computer.

Encryption — In cryptography, encryption is the process of obscuring information to make
it unreadable without special knowledge.

Ethernet — Ethernet is a frame-based computer networking technology for local area
networks (LANs). It defines wiring and signaling for the physical layer, and frame formats and
protocols for the media access control (MAC)/data link layer of the OSI model. Ethernet is
mostly standardized as IEEE 802.3.

Factory Acceptance Test — A test conducted at the vendor premise usually by a third-
party to ensure operability of a system according to specifications.

Front End Processor (FEP) — A computer which handles communications processing
for a larger computer. Data collection systems may include a front end processor which accepts
data from instruments and partially processes it before transfer to a larger computer.




5/13/2010                                                                       Page 4 of 13
Control Systems
              Procurement & Maintenance Specifications Terms List

Frequency-hopping spread spectrum (FHSS) — Frequency-hopping spread
spectrum (FHSS) is a spread-spectrum method of transmitting radio signals by rapidly
switching a carrier among many frequency channels, using a pseudorandom sequence known to
both transmitter and receiver.

FIELDBUS — Fieldbus control system is a form of decentralized control which links
PLC's via a Controller Area Network (CAN) to control the manufacturing processes at the
workshop-floor level. Such systems include Profibus, Netbus, LonWorks, Industrial Ethernet
and many others.

Firewall — Firewall is hardware and/or software which functions in a networked environment
to prevent some communications forbidden by the security policy. It has the basic task of
controlling traffic between different zones of trust. Typical zones of trust include the Internet (a
zone with no trust) and an internal network (a zone with higher trust).

FTP (File Transfer Protocol) — The File Transfer Protocol is a software standard for
transferring computer files between machines. It belongs to the application layer of the TCP/IP
protocol suite. Since FTP is non-secure it is being replaced by sftp - Secure File Transfer
Protocol.

Gateway — Gateway in a communications network is a network node equipped for
interfacing with another network that uses different protocols.

GPRS — GPRS is the General Packet Radio Service a standard for digital overlay on the GSM
digital cellular system. It allows high speed digital and IP connections to be established using
existing GSM voice infrastructure and is generally used to provide IP connectivity to RTUs.

GSM — GSM is Global System for Mobile communications. It is the most common digital
cellular system. GSM can be used for both voice and data applications. It is also used to provide
serial communications to RTUs.

Hardened System/OS — Hardened hardware and/or software that has been modified with
high security and hardening features, packages and enhanced toolkits, kernel patches and other
cryptography and security related enhancements.

HMI (Human-Machine Interface) — A term that refers to the "layer" that separates a
human that is operating a machine from the machine itself. One example of a HMI is the
computer hardware and software that enables a single operator to monitor and control large
machinery remotely.




5/13/2010                                                                      Page 5 of 13
Control Systems
              Procurement & Maintenance Specifications Terms List

Host-based intrusion detection system (HIDS) — HIDS is an application that
detects possible malicious activity on a host from characteristics such as change of files (file
system integrity checker), operating system call profiles, etc.


Hyper-text Transfer Protocol (HTTP) — HTTP is a request/response protocol
between clients and servers. The originating client, such as a web browser, spider, or other end-
user tool, is referred to as the user agent. The destination server, which stores or creates
resources such as HTML files and images, is called the origin server.

ICMP — Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet
protocol suite. It is chiefly used by networked computers' operating systems to test other systems
and return error messages—indicating, for instance, that a requested service is not available or
that a host or router could not be reached.

IDS (Intrusion Detection System) — An IDS is software or an appliance used to
detect unauthorized access or malicious or abnormal operation to a computer system or network.
IDS systems that operate on a host to detect malicious activity are called host-based IDS systems
or HIDS, and IDS systems that operate on network data flows are called network-based IDS
systems or NIDS.

IEC — International Electrotechnical Commission, is a European standards body which has
developed IEC60870-5 series of SCADA protocols. IEC is now working on IEC-62351 a secure
protocol envelope for DNP3 and IEC60870-5.

IED (Intelligent Electronic Device) — A device on the network that contains an
embedded system (an embedded system is a special-purpose computer system, which is
completely encapsulated by the device it controls).

Inter-Control Center Communications Protocol (ICCP) — A standard real-
time network protocol for data exchange over wide area networks. ICCP is the most common
communications protocol between RTO/ISO and control centers (aka, Telecontrol Application
Service Element.2 (TASE.2)).

IP (Internet Protocol) — A data-oriented protocol used by source and destination hosts
for communicating data across a packet-switched internetwork. Data in an IP internetwork are
sent in blocks referred to as packets or datagrams (the terms are basically synonymous in IP).

IPS (Intrusion Prevention System) — Any hardware and/or software system that
proactively exercises access control to protect computers from exploitation. "Intrusion
prevention" technology is considered by some to be an extension of intrusion detection (IDS)




5/13/2010                                                                       Page 6 of 13
Control Systems
               Procurement & Maintenance Specifications Terms List
technology, but it is actually another form of access control, like an application layer firewall,
that uses knowledge of malicious behavior.

IPSec — IPsec is a set of cryptographic protocols for securing packet flows and key exchange.
Of the former, there are two: Encapsulating Security Payload (ESP) provides authentication, data
confidentiality and message integrity; Authentication Header (AH) provides authentication and
message integrity, but does not offer confidentiality. Originally AH was only used for integrity
and ESP was used only for encryption; authentication functionality was added subsequently to
ESP.

IPv6 (Internet Protocol version 6) — IPv6 is version 6 of the Internet Protocol; IPv6
is intended to replace the current standard, IPv4.

ISO (International Organization for Standardization) — The International
Organization for Standardization, also known as ISO, is global network of the national
standards bodies of 156 countries dedicated to technical standards development.

L2TP — The Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support
virtual private networks (VPNs). L2TP can be described as "PPP over IP" with additional
features.


LAN (Local Area Network) — A LAN is a computer network that spans a relatively
small area. Most LANs are confined to a single building or group of buildings (campus).

LDAP — The Lightweight Directory Access Protocol, or LDAP, is a networking protocol for
querying and modifying directory services running over TCP/IP. An LDAP directory usually
follows the X.500 model: It is a tree of entries, each of which consists of a set of named
attributes with values.

LINUX — LINUX is a computer operating system. It is among the most famous examples of
free software and of open-source development.

MAC (Media Access Control) Address — A media access control address (MAC
address) is a unique identifier attached to most forms of networking equipment. It is used at
layer 2 of the OSI protocol. Most layer 2 network protocols use one of three numbering spaces
managed by the IEEE: MAC-48, EUI-48, and EUI-64, which are designed to be globally
unique.

Malware — Malware is malicious software designed to infiltrate or damage a computer
system, without the owner's consent. Malware is commonly taken to include computer viruses,
worms, Trojan horses, rootkits, spyware and adware.



5/13/2010                                                                       Page 7 of 13
Control Systems
               Procurement & Maintenance Specifications Terms List

MODEM — A modem is a device that modulates an analog carrier signal (sound), to encode
digital information, and that also demodulates such a carrier signal to decode the transmitted
information.

NAT — NAT is the process of network address translation and involves re-writing the
source and/or destination address of IP packets as they pass through a router or firewall. NAT is
used to enable multiple hosts on a private network to access the Internet using a single public IP
address.

Network-based intrusion detection system (NIDS) — Application that reads all
packets, not just those sent to it, from a network and detects potentially malicious packets based
on rules or algorithms.

Network Topology — Network topology is the network structure (logical and/or physical)
that may be represented as a collection of nodes, some of which are connected by links. Bus
topology: A bus network is such that there is a single line (the bus) to which all nodes are
connected and the nodes connect only to this bus. Mesh topology: A network topology in which
there are at least two nodes with two or more paths between them. Ring topology: A network
topology in which every node has exactly two branches connected to it. Star topology: A
network topology in which peripheral nodes are connected to a central node only when using a
hub. The more commonly used switch does not rebroadcast to all nodes, including the
originating node. Tree topology: A network topology in which the nodes are arranged as a tree.
A hybrid topology is a combination of any two or more network topologies in such a way that
the resulting network does not have one of the standard forms.

Network File System (NFS) — NFS is a file system which allows a computer to access
files over a network as easily as if they were on its local disks.

NIDS — Network Intrusion Detection System is a hardware tool which monitors IP traffic on
a network segment (or segments) to detect unauthorized access to a computer system or network.

OPC (Open Connectivity via Open Standards) — OPC is open connectivity in
industrial automation and the enterprise systems that support industry. Interoperability is assured
through the creation and maintenance of open standards specifications. OPC has been termed
“OLE for Process Control”.

Open Systems Interconnection Reference Model (OSI) — The Open Systems
Interconnection Reference Model is a layered abstract description for communications and
computer network protocol design, developed as part of the Open Systems Interconnect
initiative. It is also called the OSI seven layer model as follows: Physical layer Layer 1; Data
link layer Layer 2; Network layer Layer 3; Transport layer Layer 4; Session layer Layer 5;
Presentation layer Layer 6; Application layer Layer 7.



5/13/2010                                                                      Page 8 of 13
Control Systems
              Procurement & Maintenance Specifications Terms List

Patch — A fix for a software program where the actual binary executable and related files are
modified.

PCI Express — PCI Express is an implementation of the PCI computer bus that uses existing
PCI programming concepts and communications standards, but bases it on a much faster serial
communications system.

PCS (Process Control System) — A generic term applied to the hardware, firmware,
communications, and software used to enable automation of the physical systems.

PEAP — Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP
(pronounced "peep"), is a method to securely transmit authentication information, including
passwords, over wireless networks. It was jointly developed by Microsoft, RSA Security and
Cisco Systems. It is an IETF open standard.

PID (Proportional-Integral-Derivative controller) — A standard feedback loop
component in industrial control applications. It measures an "output" of a process and controls
an "input", with a goal of maintaining the output at a target value, which is called the "setpoint".

PLC (Programmable Logic Controller) — A small computer used for automation
of real-world processes, such as control of machinery on factory assembly lines.

Port — Hardware Port: A hardware port is an outlet on a piece of equipment into which a
plug or cable connects. Network port: A network port is an interface for communicating with
a computer program over a network. I/O or machine port - port-mapped I/O: Nearly all
processor families use the same assembly instructions for both memory access and hardware I/O.
Software port: Software is sometimes written for specific processors, operating systems, or
programming interfaces. A software port is software that has been changed to work on another
system.

PPP — The Point-to-Point Protocol, or PPP, is commonly used to establish a direct connection
between two nodes. It can connect computers using serial cable, phone line, trunk line, cellular
telephone, specialized radio links, or fiber optic links. Most internet service providers use PPP
for dial-up access to the Internet.


Process Control — An engineering discipline that deals with architectures, mechanisms,
and algorithms for controlling the output of a specific process. For example, heating up the
temperature in a room is a process that has the specific, desired outcome to reach and maintain a
defined temperature (e.g. 20°C), kept constant over time. Here, the temperature is the controlled
variable. At the same time, it is the input variable since it is measured by a thermometer and
used to decide whether to heat or not to heat. The desired temperature (20°C) is the set point.



5/13/2010                                                                       Page 9 of 13
Control Systems
               Procurement & Maintenance Specifications Terms List
The state of the heater (e.g., the setting of the valve allowing hot water to circulate through it) is
called the manipulated variable since it is subject to control actions.

PROFIBUS (Process Field Bus) — PROFIBUS is the most popular type of fieldbus
for factory and industrial automation with worldwide more than 10 million nodes (2004) in use.

Proxy Server — Computer process – often used as, or as part of, a firewall – that relays a
protocol between client and server computer systems, by appearing to the client to be the server
and appearing to the server to be the client.

PSTN (Public Switched Telephone Network) — The public telephone system in
the United States used for voice and data communications.

Public Key Infrastructure (PKI) — In cryptography, a public key infrastructure (PKI)
is an arrangement using digital certificates which provides for third-party vetting of, and
vouching for, user identities.

QoS (Quality of Service) — In packet-switched networks QoS refers to the probability
of the network meeting a given traffic contract, or in many cases is used informally to refer the
probability of a packet passing between two points in the network.

RADIUS — Remote Authentication Dial-In User Service is an authentication, authorization
and accounting protocol for applications such as network access or IP mobility. It is intended to
work in both local and roaming situations. The RADIUS server checks that the information is
correct using authentication schemes like PAP, CHAP or EAP.

RBAC (Role Based Access Control) — An approach to restricting system access to
authorized users. It is a newer and alternative approach to Mandatory Access Control (MAC) and
Discretionary Access Control (DAC).

Rootkits — Rootkits are sets of programs which are introduced into a computer system
without permission of the computer operator to obtain privileged access which would allow
control of the computer, usually with capabilities to avoid detection.

Router — A router is a computer networking device that forwards data packets toward their
destinations between disparate networks through a process known as routing. Routing occurs at
layer 3 of the OSI seven-layer model. Routers can implement other functions and the

RTU (Remote Terminal Unit) — An RTU, or Remote Terminal Unit is a device
which interfaces objects in the physical world to a DCS or SCADA system by transmitting
telemetry data to the system and/or altering the state of connected objects based on control
messages received from the system.



5/13/2010                                                                       Page 10 of 13
Control Systems
               Procurement & Maintenance Specifications Terms List


SCADA (Supervisory Control and Data Acquisition) — A SCADA computer
system is developed for gathering and analyzing real time data. SCADA systems are used to
monitor and control a plant or equipment in industries such as telecommunications, water and
waste control, energy, oil and gas refining and transportation.

Serial Communications — Serial communications is the process of sending data one bit
at one time, sequentially, over a communications channel or computer bus. Serial
communications is used for all long-haul communications and most computer networks, where
the cost of cable and synchronization difficulties makes parallel communications impractical.
Serial computer busses are becoming more common as improved technology enables them to
transfer data at higher speeds.

Server — A server is a computer or device on a network that manages network resources.         For
example, a file server is a computer and storage device dedicated to storing files, a web server
for access to web content, a DNS server for domain name services, a database server for access
to relational tables, an email server for access to email, etc.

Server Message Block (SMB) — Server Message Block (SMB) is a network protocol
mainly applied to share files, printers, serial ports, and miscellaneous communications between
nodes on a network. It also provides an authenticated Inter-process communication mechanism.

Synchronous optical networking (SONET) — The Synchronous optical
network, commonly known as SONET, is a standard for communicating digital information
using lasers or light emitting diodes (LEDs) over optical fiber as defined by GR-253-CORE from
Telcordia.

SPP-ICS (System Protection Profile – Industrial Control Systems) — A
document developed by the National Institute of Standards and Technology (NIST) that
identifies a starting point for formally stating the security requirements for industrial control
systems in a logical and structured manner.

SSH — Secure Shell Terminal Emulation communications protocol widely used for remote
RTU configuration/ diagnostic.

SSID (Service Set Identifier) — A service set identifier (SSID) is a code attached to
all packets on a wireless network to identify each packet as part of that network.

SSL (Secure Sockets Layer) — Secure Sockets Layer (SSL) and Transport Layer
Security (TLS), its successor, are cryptographic protocols which provide secure
communications over TCP/IP.




5/13/2010                                                                       Page 11 of 13
Control Systems
              Procurement & Maintenance Specifications Terms List

Stateful Firewall — A stateful firewall is a firewall that keeps track of the state of network
connections (such as TCP streams) traveling across it. Source packets are entered into the state
table. Response packets are checked against the state table and only those packets constituting a
proper response are allowed through the firewall.

Switch — A network switch is a computer networking device that serves as a connection
point for devices in a network. A switch forwards packets to the appropriate port based on the
packet’s address.

TCP (Transmission Control Protocol) — TCP is one of the main protocols in
TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to
establish a connection and exchange streams of data over many packets. TCP includes
mechanisms and protocols to ensure delivery of the data in the correct sequence from source to
destination.

Telnet — Telenet is a terminal emulation communications protocol widely used for remote
RTU configuration/ diagnostic. Telenet is being replaced by SSH.

Terminal Server — A device used as an interface between Network (IP) communications
and serial communication communications.

TLS (Transport Layer Security) — See SSL.

UDP (User Datagram Protocol) — UDP is a connection-less transport layer protocol
that is currently documented in IETF RFC 768. In the TCP/IP model, UDP provides a very
simple interface between a network layer below and an application layer above. UDP has no
mechanism to ensure delivery of the data in the packets nor can it ensure that delivery of the
packets is in the proper sequence. If desired, this must be performed by the application layer.

Upgrade — Generally an upgrade is a new release of software, hardware and/or firmware
replacing the original components to fix errors and/or vulnerabilities in software and/or provide
additional functionality and/or improve performance.

URL (Uniform Resource Locator) — URL is a standardized address for some
resource (such as a document or image) on the Internet (or elsewhere).


USB (Universal Serial Bus) — Universal Serial Bus (USB) provides a serial bus
standard for connecting devices, usually to a computer, but it also is in use on other devices.

Virus — See Malware.


5/13/2010                                                                     Page 12 of 13
Control Systems
              Procurement & Maintenance Specifications Terms List

VLAN (Virtual LAN) — A virtual LAN, commonly known as a VLAN, is a logically
segmented network mapped over physical hardware.

VPN (Virtual Private Network) — A private, encrypted communications network
usually used within a company, or by several different companies or organizations, used for
communicating in a software tunnel over a public network.

VoIP — Voice over Internet Protocol (also called VoIP, IP Telephony, Internet telephony,
and Digital Phone) is the routing of voice conversations over the Internet or any other IP-based
network. The voice data flows over a general-purpose packet-switched network, instead of
traditional dedicated, circuit-switched voice transmission lines.

WEP (Wired Equivalent Privacy) — WEP is part of the IEEE 802.11 standard, and is
a protocol used to secure wireless networks (WiFi).

WiFi (Wireless Fidelity) — Short for wireless fidelity and is meant to be used
generically when referring of any type of 802.11 network, whether 802.11b/a/g dual-band, etc.

WiMax (Worldwide Interoperability of Microwave Access) — WiMax is
the name commonly given to the IEEE 802.16 standard. A wireless protocol designed for
distances as far as 30 miles but more commonly 3 – 5 miles.

WPA — Wi-Fi Protected Access (WPA and WPA2) are wireless standards providing higher
levels of security than WEP. WPA2 is based on IEEE 802.11i and provides government grade
security based on NIST standards and AES encryption.




5/13/2010                                                                   Page 13 of 13
Glossary

This glossary is only a tiny subset of all of the various terms and other things that people
regularly use on The Net. For a more complete (and very entertaining) reference, it's suggested
you get a copy of The New Hacker's Dictionary, which is based on a VERY large text file called
the Jargon File. Edited by Eric Raymond (eric@snark.thyrsus.com), it is available from the
MIT Press, Cambridge, Massachusetts, 02142; its ISBN number is 0-262-68069-6. Also see
RFC-1208, A Glossary of Networking Terms.

:-)

         This odd symbol is one of the ways a person can portray ``mood'' in the very flat medium of
         computers---by using ``smilies.'' This is `metacommunication', and there are literally hundreds of
         them, from the obvious to the obscure. This particular example expresses ``happiness.'' Don't
         see it? Tilt your head to the left 90 degrees. Smilies are also used to denote sarcasm.

address resolution

         Conversion of an Internet address to the corresponding physical address. On an ethernet,
         resolution requires broadcasting on the local area network.

administrivia

         Administrative tasks, most often related to the maintenance of mailing lists, digests, news
         gateways, etc.

anonymous FTP

         Also known as ``anon FTP''; a service provided to make files available to the general Internet
         community---see section Anonymous FTP.

ANSI

         The American National Standards Institute disseminates basic standards like ASCII, and acts as
         the United States' delegate to the ISO. Standards can be ordered from ANSI by writing to the
         ANSI Sales Department, 1430 Broadway, New York, NY 10018, or by telephoning (212) 354-
         3300.

archie

         A service which provides lookups for packages in a database of the offerings of countless of
         anonymous FTP sites. See section The archie Server for a full description.

archive server


                                                                                                   Page | 1
An email-based file transfer facility offered by some systems.

ARPA (Advanced Research Projects Agency)

         Former name of DARPA, the government agency that funded ARPAnet and later the DARPA
         Internet.

ARPAnet

         A pioneering long haul network funded by ARPA. It served as the basis for early networking
         research as well as a central backbone during the development of the Internet. The ARPAnet
         consisted of individual packet switching computers interconnected by leased lines. The ARPAnet
         no longer exists as a singular entity.

asynchronous

         Transmission by individual bytes, not related to specific timing on the transmitting end.

auto-magic

         Something which happens pseudo-automatically, and is usually too complex to go into any
         further than to say it happens ``auto-magically.''

backbone

         A high-speed connection within a network that connects shorter, usually slower circuits. Also
         used in reference to a system that acts as a ``hub'' for activity (although those are becoming
         much less prevalent now than they were ten years ago).

bandwidth

         The capacity of a medium to transmit a signal. More informally, the mythical ``size'' of The Net,
         and its ability to carry the files and messages of those that use it. Some view certain kinds of
         traffic (FTPing hundreds of graphics images, for example) as a ``waste of bandwidth'' and look
         down upon them.

BITNET (Because It's Time Network)

         An NJE-based international educational network.

bounce

         The return of a piece of mail because of an error in its delivery.

btw

         An abbreviation for ``by the way.''



                                                                                                     Page | 2
CFV (Call For Votes)

         Initiates the voting period for a Usenet newsgroup. At least one (occasionally two or more)
         email address is customarily included as a repository for the votes. See See section Newsgroup
         Creation for a full description of the Usenet voting process.

ClariNews

         The fee-based Usenet newsfeed available from ClariNet Communications.

client

         The user of a network service; also used to describe a computer that relies upon another for
         some or all of its resources.

Cyberspace

         A term coined by William Gibson in his fantasy novel Neuromancer to describe the ``world'' of
         computers, and the society that gathers around them.

datagram

         The basic unit of information passed across the Internet. It contains a source and destination
         address along with data. Large messages are broken down into a sequence of IP datagrams.

disassembling

         Converting a binary program into human-readable machine language code.

DNS (Domain Name System)

         The method used to convert Internet names to their corresponding Internet numbers.

domain

         A part of the naming hierarchy. Syntactically, a domain name consists of a sequence of names or
         other words separated by dots.

dotted quad

         A set of four numbers connected with periods that make up an Internet address; for example,
         147.31.254.130.

email

         The vernacular abbreviation for electronic mail.

email address


                                                                                                  Page | 3
The UUCP or domain-based address that a user is referred to with. For example, the author's
         address is brendan@cs.widener.edu.

ethernet

         A 10-million bit per second networking scheme originally developed by Xerox Corporation.
         Ethernet is widely used for LANs because it can network a wide variety of computers, it is not
         proprietary, and components are widely available from many commercial sources.

FDDI (Fiber Distributed Data Interface)

         An emerging standard for network technology based on fiber optics that has been established
         by ANSI. FDDI specifies a 100-million bit per second data rate. The access control mechanism
         uses token ring technology.

flame

         A piece of mail or a Usenet posting which is violently argumentative.

FQDN (Fully Qualified Domain Name)

         The FQDN is the full site name of a system, rather than just its hostname. For example, the
         system lisa at Widener University has a FQDN of lisa.cs.widener.edu.

FTP (File Transfer Protocol)

         The Internet standard high-level protocol for transferring files from one computer to another.

FYI

         An abbreviation for the phrase ``for your information.'' There is also a series of RFCs put out by
         the Network Information Center called FYIs; they address common questions of new users and
         many other useful things. See section Requests for Comments for instructions on retrieving FYIs.

gateway

         A special-purpose dedicated computer that attaches to two or more networks and routes
         packets from one network to the other. In particular, an Internet gateway routes IP datagrams
         among the networks it connects. Gateways route packets to other gateways until they can be
         delivered to the final destination directly across one physical network.

header

         The portion of a packet, preceding the actual data, containing source and destination addresses
         and error-checking fields. Also part of a message or news article.

hostname


                                                                                                  Page | 4
The name given to a machine. (See also FQDN.)

IMHO (In My Humble Opinion)

         This usually accompanies a statement that may bring about personal offense or strong
         disagreement.

Internet

         A concatenation of many individual TCP/IP campus, state, regional, and national networks (such
         as NSFnet, ARPAnet, and Milnet) into one single logical network all sharing a common
         addressing scheme.

Internet number

         The dotted-quad address used to specify a certain system. The Internet number for the site
         cs.widener.edu is 147.31.254.130. A resolver is used to translate between hostnames and
         Internet addresses.

interoperate

         The ability of multi-vendor computers to work together using a common set of protocols. With
         interoperability, PCs, Macs, Suns, Dec VAXen, CDC Cybers, etc, all work together allowing one
         host computer to communicate with and take advantage of the resources of another.

ISO (International Organization for Standardization)

         Coordinator of the main networking standards that are put into use today.

kernel

         The level of an operating system or networking system that contains the system-level
         commands or all of the functions hidden from the user. In a Unix system, the kernel is a program
         that contains the device drivers, the memory management routines, the scheduler, and system
         calls. This program is always running while the system is operating.

LAN (Local Area Network)

         Any physical network technology that operates at high speed over short distances (up to a few
         thousand meters).

mail gateway

         A machine that connects to two or more electronic mail systems (especially dissimilar mail
         systems on two different networks) and transfers mail messages among them.

mailing list


                                                                                                Page | 5
A possibly moderated discussion group, distributed via email from a central computer
         maintaining the list of people involved in the discussion.

mail path

         A series of machine names used to direct electronic mail from one user to another.

medium

         The material used to support the transmission of data. This can be copper wire, coaxial cable,
         optical fiber, or electromagnetic wave (as in microwave).

multiplex

         The division of a single transmission medium into multiple logical channels supporting many
         simultaneous sessions. For example, one network may have simultaneous FTP, telnet, rlogin,
         and SMTP connections, all going at the same time.

net.citizen

         An inhabitant of Cyberspace. One usually tries to be a good net.citizen, lest one be flamed.

netiquette

         A pun on ``etiquette''; proper behavior on The Net. See section Usenet ``Netiquette''.

network

         A group of machines connected together so they can transmit information to one another.
         There are two kinds of networks: local networks and remote networks.

NFS (Network File System)

         A method developed by Sun Microsystems to allow computers to share files across a network in
         a way that makes them appear as if they're ``local'' to the system.

NIC

         The Network Information Center.

node

         A computer that is attached to a network; also called a host.

NSFnet

         The national backbone network, funded by the National Science Foundation and operated by
         the Merit Corporation, used to interconnect regional (mid-level) networks such as WestNet to
         one another.

                                                                                                  Page | 6
packet

          The unit of data sent across a packet switching network. The term is used loosely. While some
          Internet literature uses it to refer specifically to data sent across a physical network, other
          literature views the Internet as a packet switching network and describes IP datagrams as
          packets.

polling

          Connecting to another system to check for things like mail or news.

postmaster

          The person responsible for taking care of mail problems, answering queries about users, and
          other related work at a site.

protocols

          A formal description of message formats and the rules two computers must follow to exchange
          those messages. Protocols can describe low-level details of machine-to-machine interfaces (e.g.,
          the order in which bits and bytes are sent across a wire) or high-level exchanges between
          allocation programs (e.g., the way in which two programs transfer a file across the Internet).

recursion

          The facility of a programming language to be able to call functions from within themselves.

resolve

          Translate an Internet name into its equivalent IP address or other DNS information.

RFD (Request For Discussion)

          Usually a two- to three-week period in which the particulars of newsgroup creation are battled
          out.

route

          The path that network traffic takes from its source to its destination.

router

          A dedicated computer (or other device) that sends packets from one place to another, paying
          attention to the current state of the network.

RTFM (Read The Fantastic Manual)




                                                                                                   Page | 7
.This anacronym is often used when someone asks a simple or common question. The word
         `Fantastic' is usually replaced with one much more vulgar.

SMTP (Simple Mail Transfer Protocol)

         The Internet standard protocol for transferring electronic mail messages from one computer to
         another. SMTP specifies how two mail systems interact and the format of control messages they
         exchange to transfer mail.

server

         A computer that shares its resources, such as printers and files, with other computers on the
         network. An example of this is a Network File System (NFS) server which shares its disk space
         with other computers.

signal-to-noise ratio

         When used in reference to Usenet activity, signal-to-noise ratio describes the relation
         between amount of actual information in a discussion, compared to their quantity. More often
         than not, there's substantial activity in a newsgroup, but a very small number of those articles
         actually contain anything useful.

signature

         The small, usually four-line message at the bottom of a piece of email or a Usenet article. In
         Unix, it's added by creating a file .signature in the user's home directory. Large signatures are
         a no-no.

summarize

         To encapsulate a number of responses into one coherent, usable message. Often done on
         controlled mailing lists or active newsgroups, to help reduce bandwidth.

synchronous

         Data communications in which transmissions are sent at a fixed rate, with the sending and
         receiving devices synchronized.

TCP/IP (Transmission Control Protocol/Internet Protocol)

         A set of protocols, resulting from ARPA efforts, used by the Internet to support services such as
         remote login (telnet), file transfer (FTP) and mail (SMTP).

telnet




                                                                                                   Page | 8
The Internet standard protocol for remote terminal connection service. Telnet allows a user at
        one site to interact with a remote timesharing system at another site as if the user's terminal
        were connected directly to the remote computer.

terminal server

        A small, specialized, networked computer that connects many terminals to a LAN through one
        network connection. Any user on the network can then connect to various network hosts.

@TeX

        A free typesetting system by Donald Knuth.

twisted pair

        Cable made up of a pair of insulated copper wires wrapped around each other to cancel the
        effects of electrical noise.

UUCP (Unix to Unix Copy Program)

        A store-and-forward system, primarily for Unix systems but currently supported on other
        platforms (e.g. VMS and personal computers).

WAN (Wide-Area Network)

        A network spanning hundreds or thousands of miles.

workstation

        A networked personal computing device with more power than a standard IBM PC or
        Macintosh. Typically, a workstation has an operating system such as unix that is capable of
        running several tasks at the same time. It has several megabytes of memory and a large, high-
        resolution display. Examples are Sun workstations and Digital DECstations.

worm

        A computer program which replicates itself. The Internet worm (see section The Internet Worm)
        was perhaps the most famous; it successfully (and accidentally) duplicated itself on systems
        across the Internet.

wrt

        With respect to.




                                                                                                Page | 9

More Related Content

What's hot

Excel Shortcuts & Formulas
Excel Shortcuts & FormulasExcel Shortcuts & Formulas
Excel Shortcuts & FormulasBikash Roy
 
MS Excel Shortcut By Rana Salah-ud-Din
MS Excel Shortcut By Rana Salah-ud-DinMS Excel Shortcut By Rana Salah-ud-Din
MS Excel Shortcut By Rana Salah-ud-DinRana Salahud-din
 
Microsoft excel-2003-keyboard-shortcuts
Microsoft excel-2003-keyboard-shortcutsMicrosoft excel-2003-keyboard-shortcuts
Microsoft excel-2003-keyboard-shortcutsAjay Goyal
 
Excel shortcut key
Excel shortcut keyExcel shortcut key
Excel shortcut keyAtif Hossain
 
10 INTERSTING TRICKS FOR EXCEL
10 INTERSTING TRICKS FOR EXCEL10 INTERSTING TRICKS FOR EXCEL
10 INTERSTING TRICKS FOR EXCELrahul kumar
 
List of ms office shortcut by rana salah ud-din 0313-1613927
List of  ms office shortcut by rana salah ud-din 0313-1613927List of  ms office shortcut by rana salah ud-din 0313-1613927
List of ms office shortcut by rana salah ud-din 0313-1613927Rana Salah-ud-Din
 
Excel Tutorials - Finding & Removing the Duplicate Values
Excel Tutorials - Finding & Removing the Duplicate ValuesExcel Tutorials - Finding & Removing the Duplicate Values
Excel Tutorials - Finding & Removing the Duplicate ValuesMerve Nur Taş
 
all shortcuts of in Excel
all shortcuts of in Excelall shortcuts of in Excel
all shortcuts of in ExcelC.P Singh
 
Microsoft excel
Microsoft excelMicrosoft excel
Microsoft excel14312
 

What's hot (19)

Excel Shortcuts & Formulas
Excel Shortcuts & FormulasExcel Shortcuts & Formulas
Excel Shortcuts & Formulas
 
MS Excel Shortcut By Rana Salah-ud-Din
MS Excel Shortcut By Rana Salah-ud-DinMS Excel Shortcut By Rana Salah-ud-Din
MS Excel Shortcut By Rana Salah-ud-Din
 
Microsoft excel-2003-keyboard-shortcuts
Microsoft excel-2003-keyboard-shortcutsMicrosoft excel-2003-keyboard-shortcuts
Microsoft excel-2003-keyboard-shortcuts
 
Excel shortcut key
Excel shortcut keyExcel shortcut key
Excel shortcut key
 
Xl shortcuts
Xl shortcutsXl shortcuts
Xl shortcuts
 
MS Excel 2010 tutorial 2
MS Excel 2010 tutorial 2MS Excel 2010 tutorial 2
MS Excel 2010 tutorial 2
 
10 INTERSTING TRICKS FOR EXCEL
10 INTERSTING TRICKS FOR EXCEL10 INTERSTING TRICKS FOR EXCEL
10 INTERSTING TRICKS FOR EXCEL
 
Excel 2010 keyboard shortcut
Excel 2010 keyboard shortcutExcel 2010 keyboard shortcut
Excel 2010 keyboard shortcut
 
List of ms office shortcut by rana salah ud-din 0313-1613927
List of  ms office shortcut by rana salah ud-din 0313-1613927List of  ms office shortcut by rana salah ud-din 0313-1613927
List of ms office shortcut by rana salah ud-din 0313-1613927
 
Excel shortcut keys
Excel shortcut keysExcel shortcut keys
Excel shortcut keys
 
Excel Tutorials - Finding & Removing the Duplicate Values
Excel Tutorials - Finding & Removing the Duplicate ValuesExcel Tutorials - Finding & Removing the Duplicate Values
Excel Tutorials - Finding & Removing the Duplicate Values
 
all shortcuts of in Excel
all shortcuts of in Excelall shortcuts of in Excel
all shortcuts of in Excel
 
`
``
`
 
Excel tips
Excel tipsExcel tips
Excel tips
 
Excel training
Excel trainingExcel training
Excel training
 
Microsoft excel
Microsoft excelMicrosoft excel
Microsoft excel
 
MS Excel 2010 tutorial 4
MS Excel 2010 tutorial 4MS Excel 2010 tutorial 4
MS Excel 2010 tutorial 4
 
Excel
ExcelExcel
Excel
 
Excel shortcuts
Excel shortcutsExcel shortcuts
Excel shortcuts
 

Viewers also liked

Stc anuncia veiga
Stc anuncia veigaStc anuncia veiga
Stc anuncia veigaoscargaliza
 
BridgeAtMainALA2015
BridgeAtMainALA2015BridgeAtMainALA2015
BridgeAtMainALA2015mel gooch
 
Advocatenblad Start In Powerpoint
Advocatenblad Start In PowerpointAdvocatenblad Start In Powerpoint
Advocatenblad Start In PowerpointSheSuit
 
Coutinho A Depth Compensation Method For Cross Ratio Based Eye Tracking
Coutinho A Depth Compensation Method For Cross Ratio Based Eye TrackingCoutinho A Depth Compensation Method For Cross Ratio Based Eye Tracking
Coutinho A Depth Compensation Method For Cross Ratio Based Eye TrackingKalle
 
Worshipping_Rituals
Worshipping_RitualsWorshipping_Rituals
Worshipping_RitualsNeha Sharma
 
Questions
QuestionsQuestions
Questionslsemi
 
Hyves Cbw Mitex Harry Van Wouter
Hyves Cbw Mitex Harry Van WouterHyves Cbw Mitex Harry Van Wouter
Hyves Cbw Mitex Harry Van Wouterguest2f17d3
 
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural Tasks
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural TasksRyan Match Moving For Area Based Analysis Of Eye Movements In Natural Tasks
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural TasksKalle
 
Weather Lesson Plans
Weather Lesson PlansWeather Lesson Plans
Weather Lesson Plansndwolfe
 

Viewers also liked (20)

Full MSSQL Injection PWNage
Full MSSQL Injection PWNageFull MSSQL Injection PWNage
Full MSSQL Injection PWNage
 
Triangle Gives Back 101 Webinar - 2011
Triangle Gives Back 101 Webinar - 2011Triangle Gives Back 101 Webinar - 2011
Triangle Gives Back 101 Webinar - 2011
 
ParaEmpezarHowAreYou
ParaEmpezarHowAreYouParaEmpezarHowAreYou
ParaEmpezarHowAreYou
 
Writing for blogs
Writing for blogsWriting for blogs
Writing for blogs
 
Stc anuncia veiga
Stc anuncia veigaStc anuncia veiga
Stc anuncia veiga
 
BridgeAtMainALA2015
BridgeAtMainALA2015BridgeAtMainALA2015
BridgeAtMainALA2015
 
Saludo2012
Saludo2012Saludo2012
Saludo2012
 
Advocatenblad Start In Powerpoint
Advocatenblad Start In PowerpointAdvocatenblad Start In Powerpoint
Advocatenblad Start In Powerpoint
 
ParaEmpezarElAlfabeto
ParaEmpezarElAlfabetoParaEmpezarElAlfabeto
ParaEmpezarElAlfabeto
 
Coutinho A Depth Compensation Method For Cross Ratio Based Eye Tracking
Coutinho A Depth Compensation Method For Cross Ratio Based Eye TrackingCoutinho A Depth Compensation Method For Cross Ratio Based Eye Tracking
Coutinho A Depth Compensation Method For Cross Ratio Based Eye Tracking
 
Worshipping_Rituals
Worshipping_RitualsWorshipping_Rituals
Worshipping_Rituals
 
SEB
SEBSEB
SEB
 
กำแพงเบอร น(สมบร ณ_)-1
กำแพงเบอร น(สมบร ณ_)-1กำแพงเบอร น(สมบร ณ_)-1
กำแพงเบอร น(สมบร ณ_)-1
 
Blackbox
BlackboxBlackbox
Blackbox
 
Questions
QuestionsQuestions
Questions
 
Hyves Cbw Mitex Harry Van Wouter
Hyves Cbw Mitex Harry Van WouterHyves Cbw Mitex Harry Van Wouter
Hyves Cbw Mitex Harry Van Wouter
 
pitch
pitchpitch
pitch
 
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural Tasks
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural TasksRyan Match Moving For Area Based Analysis Of Eye Movements In Natural Tasks
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural Tasks
 
Weather Lesson Plans
Weather Lesson PlansWeather Lesson Plans
Weather Lesson Plans
 
ลักษณะภูมิประเทศ2.1
ลักษณะภูมิประเทศ2.1ลักษณะภูมิประเทศ2.1
ลักษณะภูมิประเทศ2.1
 

Similar to Excell shortcuts

Ctrl combination shortcut keys
Ctrl combination shortcut keysCtrl combination shortcut keys
Ctrl combination shortcut keysNanda Kumar
 
Microsoft excel shortcut keys
Microsoft excel shortcut keysMicrosoft excel shortcut keys
Microsoft excel shortcut keysAashi90100
 
History of microsoft excel
History of microsoft excelHistory of microsoft excel
History of microsoft excelOfun Emma
 
Shortcut thr.key board
Shortcut thr.key boardShortcut thr.key board
Shortcut thr.key boardhiteshamipara
 
#Excel# all excel keyboard shortcuts cheat sheet
#Excel#  all excel keyboard shortcuts cheat sheet#Excel#  all excel keyboard shortcuts cheat sheet
#Excel# all excel keyboard shortcuts cheat sheet😁Daniel Matei
 
Excel short cut series function keys
Excel short cut series   function keysExcel short cut series   function keys
Excel short cut series function keysVijay Perepa
 
Excel Shotcuts
Excel ShotcutsExcel Shotcuts
Excel ShotcutsRaghu nath
 
Copy of Skill Nation Excel Shortcuts.pdf
Copy of Skill Nation  Excel Shortcuts.pdfCopy of Skill Nation  Excel Shortcuts.pdf
Copy of Skill Nation Excel Shortcuts.pdfHeartTheHealer
 
Utilize Robust Lookup Formulas for Complex Data Analysis
Utilize Robust Lookup Formulas for Complex Data AnalysisUtilize Robust Lookup Formulas for Complex Data Analysis
Utilize Robust Lookup Formulas for Complex Data AnalysisTejaSree13630
 
Excel shortcut and tips
Excel shortcut and tipsExcel shortcut and tips
Excel shortcut and tipsVivek Singh
 
Excel shortcut
Excel shortcutExcel shortcut
Excel shortcutASIF KHAN
 
Excel%20basic%202 123
Excel%20basic%202 123Excel%20basic%202 123
Excel%20basic%202 123Ramesh Meti
 

Similar to Excell shortcuts (20)

Ctrl combination shortcut keys
Ctrl combination shortcut keysCtrl combination shortcut keys
Ctrl combination shortcut keys
 
Microsoft excel shortcut keys
Microsoft excel shortcut keysMicrosoft excel shortcut keys
Microsoft excel shortcut keys
 
Common Excel Shortcut Keys
Common Excel Shortcut KeysCommon Excel Shortcut Keys
Common Excel Shortcut Keys
 
Xl shortcuts
Xl shortcutsXl shortcuts
Xl shortcuts
 
Ms excel
Ms excelMs excel
Ms excel
 
History of microsoft excel
History of microsoft excelHistory of microsoft excel
History of microsoft excel
 
Excel shortcuts
Excel shortcutsExcel shortcuts
Excel shortcuts
 
Excel 2013 keyboard shortcut
Excel 2013 keyboard shortcutExcel 2013 keyboard shortcut
Excel 2013 keyboard shortcut
 
Shortcut thr.key board
Shortcut thr.key boardShortcut thr.key board
Shortcut thr.key board
 
Excel Shortcuts
Excel ShortcutsExcel Shortcuts
Excel Shortcuts
 
#Excel# all excel keyboard shortcuts cheat sheet
#Excel#  all excel keyboard shortcuts cheat sheet#Excel#  all excel keyboard shortcuts cheat sheet
#Excel# all excel keyboard shortcuts cheat sheet
 
Excel short cut series function keys
Excel short cut series   function keysExcel short cut series   function keys
Excel short cut series function keys
 
Excel Shotcuts
Excel ShotcutsExcel Shotcuts
Excel Shotcuts
 
Copy of Skill Nation Excel Shortcuts.pdf
Copy of Skill Nation  Excel Shortcuts.pdfCopy of Skill Nation  Excel Shortcuts.pdf
Copy of Skill Nation Excel Shortcuts.pdf
 
Utilize Robust Lookup Formulas for Complex Data Analysis
Utilize Robust Lookup Formulas for Complex Data AnalysisUtilize Robust Lookup Formulas for Complex Data Analysis
Utilize Robust Lookup Formulas for Complex Data Analysis
 
Excel shortcut and tips
Excel shortcut and tipsExcel shortcut and tips
Excel shortcut and tips
 
Excel shortcut keys
Excel shortcut keysExcel shortcut keys
Excel shortcut keys
 
Excel tips
Excel tipsExcel tips
Excel tips
 
Excel shortcut
Excel shortcutExcel shortcut
Excel shortcut
 
Excel%20basic%202 123
Excel%20basic%202 123Excel%20basic%202 123
Excel%20basic%202 123
 

More from proser tech

New search engine Alternative for Google..
New search engine Alternative for Google..New search engine Alternative for Google..
New search engine Alternative for Google..proser tech
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp servicesproser tech
 
Certification authority
Certification   authorityCertification   authority
Certification authorityproser tech
 
Active directory domain and trust
Active  directory  domain  and  trustActive  directory  domain  and  trust
Active directory domain and trustproser tech
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp servicesproser tech
 
Windows profile how do i
Windows profile how do iWindows profile how do i
Windows profile how do iproser tech
 
A z index of the windows cmd command line
A z index of the windows cmd command lineA z index of the windows cmd command line
A z index of the windows cmd command lineproser tech
 
Difference between ntfs and fat32
Difference between ntfs and fat32Difference between ntfs and fat32
Difference between ntfs and fat32proser tech
 
Pavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation CardPavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation Cardproser tech
 
SpN corporate PPt
SpN corporate PPtSpN corporate PPt
SpN corporate PPtproser tech
 

More from proser tech (19)

New search engine Alternative for Google..
New search engine Alternative for Google..New search engine Alternative for Google..
New search engine Alternative for Google..
 
Windows profile
Windows profileWindows profile
Windows profile
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp services
 
Outlook Express
Outlook ExpressOutlook Express
Outlook Express
 
Exchange server
Exchange   serverExchange   server
Exchange server
 
Double routing
Double  routingDouble  routing
Double routing
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
Active directory domain and trust
Active  directory  domain  and  trustActive  directory  domain  and  trust
Active directory domain and trust
 
Vpn
VpnVpn
Vpn
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp services
 
Windows profile
Windows profileWindows profile
Windows profile
 
Windows profile how do i
Windows profile how do iWindows profile how do i
Windows profile how do i
 
Network printer
Network printerNetwork printer
Network printer
 
A z index of the windows cmd command line
A z index of the windows cmd command lineA z index of the windows cmd command line
A z index of the windows cmd command line
 
Difference between ntfs and fat32
Difference between ntfs and fat32Difference between ntfs and fat32
Difference between ntfs and fat32
 
Windows xp tips
Windows xp tipsWindows xp tips
Windows xp tips
 
Xlshortcuts07
Xlshortcuts07Xlshortcuts07
Xlshortcuts07
 
Pavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation CardPavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation Card
 
SpN corporate PPt
SpN corporate PPtSpN corporate PPt
SpN corporate PPt
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Excell shortcuts

  • 1. Key Description CTRL+( Unhides any hidden rows within the selection. CTRL+) Unhides any hidden columns within the selection. CTRL+& Applies the outline border to the selected cells. CTRL+_ Removes the outline border from the selected cells. CTRL+~ Applies the General number format. Applies the Currency format with two decimal places CTRL+$ (negative numbers in parentheses). CTRL+% Applies the Percentage format with no decimal places. Applies the Exponential number format with two decimal CTRL+^ places. CTRL+# Applies the Date format with the day, month, and year. Applies the Time format with the hour and minute, and AM or CTRL+@ PM. Applies the Number format with two decimal places, CTRL+! thousands separator, and minus sign (-) for negative values. CTRL+- Displays the Delete dialog box to delete the selected cells. Selects the current region around the active cell (the data area CTRL+* enclosed by blank rows and blank columns). In a PivotTable, it selects the entire PivotTable report. CTRL+: Enters the current time. CTRL+; Enters the current date. Alternates between displaying cell values and displaying CTRL+` formulas in the worksheet. Copies a formula from the cell above the active cell into the CTRL+' cell or the Formula Bar. Copies the value from the cell above the active cell into the CTRL+" cell or the Formula Bar. CTRL++ Displays the Insert dialog box to insert blank cells. CTRL+1 Displays the Format Cells dialog box. CTRL+2 Applies or removes bold formatting. CTRL+3 Applies or removes italic formatting. CTRL+4 Applies or removes underlining. CTRL+5 Applies or removes strikethrough. Alternates between hiding objects, displaying objects, and CTRL+6 displaying placeholders for objects. CTRL+7 Displays or hides the Standard toolbar. CTRL+8 Displays or hides the outline symbols.
  • 2. CTRL+9 Hides the selected rows. CTRL+0 Hides the selected columns. Selects the entire worksheet. If the worksheet contains data, CTRL+A selects the current region. Pressing CTRL+A a second time selects the entire worksheet. CTRL+A When the insertion point is to the right of a function name in a formula, displays the Function Arguments dialog box. CTRL+SHIFT+A inserts the argument names and parentheses when the insertion point is to the right of a function name in a formula. CTRL+B Applies or removes bold formatting. Copies the selected cells. CTRL+C CTRL+C followed by another CTRL+C displays the Microsoft Office Clipboard. Uses the Fill Down command to copy the contents and format CTRL+D of the topmost cell of a selected range into the cells below. Displays the Find dialog box. CTRL+F SHIFT+F5 also displays this dialog box, while SHIFT+F4 repeats the last Find action. Displays the Go To dialog box. CTRL+G F5 also displays this dialog box. CTRL+H Displays the Find and Replace dialog box. CTRL+I Applies or removes italic formatting. Displays the Insert Hyperlink dialog box for new hyperlinks CTRL+K or the Edit Hyperlink dialog box for selected existing hyperlinks. CTRL+L Displays the Create List dialog box. CTRL+N Creates a new, blank file. Displays the Open dialog box to open or find a file. CTRL+O CTRL+SHIFT+O selects all cells that contain comments. CTRL+P Displays the Print dialog box. Uses the Fill Right command to copy the contents and format CTRL+R of the leftmost cell of a selected range into the cells to the right. Saves the active file with its current file name, location, and CTRL+S file format. CTRL+U Applies or removes underlining.
  • 3. Inserts the contents of the Clipboard at the insertion point and CTRL+V replaces any selection. Available only after you cut or copied an object, text, or cell contents. CTRL+W Closes the selected workbook window. CTRL+X Cuts the selected cells. CTRL+Y Repeats the last command or action, if possible. Uses the Undo command to reverse the last command or to delete the last entry you typed. CTRL+Z CTRL+SHIFT+Z uses the Undo or Redo command to reverse or restore the last automatic correction when AutoCorrect Smart Tags are displayed. Function keys Key Description Displays the Help task pane. CTRL+F1 closes and reopens the current task pane. F1 ALT+F1 creates a chart of the data in the current range. ALT+SHIFT+F1 inserts a new worksheet. Edits the active cell and positions the insertion point at the end of the cell contents. It also moves the insertion point into the F2 Formula Bar when editing in a cell is turned off. SHIFT+F2 edits a cell comment. Pastes a defined name into a formula. F3 SHIFT+F3 displays the Insert Function dialog box. Repeats the last command or action, if possible. F4 CTRL+F4 closes the selected workbook window. Displays the Go To dialog box. F5 CTRL+F5 restores the window size of the selected workbook window. Switches to the next pane in a worksheet that has been split (Window menu, Split command). SHIFT+F6 switches to the previous pane in a worksheet that F6 has been split. CTRL+F6 switches to the next workbook window when more than one workbook window is open.
  • 4. Note When the task pane is visible, F6 and SHIFT+F6 include that pane when switching between panes. Displays the Spelling dialog box to check spelling in the active worksheet or selected range. F7 CTRL+F7 performs the Move command on the workbook window when it is not maximized. Use the arrow keys to move the window, and when finished press ESC. Turns extend mode on or off. In extend mode, EXT appears in the status line, and the arrow keys extend the selection. SHIFT+F8 enables you to add a non-adjacent cell or range to a selection of cells by using the arrow keys. F8 CTRL+F8 performs the Size command (on the Control menu for the workbook window) when a workbook is not maximized. ALT+F8 displays the Macro dialog box to run, edit, or delete a macro. Calculates all worksheets in all open workbooks. F9 followed by ENTER (or followed by CTRL+SHIFT+ENTER for array formulas) calculates the selected a portion of a formula and replaces the selected portion with the calculated value. SHIFT+F9 calculates the active worksheet. F9 CTRL+ALT+F9 calculates all worksheets in all open workbooks, regardless of whether they have changed since the last calculation. CTRL+ALT+SHIFT+F9 rechecks dependent formulas, and then calculates all cells in all open workbooks, including cells not marked as needing to be calculated. CTRL+F9 minimizes a workbook window to an icon. Selects the menu bar or closes an open menu and submenu at the same time. SHIFT+F10 displays the shortcut menu for a selected item. F10 ALT+SHIFT+F10 displays the menu or message for a smart tag. If more than one smart tag is present, it switches to the next smart tag and displays its menu or message. CTRL+F10 maximizes or restores the selected workbook window. Creates a chart of the data in the current range. F11 SHIFT+F11 inserts a new worksheet.
  • 5. ALT+F11 opens the Visual Basic Editor, in which you can create a macro by using Visual Basic for Applications (VBA). ALT+SHIFT+F11 opens the Microsoft Script Editor, where you can add text, edit HTML tags, and modify any script code. F12 Displays the Save As dialog box. Other useful shortcut keys Key Description Move one cell up, down, left, or right in a worksheet. CTRL+ARROW KEY moves to the edge of the current data region (data region: A range of cells that contains data and that is bounded by empty cells or datasheet borders.) in a worksheet. SHIFT+ARROW KEY extends the selection of cells by one cell. CTRL+SHIFT+ARROW KEY extends the selection of cells to the last nonblank cell in the same column or row as the active cell. ARROW KEYS LEFT ARROW or RIGHT ARROW selects the menu to the left or right when a menu is visible. When a submenu is open, these arrow keys switch between the main menu and the submenu. DOWN ARROW or UP ARROW selects the next or previous command when a menu or submenu is open. In a dialog box, arrow keys move between options in an open drop--down list, or between options in a group of options. ALT+DOWN ARROW opens a selected drop down list. drop-down Deletes one character to the left in the Formula Bar. BACKSPACE Also clears the content of the active cell. Removes the cell contents (data and formulas) from selected cells without affecting cell formats or comments. DELETE In cell editing mode, it deletes the character to the right of the insertion point. Moves to the cell in the lower lower-right corner of the window when SCROLL LOCK is turned on. Also selects the last command on the menu when a menu or submenu is visible. END CTRL+END moves to the last cell on a worksheet, in the lowest used row of the rightmost used column. CTRL+SHIFT+END extends the selection of cells to the last used cell on the worksheet (lower (lower-right corner).
  • 6. Completes a cell entry from the cell or the Formula Bar, and selects the cell below (by default). In a data form, it moves to the first field in the next record. Opens a selected menu (press F10 to activate the menu bar) or performs the action for a selected command. In a dialog box, it performs the action for the default ENTER command button in the dialog box (the button with the bold outline, often the OK button). ALT+ENTER starts a new line in the same cell. CTRL+ENTER fills the selected cell range with the current entry. SHIFT+ENTER completes a cell entry and selects the cell above. Cancels an entry in the cell or Formula Bar. ESC It also closes an open menu or submenu, dialog box, or message window. Moves to the beginning of a row in a worksheet. Moves to the cell in the upper-left corner of the window when SCROLL LOCK is turned on. Selects the first command on the menu when a menu or HOME submenu is visible. CTRL+HOME moves to the beginning of a worksheet. CTRL+SHIFT+HOME extends the selection of cells to the beginning of the worksheet. Moves one screen down in a worksheet. ALT+PAGE DOWN moves one screen to the right in a worksheet. PAGE DOWN CTRL+PAGE DOWN moves to the next sheet in a workbook. CTRL+SHIFT+PAGE DOWN selects the current and next sheet in a workbook. Moves one screen up in a worksheet. ALT+PAGE UP moves one screen to the left in a worksheet. PAGE UP CTRL+PAGE UP moves to the previous sheet in a workbook. CTRL+SHIFT+PAGE UP selects the current and previous sheet in a workbook. In a dialog box, performs the action for the selected button, or SPACEBAR selects or clears a check box. CTRL+SPACEBAR selects an entire column in a worksheet.
  • 7. SHIFT+SPACEBAR select an entire row in a worksheet. CTRL+SHIFT+SPACEBAR select the entire worksheet.  If the worksheet contains data, CTRL+SHIFT+SPACEBAR selects the current region. Pressing CTRL+SHIFT+SPACEBAR a second time selects the entire worksheet.   When an object is selected, CTRL+SHIFT+SPACEBAR selects all objects on a worksheet. ALT+SPACEBAR displays the Control menu for the Excel window. Moves one cell to the right in a worksheet. Moves between unlocked cells in a protected worksheet. Moves to the next option or option group in a dialog box. TAB SHIFT+TAB moves to the previous cell in a worksheet or the previous option in a dialog box. CTRL+TAB switches to the next tab in dialog box. CTRL+SHIFT+TAB switches to the previous tab in a dialog box.
  • 8. Control Systems Procurement & Maintenance Specifications Terms List SCADA Procurement Project Procurement Specifications Terms List The list of terms is critical to ensure there is a common understanding in developing procurement language. The objective was to provide definitions that are clear, concise and applicable to the procurement effort. This common terms document will be a living document and can grow and change over time. ACL (Access Control List) — An access control list is a concept in computer security, used to enforce privilege separation. It is a means of enforcing the appropriate access rights to a given object given certain aspects of the user process that is requesting them, principally the process's user identity. On a router an access list specifies which addresses are allowed to access services. Access lists can be used to control both inbound and outbound traffic on a router. Active Directory — Active Directory is an implementation of LDAP directory services by Microsoft for use in Windows environments. Active Directory allows administrators to assign enterprise-wide policies, deploy programs to many computers, and apply critical updates to an entire organization. An Active Directory stores information and settings relating to an organization in a central, organized, accessible database. Active Directory networks can vary from a small installation with a few hundred objects, to a large installation with millions of objects. AES — AES is the Advanced Encryption Standard (AES) that is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively, as was the case with its predecessor, the Data Encryption Standard (DES). AES was adopted by National Institute of Standards and Technology (NIST) as US FIPS PUB 197 in November 2001. AP (Access Point) — A wireless access point (WAP or AP) is a device that "connects" wireless communication devices together to create a wireless network. The WAP is usually connected to a wired network, and can relay data between devices on each side. API (Application Programming Interface) — APIs are a set of definitions of the ways in which one piece of computer software communicates with another. It is a method of achieving abstraction, usually (but not necessarily) between lower-level and higher-level software. Asynchronous Transfer Mode (ATM) — ATM is a cell relay network protocol which encodes data traffic into small fixed-sized (53 byte; 48 bytes of data and 5 bytes of header information) cells instead of variable sized packets as in packet-switched networks (such as the Internet Protocol or Ethernet). It is a connection-oriented technology, in which a connection is established between the two endpoints before the actual data exchange begins. 5/13/2010 Page 1 of 13
  • 9. Control Systems Procurement & Maintenance Specifications Terms List Authentication — Authentication is the process of verifying an identity claimed by or for a system entity. Also, any security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying and individual’s eligibility to receive specific categories of information [http://www.its.bldrdoc.gov/fs-1037/]. As perceived by a computer user, authentication is generally associated with a password and/or token(s) entered into a host system for the purpose of gaining access to computer application(s). As examples of user authentication to a host computer, the authentication mechanism might be a password or string of characters provided by the user at a prompt (something you know), and/or a token (something you have), and/or a fingerprint (something you are). Authorization — Authorization is a right or a permission that is granted to a system entity to access a system resource. BPL (Broadband over Power Lines) — Also known as Power Line Communications (PLC), can transmit data at up to 200Mbps by utilizing normal electrical power lines. Users of the service would plug their broadband modem into a normal power receptacle. CHAP — The Challenge-Handshake Authentication Protocol (CHAP) authenticates a user to an Internet access provider. RFC 1994: PPP Challenge Handshake Authentication Protocol (CHAP) defines the protocol. Cleartext — Data in which the semantic information content (i.e., the meaning) is intelligible or is directly available as opposed to ciphertext which is encrypted. Client — A Client is any computer whose identification and authorization privileges for network connection are hosted by a server. An HMI interface (e.g., at operator desks in a Control Room) is an example of a client computer configuration. Common Criteria (CC) — ISO/IEC 15408, a standard for evaluating information technology products and systems, such as operating systems, computer networks, distributed systems, and applications. It states requirements for security functions and for assurance measures, which  addresses data confidentiality, data integrity, and availability,  focuses on threats to information arising from human activities, malicious or otherwise,  applies to security measures implemented in hardware, firmware, or software Configuration Management — The term configuration management has the following meanings:  The management of features and assurances (including security) through control of changes made to hardware, software, firmware, documentation, test, test fixtures and test documentation of an automated information system, throughout the development and operational life of a system. Source Code Management or revision control is part of this. 5/13/2010 Page 2 of 13
  • 10. Control Systems Procurement & Maintenance Specifications Terms List  The control of changes made to the hardware, software, firmware, and documentation throughout the system lifecycle. Control System — An interconnection of components (computers, sensors, actuators, communication pathways, etc.) connected or related in such a manner as to command, direct, or regulate itself or another system (e.g., chemical process plant equipment/system, oil refinery equipment/systems, electric generation/distribution equipment/systems, water/waste water systems, manufacturing control systems, etc.). Data Acquisition — The sampling of the real world to acquire data that can be recorded and/or manipulated by a computer. Sometimes abbreviated DAQ, data acquisition typically involves acquisition of signals and waveforms and processing the signals to obtain desired information. Database Server — A server hosting a database system (usually an RDBMS) typically used as a historian and/or business link to the process control environment. Data Logger — A data logger is an electronic instrument that records digital or analog measurements over time. DCS (Distributed Control System) — Distributed control systems are used in industrial and civil engineering applications to monitor and control distributed equipment with remote human intervention. DES — The Data Encryption Standard (DES) is a cipher (a method for encrypting information) selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976, and which has subsequently enjoyed widespread use internationally. It is being replaced by AES. DNP3 (Distributed Network Protocol) — DNP3 is an open, standards-based communication protocol commonly used in the utility industry. DNP3 provides multiplexing, data fragmentation, error checking, link control, prioritization, and layer 2 addressing services for user data. DoS (Denial of Service) — An attack on a computer system or network that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system. A DDoS (Distributed Denial of Service) attack consists of hundreds or thousands of globally distributed sources. Direct-sequence spread spectrum (DSSS) — In telecommunications, direct- sequence spread spectrum is a modulation technique where the transmitted signal takes up 5/13/2010 Page 3 of 13
  • 11. Control Systems Procurement & Maintenance Specifications Terms List more bandwidth than the information signal that is being modulated, which is the reason that it is called spread spectrum. Discretionary Access Control (DAC) — Discretionary access control defines basic access control policies to objects in a file system. Generally, these are done at the discretion of the object owner -- file/directory permissions and user/group ownership. Demilitarized Zone (DMZ) — Isolation zone between a protected control network (CN) and external users, such that all production traffic “flowing” between the CN and those external users actually flows through an access control device, such as a firewall. DSL — Digital Subscriber Line (also, ADSL, RDSL) is the typical technology used for delivering broadband communications over copper circuits. Widely used for home and small office broadband connection. EAP — Extensible Authentication Protocol, or EAP (pronounced "eep"), is a universal authentication mechanism, frequently used in wireless networks and Point-to-Point connections. Although the EAP protocol is not limited to wireless LAN networks and can be used for wired LAN authentication, it is most often used in wireless LAN networks. The WPA and WPA2 standard has officially adopted five EAP types as its official authentication mechanisms. Embedded System/OS — A special-purpose computer controlled electro-mechanical system in which the computer is completely encapsulated by the device it controls. An embedded system has specific requirements and performs pre-defined tasks, unlike a general-purpose personal computer. Encryption — In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge. Ethernet — Ethernet is a frame-based computer networking technology for local area networks (LANs). It defines wiring and signaling for the physical layer, and frame formats and protocols for the media access control (MAC)/data link layer of the OSI model. Ethernet is mostly standardized as IEEE 802.3. Factory Acceptance Test — A test conducted at the vendor premise usually by a third- party to ensure operability of a system according to specifications. Front End Processor (FEP) — A computer which handles communications processing for a larger computer. Data collection systems may include a front end processor which accepts data from instruments and partially processes it before transfer to a larger computer. 5/13/2010 Page 4 of 13
  • 12. Control Systems Procurement & Maintenance Specifications Terms List Frequency-hopping spread spectrum (FHSS) — Frequency-hopping spread spectrum (FHSS) is a spread-spectrum method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. FIELDBUS — Fieldbus control system is a form of decentralized control which links PLC's via a Controller Area Network (CAN) to control the manufacturing processes at the workshop-floor level. Such systems include Profibus, Netbus, LonWorks, Industrial Ethernet and many others. Firewall — Firewall is hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy. It has the basic task of controlling traffic between different zones of trust. Typical zones of trust include the Internet (a zone with no trust) and an internal network (a zone with higher trust). FTP (File Transfer Protocol) — The File Transfer Protocol is a software standard for transferring computer files between machines. It belongs to the application layer of the TCP/IP protocol suite. Since FTP is non-secure it is being replaced by sftp - Secure File Transfer Protocol. Gateway — Gateway in a communications network is a network node equipped for interfacing with another network that uses different protocols. GPRS — GPRS is the General Packet Radio Service a standard for digital overlay on the GSM digital cellular system. It allows high speed digital and IP connections to be established using existing GSM voice infrastructure and is generally used to provide IP connectivity to RTUs. GSM — GSM is Global System for Mobile communications. It is the most common digital cellular system. GSM can be used for both voice and data applications. It is also used to provide serial communications to RTUs. Hardened System/OS — Hardened hardware and/or software that has been modified with high security and hardening features, packages and enhanced toolkits, kernel patches and other cryptography and security related enhancements. HMI (Human-Machine Interface) — A term that refers to the "layer" that separates a human that is operating a machine from the machine itself. One example of a HMI is the computer hardware and software that enables a single operator to monitor and control large machinery remotely. 5/13/2010 Page 5 of 13
  • 13. Control Systems Procurement & Maintenance Specifications Terms List Host-based intrusion detection system (HIDS) — HIDS is an application that detects possible malicious activity on a host from characteristics such as change of files (file system integrity checker), operating system call profiles, etc. Hyper-text Transfer Protocol (HTTP) — HTTP is a request/response protocol between clients and servers. The originating client, such as a web browser, spider, or other end- user tool, is referred to as the user agent. The destination server, which stores or creates resources such as HTML files and images, is called the origin server. ICMP — Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet protocol suite. It is chiefly used by networked computers' operating systems to test other systems and return error messages—indicating, for instance, that a requested service is not available or that a host or router could not be reached. IDS (Intrusion Detection System) — An IDS is software or an appliance used to detect unauthorized access or malicious or abnormal operation to a computer system or network. IDS systems that operate on a host to detect malicious activity are called host-based IDS systems or HIDS, and IDS systems that operate on network data flows are called network-based IDS systems or NIDS. IEC — International Electrotechnical Commission, is a European standards body which has developed IEC60870-5 series of SCADA protocols. IEC is now working on IEC-62351 a secure protocol envelope for DNP3 and IEC60870-5. IED (Intelligent Electronic Device) — A device on the network that contains an embedded system (an embedded system is a special-purpose computer system, which is completely encapsulated by the device it controls). Inter-Control Center Communications Protocol (ICCP) — A standard real- time network protocol for data exchange over wide area networks. ICCP is the most common communications protocol between RTO/ISO and control centers (aka, Telecontrol Application Service Element.2 (TASE.2)). IP (Internet Protocol) — A data-oriented protocol used by source and destination hosts for communicating data across a packet-switched internetwork. Data in an IP internetwork are sent in blocks referred to as packets or datagrams (the terms are basically synonymous in IP). IPS (Intrusion Prevention System) — Any hardware and/or software system that proactively exercises access control to protect computers from exploitation. "Intrusion prevention" technology is considered by some to be an extension of intrusion detection (IDS) 5/13/2010 Page 6 of 13
  • 14. Control Systems Procurement & Maintenance Specifications Terms List technology, but it is actually another form of access control, like an application layer firewall, that uses knowledge of malicious behavior. IPSec — IPsec is a set of cryptographic protocols for securing packet flows and key exchange. Of the former, there are two: Encapsulating Security Payload (ESP) provides authentication, data confidentiality and message integrity; Authentication Header (AH) provides authentication and message integrity, but does not offer confidentiality. Originally AH was only used for integrity and ESP was used only for encryption; authentication functionality was added subsequently to ESP. IPv6 (Internet Protocol version 6) — IPv6 is version 6 of the Internet Protocol; IPv6 is intended to replace the current standard, IPv4. ISO (International Organization for Standardization) — The International Organization for Standardization, also known as ISO, is global network of the national standards bodies of 156 countries dedicated to technical standards development. L2TP — The Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs). L2TP can be described as "PPP over IP" with additional features. LAN (Local Area Network) — A LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings (campus). LDAP — The Lightweight Directory Access Protocol, or LDAP, is a networking protocol for querying and modifying directory services running over TCP/IP. An LDAP directory usually follows the X.500 model: It is a tree of entries, each of which consists of a set of named attributes with values. LINUX — LINUX is a computer operating system. It is among the most famous examples of free software and of open-source development. MAC (Media Access Control) Address — A media access control address (MAC address) is a unique identifier attached to most forms of networking equipment. It is used at layer 2 of the OSI protocol. Most layer 2 network protocols use one of three numbering spaces managed by the IEEE: MAC-48, EUI-48, and EUI-64, which are designed to be globally unique. Malware — Malware is malicious software designed to infiltrate or damage a computer system, without the owner's consent. Malware is commonly taken to include computer viruses, worms, Trojan horses, rootkits, spyware and adware. 5/13/2010 Page 7 of 13
  • 15. Control Systems Procurement & Maintenance Specifications Terms List MODEM — A modem is a device that modulates an analog carrier signal (sound), to encode digital information, and that also demodulates such a carrier signal to decode the transmitted information. NAT — NAT is the process of network address translation and involves re-writing the source and/or destination address of IP packets as they pass through a router or firewall. NAT is used to enable multiple hosts on a private network to access the Internet using a single public IP address. Network-based intrusion detection system (NIDS) — Application that reads all packets, not just those sent to it, from a network and detects potentially malicious packets based on rules or algorithms. Network Topology — Network topology is the network structure (logical and/or physical) that may be represented as a collection of nodes, some of which are connected by links. Bus topology: A bus network is such that there is a single line (the bus) to which all nodes are connected and the nodes connect only to this bus. Mesh topology: A network topology in which there are at least two nodes with two or more paths between them. Ring topology: A network topology in which every node has exactly two branches connected to it. Star topology: A network topology in which peripheral nodes are connected to a central node only when using a hub. The more commonly used switch does not rebroadcast to all nodes, including the originating node. Tree topology: A network topology in which the nodes are arranged as a tree. A hybrid topology is a combination of any two or more network topologies in such a way that the resulting network does not have one of the standard forms. Network File System (NFS) — NFS is a file system which allows a computer to access files over a network as easily as if they were on its local disks. NIDS — Network Intrusion Detection System is a hardware tool which monitors IP traffic on a network segment (or segments) to detect unauthorized access to a computer system or network. OPC (Open Connectivity via Open Standards) — OPC is open connectivity in industrial automation and the enterprise systems that support industry. Interoperability is assured through the creation and maintenance of open standards specifications. OPC has been termed “OLE for Process Control”. Open Systems Interconnection Reference Model (OSI) — The Open Systems Interconnection Reference Model is a layered abstract description for communications and computer network protocol design, developed as part of the Open Systems Interconnect initiative. It is also called the OSI seven layer model as follows: Physical layer Layer 1; Data link layer Layer 2; Network layer Layer 3; Transport layer Layer 4; Session layer Layer 5; Presentation layer Layer 6; Application layer Layer 7. 5/13/2010 Page 8 of 13
  • 16. Control Systems Procurement & Maintenance Specifications Terms List Patch — A fix for a software program where the actual binary executable and related files are modified. PCI Express — PCI Express is an implementation of the PCI computer bus that uses existing PCI programming concepts and communications standards, but bases it on a much faster serial communications system. PCS (Process Control System) — A generic term applied to the hardware, firmware, communications, and software used to enable automation of the physical systems. PEAP — Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP (pronounced "peep"), is a method to securely transmit authentication information, including passwords, over wireless networks. It was jointly developed by Microsoft, RSA Security and Cisco Systems. It is an IETF open standard. PID (Proportional-Integral-Derivative controller) — A standard feedback loop component in industrial control applications. It measures an "output" of a process and controls an "input", with a goal of maintaining the output at a target value, which is called the "setpoint". PLC (Programmable Logic Controller) — A small computer used for automation of real-world processes, such as control of machinery on factory assembly lines. Port — Hardware Port: A hardware port is an outlet on a piece of equipment into which a plug or cable connects. Network port: A network port is an interface for communicating with a computer program over a network. I/O or machine port - port-mapped I/O: Nearly all processor families use the same assembly instructions for both memory access and hardware I/O. Software port: Software is sometimes written for specific processors, operating systems, or programming interfaces. A software port is software that has been changed to work on another system. PPP — The Point-to-Point Protocol, or PPP, is commonly used to establish a direct connection between two nodes. It can connect computers using serial cable, phone line, trunk line, cellular telephone, specialized radio links, or fiber optic links. Most internet service providers use PPP for dial-up access to the Internet. Process Control — An engineering discipline that deals with architectures, mechanisms, and algorithms for controlling the output of a specific process. For example, heating up the temperature in a room is a process that has the specific, desired outcome to reach and maintain a defined temperature (e.g. 20°C), kept constant over time. Here, the temperature is the controlled variable. At the same time, it is the input variable since it is measured by a thermometer and used to decide whether to heat or not to heat. The desired temperature (20°C) is the set point. 5/13/2010 Page 9 of 13
  • 17. Control Systems Procurement & Maintenance Specifications Terms List The state of the heater (e.g., the setting of the valve allowing hot water to circulate through it) is called the manipulated variable since it is subject to control actions. PROFIBUS (Process Field Bus) — PROFIBUS is the most popular type of fieldbus for factory and industrial automation with worldwide more than 10 million nodes (2004) in use. Proxy Server — Computer process – often used as, or as part of, a firewall – that relays a protocol between client and server computer systems, by appearing to the client to be the server and appearing to the server to be the client. PSTN (Public Switched Telephone Network) — The public telephone system in the United States used for voice and data communications. Public Key Infrastructure (PKI) — In cryptography, a public key infrastructure (PKI) is an arrangement using digital certificates which provides for third-party vetting of, and vouching for, user identities. QoS (Quality of Service) — In packet-switched networks QoS refers to the probability of the network meeting a given traffic contract, or in many cases is used informally to refer the probability of a packet passing between two points in the network. RADIUS — Remote Authentication Dial-In User Service is an authentication, authorization and accounting protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations. The RADIUS server checks that the information is correct using authentication schemes like PAP, CHAP or EAP. RBAC (Role Based Access Control) — An approach to restricting system access to authorized users. It is a newer and alternative approach to Mandatory Access Control (MAC) and Discretionary Access Control (DAC). Rootkits — Rootkits are sets of programs which are introduced into a computer system without permission of the computer operator to obtain privileged access which would allow control of the computer, usually with capabilities to avoid detection. Router — A router is a computer networking device that forwards data packets toward their destinations between disparate networks through a process known as routing. Routing occurs at layer 3 of the OSI seven-layer model. Routers can implement other functions and the RTU (Remote Terminal Unit) — An RTU, or Remote Terminal Unit is a device which interfaces objects in the physical world to a DCS or SCADA system by transmitting telemetry data to the system and/or altering the state of connected objects based on control messages received from the system. 5/13/2010 Page 10 of 13
  • 18. Control Systems Procurement & Maintenance Specifications Terms List SCADA (Supervisory Control and Data Acquisition) — A SCADA computer system is developed for gathering and analyzing real time data. SCADA systems are used to monitor and control a plant or equipment in industries such as telecommunications, water and waste control, energy, oil and gas refining and transportation. Serial Communications — Serial communications is the process of sending data one bit at one time, sequentially, over a communications channel or computer bus. Serial communications is used for all long-haul communications and most computer networks, where the cost of cable and synchronization difficulties makes parallel communications impractical. Serial computer busses are becoming more common as improved technology enables them to transfer data at higher speeds. Server — A server is a computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files, a web server for access to web content, a DNS server for domain name services, a database server for access to relational tables, an email server for access to email, etc. Server Message Block (SMB) — Server Message Block (SMB) is a network protocol mainly applied to share files, printers, serial ports, and miscellaneous communications between nodes on a network. It also provides an authenticated Inter-process communication mechanism. Synchronous optical networking (SONET) — The Synchronous optical network, commonly known as SONET, is a standard for communicating digital information using lasers or light emitting diodes (LEDs) over optical fiber as defined by GR-253-CORE from Telcordia. SPP-ICS (System Protection Profile – Industrial Control Systems) — A document developed by the National Institute of Standards and Technology (NIST) that identifies a starting point for formally stating the security requirements for industrial control systems in a logical and structured manner. SSH — Secure Shell Terminal Emulation communications protocol widely used for remote RTU configuration/ diagnostic. SSID (Service Set Identifier) — A service set identifier (SSID) is a code attached to all packets on a wireless network to identify each packet as part of that network. SSL (Secure Sockets Layer) — Secure Sockets Layer (SSL) and Transport Layer Security (TLS), its successor, are cryptographic protocols which provide secure communications over TCP/IP. 5/13/2010 Page 11 of 13
  • 19. Control Systems Procurement & Maintenance Specifications Terms List Stateful Firewall — A stateful firewall is a firewall that keeps track of the state of network connections (such as TCP streams) traveling across it. Source packets are entered into the state table. Response packets are checked against the state table and only those packets constituting a proper response are allowed through the firewall. Switch — A network switch is a computer networking device that serves as a connection point for devices in a network. A switch forwards packets to the appropriate port based on the packet’s address. TCP (Transmission Control Protocol) — TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data over many packets. TCP includes mechanisms and protocols to ensure delivery of the data in the correct sequence from source to destination. Telnet — Telenet is a terminal emulation communications protocol widely used for remote RTU configuration/ diagnostic. Telenet is being replaced by SSH. Terminal Server — A device used as an interface between Network (IP) communications and serial communication communications. TLS (Transport Layer Security) — See SSL. UDP (User Datagram Protocol) — UDP is a connection-less transport layer protocol that is currently documented in IETF RFC 768. In the TCP/IP model, UDP provides a very simple interface between a network layer below and an application layer above. UDP has no mechanism to ensure delivery of the data in the packets nor can it ensure that delivery of the packets is in the proper sequence. If desired, this must be performed by the application layer. Upgrade — Generally an upgrade is a new release of software, hardware and/or firmware replacing the original components to fix errors and/or vulnerabilities in software and/or provide additional functionality and/or improve performance. URL (Uniform Resource Locator) — URL is a standardized address for some resource (such as a document or image) on the Internet (or elsewhere). USB (Universal Serial Bus) — Universal Serial Bus (USB) provides a serial bus standard for connecting devices, usually to a computer, but it also is in use on other devices. Virus — See Malware. 5/13/2010 Page 12 of 13
  • 20. Control Systems Procurement & Maintenance Specifications Terms List VLAN (Virtual LAN) — A virtual LAN, commonly known as a VLAN, is a logically segmented network mapped over physical hardware. VPN (Virtual Private Network) — A private, encrypted communications network usually used within a company, or by several different companies or organizations, used for communicating in a software tunnel over a public network. VoIP — Voice over Internet Protocol (also called VoIP, IP Telephony, Internet telephony, and Digital Phone) is the routing of voice conversations over the Internet or any other IP-based network. The voice data flows over a general-purpose packet-switched network, instead of traditional dedicated, circuit-switched voice transmission lines. WEP (Wired Equivalent Privacy) — WEP is part of the IEEE 802.11 standard, and is a protocol used to secure wireless networks (WiFi). WiFi (Wireless Fidelity) — Short for wireless fidelity and is meant to be used generically when referring of any type of 802.11 network, whether 802.11b/a/g dual-band, etc. WiMax (Worldwide Interoperability of Microwave Access) — WiMax is the name commonly given to the IEEE 802.16 standard. A wireless protocol designed for distances as far as 30 miles but more commonly 3 – 5 miles. WPA — Wi-Fi Protected Access (WPA and WPA2) are wireless standards providing higher levels of security than WEP. WPA2 is based on IEEE 802.11i and provides government grade security based on NIST standards and AES encryption. 5/13/2010 Page 13 of 13
  • 21. Glossary This glossary is only a tiny subset of all of the various terms and other things that people regularly use on The Net. For a more complete (and very entertaining) reference, it's suggested you get a copy of The New Hacker's Dictionary, which is based on a VERY large text file called the Jargon File. Edited by Eric Raymond (eric@snark.thyrsus.com), it is available from the MIT Press, Cambridge, Massachusetts, 02142; its ISBN number is 0-262-68069-6. Also see RFC-1208, A Glossary of Networking Terms. :-) This odd symbol is one of the ways a person can portray ``mood'' in the very flat medium of computers---by using ``smilies.'' This is `metacommunication', and there are literally hundreds of them, from the obvious to the obscure. This particular example expresses ``happiness.'' Don't see it? Tilt your head to the left 90 degrees. Smilies are also used to denote sarcasm. address resolution Conversion of an Internet address to the corresponding physical address. On an ethernet, resolution requires broadcasting on the local area network. administrivia Administrative tasks, most often related to the maintenance of mailing lists, digests, news gateways, etc. anonymous FTP Also known as ``anon FTP''; a service provided to make files available to the general Internet community---see section Anonymous FTP. ANSI The American National Standards Institute disseminates basic standards like ASCII, and acts as the United States' delegate to the ISO. Standards can be ordered from ANSI by writing to the ANSI Sales Department, 1430 Broadway, New York, NY 10018, or by telephoning (212) 354- 3300. archie A service which provides lookups for packages in a database of the offerings of countless of anonymous FTP sites. See section The archie Server for a full description. archive server Page | 1
  • 22. An email-based file transfer facility offered by some systems. ARPA (Advanced Research Projects Agency) Former name of DARPA, the government agency that funded ARPAnet and later the DARPA Internet. ARPAnet A pioneering long haul network funded by ARPA. It served as the basis for early networking research as well as a central backbone during the development of the Internet. The ARPAnet consisted of individual packet switching computers interconnected by leased lines. The ARPAnet no longer exists as a singular entity. asynchronous Transmission by individual bytes, not related to specific timing on the transmitting end. auto-magic Something which happens pseudo-automatically, and is usually too complex to go into any further than to say it happens ``auto-magically.'' backbone A high-speed connection within a network that connects shorter, usually slower circuits. Also used in reference to a system that acts as a ``hub'' for activity (although those are becoming much less prevalent now than they were ten years ago). bandwidth The capacity of a medium to transmit a signal. More informally, the mythical ``size'' of The Net, and its ability to carry the files and messages of those that use it. Some view certain kinds of traffic (FTPing hundreds of graphics images, for example) as a ``waste of bandwidth'' and look down upon them. BITNET (Because It's Time Network) An NJE-based international educational network. bounce The return of a piece of mail because of an error in its delivery. btw An abbreviation for ``by the way.'' Page | 2
  • 23. CFV (Call For Votes) Initiates the voting period for a Usenet newsgroup. At least one (occasionally two or more) email address is customarily included as a repository for the votes. See See section Newsgroup Creation for a full description of the Usenet voting process. ClariNews The fee-based Usenet newsfeed available from ClariNet Communications. client The user of a network service; also used to describe a computer that relies upon another for some or all of its resources. Cyberspace A term coined by William Gibson in his fantasy novel Neuromancer to describe the ``world'' of computers, and the society that gathers around them. datagram The basic unit of information passed across the Internet. It contains a source and destination address along with data. Large messages are broken down into a sequence of IP datagrams. disassembling Converting a binary program into human-readable machine language code. DNS (Domain Name System) The method used to convert Internet names to their corresponding Internet numbers. domain A part of the naming hierarchy. Syntactically, a domain name consists of a sequence of names or other words separated by dots. dotted quad A set of four numbers connected with periods that make up an Internet address; for example, 147.31.254.130. email The vernacular abbreviation for electronic mail. email address Page | 3
  • 24. The UUCP or domain-based address that a user is referred to with. For example, the author's address is brendan@cs.widener.edu. ethernet A 10-million bit per second networking scheme originally developed by Xerox Corporation. Ethernet is widely used for LANs because it can network a wide variety of computers, it is not proprietary, and components are widely available from many commercial sources. FDDI (Fiber Distributed Data Interface) An emerging standard for network technology based on fiber optics that has been established by ANSI. FDDI specifies a 100-million bit per second data rate. The access control mechanism uses token ring technology. flame A piece of mail or a Usenet posting which is violently argumentative. FQDN (Fully Qualified Domain Name) The FQDN is the full site name of a system, rather than just its hostname. For example, the system lisa at Widener University has a FQDN of lisa.cs.widener.edu. FTP (File Transfer Protocol) The Internet standard high-level protocol for transferring files from one computer to another. FYI An abbreviation for the phrase ``for your information.'' There is also a series of RFCs put out by the Network Information Center called FYIs; they address common questions of new users and many other useful things. See section Requests for Comments for instructions on retrieving FYIs. gateway A special-purpose dedicated computer that attaches to two or more networks and routes packets from one network to the other. In particular, an Internet gateway routes IP datagrams among the networks it connects. Gateways route packets to other gateways until they can be delivered to the final destination directly across one physical network. header The portion of a packet, preceding the actual data, containing source and destination addresses and error-checking fields. Also part of a message or news article. hostname Page | 4
  • 25. The name given to a machine. (See also FQDN.) IMHO (In My Humble Opinion) This usually accompanies a statement that may bring about personal offense or strong disagreement. Internet A concatenation of many individual TCP/IP campus, state, regional, and national networks (such as NSFnet, ARPAnet, and Milnet) into one single logical network all sharing a common addressing scheme. Internet number The dotted-quad address used to specify a certain system. The Internet number for the site cs.widener.edu is 147.31.254.130. A resolver is used to translate between hostnames and Internet addresses. interoperate The ability of multi-vendor computers to work together using a common set of protocols. With interoperability, PCs, Macs, Suns, Dec VAXen, CDC Cybers, etc, all work together allowing one host computer to communicate with and take advantage of the resources of another. ISO (International Organization for Standardization) Coordinator of the main networking standards that are put into use today. kernel The level of an operating system or networking system that contains the system-level commands or all of the functions hidden from the user. In a Unix system, the kernel is a program that contains the device drivers, the memory management routines, the scheduler, and system calls. This program is always running while the system is operating. LAN (Local Area Network) Any physical network technology that operates at high speed over short distances (up to a few thousand meters). mail gateway A machine that connects to two or more electronic mail systems (especially dissimilar mail systems on two different networks) and transfers mail messages among them. mailing list Page | 5
  • 26. A possibly moderated discussion group, distributed via email from a central computer maintaining the list of people involved in the discussion. mail path A series of machine names used to direct electronic mail from one user to another. medium The material used to support the transmission of data. This can be copper wire, coaxial cable, optical fiber, or electromagnetic wave (as in microwave). multiplex The division of a single transmission medium into multiple logical channels supporting many simultaneous sessions. For example, one network may have simultaneous FTP, telnet, rlogin, and SMTP connections, all going at the same time. net.citizen An inhabitant of Cyberspace. One usually tries to be a good net.citizen, lest one be flamed. netiquette A pun on ``etiquette''; proper behavior on The Net. See section Usenet ``Netiquette''. network A group of machines connected together so they can transmit information to one another. There are two kinds of networks: local networks and remote networks. NFS (Network File System) A method developed by Sun Microsystems to allow computers to share files across a network in a way that makes them appear as if they're ``local'' to the system. NIC The Network Information Center. node A computer that is attached to a network; also called a host. NSFnet The national backbone network, funded by the National Science Foundation and operated by the Merit Corporation, used to interconnect regional (mid-level) networks such as WestNet to one another. Page | 6
  • 27. packet The unit of data sent across a packet switching network. The term is used loosely. While some Internet literature uses it to refer specifically to data sent across a physical network, other literature views the Internet as a packet switching network and describes IP datagrams as packets. polling Connecting to another system to check for things like mail or news. postmaster The person responsible for taking care of mail problems, answering queries about users, and other related work at a site. protocols A formal description of message formats and the rules two computers must follow to exchange those messages. Protocols can describe low-level details of machine-to-machine interfaces (e.g., the order in which bits and bytes are sent across a wire) or high-level exchanges between allocation programs (e.g., the way in which two programs transfer a file across the Internet). recursion The facility of a programming language to be able to call functions from within themselves. resolve Translate an Internet name into its equivalent IP address or other DNS information. RFD (Request For Discussion) Usually a two- to three-week period in which the particulars of newsgroup creation are battled out. route The path that network traffic takes from its source to its destination. router A dedicated computer (or other device) that sends packets from one place to another, paying attention to the current state of the network. RTFM (Read The Fantastic Manual) Page | 7
  • 28. .This anacronym is often used when someone asks a simple or common question. The word `Fantastic' is usually replaced with one much more vulgar. SMTP (Simple Mail Transfer Protocol) The Internet standard protocol for transferring electronic mail messages from one computer to another. SMTP specifies how two mail systems interact and the format of control messages they exchange to transfer mail. server A computer that shares its resources, such as printers and files, with other computers on the network. An example of this is a Network File System (NFS) server which shares its disk space with other computers. signal-to-noise ratio When used in reference to Usenet activity, signal-to-noise ratio describes the relation between amount of actual information in a discussion, compared to their quantity. More often than not, there's substantial activity in a newsgroup, but a very small number of those articles actually contain anything useful. signature The small, usually four-line message at the bottom of a piece of email or a Usenet article. In Unix, it's added by creating a file .signature in the user's home directory. Large signatures are a no-no. summarize To encapsulate a number of responses into one coherent, usable message. Often done on controlled mailing lists or active newsgroups, to help reduce bandwidth. synchronous Data communications in which transmissions are sent at a fixed rate, with the sending and receiving devices synchronized. TCP/IP (Transmission Control Protocol/Internet Protocol) A set of protocols, resulting from ARPA efforts, used by the Internet to support services such as remote login (telnet), file transfer (FTP) and mail (SMTP). telnet Page | 8
  • 29. The Internet standard protocol for remote terminal connection service. Telnet allows a user at one site to interact with a remote timesharing system at another site as if the user's terminal were connected directly to the remote computer. terminal server A small, specialized, networked computer that connects many terminals to a LAN through one network connection. Any user on the network can then connect to various network hosts. @TeX A free typesetting system by Donald Knuth. twisted pair Cable made up of a pair of insulated copper wires wrapped around each other to cancel the effects of electrical noise. UUCP (Unix to Unix Copy Program) A store-and-forward system, primarily for Unix systems but currently supported on other platforms (e.g. VMS and personal computers). WAN (Wide-Area Network) A network spanning hundreds or thousands of miles. workstation A networked personal computing device with more power than a standard IBM PC or Macintosh. Typically, a workstation has an operating system such as unix that is capable of running several tasks at the same time. It has several megabytes of memory and a large, high- resolution display. Examples are Sun workstations and Digital DECstations. worm A computer program which replicates itself. The Internet worm (see section The Internet Worm) was perhaps the most famous; it successfully (and accidentally) duplicated itself on systems across the Internet. wrt With respect to. Page | 9