Lexikon-Einträge mit Buchstabe „C“
- Cabinet-Datei
- Cache auf einem Stick
- Cache der zentralen Verarbeitungseinheit (CPU-Cache)
- Cache-Cramming
- Cache-Kohärenz
- Cache-Speicher
- Caching-Proxy
- Caesar-Chiffre
- Cafeteria-Systeme
- Cakewalk Application Language
- Call Center
- Campus Area Network
- Cancelbot
- Cancelmoose
- Cantenna
- CAN-SPAM Act
- Capability Maturity Model Integration
- Capability Statement
- Capable-to-Promise-System
- Capable-to-Promise-System
- Capital Asset Pricing Model (CAPM)
- CAPI (Computer Assisted Personal Interviewing)
- CAPTCHA
- Captive-Portal
- CAP-Theorem
- Carbon Footprint
- Carbon Free Computing
- Cardfile (.CRD)
- Carebear
- Careware
- Cargo-Kult-Programmierung
- Carnivore
- Carrier Ethernet
- Carrier IQ
- Carry-Flag (C-Flag)
- Carry-over-Effekte
- Cascading Stylesheets Level 3 (CSS3)
- Cascading Style Sheets Level 1 (CSS1)
- Cascading Style Sheets Level 2 (CSS2)
- Cascading Windows
- Case Modding
- Cashflow
- Cash Management
- Cash-and-Carry Läger
- Cash-Management
- Cash-Pooling
- Cash-Value-Added (Unterschieds-Brutto-Cashflow)
- Caspio Bridge
- Castanet
- Catch Block
- Catenet
- CATI (Computer Assisted Telephone Interview)
- Cat 7-Kabel
- Cat-3-Kabel
- CAWI (Computer Assisted Web Interview)
- CA-Element / Computer Aided Element
- CD-Brenner
- CD-Ripper
- Cellpadding
- Censorware
- Center-Konzepte
- Centronics-Schnittstelle
- Certified Ethical Hacker
- Certified Information Security Manager
- Certified Novell Engineer
- Ceteris-paribus-Klausel
- Challenge Handshake Authentication Protocol
- Chancen-Risiken-Analyse
- Change-Management
- Channel Bonding
- Chaostheorie
- Chaotische Lagerhaltung
- Character Map (charmap)
- Charles Babbage
- Chatbot
- Chat-Akronym
- Check Disk
- Check Disk (chkdsk)
- Chefentlastung
- Chiclet-Tastatur / Kaugummitastatur
- Chief Analytics Officer
- Chief Analytics Officer (CAO)
- Chief Cloud Officer (CCO)
- Chief Data Officer (CDO)
- Chief Digital Officer (CDO)
- Chief Experience Officer (CXO)
- Chief Green Officer (CGO)
- Chief Information Officer (CIO)
- Chief Information Security Officer (CISO)
- Chief Knowledge Officer (CKO)
- Chief Medical Information Officer (CMIO)
- Chief Risk Officer (CRO)
- Chief Security Officer (CSO)
- Chief Technology Officer (CTO)
- Chiffrierblockverkettungsprozess
- Chip-Multithreading
- Chip-Scale-Package
- CHIP-8
- Choke Worm
- Chrestomathie
- Chromatische Abweichung
- Chroma-Bug
- Chrome Canary
- Chrome-Betriebssystem (Chrome OS)
- CIE-Farbmodell
- CIF (Cost, Insurance, Freight)
- Cinema Craft Encoder
- Circuit-Bending
- Circuit-Level-Gateway
- Cisco Certified Internetwork Expert
- Cisco Certified Network Associate
- Cisco Certified Network Associate
- Cisco Certified Network Professional
- Cisco Certified Network Professional
- Cisco Certified Security Professional
- Cisco Discovery Protocol
- Cisco EnergyWise
- Cisco IOS
- Cisco Network Admission Control
- Cisco Network Admission Control
- Cisco Unified Computing System
- Citizen Data Scientist
- Citizen Developer
- Citizen-Value
- Citrix Server
- Citrix XenApp
- Citrix XenDesktop
- Citrix XenServer
- Claimmanagement
- Classless Interdomain Routing
- Clean Boot
- Clean Computing
- Clearingverfahren
- Clearing House Interbank Payments Company (CHIPS)
- Clickbait
- Clickjacking
- Clickjack-Angriff
- Clickprint
- Clickstream
- Clickstream-Analyse
- Clicktivism
- Clickwrap-Vereinbarung
- Click-to-Callback
- Clientzugriffslizenz
- Client-Hypervisor
- Client-Server-Modell
- Clipper-Chip
- Clippy (Microsoft Word)
- Cloaking
- Clock Gating
- Clojure
- Clonezilla
- Cloning-Software
- Closed-Loop-Marketing
- Close to Metal
- CloudAudit
- CloudAV
- Cloudsourcing
- CloudStack
- Cloudstorming
- Cloudware
- Cloudwashing
- Cloud Access Security Broker
- Cloud Advertising
- Cloud Analytics
- Cloud Application Management für Plattformen
- Cloud Application Portability
- Cloud Burst
- Cloud Computing
- Cloud Data Management Interface
- Cloud Disaster Recovery
- Cloud Drive
- Cloud Enabler
- Cloud Foundry
- Cloud Security Alliance
- Cloud Sprawl
- Cloud VPN
- Cloud-Aktivierung
- Cloud-Anbieter
- Cloud-App-Richtlinie
- Cloud-Archiv
- Cloud-Automatisierung
- Cloud-Backup
- Cloud-Backup-Dienstanbieter
- Cloud-basierter Point-of-Sale
- Cloud-basiertes Grid-Computing
- Cloud-basiertes Networking
- Cloud-Bereitstellung
- Cloud-Beschleunigung
- Cloud-Betriebssystem (Cloud OS)
- Cloud-Broker
- Cloud-Compliance
- Cloud-Computing-Manifest
- Cloud-Computing-Reifegradmodell
- Cloud-Computing-Reifegradmodell
- Cloud-Computing-Reseller
- Cloud-Computing-Sicherheit
- Cloud-Dateifreigabe
- Cloud-Datenbank
- Cloud-Datenschutz
- Cloud-Dienste
- Cloud-Druckdienst
- Cloud-Elastizität
- Cloud-Gaming
- Cloud-Hosting
- Cloud-Infrastruktur
- Cloud-Integrationsplattform
- Cloud-in-a-Can
- Cloud-Kapitalist
- Cloud-Kartographie
- Cloud-Kommunikation
- Cloud-Management
- Cloud-Management-Plattform
- Cloud-Management-Software
- Cloud-Middleware
- Cloud-Migration
- Cloud-Monitoring
- Cloud-native Architektur
- Cloud-Networking
- Cloud-Netzwerk
- Cloud-Operations-Management
- Cloud-Orchestrierung
- Cloud-orientierte Architektur
- Cloud-Performance-Management
- Cloud-Performance-Monitoring
- Cloud-Portabilität
- Cloud-Security-Broker
- Cloud-Server
- Cloud-Service-Architektur
- Cloud-Sicherheitskontrolle
- Cloud-Spanning
- Cloud-Speicher
- Cloud-Speicherdienst
- Cloud-Speicher-API
- Cloud-Speicher-Gateway
- Cloud-Speicher-Service-Level-Agreement
- Cloud-Verschlüsselungs-Gateway
- Cloud-Vorgänge
- Club of Rome
- Clusteranalyse
- Cluster (Server)
- Cluster-Controller
- Cluster-Host
- Cluster-Kapazitäts-Dashboard
- Cluster-Tabellen
- Cluster-Virus
- Coase-Theorem
- COBIT
- Cobol
- Cobweb-Site
- Cockpit Charts
- Cocoa Touch
- COCOMO (Constructive Cost Model)
- Cocooning
- Codds Regeln
- Codec (Kompressor / Dekompressor)
- Codegenerator
- Codemultiplex-Vielfachzugriff
- Codename
- Codeverwaltung
- Code Bloat
- Code Coverage / Codeabdeckung
- Code Signing
- Codezugriffssicherheit
- Code-Affe
- Code-Analyzer
- Code-Crash
- Code-Division-Multiplexing
- Code-Effizienz
- Code-Generierung
- Code-Injection
- Code-Review
- Cognitive Computing
- Cognos
- ColdFusion
- Cold Spare
- Cold-Backup
- Cold-Buffer
- Cold-Plugging
- Cold-Server
- Cold-Standby
- Cold-Standort
- Collaboration Data Objects
- Collaboration-Software
- Collaborative Browsing
- Collaborative Computing
- Collaborative Filtering
- Collaborative Master Data Management
- Collaborative Product Commerce
- Colocation-Einrichtung
- Commerce Service Provider
- Commerce XML (cXML)
- Commerce-Server (Handelsserver)
- Commodity Approach
- Commodity Computing
- Commodity-Hardware
- Commodity-Server
- Commodore Personal Electronic Transactor
- Commodore SX-64
- Commodore VIC-20
- Commodore 128
- Commodore 64
- Common Address Redundancy Protocol
- Common Address Redundancy Protocol
- Common Gateway Interface (CGI)
- Common Information Model
- Common Language Infrastructure
- Communications as a Service (CaaS)
- Compagnon-Verfahren
- Competitive Auction
- CompuServe
- Computational Complexity
- Computational Fluid Dynamics
- Computational Neuroscience
- Computeranimation
- Computerausgabe an die Laserdiskette
- Computerbasiertes Lernen
- Computerbetrugs- und Missbrauchsgesetz
- Computercluster
- Computerethik
- Computergenerierte Bilder
- Computergestütztes Origami
- Computergestütztes Software-Engineering
- Computergestütztes Software-Engineering
- Computergestütztes Testwerkzeug
- Computergestütztes Testwerkzeug (CATT)
- Computergestützte Geometrie
- Computergestützte Mathematik
- Computergestützte Prozessplanung
- Computergestützte Wissenschaft
- Computergrafik-Metadatei
- Computerkenntnisse
- Computerlinguistik
- Computernetzwerk
- Computernetzwerkausnutzung
- Computernetzwerkverteidigung
- Computerontologie
- Computerraumklimatisierung
- Computersimulation
- Computertechniker
- Computertechnologie-Industrieverband (CompTIA)
- Computer Händler Ausstellung (COMDEX)
- Computer Händler Ausstellung (COMDEX)
- COMPUter SECURITY (COMPUSEC)
- Computer Vision
- Computer Vision Syndrom
- Computer-Management
- Computer-Management-Software
- Computer-Netzwerktechniker
- Computron
- Concurrent Versions System
- Conditional Access
- Conficker
- CONFIG.SYS Konfigurationsdatei
- Conjoint-Analyse
- Conjoint-Analyse / Conjoint-Measurement
- Connection Admission Control
- Consumer to Business to Consumer (C2B2C)
- Consumer-to-Business (C2B)
- Containers as a Service (CaaS)
- Content Delivery Network (CDN)
- Content Integration
- Content Management System (CMS)
- Content Personalisierung
- Content Scraping
- Content Vectoring Protocol
- Content-Delivery
- Content-Farm
- Content-Marketing
- Content-Spoofing
- Context Delivery Architecture (CoDA)
- Controllerbericht
- Controllership
- Controllingeinführung
- Controllingentwicklungsstufen
- Controllingfunktion
- Controllinggebiete
- Controllinginformationen
- Controllinginstrumente
- Controllinginstrumente in öffentlichen Verwaltungen
- Controllingziele
- Controlling-Abteilung
- Controlling-Analysepfad
- Controlling-Applikation
- Controlling-Beauftragte
- Controlling-Konferenzen
- Conversion-Marketing
- Conways Gesetz
- Cookie-Diebstahl
- Cookie-Respawn
- Cookie-Vergiftung
- CoolTalk
- Core Dump
- Core-Router
- Core-Switch
- Corporate Identity
- Corporate-Governance – Grundsätze der Unternehmensführung
- Corporate-Venturing als Organisationsansätze
- Cost to complete
- Cost-per-Action (CPA)
- Cost-per-Click (CPC)
- Cost-per-Conversion (CPC)
- Cost-per-Lead (CPL)
- Co-Branding
- Co-Location
- Co-Marketing
- CO2-neutral
- CPU-Auslastung
- CPU-Engpass
- CPU-Konflikte
- CPU-Sockel
- CPU-Sperre
- CPU-Überlastung
- Crapware
- Credential Stuffing
- Creeper Virus
- Crimeware
- Crimeware
- Crippleware
- CRM Software zur Verwaltung von Kundendaten
- CRM-Dashboard
- CRM-Kundenservice-Lösung
- Crossbar-Schalter
- Cross Language Support
- Cross Site Scripting (XSS)
- Cross-Browser
- Cross-Plattform Mobile Entwicklung
- Cross-Posting
- Crowdcasting
- Crowdfunding
- Crowdsourcing
- Cryptoanarchismus
- Cryptojacking
- CryptoLocker
- CSV-Datei (Comma Separated Values)
- Cyberactivism
- Cyberangriff
- Cyberbalkanisierung
- Cyberbullying
- Cybercide
- Cyberforensik
- Cyberkriminalität
- Cyberlocker
- Cyberpunk
- Cybersicherheit
- Cyberspying
- Cybersquatting
- Cyberstalking
- Cyberterrorismus
- Cyberwarfare
- Cyber Incident Response Plan
- Cyber Monday
- Cyber Pearl Harbor
- Cyber Range
- Cyber-Bibliothek
- Cyber-Kill-Kette
- Cyber-Krieger
- Cyber-Recht
- Cyber-Versicherung
- Cyber-Verteidigung
- Cupertino-Effekt
- Currency-Board (Währungsamt)
- Cursor Steuertasten
- Customer Experience Management
- Customer Feedback Management
- Customer Lifetime Value-Ansatz
- Customer Relationship Management-Analysen (CRM-Analysen)
- Cut-Through-Switching
- C-Commerce
- C-Level-Executive
- C1-Sicherheit
- C2-Sicherheit