Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.
  • compatibility - In the world of IT, compatibility refers to the ability of software and hardware from different sources to work together without having to be altered to do so.
  • connectionless - In telecommunications, connectionless describes communication between two network endpoints in which a message can be sent from one endpoint to another without prior arrangement.
  • Consensus Algorithm - A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
  • cooperative games - Cooperative games are games where players work with one and other in order to achieve a common objective.
  • COPE (corporate-owned, personally enabled) - COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.
  • corportal (corporate portal) - Corportals, short for corporate portals, are sometimes referred to as enterprise information portals and are used by corporations to build their internal web presence by leveraging a company's information resources.
  • cryptocurrency - Cryptocurrency is a digital form of currency that uses cryptography to secure the processes involved in generating units, conducting transactions and verifying the exchange of currency ownership.
  • CSS (cascading style sheets) - This definition explains the meaning of cascading style sheets (CSS) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
  • Ctrl-Alt-Delete - On a personal computer with the Microsoft Windows operating system, Control+Alt+Delete is the combination of the Ctrl key, the Alt key, and Del key that a user can press at the same time to terminate an application task or to reboot the operating system.
  • cursor - A cursor is the position indicator on a computer display screen where a user can enter text.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • cyberbullying - Cyberbullying is a type of bullying in which one or more individuals use digital technologies to intentionally and repeatedly cause harm to another person.
  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • cyberstalking - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
  • cyberterrorism - Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence.
  • CYOD (choose your own device) - CYOD (choose your own device) is an employee provisioning model in which an organization allows people to select the mobile devices they would like, usually from a limited number of options.
  • dark web (darknet) - The dark web is an encrypted portion of the internet not visible to the general public via a traditional search engine such as Google.
  • data cap (broadband cap) - A data cap is a specific amount of mobile data that a user account can access for a given amount of money, usually specified per month.
  • data plan (mobile data plan) - Since the advent of the smartphone made mobile Internet possible, most carriers offer data plans at varying rates based on the amount of data transfer allowed before a data cap is imposed.
  • data source name (DSN) - A data source name (DSN) is a data structure containing information about a specific database to which an Open Database Connectivity (ODBC) driver needs to connect.
  • database availability group (DAG) - A database availability group (DAG) is a high availability (HA) and data recovery feature of Exchange Server 2010.
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • deep web - The deep web is an umbrella term for parts of the internet not fully accessible through standard search engines like Google, Bing and Yahoo.
  • default password - A default password is a standard preconfigured password for a device or software.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • degrees of freedom (mechanics) - In mechanics, degrees of freedom (DOF) is the number of independent variables that define the possible positions or motions of a mechanical system in space.
  • desktop - A desktop is a computer display area that represents the kinds of objects found on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop publishing (DTP) - Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.
  • device as a service (DaaS) - The device as a service (DaaS) model offers PCs, smartphones and other mobile computing devices as a paid service.
  • device driver - A device driver is a special kind of software program that controls a specific hardware device attached to a computer.
  • device-agnostic (device agnosticism) - Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an IP address to any device, or node, on a network so it can communicate using IP.
  • digiboard (or digicard) - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digital citizenship - Digital citizenship is the online presence, behaviors and response to others within a digital community where one is a member.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital footprint - A digital footprint -- sometimes called a digital shadow -- is the body of data that an individual creates through their actions online.
  • digital native - A digital native is a person who grew up with the presence of digital technology or in the information age.
  • digital projector (digital projection display system) - A digital projector, also called a digital projection display system, is a specialized computer display that projects an enlarged image on a movie screen.
  • digital self-harm - Digital self-harm is targeting oneself with negative content online.
  • digital tattoo - With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip.
  • digital television (DTV) - Digital television (DTV) is the transmission of television signals using a digital broadcast format rather than conventional analog methods.
  • digital video - Digital video is audio/visual content in a binary format, with information presented as a sequence of digital data rather than in a continuous signal as analog information is.
  • digital wallet - In general, a digital wallet is a software application, usually for a smartphone, that serves as an electronic version of a physical wallet.
  • digitization - Digitization is the process of converting information into a digital format.
  • direct digital marketing (DDM) - Direct digital marketing (DDM) is the electronic delivery of relevant communications to specific recipients.
  • direct email marketing - Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of recipients.
  • Direct Memory Access (DMA) - Direct Memory Access (DMA) is a capability provided by some computer bus architectures that enables data to be sent directly from an attached device to the computer's main memory.
  • display - In computing, a display is a device with a screen that shows a rendered electronic image made up of pixels that are illuminated in a way that distinguishes text and graphic elements.
  • DisplayPort - DisplayPort is an interface for digital displays, particularly computer monitors.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distributed applications (distributed apps) - Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms.
  • distributed learning - Distributed learning is a general term used to describe a multi-media method of instructional delivery that includes a mix of Web-based instruction, streaming video conferencing, face-to-face classroom time, distance learning through television or video, or other combinations of electronic and traditional educational models.
  • distribution list - In email applications, a distribution list is a list of email addresses that can be mass mailed via automation without having to add members individually.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • domain - Specific to the internet, the term domain can refer to how the internet is structured, and domain also refers to how an organization's network resources are organized.
  • domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • dots per inch (dpi) - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • downloading - Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
  • DRAM (dynamic random access memory) - DRAM (dynamic random access memory) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • drone (UAV) - A drone is an unmanned aircraft.
  • dual SIM phone - A dual SIM phone is a mobile phone, typically a smartphone, with the capacity to use two subscriber identity module (SIM) cards.
  • DuckDuckGo - DuckDuckGo is an independent company that offers products geared toward internet privacy.
  • dumpster diving - Dumpster diving is looking for treasure in someone else's trash.
  • dynamic IP address - A dynamic IP address is a temporary address for devices connected to a network that will continually change over time.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • e-procurement (supplier exchange) - Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.
  • Echo Show - The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant.
  • EEPROM (electrically erasable programmable read-only memory) - EEPROM (electrically erasable programmable read-only memory) is a user-modifiable ROM.
  • email - Email (electronic mail) is the exchange of computer-stored messages from one user to one or more recipients via the internet.
  • email archiving - Email archiving is a systematic approach to saving and protecting the data contained in emails to enable fast retrieval.
  • email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
  • email signature - An email signature -- or signature block or signature file -- is the short text that appears at the end of an email message to provide more information about the sender.
  • email spam - Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.
  • email virus - An email virus consists of malicious code distributed in email messages to infect one or more devices.
  • empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • enterprise file sync and share (EFSS) - Enterprise file sync and share (EFSS) is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.
  • enterprise mobility - Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.
  • EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) - EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) is a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods.
  • EPROM (erasable programmable read-only memory) - EPROM (erasable programmable read-only memory) is memory that does not lose its data when the power supply is cut off.
  • evil twin attack - An evil twin attack is a rogue Wi-Fi access point (AP) that masquerades as a legitimate one, enabling an attacker to gain access to sensitive information without the end user's knowledge.
  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC), introduced by Microsoft in 2007, is an administrative tool with a graphical user interface (GUI) that's used to manage the components and resources of Microsoft Exchange Server.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • executable file (EXE file) - An executable file (EXE file) is a computer file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • extranet - An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
  • Facebook - Facebook is a social networking website that was founded in February 2004 by Harvard University students Chris Hughes, Andrew McCollum, Dustin Moskovitz, Eduardo Saverin and Mark Zuckerberg.
  • Facebook Connect - Facebook Connect is a single sign-on application which allows users to interact on other websites through their Facebook account.
  • Facebook Messenger - Facebook Messenger is a mobile app that enables chat, voice and video communications between Facebook web-based messaging and smartphones.
  • Facebook Mobile - Facebook Mobile is a feature that allows a user to access Facebook from their cell phone through text messages, e-mails, downloaded applications or a web browser.
  • Facebook page - A Facebook page is a public profile specifically created for businesses, brands, celebrities, causes, and other organizations.
  • Facebook status - A Facebook status is a social media update feature that enables users to discuss their thoughts, whereabouts or important information with their friends from their Facebook profile.
Networking
Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close