Browse Definitions :
  • September 21, 2005 21 Sep'05

    cheat sheet

    A cheat sheet is a piece of paper with information written down on it that an unethical person might create if they weren't prepared for a test.  Continue Reading

  • September 21, 2005 21 Sep'05

    blackhole list (blacklist)

    A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).  Continue Reading

  • September 21, 2005 21 Sep'05

    sequential logic

    Sequential logic is a form of binary circuit design that employs one or more inputs and one or more outputs, whose states are related by defined rules that depend, in part, on previous states.  Continue Reading

  • September 21, 2005 21 Sep'05

    combinatorial logic

    Combinatorial logic is a concept in which two or more input states define one or more output states, where the resulting state or states are related by defined rules that are independent of previous states.  Continue Reading

  • September 21, 2005 21 Sep'05

    Panther

    Panther was the code name for Mac OS version 10.  Continue Reading

  • September 21, 2005 21 Sep'05

    SeniorNet

    SeniorNet is a non-profit organization that provides online education about technology and the Internet for people who are 50 or older.  Continue Reading

  • September 21, 2005 21 Sep'05

    most significant bit or byte

    The most significant bit (MSB) is the bit in a multiple-bit binary number with the largest value.  Continue Reading

  • September 21, 2005 21 Sep'05

    Single UNIX Specification

    The Single UNIX Specification is an industry standard description of the C language program and user command interfaces for a standard Unix operating system.  Continue Reading

  • September 21, 2005 21 Sep'05

    bias

    Bias is direct current (DC) deliberately made to flow, or DC voltage deliberately applied, between two points for the purpose of controlling a circuit.  Continue Reading

  • September 21, 2005 21 Sep'05

    saturation

    Saturation is the fully conducting state in a semiconductor junction.  Continue Reading

  • September 21, 2005 21 Sep'05

    joystick

    In computers, a joystick is a cursor control device used in computer games and assistive technology.  Continue Reading

  • September 21, 2005 21 Sep'05

    Extensible Name Service (XNS)

    Extensible Name Service (XNS) is an open Extensible Markup Language (XML)-based protocol that specifies a way to establish and manage a universal addressing system.  Continue Reading

  • September 21, 2005 21 Sep'05

    spamblock

    A spamblock is a text segment interjected into an e-mail address to foil a spambot (a program that a spammer uses to troll the Internet seeking e-mail addresses).  Continue Reading

  • September 21, 2005 21 Sep'05

    random numbers

    Random numbers are numbers that occur in a sequence such that two conditions are met: ( the values are uniformly distributed over a defined interval or set, and (2) it is impossible to predict future values based on past or present ones.  Continue Reading

  • September 21, 2005 21 Sep'05

    PayPal

    PayPal is a Web-based application for the secure transfer of funds between member accounts.  Continue Reading

  • September 21, 2005 21 Sep'05

    Jaguar

    Jaguar was the code name for version 10.2 of the Apple Macintosh OS X (operating system ten).  Continue Reading

  • September 21, 2005 21 Sep'05

    fan-in

    Fan-in is a term that defines the maximum number of digital inputs that a single logic gate can accept.  Continue Reading

  • September 21, 2005 21 Sep'05

    unified field theory or Theory of Everything (TOE)

    Unified field theory is sometimes called the Theory of Everything (TOE, for short): the long-sought means of tying together all known phenomena to explain the nature and behavior of all matter and energy in existence.  Continue Reading

  • September 21, 2005 21 Sep'05

    luminous intensity

    Luminous intensity is an expression of the amount of light power emanating from a point source within a solid angle of one steradian.  Continue Reading

  • September 21, 2005 21 Sep'05

    compute-intensive

    Compute-intensive is a term that applies to any computer application that demands a lot of computation, such as meteorology programs and other scientific applications.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • VRAM (video RAM)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

Close