Browse Definitions :
  • September 21, 2005 21 Sep'05


    Pixilated, an adjective derived from pixie (a fairy elf), describes someone who is whimsical or bemused, slightly drunk (tipsy), or, according to Webster's, "somewhat unbalanced mentally."  Continue Reading

  • September 21, 2005 21 Sep'05


    Pixelation is the display of a digitized image where the individual pixels are apparent to a viewer.  Continue Reading

  • September 21, 2005 21 Sep'05

    ring network

    A ring network is a local area network (LAN) in which the nodes (workstations or other devices) are connected in a closed loop configuration.  Continue Reading

  • September 21, 2005 21 Sep'05

    Internet appliance

    An Internet appliance (sometimes called a Net appliance, a smart appliance or an information appliance) is a machine designed for a specific function that also has a built-in Web-enabled computer.  Continue Reading

  • September 21, 2005 21 Sep'05

    Internet refrigerator (Net fridge or Web-enabled refrigerator)

    An Internet refrigerator (sometimes called a Net fridge) is a version of the familiar kitchen appliance with a built-in computer that can be connected to the Internet.  Continue Reading

  • September 21, 2005 21 Sep'05


    Fan-out is a term that defines the maximum number of digital inputs that the output of a single logic gate can feed.  Continue Reading

  • September 21, 2005 21 Sep'05


    A picoliter is a trillionth (one millionth of a millionth, or 10 to the -12th power) of a liter, which can be represented numerically as 0.  Continue Reading

  • September 21, 2005 21 Sep'05


    The volt (symbolized V) is the Standard International (SI) unit of electric potential or electromotive force.  Continue Reading

  • September 21, 2005 21 Sep'05

    standing-wave ratio (SWR, VWSR, IWSR)

    Standing-wave ratio (SWR) is a mathematical expression of the non-uniformity of an electromagnetic field (EM field) on a transmission line such as coaxial cable.  Continue Reading

  • September 21, 2005 21 Sep'05


    The coulomb (symbolized C) is the standard unit of electric charge in the International System of Units (SI).  Continue Reading

  • September 21, 2005 21 Sep'05


    Coordinates are distances or angles, represented by numbers, that uniquely identify points on surfaces of two dimensions (2D) or in space of three dimensions (3D).  Continue Reading

  • September 21, 2005 21 Sep'05

    Boltzmann's constant

    Boltzmann's constant, also called the Boltzmann constant and symbolized k or k B, defines the relation between absolute temperature and the kinetic energy contained in each molecule of an ideal gas.  Continue Reading

  • September 21, 2005 21 Sep'05


    In the Apple OS X operating system, the dock is a user-modifiable row of function or application icons that appear on the computer desktop so that the user can find and select any of them quickly.  Continue Reading

  • September 21, 2005 21 Sep'05


    The Altair was the world's first personal computer (PC) to attract a substantial number of users.  Continue Reading

  • September 21, 2005 21 Sep'05

    DB-xx (DB-9, DB-15, DB-25, DB-50, DB-68)

    DB-xx is the designation for a series of port connectors for attaching devices to computers.  Continue Reading

  • September 21, 2005 21 Sep'05


    An isotope is a form of a chemical element whose atomic nucleus contains a specific number of neutron s, in addition to the number of protons that uniquely defines the element.  Continue Reading

  • September 21, 2005 21 Sep'05

    quiet zone

    In barcode technology, a quiet zone is the blank margin on either side of a bar code that's used to tell the barcode reader where a barcode's symbology starts and stops.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.