Browse Definitions :
  • September 21, 2005 21 Sep'05

    polar coordinates

    Polar coordinates provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface.  Continue Reading

  • September 21, 2005 21 Sep'05

    reliability

    Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications.  Continue Reading

  • September 21, 2005 21 Sep'05

    any key

    The phrase "any key," which frequently appears in the direction to computer users to "Press any key," is reportedly a source of confusion to many.  Continue Reading

  • September 21, 2005 21 Sep'05

    transient cookie (session cookie)

    On the Web, a transient cookie, sometimes called a session cookie, is a small file that contains information about a user that disappears when the user's browser is closed.  Continue Reading

  • September 21, 2005 21 Sep'05

    derived object (DO)

    A derived object (DO) is a file created in a Versioned Object Base (VOB).  Continue Reading

  • September 21, 2005 21 Sep'05

    deviceCOM

    DeviceCOM, from Intrinsyc Software, is a line of device and network integration products that is used to make Internet or PC devices work with each other on a network.  Continue Reading

  • September 21, 2005 21 Sep'05

    vi

    vi, pronounced by using each letter (vee-aye), is a widely-used and popular UNIX-based text editor.  Continue Reading

  • September 21, 2005 21 Sep'05

    Direct Inward Dialing (DID)

    Direct Inward Dialing (DID) is a service of a local phone company (or local exchange carrier) that provides a block of telephone numbers for calling into a company's private branch exchange (PBX) system.  Continue Reading

  • September 21, 2005 21 Sep'05

    OK

    OK (pronounced oh-KAY and occasionally spelled okay) is a short way to say "I agree.  Continue Reading

  • September 21, 2005 21 Sep'05

    micro fuel cell

    A micro fuel cell is a power source for electronic devices that converts chemical energy into electrical energy.  Continue Reading

  • September 21, 2005 21 Sep'05

    bar

    In programming, bar is a metasyntactic variable that is used to temporarily represent a function.  Continue Reading

  • September 21, 2005 21 Sep'05

    disposable computer

    A disposable computer is a small data processing device with input/output, memory, and communication capabilities; the device is intended to be used for a limited time period or number of uses and then discarded.  Continue Reading

  • September 21, 2005 21 Sep'05

    SMB (small and medium-sized business or small and midsized business)

    SMB is an abbreviation for small and medium-sized business, sometimes seen as small and midsized business.  Continue Reading

  • September 21, 2005 21 Sep'05

    Northbridge

    Northbridge is an Intel chipset that communicates with the computer processor and controls interaction with memory, the Peripheral Component Interconnect (PCI) bus, Level 2 cache, and all Accelerated Graphics Port (AGP) activities.  Continue Reading

  • September 21, 2005 21 Sep'05

    LexiBot

    LexiBot is a specialized search tool developed by BrightPlanet, as a means of searching the deep Web (the hidden part of the Web that may contain 500 times the content accessible to conventional search engines).  Continue Reading

  • September 21, 2005 21 Sep'05

    dyne

    The dyne (dyn) is the centimeter-gram-second (cgs) unit of force.  Continue Reading

  • September 21, 2005 21 Sep'05

    deadlock

    A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.  Continue Reading

  • September 21, 2005 21 Sep'05

    joule

    The joule (pronounced DJOOL) is the standard unit of energy in electronics and general scientific applications.  Continue Reading

  • September 21, 2005 21 Sep'05

    FDISK

    WARNING: Use caution when repartitioning a hard disk drive that contains data.  Continue Reading

  • September 21, 2005 21 Sep'05

    transparent computing

    Transparent computing is a characteristic of pervasive computing, the possible future state in which we will be surrounded by computers everywhere in the environment that respond to our needs without our conscious use.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close