Browse Definitions :
  • September 21, 2005 21 Sep'05

    XMT (Extensible MPEG-4 Textual)

    The XMT (Extensible MPEG-4 Textual) format is the use of a textual syntax to represent MPEG-4 3-D scene descriptions.  Continue Reading

  • September 21, 2005 21 Sep'05

    megatransfer

    On a Small Computer System Interface (SCSI) computer bus, a megatransfer is one million data transfers.  Continue Reading

  • September 21, 2005 21 Sep'05

    cosine wave

    A cosine wave is a signal waveform with a shape identical to that of a sine wave, except each point on the cosine wave occurs exactly 1/4 cycle earlier than the corresponding point on the sine wave.  Continue Reading

  • September 21, 2005 21 Sep'05

    Fourier synthesis

    Fourier synthesis is a method of electronically constructing a signal with a specific, desired periodic waveform.  Continue Reading

  • September 21, 2005 21 Sep'05

    bevel

    In graphic design, bevel is a raised effect created by applying highlight and shadow colors to the inside and outside edges of the border of an image or text area in order to create the illusion that the image or text area has three dimensions.  Continue Reading

  • September 21, 2005 21 Sep'05

    arithmetic mean

    The arithmetic mean, also called the average or average value, is the quantity obtained by summing two or more numbers or variables and then dividing by the number of numbers or variables.  Continue Reading

  • September 21, 2005 21 Sep'05

    ringback

    Ringback is an intermittent audio tone that a caller in a telephone system hears after dialing a number, when the distant end of the circuit is receiving a ringing signal.  Continue Reading

  • September 21, 2005 21 Sep'05

    Fax Group

    Fax Group is an encoding format used for fax transmission.  Continue Reading

  • September 21, 2005 21 Sep'05

    Bezier curve

    A Bezier curve is a mathematically defined curve used in two-dimensional graphic applications.  Continue Reading

  • September 21, 2005 21 Sep'05

    screen name

    In a computer network, a screen name is the name a user chooses to use when communicating with others online.  Continue Reading

  • September 21, 2005 21 Sep'05

    buddy list

    In instant messaging (IM) applications on a personal computer (PC), or on a cellular telephone with text display, a buddy list is a list of people a user wants to keep track of.  Continue Reading

  • September 21, 2005 21 Sep'05

    scanning tunneling microscope (STM)

    A scanning tunneling microscope (STM) is a device that obtains images of the atoms on the surfaces of materials.  Continue Reading

  • September 21, 2005 21 Sep'05

    elementary charge

    An elementary charge is the electrical charge carried by a single electron.  Continue Reading

  • September 21, 2005 21 Sep'05

    hard bounce

    A hard bounce is an e-mail message that has been returned to the sender because the recipient's address is invalid.  Continue Reading

  • September 21, 2005 21 Sep'05

    Java Ring

    A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger.  Continue Reading

  • September 21, 2005 21 Sep'05

    real life

    Real life is a term used to describe what happens outside the Internet and implies that somehow the Internet furnishes us with a virtual life.  Continue Reading

  • September 21, 2005 21 Sep'05

    characteristic impedance of free space

    The characteristic impedance of free space, also called the Z o of free space, is an expression of the relationship between the electric-field and magnetic-field intensities in an electromagnetic field (EM field) propagating through a vacuum.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • VRAM (video RAM)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

Close