Browse Definitions :
  • September 21, 2005 21 Sep'05

    XMT (Extensible MPEG-4 Textual)

    The XMT (Extensible MPEG-4 Textual) format is the use of a textual syntax to represent MPEG-4 3-D scene descriptions.  Continue Reading

  • September 21, 2005 21 Sep'05

    cosine wave

    A cosine wave is a signal waveform with a shape identical to that of a sine wave, except each point on the cosine wave occurs exactly 1/4 cycle earlier than the corresponding point on the sine wave.  Continue Reading

  • September 21, 2005 21 Sep'05


    On a Small Computer System Interface (SCSI) computer bus, a megatransfer is one million data transfers.  Continue Reading

  • September 21, 2005 21 Sep'05

    Fourier synthesis

    Fourier synthesis is a method of electronically constructing a signal with a specific, desired periodic waveform.  Continue Reading

  • September 21, 2005 21 Sep'05


    In graphic design, bevel is a raised effect created by applying highlight and shadow colors to the inside and outside edges of the border of an image or text area in order to create the illusion that the image or text area has three dimensions.  Continue Reading

  • September 21, 2005 21 Sep'05

    arithmetic mean

    The arithmetic mean, also called the average or average value, is the quantity obtained by summing two or more numbers or variables and then dividing by the number of numbers or variables.  Continue Reading

  • September 21, 2005 21 Sep'05


    Ringback is an intermittent audio tone that a caller in a telephone system hears after dialing a number, when the distant end of the circuit is receiving a ringing signal.  Continue Reading

  • September 21, 2005 21 Sep'05

    Bezier curve

    A Bezier curve is a mathematically defined curve used in two-dimensional graphic applications.  Continue Reading

  • September 21, 2005 21 Sep'05

    Fax Group

    Fax Group is an encoding format used for fax transmission.  Continue Reading

  • September 21, 2005 21 Sep'05

    screen name

    In a computer network, a screen name is the name a user chooses to use when communicating with others online.  Continue Reading

  • September 21, 2005 21 Sep'05

    buddy list

    In instant messaging (IM) applications on a personal computer (PC), or on a cellular telephone with text display, a buddy list is a list of people a user wants to keep track of.  Continue Reading

  • September 21, 2005 21 Sep'05

    scanning tunneling microscope (STM)

    A scanning tunneling microscope (STM) is a device that obtains images of the atoms on the surfaces of materials.  Continue Reading

  • September 21, 2005 21 Sep'05

    hard bounce

    A hard bounce is an e-mail message that has been returned to the sender because the recipient's address is invalid.  Continue Reading

  • September 21, 2005 21 Sep'05

    elementary charge

    An elementary charge is the electrical charge carried by a single electron.  Continue Reading

  • September 21, 2005 21 Sep'05

    Java Ring

    A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger.  Continue Reading

  • September 21, 2005 21 Sep'05

    real life

    Real life is a term used to describe what happens outside the Internet and implies that somehow the Internet furnishes us with a virtual life.  Continue Reading

  • September 21, 2005 21 Sep'05

    document reader

    A document reader is a device that converts an electronic file or printed matter to a form suitable for use by people with visual impairment.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.