Browse Definitions :
Definition

DB-xx (DB-9, DB-15, DB-25, DB-50, DB-68)

Contributor(s): Ronald Chock and Graham Lea

DB-xx is the designation for a series of port connectors for attaching devices to computers. DB-xx connectors include DB-9, DB-15, DB-25, DB-50, and DB-68.

DB-9 is a connector used for RS-232 connections and for several video interfaces on IBM-compatible computers.

DB-15 is a female connector used as a joystick port on IBM-compatible computers and as the video connector on Macintosh computers. There is also a high-density DB-15 female connector for the Video Graphics Array (VGA) or Super Video Graphics Array (SVGA) video adapter on IBM-compatible computers.

DB-25 is a male connector used for attaching external modems and RS-232 serial peripherals on older IBM-compatible computers. The DB-25 female connector is the parallel port connector for most personal computers. DB-25 was first used with the original IBM personal computer (PC) and has had a long life.

DB-50 is a female connector used as the SCSI-2 connector for 8-bit Narrow SCSI devices on older Sun and Data General computers. However, DB-50 is not recognized by the SCSI specifications.

DB-68 is a high-density connector used as a SCSI-3 connector for 16-bit Wide SCSI and Fast SCSI devices.

This was last updated in September 2005

Continue Reading About DB-xx (DB-9, DB-15, DB-25, DB-50, DB-68)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close