Browse Definitions :
Definition

hangup (or hang)

Contributor(s): Sudarshan

A hangup, also called a hang, is a condition that sometimes occurs when computer programs conflict or do not run properly. The computer seems paralyzed. Clicking the mouse has no effect, regardless of where the arrow or cursor is placed.

Sometimes a hangup will resolve itself. In some instances, the loading of a large amount of data (for example, downloading a complex Web page) can appear as a hangup. If you see an hourglass symbol, you should wait a couple of minutes before concluding that the system is hung up. But if the pointer appears and you cannot get a response by clicking on anything or by striking various keys on the keyboard, you will have to terminate the application or reboot the computer.

Pressing CTRL, ALT, and DEL at the same time will usually allow you to exit the program in question. If this does not work, you can press the CTRL, ALT, and DEL twice in rapid succession, and the computer should reboot. This is called a warm boot. You will lose all data in memory in this case. Sometimes even this does not work. In the extreme, it will be necessary to power-down the computer and then power-up again (a cold boot). This is a last resort, because it will cause the operating system to shut down improperly, and may produce hard-drive errors.

This was last updated in March 2011

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close