Browse Definitions :

Browse Definitions by Alphabet

#! - 3-D

  • #! - Among UNIX shell (user interface) users, a shebang is a term for the "#!" characters that must begin the first line of a script.
  • $100 laptop - XO is the first version of the $100 laptop expected to reach a substantial number of users.
  • $100 laptop (XO) - XO is the first version of the $100 laptop expected to reach a substantial number of users.
  • $100 personal computer - XO is the first version of the $100 laptop expected to reach a substantial number of users.
  • $35 computer - Raspberry Pi is a small, single-board computer that costs $35.
  • % - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • .cab - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
  • .ini - INI is a file name extension used in Microsoft Windows.
  • .NET 3.0 - .NET 3.
  • .NET 3.0 (WinFX) - .NET 3.
  • .NET Framework - .NET Framework is a managed execution environment for Windows that allows software developers to create a software application in one programming language and be assured the app can work with code written in other languages.
  • .ogg - Vorbis is an open source patent-free audio compression format, developed as a replacement for proprietary digital audio encoding formats, such as MP3, VQF, and AAC.
  • .ost - An OST file is an offline folder file in Microsoft Outlook.
  • .pst - A PST file is a personal folder file in Microsoft Outlook.
  • .shtml - A Web file with the suffix of ".
  • .Tel - .Tel is a top-level domain (TLD) intended for universal text naming and navigation in Internet-based communications.
  • .vi - Virtual Instrument file is used by National Instruments' LabVIEW development software.
  • 0 - In mathematics, zero, symbolized by the numeric character 0, is both a place indicator meaning "no units of this multiple" in a positional number system, and an independent value midway between +1 and -1.
  • 0-day - A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
  • 10 Gigabit Ethernet - 10 gigabit Ethernet is a telecommunication technology that offers data speeds up to 10 billion bits per second.
  • 10 gigabit Ethernet (10 GbE) - 10 gigabit Ethernet is a telecommunication technology that offers data speeds up to 10 billion bits per second.
  • 10 high day busy period - In designing and assessing networks, the peak load is sometimes measured using the 10HD (10-high-day) busy period method.
  • 10,000-year clock - The 10,000-year clock is an accurate, long-term mechanical timepiece designed to tick once a year for 10,000 years.
  • 10-Gigabit Ethernet - 10 gigabit Ethernet is a telecommunication technology that offers data speeds up to 10 billion bits per second.
  • 10-high-day busy period - In designing and assessing networks, the peak load is sometimes measured using the 10HD (10-high-day) busy period method.
  • 10-high-day busy period (10HD busy period) - In designing and assessing networks, the peak load is sometimes measured using the 10HD (10-high-day) busy period method.
  • 100 dollar laptop - XO is the first version of the $100 laptop expected to reach a substantial number of users.
  • 100 Gigabit Ethernet (100GbE) - 100 Gigabit Ethernet (100GbE) is a standard in development that will enable the transfer of Ethernet frames at 100 gigabits per second (gp/s).
  • 100 laptop - XO is the first version of the $100 laptop expected to reach a substantial number of users.
  • 1000BASE-T - 1000BASE-T is Gigabit Ethernet (1 gigabit is 1000 megabits per second) on copper cables, using four pairs of Category 5 unshielded twisted pair to achieve the gigabit data rate.
  • 100BASE-T - In 100 Mbps (megabits per second) Ethernet (known as Fast Ethernet), there are three types of physical wiring that can carry signals: 100BASE-T4 (four pairs of telephone twisted pair wire) 100BASE-TX (two pairs of data grade twisted-pair wire) 100BASE-FX (a two-strand optical fiber cable) This designation is an Institute of Electrical and Electronics Engineers shorthand identifier.
  • 1080p - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • 10BASE-2 - 10BASE-2, one of several physical media specified by IEEE 802.
  • 10BASE-36 - 10BASE-36 is a type of physical cabling defined in the IEEE 802.
  • 10BASE-5 - 10BASE-5, one of several physical media specified by IEEE 802.
  • 10BASE-F - 10BASE-F, one of several physical media specified by IEEE 802.
  • 10BASE-T - 10BASE-T, one of several physical media specified in the IEEE 802.
  • 10BASE2 - 10BASE-2, one of several physical media specified by IEEE 802.
  • 10BASE36 - 10BASE-36 is a type of physical cabling defined in the IEEE 802.
  • 10BASE5 - 10BASE-5, one of several physical media specified by IEEE 802.
  • 10BASEF - 10BASE-F, one of several physical media specified by IEEE 802.
  • 10BASET - 10BASE-T, one of several physical media specified in the IEEE 802.
  • 10g - 10g is Oracle's grid computing product group including (among other things) a database management system (DBMS) and an application server.
  • 10GBASE T - 10 gigabit Ethernet is a telecommunication technology that offers data speeds up to 10 billion bits per second.
  • 10GBASE-T - 10 gigabit Ethernet is a telecommunication technology that offers data speeds up to 10 billion bits per second.
  • 10HD busy period - In designing and assessing networks, the peak load is sometimes measured using the 10HD (10-high-day) busy period method.
  • 1170 - Spec 1170 was the working name of the standard UNIX programming interface specification that is now known as X/Open Programming Guide 4.
  • 1170 (UNIX 98) - Spec 1170 was the working name of the standard UNIX programming interface specification that is now known as X/Open Programming Guide 4.
  • 11th dimension - The 11th dimension is a characteristic of space-time that has been proposed as a possible answer to questions that arise in superstring theory.
  • 12 factor app (twelve-factor app) - Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service.
  • 121 - In Internet e-commerce, 121 is short for one-to-one, the philosophy that treating each customer as a special individual is a more successful approach than treating customers as a group of similar individuals.
  • 121 (one-to-one) - In Internet e-commerce, 121 is short for one-to-one, the philosophy that treating each customer as a special individual is a more successful approach than treating customers as a group of similar individuals.
  • 1284.4 - DOT4 is a protocol that allows a device that is part of a multifunction peripheral (MFP) to send and receive multiple data packets simultaneously across a single physical channel to other devices on the MFP.
  • 12X - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • 136 browser colors with names - Some Web page creators prefer to specify colors by name rather than by hexadecimal red-green-blue (RGB) intensity value.
  • 1394 - IEEE 1394, High Performance Serial Bus, is an electronics standard for connecting devices to your personal computer.
  • 14000 - ISO 14000 is a series of environmental management standards developed and published by the International Organization for Standardization (ISO) for organizations.
  • 14001 - ISO 14000 is a series of environmental management standards developed and published by the International Organization for Standardization (ISO) for organizations.
  • 16 bit Unicode Transformation Format - UTF-16 (16- bit Unicode Transformation Format) is a standard method of encoding Unicode character data.
  • 16- bit Unicode Transformation Format - UTF-16 (16- bit Unicode Transformation Format) is a standard method of encoding Unicode character data.
  • 16-bit grayscale - Grayscale is a range of shades of gray without apparent color.
  • 1GL - In the computer industry, these abbreviations are widely used to represent major steps or "generations" in the evolution of programming languages.
  • 1NF - Database normalization is intrinsic to most relational database schemes.
  • 1Password - 1Password is a password management application that stores sensitive information, including user passwords and software licenses, in an encrypted chain.
  • 1X - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • 1x Evolution Data Optimized - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • 1x Evolution-Data Optimized - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • 1xRTT - 1xRTT (Single-Carrier Radio Transmission Technology) is an operational mode for CDMA2000 wireless communications that specifies a single (1x) 1.
  • 1xRTT (Single-Carrier Radio Transmission Technology) - 1xRTT (Single-Carrier Radio Transmission Technology) is an operational mode for CDMA2000 wireless communications that specifies a single (1x) 1.
  • 2-in-1 tablet (hybrid tablet, convertible tablet) - A 2-in-1 tablet, also known as a hybrid or convertible tablet, is a tablet PC that also functions as a notebook.
  • 2-tier Internet - Two-tiered Internet refers to proposed changes in Internet architecture that would give priority to the traffic of those who have paid for premium service.
  • 2.5G - 2.5G describes the state of wireless technology and capability usually associated with General Packet Radio Services (GPRS) - that is, between the second and third generations of wireless technology.
  • 2000 year old computer - The Antikythera mechanism is an analog computer that was used by the Greeks more than 2000 years ago to locate and predict the positions of celestial objects.
  • 2000-year-old computer - The Antikythera mechanism is an analog computer that was used by the Greeks more than 2000 years ago to locate and predict the positions of celestial objects.
  • 2001 - Midnight UTC on January 1, 2001 marked the beginning of the third millennium on the Western world's Gregorian calendar.
  • 2002/95/EC - The Restriction of Hazardous Substances (RoHS) Directive is a set of criteria formulated by the European Union (EU) to regulate the use of toxic materials in electrical and electronic devices, systems, and toys.
  • 216-color browser-safe palette - Go directly to the 216-color browser-safe palette table 136 browser colors with names When specifying colors for Web page backgrounds, fonts, and other elements for 256-color displays (the most common display capability), you will probably want to choose from the 216 colors that look the same on both PC and Mac operating systems.
  • 21st Century Cures Act - The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device innovation, mental health research and care, opioid addiction treatment and prevention, and health information technology.
  • 24 hours a day - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 24/7 - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 24/7 Customer or [24]7 Inc - 24/7 Customer is a business process outsourcing (BPO) services provider that also sells industry-specific cloud-based applications.
  • 24X - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • 24x7 - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 24x7 (24 hours a day, 7 days a week) - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 2600 - 2600 is the frequency in hertz (cycles per second) that AT&T formerly put as a steady signal on any long-distance telephone line that was not currently in use.
  • 2D barcode - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.
  • 2D barcode (two-dimensional barcode) - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.
  • 2GL - In the computer industry, these abbreviations are widely used to represent major steps or "generations" in the evolution of programming languages.
  • 2NF - Database normalization is intrinsic to most relational database schemes.
  • 2X - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • 3 D chip - A 3-D chip is an integrated circuit (IC) containing a three-dimensional array of interconnected devices performing digital, analog, image processing and neural-network functions, either individually or in combination.
  • 3-2-1 Backup Strategy - The 3-2-1 backup is a reliable recovery methodology for ensuring that data is protected adequately and backup copies of the data are available when needed.
  • 3-D - In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.
  • 3-D (three dimensions or three-dimensional) - In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.
  • 3-D browser - A 3-D browser is a Web browser that allows the viewer to view and interact with six Web pages at a time by creating a virtual room on the viewer's screen.
  • 3-D chip - A 3-D chip is an integrated circuit (IC) containing a three-dimensional array of interconnected devices performing digital, analog, image processing and neural-network functions, either individually or in combination.
  • 3-D chip (3D chip) - A 3-D chip is an integrated circuit (IC) containing a three-dimensional array of interconnected devices performing digital, analog, image processing and neural-network functions, either individually or in combination.
  • 3-D printing - 3-D printing is a manufacturing process that builds layers to create a three-dimensional solid object from a digital model.
  • 3-D printing (additive manufacturing) - 3-D printing is a manufacturing process that builds layers to create a three-dimensional solid object from a digital model.
  • 3-D scanner - A 3-D scanner is an imaging device that collects distance point measurements from a real-world object and translates them into a virtual 3-D object.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close