Browse Definitions :

Browse Definitions by Alphabet

DOP - DRO

  • DoPa - DoPa (DoCoMo Packet Transmission) is a packet-switched network service developed by NTT DoCoMo in Japan for Internet connection from mobile devices.
  • DoPa (DoCoMo Packet Transmission) - DoPa (DoCoMo Packet Transmission) is a packet-switched network service developed by NTT DoCoMo in Japan for Internet connection from mobile devices.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • Doppler effect - The frequency and wavelength of an electromagnetic field are affected by relative motion.
  • DOS - DOS (Disk Operating System) can refer to a computer operating system that is loaded from a disk drive or to an operating system based on Microsoft Disk Operating System (MS-DOS).
  • DoS - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • DOS (Disk Operating System) - DOS (Disk Operating System) can refer to a computer operating system that is loaded from a disk drive or to an operating system based on Microsoft Disk Operating System (MS-DOS).
  • DOS Cheat Sheets - Although you may not use it on a daily basis, DOS can be very handy from time to time.
  • DOS Protected Mode Interface - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • DOS Protected Mode Interface (DPMI) - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • Dossia - Dossia is a Web-based framework for storing and managing personal health records (PHR).
  • dot address - Tip:To find out the dot address (such as 205.
  • dot NET - .NET is both a business strategy from Microsoft and its collection of programming support for Web services.
  • dot pitch - The dot pitch specification for a display monitor tells you how sharp the displayed image can be.
  • dot product - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
  • dot product (scalar product) - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • DOT4 - DOT4 is a protocol that allows a device that is part of a multifunction peripheral (MFP) to send and receive multiple data packets simultaneously across a single physical channel to other devices on the MFP.
  • dotcom - A dotcom is any Web site intended for business use and, in some usages, it's a term for any kind of Web site.
  • dots per inch - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • dots per inch - Test yourself.
  • dots per inch (dpi) - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • dotted quad - Tip:To find out the dot address (such as 205.
  • double blind test - Double blind test is an experiment where both the subject and observer are unaware that the exercise in practice is a test.
  • double data rate SDRAM - DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*.
  • double data rate synchronous dynamic random access memory - DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*.
  • Double Density CD - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • Double Density Compact Disk - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • double factorial - The double factorial, symbolized by two exclamation marks (!!), is a quantity defined for all integers greater than or equal to -1.
  • double integral sign - The double integral sign is used to indicate mathematical integration performed twice in succession.
  • Double-Density Compact Disk - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • Double-Density Compact Disk (DDCD) - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • double-parity RAID - Double-parity RAID (redundant array of independent disks), also called diagonal-parity RAID, Advanced Data Guarding (RAID_ADG), or RAID-6, is a method of protecting against multiple storage drive failures by creating two sets of parity data on an array of hard disks.
  • double-slit experiment - The double-slit experiment is a nineteenth-century investigation into the properties of light that has since been found to demonstrate both the duality of photons and the concepts of superposition and quantum interference.
  • doubler - A doubler is an electronic device that doubles the frequency of an input signal.
  • doublewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • DOVE (IBM DOVE) - IBM Dove (Distributed Overlay Virtual Ethernet) is an architecture that allows a network engineer to abstract the physical network infrastructure from hypervisor hosts and make network changes in software rather than hardware.
  • Dovetail Software - Dovetail Software is a software vendor based in Austin, Texas, that specializes in providing web-based HR and help desk software to businesses in the United States and internationally.
  • down converter - An HD (high-definition) downconverter is a device that converts high-definition television (HDTV) video to standard-definition video that can be viewed on conventional television (TV) receivers or computer monitors, or recorded on DVD.
  • downconverter - An HD (high-definition) downconverter is a device that converts high-definition television (HDTV) video to standard-definition video that can be viewed on conventional television (TV) receivers or computer monitors, or recorded on DVD.
  • downcycling - Downcycling is a recycling practice that involves breaking an item down into its component elements or materials.
  • downlink - These terms should not be confused with downstream and upstream.
  • downlink and uplink - These terms should not be confused with downstream and upstream.
  • download - Downloading is the transmission of a file from one computer system to another, usually smaller computer system.
  • download pop up - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • download pop-up - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • downloading - Downloading is the transmission of a file from one computer system to another, usually smaller computer system.
  • downsizing - In a business enterprise, downsizing is reducing the number of employees on the operating payroll.
  • downstream - This term should not be confused with downlink.
  • downtime - Uptime is a computer industry term for the time during which a computer is operational.
  • doxing - Doxing is the act of gathering information about a target individual or organization and making it public.
  • doxware (extortionware) - Doxware, also known as extortionware, is an exploit in which the attacker accesses the target's sensitive data and threatens to publish it if the victim does not meet his demands.
  • DPA - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • DPA 1998 - The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled.
  • DPA2 - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • DPI - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • dpi - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • DPL - Digital Powerline (DPL) technology provides the transmission of data to users over the same lines that bring electric power to homes and businesses.
  • DPM - Data protection management (DPM) is the administration of backup processes to ensure that tasks run on schedule, and that data is securely backed up and recoverable.
  • DPMI - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • DQA - Data quality is a perception or an assessment of data's fitness to serve its purpose in a given context.
  • DRA - A data recovery agent (DRA) is a Microsoft Windows user who has been granted the right to decrypt data that was encrypted by other users.
  • draft document - A working draft (sometimes called a draft document) is a type of technical report that is a work in progress, a preliminary form of a possible future document.
  • DRAM - Dynamic random access memory (DRAM) is a common type of random access memory (RAM) used in personal computers, workstations and servers.
  • DRAM (dynamic random access memory) - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRBD - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • DRDRAM - RDRAM (Rambus Dynamic Random Access Memory) is a memory subsystem that promises to transfer up to 1.
  • DRDRAM (Rambus Dynamic Random Access Memory) - RDRAM (Rambus Dynamic Random Access Memory) is a memory subsystem that promises to transfer up to 1.
  • drilldown - As currently used in information technology, to drill down (verb) is to focus in on something.
  • drip marketing - Drip marketing is a method involving periodic small releases of promotional materials over time.
  • drive-by download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • drive-by pharming - Drive-by pharming is a vulnerability exploitation method in which the attacker takes advantage of an inadequately unprotected broadband router to gain access to user data.
  • drive-by spamming - Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam.
  • driveby download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • driver - A driver is a program that interacts with a particular device or special (frequently optional) kind of software.
  • driver assistance - Driver assistance, also known as advanced driver-assistance systems (ADAS), are technologies used to make motor vehicle travel safer by automating, improving or adapting some or all of the tasks involved in operating a vehicle.
  • driver development kit - A driver development kit (DDK) is a set of programs and related files that are used to develop a new software or hardware driver or to update an existing legacy application driver for an operating system.
  • driver development kit (DDK) - A driver development kit (DDK) is a set of programs and related files that are used to develop a new software or hardware driver or to update an existing legacy application driver for an operating system.
  • Driver's Privacy Protection Act (DPPA) - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.
  • driver-based planning - Driver-based planning is an approach to management that identifies an organization's key business drivers and creates a series of business plans that mathematically model how those things most necessary for the organization's success would be affected by different variables.
  • DRM - Digital rights management (DRM) is a systematic approach to copyright protection for digital media.
  • DRM - Device relationship management (DRM) is enterprise software that enables the monitoring, managing, and servicing of intelligent devices over the Internet.
  • drobo - A backup robot is an automated external USB storage device that supports multiple removable SATA hard drives.
  • drone (UAV) - A drone, in technological terms, is an unmanned aircraft.
  • drone glasses (drone goggles) - Drone glasses are eyewear that gives someone flying an unmanned aerial vehicle (UAV) a first-person view of where the drone flies.
  • drone journalism - Drone journalism is the capture of still images and video by remotely operated or autonomous drones (more formally known as unmanned aerial vehicles or UAV) to record events for report by news agencies and citizen media.
  • drone photography - Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
  • drone services (UAV services) - Drone services, also known as unmanned aerial vehicle (UAV) services, is the emerging market for services built around flying robots that can be remote-controlled or flown autonomously using software-controlled flight plans in their embedded systems.
  • drone surveillance - Drone surveillance is the use of unmanned aerial vehicles (UAV) to capture of still images and video to gather information about specific targets, which might be individuals, groups or environments.
  • dronie - A dronie is a self-portrait photograph (selfie) still or, more commonly, video recorded by a camera attached to a personal drone.
  • DROP - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • DROP (delivery of real-time execution information protocol) - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • drop shadow - In graphic design, a drop shadow is an effect where an image is repeated behind itself to create the illusion that the image is floating over its background.
  • drop-down menu - A menu is a set of options presented to the user of a computer application to help the user find information or execute a program function.
  • Dropbox - Dropbox is a cloud storage provider (sometimes referred to as an online backup service) that is frequently used as a file-sharing service.
  • dropout - A dropout is a small loss of data in an audio or video file on tape or disk.
  • dropper - A dropper is a malware installer that surreptitiously carries viruses, back doors and other malicious software so they can be executed on the compromised machine.
  • dropshipping - Dropshipping is an e-commerce retail model that allows stores to sell products without keeping any physical inventory.
  • droupie - Droupie (for data groupie) is computer jargon for someone who likes to spend time with people who are more computer literate than they are.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close