Browse Definitions :

Desktops and laptops

Terms related to PCs, including definitions about desktop computers and words and phrases about computer components.

ACT - WIN

  • active cooling - Active cooling is the use of fans to reduce the heat of computer components.
  • bait and switch - Bait and switch is a fraudulent practice in which a seller advertises a special deal but makes only a very small number of the items available for purchase.
  • BIOS attack - A BIOS attack is an exploit that infects the BIOS with malicious code and is persistent through reboots and attempts to reflash the firmware.
  • BIOS rootkit - A BIOS-level rootkit is programming that exists in a system's memory hardware to enable remote administration.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • channel partner - A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor.
  • chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
  • Chromebook - Google Chromebook is a thin client laptop that is configured with the Chrome operating system (Chrome OS).
  • clean install - A clean install is a software installation in which any previous version is removed.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • clipboard hijack attack - A clipboard hijacking is an exploit in which the attacker gains control of the victim's clipboard and replaces its contents with their own data, such as a link to a malicious Web site.
  • commodity - A commodity is a type of widely-available product that is not markedly dissimilar from one unit to another.
  • commodity computer - A commodity computer is a standard-issue PC that is widely available for purchase.
  • commodity hardware - Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
  • Ctrl-Alt-Delete - On a personal computer with the Microsoft Windows operating system, Control+Alt+Delete is the combination of the Ctrl key, the Alt key, and Del key that a user can press at the same time to terminate an application task or to reboot the operating system.
  • desktop gadget - A desktop gadget is a software widget, or a small application, that is designed to sit on a user's desktop screen in much the same way that apps reside on smartphones and tablets.
  • disk cloning - Disk cloning is the act of copying the contents of a computer's hard drive.
  • distributor - A distributor is an intermediary entity between a the producer of a product and another entity in the distribution channel or supply chain, such as a retailer, a value-added reseller (VAR) or a system integrator (SI).
  • ECOphlex (PHase-change Liquid EXchange) - ECOphlex (PHase-change Liquid EXchange) is an efficient and environmentally-friendly computer component cooling technology.
  • EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • expanded memory - Expanded memory, also know as EMS (Expanded Memory Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB using a gated memory riser card.
  • fiber jumper - A fiber jumper, sometimes called a fiber patch cord is a length of fiber cabling fitted with LC, SC, MTRJ or ST connectors at each end.
  • general-purpose computer - A general-purpose computer is one that, given the appropriate application and required time, should be able to perform most common computing tasks.
  • instruction set - An instruction set is a group of commands for a CPU in machine language.
  • Intel 80386 - Intel 80386 also known as (386 and i386) is the third-generation Intel x86 microprocessor introduced in October 1985.
  • IT distributor - An IT channel distributor is a business that acts as an intermediary between vendors and value-added resellers (VARs) or system integrators (SIs) in the distribution of software or hardware.
  • IT reseller - An IT reseller is an intermediary entity in the distribution channel that purchases software and/or hardware from the manufacturer or some other entity, such as a wholesaler or a distributor, and sells it to consumers.
  • just-in-case manufacturing (JIC manufacturing) - Just-in-case (JIC) manufacturing is the traditional model of production, in which products are created in advance and in excess of demand.
  • LISA - LISA (Local Integrated System Architecture) was Apple's first personal computer and GUI -based operating system.
  • load testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • loose coupling - Loose coupling is a method of interconnecting the components in a system or network so that those components, also called elements, depend on each other to the least extent practicable.
  • Microsoft - Microsoft is a leading global vendor of computer software; hardware for computer, mobile and gaming systems; and cloud services.
  • Microsoft Windows Update - Microsoft Windows Update is a free Microsoft tool that installs security updates on machines.
  • modular PC - A modular PC is a computer that has individually-housed components, which are interconnected but separately removable for service or upgrading.
  • natural user interface (NUI) - A natural user interface (NUI) is a system for human-computer interaction that the user operates through intuitive actions related to natural, everyday human behavior.
  • nettop - A nettop is a small, low-power and relatively inexpensive desktop computer.
  • operating system (OS) - An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
  • PARC (Palo Alto Research Center) - PARC is Xerox's Palo Alto Research Center, located in Palo Alto, California, in the high-tech area that has become known as Silicon Valley.
  • passive cooling - Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • phase-change memory (PCM) - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • portrait - In computer printing, portrait is a mode in which the printer orients content for reading across the shorter length (the width) of the sheet of paper.
  • principle of least privilege (POLP) - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.
  • processing in memory (PIM) - Processing in memory (PIM, sometimes called processor in memory) is the integration of a processor with RAM (usually DRAM or SRAM) on a single chip.
  • product development (new product development - NPD) - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • QHD (quad high definition) - QHD (Quad High Definition) is a resolution standard for high-end monitors, televisions and mobile devices.
  • Reduce, reuse, recycle (R3) - Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.
  • remote desktop - Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • short message service center (SMSC) - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • silicon photonics - Silicon photonics is an evolving technology in which data is transferred among computer chips by optical rays.
  • soft reset - A soft reset is a restart of a device, such as a smartphone, tablet, laptop or personal computer (PC).
  • softcooling (software cooling) - Softcooling is a software-based method of computer component cooling, conducted either by adjusting component settings or by using softcooling products.
  • stress testing - Stress testing is the process of determining the ability of a computer, network, program or device to maintain a certain level of effectiveness under unfavorable conditions.
  • Sugar - Sugar is a graphical user interface GUI developed for the $100 laptop (XO).
  • touch screen - A touch screen is a computer display screen that is also an input device.
  • ultra-mobile personal computer (UMPC or Ultra-mobile PC) - Ultra-mobile PC (UMPC) is a design specification for a hand-held computer that is larger than a PDA but smaller than a laptop.
  • ultrabook - An ultrabook is a category of thin and light laptop computers designed to bridge the market gap between tablets and premium notebook PCs.
  • unified endpoint management (UEM) - Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.
  • Unified Extensible Firmware Interface (UEFI) - Unified Extensible Firmware Interface, or UEFI, specifies how a software program connects a computer's firmware to its operating system and attached computing hardware.
  • virtual floppy disk - A virtual floppy disk is an alternative to the traditional floppy that exists as a file rather than a physical medium.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • wholesaler - A wholesaler is an entity in the distribution channel or supply chain that buys in bulk and sells to resellers rather than to consumers.
  • Windows 2.0 - Windows 2.0 was the 2nd version of Microsoft’s GUI-based operating system, released in 1987.
  • Windows 3.0 - Windows 3.0 was the 3rd version of Microsoft’s GUI-based operating system, released in 1990.
  • Windows 3.1 - Windows 3.1 was the 4th version of Microsoft’s GUI-based operating system, released in 1993.
  • Windows 95 - Windows 95 was the 5th version of Microsoft’s GUI operating system, released in 1995.
  • Windows Imaging Format (WIM) - The Windows Imaging Format (or WIM) is used for the creation and distribution of disk image files.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile data storage device.

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

Close