Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

CLO - FED

  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • cloud collaboration - Cloud collaboration is a system of communication that enables employees to work together on a project that is hosted in the cloud, can be accessed at any time and can be edited by multiple users at once.
  • CloudAV - CloudAV is a program that combines multiple antivirus applications and scans user files over a network of servers.
  • cold/warm/hot server - In the backup and recovery of a computer server, a cold server is a backup server whose purpose is solely to be there in case the main server is lost.
  • command prompt - A command prompt is the input field in a text-based user interface screen for an operating system or program.
  • commodity - A commodity is a type of widely-available product that is not markedly dissimilar from one unit to another.
  • commodity computer - A commodity computer is a standard-issue PC that is widely available for purchase.
  • commodity hardware - Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
  • Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • Communication and Networking Riser (CNR) - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
  • Compute Card (Intel Compute Card) - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • Computer History Museum - The Computer History Museum is an institution dedicated to the preservation of artifacts and information related to the development of computers.
  • computer-intensive - Computer-intensive is a term that applies to any computing application that requires the resources of a lot of computers, such as grid computing.
  • consumerism - Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.
  • content curation - Content curation is the gathering, organizing and online presentation of content related to a particular theme or topic.
  • context awareness - Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly.
  • contextual computing - Contextual computing, also called context-aware computing, is the use of software and hardware to automatically collect and analyze data about a device's surroundings in order to present relevant, actionable information to the end user.
  • cooperative games - Cooperative games are games where players work with one and other in order to achieve a common objective.
  • COPE (corporate-owned, personally-enabled) - COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.
  • cord cutting - Cord cutting, in a telecommunications context, is the practice of stopping a cable or  satellite television service in favor of less expensive options, or getting rid of your landline phone and relying solely on cellular or VoIP (voice over IP) service.
  • coworking - Coworking is a business services provision model that involves individuals working independently or collaboratively in shared office space.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • CrackBerry - CrackBerry is a nickname for the BlackBerry handheld device.
  • creative destruction - Creative destruction is a process through which something new brings about the demise of whatever existed before it.
  • cryptocurrency - A cryptocurrency is a digital medium of exchange that uses encryption to secure the processes involved in generating units and conducting transactions.
  • Ctrl-Alt-Delete - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).
  • Cupertino effect - The Cupertino effect is an erroneous suggestion or replacement by a spellchecker, auto-correct program or smartphone predictive text feature.
  • Cyber Monday - Cyber Monday is a marketing event created to promote online sales.
  • D - D is one of two programming languages, Digital Mars D, an object-oriented metaprogramming language, or Microsoft D, a key component of the upcoming Oslo development environment.
  • data cap (broadband cap) - A data cap is a specific amount of mobile data that a user account can access for a given amount of money, usually specified per month.
  • data plan (mobile data plan) - Since the advent of the smartphone made mobile Internet possible, most carriers offer data plans at varying rates based on the amount of data transfer allowed before a data cap is imposed.
  • datacard - A datacard is any removable computer component, approximately the size of a credit card, that contains data, or that contains nonvolatile memory to which data can be written and from which data can be recovered.
  • DB-xx (DB-9, DB-15, DB-25, DB-50, DB-68) - DB-xx is the designation for a series of port connectors for attaching devices to computers.
  • DCE (Distributed Computing Environment) - In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers.
  • dead pixel - A dead pixel is a picture element in which all three RGB sub-pixels are permanently turned off, which creates a black spot in the display.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop supercomputer (personal supercomputer) - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • destreaming - Destreaming, in a multimedia context, is the practice of saving streamed data as a file.
  • device-agnostic (device agnosticism) - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • digital body language (DBL) - Digital body language (DBL) is the aggregate of an individual’s online activity – including his or her email use, web visits, searches, referrals from social media sites and webinar attendance.
  • digital citizenship - Digital citizenship is the online presence, behaviors and response to others within a digital community where one is a member.
  • digital footprint - A digital footprint, sometimes called a digital dossier, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual.
  • digital footprint management (DFM) - Digital footprint management (DFM) is an approach to controlling the amount and types of electronic data existing about a particular individual that can in some way be traced back to them.
  • digital native - A digital native is a person who grew up with the presence of digital technology or in the information age.
  • digital television (DTV) - Digital television (DTV) is the transmission of television signals using digital rather than conventional analog methods.
  • digital wallet - A digital wallet is a software application that serves as an electronic version of a physical wallet, digitizing credit and debit card information to enable consumers to make purchases from their smartphones.
  • digital wallet security - Digital wallets are used for transactions involving both conventional and digital currencies, but because the latter work differently, they require different safeguards – or at least variations on traditional security measures.
  • Direct Memory Access (DMA) - Direct Memory Access (DMA) is a capability provided by some computer bus architectures that allows data to be sent directly from an attached device (such as a disk drive) to the memory on the computer's motherboard.
  • Direct3D - Direct3D is the Microsoft 3D application programming interface (API) component of the DirectX API package.
  • disinformation - Disinformation is a type of untrue communication that is purposefully spread and represented as truth to elicit some response that serves the perpetrator's purpose.
  • disk analyzer - A disk analyzer is a piece of software that checks drives for space and usage and explores files and folders visually, simplifying file cleanup and optimization.
  • disk cloning - Disk cloning is the act of copying the contents of a computer's hard drive.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distributed applications (distributed apps) - Distributed applications (distributed apps) are applications or software that runs on multiple computers within a network at the same time and can be stored on servers or with cloud computing.
  • distributed search - Distributed search is a search engine model in which the tasks of Web crawling, indexing and query processing are distributed among multiple computers and networks.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • Do Not Track (DNT) - Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user.
  • dock - In the Apple OS X operating system, the dock is a user-modifiable row of function or application icons that appear on the computer desktop so that the user can find and select any of them quickly.
  • Dolly (Digital Dolly) - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • downcycling - Downcycling is a recycling practice that involves breaking an item down into its component elements or materials.
  • DRAM (dynamic random access memory) - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • drone (UAV) - A drone, in technological terms, is an unmanned aircraft.
  • dronie - A dronie is a self-portrait photograph (selfie) still or, more commonly, video recorded by a camera attached to a personal drone.
  • DRTC (Don't read the comments) - DRTC is an initialism for "Don't read the comments.
  • dual-carbon battery - Dual-carbon batteries are a new energy storage technology that uses a form of carbon for both the anode and the cathode.
  • dual-SIM phone - A dual SIM phone is a mobile phone, typically a smart phone, with the capacity to use two subscriber identity module (SIM) cards.
  • DuckDuckGo - DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).
  • Dyslexie - Dyslexie is a font designed for greater readability to help people who have difficulty reading.
  • e-cycling - E-cycling is the practice of reusing, or distributing for reuse, electronic equipment and components rather than discarding them at the end of their life cycle.
  • e-waste - E-waste is any refuse created by discarded electronic devices and components as well as substances involved in their manufacture or use.
  • Echo Show - The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant.
  • EFSS (Enterprise file sync-and-share) - Enterprise file sync-and-share is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.
  • electro-optical fingerprint recognition - Electro-optical fingerprint recognition is a biometric technology that provides for the scanning, comparison, and identification of fingerprints without the traditional need for ink and paper.
  • electronic paper display (EPD) - An electronic paper display (EPD) is an electrically-charged surface that replicates the look and experience of ink on paper.
  • emoji - An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications.
  • enhancement - In an information technology product, an enhancement is a noteworthy improvement to the product as part of a new version of it.
  • entity tag (ETag) - ETags use persistent identification elements (PIE) that have been tagged to the user’s browser.
  • EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • evil twin - An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot.
  • executable file (exe file) - An executable file (exe file) is a computer file that contains a sequence of instructions that the operating system can execute directly.
  • extended memory - Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • eye tracking (gaze tracking) - Eye tracking is the process of electronically locating the point of a person's gaze, or following and recording the movement of the point of gaze.
  • Facebook - Facebook is a popular free social networking website that allows registered users to create profiles, upload photos and video, send messages and keep in touch with friends, family and colleagues.
  • Facebook Messenger - Facebook Messenger is a mobile app that enables chat, voice and video communications between Facebook web-based messaging and smartphones.
  • Facebook scam - A Facebook scam is a post or page on the popular social networking site designed to deceive users and spread rapidly through their personal networks.
  • Fairphone - Insofar as possible, Fairphone is made from recycled, recyclable and responsibly-sourced goods as well as minimal packaging.
  • Family Link - Family Link is the parental control app for Android devices.
  • fat client (thick client) - A fat client (sometimes called a thick client) is a networked computer with most resources installed locally, rather than distributed over a network as is the case with a thin client.
  • fault-tolerant - Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.
  • fax server - A fax server (or faxserver) is a system installed in a local area network (LAN) server that allows computer users who are attached to the LAN to send and receive fax messages.
  • FDISK - WARNING: Use caution when repartitioning a hard disk drive that contains data.
  • Fedora - Fedora is a popular open source Linux-based operating system.

-ADS BY GOOGLE

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • hot plugging

    Hot plugging is the addition of a component to a running computer system without significant interruption to the operation of the...

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

Close