Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

CHR - EXE

  • Chromebook - Google Chromebook is a thin client laptop that is configured with the Chrome operating system (Chrome OS).
  • Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
  • clean computing - Clean computing is when an organization's manufacture, use and disposal of IT equipment does not produce any harmful waste at any stage.
  • clean install - A clean install is a software installation in which any previous version is removed.
  • click farm - A click farm is a business that pays employees to click on website elements to artificially boost the status of a client's website or a product.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • clipboard hijack attack - A clipboard hijacking is an exploit in which the attacker gains control of the victim's clipboard and replaces its contents with their own data, such as a link to a malicious Web site.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • cloud collaboration - Cloud collaboration is a system of communication that enables employees to work together on a project that is hosted in the cloud, can be accessed at any time and can be edited by multiple users at once.
  • CloudAV - CloudAV is a program that combines multiple antivirus applications and scans user files over a network of servers.
  • cluster computing - In computers, clustering is the use of multiple computers, typically PCs or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single highly available system.
  • cold/warm/hot server - In the backup and recovery of a computer server, a cold server is a backup server whose purpose is solely to be there in case the main server is lost.
  • command prompt - A command prompt is the input field in a text-based user interface screen for an operating system or program.
  • commodity - A commodity is a type of widely-available product that is not markedly dissimilar from one unit to another.
  • commodity computer - A commodity computer is a standard-issue PC that is widely available for purchase.
  • commodity hardware - Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
  • Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • Communication and Networking Riser (CNR) - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
  • Compute Card (Intel Compute Card) - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • Computer History Museum - The Computer History Museum is an institution dedicated to the preservation of artifacts and information related to the development of computers.
  • computer-intensive - Computer-intensive is a term that applies to any computing application that requires the resources of a lot of computers, such as grid computing.
  • consumerism - Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.
  • content curation - Content curation is the gathering, organizing and online presentation of content related to a particular theme or topic.
  • context awareness - Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly.
  • contextual computing - Contextual computing, also called context-aware computing, is the use of software and hardware to automatically collect and analyze data about a device's surroundings in order to present relevant, actionable information to the end user.
  • cooperative games - Cooperative games are games where players work with one and other in order to achieve a common objective.
  • COPE (corporate-owned, personally-enabled) - COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.
  • cord cutting - Cord cutting, in a telecommunications context, is the practice of stopping a cable or  satellite television service in favor of less expensive options, or getting rid of your landline phone and relying solely on cellular or VoIP (voice over IP) service.
  • coworking - Coworking is a business services provision model that involves individuals working independently or collaboratively in shared office space.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • CrackBerry - CrackBerry is a nickname for the BlackBerry handheld device.
  • creative destruction - Creative destruction is a process through which something new brings about the demise of whatever existed before it.
  • cryptocurrency - A cryptocurrency is a digital medium of exchange that uses encryption to secure the processes involved in generating units and conducting transactions.
  • Ctrl-Alt-Delete - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).
  • Cupertino effect - The Cupertino effect is an erroneous suggestion or replacement by a spellchecker, auto-correct program or smartphone predictive text feature.
  • Cyber Monday - Cyber Monday is a marketing event created to promote online sales.
  • D - D is one of two programming languages, Digital Mars D, an object-oriented metaprogramming language, or Microsoft D, a key component of the upcoming Oslo development environment.
  • data cap (broadband cap) - A data cap is a specific amount of mobile data that a user account can access for a given amount of money, usually specified per month.
  • data plan (mobile data plan) - Since the advent of the smartphone made mobile Internet possible, most carriers offer data plans at varying rates based on the amount of data transfer allowed before a data cap is imposed.
  • datacard - A datacard is any removable computer component, approximately the size of a credit card, that contains data, or that contains nonvolatile memory to which data can be written and from which data can be recovered.
  • DB-xx (DB-9, DB-15, DB-25, DB-50, DB-68) - DB-xx is the designation for a series of port connectors for attaching devices to computers.
  • DCE (Distributed Computing Environment) - In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers.
  • dead body spam (corpse graffiti) - Dead body spam, also known as corpse graffiti, is a message in a video game that's spelled out with dead characters.
  • dead pixel - A dead pixel is a picture element in which all three RGB sub-pixels are permanently turned off, which creates a black spot in the display.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop supercomputer (personal supercomputer) - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • destreaming - Destreaming, in a multimedia context, is the practice of saving streamed data as a file.
  • device-agnostic (device agnosticism) - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • digital body language (DBL) - Digital body language (DBL) is the aggregate of an individual’s online activity – including his or her email use, web visits, searches, referrals from social media sites and webinar attendance.
  • digital footprint - A digital footprint, sometimes called a digital dossier, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual.
  • digital footprint management (DFM) - Digital footprint management (DFM) is an approach to controlling the amount and types of electronic data existing about a particular individual that can in some way be traced back to them.
  • digital native - A digital native is a person who grew up with the presence of digital technology or in the information age.
  • digital television (DTV) - Digital television (DTV) is the transmission of television signals using digital rather than conventional analog methods.
  • digital wallet - A digital wallet is a software application that serves as an electronic version of a physical wallet, digitizing credit and debit card information to enable consumers to make purchases from their smartphones.
  • digital wallet security - Digital wallets are used for transactions involving both conventional and digital currencies, but because the latter work differently, they require different safeguards – or at least variations on traditional security measures.
  • Direct Memory Access (DMA) - Direct Memory Access (DMA) is a capability provided by some computer bus architectures that allows data to be sent directly from an attached device (such as a disk drive) to the memory on the computer's motherboard.
  • Direct3D - Direct3D is the Microsoft 3D application programming interface (API) component of the DirectX API package.
  • disinformation - Disinformation is a type of untrue communication that is purposefully spread and represented as truth to elicit some response that serves the perpetrator's purpose.
  • disk analyzer - A disk analyzer is a piece of software that checks drives for space and usage and explores files and folders visually, simplifying file cleanup and optimization.
  • disk cloning - Disk cloning is the act of copying the contents of a computer's hard drive.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • disposable PC - A disposable PC is a relatively inexpensive but full-featured personal computer that is designed to be discarded rather than fixed when serious problems arise.
  • distributed applications (distributed apps) - Distributed applications (distributed apps) are applications or software that runs on multiple computers within a network at the same time and can be stored on servers or with cloud computing.
  • distributed search - Distributed search is a search engine model in which the tasks of Web crawling, indexing and query processing are distributed among multiple computers and networks.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • Do Not Track (DNT) - Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user.
  • dock - In the Apple OS X operating system, the dock is a user-modifiable row of function or application icons that appear on the computer desktop so that the user can find and select any of them quickly.
  • Dolly (Digital Dolly) - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • dot-green - Dot-green is a shorthand way of describing the green computing movement that includes both hype and real innovation.
  • downcycling - Downcycling is a recycling practice that involves breaking an item down into its component elements or materials.
  • DRAM (dynamic random access memory) - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • drone (UAV) - A drone, in technological terms, is an unmanned aircraft.
  • dronie - A dronie is a self-portrait photograph (selfie) still or, more commonly, video recorded by a camera attached to a personal drone.
  • DRTC (Don't read the comments) - DRTC is an initialism for "Don't read the comments.
  • dual-carbon battery - Dual-carbon batteries are a new energy storage technology that uses a form of carbon for both the anode and the cathode.
  • dual-SIM phone - A dual SIM phone is a mobile phone, typically a smart phone, with the capacity to use two subscriber identity module (SIM) cards.
  • DuckDuckGo - DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).
  • Dyslexie - Dyslexie is a font designed for greater readability to help people who have difficulty reading.
  • e-cycling - E-cycling is the practice of reusing, or distributing for reuse, electronic equipment and components rather than discarding them at the end of their life cycle.
  • e-waste - E-waste is any refuse created by discarded electronic devices and components as well as substances involved in their manufacture or use.
  • Echo Show - The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant.
  • EFSS (Enterprise file sync-and-share) - Enterprise file sync-and-share is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.
  • electro-optical fingerprint recognition - Electro-optical fingerprint recognition is a biometric technology that provides for the scanning, comparison, and identification of fingerprints without the traditional need for ink and paper.
  • electronic paper display (EPD) - An electronic paper display (EPD) is an electrically-charged surface that replicates the look and experience of ink on paper.
  • emoji - An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications.
  • enhancement - In an information technology product, an enhancement is a noteworthy improvement to the product as part of a new version of it.
  • Enlightenment (E) - Enlightenment, also called E, is a popular free and open source (FOSS) windows manager that can serve as a standalone desktop environment.
  • entity tag (ETag) - ETags use persistent identification elements (PIE) that have been tagged to the user’s browser.
  • EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • evil twin - An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot.
  • executable file (exe file) - An executable file (exe file) is a computer file that contains a sequence of instructions that the operating system can execute directly.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close