Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.
  • Facebook wall - A Facebook wall refers to the space on a Facebook user's profile where other users can post messages, pictures, videos and other digital content for their friends or the public to see.
  • FaceTime - FaceTime is a proprietary video and audio calling service developed by Apple Inc.
  • fault tolerance - Fault tolerance is the capability of a system to deliver uninterrupted service despite one or more of its components failing.
  • FDISK - FDISK is a disk utility included in all versions of MS-DOS, Windows and Linux for formatting or partitioning a hard disk drive, or to delete different portions of it.
  • Feature Manipulation Engine (FME) - The Feature Manipulation Engine (FME) is a platform that streamlines the translation of spatial data between geometric and digital formats.
  • Fedora - Fedora, also known as Fedora Linux, is a popular open source Linux-based operating system (OS).
  • Fermi paradox - The Fermi paradox is the apparent conflict between the fact that humans have found no evidence of intelligent extraterrestrial life despite the probablity that it exists, given what we know about the universe.
  • field of view (FOV) - Field of view (FOV) is the open, observable area a person can see through their eyes or via an optical device, such as a camera.
  • File Allocation Table (FAT) - File Allocation Table (FAT) is a file system that Microsoft developed to support small disks and simple folder structures.
  • FileZilla - FileZilla is a free, open source, file transfer protocol (FTP) software tool.
  • filter (computing) - The term filter in computing can mean a variety of things, depending on the technology or technical discipline in question.
  • filter bubble - A filter bubble is an algorithmic bias that skews or limits the information an individual user sees on the internet.
  • Firefox - Firefox is a free, open source web browser developed by the Mozilla Foundation and Mozilla Corporation in 2004.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • Flat-panel TV Guide - Benefits of flat-panel TVs | Flat-panel features to considerA quick comparison of LCD, LED, OLED and plasma TVsFlat-panel TV technologies: LCD | LED | Plasma | OLEDMore informationA flat-panel TV is a television set that uses one of several different technologies for display in a flat, thin format.
  • font - The word 'font' refers to a set of printable or displayable typography or text characters in a specific style and size.
  • for your information (FYI) - In both chat acronyms and in IT acronyms, FYI is the abbreviation for 'for your information.
  • fourth wall - The fourth wall is a conceptual barrier between those presenting some kind of a communication and those receiving it.
  • FPV drone (first-person view drone) - An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.
  • FQA (frequently questioned answers) - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
  • FTP (File Transfer Protocol) - FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.
  • FUBAR - FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair.
  • fuzzy search - A fuzzy search is a technique that uses search algorithms to find strings that match patterns approximately.
  • gaming - Gaming is playing an electronic video game, which is often done on a dedicated gaming console, PC or smartphone.
  • gaming disorder - Gaming disorder is the obsessive and compulsive overuse of internet games and video games as an escape from life, resulting in the prioritization of gaming over daily activities and interests and the continuation of gaming despite the negative consequences that may occur.
  • general-purpose computer - A general-purpose computer is one that, given the application and required time, should be able to perform the most common computing tasks.
  • Generation Z - Generation Z is the demographic cohort following Generation Y -- which is more popularly known as the Millennial Generation.
  • glyph - In information technology, a glyph -- from a Greek word meaning carving -- is a graphic symbol that provides the appearance or form for a character.
  • Gmail - Gmail (pronounced Gee-mail) is a free web-based email service that provides users with 15 GB of storage for messages and the ability to search for specific messages.
  • GMPLS (Generalized Multiprotocol Label Switching or Multiprotocol Lambda Switching) - GMPLS (Generalized Multiprotocol Label Switching) is a networking technology that enables fast and reliable network switching of data flows on any type of network infrastructure.
  • GNU GRUB - GNU GRUB (or just GRUB) is a boot loader package that supports multiple operating systems on a computer.
  • Godwin's law - Godwin's law, also known as Godwin's rule of Hitler analogies, is a statement maintaining that if any online discussion continues long enough, someone will almost certainly compare someone else to Hitler.
  • Google Android 4.4 KitKat - Android 4.4 KitKat is a version of Google's operating system (OS) for smartphones and tablets.
  • Google ChromeOS - Google ChromeOS, formerly Chrome OS, is a lightweight operating system (OS) built on ChromiumOS, an open source OS that shares the same code base as ChromeOS.
  • Google Docs - Google Docs, first released in 2006, is a free web-based word processor in which documents can be created, edited and stored as part of the Google Docs Editors suite of free web applications.
  • Google Glass - Google Glass is a wearable, voice- and motion-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user's field of vision.
  • Google Maps - Google Maps is a web-based service that provides detailed information about geographical regions and sites worldwide.
  • Google Street View - Google Street View is a feature of Google Maps that enables users to view and navigate through 360 degree horizontal and 290 degree vertical panoramic street level images of various cities around the world.
  • Google Trends - Google Trends is a free service provided by Google that displays how often specific keywords, subjects and phrases have been searched for on Google over a period of time.
  • Google+ (Google Plus) - Google+ (pronounced Google plus) was a Google social networking platform discontinued for personal use in 2019.
  • GPS coordinates - GPS coordinates are a unique identifier of a precise geographic location on the earth, usually expressed in alphanumeric characters.
  • graceful shutdown and hard shutdown - Graceful shutdown and hard shutdown are two opposing methods of turning off a computer.
  • grawlix - A grawlix is a sequence of typographical symbols used to represent a non-specific, profane word or phrase.
  • grayscale - Grayscale is a range of shades of gray without apparent color.
  • green cloud - Green cloud refers to the potential environmental benefits that green IT services delivered over the internet can offer to individual companies and society as a whole.
  • greenhouse gas - A greenhouse gas lets the sun's rays warm the Earth's surface but restricts the heat from escaping into space.
  • greylist (or graylist) - A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam.
  • grid computing - Grid computing is a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.
  • Group Policy - Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers.
  • Group Policy Object (GPO) - Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.
  • GRUB (GRand Unified Bootloader) - GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up.
  • hacktivism - Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason.
  • haptics - Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.
  • hard-drive encryption - Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.
  • HDMI (High-Definition Multimedia Interface) - HDMI (High-Definition Multimedia Interface) is a proprietary specification designed to ensure compatibility between video and audio devices over a single digital interface.
  • HDTV (high-definition television) - HDTV (high-definition television) is a television display technology that provides picture quality similar to 35 mm movies with sound quality similar to that of a compact disc.
  • home server - A home server is a computer that functions as a server in a client-server home network.
  • honey monkey - A honey monkey is a virtual computer system that is programmed to lure, detect, identify and neutralize malicious activity on the Internet.
  • host (in computing) - A host is a computer or other device that communicates with other hosts on a network.
  • hosting (website hosting, web hosting and webhosting) - Web hosting -- also known as website hosting or webhosting -- is the process where a web hosting provider stores and maintains website files and applications on a server to make its customers' websites accessible on the internet.
  • hotkey - A hot key is a key or a combination of keys on a computer keyboard that, when pressed at one time, performs a task (such as starting an application) more quickly than performing a task by using a mouse or other input device.
  • HTTP (Hypertext Transfer Protocol) - HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files -- such as text, images, sound, video and other multimedia files -- over the web.
  • Hypertext Transfer Protocol daemon (HTTPD) - On the Web, each server has an HTTPD or Hypertext Transfer Protocol daemon that waits in attendance for requests to come in from the rest of the Web.
  • iBeacon - iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
  • iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
  • icon - In today's age of technological advancement, most people recognize the word 'icon' as referring to a small selectable or nonselectable image representing or leading to something else in a computer's graphical user interface (GUI) or on the web.
  • IDE (Integrated Drive Electronics) - IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.
  • ILOVEYOU virus - The ILOVEYOU virus comes in an email with 'ILOVEYOU' in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book.
  • image - An image is a visual representation of something, while a digital image is a binary representation of visual data.
  • image compression - Image compression is a process applied to a graphics file to minimize its size in bytes without degrading image quality below an acceptable threshold.
  • image metadata - Image metadata is text information pertaining to an image file that is embedded into the file or saved to a separate file that is associated with the image file.
  • IMAP (Internet Message Access Protocol) - Internet Message Access Protocol, or IMAP, is a standard email retrieval (incoming) protocol.
  • immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
  • immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.
  • implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
  • in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
  • inbound call - An inbound call is one that a customer initiates to a call center or contact center.
  • Inbox Zero - Inbox Zero is a rigorous approach to email management that aims to keep an inbox empty -- or almost empty -- at all times.
  • InfiniBand - InfiniBand is an industry standard communications specification the InfiniBand Trade Association (IBTA) developed.
  • Information Age - The Information Age is the idea that access to and the control of information is the defining characteristic of this current era in human civilization.
  • initialization vector - An initialization vector (IV) is an arbitrary number that can be used with a secret key for data encryption to foil cyber attacks.
  • inkjet printer - An inkjet printer is a computer peripheral that produces hard copies of a text document or photo by spraying droplets of ink onto paper.
  • inline frame (iframe) - An inline frame (iframe) is a HTML element that loads another HTML page within the document.
  • instance - In object-oriented programming (OOP), an instance is a specific realization of any object.
  • instant messaging - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a standalone application or embedded software.
  • interactive whiteboard - An interactive whiteboard, also known as a smartboard, is an interactive display in the format of a whiteboard that reacts to user input either directly or through other devices.
  • interlaced display - An interlaced display, or interlaced scan video, is when a video only changes every other row of pixels in the image at each screen refresh.
  • internet - The internet, sometimes simply called 'the net,' is a worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols.
  • internet metering - Internet metering is a service model in which an internet service provider (ISP) keeps track of bandwidth use and charges users accordingly.
  • Internet Movie Database (IMDb) - The Internet Movie Database (IMDb) is an online database that provides information to consumers about movies, TV and film industry professionals.
  • Internet porn - Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video.
  • interrupt marketing - Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.
  • interrupt request (IRQ) - An interrupt request (IRQ) is a signal sent to a computer's processor to momentarily stop (interrupt) its operations.
  • intranet - An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees.
  • iOS software development kit (iOS SDK) - The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple's mobile operating system (OS).
  • IP address (Internet Protocol address) - Internet Protocol (IP) address is a unique numerical identifier for every device or network that connects to the internet.
  • iPad Air - Apple's iPad Air is a tablet that is lighter and thinner than Apple's previous tablets.
  • iPhone Configuration Utility - The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.
  • IPv6 (Internet Protocol Version 6) - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
Networking
Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close