Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

NEX - ROM

  • NeXT - NeXT was a computer company formed by Steven Jobs.
  • NeXT computer - NeXT was a computer produced by a company formed by Steven Jobs.
  • niche app - A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices.
  • Nickel-Cadmium battery (Ni-Cd or NiCd) - The Nickel Cadmium (Ni-Cd) battery is a type of battery commonly used in portable computers, camcorders, portable drills, and other small battery-powered devices, having an effective and even power discharge.
  • Nickel-Metal Hydride battery (Ni-MH or NiMH) - The Nickel-Metal Hydride (Ni-MH) battery is a rechargeable power source that is increasingly used in portable computers and other devices.
  • NOAA Weather Radio (NWR) - NOAA Weather Radio (NWR) is an emergency broadcasting system operated by the U.
  • nomophobia - Nomophobia is the irrational fear of being without your mobile phone or being unable to use your phone for some reason, such as the absence of a signal, a low battery or running out of minutes.
  • Northbridge - Northbridge is an Intel chipset that communicates with the computer processor and controls interaction with memory, the Peripheral Component Interconnect (PCI) bus, Level 2 cache, and all Accelerated Graphics Port (AGP) activities.
  • notebook computer - A notebook computer is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings.
  • Oculus Rift - Oculus Rift is a VR headset that is designed to connect to a high-powered PC to enable advanced computations and graphics rendering.
  • Ogo - Ogo is a handheld, battery powered, wireless communications device, released in 2004, that provides instant messaging (IM), text messaging, and e-mail for subscribers to America Online (AOL), the Microsoft Network (MSN), and Yahoo!.
  • OLPC (One Laptop Per Child) - The One Laptop Per Child project (OLPC) is an initiative aimed at providing inexpensive laptop computers to children in the developing world as a means of bridging the digital divide.
  • omnidirectional treadmill (ODT) - An omnidirectional treadmill (ODT) is a mechanical or electronic machine that allows the user to travel in any direction.
  • on-board diagnostics (OBD) - On board-diagnostics (OBD) is the inclusion of circuitry within a device that can indicate proper function and calibration of the main unit or specific fault states.
  • on-screen display (OSD) - An on-screen display (OSD) is a control panel on a computer monitor or television screen that allows you to select viewing options and/or adjust components of the display, such as brightness, contrast, and horizontal and vertical positioning.
  • online data backup (remote data backup) - Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.
  • operating system (OS) - An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
  • optical mouse - An optical mouse is an advanced computer pointing device that uses a light-emitting diode (LED), an optical sensor, and digital signal processing (DSP) in place of the traditional mouse ball and electromechanical transducer.
  • orphan file - On a computer's hard drive, an orphan file is a support file (such as a DLL file) that no longer serves a purpose because the "parent" application it is associated with has been moved or uninstalled.
  • owned - Owned, in common slang, means decisively defeated, with the implication of domination and possession.
  • ownership tag - An ownership tag is a security feature on Compaq computers, consisting of an encrypt ed text string that displays at startup to uniquely identify a computer.
  • P/390 - The P/390 is basically an IBM mainframe system adapted to run on a personal computer.
  • P2P lending (peer-to-peer lending) - P2P lending (peer-to-peer lending) is a type of platform that allows participants to borrow and lend sums of money without having to rely on a conventional financial institution to control transactions.
  • P2P model (peer-to-peer model) - The peer-to-peer model (P2P model) is a non-hierarchical system of exchange, transfer or transmission.
  • PaaS (platform as a service) - PaaS (platform as a service) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
  • Palladium - Palladium is a plan from Intel, AMD, and Microsoft to build security into personal computers and servers at the microprocessor level.
  • PARC (Palo Alto Research Center) - PARC is Xerox's Palo Alto Research Center, located in Palo Alto, California, in the high-tech area that has become known as Silicon Valley.
  • password entropy - Password entropy is a measurement of how unpredictable a password is.
  • password strength meter - A password strength meter is an indicator, either in graphical or text form, of the strength of a password as entered by a user.
  • pastebin - A pastebin is a Web application that allows users to upload and share text online.
  • PC as a service (PCaaS) - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.
  • PC Card - A PC Card (previously known as a PCMCIA card) is a credit card-size memory or I/O device that fits into a personal computer, usually a notebook or laptop computer.
  • pegged cryptocurrency - A pegged cryptocurrency is an encryption-secured digital medium of exchange whose value is tied to that of some other medium of exchange, such as gold or the currency of a given nation.
  • Pentium 3 - The Pentium III is a microprocessor designed by Intel as a successor to its Pentium II.
  • Pentium 4 (P4) - Pentium 4 (P4) is the Intel processor (codenamed Willamette) that was released in November 2000.
  • performance crime - A performance crime is an illegal act that is committed with the intention of being witnessed by an audience or seeking an audience afterwards.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • persistent identification element (PIE) - Persistent identification element (PIE) is used to tag individual user’s browsers with a unique identifier that – unlike ordinary HTTP cookies -- cannot be easily deleted.
  • personal area network (PAN) - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • personal computer (PC) - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • personal digital assistant (PDA) - Personal digital assistants were the precursors to smartphones.
  • personal operating space (POS) - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.
  • personal video recorder (PVR) - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personalized search - Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.
  • pervasive gaming - Pervasive gaming is a type of gaming where playing is not contained within one particular platform or device.
  • phablet - A phablet is a computing device with a screen size between five and seven inches long.
  • phase-change cooling (vapor cooling) - Phase-change cooling, also called vapor cooling, is a microprocessor-cooling technology that works according to the same principles as a conventional refrigerator, freezer or air conditioner.
  • phase-change memory (PCM) - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • photocopier - A photocopier is an electronic machine that makes copies of images and documents.
  • Photoshop - Photoshop is Adobe's photo editing, image creation and graphic design software.
  • physical computer - A physical computer is a hardware-based device, such as a personal computer.
  • PictBridge - PictBridge is the name of an industry standard for firmware (built-in software) that allows digital cameras and printers to communicate directly with each other.
  • Pinterest - Pinterest is a social curation website for sharing and categorizing images found online.
  • PKZIP (or PKZip) - PKZIP (also capitalized as PKZip) is a program, originally written for the DOS operating system, that gathers multiple files into a single compressed file that can be stored in less space and transmitted more quickly from one place to another.
  • pocket PC (pocket personal computer) - A pocket PC (pocket personal computer) is a hardware specification for a small, handheld computer, personal digital assistant (PDA) or smartphone.
  • Pokémon GO - Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems.
  • port interface card (PIC) - A port interface card (PIC) is a computer circuit board that provides multiple, diverse interfaces for connections to external networks.
  • portable computer - A portable computer is a personal computer that is designed to be easily transported and relocated, but is larger and less convenient to transport than a notebook computer.
  • portable media center - Portable media center is a term for a handheld multimedia device that can play digital music, image, and movie files that have been downloaded from the Internet or stored on a personal computer.
  • power user - A power user, also called a super user, is someone whose computer skills are better than those of an organization's average end user.
  • pre-roll ad - A pre-roll ad is a promotional video message that plays before the content the user has selected.
  • precycling - Precycling is the practice of avoiding the acquisition of unnecessary items that will eventually have to be recycled or dealt with as waste.
  • predictive text - Predictive text is an input technology that facilitates typing on a mobile device by suggesting words the end user may wish to insert in a text field.
  • principle of least privilege (POLP) - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.
  • Prism - Prism is an application that lets users run web applications in dedicated browser windows.
  • privacy policy - A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations.
  • privilege bracketing - Privilege bracketing is the practice of limiting temporarily increased permission levels to the briefest possible time period.
  • productivity software - Productivity software is a category of application programs that help users produce things such as documents, databases, graphs, worksheets and presentations.
  • progressive download - A progressive download is a process that allows the user to access content before the data transfer is complete.
  • Project Vault - Project Vault is a secure minicomputer contained on a Micro SD card; Vault is under development at Google ATAP, the company’s lab group for disruptive technologies.
  • Proteus effect - The Proteus effect is the tendency for people to be affected by their digital representations, such as avatars, dating profiles and social media personas.
  • proximity operator - A proximity operator is a character or word used to narrow search engine results by limiting them to those that have query keywords placed within a specific number of words in the content.
  • PS/2 connector - A PS/2 connector is a round connector with six pins that some makes of personal computer use for the keyboard or mouse connection.
  • pseudo-anonymity - Pseudo-anonymity is the appearance – but not the reality--of anonymity online.
  • pseudonymity - Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym.
  • QHD (quad high definition) - QHD (Quad High Definition) is a resolution standard for high-end monitors, televisions and mobile devices.
  • qHD (quarter high definition) - qHD (quarter high definition) is a resolution standard for mobile devices.
  • Qik - Qik is an online video streaming service that allows anyone with a strong wireless Internet connection and a video camera-equipped smartphone to broadcast live events.
  • QR code (quick response code) - A QR code (quick response code) is a type of 2D bar code that provides easy access to information through a smartphone camera.
  • QuickType - QuickType is a predictive text feature released with Apple's iOS 8 that uses machine learning to incorporate the user's vocabulary into its dictionary and so improve its capacity and accuracy.
  • rabbit hole - A rabbit hole, in a metaphorical sense, is a long and winding exploratory path with many connections and offshoots.
  • real-time communications (RTC) - Real-time communications (RTC) is any mode of telecommunications in which all users can exchange information instantly or with negligible latency.
  • real-time location system (RTLS) - A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.
  • reconfigurable tactile display (RTD) - A reconfigurable tactile display (RTD) is a control interface that provides physical touch input, but that can be configured by programming.
  • recycling - Recycling is the practice of reusing items that would otherwise be discarded as waste.
  • red screen of death - The red screen of death is a term coined by some early testers of Longhorn (the code name for Microsoft's latest Windows operating system) who, in May 2005, came across an error message appearing against an all-red display screen.
  • Reduce, reuse, recycle (R3) - Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.
  • remote desktop - Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • Remote Desktop Session Host (RDSH) - Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS).
  • removable media - Removable media is any type of storage device that can be removed from a computer while the system is running.
  • respawning cookie - A respawning cookie is a standard HTTP cookie backed up by data stored in additional files that are used to rebuild the original cookie when the user visits the originating site again.
  • restore point - A restore point is a saved "snapshot" of a computer's data at a specific time.
  • reverse electrovibration (virtual touch) - Reverse electrovibration, also known as virtual touch, is an augmented reality (AR) technology that allows end users to perceive the textures and contours of an object from a computer screen.
  • reverse image search - Reverse image search is a technology that takes an image file as a search engine input query and returns results related to the image.
  • rich client - A rich client is a networked computer that has some resources installed locally but also depends on other resources distributed over the network.
  • robotic personality - Robotic personality is an advanced aspect of artificial intelligence (AI) in which smart machines display idiosyncratic human behavior.
  • Rocket eBook - Rocket eBook is a portable reading device about the size of a paperback book that promises to be the first usable, mass-marketed "electronic book.
  • rollable display - A rollable display is a digital screen technology that can be rolled up like a newspaper.
  • rollover ad - A rollover ad is an online advertisement that appears to be a static image until rollover activates it.

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any ...

  • principle of least privilege (POLP)

    The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are ...

  • biometric authentication

    Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close