Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

VIS - ZER

  • virtual assistant - A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user.
  • virtual assistant (AI assistant) - A virtual assistant is an application program that can understand natural human language, speak natural language and complete electronic tasks for the end user.
  • Virtual Choir - Virtual Choir is an assembly of geographically dispersed singers performing choral works, led by composer Eric Whitacre.
  • virtual floppy disk - A virtual floppy disk is an alternative to the traditional floppy that exists as a file rather than a physical medium.
  • virtual presence - Virtual presence is the ability of a user to feel that they are actually in a virtual location such as a web site or an immersive simulation using technologies like virtual reality (VR) or augmented reality (AR).
  • virtual reality cloud (VR cloud) - Virtual reality cloud is the application of cloud computing to create VR environments and experiences.
  • virtual reality gaming (VR gaming) - At its simplest, a VR game might involve a 3-D image that can be explored interactively on a computing device by manipulating keys, mouse or touchscreen.
  • virtual reality therapy (VR therapy) - Virtual reality therapy (VR therapy) is the use of simulated interactive and immersive environments as a tool for physical or psychological healthcare applications.
  • vision-correcting display - A vision-correcting display distorts the images on users' screens according to algorithms based on their prescriptions for eyeglasses.
  • visitor-based networking (visitor-based network) - Visitor-based networking (VBN) is a computer network with high-speed internet access provided by an organization for temporary use by visitors, guests or other users in a public area.
  • Visual Studio Express (VSE) - Visual Studio Express (VSE) is a freeware version of Microsoft's Visual Studio development environment toolset.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • VR headset (virtual reality headset) - A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV).
  • VR room (virtual reality room) - Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience.
  • watchdog timer (WDT) - A watchdog timer (WDT) is a device or electronic card that performs a specific operation after a certain period of time if something goes wrong with an electronic system and the system does not recover on its own.
  • water cooling - In computers, water cooling is a method used to lower the temperatures of computer processors, and sometimes other components such as graphics cards, using water rather than air as the cooling medium.
  • wearable computer - A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.
  • wearable technology - Wearable technology is any kind of electronic device designed to be worn on the user’s body.
  • wearables security - Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets and fitness trackers.
  • WhatsApp - WhatsApp Messenger is a cross-platform instant messaging application that allows iPhone, BlackBerry, Android, Windows Phone and Nokia smartphone users to exchange text, image, video and audio messages for free.
  • Windows 1.0 - Windows 1.0 was the first of Microsoft’s GUI-based operating systems, released in 1985.
  • Windows 2.0 - Windows 2.0 was the 2nd version of Microsoft’s GUI-based operating system, released in 1987.
  • Windows 3.0 - Windows 3.0 was the 3rd version of Microsoft’s GUI-based operating system, released in 1990.
  • Windows 3.1 - Windows 3.1 was the 4th version of Microsoft’s GUI-based operating system, released in 1993.
  • Windows 7 - Windows 7 is the Microsoft Windows operating system (OS) released commercially in October 2009 as the successor to Windows Vista.
  • Windows 95 - Windows 95 was the 5th version of Microsoft’s GUI operating system, released in 1995.
  • Windows Mixed Reality - Windows Mixed Reality is a Microsoft platform for virtual reality (VR), augmented reality (AR) and mixed reality (MR).
  • Windows XP Mode - Windows XP Mode is a feature of the Windows 7 operating system that allows it to run applications that are only compatible with Windows XP.
  • Wintel - Wintel is a computer trade industry term for personal computers based on the Intel microprocessor and one of the Windows operating system from Microsoft.
  • Wolfram Alpha - Wolfram Alpha is a computational search engine (sometimes referred to as an "answer engine").
  • workstation - A workstation is a computer intended for individual use that is faster and more capable than a personal computer.
  • Xerox - Xerox is a provider of document-related technology and services.
  • Zero-TV - Zero-TV is Nielsen's category for homes that neither subscribe to cable or satellite television services nor use an antenna to boost signals for over the air (OTA) broadcasts.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close