Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

VIR - ZER

  • virtual assistant - A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user.
  • virtual assistant (AI assistant) - A virtual assistant is an application program that can understand natural human language, speak natural language and complete electronic tasks for the end user.
  • Virtual Choir - Virtual Choir is an assembly of geographically dispersed singers performing choral works, led by composer Eric Whitacre.
  • virtual floppy disk - A virtual floppy disk is an alternative to the traditional floppy that exists as a file rather than a physical medium.
  • virtual presence - Virtual presence is the ability of a user to feel that they are actually in a virtual location such as a web site or an immersive simulation using technologies like virtual reality (VR) or augmented reality (AR).
  • virtual reality cloud (VR cloud) - Virtual reality cloud is the application of cloud computing to create VR environments and experiences.
  • virtual reality gaming (VR gaming) - At its simplest, a VR game might involve a 3-D image that can be explored interactively on a computing device by manipulating keys, mouse or touchscreen.
  • virtual reality therapy (VR therapy) - Virtual reality therapy (VR therapy) is the use of simulated interactive and immersive environments as a tool for physical or psychological healthcare applications.
  • vision-correcting display - A vision-correcting display distorts the images on users' screens according to algorithms based on their prescriptions for eyeglasses.
  • visitor-based networking (visitor-based network) - Visitor-based networking (VBN) is a computer network with high-speed internet access provided by an organization for temporary use by visitors, guests or other users in a public area.
  • Visual Studio Express (VSE) - Visual Studio Express (VSE) is a freeware version of Microsoft's Visual Studio development environment toolset.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • VR headset (virtual reality headset) - A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV).
  • VR room (virtual reality room) - Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience.
  • watchdog timer (WDT) - A watchdog timer (WDT) is a device or electronic card that performs a specific operation after a certain period of time if something goes wrong with an electronic system and the system does not recover on its own.
  • water cooling - In computers, water cooling is a method used to lower the temperatures of computer processors, and sometimes other components such as graphics cards, using water rather than air as the cooling medium.
  • wearable computer - A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.
  • wearable technology - Wearable technology is any kind of electronic device designed to be worn on the user’s body.
  • wearables security - Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets and fitness trackers.
  • WhatsApp - WhatsApp Messenger is a cross-platform instant messaging application that allows iPhone, BlackBerry, Android, Windows Phone and Nokia smartphone users to exchange text, image, video and audio messages for free.
  • Windows 1.0 - Windows 1.0 was the first of Microsoft’s GUI-based operating systems, released in 1985.
  • Windows 2.0 - Windows 2.0 was the 2nd version of Microsoft’s GUI-based operating system, released in 1987.
  • Windows 3.0 - Windows 3.0 was the 3rd version of Microsoft’s GUI-based operating system, released in 1990.
  • Windows 3.1 - Windows 3.1 was the 4th version of Microsoft’s GUI-based operating system, released in 1993.
  • Windows 7 - Windows 7 is the Microsoft Windows operating system (OS) released commercially in October 2009 as the successor to Windows Vista.
  • Windows 95 - Windows 95 was the 5th version of Microsoft’s GUI operating system, released in 1995.
  • Windows Mixed Reality - Windows Mixed Reality is a Microsoft platform for virtual reality (VR), augmented reality (AR) and mixed reality (MR).
  • Windows XP Mode - Windows XP Mode is a feature of the Windows 7 operating system that allows it to run applications that are only compatible with Windows XP.
  • Wintel - Wintel is a computer trade industry term for personal computers based on the Intel microprocessor and one of the Windows operating system from Microsoft.
  • Wolfram Alpha - Wolfram Alpha is a computational search engine (sometimes referred to as an "answer engine").
  • workstation - A workstation is a computer intended for individual use that is faster and more capable than a personal computer.
  • Xerox - Xerox is a provider of document-related technology and services.
  • Zero-TV - Zero-TV is Nielsen's category for homes that neither subscribe to cable or satellite television services nor use an antenna to boost signals for over the air (OTA) broadcasts.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • sandbox (software testing and security)

    A sandbox is an isolated testing environment that enables users to run programs or open files without affecting the application, ...

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...

  • Zoombombing

    Zoombombing is a type of cyber-harassment in which an individual or a group of unwanted and uninvited users interrupt online ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close