Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

STA - WHA

  • stablecoin - Stablecoin is a fixed-price cryptocurrency whose market value is attached to another stable asset.
  • standard definition television (SDTV) - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
  • standby power - Standby power is electrical power that a device consumes when not in present use, but plugged in to a source of power and ready to be used.
  • steadycam (steadicam) - A steadycam (also known as a steadicam) is a device that enables smooth video shooting by stabilizing a camera and isolating it from shock and vibration.
  • steampunk - Steampunk is a design style inspired by Victorian-era industrialism.
  • stream recorder (stream ripper) - What is stream recorder?A stream recorder (sometimes called a stream ripper) is a program used to save streaming media to a file so that it can be accessed locally.
  • streaming media receiver - A streaming media receiver is a set top box that connects to a television to play content from one or more video streaming services.
  • Subversion - Subversion is a version control system that keeps track of changes made to files and folders (directories), facilitating data recovery and providing a history of the changes that have been made over time.
  • Surface (Microsoft Surface tablet) - Surface is a line of tablet computers from Microsoft.
  • swirl - .
  • tablet (tablet PC) - A tablet is a wireless, portable personal computer with a touchscreen interface.
  • tag-jacking - Tag-jacking is the exploitation of Facebook's friend tagging feature to spread unwanted material such as scams, spam or malware.
  • take-down request - A take-down request, also called a notice and take down request, is a procedure for asking an Internet Service Provider (ISP) or search engine to remove or disable access to illegal, irrelevant or outdated information.
  • talking translator - A talking translator is a program that translates words and phrases from one language to another language and delivers the translation to the user as audio information.
  • tap - On a handheld device, a tap is the equivalent of a mouse click on a personal computer, used to select options and to interact with programs.
  • technology addiction (internet addiction) - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • TED - The TED (technology, entertainment, design) conference is an annual gathering for presentations known as TED talks on a broad range of topics related to science and culture.
  • TED talk - A TED talk is a presentation at the main TED (technology, entertainment, design) conference or one of its many satellite events around the world.
  • term boosting - Term boosting is the ability to assign higher importance to specific words in a search engine query.
  • terminal emulation - Terminal emulation is the ability to make one computer terminal, typically a PC, appear to look like another, usually older type of terminal so that a user can access programs originally written to communicate with the other terminal type.
  • thermoelectric cooling - Thermoelectric cooling is a way to remove thermal energy from a medium, device or component by applying a voltage of constant polarity to a junction between dissimilar electrical conductors or semiconductors.
  • thin client (lean client) - A thin client, sometimes called a lean client, is a low-cost, centrally-managed computer that relies heavily on a server for its computational role.
  • thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  • third-party cookie - A third-party cookie is one that is placed on a user’s hard disk by a Web site from a domain other than the one a user is visiting.
  • thumbing - Thumbing is a method of typing on a small keyboard using the thumbs.
  • Thunderbolt - Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).
  • Tiger - Tiger is the the code name for Mac OS version 10.
  • time bank - A time bank is a reciprocity-based work trading system in which hours are the currency.
  • Titanium (TiBook) - Titanium is the name of a popular laptop computer from Apple that is encased in titanium, the strong but light metal that is used in supersonic aircraft engines.
  • toolbar - In the graphical user interface (GUI) for a computer, a toolbar is a horizontal row or vertical column of selectable image "buttons" that give the user a constantly visible reminder of and an easy way to select certain desktop or other application functions, such as saving or printing a document or moving pages forwards or backwards within a Web browser.
  • Tor browser - The Tor (the onion routing) browser is a web browser designed for encrypted, anonymous web surfing and protection against traffic analysis.
  • torque - Torque is a twisting or turning force that tends to cause rotation around an axis; it can also be thought of as the ability of something that is rotating, such as a gear or a shaft, to overcome turning resistance.
  • torture test - A torture test is an evaluation of an item's ability to withstand extreme conditions.
  • touch screen - A touch screen is a computer display screen that is also an input device.
  • TrackPoint (pointing stick) - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.
  • transparent aluminum - Transparent aluminum is a form of aluminum that is see-through.
  • treadmill desk - A treadmill desk is a raised workstation that is designed to allow the user to walk on a treadmill as they work on a computer.
  • trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.
  • troubleshooting - Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • tru2way - Tru2way is the trade name for a technology that facilitates interactive TV and the convergence of digital television (DTV) with other communications devices.
  • TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.
  • trusted PC - The trusted PC is an industry ideal of a PC with built-in security mechanisms that place minimal reliance on the user or administrator to keep a PC and its peripheral devices secure.
  • TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).
  • tweak freak (tweaker) - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweet - A tweet is a post on Twitter.
  • tweet jam - A tweet jam is a moderated discussion on Twitter that is planned and promoted in advance and scheduled for a specific time period.
  • Twitter essay - A Twitter essay is content supporting a particular thesis or viewpoint that is written through sequential and usually numbered tweets.
  • Twitterbot - A Twitterbot (sometimes spelled "Twitter bot") is a software program that posts automated tweets on Twitter.
  • two-spindle system (twin-spindle system) - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • Ultra High-Definition TV (UHDTV) - Ultra-high-definition (UHD) television, also abbreviated UHDTV, is a digital television display format in which the horizontal screen resolution is on the order of 4000 pixels (4K UHD) or 8000 pixels (8K UHD).
  • ultra-mobile personal computer (UMPC or Ultra-mobile PC) - Ultra-mobile PC (UMPC) is a design specification for a hand-held computer that is larger than a PDA but smaller than a laptop.
  • ultrabook - An ultrabook is a category of thin and light laptop computers designed to bridge the market gap between tablets and premium notebook PCs.
  • undeleting - Undeleting is the process of recovering data that has been deleted from a storage medium, usually the hard drive of a computer.
  • uninterruptible power supply (UPS) - An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time when the primary power source is lost.
  • Universal Plug and Play (UPnP) - Universal Plug and Play (UPnP) is a standard that uses Internet and Web protocols to enable devices such as PCs, peripherals, intelligent appliances, and wireless devices to be plugged into a network and automatically know about each other.
  • upcycling - Upcycling is the practice of creating a useable product from waste or unwanted items or adapting an existing product in some way to add value.
  • upgrade - In computers, an upgrade is a new version of or addition to a hardware or, more often, software product that is already installed or in use.
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • USB-C (USB Type C) - USB-C is a connection type standard designed to replace all USB types on the computer and device ends of future USB with a single reversible connector.
  • user engagement - User engagement is an assessment of an individual's response to some type of offering, such as a product, a service or a website.
  • user environment management (UEM) - User environment management is a technology designed to allow IT to oversee a user's complete desktop experience, including the profile, any policies IT applies and customizations the user makes.
  • user installed application (UIA) - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
  • vertical scalability (scaling up) - Vertical scalability is the ability to increase the capacity of existing hardware or software by adding resources - for example, adding processing power to a server to make it faster.
  • video resume - A video resume is a brief account of a job applicant's professional experience, qualifications and interests, submitted to a prospective employer in video form.
  • video streaming service - A video streaming service is an on demand online entertainment source for TV shows, movies and other streaming media.
  • virtual assistant - A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user.
  • virtual assistant (AI assistant) - A digital assistant is an application program that can understand natural human language and complete electronic tasks for the end user.
  • Virtual Choir - Virtual Choir is an assembly of geographically dispersed singers performing choral works, led by composer Eric Whitacre.
  • virtual desktop manager - A virtual desktop manager is a program that allows a computer user to have more than one user interface available simultaneously on a single computer.
  • virtual floppy disk - A virtual floppy disk is an alternative to the traditional floppy that exists as a file rather than a physical medium.
  • Virtual Home Environment (VHE) - In mobile computing, the Virtual Home Environment (VHE) is the concept that a network supporting mobile users should provide them the same computing environment on the road that they have in their home or corporate computing environment.
  • virtual presence - Virtual presence is the ability of a user to feel that they are actually in a virtual location such as a web site or an immersive simulation using technologies like virtual reality (VR) or augmented reality (AR).
  • virtual reality gaming (VR gaming) - At its simplest, a VR game might involve a 3-D image that can be explored interactively on a computing device by manipulating keys, mouse or touchscreen.
  • virtual reality therapy (VR therapy) - Virtual reality therapy (VR therapy) is the use of simulated interactive and immersive environments as a tool for physical or psychological healthcare applications.
  • vision-correcting display - A vision-correcting display distorts the images on users' screens according to algorithms based on their prescriptions for eyeglasses.
  • visitor-based networking (VBN) - Visitor-based networking (VBN) is the provision of high-speed Internet access for mobile PC users in need of temporary service in public places.
  • Visual Studio Express (VSE) - Visual Studio Express (VSE) is a freeware version of Microsoft's Visual Studio development environment toolset.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • VR headset (virtual reality headset) - A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV).
  • VR room (virtual reality room) - Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience.
  • VxWorks - VxWorks is a real-time operating system (RTOS) that can be used in embedded systems.
  • wallpaper - On a computer that is provided with a desktop kind of user interface, wallpaper is the background pattern or picture against which desktop menus, icons, and other elements are displayed and moved around.
  • watchdog timer (WDT) - A watchdog timer (WDT) is a device or electronic card that performs a specific operation after a certain period of time if something goes wrong with an electronic system and the system does not recover on its own.
  • water cooling - In computers, water cooling is a method used to lower the temperatures of computer processors, and sometimes other components such as graphics cards, using water rather than air as the cooling medium.
  • wearable computer - A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.
  • wearable technology - Wearable technology is any kind of electronic device designed to be worn on the user’s body.
  • wearables security - Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets and fitness trackers.
  • Weave - Weave is a set of browser enhancements and associated services from Mozilla Labs that allow users to store personal information on Mozilla servers.
  • Web 2.0 suicide - Web 2.0 suicide is the obliteration of information related to an individual's online persona on social networking sites, blogs and other web-based venues.
  • Web We Want Campaign - The Web We Want Campaign is a  movement created by Sir Tim Berners-Lee that strives to ensure the same characteristics that fostered the Web’s success continue and that it reaches its potential as a tool for knowledge, democracy and freedom of expression.
  • WetPC - WetPC (TM) is a wearable computer for underwater use.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close