Browse Definitions :
Definition

DB-xx (DB-9, DB-15, DB-25, DB-50, DB-68)

DB-xx is the designation for a series of port connectors for attaching devices to computers. DB-xx connectors include DB-9, DB-15, DB-25, DB-50, and DB-68.

DB-9 is a connector used for RS-232 connections and for several video interfaces on IBM-compatible computers.

DB-15 is a female connector used as a joystick port on IBM-compatible computers and as the video connector on MacIntosh computers. There is also a high-density DB-15 female connector for the Video Graphics Array (VGA) or Super Video Graphics Array (SVGA) video adapter on IBM-compatible computers.

DB-25 is a male connector used for attaching external modems and RS-232 serial peripherals on older IBM-compatible computers. The DB-25 female connector is the parallel port connector for most personal computers. DB-25 was first used with the original IBM personal computer (PC) and has had a long life.

DB-50 is a female connector used as the SCSI-2 connector for 8-bit Narrow SCSI devices on older Sun and Data General computers. However, DB-50 is not recognized by the SCSI specifications.

DB-68 is a high-density connector used as a SCSI-3 connector for 16-bit Wide SCSI and Fast SCSI devices.

This was last updated in September 2005

Continue Reading About DB-xx (DB-9, DB-15, DB-25, DB-50, DB-68)

SearchNetworking
  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close