Browse Definitions :
Definition

PC Card

A PC Card (previously known as a PCMCIA card) is a credit card-size memory or I/O device that fits into a personal computer, usually a notebook or laptop computer. Probably the most common use of a PC Card is the telecommunications modem for notebook computers. There are 16-binary digit and 32-bit (CardBus) varieties of PC Cards. Another type of PC card is the ZV port Card.

The PC Card is based on standards published by the Personal Computer Memory Card International Association (PCMCIA), an industry group organized in 1989 to promote standards for both memory and I/O integrated circuit card. The PCMCIA 2.1 Standard was published in 1993. As a result, PC users can be assured of standard attachments for any peripheral device that follows the standard.

A PC Card has a 68-pin connector that connects into a slot in the PC. There are three sizes (or "types") of PC Cards:

Type Thickness (mm) Typical use
I 3.3 Memory
II 5.0 Modems, LANs. SCSI, sound
III 10.5 ATA hard drive

The Type I and II cards work in a Type III slot and a Type I card will work in a Type II slot. (On the other hand, the thicker cards can't be fitted into the slots for the thinner cards.)

The PCMCIA standard is most commonly applied to portable PCs but it can also be used on desktop computers. The PC Card is not to be confused with another credit-size electronic card, the smart card.

This was last updated in September 2005

Continue Reading About PC Card

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close