Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

136 - BRA

  • 136 browser colors with names - Some Web page creators prefer to specify colors by name rather than by hexadecimal red-green-blue (RGB) intensity value.
  • 24x7 (24 hours a day, 7 days a week) - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 2D barcode (two-dimensional barcode) - A 2D (two-dimensional) barcode is a graphical image that stores information horizontally as one-dimensional barcodes do, as well as vertically.
  • 3-D (three dimensions or three-dimensional) - In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.
  • 3-D printing (additive manufacturing) - 3-D printing is a manufacturing process that builds layers to create a three-dimensional solid object from a digital model.
  • 360-degree photograph - 360-degree photos simulate being in the shoes of a photographer and looking around to the left, right, up and down as desired as well as sometimes zooming.
  • 3D audio (three-dimensional audio) - 3D audio is a simulation of the natural positioning of sounds for various applications including video presentations and games, virtual environments and sound stages.
  • 3D camera - A 3D camera is an imaging device that enables the perception of depth in images to replicate three dimensions as experienced through human binocular vision.
  • 3D mesh - A 3D mesh is the structural build of a 3D model consisting of polygons.
  • 4 P's marketing mix - The marketing mix, also known as the four P's of marketing, refers to the four key elements of a marketing strategy: product, price, place and promotion.
  • 64-bit processor (64-bit computing) - A 64-bit processor refers to a microprocessor that can process data and instructions in chunks of 64 bits.
  • 720p - 720p is the standard high-definition (HD) display resolution of 1280x720 pixels, with progressive scanning, at a 16x9 aspect ratio.
  • A-weighted decibel (dBA or dB(A)) - A-weighted decibel (dBA or dB(A)) is an expression of the relative loudness of sounds as perceived by the human ear.
  • A2P messaging (application to person messaging) - A2P messaging (application to person messaging), also known as enterprise or business SMS, is a type of SMS messaging technique where a text is sent from a software application run by an enterprise to a consumer's device.
  • abacus - An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame.
  • AC-3 (Dolby Digital) - AC-3, also known as Dolby Digital, is a perceptual digital audio coding technique that reduces the amount of data needed to produce high-quality sound.
  • acceptable use policy (AUP) - An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
  • ActionScript - ActionScript is an object-oriented programming (OOP) language that is designed specifically for Web site animation.
  • active cooling - Active cooling is the use of fans to reduce the heat of computer components.
  • add-on - An add-on is either a hardware unit that can be added to a computer to increase its capabilities or a program utility that enhances a primary program.
  • Address Resolution Protocol (ARP) - Address Resolution Protocol (ARP) is a procedure for mapping a dynamic IP address to a permanent physical machine address in a local area network (LAN).
  • adulting - Adulting is the assumption of tasks and behaviors associated with normal grown-up life, along with the implication that the individual in question does not particularly identify as an adult.
  • adware - Adware is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.
  • AI winter - AI winter is a quiet period for artificial intelligence research and development.
  • alt text (alternative text) - Alt text (alternative text) is a word or phrase that can be inserted as an attribute in an HTML (Hypertext Markup Language) document to tell Web site viewers the nature or contents of an image.
  • Amazon - Amazon (Amazon.
  • Amazon Prime - Amazon Prime is a subscription membership to Amazon that offers customers premium services for a yearly or monthly fee.
  • ambient intelligence (AmI) - Ambient intelligence (AmI) is the element of a pervasive computing environment that enables it to interact with and respond appropriately to the humans in that environment.
  • ambient temperature - Ambient temperature is the air temperature of any object or environment where equipment is stored.
  • Android Factory Reset - Android Factory Reset is a feature that erases all device settings, user data, third-party applications, and associated application data from an Android device’s internal flash storage to return the device to the condition it was in when shipped from the factory.
  • animated GIF (Graphics Interchange Format) - An animated GIF (Graphics Interchange Format) file is a graphic image on a Web page that moves - for example, a twirling icon or a banner with a hand that waves or letters that magically get larger.
  • anime - Anime (pronounced AH-nee-may) is a term for a style of Japanese comic book and video cartoon animation in which the main characters have large doe-like eyes.
  • anonymous FTP (File Transfer Protocol) - Using the Internet's File Transfer Protocol (FTP), anonymous FTP is a method for giving users access to files so that they don't need to identify themselves to the server.
  • anthropomorphism - Anthropomorphism (from the Greek anthrôpos, for human, and morphé, for shape) is the tendency for people to think of other animals or inanimate objects as having human-like characteristics.
  • anti-replay protocol - The anti-replay protocol provides Internet Protocol (IP) packet-level security by making it impossible for a hacker to intercept message packets and insert changed packets into the data stream between a source computer and a destination computer.
  • Apache - Apache is a freely available Web server that is distributed under an "open source" license.
  • app - App is an abbreviated form of the word "application.
  • Apple AirDrop - Apple AirDrop is a feature on iOS and OS X devices that allows users to transfer data over the same Wi-Fi network from one Apple device to another.
  • Apple Authorized Reseller (AAR) - An Apple Authorized Reseller (AAR) is a business partner that has entered into a contractual relationship with Apple Computer Inc.
  • Apple Bonjour - Apple Bonjour is a group of networking technologies designed to help devices and applications discover each other on the same network.
  • Apple iMessage (Apple instant message) - Apple iMessage (Apple instant message) is an instant messenger service developed by Apple Inc.
  • Apple iPad Pro - Apple iPad Pro is the company's large, powerful, high-resolution tablet, aimed at users who require graphics-heavy applications and a PC-like screen and interface.
  • Apple Push Notification service (APNs) - Apple Push Notification service (APNs) is a cloud service that allows approved third-party apps installed on Apple devices to send push notifications from a remote server to users over a secure connection.
  • Apple Watch - Apple Watch is Apple's entry into the smartwatch market.
  • Apple Watch OS (Apple Watch operating system) - The operating system for Apple Watch is designed to take advantage of the wearable nature of the device with features such as Glances that cater to the smaller screen and its location on the user's wrist.
  • Archie - Archie is a program that allows you to search the files of all the Internet FTP servers that offer anonymous FTP.
  • areal density - Areal density measures the amount of data that can be stored on a given amount of physical space on a disk drive.
  • ASCII (American Standard Code for Information Interchange) - ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data in computers and on the internet.
  • ASIO (Audio Stream Input/Output) - ASIO (Audio Stream Input/Output), developed by Steinberg, is a cross-platform, multi-channel audio transfer protocol that is being adopted by many of the manufacturers of audio/MIDI sequencing applications.
  • ASMR (autonomous sensory meridian response) - Autonomic sensory meridian response (ASMR) is a tingling sensation that some people experience when exposed to particular types of auditory or visual stimuli such as whispering, tapping and slow movements.
  • aspect ratio - Aspect ratio is an image projection attribute that describes the proportional relationship between the width of an image and its height.
  • at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected]
  • ATAPI (AT Attachment Packet Interface) - ATAPI (AT Attachment Packet Interface) is an interface between your computer and attached CD-ROM drives and tape backup drives.
  • atomic clock (NIST-F1) - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • attention economy - The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.
  • audio - Audio is sound within the acoustic range available to humans.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with the user's environment in real time.
  • augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
  • augmented reality gaming (AR gaming) - Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • auto-correct - Auto-correct is a type of software program that identifies misspelled words, uses algorithms to identify the word most likely to have been intended, and edits the text accordingly.
  • autofill - Autofill is a feature in software programs and applications that automatically inserts previously-entered information for the user’s convenience.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host Configuration Protocol client to automatically assign an IP address to itself when there's no DHCP server available to perform that function.
  • autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • autoplay video - Autoplay video is audiovisual content that starts automatically when someone goes to the host web page.
  • AVI file (Audio Video Interleaved file) - An AVI (Audio Video Interleaved) file is a sound and motion picture file that conforms to the Microsoft Windows Resource Interchange File Format (RIFF) specification.
  • B-channel (bearer channel) - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • backscatter spam - Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender when a recipient's email address is invalid.
  • backslash - The backslash ( \ ) is a typographic and/or keyboard mark that is widely used in programming languages and other computing contexts.
  • banner - Depending on how it's used, a banner is either a graphic image that announces the name or identity of a site (and often is spread across the width of the Web page) or is an advertising image.
  • barter economy - A barter economy is a cashless economic system in which services and goods are traded at negotiated rates.
  • battery life - Battery life is a measure of  battery performance and longevity, which can be quantified in several ways: as run time on a full charge, as estimated by a manufacturer in milliampere hours, or as the number of charge cycles until the end of useful life.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • behavioral targeting - Behavioral targeting is the presentation of content and marketing based on the previous choices of users across websites.
  • bell curve - A bell curve is a form of graph that is used to visualize the distribution of a set of chosen values across a specified group that tend to have a central, normal values, as peak with low and high extremes tapering off relatively symmetrically on either side.
  • Bezier curve - A Bezier curve is a mathematically defined curve used in two-dimensional graphic applications.
  • big data CRM (big data customer relationship management) - Big data CRM (big data customer relationship management) refers to the practice of integrating big data into a company's CRM processes with the goals of improving customer service, calculating return on investment on various initiatives and predicting clientele behavior.
  • Big Tech - Big Tech is a term that refers to the most dominant and largest technology companies in their respective sectors.
  • binaural sound (binaural beats) - Binaural sound is audio that is recorded through specialized dual microphone setups, allowing for a stereophonic 3D audio effect that simulates sound as heard when physically present.
  • BIOS (basic input/output system) - BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered on.
  • BIOS attack - A BIOS attack is an exploit that infects the BIOS with malicious code and is persistent through reboots and attempts to reflash the firmware.
  • BIOS rootkit - A BIOS-level rootkit is programming that exists in a system's memory hardware to enable remote administration.
  • bit depth - In digital audio, bit depth describes the potential accuracy of a particular piece of hardware or software that processes audio data.
  • bit map - A bit map (often spelled "bitmap") defines a display space and the color for each pixelor "bit" in the display space.
  • Bitcoin - Bitcoin is a digital currency -- also called cryptocurrency -- that can be traded for goods or services with vendors that accept Bitcoin as payment.
  • bitcoin mining - Bitcoin mining is the process of verifying new transactions to the Bitcoin digital currency system, as well as the process by which new bitcoin enter into circulation.
  • Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
  • black level (brightness) - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • BlackBerry Enterprise Server (BES) - BlackBerry Enterprise Server (BES) is a middleware program that allows BlackBerry devices to access corporate messaging and collaboration software such as Microsoft Exchange, Lotus Domino and Novell GroupWise.
  • blog (weblog) - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • Blogger - Blogger is a free Web log service from Google that allows users to share text, photos and videos.
  • blogroll - A blogroll is a list of blogs, usually placed in the sidebar of a blog, that reads as a list of recommendations by the blogger of other blogs.
  • Blu-ray - Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • body area network (BAN) - A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body.
  • bone conduction headphones - Bone conduction headphones -- sometimes called 'bonephones'-- are headphones that transmit sound waves through the bones in a user's skull instead of their ear canal.
  • bookmark - Using a World Wide Web browser, a bookmark is a saved link to a Web page that has been added to a list of saved links.
  • Boolean operator - Boolean operators are a common type of search operator, sometimes referred to as a search parameters, which are characters or strings of characters – including words and phrases – that are used in a search engine query to narrow the focus of the search.
  • bounce email (bounce mail) - Bounce e-mail (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

  • data masking

    Data masking is a method of creating a structurally similar but inauthentic version of an organization's data that can be used ...

  • computer worm

    A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close