Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

SOC - U

  • social comparison - Social comparison can lead to issues caused by the fear of missing out (FOMO), including anxiety, depression and a lack of self-esteem.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social contract - A social contract is an agreement to adhere to acceptable behaviors and meet obligations in a particular environment, such as a nation, a business or a social media site.
  • social CRM - Social CRM, or social relationship management, is customer relationship management and engagement fostered by communication with customers through social networking sites, such as Twitter and Facebook.
  • social media - Social media is a collective term for websites and applications that focus on communication, community-based input, interaction, content-sharing and collaboration.
  • social networking - Social networking is the practice of using a dedicated online platform to maintain contacts, interact and collaborate with like-minded individuals, peers, friends and family.
  • socialbot - A socialbot is a software program that simulates human behavior in automated interactions on social network sites such as Facebook and Twitter.
  • sock puppet - A sock puppet, in the context of online communications, is a fake identity created to promote someone or something through blogs, wikis, forums or social networking sites such as Facebook or Twitter.
  • sock puppet marketing - Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service.
  • socks - Socks (or "SOCKS") is a protocol that a proxy server can use to accept requests from client users in a company's network so that it can forward them across the Internet.
  • SODOTO (See One, Do One, Teach One) - SODOTO (See One, Do One, Teach One) is a methodology of teaching and learning skills and best practices through direct observation of a task, hands-on practical experience performing the task and teaching the task to another person.
  • soft copy - A soft copy (sometimes spelled 'softcopy') is an electronic copy (or e-copy) of some type of data, such as a file viewed on a computer's display or transmitted as an email attachment.
  • soft reset - A soft reset is a restart of a device, such as a smartphone, tablet, laptop or personal computer (PC).
  • softlifting - Softlifting is a common type of software piracy in which a legally licensed software program is installed or copied in violation of its licensing agreement.
  • software agent - A software agent is a persistent, goal-oriented computer program that reacts to its environment and runs without continuous direct supervision to perform some function for an end user or another program.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • solar power - Solar power is the use of the sun’s energy either thermally or through the use of photovoltaic cells in solar panels and transparent photovoltaic glass to generate electricity.
  • solar-powered laptop - A solar-powered laptop is a notebook computer that uses built-in photo voltaic solar panels to run and recharge its battery.
  • sound card - A sound card (also referred to as an audio card) is a peripheral device that attaches to the ISA or PCI slot on a motherboard to enable the computer to input, process, and deliver sound.
  • Southbridge - Southbridge is an Intel chipset that manages the basic forms of input/output (I/O) such as Universal Serial Bus (USB), serial, audio, Integrated Drive Electronics (IDE), and Industry Standard Architecture (ISA) I/O in a computer.
  • spam confidence level (SCL) - Spam confidence level (SCL) is a numerical value indicating the likelihood that an incoming email message is spam.
  • spam filter - A spam filter is a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user's inbox.
  • spam trap - A spam trap is an email address that is used to identify and monitor spam email.
  • spambot - A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.
  • spatial sensing - Spatial sensing is the detection, measuring and analysis of an environment's space and objects in real-time for the purposes of mapping them.
  • spear phishing - Spear phishing is a malicious email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • spider - A spider is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • spim (instant messaging spam) - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • SPIT (spam over Internet telephony) - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • spline - In computer graphics, a spline is a curve that connects two or more specific points, or that is defined by two or more points.
  • spoliation - Spoliation is the destruction, alteration, or mutilation of evidence that may pertain to legal action.
  • spool (simultaneous peripheral operations online) - To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document).
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • stablecoin - Stablecoin is a fixed-price cryptocurrency whose market value is attached to another stable asset.
  • stack - TCP/IP is frequently referred to as a "stack.
  • standard definition television (SDTV) - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
  • standby power - Standby power is electrical power that a device consumes when not in present use, but plugged in to a source of power and ready to be used.
  • start of authority record - A start of authority (SOA) record is information stored in a domain name system (DNS) zone about that zone and about other DNS records.
  • stateful inspection - Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.
  • static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • steampunk - Steampunk is a design style inspired by Victorian-era industrialism.
  • stop word - In computer search engines, a stop word is a commonly used word (such as "the") that a search engine has been programmed to ignore, both when indexing entries for searching and when retrieving them as the result of a search query.
  • Stream Control Transmission Protocol (SCTP) - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • streaming media - Streaming media is video or audio content sent in compressed form over the internet and played immediately over a user's device, rather than being saved to the device hard drive or solid-state drive.
  • streaming media receiver - A streaming media receiver is a set top box that connects to a television to play content from one or more video streaming services.
  • style sheet - A term extended from print publishing to online media, a style sheet is a definition of a document's appearance in terms of such elements as: The default typeface, size, and color for headings and body text How front matter (preface, figure list, title page, and so forth) should look How all or individual sections should be laid out in terms of space (for example, two newspaper columns, one column with headings having hanging heads, and so forth).
  • subscription economy - A subscription economy is a model for trade of desired content, products and services in exchange for recurring, scheduled payments.
  • substrate - A substrate is a solid substance or medium to which another substance is applied and to which that second substance adheres.
  • Subversion - Subversion is a version control system that keeps track of changes made to files and folders (directories), facilitating data recovery and providing a history of the changes that have been made over time.
  • Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • Surface (Microsoft Surface tablet) - Surface is a line of tablet computers from Microsoft.
  • SYN flood attack - A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.
  • T1 (T-1) - Also see the T-carrier system, of which the T1 is a part.
  • tablet (tablet PC) - A tablet is a wireless, portable personal computer with a touchscreen interface.
  • take-down request - A take-down request, also called a notice and take down request, is a procedure for asking an Internet Service Provider (ISP) or search engine to remove or disable access to illegal, irrelevant or outdated information.
  • TAPI (Telephony Application Program Interface) - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.
  • TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.
  • technology addiction (internet addiction) - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • TED - The TED (technology, entertainment, design) conference is an annual gathering for presentations known as TED talks on a broad range of topics related to science and culture.
  • TED talk - A TED talk is a recorded public-speaking presentation that was originally given at the main TED (technology, entertainment and design) annual event or one of its many satellite events around the world.
  • telegraph - A telegraph is a communication system that sends information by making and breaking an electrical connection.
  • teletypewriter (TTY) - A teletypewriter (TTY) is an input device that allows alphanumeric character to be typed in and sent, usually one at a time as they are typed, to a computer or a printer.
  • term boosting - Term boosting is the ability to assign higher importance to specific words in a search engine query.
  • terminal emulation - Terminal emulation is the ability to make one computer terminal, typically a PC, appear to look like another, usually older type of terminal so that a user can access programs originally written to communicate with the other terminal type.
  • texel (texture element) - In computer graphics, a texel (texture element) represents the smallest graphical element in two-dimensional (2-D) texture mapping to "wallpaper" the rendition of a three-dimensional (3-D) object to create the impression of a textured surface.
  • Text message abbreviations and acronyms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • text messaging (texting or wireless messaging) - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • texture mapping - Texture mapping is a graphic design process in which a two-dimensional (2-D) surface, called a texture map, is "wrapped around" a three-dimensional (3-D)object.
  • thermal transfer printer - A thermal transfer printer is a non-impact printer that uses heat to register an impression on paper.
  • thick client (fat client) - A thick client (sometimes called a fat client) is a form of client-server architecture.
  • thin client (lean client) - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stores on a central server instead of a computer's resources.
  • thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  • third-party cookie - A third-party cookie is a cookie that is placed on a user's hard disk by a website from a domain other than the one a user is visiting.
  • thumbnail - A thumbnail is a small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images.
  • Thunderbolt - Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).
  • TIFF (Tag Image File Format) - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.
  • time bank - A time bank is a reciprocity-based work trading system in which hours are the currency.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • tl;dr (TL;DR) - TL;DR is an abbreviation for "too long; didn't read" that is used to indicate that the person posting about an article either didn't read it in its entirety or didn't read it at all.
  • ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.
  • Tomcat - Tomcat is an application server from the Apache Software Foundation that executes Java servlets and renders Web pages that include Java Server Page coding.
  • toolbar - In the graphical user interface (GUI) for a computer, a toolbar is a horizontal row or vertical column of selectable image "buttons" that give the user a constantly visible reminder of and an easy way to select certain desktop or other application functions, such as saving or printing a document or moving pages forwards or backwards within a Web browser.
  • Top 10 spyware threats - The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool.
  • Tor browser - The Tor (the onion routing) browser is a web browser designed for anonymous web surfing and protection against traffic analysis.
  • torque - Torque is a twisting or turning force that tends to cause rotation around an axis; it can also be thought of as the ability of something that is rotating, such as a gear or a shaft, to overcome turning resistance.
  • touch screen - A touch screen is an electronic display screen that is also an input device.
  • traceroute - Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer.
  • trackball - A trackball is a computer cursor control device used in many notebook and laptop computers.
  • TrackPoint (pointing stick) - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.
  • transparent aluminum - Transparent aluminum is a form of aluminum that is see-through.
  • transparent GIF - A transparent GIF (Graphics Interchange Format) is an image file that has one color assigned to be "transparent" so that the assigned color will be replaced by the browser's background color, whatever it may be.
  • tree network - In telecommunication networks, a tree network is a combination of two or more star networks connected together.
  • Trivial File Transfer Protocol (TFTP) - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.
  • true color - True color is the specification of the color of a pixel on a display screen using a 24-bit value, which allows the possibility of up to 16,777,216 possible colors.
  • TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.
  • Tumblr - Tumblr is a free microblogging site.
  • TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).
  • TWAIN - TWAIN is a widely-used program that lets you scan an image (using a scanner) directly into the application (such as PhotoShop) where you want to work with the image.
SearchNetworking
  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close