Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

PSE - SMA

  • pseudo-anonymity - Pseudo-anonymity is the appearance – but not the reality--of anonymity online.
  • pseudonymity - Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym.
  • PST file - A PST file is a personal folder file in Microsoft Outlook.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • QHD (quad high definition) - QHD (Quad High Definition) is a resolution standard for high-end monitors, televisions and mobile devices.
  • qHD (quarter high definition) - qHD (quarter high definition) is a resolution standard for mobile devices.
  • QR code (quick response code) - A QR code (quick response code) is a type of 2D bar code that provides easy access to information through a smartphone camera.
  • quantum internet - The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.
  • Quicktime - Quicktime is a multimedia development, storage, and playback technology from Apple.
  • QWERTY keyboard - The QWERTY (pronounced KWEHR-tee) keyboard is the standard typewriter and computer keyboard in countries that use a Latin-based alphabet.
  • QXGA (Quantum Extended Graphics Array) - QXGA (Quantum Extended Graphics Array) is a display mode in which the resolution is 2048 pixels horizontally by 1536 pixels vertically (2048 x 1536).
  • rabbit hole - A rabbit hole, in a metaphorical sense, is a long and winding exploratory path with many connections and offshoots.
  • raster - Also see frame, raster graphics, and raster image processor.
  • raster graphics - Raster graphics are digital images created or captured (for example, by scanning in a photo) as a set of samples of a given space.
  • raster image processor (RIP) - RIP is also an abbreviation for Routing Information Protocol.
  • reach - In Internet marketing, reach is how many different people visit a Web site to see an ad and also what percentage of these people fall into the audience to which an ad is targeted.
  • real-time communications (RTC) - Real-time communications (RTC) is any mode of telecommunications in which all users can exchange information instantly or with negligible latency.
  • real-time location system (RTLS) - A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.
  • Real-time Transport Protocol (RTP) - Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data.
  • reconfigurable tactile display (RTD) - A reconfigurable tactile display (RTD) is a control interface that provides physical touch input, but that can be configured by programming.
  • recycling - Recycling is the practice of reusing items that would otherwise be discarded as waste.
  • redirection - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • Reduce, reuse, recycle (R3) - Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.
  • refresh - In a computer display, to refresh is to redraw the image information from memory.
  • registered port numbers - The registered port numbers are the port numbers that companies and other users register with the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the applications that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • registry - In the Microsoft Windows operating systems beginning with Windows 95, the registry is a single place for keeping such information as what hardware is attached, what system options have been selected, how computer memory is set up, and what application programs are to be present when the operating system is started.
  • Remote Access server role - Remote Access is a server role in Microsoft Windows Server 2012 and Windows Server 2012 R2 and offers administrators a central point for administering, configuring and monitoring factors related to network access.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote desktop protocol (RDP) - Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.
  • Remote Desktop Session Host (RDSH) - Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS).
  • Remote Installation Service (RIS) - Remote Installation Service (RIS) is a feature included in Microsoft's Windows 2000 server that allows network administrators to install the Windows 2000 Professional operating system and its upgrades to any number of client computers at one time from a centralized location.
  • removable media - Removable media is any type of storage device that can be removed from a computer while the system is running.
  • reprographics - Reprographics is a blanket term encompassing multiple methods of reproducing content, such as scanning, photography, xerography and digital printing.
  • Request for Comments (RFC) - RFC is also an abbreviation for Remote Function Call.
  • resolution - In computers, resolution is the number of pixels (individual points of color) contained on a display monitor, expressed in terms of the number of pixels on the horizontal axis and the number on the vertical axis.
  • restore point - A system restore point is a backup copy of important Windows operating system (OS) files and settings that can be used to recover the system to an earlier point of time in the event of system failure or instability.
  • return on marketing investment (ROMI) - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • reverse image search - Reverse image search is a technology that takes an image file as a search engine input query and returns results related to the image.
  • reverse Telnet (direct Telnet) - Reverse Telnet (sometimes called direct Telnet) is the initiation of a Telnet session from a computer system to one of its remote users.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • Rich Text Format (RTF) - Rich Text Format (RTF) is a file format that lets you exchange text files between different word processors in different operating systems.
  • RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
  • ripping (digital extraction) - Ripping, more formally known as digital extraction, is the process of copying audio or video content from a compact disc, DVD or streaming media onto a computer hard drive.
  • Robert Metcalfe - Robert 'Bob' Melancton Metcalfe, born April 7, 1946, is an American engineer, entrepreneur, professor, writer and venture capitalist.
  • robotic personality - Robotic personality is an advanced aspect of artificial intelligence (AI) in which smart machines display idiosyncratic human behavior.
  • ROM emulation - ROM emulation is the process of copying data from a ROM (read-only memory) chip to a storage medium such as a hard disk or flash memory.
  • romance scam - A romance scam is a fraudulent scheme in which a swindler pretends romantic interest in a target, establishes a relationship and then attempts to get money or sensitive information from the target under various false pretenses.
  • room-scale virtual reality (VR) - Room-scale (or roomscale) virtual reality (VR) is the use of clear space to allow movement for someone using a VR application such as a VR game.
  • route summarization (route aggregation) - Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.
  • Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • routing table - A routing table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
  • RPC over HTTP - Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP.
  • RSVP (Resource Reservation Protocol) - RSVP (Resource Reservation Protocol) is a set of communication rules that allows channels or paths on the Internet to be reserved for the multicast (one source to many receivers) transmission of video and other high-bandwidth messages.
  • Ryzen (AMD Ryzen) - Ryzen (pronounced RYE zen) is an AMD CPU aimed at the server, desktop, workstation, media center PC and all-in-one markets.
  • Safari - Safari is Apple's default Web browser for OS X and iOS-based devices.
  • safe mode - Safe mode is an alternate boot method for Windows operating systems that makes it easier to diagnose problems.
  • sample rate - In developing an audio sound for computers or telecommunication, the sample rate is the number of samples of a sound that are taken per second to represent the event digitally.
  • Scalable Vector Graphics (SVG) - Scalable Vector Graphics (SVG) is the description of an image as an application of the Extensible Markup Language (XML).
  • scanner - A scanner is a device that captures images from photographic prints, posters, magazine pages and similar sources for computer editing and display.
  • scareware - Scareware is a type of malware tactic used to manipulate victims into downloading or buying potentially malware-infested software.
  • screen - In a computer display, the screen is the physical surface on which visual information is presented.
  • screen door effect - The screen door effect is a mesh-like appearance that occurs where visible gaps between pixels are seen on an electronic screen, usually when viewed at close proximity.
  • screen name - In a computer network, a screen name is the name a user chooses to use when communicating with others online.
  • screen printing (serigraphy) - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
  • screen shot (screen capture) - A screen shot (sometimes called a screen capture) is an image of a computer desktop that can be saved as a graphics file.
  • script kiddie - Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of internet security weaknesses.
  • scumware - Scumware is any programming that gets on your computer from Internet sites without your consent and often without your knowledge.
  • SD2 (Sound Designer II or SDII) - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
  • SDP (Session Description Protocol) - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • search operator - A search operator (sometimes referred to as a search parameter) is a character or string of characters used in a search engine query to narrow the focus of the search.
  • search string - Search strings are sequences of characters and words used to find files and their content, database information and web pages.
  • seat management - Seat management is a method of coordinating all the workstations in an enterprise network by overseeing the installation, operation, and maintenance of hardware and software at each workstation.
  • Secure Digital Extended Capacity card (SDXC) - A Secure Digital Extended Capacity (SDXC) card is a very small flash memory card that has greater storage capacity than the original SD (Secure Digital) memory cards.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • segment - A segment is a defined portion or section of something larger such as a database, geometric object, or network.
  • Sender Policy Framework (SPF) - Sender Policy Framework (SPF) is a protocol designed to restrict who can use an organization's domain as the source of an email message.
  • sequencer - In digital audio recording, a sequencer is a program in a computer or stand-alone keyboard unit that puts together a sound sequence from a series (or sequence) of Musical Instrument Digital Interface (MIDI) events (operations).
  • Serial ATA (Serial Advanced Technology Attachment or SATA) - Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is transferred between a computer's motherboard and mass storage devices, such as hard disk drives (HDDs), optical drives and solid-state drives (SSDs).
  • serial presence detect (SPD) - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
  • server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
  • SGI (Silicon Graphics) - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
  • shadow banning (shadowban) - Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user.
  • sheet-fed offset printing - Sheet-fed offset printing is a method in which individual pages of paper are fed into the machine.
  • Short Message Service (SMS) - SMS (Short Message Service), commonly referred to as 'text messaging,' is a service for sending short messages of up to 160 characters (224 character limit if using a 5-bit mode) to mobile devices, including cellular phones, smartphones and tablets.
  • short message service center (SMSC) - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
  • signature file - A signature file is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
  • silicon photonics - Silicon photonics is an evolving technology in which data is transferred among computer chips by optical rays.
  • SIMM (single in-line memory module) - A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard.
  • simulator sickness - Simulator sickness is a form of motion sickness related to interacting with a simulated environment.
  • simultaneous localization and mapping - Simultaneous localization and mapping (SLAM) is the synchronous location awareness and recording of the environment in a map of a computer, device, robot, drone or other autonomous vehicle.
  • Siri - Siri is Apple's personal assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).
  • site map - A site map is a visual or textually organized model of a Web site's content that allows the users to navigate through the site to find the information they are looking for, just as a traditional geographical map helps people find places they are looking for in the real world.
  • skeuomorphism - Skeuomorphism is the design concept of making items represented resemble their real-world counterparts.
  • Skype for Business - Skype for Business, formerly known as Microsoft Lync Server, is a unified communications (UC) platform that integrates common channels of business communication and online meetings, including instant messaging (IM), presence, voice over IP (VoIP), video conferencing, file transfer, web conferencing, voicemail and email.
  • slacktivism - Slacktivism is taking action online in ways that involve little personal effort and have little immediate effect; the word is a portmanteau of slacker and activism.
  • sleep mode - Sleep mode, sometimes called standby or suspend mode, is a power-sparing state that a computer can enter when not in use.
  • slideware - Slideware is an overarching term for a presentation program or software that facilitates the creation and implementation of content into the form of a slideshow.
  • slot (or expansion slot) - In computers, a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinholes (typically, in the range of 16 to 64 closely-spaced holes) and a place to fit an expansion card containing the circuitry that provides some specialized capability, such as video acceleration, sound, or disk drive control.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close