Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

SMA - TRA

  • smart lock - A smart lock is an electronic and mechanical locking device that opens wirelessly with an authorized users’ authentication.
  • smart speaker - A smart speaker is a wireless and smart audio playback device that uses several types of connectivity for additional functions.
  • smart TV - A smart TV is a digital television that is, essentially, an Internet-connected, storage-aware computer specialized for entertainment.
  • smart wristwatch - A smart wristwatch is a wristwatch that not only tells time but, using a wireless connection to an information source, can show you the news, stock, sports scores, or weather; remind you of meetings on your Outlook calendar; provide instant messaging input from others; and update the time when you move to another time zone.
  • smartphone addiction (cell phone addiction) - Smartphone addiction is a disorder involving compulsive overuse of mobile devices, usually quantified as the number of times users access their devices and/or the total amount of time they are online over a specified period.
  • smartphone sensor - A smartphone sensor is any one of a number of different types of sensing devices installed on a user's phone to gather data for various user purposes, often in conjunction with a mobile app.
  • smartwatch - A smartwatch is a wearable computing device that closely resembles a wristwatch or other time-keeping device.
  • SMF (Standard MIDI File) - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
  • smiley - In Internet e-mail messages and Web discussions, a smiley is a sequence of typed characters that graphically produces the sideways image of someone smiling, like this::-)The first use of a smiley is currently attributed to Scott E.
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • SMTP (Simple Mail Transfer Protocol) - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
  • Snapchat dysmorphia - Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image.
  • social comparison - Social comparison can lead to issues caused by the fear of missing out (FOMO), including anxiety, depression and a lack of self-esteem.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social contract - A social contract is an agreement to adhere to acceptable behaviors and meet obligations in a particular environment, such as a nation, a business or a social media site.
  • social CRM - Social CRM, or social relationship management, is customer relationship management and engagement fostered by communication with customers through social networking sites, such as Twitter and Facebook.
  • social curation - Social curation is collaborative sharing of Web content organized around one or more particular themes or topics.
  • social media - Social media is a collective term for websites and applications that focus on communication, community-based input, interaction, content-sharing and collaboration.
  • social media manager - A social media manager is the individual in an organization trusted with monitoring, contributing to, filtering, measuring and otherwise guiding the social media presence of a brand, product, individual or corporation.
  • social networking - Social networking is the practice of using a dedicated online platform to maintain contacts, interact and collaborate with like-minded individuals, peers, friends and family.
  • social search engine - A social search engine is an enhanced version of a search engine that combines traditional algorithm -driven technology with online community filtering to produce highly personalized results.
  • socialbot - A socialbot is a software program that simulates human behavior in automated interactions on social network sites such as Facebook and Twitter.
  • sock puppet - A sock puppet, in the context of online communications, is a fake identity created to promote someone or something through blogs, wikis, forums or social networking sites such as Facebook or Twitter.
  • sock puppet marketing - Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service.
  • socks - Socks (or "SOCKS") is a protocol that a proxy server can use to accept requests from client users in a company's network so that it can forward them across the Internet.
  • SODOTO (See One, Do One, Teach One) - SODOTO (See One, Do One, Teach One) is a methodology of teaching and learning skills and best practices through direct observation of a task, hands-on practical experience performing the task and teaching the task to another person.
  • soft copy - A soft copy (sometimes spelled "softcopy") is an electronic copy of some type of data, such as a file viewed on a computer's display or transmitted as an e-mail attachment.
  • soft reset - A soft reset is a restart of a device, such as a smartphone, tablet, laptop or personal computer (PC).
  • softlifting - Softlifting is a common type of software piracy in which a legally licensed software program is installed or copied in violation of its licensing agreement.
  • software agent - A software agent is a persistent, goal-oriented computer program that reacts to its environment and runs without continuous direct supervision to perform some function for an end user or another program.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • solar power - Solar power is the use of the sun’s energy either thermally or through the use of photovoltaic cells in solar panels and transparent photovoltaic glass to generate electricity.
  • solar-powered laptop - A solar-powered laptop is a notebook computer that uses built-in photo voltaic solar panels to run and recharge its battery.
  • sound card - A sound card (also referred to as an audio card) is a peripheral device that attaches to the ISA or PCI slot on a motherboard to enable the computer to input, process, and deliver sound.
  • Southbridge - Southbridge is an Intel chipset that manages the basic forms of input/output (I/O) such as Universal Serial Bus (USB), serial, audio, Integrated Drive Electronics (IDE), and Industry Standard Architecture (ISA) I/O in a computer.
  • spam confidence level (SCL) - Spam confidence level (SCL) is a numerical value indicating the likelihood that an incoming email message is spam.
  • spam filter - A spam filter is a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user's inbox.
  • spam trap - A spam trap is an email address that is used to identify and monitor spam email.
  • spambot - A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.
  • spatial sensing - Spatial sensing is the detection, measuring and analysis of an environment's space and objects in real-time for the purposes of mapping them.
  • spear phishing - Spear phishing is a malicious email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • spider - A spider is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • spim (instant messaging spam) - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • SPIT (spam over Internet telephony) - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • spline - In computer graphics, a spline is a curve that connects two or more specific points, or that is defined by two or more points.
  • spoliation - Spoliation is the destruction, alteration, or mutilation of evidence that may pertain to legal action.
  • spool (simultaneous peripheral operations online) - To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document).
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • stablecoin - Stablecoin is a fixed-price cryptocurrency whose market value is attached to another stable asset.
  • stack - TCP/IP is frequently referred to as a "stack.
  • standard definition television (SDTV) - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
  • standby power - Standby power is electrical power that a device consumes when not in present use, but plugged in to a source of power and ready to be used.
  • start of authority record - A start of authority (SOA) record is information stored in a domain name system (DNS) zone about that zone and about other DNS records.
  • stateful inspection - Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.
  • static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • steampunk - Steampunk is a design style inspired by Victorian-era industrialism.
  • stop word - In computer search engines, a stop word is a commonly used word (such as "the") that a search engine has been programmed to ignore, both when indexing entries for searching and when retrieving them as the result of a search query.
  • Stream Control Transmission Protocol (SCTP) - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • streaming media - Streaming media is video or audio content sent in compressed form over the Internet and played immediately, rather than being saved to the hard drive.
  • streaming media receiver - A streaming media receiver is a set top box that connects to a television to play content from one or more video streaming services.
  • style sheet - A term extended from print publishing to online media, a style sheet is a definition of a document's appearance in terms of such elements as: The default typeface, size, and color for headings and body text How front matter (preface, figure list, title page, and so forth) should look How all or individual sections should be laid out in terms of space (for example, two newspaper columns, one column with headings having hanging heads, and so forth).
  • subscription economy - A subscription economy is a model for trade of desired content, products and services in exchange for recurring, scheduled payments.
  • substrate - A substrate is a solid substance or medium to which another substance is applied and to which that second substance adheres.
  • Subversion - Subversion is a version control system that keeps track of changes made to files and folders (directories), facilitating data recovery and providing a history of the changes that have been made over time.
  • Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • Surface (Microsoft Surface tablet) - Surface is a line of tablet computers from Microsoft.
  • swirl - .
  • SYN flood attack - A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.
  • T1 (T-1) - Also see the T-carrier system, of which the T1 is a part.
  • tablet (tablet PC) - A tablet is a wireless, portable personal computer with a touchscreen interface.
  • take-down request - A take-down request, also called a notice and take down request, is a procedure for asking an Internet Service Provider (ISP) or search engine to remove or disable access to illegal, irrelevant or outdated information.
  • TAPI (Telephony Application Program Interface) - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.
  • TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.
  • technology addiction (internet addiction) - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • TED - The TED (technology, entertainment, design) conference is an annual gathering for presentations known as TED talks on a broad range of topics related to science and culture.
  • TED talk - A TED talk is a recorded public-speaking presentation that was originally given at the main TED (technology, entertainment and design) annual event or one of its many satellite events around the world.
  • telegraph - A telegraph is a communication system that sends information by making and breaking an electrical connection.
  • teletypewriter (TTY) - A teletypewriter (TTY) is an input device that allows alphanumeric character to be typed in and sent, usually one at a time as they are typed, to a computer or a printer.
  • terminal emulation - Terminal emulation is the ability to make one computer terminal, typically a PC, appear to look like another, usually older type of terminal so that a user can access programs originally written to communicate with the other terminal type.
  • texel (texture element) - In computer graphics, a texel (texture element) represents the smallest graphical element in two-dimensional (2-D) texture mapping to "wallpaper" the rendition of a three-dimensional (3-D) object to create the impression of a textured surface.
  • Text message abbreviations and acronyms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • text messaging (texting or wireless messaging) - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • texture mapping - Texture mapping is a graphic design process in which a two-dimensional (2-D) surface, called a texture map, is "wrapped around" a three-dimensional (3-D)object.
  • thermal transfer printer - A thermal transfer printer is a non-impact printer that uses heat to register an impression on paper.
  • thick client (fat client) - A thick client (sometimes called a fat client) is a form of client-server architecture.
  • thin client (lean client) - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stores on a central server instead of a computer's resources.
  • thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  • third-party cookie - A third-party cookie is a cookie that is placed on a user's hard disk by a website from a domain other than the one a user is visiting.
  • thumbnail - A thumbnail is a small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images.
  • Thunderbolt - Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).
  • TIFF (Tag Image File Format) - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.
  • time bank - A time bank is a reciprocity-based work trading system in which hours are the currency.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • tl;dr (TL;DR) - TL;DR is an abbreviation for "too long; didn't read" that is used to indicate that the person posting about an article either didn't read it in its entirety or didn't read it at all.
  • ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.
  • Tomcat - Tomcat is an application server from the Apache Software Foundation that executes Java servlets and renders Web pages that include Java Server Page coding.
  • Top 10 spyware threats - The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool.
  • Tor browser - The Tor (the onion routing) browser is a web browser designed for anonymous web surfing and protection against traffic analysis.
  • torque - Torque is a twisting or turning force that tends to cause rotation around an axis; it can also be thought of as the ability of something that is rotating, such as a gear or a shaft, to overcome turning resistance.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close