Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

TRA - WAT

  • traceroute - Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer.
  • trackball - A trackball is a computer cursor control device used in many notebook and laptop computers.
  • TrackPoint (pointing stick) - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.
  • transparent aluminum - Transparent aluminum is a form of aluminum that is see-through.
  • transparent GIF - A transparent GIF (Graphics Interchange Format) is an image file that has one color assigned to be "transparent" so that the assigned color will be replaced by the browser's background color, whatever it may be.
  • tree network - In telecommunication networks, a tree network is a combination of two or more star networks connected together.
  • Trivial File Transfer Protocol (TFTP) - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.
  • true color - True color is the specification of the color of a pixel on a display screen using a 24-bit value, which allows the possibility of up to 16,777,216 possible colors.
  • TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.
  • Tumblr - Tumblr is a free microblogging site.
  • TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).
  • TWAIN - TWAIN is a widely-used program that lets you scan an image (using a scanner) directly into the application (such as PhotoShop) where you want to work with the image.
  • tweet - A tweet is a post on Twitter.
  • Twitter - Twitter is a free social networking site where users broadcast short posts known as tweets.
  • Twitter essay - A Twitter essay is content supporting a particular thesis or viewpoint that is written through sequential and usually numbered tweets.
  • Twitterbot - A Twitterbot (sometimes spelled "Twitter bot") is a software program that posts automated tweets on Twitter.
  • two-spindle system (twin-spindle system) - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • typeface - A typeface is a design for a set of printer or display font s, each for a set of characters, in a number of specific sizes.
  • U (measurement) - A U is a standard unit of measure for designating the height in computer enclosures and server rack cabinets.
  • UART (Universal Asynchronous Receiver/Transmitter) - A UART (Universal Asynchronous Receiver/Transmitter) is the microchip with programming that controls a computer's interface to its attached serial devices.
  • UDDI (Universal Description, Discovery, and Integration) - UDDI (Universal Description, Discovery, and Integration) is an XML-based registry for businesses worldwide to list themselves on the Internet.
  • Ultra High-Definition TV (UHDTV) - Ultra-high-definition (UHD) television, also abbreviated UHDTV, is a digital television display format in which the horizontal screen resolution is on the order of 4000 pixels (4K UHD) or 8000 pixels (8K UHD).
  • ultra-mobile personal computer (UMPC or Ultra-mobile PC) - Ultra-mobile PC (UMPC) is a design specification for a hand-held computer that is larger than a PDA but smaller than a laptop.
  • ultrabook - An ultrabook is a category of thin and light laptop computers designed to bridge the market gap between tablets and premium notebook PCs.
  • uncanny valley - The uncanny valley is a common unsettling feeling people experience where androids (humanoid robots) and audio/visual simulations closely resemble humans in many respects but are not quite realistic.
  • unified communications (UC) - Unified communications (UC) is an umbrella term for the integration of multiple enterprise communication tools -- such as voice calling, video conferencing, instant messaging (IM), presence, content sharing, etc.
  • Unified Extensible Firmware Interface (UEFI) - Unified Extensible Firmware Interface, or UEFI, specifies how a software program connects a computer's firmware to its operating system and attached computing hardware.
  • Uniform Resource Identifier (URI) - A Uniform Resource Identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.
  • uninterruptible power supply (UPS) - An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time when incoming power is interrupted.
  • unique user - In Web marketing, a unique user is, for a specified period of time such as a day or month, an individual that has visited a Web site or received specific content, such as ads, e-mail, or newsletters.
  • Universal Naming Convention (UNC) - In a network, the Universal Naming Convention (UNC) is a way to identify a shared file in a computer without having to specify (or know) the storage device it is on.
  • Universal Plug and Play (UPnP) - Universal Plug and Play (UPnP) is a standard that uses Internet and Web protocols to enable devices such as PCs, peripherals, intelligent appliances, and wireless devices to be plugged into a network and automatically know about each other.
  • upcycling - Upcycling is the practice of creating a useable product from waste or unwanted items or adapting an existing product in some way to add value.
  • upgrade - In computers, an upgrade is a new version of or addition to a hardware or, more often, software product that is already installed or in use.
  • uploading - Uploading is the transmission of a file from one computer system to another, usually larger computer system.
  • URL (Uniform Resource Locator) - A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the Internet.
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • URN (Uniform Resource Name) - A URN (Uniform Resource Name) is an Internet resource with a name that, unlike a URL, has persistent significance - that is, the owner of the URN can expect that someone else (or a program) will always be able to find the resource.
  • usability - Also see human-computer interaction and graphical user interface.
  • USB 3.0 (SuperSpeed USB) - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • USB-C (USB Type C) - USB-C is a connection type standard designed to replace all USB types on the computer and device ends of future USB with a single reversible connector.
  • User Datagram Protocol (UDP) - User Datagram Protocol (UDP) is a communications protocol that is primarily used to establish low-latency and loss-tolerating connections between applications on the internet.
  • user environment management (UEM) - User environment management is a technology designed to allow IT to oversee a user's complete desktop experience, including the profile, any policies IT applies and customizations the user makes.
  • user installed application (UIA) - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
  • User Principal Name (UPN) - In the Windows operating system's Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format.
  • user session (visit) - In tabulating statistics for Web site usage, a user session (sometime referred to as a visit) is the presence of a user with a specific IP address who has not visited the site recently (typically, anytime within the past 30 minutes).
  • user-generated content (UGC) - User-generated content (UGC) is the words and photos that unpaid contributors create and provide to publications, particularly Web properties.
  • Ustream - Ustream is an online video service provider that enables anybody with a camera and Internet connection to conduct a live interactive video broadcast to a global audience from anywhere in the world.
  • UTF-16 (16- bit Unicode Transformation Format) - UTF-16 (16- bit Unicode Transformation Format) is a standard method of encoding Unicode character data.
  • Uuencode (Uuencode/Uudecode) - Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network.
  • UXGA (Ultra Extended Graphics Array) - UXGA (Ultra Extended Graphics Array) is a display modein which the resolutionis 1600 pixels horizontally by 1200 pixels vertically (1600 x 1200).
  • VCR (videocassette recorder) - A VCR (videocassette recorder) is an electromechanical device for recording and playing back full-motion audio-visual programming on cassettes containing magnetic tape.
  • vector - A vector is a quantity or phenomenon that has two independent properties: magnitude and direction.
  • vector graphics - Vector graphics are computer images created through a sequence of commands or mathematical statements that place lines and shapes in a two-dimensional or three-dimensional space.
  • vertical interval time code (VITC) - Vertical interval time code (abbreviated VITC and sometimes pronounced VIHT-see) is a timing signal that is part of a video recording.
  • VHS (Video Home System) - VHS (Video Home System) is a widely-adopted videocassette recording (VCR) technology that was developed by Japan Victor Company (JVC) and put on the market in 1976.
  • Viber - Viber is a VoIP and instant messaging application with cross-platform capabilities that allows users to exchange audio and video calls, stickers, group chats, and instant voice and video messages.
  • video display unit (VDU) - A video display unit (VDU) consists of:A computer output device that uses a cathode ray tube or other technology to present visual imagesOne or more input devices, such as a keyboard, a mouse, or both.
  • video game design - Video game design is the process of conceiving, planning and directing the creation of a video game.
  • video projector - A video projector is an electronic device that takes input audio/visual signals and outputs video onto any flat surface.
  • video resume - A video resume is a brief account of a job applicant's professional experience, qualifications and interests, submitted to a prospective employer in video form.
  • video streaming service - A video streaming service is an on demand online entertainment source for TV shows, movies and other streaming media.
  • video wall - A video wall is a large display consisting of more than one video screen fixed together to form a single logical screen.
  • videogrammetry - Videogrammetry is the extraction of an object’s measurements from a video; measurements may be gathered from multiple angles or multiple videos.
  • Vimeo - Vimeo is a U.
  • Vint Cerf (Vinton Gray Cerf) - Vint Cerf (Vinton Gray Cerf) is an American computer scientist best known as an Internet pioneer.
  • virtual asset - A virtual asset is a representation of currency in some environment or situation, such as a video game or a financial trading simulation exercise.
  • virtual assistant (AI assistant) - A virtual assistant is an application program that can understand natural human language, speak natural language and complete electronic tasks for the end user.
  • virtual classroom - A virtual classroom is an online learning environment.
  • virtual community - A virtual community is a community of people sharing common interests, ideas, and feelings over the Internet or other collaborative networks.
  • virtual embodiment - Virtual embodiment is the perception of sensory feedback related to an individual’s virtual, non- physical body (also known as an avatar) and the effect it has on the individual’s cognition.
  • virtual hosting - On the Internet, virtual hosting is the provision of Web server hosting services so that a company (or individual) doesn't have to purchase and maintain its own Web server and connections to the Internet.
  • virtual keyboard - A virtual keyboard is a computer keyboard that a user operates by typing on or within a wireless- or optical-detectable surface or area rather than by depressing physical keys.
  • virtual presence - Virtual presence is the ability of a user to feel that they are actually in a virtual location such as a web site or an immersive simulation using technologies like virtual reality (VR) or augmented reality (AR).
  • virtual reality cloud (VR cloud) - Virtual reality cloud is the application of cloud computing to create VR environments and experiences.
  • virtual reality gaming (VR gaming) - At its simplest, a VR game might involve a 3-D image that can be explored interactively on a computing device by manipulating keys, mouse or touchscreen.
  • virtual reality therapy (VR therapy) - Virtual reality therapy (VR therapy) is the use of simulated interactive and immersive environments as a tool for physical or psychological healthcare applications.
  • virtuality continuum - The virtuality continuum is the range of technologies integrating digital content into the user’s physical reality.
  • vishing (voice or VoIP phishing) - Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked over the phone into revealing critical financial or personal information to unauthorized entities.
  • vision-correcting display - A vision-correcting display distorts the images on users' screens according to algorithms based on their prescriptions for eyeglasses.
  • visitor-based networking (visitor-based network) - Visitor-based networking (VBN) is a computer network with high-speed internet access provided by an organization for temporary use by visitors, guests or other users in a public area.
  • VKontakte (VK) - VKontakte (VK) is Europe's largest social networking website, with more than 100 million users.
  • vocoder - A vocoder is an audio processor that captures the characteristic elements of an an audio signal and then uses this characteristic signal to affect other audio signals.
  • voice over LTE (VoLTE) - Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice-to-text - Voice-to-text is a type of speech recognition program that converts spoken to written language.
  • voicemail - Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • voxel - A voxel is a unit of graphic information that defines a point in three-dimensional space.
  • VR headset (virtual reality headset) - A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV).
  • VR locomotion (virtual reality locomotion) - VR locomotion is technology that enables movement from one place to another (locomotion) within a virtual reality environment.
  • VR room (virtual reality room) - Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience.
  • WAIS (Wide Area Information Servers) - WAIS (Wide Area Information Servers) is an Internet system in which specialized subject databases are created at multiple server locations, kept track of by a directory of servers at one location, and made accessible for searching by users with WAIS client programs.
  • walled garden - On the internet, a walled garden is an environment that controls the user's access to network-based content and services.
  • wallet - A wallet is a small software program used for online purchase transactions.
  • WAN (wide area network) - A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).
  • war driving (access point mapping) - War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.
  • warez - Warez (pronounced as though spelled "wares" or possibly by some pronounced like the city of "Juarez") is a term used by software "pirates" to describe software that has been stripped of its copy-protection and made available on the Internet for downloading.
  • watchdog timer (WDT) - A watchdog timer (WDT) is a device or electronic card that performs a specific operation after a certain period of time if something goes wrong with an electronic system and the system does not recover on its own.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close