Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

CLU - DIS

  • cluster - In a computer system, a cluster is a group of servers and other resources that act like a single system and enable high availability and, in some cases, load balancing and parallel processing.
  • cluster computing - In computers, clustering is the use of multiple computers, typically PCs or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single highly available system.
  • CMOS sensor - A CMOS sensor is an electronic chip that converts photons to electrons.
  • CMYK (cyan, magenta, yellow, key) - CMYK is a scheme for combining primary pigments.
  • cold/warm/hot server - In the backup and recovery of a computer server, a cold server is a backup server whose purpose is solely to be there in case the main server is lost.
  • colored coin - A colored coin is a denomination of a cryptocurrency, often Bitcoin, that is repurposed by marking it with metadata.
  • com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
  • command prompt - A command prompt is the input field in a text-based user interface screen for an operating system (OS) or program.
  • commercial electronic message (CEM) - A commercial electronic message (CEM) is a communication soliciting business, funding or support for something that is sent through any electronic channel, including email, social media, voicemail, text and instant messages.
  • commodity - A commodity is a type of widely-available product that is not markedly dissimilar from one unit to another.
  • commodity computer - A commodity computer is a standard-issue PC that is widely available for purchase.
  • commodity hardware - Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
  • common gateway interface (CGI) - Also see FastCGI.
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • common short code (CSC) - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • compatibility - Compatibility is the capacity for two systems to work together without having to be altered to do so.
  • compositing - Compositing used to create layered images and video in advertisements, memes and other content for print publications, websites and apps.
  • computational photography - Computational photography is the use of computer processing capabilities in cameras to produce an enhanced image beyond what the lens and sensor pics up in a single shot.
  • Computer History Museum - The Computer History Museum is an institution dedicated to the preservation of artifacts and information related to the development of computers.
  • computer-intensive - Computer-intensive is a term that applies to any computing application that requires the resources of a lot of computers, such as grid computing.
  • configuration profile (CP) - A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device.
  • connectionless - In telecommunications, connectionless describes communication between two network endpoints in which a message can be sent from one endpoint to another without prior arrangement.
  • consumerism - Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.
  • content - Many people agree that on the World Wide Web, "content is King.
  • context awareness - Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly.
  • contextual computing - Contextual computing, also called context-aware computing, is the use of software and hardware to automatically collect and analyze data about a device's surroundings in order to present relevant, actionable information to the end user.
  • cooperative games - Cooperative games are games where players work with one and other in order to achieve a common objective.
  • COPE (corporate-owned, personally enabled) - COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.
  • cord cutting - Cord cutting, in a telecommunications context, is the practice of stopping a cable or  satellite television service in favor of less expensive options, or getting rid of your landline phone and relying solely on cellular or VoIP (voice over IP) service.
  • corporate email policy - A corporate email policy is a form of management that outlines how employees can use email and other electronic communication tools, such as instant messaging, in a corporate environment.
  • corportal (corporate portal) - Corportals, short for corporate portals, are sometimes referred to as enterprise information portals and are used by corporations to build their internal web presence by leveraging a company's information resources.
  • coworking - Coworking is a business services provision model that involves individuals working independently or collaboratively in shared office space.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • CPI - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • creative destruction - Creative destruction is a process through which something new brings about the demise of whatever existed before it.
  • crossfade - In digital audio production, a crossfade is editing that makes a smooth transition between two audio files.
  • crowdfunding - Crowdfunding is a financing method that involves soliciting relatively modest contributions from a group of individuals.
  • crowdsourcing - Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.
  • cryptocurrency - Cryptocurrency is a digital form of currency that uses cryptography to secure the processes involved in generating units, conducting transactions and verifying the exchange of currency ownership.
  • CSS (cascading style sheets) - This definition explains the meaning of cascading style sheets (CSS) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
  • Ctrl-Alt-Delete - On a personal computer with the Microsoft Windows operating system, Control+Alt+Delete is the combination of the Ctrl key, the Alt key, and Del key that a user can press at the same time to terminate an application task or to reboot the operating system.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • cutover migration - The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch.
  • cyber - Cyber is a prefix used to describe a person, thing, or idea as part of the computer and information age.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • cybercitizen - The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity.
  • cybernetics - Cybernetics is a word coined by group of scientists led by Norbert Wiener and made popular by Wiener's book of 1948, Cybernetics or Control and Communication in the Animal and the Machine.
  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • cyberpunk - Cyberpunk is a sensibility or belief that a few outsiders, armed with their own individuality and technological capability, can fend off the tendencies of traditional institutions to use technology to control society.
  • cyberspace - Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
  • cyberstalking - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
  • cyberterrorism - Cyberterrorism is often defined as any premeditated, politically motivated attack against information systems, programs and data that threatens violence or results in violence.
  • cyborg anthropologist - A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.
  • D - D is one of two programming languages, Digital Mars D, an object-oriented metaprogramming language, or Microsoft D, a key component of the upcoming Oslo development environment.
  • D-channel - In the Integrated Services Digital Network (ISDN), the D-channel is the channel that carries control and signalling information.
  • daemon - A daemon (pronounced DEE-muhn) is a program that runs continuously and exists for the purpose of handling periodic service requests that a computer system expects to receive.
  • dark mode - Dark mode is a color scheme change for user interfaces (UI) on webpages, apps and programs that displays light text on a dark background for easier viewing.
  • dark web (darknet) - The dark web, also referred to as the darknet, is an encrypted portion of the internet that is not indexed by search engines and requires specific configuration or authorization to access.
  • data cap (broadband cap) - A data cap is a specific amount of mobile data that a user account can access for a given amount of money, usually specified per month.
  • data glove - A data glove is an interactive device, resembling a glove worn on the hand, which facilitates tactile sensing and fine-motion control in robotics and virtual reality.
  • data plan (mobile data plan) - Since the advent of the smartphone made mobile Internet possible, most carriers offer data plans at varying rates based on the amount of data transfer allowed before a data cap is imposed.
  • data source name (DSN) - A data source name (DSN) is a data structure that contains the information about a specific database that an Open Database Connectivity (ODBC) driver needs in order to connect to it.
  • database availability group (DAG) - A database availability group (DAG) is a high availability (HA) and data recovery feature of Exchange Server 2010.
  • DCE (Distributed Computing Environment) - In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers.
  • DCPromo (Domain Controller Promoter) - DCPromo (Domain Controller Promoter) is a tool in Active Directory that installs and removes Active Directory Domain Services and promotes domain controllers.
  • dead pixel - A dead pixel is a picture element in which all three RGB sub-pixels are permanently turned off, which creates a black spot in the display.
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • DECT (Digital Enhanced Cordless Telecommunications) - Unlike the analog cordless phones you may have in your home, DECT (Digital Enhanced Cordless Telecommunications) is a digital wireless telephone technology that is expected to make cordless phones much more common in both businesses and homes in the future.
  • deep link - A deep link is a hypertext link to a page on a Web site other than its home page.
  • deep web - The deep web is an umbrella term for parts of the internet not fully accessible through standard search engines like Google, Bing and Yahoo.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop publishing (DTP) - Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.
  • device as a service (DaaS) - The device as a service (DaaS) model offers PCs, smartphones and other mobile computing devices as a paid service.
  • device-agnostic (device agnosticism) - Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • Digg - Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like.
  • digiboard (or digicard) - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digital body language (DBL) - Digital body language (DBL) is the aggregate of an individual’s online activity – including his or her email use, web visits, searches, referrals from social media sites and webinar attendance.
  • digital citizenship - Digital citizenship is the online presence, behaviors and response to others within a digital community where one is a member.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital footprint - A digital footprint, sometimes called a digital dossier, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual.
  • digital footprint management (DFM) - Digital footprint management (DFM) is an approach to controlling the amount and types of electronic data existing about a particular individual that can in some way be traced back to them.
  • digital native - A digital native is a person who grew up with the presence of digital technology or in the information age.
  • digital projector (digital projection display system) - A digital projector, also called a digital projection display system, is a specialized computer display that projects an enlarged image on a movie screen.
  • digital self-harm - Digital self-harm is targeting oneself with negative content online.
  • digital tattoo - With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip.
  • digital television (DTV) - Digital television (DTV) is the transmission of television signals using digital rather than conventional analog methods.
  • digital wallet - A digital wallet is a software application that serves as an electronic version of a physical wallet, digitizing credit and debit card information to enable consumers to make purchases from their smartphones.
  • digital wallet security - Digital wallets are used for transactions involving both conventional and digital currencies, but because the latter work differently, they require different safeguards – or at least variations on traditional security measures.
  • digitization - Digitization is the process of converting information into a digital format.
  • digitizer tablet (digitizer or graphics tablet) - A digitizer tablet (also known as a digitizer or graphics tablet) is a tool used to convert hand-drawn images into a format suitable for computer processing.
  • direct digital marketing (DDM) - Direct digital marketing (DDM) is the electronic delivery of relevant communications to specific recipients.
  • direct email marketing - Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of recipients.
  • Direct Memory Access (DMA) - Direct Memory Access (DMA) is a capability provided by some computer bus architectures that allows data to be sent directly from an attached device (such as a disk drive) to the memory on the computer's motherboard.
  • DirSync (Windows Azure Active Directory Sync) - DirSync (Directory Synchronization) is a tool for making copies of a local directory in a hybrid cloud deployment of Microsoft Exchange.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close