Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

EXC - INB

  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC), introduced by Microsoft in 2007, is an administrative tool with a graphical user interface (GUI) that's used to manage the components and resources of Microsoft Exchange Server.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
  • executable file (EXE file) - An executable file (EXE file) is a computer file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • extranet - An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
  • fabric - In information technology, fabric is a synonym for the words framework or platform.
  • Facebook - Facebook is a social networking website that was founded in February 2004 by Harvard University students Chris Hughes, Andrew McCollum, Dustin Moskovitz, Eduardo Saverin and Mark Zuckerberg.
  • Facebook Connect - Facebook Connect is a single sign-on application which allows users to interact on other websites through their Facebook account.
  • Facebook M - Facebook M is the social media company’s personal digital assistant for the Messenger mobile app.
  • Facebook Messenger - Facebook Messenger is a mobile app that enables chat, voice and video communications between Facebook web-based messaging and smartphones.
  • Facebook Mobile - Facebook Mobile is a feature that allows a user to access Facebook from their cell phone through text messages, e-mails, downloaded applications or a web browser.
  • Facebook page - A Facebook page is a public profile specifically created for businesses, brands, celebrities, causes, and other organizations.
  • Facebook status - A Facebook status is a social media update feature that enables users to discuss their thoughts, whereabouts or important information with their friends from their Facebook profile.
  • Facebook wall - A Facebook wall refers to the space on a Facebook user's profile where other users can post messages, pictures, videos and other digital content for their friends or the public to see.
  • FaceTime - FaceTime is a proprietary video and audio calling service developed by Apple Inc.
  • fault tolerance - Fault tolerance is the capability of a system to deliver uninterrupted service despite one or more of its components failing.
  • FDISK - FDISK is a disk utility included in all versions of MS-DOS, Windows and Linux for formatting or partitioning a hard disk drive, or to delete different portions of it.
  • Feature Manipulation Engine (FME) - The Feature Manipulation Engine (FME) is a platform that streamlines the translation of spatial data between geometric and digital formats.
  • Fedora - Fedora, also known as Fedora Linux, is a popular open source Linux-based operating system (OS).
  • Fermi paradox - The Fermi paradox is the apparent conflict between the fact that humans have found no evidence of intelligent extraterrestrial life despite the probablity that it exists, given what we know about the universe.
  • field of view (FOV) - Field of view (FOV) is the open, observable area a person can see through their eyes or via an optical device, such as a camera.
  • File Allocation Table (FAT) - File Allocation Table (FAT) is a file system that Microsoft developed to support small disks and simple folder structures.
  • FileZilla - FileZilla is a free, open source, file transfer protocol (FTP) software tool.
  • filter (computing) - The term filter in computing can mean a variety of things, depending on the technology or technical discipline in question.
  • filter bubble - A filter bubble is an algorithmic bias that skews or limits the information an individual user sees on the internet.
  • Firefox - Firefox is a free, open source web browser developed by the Mozilla Foundation and Mozilla Corporation in 2004.
  • first-person view (FPV) - First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video game, a drone, or a telemedicine client.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • Flat-panel TV Guide - Benefits of flat-panel TVs | Flat-panel features to considerA quick comparison of LCD, LED, OLED and plasma TVsFlat-panel TV technologies: LCD | LED | Plasma | OLEDMore informationA flat-panel TV is a television set that uses one of several different technologies for display in a flat, thin format.
  • font - The word 'font' refers to a set of printable or displayable typography or text characters in a specific style and size.
  • for your information (FYI) - In both chat acronyms and in IT acronyms, FYI is the abbreviation for 'for your information.
  • fourth wall - The fourth wall is a conceptual barrier between those presenting some kind of a communication and those receiving it.
  • FPV drone (first-person view drone) - An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.
  • FQA (frequently questioned answers) - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
  • fractal - Fractals are non-regular geometric shapes that have the same degree of non-regularity on all scales.
  • FTP (File Transfer Protocol) - FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.
  • FUBAR - FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair.
  • fuzzy search - A fuzzy search is a technique that uses search algorithms to find strings that match patterns approximately.
  • gaming - Gaming is playing an electronic video game, which is often done on a dedicated gaming console, PC or smartphone.
  • gaming disorder - Gaming disorder is the obsessive and compulsive overuse of internet games and video games as an escape from life, resulting in the prioritization of gaming over daily activities and interests and the continuation of gaming despite the negative consequences that may occur.
  • general-purpose computer - A general-purpose computer is one that, given the application and required time, should be able to perform the most common computing tasks.
  • Generation Z - Generation Z is the demographic cohort following Generation Y -- which is more popularly known as the Millennial Generation.
  • geo-marketing - Geo-marketing is a tool that uses geographic, or location-based, information to help companies put together marketing strategies and campaigns.
  • glyph - In information technology, a glyph -- from a Greek word meaning carving -- is a graphic symbol that provides the appearance or form for a character.
  • Gmail - Gmail (pronounced Gee-mail) is a free web-based email service that provides users with 15 GB of storage for messages and the ability to search for specific messages.
  • GMPLS (Generalized Multiprotocol Label Switching or Multiprotocol Lambda Switching) - GMPLS (Generalized Multiprotocol Label Switching) is a networking technology that enables fast and reliable network switching of data flows on any type of network infrastructure.
  • GNU GRUB - GNU GRUB (or just GRUB) is a boot loader package that supports multiple operating systems on a computer.
  • Godwin's law - Godwin's law, also known as Godwin's rule of Hitler analogies, is a statement maintaining that if any online discussion continues long enough, someone will almost certainly compare someone else to Hitler.
  • Google Android 4.4 KitKat - Android 4.4 KitKat is a version of Google's operating system (OS) for smartphones and tablets.
  • Google Chrome OS - Google Chrome OS is an open source lightweight operating system (OS).
  • Google Docs - Google Docs, first released in 2006, is a free web-based word processor in which documents can be created, edited and stored as part of the Google Docs Editors suite of free web applications.
  • Google Glass - Google Glass is a wearable, voice- and motion-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user's field of vision.
  • Google Maps - Google Maps is a web-based service that provides detailed information about geographical regions and sites worldwide.
  • Google Street View - Google Street View is a feature of Google Maps that enables users to view and navigate through 360 degree horizontal and 290 degree vertical panoramic street level images of various cities around the world.
  • Google Trends - Google Trends is a free service provided by Google that displays how often specific keywords, subjects and phrases have been searched for on Google over a period of time.
  • Google+ (Google Plus) - Google+ (pronounced Google plus) was a Google social networking platform discontinued for personal use in 2019.
  • GPGPU (general purpose graphics processing unit) - A general-purpose GPU (GPGPU) is a graphics processing unit (GPU) that performs non-specialized calculations that would typically be conducted by the CPU (central processing unit).
  • GPS coordinates - GPS coordinates are a unique identifier of a precise geographic location on the earth, usually expressed in alphanumeric characters.
  • graceful shutdown and hard shutdown - Graceful shutdown and hard shutdown are two opposing methods of turning off a computer.
  • grawlix - A grawlix is a sequence of typographical symbols used to represent a non-specific, profane word or phrase.
  • grayscale - Grayscale is a range of shades of gray without apparent color.
  • green cloud - Green cloud refers to the potential environmental benefits that green IT services delivered over the internet can offer to individual companies and society as a whole.
  • greenhouse gas - A greenhouse gas lets the sun's rays warm the Earth's surface but restricts the heat from escaping into space.
  • greylist (or graylist) - A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam.
  • grid computing - Grid computing is a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.
  • Group Policy - Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers.
  • Group Policy Object (GPO) - Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.
  • GRUB (GRand Unified Bootloader) - GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up.
  • hacktivism - Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason.
  • haptics - Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.
  • hard-drive encryption - Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.
  • HDMI (High-Definition Multimedia Interface) - HDMI (High-Definition Multimedia Interface) is a proprietary specification designed to ensure compatibility between video and audio devices over a single digital interface.
  • HDTV (high-definition television) - HDTV (high-definition television) is a television display technology that provides picture quality similar to 35 mm movies with sound quality similar to that of a compact disc.
  • head tracking - Head tracking is a software application that monitors a user’s head position and orientation.
  • home server - A home server is a computer that functions as a server in a client-server home network.
  • honey monkey - A honey monkey is a virtual computer system that is programmed to lure, detect, identify and neutralize malicious activity on the Internet.
  • host (in computing) - A host is a computer or other device that communicates with other hosts on a network.
  • Host OS (host operating system) - A host OS is the software installed on a computer that interacts with the underlying hardware in a computer using virtualization technology.
  • hosting (website hosting, web hosting and webhosting) - Web hosting -- also known as website hosting or webhosting -- is the process where a web hosting provider stores and maintains website files and applications on a server to make its customers' websites accessible on the internet.
  • hotkey - A hot key is a key or a combination of keys on a computer keyboard that, when pressed at one time, performs a task (such as starting an application) more quickly than performing a task by using a mouse or other input device.
  • HTTP (Hypertext Transfer Protocol) - HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files -- such as text, images, sound, video and other multimedia files -- over the web.
  • Hypertext Transfer Protocol daemon (HTTPD) - On the Web, each server has an HTTPD or Hypertext Transfer Protocol daemon that waits in attendance for requests to come in from the rest of the Web.
  • iBeacon - iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
  • iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
  • icon - In today's age of technological advancement, most people recognize the word 'icon' as referring to a small selectable or nonselectable image representing or leading to something else in a computer's graphical user interface (GUI) or on the web.
  • IDE (Integrated Drive Electronics) - IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.
  • IFTTT (If This Then That) - IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered.
  • ILOVEYOU virus - The ILOVEYOU virus comes in an email with 'ILOVEYOU' in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book.
  • image - An image is a visual representation of something, while a digital image is a binary representation of visual data.
  • image compression - Image compression is a process applied to a graphics file to minimize its size in bytes without degrading image quality below an acceptable threshold.
  • image metadata - Image metadata is text information pertaining to an image file that is embedded into the file or saved to a separate file that is associated with the image file.
  • IMAP (Internet Message Access Protocol) - Internet Message Access Protocol, or IMAP, is a standard email retrieval (incoming) protocol.
  • immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
  • immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.
  • implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
Networking
  • Telnet

    Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based ...

  • big-endian and little-endian

    The term endianness describes the order in which computer memory stores a sequence of bytes.

  • Address Resolution Protocol (ARP)

    Address Resolution Protocol (ARP) is a protocol that maps dynamic IP addresses to permanent physical machine addresses in a local...

Security
  • Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest ...

  • timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about...

  • privileged identity management (PIM)

    Privileged identity management (PIM) is the monitoring and protection of superuser accounts that hold expanded access to an ...

CIO
HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close