Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

DYN - FRE

  • dynamic IP address - A dynamic IP address is a temporary address for devices connected to a network that will continually change over time.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • dynamic range - Dynamic range describes the ratio of the softest sound to the loudest sound in a musical instrument or piece of electronic equipment.
  • e-commerce hosting - E-commerce hosting is a business in which a company provides other companies whatever they need to sell their products and services on the World Wide Web - including a Web server to serve a company's pages, possibly the Web site design (including catalog pages), and the special capabilities needed to accept, process, and confirm sales orders.
  • e-cycling - E-cycling is the practice of reusing, or distributing for reuse, electronic equipment and components rather than discarding them at the end of their life cycle.
  • e-form (electronic form) - An e-form (electronic form) is a computer program version of a paper form.
  • e-mail reflector - An e-mail reflector is a program that acts as the forwarding broadcaster of e-mail messages to the names on a distribution list.
  • e-paper (radio paper or electronic paper) - E-paper (sometimes called radio paper or just electronic paper) is a portable, reusable storage and display medium that looks like paper but can be repeatedly written on (refreshed) - by electronic means - thousands or millions of times.
  • e-procurement (supplier exchange) - Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.
  • e-waste - E-waste is any refuse created by discarded electronic devices and components as well as substances involved in their manufacture or use.
  • E.164 - E.164 is an international numbering plan for public telephone systems in which each assigned number contains a country code (CC), a national destination code (NDC), and a subscriber number (SN).
  • eavesdropping - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  • eBook - An eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader.
  • Echo Show - The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant.
  • edge transport server - Edge transport server is an Exchange Server 2010 role that helps route Internet email as well as protect the Exchange organization from viruses and spam.
  • EEPROM (electrically erasable programmable read-only memory) - EEPROM (electrically erasable programmable read-only memory) is a user-modifiable ROM.
  • electronic ink - Electronic ink is a liquid substance, in development at MIT's Media Lab in partnership with a company called E Ink, that responds to electrical impulses to enable changeable text and image displays on a flexible surface.
  • electronic paper display (EPD) - An electronic paper display (EPD) is an electrically-charged surface that replicates the look and experience of ink on paper.
  • email - Email (electronic mail) is the exchange of computer-stored messages by telecommunication.
  • email archiving - Email archiving is a systematic approach to saving and protecting the data contained in emails to enable fast retrieval.
  • email governance - Email governance is a way for organizations to manage and monitor email in a corporate setting.
  • email management - Email management is a systematic approach to maximizing the efficiency of email practices and minimizing the negative effects that email handling can have on an individual's productivity and job satisfaction.
  • email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
  • email spam - Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.
  • email virus - An email virus consists of malicious code distributed in email messages to infect one or more devices.
  • EMF (Enhanced MetaFile) - EMF (Enhanced MetaFile) and raw are terms for spool file formats used in printing by the Windows operating system.
  • emoji - An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications.
  • emoticon - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • enhancement - In an information technology product, an enhancement is a noteworthy improvement to the product as part of a new version of it.
  • enterprise file sync and share (EFSS) - Enterprise file sync and share (EFSS) is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.
  • entity tag (ETag) - ETags use persistent identification elements (PIE) that have been tagged to the user’s browser.
  • EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) - EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) is a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods.
  • ESMTP (Extended Simple Mail Transfer Protocol) - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • evil twin attack - An evil twin attack is a rogue Wi-Fi access point (AP) that masquerades as a legitimate one, enabling an attacker to gain access to sensitive information without the end user's knowledge.
  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC), introduced by Microsoft in 2007, is an administrative tool with a graphical user interface (GUI) that's used to manage the components and resources of Microsoft Exchange Server.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • Exchange Remote Connectivity Analyzer (ExRCA) - The Exchange Remote Connectivity Analyzer (ExRCA) is a Web-based tool that helps Exchange administrators identify and troubleshoot connectivity issues in their deployments.
  • Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
  • Exchange transaction log - In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.
  • Exchange Web Services (EWS) - Exchange Web Services (EWS) is an application program interface (API) that allows programmers to access Exchange items such as calendars, contacts and email in Exchange Server 2007 and higher.
  • executable file (EXE file) - An executable file (EXE file) is a computer file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • extended memory - Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • extranet - An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
  • ezine (electronic magazine) - The term ezine is short for "electronic magazine.
  • fabric - In information technology, fabric is a synonym for the words framework or platform.
  • Facebook - Facebook is a social networking website that was founded in February 2004 by Harvard University students Chris Hughes, Andrew McCollum, Dustin Moskovitz, Eduardo Saverin and Mark Zuckerberg.
  • Facebook Connect - Facebook Connect is a single sign-on application which allows users to interact on other websites through their Facebook account.
  • Facebook Insights - Facebook Insights is Facebook's version of web page analysis, which allows a user to keep track of information such as page views, unique views, fan statistics, wall posts, video and audio plays, photo views, and so on.
  • Facebook M - Facebook M is the social media company’s personal digital assistant for the Messenger mobile app.
  • Facebook Messenger - Facebook Messenger is a mobile app that enables chat, voice and video communications between Facebook web-based messaging and smartphones.
  • Facebook Mobile - Facebook Mobile is a feature that allows a user to access Facebook from their cell phone through text messages, e-mails, downloaded applications or a web browser.
  • Facebook page - A Facebook page is a public profile specifically created for businesses, brands, celebrities, causes, and other organizations.
  • Facebook status - A Facebook status is a social media update feature that enables users to discuss their thoughts, whereabouts or important information with their friends from their Facebook profile.
  • Facebook wall - A Facebook wall is the area on a profile or page where friends and fans can post their thoughts, views, or criticisms for everyone to see.
  • FaceTime - FaceTime is an Apple video telephony application that allows users to make a video call over the internet with a forward-facing camera on iOS and macOS devices.
  • Fairphone - Insofar as possible, Fairphone is made from recycled, recyclable and responsibly-sourced goods as well as minimal packaging.
  • Family Link - Family Link is the parental control app for Android devices.
  • fast retransmit and recovery (FRR) - In TCP/IP, fast retransmit and recovery (FRR) is a congestion control algorithm that makes it possible to quickly recover lost data packets.
  • fault-tolerant - Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, despite one or more of its components failing.
  • FDISK - WARNING: Use caution when repartitioning a hard disk drive that contains data.
  • Feature Manipulation Engine (FME) - The Feature Manipulation Engine (FME) is a platform that streamlines the translation of spatial data between geometric and digital formats.
  • Fedora - Fedora is a popular open source Linux-based operating system.
  • Fermi paradox - The Fermi paradox is the apparent conflict between the fact that humans have found no evidence of intelligent extraterrestrial life despite the probablity that it exists, given what we know about the universe.
  • field of view (FOV) - Field of view (FOV) is the open, observable area a person can see through their eyes or via an optical device, such as a camera.
  • File Allocation Table (FAT) - File Allocation Table (FAT) is a file system that Microsoft developed to support small disks and simple folder structures.
  • file-sharing applications - File-sharing applications are Web services that facilitate storing and sharing of content through the cloud.
  • FileZilla - FileZilla is a free, open source, file transfer protocol (FTP) software tool.
  • filter - In computer programming, a filter is a program or section of code that is designed to examine each input or output request for certain qualifying criteria and then process or forward it accordingly.
  • filter bubble - A filter bubble is an algorithmic bias that skews or limits the information an individual user sees on the internet.
  • finger - Finger is a program that tells you the name associated with an e-mail address.
  • Firefox - Firefox is a Web browser that is smaller, faster, and in some ways more secure than the Netscape browser from which much of its code was derived.
  • Firesheep - Firesheep is a Firefox plug-in that automates session hijacking attacks over unsecured Wi-Fi networks.
  • first follower theory - First follower theory is the concept that attracting an adherent to some kind of view or initiative is the first step toward beginning a movement, no matter how unusual or out-of-step with the surrounding culture it may seem to the general population.
  • first-person view (FPV) - First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video game, a drone, or a telemedicine client.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • flamebait - On the Internet, flamebait is a "posting" or note on a Web site discussion forum, an online bulletin board, a Usenet newsgroup, or other public forum that is intended to elicit the extremely strong responses characteristic of flaming and active public discussions.
  • flaming - On the Internet, flaming is giving someone a verbal lashing in public.
  • Flash cookie - Flash cookies, also known as local shared objects (LSO), are text files stored on a user’s hard drive when a browsers requests content that's supported by Adobe Flash.
  • Flat-panel TV Guide - Benefits of flat-panel TVs | Flat-panel features to considerA quick comparison of LCD, LED, OLED and plasma TVsFlat-panel TV technologies: LCD | LED | Plasma | OLEDMore informationA flat-panel TV is a television set that uses one of several different technologies for display in a flat, thin format.
  • flexible display - A flexible display or foldable tech/smartphone is a visual output surface on a device that is designed to be folded or closed like a book or a device which incorporates such a screen.
  • font - The word 'font' refers to a set of printable or displayable typography or text characters in a specific style and size.
  • for your information (FYI) - In both chat acronyms and in IT acronyms, FYI is the abbreviation for 'for your information.
  • format war - A format war is a competition for market dominance -- and often survival -- between two or more producers of a particular type of product.
  • Forward DNS lookup - Forward DNS lookup is using an Internet domain name to find an IP address.
  • fourth wall - The fourth wall is a conceptual barrier between those presenting some kind of a communication and those receiving it.
  • FPV drone (first-person view drone) - An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.
  • FQA (frequently questioned answers) - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
  • fractal - Fractals are non-regular geometric shapes that have the same degree of non-regularity on all scales.
  • frames (web site) - In creating a Web site, frames is the use of multiple, independently controllable sections on a Web presentation.
  • freebooting - Freebooting is the unauthorized duplication of digital content, which is then republished and presented as original work.
  • freemail - Freemail is a service that provides free e-mail delivery to anyone in exchange for exposure to advertising on the site where you request your e-mail and, in some cases, for some personal information.
SearchNetworking
  • network security

    Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.

  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • digital marketing

    Digital marketing is a general term for any effort by a company to connect with customers through electronic technology.

  • hockey stick growth

    Hockey stick growth is a growth pattern in a line chart that shows a sudden and extremely rapid growth after a long period of ...

  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

Close