Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

DIS - FAC

  • disappearing e-mail - Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.
  • discovery mailbox - A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.
  • discussion board (discussion group, message board, online forum) - A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left.
  • disinformation - Disinformation is a type of untrue communication that is purposefully spread and represented as truth to elicit some response that serves the perpetrator's purpose.
  • disk analyzer - A disk analyzer is a piece of software that checks drives for space and usage and explores files and folders visually, simplifying file cleanup and optimization.
  • disk cloning - Disk cloning is the act of copying the contents of a computer's hard drive.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • display - A display is a computer output surface and projecting mechanism that shows text and often graphic images to the computer user, using a cathode ray tube (CRT), liquid crystal display (LCD), light-emitting diode, gas plasma, or other image projection technology.
  • display modes - The term display mode refers to the characteristics of a computer display, in particular the maximum number of colors and the maximum image resolution (in pixels horizontally by pixels vertically).
  • DisplayPort - DisplayPort is an interface for digital displays, particularly computer monitors.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distributed applications (distributed apps) - Distributed applications (distributed apps) are applications or software that runs on multiple computers within a network at the same time and can be stored on servers or with cloud computing.
  • distributed computing - Distributed computing is a model in which components of a software system are shared among multiple computers.
  • distributed learning - Distributed learning is a general term used to describe a multi-media method of instructional delivery that includes a mix of Web-based instruction, streaming video conferencing, face-to-face classroom time, distance learning through television or video, or other combinations of electronic and traditional educational models.
  • distributed search - Distributed search is a search engine model in which the tasks of Web crawling, indexing and query processing are distributed among multiple computers and networks.
  • distribution list - In email applications, a distribution list is a list of email addresses that can be mass mailed via automation without having to add members individually.
  • dithering - Dithering is the attempt by a computer program to approximate a color from a mixture of other colors when the required color is not available.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • Do Not Track (DNT) - Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user.
  • document reader - A document reader is a device that converts an electronic file or printed matter to a form suitable for use by people with visual impairment.
  • dogcow - The dogcow is a drawing of a rather indiscriminate-looking animal (it looks mostly like a dog but is said to have the spots of a cow) that is or has been used in the Apple Macintosh operating system to help tell users about their printing options.
  • Dolby Digital - Dolby Digital, formerly known as AC-3, is a digital audio coding technique that reduces the amount of data needed to produce high quality sound.
  • Dolly (Digital Dolly) - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • domain - In general, a domain is an area of control or a sphere of knowledge.
  • domain kiting - Domain kiting is the practice of repeatedly registering and deleting a domain name so that the registrant can, in effect, own the domain name without paying for it.
  • domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • dot address - Tip:To find out the dot address (such as 205.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • DOT4 - DOT4 is a protocol that allows a device that is part of a multifunction peripheral (MFP) to send and receive multiple data packets simultaneously across a single physical channel to other devices on the MFP.
  • dots per inch (dpi) - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • downcycling - Downcycling is a recycling practice that involves breaking an item down into its component elements or materials.
  • downloading - Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
  • DRAM (dynamic random access memory) - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • driver - A driver is a program that interacts with a particular device or special (frequently optional) kind of software.
  • drone (UAV) - A drone is an unmanned aircraft.
  • drone journalism - Drone journalism is the capture of still images and video by remotely operated or autonomous drones (more formally known as unmanned aerial vehicles or UAV) to record events for report by news agencies and citizen media.
  • dronie - A dronie is a self-portrait photograph (selfie) still or, more commonly, video recorded by a camera attached to a personal drone.
  • DRTC (Don't read the comments) - DRTC is an initialism for "Don't read the comments.
  • dual-SIM phone - A dual SIM phone is a mobile phone, typically a smart phone, with the capacity to use two subscriber identity module (SIM) cards.
  • DuckDuckGo - DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).
  • dumpster diving - Dumpster diving is looking for treasure in someone else's trash.
  • dynamic IP address - A dynamic IP address is a temporary address for devices connected to a network that will continually change over time.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • dynamic range - Dynamic range describes the ratio of the softest sound to the loudest sound in a musical instrument or piece of electronic equipment.
  • Dyslexie - Dyslexie is a font designed for greater readability to help people who have difficulty reading.
  • e-commerce hosting - E-commerce hosting is a business in which a company provides other companies whatever they need to sell their products and services on the World Wide Web - including a Web server to serve a company's pages, possibly the Web site design (including catalog pages), and the special capabilities needed to accept, process, and confirm sales orders.
  • e-cycling - E-cycling is the practice of reusing, or distributing for reuse, electronic equipment and components rather than discarding them at the end of their life cycle.
  • e-form (electronic form) - An e-form (electronic form) is a computer program version of a paper form.
  • e-mail reflector - An e-mail reflector is a program that acts as the forwarding broadcaster of e-mail messages to the names on a distribution list.
  • e-paper (radio paper or electronic paper) - E-paper (sometimes called radio paper or just electronic paper) is a portable, reusable storage and display medium that looks like paper but can be repeatedly written on (refreshed) - by electronic means - thousands or millions of times.
  • e-procurement (supplier exchange) - Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.
  • e-waste - E-waste is any refuse created by discarded electronic devices and components as well as substances involved in their manufacture or use.
  • E.164 - E.164 is an international numbering plan for public telephone systems in which each assigned number contains a country code (CC), a national destination code (NDC), and a subscriber number (SN).
  • eavesdropping - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  • eBook - An eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader.
  • Echo Show - The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant.
  • edge transport server - Edge transport server is an Exchange Server 2010 role that helps route Internet email as well as protect the Exchange organization from viruses and spam.
  • EEPROM (electrically erasable programmable read-only memory) - EEPROM (electrically erasable programmable read-only memory) is a user-modifiable ROM.
  • EFSS (Enterprise file sync-and-share) - Enterprise file sync-and-share is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.
  • electronic ink - Electronic ink is a liquid substance, in development at MIT's Media Lab in partnership with a company called E Ink, that responds to electrical impulses to enable changeable text and image displays on a flexible surface.
  • electronic paper display (EPD) - An electronic paper display (EPD) is an electrically-charged surface that replicates the look and experience of ink on paper.
  • email - Email (electronic mail) is the exchange of computer-stored messages by telecommunication.
  • email archiving - Email archiving is a systematic approach to saving and protecting the data contained in emails to enable fast retrieval.
  • email governance - Email governance is a way for organizations to manage and monitor email in a corporate setting.
  • email management - Email management is a systematic approach to maximizing the efficiency of email practices and minimizing the negative effects that email handling can have on an individual's productivity and job satisfaction.
  • email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
  • email spam - Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.
  • email virus - An email virus consists of malicious code distributed in email messages to infect one or more devices.
  • EMF (Enhanced MetaFile) - EMF (Enhanced MetaFile) and raw are terms for spool file formats used in printing by the Windows operating system.
  • emoji - An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications.
  • emoticon - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • enhancement - In an information technology product, an enhancement is a noteworthy improvement to the product as part of a new version of it.
  • entity tag (ETag) - ETags use persistent identification elements (PIE) that have been tagged to the user’s browser.
  • EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) - EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) is a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods.
  • ESMTP (Extended Simple Mail Transfer Protocol) - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • evil twin attack - An evil twin attack is a rogue Wi-Fi access point (AP) that masquerades as a legitimate one, enabling an attacker to gain access to sensitive information without the end user's knowledge.
  • ExBPA (Exchange Best Practices Analyzer) - The Exchange Best Practices Analyzer (ExBPA) is a tool that helps administrators to gauge the health of their Exchange Server environment.
  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC), introduced by Microsoft in 2007, is an administrative tool with a graphical user interface (GUI) that's used to manage the components and resources of Microsoft Exchange Server.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • Exchange Remote Connectivity Analyzer (ExRCA) - The Exchange Remote Connectivity Analyzer (ExRCA) is a Web-based tool that helps Exchange administrators identify and troubleshoot connectivity issues in their deployments.
  • Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
  • Exchange transaction log - In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.
  • Exchange Web Services (EWS) - Exchange Web Services (EWS) is an application program interface (API) that allows programmers to access Exchange items such as calendars, contacts and email in Exchange Server 2007 and higher.
  • executable file (EXE file) - An executable file (EXE file) is a computer file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.
  • exomedicine - Exomedicine is the study of medicine related science in earth orbit's micro-gravity.
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • extended memory - Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • extranet - An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
  • ezine (electronic magazine) - The term ezine is short for "electronic magazine.
  • fabric - In information technology, fabric is a synonym for the words framework or platform.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close