Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

NYM - SCA

  • nym - A nym (pronounced NIHM and a shortened form of "pseudonym,") is a name invented by or provided for an Internet user in order to conceal the user's real identity and, in some cases, to expressly create a new and separate Internet identity.
  • OAB (offline address book) - An Offline Address Book is a downloaded copy of a Microsoft Outlook user's address list which allows the user access to email addresses when disconnected from Exchange Server.
  • Oculus Rift - Oculus Rift is a VR headset that is designed to connect to a high-powered PC to enable advanced computations and graphics rendering.
  • offset printing (offset lithography) - Offset printing, also called offset lithography, is a method of mass-production printing in which the images on metal plates are transferred (offset) to rubber blankets or rollers and then to the print media.
  • Ogg Vorbis - Vorbis is an open source patent-free audio compression format, developed as a replacement for proprietary digital audio encoding formats, such as MP3, VQF, and AAC.
  • on-screen display (OSD) - An on-screen display (OSD) is a control panel superimposed on a computer monitor, mobile device, television screen or another electronic device display that enables users to select viewing options and/or adjust components of the display, such as brightness, contrast, and horizontal and vertical positioning.
  • operating system (OS) - An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
  • optical mouse - An optical mouse is an advanced computer pointing device that uses a light-emitting diode (LED), an optical sensor, and digital signal processing (DSP) in place of the traditional mouse ball and electromechanical transducer.
  • org - "org" is one of the generic top-level domain names that can be used when choosing a domain name.
  • OST file (.ost) - An OST file is an offline folder file in Microsoft Outlook.
  • Outlook Anywhere - Microsoft Outlook Anywhere is a software feature that allows end users with Microsoft Office Outlook 2010, Outlook 2007 or Outlook 2003 to access corporate email and calendars over the Internet from outside the corporate domain without having to log into a virtual private network (VPN).
  • owned - Owned, in common slang, means decisively defeated, with the implication of domination and possession.
  • P2P lending (peer-to-peer lending) - P2P lending (peer-to-peer lending) is a type of platform that allows participants to borrow and lend sums of money without having to rely on a conventional financial institution to control transactions.
  • page description language (PDL) - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.
  • Parallels Desktop for Mac - Parallels Desktop for Mac is desktop virtualization software that allows Microsoft Windows, Linux and Google Chrome OSes and applications to run on an Apple Mac computer.
  • passive cooling - Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating.
  • password entropy - Password entropy is a measurement of how unpredictable a password is.
  • pastebin - A pastebin is a Web application that allows users to upload and share text online.
  • PC as a service (PCaaS) - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.
  • PC Card - A PC Card (previously known as a PCMCIA card) is a credit card-size memory or I/O device that fits into a personal computer, usually a notebook or laptop computer.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • pegged cryptocurrency - A pegged cryptocurrency is a cryptocurrency whose value is linked to a specific bank-issued currency, financial instrument or tradable commodity.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • Perl - Perl is a family of script programming languages that is similar in syntax to the C language.
  • personal area network (PAN) - A personal area network (PAN) interconnects technology devices, typically within the range of a single user, which is approximately 10 meters or 33 feet.
  • personal computer (PC) - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • personal digital assistant (PDA) - Personal digital assistant is a term for a small, mobile, handheld device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedules, calendars and address book information handy.
  • personal video recorder (PVR) - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • Photoshop - Photoshop is an image creation, graphic design and photo editing software developed by Adobe.
  • phubbing - Phubbing, a contraction of the words “phone snubbing,” is the act of ignoring a companion in favor of using a smartphone.
  • Picture in Picture (PIP) - Picture in Picture (PIP) is a video effect which places several complete images on the screen at the same time.
  • ping - A ping (Packet Internet or Inter-Network Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address exists and can accept requests in computer network administration.
  • Pinterest - Pinterest is a social curation website for sharing and categorizing images found online.
  • pixel - The pixel -- a word invented from picture element -- is the basic unit of programmable color on a computer display or in a computer image.
  • Playstation - Playstation is a video game console developed by Sony.
  • plotter - A plotter is a printer that interprets commands from a computer to make line drawings on paper with one or more automated pens.
  • PNG (Portable Network Graphics) - PNG (Portable Network Graphics) is a file format used for lossless image compression.
  • pop-up - A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.
  • POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • port 80 - On a Web server or Hypertext Transfer Protocol daemon, port 80 is the port that the server "listens to" or expects to receive from a Web client, assuming that the default was taken when the server was configured or set up.
  • port number - Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
  • port replicator - A port replicator is an attachment for a notebook computer that allows a number of devices such as a printer, large monitor, and keyboard to be simultaneously connected.
  • Portable Document Format (PDF) - Portable Document Format (PDF) is a file format that has captured all the elements of a printed document as an electronic image that users can view, navigate, print or forward to someone else.
  • POST (Power-On Self-Test) - A Power-On Self-Test (POST) is an operation initiated by a computer after it has been turned on but before it boots up the OS.
  • Postscript - Postscript is a programming language that describes the appearance of a printed page.
  • power take-off (PTO) - Power take-off (PTO) is a device that transfers an engine’s mechanical power to another piece of equipment.
  • power user - A power user, also called a super user, is someone whose computer skills are better than those of an organization's average end user.
  • power-up (or power-on) - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.
  • PPD file (Postscript Printer Description file) - A PPD (Postscript Printer Description) file is a file that describes the font s, paper sizes, resolution, and other capabilities that are standard for a particular Postscript printer.
  • pre-roll ad - A pre-roll ad is a promotional video message that plays before the content the user has selected.
  • predictive text - Predictive text is an input technology that facilitates typing on a device by suggesting words the user may wish to insert in a text field.
  • principle of least privilege (POLP) - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.
  • print server - A print server is a software application, network device or computer that manages print requests and makes printer queue status information available to end users and network administrators.
  • printer - A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.
  • Printer Control Language (PCL) - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.
  • printer pool - Printer pooling is a standard feature of Windows NT, 2000, XP, Vista and Windows 7 that allows agroup of printers to share the same name and function as if they were one printer.
  • privacy policy - A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations.
  • progressive scan - Progressive scan is a display and signal type in which the entire image is refreshed every cycle.
  • Proteus effect - The Proteus effect is the tendency for people to be affected by their digital representations, such as avatars, dating profiles and social media personas.
  • pseudonymity - Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym.
  • PST file - A PST file is a personal folder file in Microsoft Outlook.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • QHD (quad high definition) - QHD (Quad High Definition) is a resolution standard for high-end monitors, televisions and mobile devices.
  • qHD (quarter high definition) - qHD (quarter high definition) is a resolution standard for mobile devices.
  • QR code (quick response code) - A QR code (quick response code) is a type of 2D bar code that provides easy access to information through a smartphone camera.
  • quantum internet - The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.
  • QWERTY keyboard - The QWERTY (pronounced KWEHR-tee) keyboard is the standard typewriter and computer keyboard in countries that use a Latin-based alphabet.
  • rabbit hole - A rabbit hole, in a metaphorical sense, is a long and winding exploratory path with many connections and offshoots.
  • raster graphics - Raster graphics are digital images created or captured (for example, by scanning in a photo) as a set of samples of a given space.
  • real-time communications (RTC) - Real-time communications (RTC) is any mode of telecommunications in which all users can exchange information instantly or with negligible latency.
  • real-time location system (RTLS) - A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.
  • Real-time Transport Protocol (RTP) - Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data.
  • redirection - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • Remote Access server role - Remote Access is a server role in Microsoft Windows Server 2012 and Windows Server 2012 R2 and offers administrators a central point for administering, configuring and monitoring factors related to network access.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote desktop protocol (RDP) - Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.
  • Remote Desktop Session Host (RDSH) - Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS).
  • reprographics - Reprographics is a blanket term encompassing multiple methods of reproducing content, such as scanning, photography, xerography and digital printing.
  • Request for Comments (RFC) - A Request for Comments (RFC) is a formal document from the Internet Engineering Task Force (IETF) that contains specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.
  • resolution - Resolution is the number of pixels -- picture elements or individual points of color -- that can be contained on a display screen or in a camera sensor.
  • restore point - A system restore point is a backup copy of important Windows operating system (OS) files and settings that can be used to recover the system to an earlier point of time in the event of system failure or instability.
  • return on marketing investment (ROMI) - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • reverse image search - Reverse image search is a technology that takes an image file as a search engine input query and returns results related to the image.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • Rich Text Format (RTF) - Rich Text Format (RTF) is a file format that lets you exchange text files between different word processors in different operating systems.
  • RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
  • ripping (digital extraction) - Ripping, more formally known as digital extraction, is the process of copying audio or video content from a compact disc, DVD or streaming media onto a computer hard drive.
  • Robert Metcalfe - Robert 'Bob' Melancton Metcalfe, born April 7, 1946, is an American engineer, entrepreneur, professor, writer and venture capitalist.
  • robotic personality - Robotic personality is an advanced aspect of artificial intelligence (AI) in which smart machines display idiosyncratic human behavior.
  • room-scale virtual reality (VR) - Room-scale (or roomscale) virtual reality (VR) is the use of clear space to allow movement for someone using a VR application such as a VR game.
  • route summarization (route aggregation) - Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.
  • Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • routing table - A routing table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
  • RPC over HTTP - Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP.
  • Ryzen (AMD Ryzen) - Ryzen (pronounced RYE zen) is an AMD CPU aimed at the server, desktop, workstation, media center PC and all-in-one markets.
  • sample rate - In developing an audio sound for computers or telecommunication, the sample rate is the number of samples of a sound that are taken per second to represent the event digitally.
  • scanner - A scanner is a device that captures images from photographic prints, posters, magazine pages and similar sources for computer editing and display.
  • scareware - Scareware is a type of malware tactic used to manipulate victims into downloading or buying potentially malware-infested software.
SearchNetworking
  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of ...

  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

SearchSecurity
  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close