Browse Definitions :

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

136 - CLO

  • 136 browser colors with names - Some Web page creators prefer to specify colors by name rather than by hexadecimal red-green-blue (RGB) intensity value.
  • 24x7 (24 hours a day, 7 days a week) - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 2D barcode (two-dimensional barcode) - A 2D (two-dimensional) barcode is a graphical image that stores information horizontally as one-dimensional barcodes do, as well as vertically.
  • 3-D printing (additive manufacturing) - 3-D printing is a manufacturing process that builds layers to create a three-dimensional solid object from a digital model.
  • 360-degree photograph - 360-degree photos simulate being in the shoes of a photographer and looking around to the left, right, up and down as desired as well as sometimes zooming.
  • 3D (three dimensions or three dimensional) - 3D, or three dimensional, refers to the three spatial dimensions of width, height and depth.
  • 3D audio (three-dimensional audio) - 3D audio is a simulation of the natural positioning of sounds for various applications including video presentations and games, virtual environments and sound stages.
  • 3D camera - A 3D camera is an imaging device that enables the perception of depth in images to replicate three dimensions as experienced through human binocular vision.
  • 3D mesh - A 3D mesh is the structural build of a 3D model consisting of polygons.
  • 4 P's marketing mix - The marketing mix, also known as the four P's of marketing, refers to the four key elements of a marketing strategy: product, price, place and promotion.
  • 64-bit processor (64-bit computing) - A 64-bit processor refers to a microprocessor that can process data and instructions in chunks of 64 bits.
  • 720p - 720p is the standard high-definition (HD) display resolution of 1280x720 pixels, with progressive scanning, at a 16x9 aspect ratio.
  • A-weighted decibel (dBA or dB(A)) - A-weighted decibel (dBA or dB(A)) is an expression of the relative loudness of sounds as perceived by the human ear.
  • A2P messaging (application to person messaging) - A2P messaging (application to person messaging), also known as enterprise or business SMS, is a type of SMS messaging technique where a text is sent from a software application run by an enterprise to a consumer's device.
  • abacus - An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame.
  • AC-3 (Dolby Digital) - AC-3, also known as Dolby Digital, is a perceptual digital audio coding technique that reduces the amount of data needed to produce high-quality sound.
  • acceptable use policy (AUP) - An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
  • Address Resolution Protocol (ARP) - Address Resolution Protocol (ARP) is a protocol that maps dynamic IP addresses to permanent physical machine addresses in a local area network (LAN).
  • adulting - Adulting is the assumption of tasks and behaviors associated with normal grown-up life, along with the implication that the individual in question does not particularly identify as an adult.
  • adware - Adware is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.
  • AI winter - AI winter is a quiet period for artificial intelligence research and development.
  • Amazon - Amazon (Amazon.
  • Amazon Prime - Amazon Prime is a subscription membership to Amazon that offers customers premium services for a yearly or monthly fee.
  • ambient temperature - Ambient temperature is the air temperature of any object or environment where equipment is stored.
  • Android Factory Reset - Android Factory Reset is a feature that erases all device settings, user data, third-party applications, and associated application data from an Android device’s internal flash storage to return the device to the condition it was in when shipped from the factory.
  • anime - Anime, pronounced AH-nee-may, is a style of Japanese animated entertainment that has become increasingly popular around the world in recent years.
  • anonymous FTP (File Transfer Protocol) - Anonymous File Transfer Protocol (FTP) is a method for allowing users to access public files from a remote server or archive site without requiring them to identify themselves to the server or site.
  • anti-replay protocol - The anti-replay protocol provides Internet Protocol (IP) packet-level security by making it impossible for a hacker to intercept message packets and insert changed packets into the data stream between a source computer and a destination computer.
  • Apple - Apple Inc. (formerly Apple Computer Inc.
  • Apple AirDrop - Apple AirDrop is a native feature in iOS and macOS that lets users share data from one device to another on the same Wi-Fi network.
  • Apple Bonjour - Apple Bonjour is a group of networking technologies designed to help devices and applications discover each other on the same network.
  • Apple Push Notification service (APNs) - Apple Push Notification service (APNs) is a cloud service that allows approved third-party apps installed on Apple devices to send push notifications from a remote server to users over a secure connection.
  • Apple Watch - Apple Watch is a wearable smartwatch that allows users to accomplish a variety of tasks, including making phone calls, sending text messages and reading email.
  • Apple watchOS (Apple Watch operating system) - Apple watchOS is the operating system (OS) designed specifically for the Apple Watch wearable device, with features that take advantage of the smaller screen and location of the device on the user's wrist.
  • areal density - Areal density measures the amount of data that can be stored on a given amount of physical space on a disk drive.
  • ASCII (American Standard Code for Information Interchange) - ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data in computers and on the internet.
  • ASMR (autonomous sensory meridian response) - Autonomic sensory meridian response (ASMR) is a tingling sensation that some people experience when exposed to particular types of auditory or visual stimuli such as whispering, tapping and slow movements.
  • at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: msmuffet@tuffet.
  • attention economy - The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.
  • audio - Audio is sound that is within the acoustic range of human hearing.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with the user's environment in real time.
  • augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
  • augmented reality gaming (AR gaming) - Augmented reality gaming (AR gaming) is the real-time integration of virtual game elements with the physical environment of the player.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • autocorrect - Autocorrect is a word processing feature that identifies misspelled words, and uses algorithms to identify the words most likely to have been intended, and edits the text accordingly.
  • autofill - Autofill, also called autocomplete, is a software feature that automatically inserts previously entered personal information into web form fields for the user's convenience.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host Configuration Protocol client to automatically assign an IP address to itself when there's no DHCP server available to perform that function.
  • autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • autoplay video - Autoplay video is audiovisual content that starts automatically when someone goes to the host web page.
  • backscatter spam - Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender when a recipient's email address is invalid.
  • backslash - The backslash ( \ ) is a typographic and/or keyboard mark that is widely used in programming languages and other computing contexts.
  • beep code - A beep code is the audio signal from a computer when it first powers on to give the Power-On Self-Test (POST) result.
  • behavioral targeting - Behavioral targeting is the presentation of content and marketing based on the previous choices of users across websites.
  • bell curve - A bell curve is a form of graph that is used to visualize the distribution of a set of chosen values across a specified group that tend to have a central, normal values, as peak with low and high extremes tapering off relatively symmetrically on either side.
  • Big Tech - Big Tech is a term that refers to the most dominant and largest technology companies in their respective sectors.
  • binaural sound (binaural beats) - Binaural sound is audio that is recorded through specialized dual microphone setups, allowing for a stereophonic 3D audio effect that simulates sound as heard when physically present.
  • BIOS (basic input/output system) - BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered on.
  • BIOS rootkit - A BIOS-level rootkit is programming that exists in a system's memory hardware to enable remote administration.
  • Bitcoin - Bitcoin is a digital currency -- also called cryptocurrency -- that can be traded for goods or services with vendors that accept Bitcoin as payment.
  • Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
  • black level (brightness) - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • Blu-ray - Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.
  • bluesnarfing - Bluesnarfing is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection.
  • body area network (BAN) - A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body.
  • bone conduction headphones - Bone conduction headphones -- sometimes called 'bonephones'-- are headphones that transmit sound waves through the bones in a user's skull instead of their ear canal.
  • brain hacking - Brain hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function.
  • brain hijacking - Brain hijacking is the application of principles from fields including neuroscience, behavioral psychology and sociology to develop compulsive elements for consumer technologies.
  • browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • Burning Man - Burning Man is an annual week-long event focusing on self-expression and community that takes place in the Black Rock Desert in northern Nevada.
  • busy lamp field (BLF) - A busy lamp field (BLF) is a light on a VoIP phone -- also known as an IP phone -- that tells end users when another extension within the system is in use by displaying a clear status on the phone's display.
  • BYOD (bring your own device) - BYOD (bring your own device) is a policy that allows employees in an organization to use their personally owned devices for work-related activities.
  • CAD (computer-aided design) - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • call tree - A call tree is a layered hierarchical communication model used to notify specific individuals of an event and coordinate recovery if necessary.
  • CamelCase - CamelCase is a way to separate the words in a phrase by making the first letter of each word capitalized and not using spaces.
  • capacitive touchscreen - A capacitive touchscreen is a control display that uses the conductive touch of a human finger or a specialized input device for input and control.
  • card dipping (EMV card dipping) - Dipping can be contrasted with swiping.
  • Cartesian coordinates (rectangular coordinates) - Cartesian coordinates, also called rectangular coordinates, provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface or in three-dimensional (3D) space.
  • CAVE (Cave Automatic Virtual Environment) - CAVE (Cave Automatic Virtual Environment) is a virtual reality (VR) environment consisting of a cube-shaped VR room or a room-scale area in which the walls, floors and ceilings are projection screens.
  • CCTV (closed circuit television) - CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • CD-ROM - A CD-ROM (Compact Disc Read-Only Memory) is a type of compact disc that can only be read, not written to.
  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • change management - Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes or technologies.
  • chat room - A chat room is an online platform that enables users to communicate with each other in real time.
  • chatting - While the term chatting or chitchat refers in general to communication between two or more parties that can occur in person, in today's modern age, it can also occur over the internet via Short Message Service (SMS) text message and Multimedia Messaging Service (MMS) or, for example, through tools like Slack and Microsoft Teams and social media platforms like Facebook and Twitter.
  • chatty protocol - A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.
  • Chernobyl virus - The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed.
  • chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
  • Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks.
  • Citrix XenApp - Citrix XenApp, now called Citrix Virtual Apps, was a product that extends Microsoft Remote Desktop Session Host (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.
  • clean install - A clean install is a software installation in which any previous version is eradicated.
  • click fraud (pay-per-click fraud) - Click fraud -- sometimes called 'pay-per-click fraud' -- is a type of fraud that artificially inflates traffic statistics for online advertisements.
  • clickwrap agreement (clickthrough agreement) - A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a box that states “I agree.
  • Client Access Server (CAS) - The Client Access Server (CAS) is a server role that handles all client connections to Exchange Server 2010 and Exchange 2013.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • closed captions - Closed captions are a text version of the spoken part of a television, movie or computer presentation.
  • cloud access security broker (CASB) - A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
  • cloud collaboration - Cloud collaboration is a type of enterprise collaboration that allows employees to work together on documents and other data types, which are stored off-premises and outside of the company firewall.
  • cloud telephony (cloud calling) - Cloud telephony (cloud calling) is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
Networking
  • top-of-rack switching

    Top-of-rack switching is a data center architecture design in which computing equipment like servers, appliances and other ...

  • edge device

    An edge device is any piece of hardware that controls data flow at the boundary between two networks.

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which ...

Security
  • Zoombombing

    Zoombombing is a type of cyber-harassment in which an unwanted and uninvited user or group of such users interrupts online ...

  • CISO (chief information security officer)

    The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

CIO
  • globalization

    Globalization is the process by which ideas, knowledge, information, goods and services spread around the world.

  • business process outsourcing (BPO)

    Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...

  • localization

    Localization is the process of adapting and customizing a product to meet the needs of a specific market, as identified by its ...

HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close