Technical support

Terms related to computer fundamentals, including computer hardware definitions and words and phrases about software, operating systems, peripherals and troubleshooting.
  • enterprise architecture (EA) - An enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of organizations.
  • entity - An entity is a single thing with a distinct separate existence.
  • event handler - In programming, an event handler is a callback routine that operates asynchronously once an event takes place.
  • exponential function - An exponential function is a mathematical function used to calculate the exponential growth or decay of a given set of data.
  • extension - An extension typically refers to a file name extension.
  • failover - Failover is a backup operational mode in which the functions of a system component are assumed by a secondary component when the primary becomes unavailable.
  • falsifiability - Falsifiability is the capacity for some proposition, statement, theory or hypothesis to be proven wrong.
  • fault tolerance - Fault tolerance is the capability of a system to deliver uninterrupted service despite one or more of its components failing.
  • FDISK - FDISK is a disk utility included in all versions of MS-DOS, Windows and Linux for formatting or partitioning a hard disk drive, or to delete different portions of it.
  • field - A field is an area in a fixed or known location in a unit of data such as a record, message header, or computer instruction that has a purpose and usually a fixed size.
  • file extension (file format) - In computing, a file extension is a suffix added to the name of a file to indicate the file's layout, in terms of how the data within the file is organized.
  • finite state machine - Finite state machine (FSM) is a term used by programmers, mathematicians and other professionals to describe a mathematical model for any system with a limited number of conditional states of being.
  • first-order logic - First-order logic (FOL) refers to logic in which the predicate of a sentence or statement can only refer to a single subject.
  • flash memory card - A flash memory card -- sometimes called a storage card -- is a small storage device that uses non-volatile semiconductor memory to store data on portable or remote computing devices.
  • flash storage - Flash storage is any type of drive, repository or system that uses flash memory to write and store data for an extended period.
  • floating-point operations per second (FLOPS) - Floating-point operations per second (FLOPS) is a measure of a computer's performance based on the number of floating-point arithmetic calculations that the processor can perform within a second.
  • form factor - In computing, form factor refers to the size, configuration, shape, weight or physical arrangement of a computing device.
  • FQA (frequently questioned answers) - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
  • freeware - Freeware (not to be confused with free software) is a type of proprietary software that is released without charge to the public.
  • full-stack developer - A full-stack developer is a type of programmer that has a functional knowledge of all techniques, languages and systems engineering concepts required in software development.
  • fuzzy search - A fuzzy search is a technique that uses search algorithms to find strings that match patterns approximately.
  • gas - A gas is a substance that is in a gaseous, or vaporous, state of matter.
  • general-purpose computer - A general-purpose computer is one that, given the application and required time, should be able to perform the most common computing tasks.
  • gibibyte (GiB) - A gibibyte (GiB) is a unit of measure of capacity in computing.
  • gigabit (Gb) - In data communications, a gigabit (Gb) is 1 billion bits, or 1,000,000,000 (that is, 10^9) bits.
  • grayscale - Grayscale is a range of shades of gray without apparent color.
  • grid computing - Grid computing is a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.
  • Hamming code - Hamming code is an error correction system that can detect and correct errors when data is stored or transmitted.
  • heuristic - As an adjective, heuristic (pronounced hyu-RIS-tik and from the Greek "heuriskein" meaning "to discover") pertains to the process of gaining knowledge or some desired result by intelligent guesswork rather than by following some preestablished formula.
  • hierarchy - Generally speaking, hierarchy refers to an organizational structure in which items are ranked in a specific manner, usually according to levels of importance.
  • high-performance computing - High-performance computing (HPC) is the practice of using parallel data processing to improve computing performance and perform complex calculations.
  • histogram - A histogram is a type of chart that shows the frequency distribution of data points across a continuous range of numerical values.
  • holographic storage (holostorage) - Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.
  • host (in computing) - A host is a computer or other device that communicates with other hosts on a network.
  • hybrid application (hybrid app) - A hybrid app is a software application that combines elements of both native apps and web applications.
  • hypervisor - A hypervisor is software that facilitates running multiple virtual machines (VMs) with their own operating systems on a single computer host's hardware.
  • I/O (input/output) - I/O (input/output), pronounced "eye-oh," describes any operation, program or device that transfers data to or from a computer.
  • ICT4D (Information and Communications Technologies for Development) - ICT4D (Information and Communications Technologies for Development) is a decentralized movement dedicated to making access to digital technologies more equitable, with the goals of bridging the digital divide and advancing global economic development.
  • identity management (ID management) - Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to technology resources.
  • image - An image is a visual representation of something, while a digital image is a binary representation of visual data.
  • image compression - Image compression is a process applied to a graphics file to minimize its size in bytes without degrading image quality below an acceptable threshold.
  • implementation - Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for doing something.
  • infonesia - Infonesia is an inability to remember where you saw or heard an item of information.
  • information - Information is the output that results from analyzing, contextualizing, structuring, interpreting or in other ways processing data.
  • information technology (IT) - Information technology (IT) is the use of computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
  • inline frame (iframe) - An inline frame (iframe) is a HTML element that loads another HTML page within the document.
  • instruction set - An instruction set is a group of commands for a central processing unit (CPU) in machine language.
  • integration - Integration is the act of bringing together smaller components or information stored in different subsystems into a single functioning unit.
  • intelligent system - An intelligent system is an advanced computer system that can gather, analyze and respond to the data it collects from its surrounding environment.
  • interoperability - Interoperability refers to the degree to which a software system, devices, applications or other entity can connect and communicate with other entities in a coordinated manner without effort from the end user.
  • interrupt request (IRQ) - An interrupt request (IRQ) is a signal sent to a computer's processor to momentarily stop (interrupt) its operations.
  • ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • iterative development - Iterative development is a way of breaking down the software development lifecycle (SDLC) of a large application into smaller chunks.
  • job - In certain computer operating systems, a job is the unit of work that a computer operator -- or a program called a job scheduler -- gives to the OS.
  • Kbps (kilobits per second) - In the U.S.
  • knowledge base - In general, a knowledge base is a centralized repository of information.
  • lambda - Lambda, the 11th letter of the Greek alphabet, is used as both a symbol and a concept in various fields of science, mathematics and computing.
  • laser - A laser is a coherent and focused beam of photons; coherent, in this context, means that it is all one wavelength, unlike ordinary light which showers on us in many wavelengths.
  • lean manufacturing (lean production) - Lean manufacturing is a methodology that focuses on minimizing waste within manufacturing systems while simultaneously maximizing productivity.
  • lights-out management (LOM) - Lights-out management (LOM) is a form of out-of-band management.
  • line of sight (LOS) - Line of sight (LOS) is the imaginary line between an observer and the target.
  • linearity - Linearity is the behavior of a circuit, particularly an amplifier, in which the output signal strength varies in direct proportion to the input signal strength.
  • load balancing - Load balancing is a technique used to distribute network traffic across a pool of servers known as a server farm.
  • localization - Localization is the process of adapting and customizing a product to meet the needs of a specific market, as identified by its language, culture, expectations, local standards and legal requirements.
  • logical block addressing (LBA) - Logical block addressing (LBA) is a technique to specify the addresses of blocks of data on a storage device, such as a hard disk.
  • logical equivalence - Logical equivalence is the condition of equality that exists between two statements or sentences in propositional logic or Boolean algebra.
  • logical implication - Logical implication is a type of relationship between two statements or sentences.
  • logical OR symbol - In mathematics, the logical OR symbol is a Boolean function that is positioned between two statements to indicate an inclusive disjunction between them.
  • logon (or login) - In computing, a logon is a procedure that enables an entity to access a secure system such as an operating system, application, service, website or other resource.
  • lossless and lossy compression - Lossless and lossy file compression describe whether all original data can be recovered when the file is uncompressed.
  • lowerCamelCase - A part of CamelCase, lowerCamelCase is a naming convention in which a name contains multiple words that are joined together as a single word.
  • Luddite - A Luddite is a person resistant to increased industrialization or new technologies, especially computers.
  • LZW compression - LZW compression is a method to reduce the size of Tag Image File Format (TIFF) or Graphics Interchange Format (GIF) files.
  • m-commerce (mobile commerce) - M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.
  • marcom (or marcomm) - Marcom (sometimes spelled 'marcomm') is an abbreviation for 'marketing communications.
  • Master Boot Record (MBR) - The Master Boot Record (MBR) is the information in the first sector of a hard disk or a removable drive.
  • mean time to innocence - Mean time to innocence is the average elapsed time between when a system problem is detected and any given team's ability to say the team or part of its system is not the root cause of the problem.
  • mebibyte (MiB) - A mebibyte (MiB) is a unit of measurement used in computer data storage.
  • megabits per second (Mbps) - Megabits per second (Mbps) are units of measurement for network bandwidth and throughput.
  • megabyte (MB) - A megabyte is a unit of data capacity that is equal to 1,000,000 bytes in decimal notation (base 10) or 1,048,576 bytes in binary notation (base 2).
  • memory dump - A memory dump is the process of taking all information content in RAM and writing it to a storage drive as a memory dump file (*.
  • Microsoft Remote Desktop Web Access (Microsoft RD Web Access) - Microsoft Remote Desktop Web Access (Microsoft RD Web Access) is a Remote Desktop Services role in some versions of the Windows Server OS.
  • middleware - Middleware is software that bridges the gap between applications and operating systems by providing a method for communication and data management.
  • MIDI (Musical Instrument Digital Interface) - Musical Instrument Digital Interface (MIDI) is a standard to transmit and store music, originally designed for digital music synthesizers.
  • mobile device - A mobile device is essentially a portable, handheld computer that enables users to access information, perform tasks and connect with other people and devices.
  • modeling and simulation (M&S) - Modeling and simulation (M&S) is the use of a physical or logical representation of a given system to generate data and help determine decisions or make predictions about the system.
  • molecule - A molecule is two or more atoms connected by chemical bonds, which form the smallest unit of a substance that retains the composition and properties of that substance.
  • most significant bit (MSB) - The most significant bit (MSB) is the bit in a multiple-bit binary number with the largest value.
  • MP3 (MPEG-1 Audio Layer 3) - MP3 (MPEG-1 Audio Layer 3) is a method to compress and store audio.
  • multicore processor - A multicore processor is an integrated circuit that has two or more processors attached for enhanced performance and reduced power consumption.
  • multiprocessing - Multiprocessing is the utilization of two or more central processing units (CPUs) in a single computer system.
  • NACK (NAK, negative acknowledgment, not acknowledged) - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
  • nanosecond (ns or nsec) - A nanosecond (ns or nsec) is one-billionth (10-9) of a second.
  • native app - A native application is a software program developers build for use on a particular platform or device.
  • native code - Native code is binary data compiled to run on a processor, such as an Intel x86-class processor.
  • nearline storage - Nearline storage is the on-site storage of data on removable media.
  • network availability - Network availability is the amount of uptime in a network system over a specific time interval.
  • network protocol - A network protocol is a set of established rules that specify how to format, send and receive data so that computer network endpoints, including computers, servers, routers and virtual machines, can communicate despite differences in their underlying infrastructures, designs or standards.
  • neuromarketing - Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically monitoring brainwave activity, eye tracking and skin response.
  • nibble - In computing and digital technology, a nibble is four consecutive binary digits or half of an 8-bit byte.