Technical support
Terms related to computer fundamentals, including computer hardware definitions and words and phrases about software, operating systems, peripherals and troubleshooting.- deprecated - In information technology (IT), deprecation means that although something is available or allowed, it is not recommended or that -- in the case where something must be used -- to say it is deprecated means that its failings are recognized.
- desktop - A desktop is a computer display area that represents the kinds of objects found on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
- digital accessibility - Digital accessibility is design of technology products and environments to help people with various disabilities not be impeded or otherwise unable to partake in use of the service, product or function.
- digital cash (e-cash) - Digital cash is a system of purchasing cash credits, storing the credits in your computer or digital wallet, and then spending them when making electronic purchases over the internet or in person on a mobile device at the point of sale.
- digital library - A digital library is a collection of digital objects, such as books, magazines, audio recordings, video recordings and other documents that are accessible electronically.
- Direct Memory Access (DMA) - Direct Memory Access (DMA) is a capability provided by some computer bus architectures that enables data to be sent directly from an attached device to the computer's main memory.
- direct-attached storage (DAS) - Direct-attached storage (DAS) is a type of storage that is attached directly to a computer without going through a network.
- disaster recovery plan (DRP) - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume operations after an unplanned incident.
- disruptive technology (disruptive innovation) - Disruptive technology, often referred to as disruptive innovation, is when a new business model attracts an underserviced market or revenue stream and grows until it supplants incumbent competitors.
- document - A document is a form of information that might be useful to a user or set of users.
- DOS (disk operating system) - A DOS, or disk operating system, is an operating system that runs from a disk drive.
- dot product (scalar product) - The dot product, also called scalar product, is a measure of how closely two vectors align with each other, in terms of the directions they point.
- double-slit experiment - The double-slit experiment is a 19th century investigation into the properties of light that has since been found to demonstrate the wave-particle duality of photons, electrons and other particle types as well as demonstrate other quantum properties, such as superposition and interference.
- DRY principle - The DRY (don't repeat yourself) principle is a best practice in software development that recommends software engineers to do something once, and only once.
- electronic discovery (e-discovery or ediscovery) - Electronic discovery -- also called e-discovery or ediscovery -- refers to any process of obtaining and exchanging evidence in a civil or criminal legal case.
- email - Email (electronic mail) is the exchange of computer-stored messages from one user to one or more recipients via the internet.
- encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
- ENIAC (Electronic Numerical Integrator And Computer) - ENIAC (Electronic Numerical Integrator And Computer) was the world's first general-purpose electronic computer.
- enterprise architecture (EA) - An enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of organizations.
- entity - An entity is a single thing with a distinct separate existence.
- event handler - In programming, an event handler is a callback routine that operates asynchronously once an event takes place.
- exponential function - An exponential function is a mathematical function used to calculate the exponential growth or decay of a given set of data.
- extension - An extension typically refers to a file name extension.
- failover - Failover is a backup operational mode in which the functions of a system component are assumed by a secondary component when the primary becomes unavailable.
- falsifiability - Falsifiability is the capacity for some proposition, statement, theory or hypothesis to be proven wrong.
- farad (F) - A farad (F) is the standard unit of capacitance in the International System of Units (SI).
- fault tolerance - Fault tolerance is the capability of a system to deliver uninterrupted service despite one or more of its components failing.
- FDISK - FDISK is a disk utility included in all versions of MS-DOS, Windows and Linux for formatting or partitioning a hard disk drive, or to delete different portions of it.
- field - A field is an area in a fixed or known location in a unit of data such as a record, message header, or computer instruction that has a purpose and usually a fixed size.
- file extension (file format) - In computing, a file extension is a suffix added to the name of a file to indicate the file's layout, in terms of how the data within the file is organized.
- finite state machine - Finite state machine (FSM) is a term used by programmers, mathematicians and other professionals to describe a mathematical model for any system with a limited number of conditional states of being.
- first-order logic - First-order logic (FOL) refers to logic in which the predicate of a sentence or statement can only refer to a single subject.
- flash memory card - A flash memory card -- sometimes called a storage card -- is a small storage device that uses non-volatile semiconductor memory to store data on portable or remote computing devices.
- flash storage - Flash storage is any type of drive, repository or system that uses flash memory to write and store data for an extended period.
- floating-point operations per second (FLOPS) - Floating-point operations per second (FLOPS) is a measure of a computer's performance based on the number of floating-point arithmetic calculations that the processor can perform within a second.
- flowchart - A flowchart is a formalized graphic representation of a logic sequence, work or manufacturing process, organization chart, or similar formalized structure.
- form factor - In computing, form factor refers to the size, configuration, shape, weight or physical arrangement of a computing device.
- FQA (frequently questioned answers) - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
- framework - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
- freeware - Freeware (not to be confused with free software) is a type of proprietary software that is released without charge to the public.
- full-stack developer - A full-stack developer is a type of programmer that has a functional knowledge of all techniques, languages and systems engineering concepts required in software development.
- functionality - In information technology, functionality (from Latin functio meaning "to perform") is the sum or any aspect of what a product, such as a software application or computing device, can do for a user.
- fuzzy search - A fuzzy search is a technique that uses search algorithms to find strings that match patterns approximately.
- gas - A gas is a substance that is in a gaseous, or vaporous, state of matter.
- general-purpose computer - A general-purpose computer is one that, given the application and required time, should be able to perform the most common computing tasks.
- gibibyte (GiB) - A gibibyte (GiB) is a unit of measure of capacity in computing.
- gigabit (Gb) - In data communications, a gigabit (Gb) is 1 billion bits, or 1,000,000,000 (that is, 10^9) bits.
- grayscale - Grayscale is a range of shades of gray without apparent color.
- grid computing - Grid computing is a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.
- Hamming code - Hamming code is an error correction system that can detect and correct errors when data is stored or transmitted.
- hard drive shredder - A hard drive shredder is a mechanical device that physically destroys old hard drives in such a way that the data they contain cannot be recovered.
- heuristic - As an adjective, heuristic (pronounced hyu-RIS-tik and from the Greek "heuriskein" meaning "to discover") pertains to the process of gaining knowledge or some desired result by intelligent guesswork rather than by following some preestablished formula.
- hexadecimal - Hexadecimal is a numbering system with base 16.
- hierarchy - Generally speaking, hierarchy refers to an organizational structure in which items are ranked in a specific manner, usually according to levels of importance.
- high-performance computing - High-performance computing (HPC) is the practice of using parallel data processing to improve computing performance and perform complex calculations.
- histogram - A histogram is a type of chart that shows the frequency distribution of data points across a continuous range of numerical values.
- holographic storage (holostorage) - Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.
- home server - A home server is a computer that functions as a server in a client-server home network.
- host (in computing) - A host is a computer or other device that communicates with other hosts on a network.
- hybrid application (hybrid app) - A hybrid app is a software application that combines elements of both native apps and web applications.
- hypervisor - A hypervisor is software that facilitates running multiple virtual machines (VMs) with their own operating systems on a single computer host's hardware.
- I/O (input/output) - I/O (input/output), pronounced "eye-oh," describes any operation, program or device that transfers data to or from a computer.
- ICT (information and communications technology or technologies) - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
- ICT4D (Information and Communications Technologies for Development) - ICT4D (Information and Communications Technologies for Development) is a decentralized movement dedicated to making access to digital technologies more equitable, with the goals of bridging the digital divide and advancing global economic development.
- identity management (ID management) - Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to technology resources.
- image - An image is a visual representation of something, while a digital image is a binary representation of visual data.
- image compression - Image compression is a process applied to a graphics file to minimize its size in bytes without degrading image quality below an acceptable threshold.
- implementation - Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for doing something.
- infonesia - Infonesia is an inability to remember where you saw or heard an item of information.
- information - Information is the output that results from analyzing, contextualizing, structuring, interpreting or in other ways processing data.
- information systems (IS) - An information system (IS) is an interconnected set of components used to collect, store, process and transmit data and digital information.
- information technology (IT) - Information technology (IT) is the use of computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
- inline frame (iframe) - An inline frame (iframe) is a HTML element that loads another HTML page within the document.
- instruction set - An instruction set is a group of commands for a central processing unit (CPU) in machine language.
- integer - An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number) that can be positive, negative, or zero.
- integration - Integration is the act of bringing together smaller components or information stored in different subsystems into a single functioning unit.
- intelligent system - An intelligent system is an advanced computer system that can gather, analyze and respond to the data it collects from its surrounding environment.
- interoperability - Interoperability refers to the degree to which a software system, devices, applications or other entity can connect and communicate with other entities in a coordinated manner without effort from the end user.
- interrupt request (IRQ) - An interrupt request (IRQ) is a signal sent to a computer's processor to momentarily stop (interrupt) its operations.
- ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
- iterative development - Iterative development is a way of breaking down the software development lifecycle (SDLC) of a large application into smaller chunks.
- job - In certain computer operating systems, a job is the unit of work that a computer operator -- or a program called a job scheduler -- gives to the OS.
- job step - In certain computer operating systems, a job step is part of a job, a unit of work that a computer operator (or a program called a job scheduler) gives to the operating system.
- Kbps (kilobits per second) - In the U.S.
- kelvin (K) - The kelvin (abbreviation K), less commonly called the degree Kelvin (symbol, o K), is the Standard International (SI) unit of thermodynamic temperature.
- knowledge base - In general, a knowledge base is a centralized repository of information.
- lambda - Lambda, the 11th letter of the Greek alphabet, is used as both a symbol and a concept in various fields of science, mathematics and computing.
- laser - A laser is a coherent and focused beam of photons; coherent, in this context, means that it is all one wavelength, unlike ordinary light which showers on us in many wavelengths.
- latitude and longitude - Latitude and longitude are parameters or coordinates that help determine the location of any place on Earth.
- lean manufacturing (lean production) - Lean manufacturing is a methodology that focuses on minimizing waste within manufacturing systems while simultaneously maximizing productivity.
- lights-out management (LOM) - Lights-out management (LOM) is a form of out-of-band management.
- line of sight (LOS) - Line of sight (LOS) is the imaginary line between an observer and the target.
- linearity - Linearity is the behavior of a circuit, particularly an amplifier, in which the output signal strength varies in direct proportion to the input signal strength.
- load balancing - Load balancing is a technique used to distribute network traffic across a pool of servers known as a server farm.
- localization - Localization is the process of adapting and customizing a product to meet the needs of a specific market, as identified by its language, culture, expectations, local standards and legal requirements.
- logical block addressing (LBA) - Logical block addressing (LBA) is a technique to specify the addresses of blocks of data on a storage device, such as a hard disk.
- logical equivalence - Logical equivalence is the condition of equality that exists between two statements or sentences in propositional logic or Boolean algebra.
- logical implication - Logical implication is a type of relationship between two statements or sentences.
- logical OR symbol - In mathematics, the logical OR symbol is a Boolean function that is positioned between two statements to indicate an inclusive disjunction between them.
- logon (or login) - In computing, a logon is a procedure that enables an entity to access a secure system such as an operating system, application, service, website or other resource.