Technical support

Terms related to computer fundamentals, including computer hardware definitions and words and phrases about software, operating systems, peripherals and troubleshooting.
  • m-commerce (mobile commerce) - M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.
  • magnetic stripe reader (magstripe reader) - A magnetic stripe reader, also called a magstripe reader, is a hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge.
  • management information systems (MIS) - Management information systems (MIS) is a department within an enterprise responsible for controlling the hardware and software systems that the organization uses to make business-critical decisions.
  • marcom (or marcomm) - Marcom (sometimes spelled 'marcomm') is an abbreviation for 'marketing communications.
  • Master Boot Record (MBR) - The Master Boot Record (MBR) is the information in the first sector of a hard disk or a removable drive.
  • mean time to innocence - Mean time to innocence is the average elapsed time between when a system problem is detected and any given team's ability to say the team or part of its system is not the root cause of the problem.
  • mebibyte (MiB) - A mebibyte (MiB) is a unit of measurement used in computer data storage.
  • megabits per second (Mbps) - Megabits per second (Mbps) are units of measurement for network bandwidth and throughput.
  • megabyte (MB) - A megabyte is a unit of data capacity that is equal to 1,000,000 bytes in decimal notation (base 10) or 1,048,576 bytes in binary notation (base 2).
  • memory - Memory is the electronic holding place for the instructions and data a computer needs to reach quickly.
  • memory dump - A memory dump is the process of taking all information content in RAM and writing it to a storage drive as a memory dump file (*.
  • metered services (pay-per-use) - Metered services (also called pay-per-use) are any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.
  • microsecond - A microsecond (us or Greek letter mu plus s) is one millionth (10 -6) of a second.
  • Microsoft Remote Desktop Web Access (Microsoft RD Web Access) - Microsoft Remote Desktop Web Access (Microsoft RD Web Access) is a Remote Desktop Services role in some versions of the Windows Server OS.
  • middleware - Middleware is software that bridges the gap between applications and operating systems by providing a method for communication and data management.
  • MIDI (Musical Instrument Digital Interface) - Musical Instrument Digital Interface (MIDI) is a standard to transmit and store music, originally designed for digital music synthesizers.
  • mobile device - A mobile device is essentially a portable, handheld computer that enables users to access information, perform tasks and connect with other people and devices.
  • modeling and simulation (M&S) - Modeling and simulation (M&S) is the use of a physical or logical representation of a given system to generate data and help determine decisions or make predictions about the system.
  • molecule - A molecule is two or more atoms connected by chemical bonds, which form the smallest unit of a substance that retains the composition and properties of that substance.
  • most significant bit (MSB) - The most significant bit (MSB) is the bit in a multiple-bit binary number with the largest value.
  • motherboard - A motherboard is the main printed circuit board (PCB) in a computer.
  • MP3 (MPEG-1 Audio Layer 3) - MP3 (MPEG-1 Audio Layer 3) is a method to compress and store audio.
  • mu - The lowercase Greek letter µ (pronounced mu) generally represents the prefix multiplier 0.
  • multicore processor - A multicore processor is an integrated circuit that has two or more processors attached for enhanced performance and reduced power consumption.
  • multiprocessing - Multiprocessing is the utilization of two or more central processing units (CPUs) in a single computer system.
  • NACK (NAK, negative acknowledgment, not acknowledged) - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
  • nanosecond (ns or nsec) - A nanosecond (ns or nsec) is one-billionth (10-9) of a second.
  • native app - A native application is a software program developers build for use on a particular platform or device.
  • native code - Native code is binary data compiled to run on a processor, such as an Intel x86-class processor.
  • nearline storage - Nearline storage is the on-site storage of data on removable media.
  • nearshore outsourcing - Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than an organization's country.
  • network availability - Network availability is the amount of uptime in a network system over a specific time interval.
  • network protocol - A network protocol is a set of established rules that specify how to format, send and receive data so that computer network endpoints, including computers, servers, routers and virtual machines, can communicate despite differences in their underlying infrastructures, designs or standards.
  • neuromarketing - Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically monitoring brainwave activity, eye tracking and skin response.
  • nibble - In computing and digital technology, a nibble is four consecutive binary digits or half of an 8-bit byte.
  • nil - In general use, nil (a contraction of Latin "nihil") means "nothing" or the absence of something.
  • null set - In mathematical sets, a null set is a set that does not contain any values or elements.
  • OEM (original equipment manufacturer) - OEM, or original equipment manufacturer, is a broad term that describes a web of relationships among IT hardware vendors, hardware component makers, software vendors and channel partners such as resellers and distributors.
  • ohnosecond - An ohnosecond is that very short moment in time during which you realize that you have pressed the wrong key and deleted hours, days, or weeks of work.
  • on-demand computing (ODC) - On-demand computing (ODC) is a delivery model in which computing resources are made available to the user as needed.
  • onshore outsourcing (domestic outsourcing) - Onshore outsourcing, also known as domestic outsourcing, is the obtaining of services from someone outside a company but within the same country.
  • open system - In computing, an open system is a platform that can be modified and extended and has freely available documentation.
  • operand - In computing and mathematics, an operand is an object that is operated on by some type of operator.
  • operation (computing) - An operation, in computing, is an action that is carried out to accomplish a given task.
  • operations research (OR) - Operations research (OR) is an analytical method of problem-solving and decision-making that is useful in the management of organizations.
  • outsourcing - Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services for the company.
  • pagefile - In storage, a pagefile is a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently.
  • pascal - The pascal (Pa) is the unit of pressure or stress in the International System of Units (SI).
  • patch catalog - A patch catalog is a repository of data associated with software patches.
  • PC card - A PC card, also known as a PCMCIA card, is a credit card-sized memory or input/output (I/O) device that fits into a PC, usually a laptop.
  • personality profile - A personality profile is a knowledge management tool used to provide an evaluation of an employee's personal attributes, values and life skills in an effort to maximize his or her job performance and contribution to the company.
  • pervasive computing (ubiquitous computing) - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
  • petaflop - A petaflop is a measure of a computer's processing speed and can be expressed as a quadrillion (thousand trillion) floating point operations per second (FLOPS).
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • physical security - Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution.
  • pipelining - Pipelining is the process of storing and prioritizing computer instructions that the processor executes.
  • pixel - The pixel -- a word invented from picture element -- is the basic unit of programmable color on a computer display or in a computer image.
  • Planck's constant - Planck's constant, symbolized as h, is a fundamental universal constant that defines the quantum nature of energy and relates the energy of a photon to its frequency.
  • portal - Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site.
  • POST (Power-On Self-Test) - A Power-On Self-Test (POST) is an operation initiated by a computer after it has been turned on but before it boots up the OS.
  • printed circuit board (PCB) - A printed circuit board (PCB) is a structure for assembling electronic components and their connections into a unified circuit that allows electrical current to pass between components.
  • problem program - Now seldom used, the term problem program is used to distinguish a computer program that directly supports a user application from an operating system, a utility, or any other underlying support programming.
  • process hollowing - Process hollowing is a security exploit in which an attacker removes code in an executable file and replaces it with malicious code.
  • program - In computing, a program is a specific set of ordered operations for a computer to perform.
  • project management - Project management is the discipline of using established principles, procedures and policies to guide a project from conception through completion.
  • Project planning: What it is and 5 steps to create a plan - Project planning is a project management discipline that addresses how to complete a project in a certain time frame, usually with clearly defined stages, milestones and designated resources.
  • propagation delay - Propagation delay is the amount of time required for a signal to be received after it has been sent; it is caused by the time it takes for the signal to travel through a medium.
  • prototype - A prototype is an early version of a product from which future versions are developed.
  • pseudo-random number generator (PRNG) - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • pulse amplitude modulation (PAM) - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.
  • Q format - Q (number) format is a fixed-point method of coding fractional and whole integers for processing by a computer’s CPU or a digital signal processor (DSP).
  • quantum interference - Quantum interference is when subatomic particles interact with and influence themselves and other particles while in a probabilistic superposition state.
  • quantum internet - The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.
  • quantum supremacy - Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classical computers by performing calculations previously impossible at unmatched speeds.
  • quantum theory - Quantum theory is the theoretical basis of modern physics that explains the nature and behavior of matter and energy on the atomic and subatomic level.
  • qubit (short for quantum bit) - A qubit (short for quantum bit) is the basic unit of information in quantum computing and counterpart to the bit (binary digit) in classical computing.
  • random numbers - As the term suggests, a random number is a number chosen by chance -- i.
  • raw data (source data or atomic data) - Raw data is the data originally generated by a system, device or operation, and has not been processed or changed in any way.
  • read-only - Read-only is a file attribute which only allows a user to view a file, restricting any writing to the file.
  • read-only memory (ROM) - Read-only memory, or ROM, is a type of computer storage containing non-volatile, permanent data that, normally, can only be read, not written to.
  • real-time monitoring - Real-time monitoring is the delivery of continuously updated data about systems, processes or events.
  • reseller - In information technology, a reseller is a company that typically purchases IT products or services from a product manufacturer, distributor or service provider and then markets them to customers.
  • resolution - Resolution is the number of pixels -- picture elements or individual points of color -- that can be contained on a display screen or in a camera sensor.
  • return merchandise authorization (RMA) - An RMA (return merchandise authorization) is a numbered authorization provided by a mail-order or e-commerce merchant to permit the return of a product.
  • reverse-engineering - Reverse-engineering is the act of dismantling an object to see how it works.
  • RGB (red, green and blue) - RGB (red, green and blue) refers to a system representing the colors used on a digital display screen.
  • RISC (reduced instruction set computer) - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of computer instruction types, so it can operate at a higher speed, performing more millions of instructions per second, or MIPS.
  • RMM software (remote monitoring and management software) - RMM software (remote monitoring and management software) is a type of application that information technology (IT) service providers and departments use to maintain their clients' and business organizations' IT assets, infrastructure and systems.
  • robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • root cause analysis - Root cause analysis (RCA) is a method for understanding the underlying cause of an observed or experienced incident.
  • runbook - Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company.
  • S-Video (Super-Video, Y/C Video, component video) - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
  • Sarbanes-Oxley Act - The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.
  • scalability - In information technology, scalability (frequently spelled 'scaleability') has two uses: for a computer application to function with change in size and volume, and to take advantage of a rescale.
  • Schrodinger's cat - Schrödinger's cat is a famous hypothetical experiment designed to point out a flaw in the Copenhagen interpretation of superposition as it applies to quantum theory.
  • scientific method - The scientific method is the process of objectively establishing facts through testing and experimentation.
  • search operator - A search operator -- sometimes referred to as a search parameter -- is a character or string of characters used in a search engine query to narrow the focus of the search.
  • second (s or sec) - The second (s or sec) is the International System of Units (SI) unit of time measurement.
  • sensor - A sensor is a device that detects and responds to some type of input from the physical environment.
  • server stack - A server stack is the collection of software that forms the operational infrastructure on a given machine.