Technical support

Terms related to computer fundamentals, including computer hardware definitions and words and phrases about software, operating systems, peripherals and troubleshooting.
  • Sysprep (System Preparation Tool) - Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.
  • system administrator (sysadmin) - A system administrator (sysadmin) is an information technolog professional who supports a multiuser computing environment and ensures continuous, optimal performance of IT services and support systems.
  • systems thinking - Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.
  • TCO (total cost of ownership) - Total cost of ownership (TCO) is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment.
  • tebibyte (TiB) - A tebibyte (TiB) is a unit of measure used to describe computing capacity.
  • technical requirements - Technical requirements, in the context of software development and systems engineering, are the factors required to deliver a desired function or behavior from a system to satisfy a user’s standards and needs.
  • technological convergence - Technological convergence is a term that describes bringing previously unrelated technologies together, often in a single device.
  • telecommuting - Telecommuting allows an employee to complete work assignments from outside the traditional workplace using telecommunications tools such as email, phone, chat and video apps.
  • template - A template is a form, mold or pattern used as a guide to make something.
  • Terabyte (TB) - A terabyte (TB) is a unit of digital data that is equal to about 1 trillion bytes.
  • theory of relativity - Albert Einstein's theory of relativity is actually two separate theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics of Moving Bodies and his theory of general relativity, an expansion of the earlier theory, published as The Foundation of the General Theory of Relativity in 1916.
  • token - In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient.
  • Total Quality Management (TQM) - Total Quality Management (TQM) is a management framework based on the belief that an organization can build long-term success by having all its members -- from low-level workers to its highest-ranking executives -- focus on improving quality and, thus, delivering customer satisfaction.
  • touch screen - A touch screen is an electronic display screen that is also an input device.
  • troubleshooting - Troubleshooting is a systematic approach to problem-solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • truncation error - A truncation error is the difference between an actual and a truncated, or cut-off, value.
  • truth table - A truth table is a breakdown of all the possible truth values returned by a logical expression.
  • unzipping - Unzipping is the act of extracting the files from a zipped single file or similar file archive.
  • uptime and downtime - In computing, uptime is a measure of how long a computer or service is on and available.
  • user group - In personal or business computing, a user group is a set of people who have similar interests, goals or concerns.
  • utility computing - Utility computing is a service provisioning model where a provider makes computing resources, infrastructure management and technical services available to customers as they need them.
  • value chain - A value chain is a concept describing the full chain of a business's activities in creating a product or service -- from initial receipt of materials through its delivery to market.
  • value-added reseller (VAR) - A value-added reseller (VAR) is a company that resells software, hardware, and other products and services that provide value beyond the original order fulfillment.
  • vendor - A vendor is an individual or company that sells goods or services to somone else in the economic production chain.
  • virtual - In computing, the term virtual refers to a digitally replicated version of something real, whether it's a machine, a switch, memory or even reality.
  • virtual reality sickness (VR motion sickness) - Virtual reality sickness (VR motion sickness) is the physical discomfort that occurs when an end user's brain receives conflicting signals about self-movement in a digital environment.
  • volatile - In general, volatile (from the Latin "volatilis" meaning "to fly")is an adjective used to describe something unstable or changeable.
  • volatile memory - Volatile memory is a type of memory that maintains its data only while the device is powered.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • wall time - Wall time, also called real-world time, clock time, wall-clock time or -- more accurately -- elapsed real time, is the amount of time that a program or process takes to run from start to finish as measured by a person.
  • Waste Electrical and Electronic Equipment (WEEE) Directive - The Waste Electrical and Electronic Equipment (WEEE) Directive is a legislative act that the European Union adopted to address the growing amounts of e-waste that come from electrical and electronic equipment (EEE) at the end of its life.
  • webmaster - A webmaster is someone who creates and manages the content and organization of a website, manages the computer server and technical programming aspects of a website, or does both.
  • What are COTS, MOTS, GOTS and NOTS? - COTS, MOTS, GOTS and NOTS are abbreviations that describe prepackaged software or -- less commonly -- hardware purchase alternatives.
  • What are metered services and how do they work? - Metered services (also called pay-per-use and consumption-based pricing) are any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they use.
  • What is a 3-tier application architecture? - A three-tier application architecture is a modular client-server architecture that consists of a presentation tier, an application tier and a data tier.
  • What is a balanced scorecard and how does the methodology work? - The balanced scorecard is a management system aimed at translating an organization's strategic goals into a set of organizational performance objectives that, in turn, are measured, monitored, and changed, if necessary, to ensure that organizational goals are met.
  • What is a checksum? - A checksum is a value that represents the number of bits in a transmission message.
  • What is a cloud architect and how do you become one? - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy.
  • What is a collaborative robot (cobot)? - A collaborative robot, also known as a cobot, is an industrial robot that can safely operate alongside humans in a shared workspace.
  • What is a complementary metal-oxide semiconductor (CMOS)? - A complementary metal-oxide semiconductor (CMOS) is the semiconductor technology used in most of today's integrated circuits (ICs), also known as chips or microchips.
  • What is a disaster recovery plan (DRP)? - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume operations after an unplanned incident.
  • What is a farad (F)? - A farad (F) is the standard unit of electrical capacitance (C) in the International System of Units.
  • What is a framework? - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
  • What is a motherboard? - A motherboard is the main printed circuit board (PCB) in a computer.
  • What is a server? - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
  • What is a supercomputer? - A supercomputer is a highly advanced computer that performs at or near the highest operational rate for computers.
  • What is a unique identifier (UID)? - A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.
  • What is a word in computing architecture? - In computing architecture, a word is a fixed unit of data containing a specific number of bits that can be addressed and moved between storage and the computer processor.
  • What is an API (application programming interface)? - An application programming interface (API) is code that enables two software programs to communicate.
  • What is an embedded system? - An embedded system is a combination of computer hardware and software designed for a specific function.
  • What is an entrepreneur (entrepreneurship)? - An entrepreneur is an individual who identifies a need in the marketplace and works to fulfill it.
  • What is an information system (IS)? - An information system (IS) is an interconnected set of components used to collect, store, process and transmit data and digital information.
  • What is asynchronous? - In general, asynchronous -- from Greek asyn- ('not with/together') and chronos ('time') -- describes objects or events not coordinated in time.
  • What is black box testing? - Black box testing assesses a system solely from the outside, without the operator or tester knowing what's happening within the system to generate responses to test actions.
  • What is brain-computer interface (BCI)? - Brain-computer interface (BCI) is a device that translates signals in the brain to control some external activity.
  • What is call management? - Call management is a process in which inbound telephone calls are routed to call center agents.
  • What is computer memory and what are the different types? - Memory is the electronic holding place for the instructions and data a computer needs to reach quickly.
  • What is continuous data protection (CDP)? - Continuous data protection (CDP), also known as 'continuous backup,' is a backup and recovery storage system in which all the data in an enterprise is backed up whenever any change is made.
  • What is cryptography? - Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is intended can read and process it.
  • What is cyberstalking and how to prevent it? - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
  • What is data? - In computing, data is information translated into a form that is efficient for movement or processing.
  • What is DOS (Disk Operating System)? - A DOS, or disk operating system, is an operating system (OS) that runs from a disk drive.
  • What is electronic data processing (EDP)? - Electronic data processing (EDP) refers to the gathering of data using electronic devices, such as computers, servers and internet of things (IoT) technologies.
  • What is first call resolution (FCR)? - First call resolution (FCR) is when contact center agents properly address a customer's needs the first time they call so there is no need for the customer to follow up with a second call.
  • What is hexadecimal numbering? - Hexadecimal is a numbering system that uses a base-16 representation for numeric values.
  • What is ICT (information and communications technology)? - ICT (information and communications technology) is the infrastructure and components that enable modern computing.
  • What is Jira? - Jira is an application lifecycle management (ALM) and Agile project management tool from Atlassian.
  • What is machine code (machine language)? - Machine code, also known as ‘machine language’ or ‘native code,’ is the elemental language of computers.
  • What is matter? - Matter is a substance made up of various types of particles that occupies physical space and has inertia.
  • What is memory management in a computer environment? - Memory management is the process of controlling and coordinating a computer's main memory.
  • What is nearshore outsourcing and how does it work? - Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than an organization's own country.
  • What is parallel processing? - Parallel processing is a method in computing of running two or more processors, or CPUs, to handle separate parts of an overall task.
  • What is parity in computing? - In computers, parity (from the Latin paritas, meaning "equal or equivalent") is a technique that checks whether data has been lost or written over when it is moved from one place in storage to another or when it is transmitted between computers.
  • What is patch management? Lifecycle, benefits and best practices - Patch management is the subset of systems management that involves identifying, acquiring, testing and installing patches, or code changes, that are intended to fix bugs, close security holes or add features.
  • What is pharming? - Pharming is a scamming practice in which malicious code is installed on a PC or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • What is physical security and how does it work? - Physical security protects personnel, hardware, software, networks, facilities and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution.
  • What is pipelining? - Pipelining is the process of a computer processor executing computer instructions as separate stages.
  • What is quantum computing? How it works and examples - Quantum computing is an area of computer science focused on the development of computers based on the principles of quantum theory.
  • What is quantum superposition? - Quantum superposition is the ability of a quantum system to act as if it is in multiple states at the same time until it is measured.
  • What is quantum theory? - Quantum theory, or quantum mechanics, is the theoretical basis of modern physics that explains the nature and behavior of matter and energy on the subatomic level.
  • What is read-only memory (ROM)? - Read-only memory, or ROM, is a type of computer storage containing non-volatile, permanent data that normally can only be read, not written to.
  • What is ROI? How to calculate return on investment - Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or compare the efficiencies of several different investments.
  • What is root cause analysis? - Root cause analysis (RCA) is a method for understanding the underlying cause of an observed or experienced incident.
  • What is server virtualization? The ultimate guide - Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.
  • What is Six Sigma and how does it work? - Six Sigma is a business methodology for quality improvement that measures how many defects there are in a current process and seeks to systematically eliminate them.
  • What is SRAM (static random access memory)? - SRAM (static RAM) is a type of random access memory (RAM) that retains data bits in its memory as long as power is being supplied.
  • What is system software? - System software is a type of computer program designed to run a computer's hardware and application programs.
  • What is the 11th dimension in M-theory? - The 11th dimension is a characteristic of spacetime that has been proposed as a possible answer to questions that arise in superstring theory.
  • What is the blue screen of death (BSOD)? - The blue screen of death (BSOD) -- also known as a stop error screen, blue screen error, fatal error or bugcheck -- is a critical error screen that can be displayed by Microsoft Windows operating systems (OSes).
  • What is the double-slit experiment? - The double-slit experiment is a 19th century investigation into the properties of light that has since been found to demonstrate the wave-particle duality of photons, electrons and other particle types, as well as other quantum properties, such as superposition and interference.
  • What is the Turing Test? - A Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.
  • What is throughput? - Throughput is a measure of how many units of information a system can process in a given amount of time.
  • What is virtual reality? How it's used and how it will evolve - Virtual reality, or VR, is a simulated three-dimensional (3D) environment that lets users explore and interact with a virtual surrounding in a way that approximates reality, as it's perceived through the users' senses.
  • What is web application (web apps) and its benefits? - A web application (web app) is an application program that is stored on a remote server and delivered over the internet through a browser interface.
  • white paper - A white paper is an authoritative, research-based document that presents information, expert analysis and an organization or author's insight into a topic or solution to a problem.
  • Wi-Fi range extender (range expander) - A Wi-Fi range extender is a network device used to increase the effective range of a wireless network.
  • Windows Imaging Format (WIM) - Windows Imaging Format (WIM) is used for the creation and distribution of disk image files.
  • workload - In computing, a workload is typically any program or application that runs on a computer.
  • x86-64 - x86-64 (also called x86_64, x64, or amd64) is the 64-bit CPU architecture that is used in Intel and AMD processors.
  • yottabyte (YB) - A yottabyte (YB) is a measure of theoretical storage capacity and data volumes equal to 2 to the 80th power bytes, or approximately a million trillion megabytes (MB).