Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.
  • cursor - A cursor is the position indicator on a computer display screen where a user can enter text.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • cyberbullying - Cyberbullying is a type of bullying in which one or more individuals use digital technologies to intentionally and repeatedly cause harm to another person.
  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • cyberstalking - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
  • cyberterrorism - Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence.
  • CYOD (choose your own device) - CYOD (choose your own device) is an employee provisioning model in which an organization allows people to select the mobile devices they would like, usually from a limited number of options.
  • data plan (mobile data plan) - A data plan is an agreement between a mobile carrier and a customer that specifies how much mobile data the user can access, usually per month, for a specific fee on a carrier network.
  • data source name (DSN) - A data source name (DSN) is a data structure containing information about a specific database to which an Open Database Connectivity (ODBC) driver needs to connect.
  • database availability group (DAG) - A database availability group (DAG) is a high availability (HA) and data recovery feature of Exchange Server 2010.
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • deep web - The deep web is an umbrella term for parts of the internet not fully accessible through standard search engines like Google, Bing and Yahoo.
  • default password - A default password is a standard preconfigured password for a device or software.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • degrees of freedom (mechanics) - In mechanics, degrees of freedom (DOF) is the number of independent variables that define the possible positions or motions of a mechanical system in space.
  • desktop - A desktop is a computer display area that represents the kinds of objects found on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop publishing (DTP) - Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.
  • device as a service (DaaS) - The device as a service (DaaS) model offers PCs, smartphones and other mobile computing devices as a paid service.
  • device-agnostic (device agnosticism) - Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an IP address to any device, or node, on a network so it can communicate using IP.
  • digiboard (or digicard) - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digital citizenship - Digital citizenship is the online presence, behaviors and response to others within a digital community where one is a member.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital footprint - A digital footprint -- sometimes called a digital shadow -- is the body of data that an individual creates through their actions online.
  • digital native - A digital native is a person who grew up with the presence of digital technology or in the information age.
  • digital self-harm - Digital self-harm is targeting oneself with negative content online.
  • digital tattoo - With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip.
  • digital television (DTV) - Digital television (DTV) is the transmission of television signals using a digital broadcast format rather than conventional analog methods.
  • digital video - Digital video is audio/visual content in a binary format, with information presented as a sequence of digital data rather than in a continuous signal as analog information is.
  • digital wallet - In general, a digital wallet is a software application, usually for a smartphone, that serves as an electronic version of a physical wallet.
  • digitization - Digitization is the process of converting information into a digital format.
  • direct email marketing - Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of recipients.
  • Direct Memory Access (DMA) - Direct Memory Access (DMA) is a capability provided by some computer bus architectures that enables data to be sent directly from an attached device to the computer's main memory.
  • display - In computing, a display is a device with a screen that shows a rendered electronic image made up of pixels that are illuminated in a way that distinguishes text and graphic elements.
  • DisplayPort - DisplayPort is an interface for digital displays, particularly computer monitors.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distributed applications (distributed apps) - Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms.
  • distributed learning - Distributed learning is a general term used to describe a multi-media method of instructional delivery that includes a mix of Web-based instruction, streaming video conferencing, face-to-face classroom time, distance learning through television or video, or other combinations of electronic and traditional educational models.
  • distribution list - In email applications, a distribution list is a list of email addresses that can be mass mailed via automation without having to add members individually.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • domain - Specific to the internet, the term domain can refer to how the internet is structured, and domain also refers to how an organization's network resources are organized.
  • domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • downloading - Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
  • DRAM (dynamic random access memory) - DRAM (dynamic random access memory) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • dual SIM phone - A dual SIM phone is a mobile phone, typically a smartphone, with the capacity to use two subscriber identity module (SIM) cards.
  • DuckDuckGo - DuckDuckGo is an independent company that offers products geared toward internet privacy.
  • dumpster diving - Dumpster diving is looking for treasure in someone else's trash.
  • dynamic IP address - A dynamic IP address is a temporary address for devices connected to a network that will continually change over time.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • e-procurement (supplier exchange) - Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.
  • Echo Show - The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant.
  • EEPROM (electrically erasable programmable read-only memory) - EEPROM (electrically erasable programmable read-only memory) is a user-modifiable ROM.
  • email - Email (electronic mail) is the exchange of computer-stored messages from one user to one or more recipients via the internet.
  • email archiving - Email archiving is a systematic approach to saving and protecting the data contained in emails to enable fast retrieval.
  • email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
  • email signature - An email signature -- or signature block or signature file -- is the short text that appears at the end of an email message to provide more information about the sender.
  • email virus - An email virus consists of malicious code distributed in email messages to infect one or more devices.
  • empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • enterprise file sync and share (EFSS) - Enterprise file sync and share (EFSS) is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.
  • enterprise mobility - Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.
  • EPROM (erasable programmable read-only memory) - EPROM (erasable programmable read-only memory) is memory that does not lose its data when the power supply is cut off.
  • evil twin attack - An evil twin attack is a rogue Wi-Fi access point (AP) that masquerades as a legitimate one, enabling an attacker to gain access to sensitive information without the end user's knowledge.
  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC), introduced by Microsoft in 2007, is an administrative tool with a graphical user interface (GUI) that's used to manage the components and resources of Microsoft Exchange Server.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • executable file (EXE file) - An executable file (EXE file) is a computer file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • extranet - An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
  • Facebook - Facebook is a social networking website that was founded in February 2004 by Harvard University students Chris Hughes, Andrew McCollum, Dustin Moskovitz, Eduardo Saverin and Mark Zuckerberg.
  • Facebook Connect - Facebook Connect is a single sign-on application which allows users to interact on other websites through their Facebook account.
  • Facebook Messenger - Facebook Messenger is a mobile app that enables chat, voice and video communications between Facebook web-based messaging and smartphones.
  • Facebook Mobile - Facebook Mobile is a feature that allows a user to access Facebook from their cell phone through text messages, e-mails, downloaded applications or a web browser.
  • Facebook page - A Facebook page is a public profile specifically created for businesses, brands, celebrities, causes, and other organizations.
  • FaceTime - FaceTime is a proprietary video and audio calling service developed by Apple Inc.
  • fault tolerance - Fault tolerance is the capability of a system to deliver uninterrupted service despite one or more of its components failing.
  • FDISK - FDISK is a disk utility included in all versions of MS-DOS, Windows and Linux for formatting or partitioning a hard disk drive, or to delete different portions of it.
  • Feature Manipulation Engine (FME) - The Feature Manipulation Engine (FME) is a platform that streamlines the translation of spatial data between geometric and digital formats.
  • Fedora - Fedora, also known as Fedora Linux, is a popular open source Linux-based operating system (OS).
  • Fermi paradox - The Fermi paradox is the apparent conflict between the fact that humans have found no evidence of intelligent extraterrestrial life despite the probablity that it exists, given what we know about the universe.
  • field of view (FOV) - Field of view (FOV) is the open, observable area a person can see through their eyes or via an optical device, such as a camera.
  • File Allocation Table (FAT) - File Allocation Table (FAT) is a file system that Microsoft developed to support small disks and simple folder structures.
  • FileZilla - FileZilla is a free, open source, file transfer protocol (FTP) software tool.
  • filter (computing) - The term filter in computing can mean a variety of things, depending on the technology or technical discipline in question.
  • filter bubble - A filter bubble is an algorithmic bias that skews or limits the information an individual user sees on the internet.
  • Firefox - Firefox is a free, open source web browser developed by the Mozilla Foundation and Mozilla Corporation in 2004.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • font - The word 'font' refers to a set of printable or displayable typography or text characters in a specific style and size.
  • for your information (FYI) - In both chat acronyms and in IT acronyms, FYI is the abbreviation for 'for your information.
  • FPV drone (first-person view drone) - An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.
  • FQA (frequently questioned answers) - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
  • FUBAR - FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair.
  • fuzzy search - A fuzzy search is a technique that uses search algorithms to find strings that match patterns approximately.
  • gaming - Gaming is playing an electronic video game, which is often done on a dedicated gaming console, PC or smartphone.
  • gaming disorder - Gaming disorder is the obsessive and compulsive overuse of internet games and video games as an escape from life, resulting in the prioritization of gaming over daily activities and interests and the continuation of gaming despite the negative consequences that may occur.
  • general-purpose computer - A general-purpose computer is one that, given the application and required time, should be able to perform the most common computing tasks.
  • glyph - In information technology, a glyph -- from a Greek word meaning carving -- is a graphic symbol that provides the appearance or form for a character.