Personal computing
Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.- timeline - A timeline is a visual representation of a chronological sequence of events along a drawn line that helps a viewer understand time relationships.
- TL;DR (too long; didn't read) - TL;DR is an abbreviation for "too long; didn't read.
- ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.
- Top 10 spyware threats - The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool.
- Tor browser - The Tor (the onion routing) browser is a web browser designed for anonymous web surfing and protection against traffic analysis.
- touch screen - A touch screen is an electronic display screen that is also an input device.
- trackball - A trackball is a computer cursor control device used in many laptop computer keyboards and older versions of computer mice.
- TrackPoint (pointing stick) - A TrackPoint, also called a pointing stick, is a cursor control device found in Lenovo ThinkPad notebook computers.
- tweet - A tweet is a post on Twitter.
- Twitter - Twitter is a free social networking site where users broadcast short posts known as tweets.
- U (measurement) - A U is a standard unit of measure for designating the height in computer enclosures and server rack cabinets.
- UDDI (Universal Description, Discovery and Integration) - UDDI, or Universal Description, Discovery and Integration, is an Extensible Language Markup (XML)-based standard to describe, publish and find information about web services.
- Ultra High-Definition TV (UHDTV) - Ultra-high-definition (UHD) television, also abbreviated UHDTV, is a digital television display format in which the horizontal screen resolution is on the order of 4000 pixels (4K UHD) or 8000 pixels (8K UHD).
- uncanny valley - The uncanny valley is a common unsettling feeling people experience when androids or humanoid robots and audio/visual simulations closely resemble humans in many respects but aren't quite convincingly realistic.
- unified communications (UC) - Unified communications (UC) is an umbrella term for the integration of multiple enterprise communication tools -- such as voice calling, video conferencing, instant messaging (IM), presence and content sharing -- into a single, streamlined interface, with the goal of improving user experience (UX) and productivity.
- Uniform Resource Identifier (URI) - A Uniform Resource Identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.
- Universal Naming Convention (UNC) - The Universal Naming Convention (UNC) is a standard for naming resources -- such as files and devices -- that are shared by computers on a network.
- uploading - Uploading is the transmission of data from a local device to a remote device.
- URN (Uniform Resource Name) - A URN (Uniform Resource Name) is a permanent identifier for internet resources that employs the urn scheme.
- USB 3.0 (SuperSpeed USB) - USB 3.0 is a Universal Serial Bus (USB) data transfer standard that is backwards compatible with USB 2.
- USB-C - USB-C, or Universal Serial Bus Type-C, is a standard connection type for mobile and portable devices.
- User Principal Name (UPN) - In Microsoft Active Directory, a User Principal Name (UPN) is a username and domain in an email address format.
- Uuencode (Uuencode/Uudecode) - Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network.
- vector graphics - Vector graphics are computer images created through a sequence of commands or mathematical statements that place lines and shapes in a two-dimensional or three-dimensional space.
- Viber - Viber is a VoIP and instant messaging application with cross-platform capabilities that allows users to exchange audio and video calls, stickers, group chats, and instant voice and video messages.
- video streaming service - A video streaming service is an on-demand online entertainment source for TV shows, movies and other streaming media.
- Vimeo - Vimeo is a U.
- virtual asset - A virtual asset is a digital representation of an item that has value in a specific environment.
- virtual classroom - A virtual classroom is an online learning environment.
- virtual reality cloud (VR cloud) - Virtual reality cloud is the application of cloud computing to create VR environments and experiences.
- virtual reality gaming (VR gaming) - Virtual reality gaming (VR gaming) is the application of a three-dimensional (3D) artificial environment to computer games.
- virtual reality sickness (VR motion sickness) - Virtual reality sickness (VR motion sickness) is the physical discomfort that occurs when an end user's brain receives conflicting signals about self-movement in a digital environment.
- vishing (voice or VoIP phishing) - Vishing (voice or VoIP phishing) is a type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data to unauthorized entities.
- visitor-based networking (visitor-based network) - Visitor-based networking (VBN) is a computer network with high-speed internet access provided by an organization for temporary use by visitors, guests or other users in a public area.
- von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
- VR locomotion (virtual reality locomotion) - VR locomotion is technology that enables movement from one place to another (locomotion) within a virtual reality environment.
- walled garden - On the internet, a walled garden is an environment that controls the user's access to network-based content and services.
- WAN (wide area network) - A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local area networks (LANs).
- war driving (access point mapping) - War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks (WLANs) while driving around a city or elsewhere.
- water cooling - Water cooling, also called liquid cooling, is a method used to lower the temperature of computer processor units (CPUs), and sometimes graphics processor units (GPUs).
- wearable computer - A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.
- wearable technology - Wearable technology is any kind of electronic device designed to be worn on the user's body.
- Web 2.0 - Web 2.0 are websites and applications that make use of user-generated content for end users.
- WebGL - WebGL is a graphics application programming interface (API) created for use in web applications.
- weblog - A blog, short for weblog, is a frequently updated web page used for personal commentary or business content.
- webOS - WebOS is an LG-owned, Linux-based operating system for smart devices, particularly smart TVs.
- What are Internet data caps and why do providers use them? - A data cap, also known as a bandwidth cap, is a limit that service providers impose on the amount of data a user account can transfer at a specified level of throughput over a given time period, for a specified fee.
- What are port numbers and how do they work? - A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
- What is a cloud access security broker (CASB)? - A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
- What is a command prompt? - A command prompt is the input field in a text-based user interface screen for an operating system (OS) or program.
- What is a Consensus Algorithm? - A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
- What is a device driver? - A device driver, or driver, is a special kind of software program that controls a specific hardware device attached to a computer.
- What is a drone (UAV)? - A drone is an unmanned aircraft.
- What is a microcomputer? - A microcomputer is a complete computer on a small scale, designed for use by one person at a time.
- What is a motherboard? - A motherboard is the main printed circuit board (PCB) in a computer.
- What is a personal area network (PAN)? - A personal area network (PAN) is a small network that interconnects technology devices within a limited range of just a few meters.
- What is a Request for Comments (RFC)? - A Request for Comments (RFC) is a formal document created by the Internet Engineering Task Force (IETF) that outlines technical specifications, organizational notes and standards relevant to internet and networking technologies, including protocols such as routing, addressing and transport technologies.
- What is a server? - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
- What is a spam trap? - A spam trap is an email address that's used to identify and monitor spam email.
- What is a thin client (lean client)? - A thin client (lean client) is a virtual desktop computing model that runs on the resources stored on a central server instead of a computer's resources.
- What is a third-party cookie? - A third-party cookie is a cookie that's placed on a user's device -- computer, cellphone or tablet -- by a website from a domain other than the one the user is visiting.
- What is a URL (Uniform Resource Locator)? - A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet.
- What is a web server? - A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web.
- What is acceptable use policy (AUP)? - An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to or use of a corporate network, the internet or other computing resources.
- What is AMD Ryzen? - AMD Ryzen is the brand name for Advanced Micro Devices' line of desktop and mobile processors.
- What is an AI assistant? - An AI assistant, or digital assistant, is software that uses artificial intelligence to understand natural language voice commands and complete tasks for the user.
- What is an inbound call? - An inbound call is typically initiated by a customer to a call center or contact center.
- What is an operating system (OS)? - An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all the other application programs in a computer.
- What is an uninterruptible power supply (UPS)? - An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time when incoming power is interrupted.
- What is ASCII (American Standard Code for Information Interchange)? - ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data in computers and on the internet.
- What is Bluesky? - Bluesky is an open source social media platform -- similar to X, formerly Twitter -- allowing users to create posts with a 300-character limit, which can include text, photos or videos.
- What is CAD (computer-aided design)? - CAD (computer-aided design) is the use of computer-based software to aid in design processes by creating simulations of real-world objects.
- What is challenge-response authentication? - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs and activities.
- What is customer self-service? - Customer self-service is digital support that lets end users access information and perform routine tasks without requiring the assistance of live agents or representatives.
- What is cyberstalking and how to prevent it? - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
- What is email spam and how to fight it? - Email spam, also known as 'junk email,' refers to unsolicited email messages, usually sent in bulk to a large list of recipients.
- What is File Allocation Table (FAT)? - File Allocation Table (FAT) is a file system that was developed by Microsoft to support small disks and simple folder structures.
- What is FTP? - File Transfer Protocol (FTP) is a network protocol for transmitting files between computers over TCP/IP connections.
- What is geolocation? Explaining how geolocation data works - Geolocation technology identifies physical locations of devices and individuals based on information such as geographic coordinates and internet protocol addresses (IP address).
- What is Google Glass? - Google Glass was a wearable, voice and motion-controlled Android device that resembled a pair of eyeglasses and displayed information directly in the user's field of vision.
- What is Group Policy Object (GPO) and why is it important? - Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.
- What is hacktivism? - Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason.
- What is HTTP and how does it work? Hypertext Transfer Protocol - HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files -- such as text, images, sound, video and other multimedia files -- over the web.
- What is image metadata and how is it used? - Image metadata is text information pertaining to an image file that is embedded into the file or saved to a separate file that is associated with the image file.
- What is IMAP (Internet Message Access Protocol)? - IMAP (Internet Message Access Protocol) is a standard retrieval protocol for receiving email.
- What is IPv6 (Internet Protocol version 6)? - Internet Protocol version 6 (IPv6) is a set of specifications from the Internet Engineering Task Force (IETF) that is responsible for identifying network devices and routing traffic across the internet.
- What is LinkedIn and how does it work? - LinkedIn is a social networking site designed specifically for the business community.
- What is malware? Prevention, detection and how attacks work - Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server.
- What is mixed reality? - Mixed reality refers to advanced technology that combines both virtual reality (VR), a fully immersive computer-generated experience, and augmented reality (AR), which integrates digital elements into the physical world.
- What is mobile device management (MDM)? - Mobile device management (MDM) software enables IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.
- What is National Electrical Code (NEC)? - National Electrical Code (NEC) is a set of regularly updated standards for the safe installation of electric wiring in the Americas.
- What is Nvidia? - Nvidia Corporation is a technology company known for designing and manufacturing graphics processing units (GPUs).
- What is PaaS? Platform as a service definition and guide - Platform as a service (PaaS) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
- What is quantum computing? How it works and examples - Quantum computing is an area of computer science focused on the development of computers based on the principles of quantum theory.
- What is remote desktop protocol (RDP)? - Remote desktop protocol (RDP) is a secure network communications protocol developed by Microsoft.
- What is SaaS (software as a service)? - Software as a service (SaaS) is a software distribution model in which a cloud provider hosts applications and makes them available to end users over the internet.
- What is Secure Digital Extended Capacity card (SDXC)? - A Secure Digital Extended Capacity (SDXC) card is a very small flash memory card that has greater storage capacity than the original SD (Secure Digital) memory cards.
- What is SMS (Short Message Service)? - SMS (Short Message Service), commonly referred to as 'text messaging,' is a service for sending short messages of up to 160 characters (224 character limit if using a 5-bit mode) to mobile devices, including cellular phones, smartphones and tablets.
- What is SMTP (Simple Mail Transfer Protocol)? - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving emails over a network such as the internet.
- What is social media? - Social media refers to websites and applications that focus on communication, community-based input, interaction, content-sharing and collaboration.