The Online Tech Dictionary for Students, Educators and IT Professionals

Looking for a definition?

Terms of the Day

How to Mine Cryptocurrency

Cryptocurrency mining has grown exponentially in the last decade. Learn how to start crypto mining with our guide.

Telecommunication

Telecommunication refers to telephony and cellular network technology. However, the broader definition includes all wired...

How to Find Your...

You may need to find the IP address for your router when configuring...

Computer Science Terms

Artificial Intelligence (AI)

Artificial intelligence (AI) is a wide-ranging branch of computer science concerned with...

Hypervisor

A hypervisor, also known as a virtual machine motor or virtualizer, is...

SQL

SQL is a standardized query language for requesting information from a database....

Security Terms

Authentication

Authentication refers to the process of identifying an individual, usually based on...

SSL (Secure Sockets Layer)

Secure Sockets Layer (SSL) is a protocol developed by Netscape for providing...

Endpoint Detection and Response...

Endpoint Detection and Response, or EDR, is a form of technology that...

Study Guides

Virtual Private Network (VPN) Study Guide

Companies and organizations will use a VPN to communicate confidentially over a public network and to send voice, video or data. ...

Computer Architecture Study Guide

Computer architecture provides an introduction to system design basics for most computer science students. This computer architecture study guide describes the...

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and design. Networking fundamentals teaches computer science students...

Follow us on Social Media

Latest Terms

Telecommunication

Telecommunication refers to telephony and cellular network technology. However, the broader definition...

Spoofing

What is spoofing? As it pertains to cybersecurity, spoofing is when a person...

How to Indent in...

Microsoft Word is a graphical...

Trending Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

Text Abbreviations reviewed by Web Webster   From A3 to ZZZ we list 1,559...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will...

What Are the 7 Layers of the OSI Model?

Reviewed by Web Webster   The phrase "7 layers of the OSI model" refers...

Hotmail [Outlook] Email Accounts

Hotmail was one of the first public webmail services that could be...

Multimedia Terms

FPS (Frames Per Second)

1. Short for frames per second, fps is a measure of how...

Optical Image Stabilization (OIS)

Optical image stabilization (OIS) is a camera component that compensates in real-time...

Common Intermediate Format

(n.) A video format used in videoconferencing systems that easily supports both...

Software Terms

ALM

Abbreviated as ALM, Application Lifecycle Management refers to the capability to integrate,...

Remote Working Software

Remote working software is software that enables workers outside of a main...

Marketing Automation Software

Marketing automation software is an advanced platform designed to help marketers plan...

Review Guides

How to Mine Cryptocurrency

Cryptocurrency mining has grown exponentially in the last decade. Learn how to start crypto mining with our guide.

Telecommunication

Telecommunication refers to telephony and cellular network technology. However, the broader definition includes all wired and wireless networks, such as the Internet. Now that...

How to Find Your Router’s IP Address

You may need to find the IP address for your router when configuring a virtual private network (VPN) or troubleshooting a wireless...

Spoofing

What is spoofing? As it pertains to cybersecurity, spoofing is when a person disguises themself as a trusted source to gain access to important or...