The Online Tech Dictionary for Students, Educators and IT Professionals

Looking for a definition?

Terms of the Day

Computer Science Terms

Artificial Intelligence (AI)

Artificial intelligence (AI) is a wide-ranging branch of computer science concerned with...

Hypervisor

A hypervisor, also known as a virtual machine motor or virtualizer, is...

SQL

What is SQL? SQL is a standardized query language for requesting information from...

Security Terms

Authentication

Authentication refers to the process of identifying an individual, usually based on...

SSL (Secure Sockets Layer)

Secure Sockets Layer (SSL) is a protocol developed by Netscape for providing...

Endpoint Detection and Response...

Endpoint Detection and Response, or EDR, is a form of technology that...

Study Guides

Virtual Private Network (VPN) Study Guide

Companies and organizations will use a VPN to communicate confidentially over a public network and to send voice, video or data. ...

Computer Architecture Study Guide

Computer architecture provides an introduction to system design basics for most computer science students. This computer architecture study guide describes the...

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and design. Networking fundamentals teaches computer science students...

Follow us on Social Media

Latest Terms

SHA-256

SHA-256 is an algorithm used for hash functions and is a vital...

Document Management System

A document management system is an automated software solution businesses and organizations...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a...

Trending Articles

Multimedia Terms

FPS (Frames Per Second)

What is FPS (Frames Per Second)? 1. Short for frames per second, fps...

Optical Image Stabilization (OIS)

Optical image stabilization (OIS) is a camera component that compensates in real-time...

Common Intermediate Format

(n.) A video format used in videoconferencing systems that easily supports both...

Software Terms

ALM

Application lifecycle management (ALM) refers to the capability to integrate, coordinate and...

Remote Working Software

Remote working software is software that enables workers outside of a main...

Marketing Automation Software

Marketing automation software is an advanced platform designed to help marketers plan...

Review Guides

SHA-256

SHA-256 is an algorithm used for hash functions and is a vital component of contemporary cybersecurity. It is part of the Secure Hash Algorithm...

Document Management System

A document management system is an automated software solution businesses and organizations use to organize, share, and secure the documentation needed for business operations....

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service (RaaS) model in which a malicious group sells or leases their...

Crypt888 Ransomware

Crypt888, also known as Mircop, is ransomware that encrypts files on desktops, downloads, pictures, and documents with RSA algorithms. The virus locks the encrypted...