Browse Topics

15 Free and Open...

For students who need a calculator that offers memory, trigonometric, graphs or even factorial functions, this list of 15 free calculators for use on...

15 Important Big Data...

Keeping track of big data trends, research and statistics gives IT professionals a solid foundation to plan big data projects. Here are 15...

30 Free Web Tools...

There are many free Web tools and open source software for students that will help you stay on task and organize your busy student...

4Shared

4Shared is a free, online file-sharing service that provides storage for music, video, and image files. It has been in operation since 2005. Users...

Abort

To stop a program or function before it has finished naturally. The term abort refers to both requested and unexpected terminations. For example, many...

Argument

In programming, a value that you pass to a routine. For example, if SQRT is a routine that returns the square root of a...

Arity

In programming it is the number of arguments a function or operator takes. In some languages functions may have variable arity that sometimes means...

Background Process

(n.) (1) Multitasking computers are capable of executing several tasks, or programs, at the same time. In some multitasking systems, one of the processes...

Backward Chaining

In artificial intelligence (AI) systems, backward chaining refers to a scenario where the AI has been provided with a specific goal and must...

10 Best Security and...

In this Webopedia article we discuss the popular and trusted choices in privacy and security browser extensions for Chrome. Includes top picks for VPNs,...

active content

Refers to content on a Web site that is either interactive, such as Internet polls or opt-in features, or dynamic, such as animated GIFs,...

Active Desktop

A feature of Windows that began in Windows 98 that allows the user to store Web content on the desktop. The items that are...

Activex Control

ActiveX control is a control using Microsoft ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is...

Add-On Manager

In Internet-enabled applications and services, an add-on manager is the term used to describe the management tab or section in application that stores information...

24 Private Cloud Computing...

Building a private cloud is often the first step in cloud computing for many organizations. Here's 24 vendors, platforms and service providers you can...

Airframe

An open source cloud computing platform targeted at organizations in the thinking stage of adopting a private cloud services model or evaluating options and...

ALM

Abbreviated as ALM, Application Lifecycle Management refers to the capability to integrate, coordinate and manage the different phases of the software delivery process. From...

Amazon Cloud Drive

Amazon's Cloud Drive is a personal cloud storage service from Amazon that debuted in March 2011. Amazon Cloud Drive offers up to 5...

Amazon EC2

Short for Amazon Elastic Computer Cloud, Amazon EC2 is a commercial Web service from Amazon's Web Services (AWS) that lets customers "rent" computing resources...

Application Sharing

A feature of many videoconferencing applications that enables the conference participants to simultaneously run the same application. The application itself resides on only one...

Asynchronous Groupware

Groupware that enables multiple participants to collaborate but not in real time, at the same time. Asynchronous groupware includes e-mail, version control systems, or...

Bare Metal

A new computer system that does not contain an operating system or any software. For example, when you purchase a new hard drive it...

BTX

BTX, acronym for Balanced Technology Extended is an interface specification that provides a common, flexible foundation, based on standards that can be used to...

Careware

A type of software licensing where the softwareauthor asks the users to pay for the software but not with money. Instead the request may...

2-Line Phone System

A 2-line phone system, also called a multi-line phone system, is a separate phone line that can be used for business functions such as...

2B1Q

Short for 2 Binary 1 Quaternary, a full duplex physical layer encoding method used in ISDN and other digital communication technologies. In 2B1Q, two...

3GPP

Short for the 3rd Generation Partnership Project, 3GPP is a collaboration agreement that was established in December 1998. The collaboration agreement brings together...

4G LTE

4G LTE is an abbreviation for fourth generation Long Term Evolution that was developed by the 3rd Generation Partnership Project. LTE is a particular...

802.11e

An extension to 802.11 specification developed by the IEEE for wireless LAN (WLAN) technology. 802.11eis a wireless draft standard that defines the Quality...

1080 interlaced – 1080i

Short for 1080 interlaced, where 1080 represents 1,080 vertical pixels. 1080i is one of two ATSC DTV high-definition television standards. The 1080i format creates...

1080 progressive – 1080p

Short for 1080 progressive, where 1080 represents 1,080 vertical pixels by 1920 horizontal pixels. 1080p is the highest of high-definition signals and uses ...

16:09

A widescreen aspect ratio for video. 16:9 is the ratio of the width to the height of the visible area of the video frame,...

1630-Master

1630-master is a 3/4" U-Matic videotape that can store your music program in digital form along with time-code information that is used to mark...

2-Stage Shutter Release

Commonly employed on digital cameras, 2-stage shutter release is a shutter release, that when pressed halfway, it activates the autofocus and the light meter...

AAC

Short for Advanced Audio Coding, one of the audio compression formats defined by the MPEG-2 standard. AAC is sometimes referred to as MPEG-2 NBC...

ABO – Adaptive Binary...

ABO (Adaptive Binary Optimization) uses the high correlation found in digital content signals and efficiently codes these correlations using a patent-pending algorithm.

Array

In programming, a series of objects all of which are the same size and type. Each object in an array is called an array...

Array Processor

Also called a vector processor. A microprocessor that executes one instruction at a time but on an array or table of data at the...

Audio Sampling Rate

The audio sampling rate is number of samples per second that are used to digitize a particular sound. Most digital video (DV) cameras can...

3-D Software

The category of software that represents 3-dimensional objects on a computer. This includes CAD/CAM, computer games, and animation packages. ...

3D

Three dimensional (3D) is something that has width, height, and depth. Our physical world is three dimensional, and we are able to perceive 3D...

3D Stereo Technology

A technology that provides a more realistic view of 3D game visuals providing a more real 3D scene that allows you to better interact...

AAF

Short for Advanced Authoring Format, a multimedia file format introduced by Microsoft in 1998. The goal of AAF is to provide a common file...

Accent Mark

In desktop publishing and word processing, an accent mark, also called a diacritical, it is the term used to describe the accent marks used...

.NET Framework

A programming infrastructure created by Microsoft for building, deploying, and running applications and services that use .NET technologies, such as desktop applications and Web...

133T Speak

Slang used by hackers and by gamers on multiplayer game servers and in chatrooms. 133t is the slang word for "leet" which is short...

24-7

In computer and Internet slang, 24-7 is commonly used to describe an Internet connection that is available 24 hours a day, seven days a...

301 Redirect

A 301 redirect is a Web server function where an old URL can be redirected to a new one. 301 Redirect is a "permanent"...

302 Redirect

The 302 redirect is a Web server function where an old URL can be redirected to a new one. 302 Redirect is a "temporary"...

10 Fun Facts To...

The following mobile phone facts and statistics deliver an update on the status of global mobile OS trends and security and overall market share...

Accelerometer

An accelerometer is a device that measures non-gravitational accelerations. On the Apple iPhonethere is a 3-way axis device which is used to determine the...

ActiveSync

ActiveSync is Windows Mobile software that allows you to synchronize Windows Mobile and other Windows CE-based devices with a Windows-based PC or Exchange Server....

AirPods

AirPods are Apple's entirely wireless earbuds. They were first released in 2016. AirPods are compatible with iPhones, iPads, iPods, Macbooks, and Apple TVs, depending...

Airtime

The actual timer subscribers spend talking on their cellular phones. Many cell phone plans are based on the number of airtime minutes that can...

.NET

A Microsoft operating system platform that incorporates applications, a suite of tools and services and a change in the infrastructure of the company's Web...

0FB – Zero Feedback

On online selling sites, such as eBay, eBay alternatives and classified ad Web sites, 0FB is an abbreviation used to mean zero feedback. It...

A Guide to Selling...

Ready to dive into online auctions? Our Getting Started guide offers information, tips and resources to help you list your first item on eBay. ...

A/B Split Testing

In email marketing, A/B split is a marketing test method where an e-mail subscriber list is split into two groups; every other name in...

AES

(1) Short for Advanced Encryption Standard, a symmetric 128-bit block data encryption technique developed by Belgian cryptographers Joan Daemen and Vincent Rijmen. The U.S...

Altcoin

Altcoin refers to any brand of cryptocurrency that is not Bitcoin. It encompasses all of the hundreds of cryptocurrencies that were created to be...

Beam Splitter

A beam splitter, as used in quantum key distribution (QKD), is a mechanism that divides photons and polarizes them. Beam splitters can divide beams...

Blowfish

A symmetric encryption algorithm designed by Bruce Schneier in 1993 as an alternative to existing encryption algorithms, such as DES. Blowfish is a 64-bit...

Cipher Text

In cryptography, cipher text (ciphertext) is data that has been encrypted. Cipher text is unreadable until it has been converted into plain text (decrypted)...

ABIS – Automated Biometric...

ABIS, the Automated Biometric Identification System (IDENT) is a Department of Homeland Security (DHS) managed system that is used for the storing and processing...

Active Impostor Acceptance

(n.) In a biometric security system, when an impostor intentionally submits a modified or forged biometric sample as that of an authentic enrollee with...

AFIS – Automated Fingerprint...

Short for Automated Fingerprint Identification System, AFIS is a type of biometric system that uses digital imaging to capture a fingerprint, which then can...

ANSI 378

Refers to an interoperability standard for fingerprint templates developed by the American National Standards Institute (ANSI). The United States government requires all Homeland Security...

Behavioral Biometric

Behavioral biometric is a biometric that is based on a behavioral trait of an individual. Examples of behavioral biometrics includes speech patterns, signatures and...

13 Best Free Android...

From secure messaging to document editing, our top free must-have apps have been rated, reviewed and named the best free Android apps of 2015. ...

5 SEO Tips for...

There are many misconceptions about search engine optimization (SEO) that make it difficult to know exactly how to optimize your Web site correctly. ...

Abacus

An abacus, also known as a counting frame, is a mechanical device used to perform mathematical functions. The calculating tool functions by sliding counters...

Air Conditioning Airflow Efficiency

In data center terminology air conditioning airflow efficiency (ACAE) is a unit of measurement that means the amount of heat removed per standard cubic foot of airflow per minute.

All About Hypervisors

As virtualization - or at least talk of it - spreads through the enterprise, the word hypervisor is popping up everywhere. To understand what...

16-Bit

Refers to the number of bits that can be processed or transmitted in parallel, or the number of bits used for single element in...

2007 Technology Trends

While common computer technology terms such as CPU and OSI Model make the top 15 tech terms on Webopedia nearly every week, technology trends...

3 Free Java Courses...

List of free online Java courses for students and IT professionals looking to enhance their skills . For students and IT...

A Names: Famous People...

The people listed in this section have made major contributions to the field of computer and Internet technology. As the technology leaps forward at...

AcceleratedSAP

AcceleratedSAP is a certification offered by SAP AG designed for ERP professionals who work with AcceleratedSAP. The AcelleratedSAP certification indicates that the holder has...

70:20:10 Learning Model

The 70:20:10 model for modern learning and development espouses that students and employees learn best (70%) from doing specifically, on-the-job learning or...

ABAP

Short for Advanced Business Application Programming it is an object-oriented programming language used to develop applications for the SAP R/3 system, but was originally...

ABC

A personal computing programming language that was originally developed as a replacement for BASIC. ABC is suitable for beginners and experts alike and can...

Abstract Data Type

Abstract data types are mathematical models of a set of data values or information that share similar behavior or qualities and that can be...

Ada

A high-level programming language developed in the late 1970s and early 1980s for the United States Defense Department. Ada was designed to be a...

1xRTT

Short for single carrier (1x) radio transmission technology, a 3G wireless technology based on the CDMA platform. 1xRTT has the capability of providing ISDN-like...

29 Free Android Apps...

From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and...

3D Touch

3D Touch is a pressure-sensitive feature introduced by Apple on its 2015 iPhone 6S and iPhone 6S Plus smartphones. 3D Touch uses capacitive sensors...

3G

3G is an ITU specification for the third generation (analog cellular was the first generation, digital PCS the second) of mobile communications technology. 3G...

3G USB dongle

A 3G or WiMAX USB dongle is a portable device that attaches to a USB port to enable a PC to connect to...

Anki

An open source software program that is used as a study tool to help users commit things to memory. Anki allows you to create...

AriOS

AriOS is a productivity-oriented GNU/Linux operating system based on Ubuntu that has a unique and optimized interface in addition to extra applications, multimedia codecs,...

Cinnamon

A desktop graphics environment for Linux and other Unix-like operating systems. Cinnamon is a fork of the GNOME 3 desktop environment that features a...

Debian Goodies

Debian Goodies (the debian-goodies package) is a set of utilities that work with Debian packages and provide more information than you can get out...

Easy Peasy

EasyPeasy is a lightweight open source operating system designed for use on netbooks. It was built to support social networking and cloud computing, and...

3-D Graphics

The field of computer graphics concerned with generating and displaying three-dimensional objects in a two-dimensional space (e.g., the display screen). Whereas pixels in a...

4K Ultra High Definition...

4K resolution, also called 4K high-definition (or UHD for Ultra-High Definition) is a digital TV phrase used to describe a display resolution of up...

Active Matrix Display

A type of flat-panel display in which the screen is refreshed more frequently than in conventional passive-matrix displays. The most common type of active-matrix...

All About Monitors: CRT...

In this article we will provide a comparison of CRT and LCD monitors, along with defining some of the many specifications. ...

Alpha Channel

In graphics, a portion of each pixel's data that is reserved for transparency information. 32-bit graphics systems contain four channels three 8-bit...

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

1000Base-T (IEEE 802.3ab)

1000Base-T is a specification for Gigabit Ethernet over copper wire (IEEE Std. 802.3ab). This standard defines 1 Gb/s data transfer over distances of up...

100Base-T (IEEE 802.3u) Fast...

A networking standard that supports data transfer rates up to 100 Mbps (100 megabits per second). 100BASE-T is based on the older Ethernet standard....

10Base-2

One of several adaptations of the Ethernet (IEEE 802.3) standard for Local Area Networks (LANs). The 10Base-2 standard (also called Thinnet) uses 50 ohm...

10Base-T

One of several adaptations of the Ethernet (IEEE 802.3) standard for Local Area Networks (LANs). The 10Base-T standard (also called Twisted Pair Ethernet) uses...

.INI File

Pronounced dot -in-ee file, a file that has a.INI extension and contains configuration information for MS-Windows. Two.INI files, WIN.INI and SYSTEM.INI, are required by...

(GNOME) GNU Network Object...

Acronym for GNU Network Object Model Environment. (Pronounced guh-nome.) GNOME is part of the GNU project and part of the free software, or open...

1984 Macintosh Debut Brought...

1984 Macintosh Debut Brought Great Divide Between Apple, IBM PC Partisans Apple...

3 Reasons To Upgrade...

From better mobility to improved System Restore and built-in antivirus control, here are three good reasons why you should consider upgrading to Windows 8. ...

A/UX

Pronounced ox, Apple's version of UNIX, which runs on some versions of the Macintosh. ...

ABEND

ABEND is an Acronym for abnormal end of task. It refers to software crashes or loss. The phrase is derived from an error message...

Absolute Cell Reference

In spreadsheet applications, a reference to a particular cell or group of cells that does not change, even if you change the shape or...

ACAP

Short of Application Configuration Access Protocol, an e-mail protocol being developed by the IETF to complement IMAP4. ACAP supports related e-mail services such as...

Active

Refers to objects currently being displayed or used. For example, in graphical user interfaces, the active window is the window currently receiving mouse...

Aggregate Function

A function that performs a computation on a set of values rather than on a single value. For example, finding the average or mean...

Adjacency

In search engine optimization (SEO), adjacency is the term used to describe the relationship between words used in a search engine query. A higher...

Alerts

A function of many Internet search engines that lets users specify keywords, phrases or tags pertaining to any topic that you would like to...

Allinurl

A Google search operator that allows a user to restrict the search results to only those pages with the search query specified in URL....

Alt Tag

An HTML attribute specified in the IMG tag to provide alternate text when an image on a Web page cannot be displayed. Example: This...

Alta Vista

The name of a software firm associated with Digital Equipment Corporation (DEC). Alta Vista offers software products you can use to locate and manage...

.dam

In computer viruses .dam is part of the McAfee naming convention for viruses and Trojans.

.Dr

In computer viruses .dr is part of the McAfee naming convention for viruses and Trojans. McAfee attaches the .dr suffix to the end of...

@M

In computer viruses, @m is part of the McAfee naming convention for viruses and Trojans. McAfee attaches the @m suffix to the end of...

@mm

In computer viruses @mm is part of the McAfee naming convention for viruses and Trojans.

10 Interesting Facts About...

The following Cybersecurity facts provide a brief introduction, enabling students, developers, and organizations to stay updated with the latest information. The...

4-Way Server

A 4-way server provides fast performance and scalability by supporting multiple CPUs. In this case it would support four processors. The multiple CPUs available...

5 Small Business Mobile...

Mobile server monitoring apps can help small business IT view server health and get real-time notifications on your mobile phone when something goes wrong. ...

8-Way Server

An 8-way server provides fast performance and scalability by supporting multiple CPUs. In this case it would support eight processors. The multiple CPUs available...

A+ Certification

Pronounced A plus, a certification developed by the Computing Technology Industry Association (CompTIA) to validate vendor-neutral skills for entry-level computer technicians. Holders of the...

Accelerator Board

(1) A type of expansion board that makes a computer faster by adding a faster CPU or FPU. Most modern computers are designed to...

@Reply

On the Twitter Web site, the @reply means a Twitter update (tweet) that is directed to another user in reply to one of their...

13 Twitter Tips and...

From celebrity tweets to hosting live Twitter chats, our favorite Twitter tips will have you tweeting like a pro in no time. ...

A-List Blogger

A term used to describe a group of elite bloggers who post daily on their blogs and receive a huge number of links back...

Astroturfing

A slang term used to mean "artificial" blog buzz. In the blogosphere people may blog about a new product, which in turn prompts others...

1U

)Also referred to as 1RU, although RU is not technically correct. U is the standard unit of measure for designating the vertical usable space, or...

3480, 3490

The IBM designation for families of half-inch magnetic tape drives typically used on mainframes and AS/400s.

5 Cloud Storage Services...

If you're looking for a solid cloud storage provider, here's 5 to try. Cloud storage basically means "the storage of data...

ABARS – Aggregate group...

Short for Aggregate group Backup And Recovery Support, ABARS is a backup system for MVS S/390 mainframes from IBM. ABARS performs data backup...

ABS – automatic backup...

Short for automatic backup system. See also redundant and back-up. ...