Advanced Search
Search Results
651 total results found
Mouse
A hardware device used to get input from the user, usually to interact with the GUI. A mouse can be either wired or wireless. Mice usually are connected via USB ports. Wireless mice use an internal battery to power RF signal receptors that are tied to the comp...
Thunderbolt
A proprietary video port connector designed by Intel and Apple. It provides video, audio, DC power, and data signals when connecting an external display into an Apple computer. Features: Combines PCIe and DisplayPort into two serial signals in a bi-directiona...
PPPoE
Point-to-Point Protocol over Ethernet: an Internet protocol designed for Digital-Subscriber-Line connections, authentication is done via username and password. #XI
Digital Subscriber Line
aliases: DSL A service that provides Internet over telephone lines. There are two types of DSL: asymmetric and symmetric. DSL is top-tier when it comes to cost-effectiveness and uptime. Asymmetric DSL Download speed is faster than the upload speed. Symmetr...
Crosstalk
A form of interference where signals transmitted on one cable escape and damage signals being transmitted on another cable. #II
Virtual Container
An alternative to virtual machines, which runs consistent runtime environments for specific programs instead of an entire OS. Virtual containers are initialized using a special software called a container engine. It runs the set program in an isolated manner, ...
Capacitor
A hardware device that stores an electrical charge. The basis for all computer systems. #II
Virtual Desktop Infrastructure
aliases: VDI A type of virtualization that uses remote connection to run multiple operating systems concurrently on a machine. VDI uses a connection between the host machine and a remote device, casting the guest OS to the remote device while processing ev...
Transparent Data Encryption
A form of database encryption that encrypts the entire database and all of its backups. TDE is typically used when the data is at rest - when it's not being actively used. When an authorized user wants to access the data, it's automatically decrypted so that t...
Column Level Encryption
A form of database encryption that allows the database administrator to encrypt each column or section of the database using different access keys. CLE increases the encryption level since multiple access keys are required to view all the data, but the perform...
Application Level Encryption
A form of database encryption where the program that's used to create and manage the stored data is also responsible for encrypting it. ALE works well because the data is encrypted even before it reaches the database for storage. The only drawback is that the ...
Personally Identifiable Information
aliases: PII Information about a person that can be used to compromise computer systems simply by masquerading as that person. #XIV
BitLocker ToGo
A version of Windows-BitLocker that can be used for USB drives. #XIV
Windows BitLocker
A Windows 10 Pro feature that allows for the encryption of entire hard drives. BitLocker utilizes the TPM chip installed on a system's motherboard. The TPM chip has to be at version 1.2+. While BitLocker can be enabled without the TPM chip installed, the boot ...
Standard ATX
A form factor specification for motherboards, defining them as 9.6 x 12 inch motherboards, and the back panel being 6.25 x 1.75. The seven expansion slots are 0.8 inches apart. Power Supply Specifications 24 pin ATX power connector soft-power control (OS can...
NLX
An uncommon form factor specification for defining motherboard sizes, using a unique back panel design that attaches to a riser card for more expansion slots. #III
Riser Card
A hardware extension to a motherboard that allows for more expansion slots to be installed and connected to the system. #III
Hardware
A reference to the physical devices and circuits that make up the different parts of a computer system.