Home
|
About Us
|
Cyber Knowledge Centre
|
Cyber Legal Consultancy
|
Cyber Forensics
|
Contact Us
A-B-C-D-E-F-G-H-I-J-K-L-M-N-O-P-Q-R-S-T-U-V-W-X-Y-Z


Search beginning of word full word and in description
Word
Description
P
...
Pack
to compress computer data. ...
Packed file
a computer file in a compressed form. ...
Packet
sometimes called datagram, a packaged unit of ...
Packet Switching
the method used to send information over ...
Page
1. in a word processing program, a ...
Page Down key
a key on the numeric keypad that, ...
Page Impressions
(compare to hit) also referred to as ...
Page Up key
A key on the numeric keypad that, ...
Pagination
the assignment of numbers to the pages ...
Palmtop
a computer small enough to fit in ...
Parallel Port
a computer connection that allows data to ...
Parallel Processing
the simultaneous use of more than one ...
Parameter
an identifying feature, value, or characteristic. In ...
Parent
an element that passes its characteristics to ...
Parent Directory
the senior directory to a particular file ...
Parity
the state of equality or being equal. ...
Park
to safely secure the read/write head of ...
Parse
to divide, analyze, and categorize individual components ...
Partition
to alienate sections of a hard drive ...
Pascal
a high level programming language based on ...
Passive Matrix
a low resolution liquid crystal flat-panel display ...
Password
a secret series of characters (that might ...
Paste
an efficient way to insert a single ...
Patent
A legal monopoly granted by the Commissioner ...
Path
in DOS and Windows, the series of ...
PC
(Personal Computer) originally the IBM personal computer, ...
PC Card
any of a number of printed circuit ...
PCMCIA
(Personal Computer Memory Card International Association) an ...
PDA
(Personal Digital Assistant) a generic term for ...
PDF
(Portable Document File) a standard for electronic ...
Pen
a drawing tool used in a paint ...
Pen Computer
a computer (usually hand held) that uses ...
Pentium
refers to a number of microprocessors manufactured ...
Peripheral
short for peripheral device, a hardware device ...
Perl
a popular programming language developed by Larry ...
Persistent URL (PURL)
An intermediary URL for a real URL. ...
Personal Computer
see PC. ...
Personal Identification Number (PIN)
A password used for identification. The term ...
PgDn key
see Page Down key. ...
PGP
(Pretty Good Privacy) a free security application ...
PgUp key
see Page Up key. ...
Phishing
(fish´ing) (n.) The act of sending an ...
Photo CD
a proprietary format for the digital storage ...
Photo Scanner
an optical scanner that specializes in scanning ...
PhotoShop
a popular image editing program produced by ...
Phreaking
similar to hacking, only the phreaker’s goal ...
Physical
1. relating to computer hardware. 2. in ...
PIF
(Program Information File) in DOS and Windows, ...
Pin
1. a small wire shaft in a ...
PING
(Packed Internet Groper) a timed interval echo-like ...
Pipe
a connection between two software programs that ...
Pipelining
an advanced function of a microprocessor that ...
Piracy
the unauthorized duplication and/or use and distribution ...
Pitch
1. the number of characters of a ...
Pixel
one of many tiny points that make ...
PKI (Public Key Infrastructure)
A system of authenticating electronic messages by ...
PKZIP
a popular free file compression program developed ...
Plagiarism
This is when a person uses someone ...
Plasma Display
a flat display monitor that uses ionized ...
Platform
the type of operating system or hardware ...
Platform for Privacy Preference (P3P)
A specification that allows web browsers to ...
Plotter
a computer output device that draws images ...
Plug and Play
a computer hardware device such as a ...
Plug-in
a software or hardware accessory required to ...
PNG
(Portable Network Graphics) a graphics file format ...
Point
1. a designated spot on a display ...
Point-of-sale system
a computer system that acts as a ...
PointCast
a free online subscriber-based news and information ...
Pointer
a symbol displayed on a computer screen ...
POP
1. (Post Office Protocol) the standardized protocol ...
Pop-up-menu
a group of options or selections offered ...
Porn-napping
This happens when online pornographers re-register lapsed ...
Port
a slot on a computer that allows ...
Port Replicator
similar to a docking station, a device ...
Portable
when speaking of hardware, lightweight and easily ...
Portable Document File
see PDF. ...
Portal
an entry point to the World Wide ...
Portrait
a document with vertical orientation. In other ...
Post
as a verb, to write and upload ...
Postscript
a programming language developed by Adobe Systems ...
Power supply
an internal computer component that supplies and ...
PowerPC
a computer containing a high-powered microprocessor. They ...
PowerPoint
a popular Microsoft software product allowing a ...
Ppm
(pages per minute) the number of pages ...
PPP
(Point to Point Protocol) a communications protocol ...
PRAM
(Parameter Random-Access Memory) in the Macintosh, a ...
Pretty Good Privacy
see PGP. ...
Preview
in word processing applications, a feature that ...
Print Screen key
a command key on most computer keyboards ...
Printed circuit board
(PCB) sometimes called a card, a sheet ...
Printer
a hardware output device used to produce ...
Printer driver
the software program that tells a printer ...
Printer engine
the fundamental component of the printer that ...
Private key
The private part of a two-part public ...
Procedure
an individual component of a software program ...
Process
the execution of a computer function or ...
Processor
short for microprocessor. see CPU, microprocessor. ...
Prodigy
a popular online Internet service provider offering ...
Program
a software application designed to perform a ...
Programmer
a person who creates programs. ...
Programming Language
the instructions used in creating computer programs. ...
PROM
(Programmable Read-only Memory) a type of memory ...
Prompt
a request by a computer asking the ...
Proprietary
features exclusive to a particular company’s product ...
Protected mode
a computer standard that guarantees particular programs ...
Protocol
a pre-set parameter used by a computer ...
Proxy server
existing between a client Web browser and ...
public domain
software, clipart, photographs, music and other intellectual ...
Public key
The published part of a two-part public ...
Public key pair
Two large prime numbers called the public ...
Pull
to call for information from a Web ...
Pull-down menu
a list of options or selections a ...
Purchased Payment Facility (PPF)
Defined in the Payment Systems (Regulation) Act ...
Purge
to permanently remove or delete unneeded data ...
Push
receiving information over a network without necessarily ...
Pyramid scheme
(Ponzi scheme) a method of making money ...
     
Disclaimer
|
Sitemap
|
Contact Us
Copyright @2008 CCC