In spreadsheet applications, one or more contiguous cells. For example, a range could be an entire row or column, or multiple rows or columns. The only restrictions on ranges is that all the cells of the range must be contiguous and the entire range must be rectangular in shape; that is, you cannot have a […]
- sector number
A number that uniquely identifies the physical sector on a disk. See sector.
)A design for a set of characters. Popular typefaces include Times Roman, Helvetica, and Courier. The typeface represents one aspect of a font. The font also includes such characteristics as size, weight, italics, and so on. There are two general categories of typefaces: serif and sans serif. Sans serif typefaces are composed of simple lines, […]
The name given to the Sony Corp. implementation of the IEEE 1394 standard. It’s the 4-pin or 6-pin bi-directional digital cable link between your Sony camcorder products and devices such as your PC or digital television, for example. i.LINK is also called FireWire or IEE 1394.
- passive reconnaissance
(pas´iv ri-kon´&-zents) (n.) The process of collecting information about an intended target of a malicious hack without the target knowing what is occurring. Typical passive reconnaissance can include physical observation of an enterprise’s building, sorting through discarded computer equipment in an attempt to find equipment that contains data or discarded paper with usernames and passwords, […]
- Web ring
Also spelled “Webring,” a series of Web sites linked together in a “ring” that by clicking through all of the sites in the ring the visitor will eventually come back to the originating site. All of the sites within the ring share a similar topic or purpose. There are Web rings on topics such as […]
- macro virus
A type of computer virus that is encoded as a macro embedded in a document. Many applications, such as Microsoft Word and Excel, support powerful macro languages. These applications allow you to embed a macro in a document, and have the macro execute each time the document is opened. According to some estimates, 75% of […]
- script kiddie
A person, normally someone who is not technologically sophisticated, who randomly seeks out a specific weakness over the Internet in order to gain root access to a system without really understanding what it is s/he is exploiting because the weakness was discovered by someone else. A script kiddie is not looking to target specific information […]
(adj.) When used to describe software or computer systems, robust can describe one or more of several qualities: a system that does not break down easily or is not wholly affected by a single application failure a system that either recovers quickly from or holds up well under exceptional circumstances a system that is not […]
- Ambidextrous Computing
A phrase coined by AMD to describe the bridging ARM and x86 systems (for CPUs and SoCs). The AMD CPU core design is compatible with the 64-bit ARMv8 instruction set and offers high-performance 64-bit ARM and x86 CPU cores paired with graphics. AMD’s ambidextrous computing roadmap includes “Project SkyBridge” – a new design framework, that […]