A printed circuit board that you can insert into a computer to give it added capabilities. For example, all of the following are expansion boards:
Expansion boards for PCs can be half-size (also half-length) or full-size (also full-length). Most PCs have slots for each type of board. A half-size board is sometimes called an 8-bit board because it can transmit only 8 bits at a time. A full-size board is called a 16-bit board. In addition, some expansion boards are designed to operate with a local bus, such as PCI.
Expansion boards are also called adapters, cards , add-ins , and add-ons.
- expansion bus
A collection of wires and protocols that allows the expansion of a computer by inserting printed circuit boards (expansion boards). Traditionally, PCs have utilized an expansion bus called the ISA bus. In recent years, however, the ISA bus has become a bottleneck, so nearly all new PCs have a PCI bus for performance as well […]
- Expansion Slot
An opening in a computer where a circuit board can be inserted to add new capabilities to the computer. Nearly all personal computers except portables contain expansion slots for adding more memory, graphics capabilities, and support for special devices. The boards inserted into the expansion slots are called expansion boards, expansion cards , cards , […]
- Expert System
A computer application that performs a task that would otherwise be performed by a human expert. For example, there are expert systems that can diagnose human illnesses, make financial forecasts, and schedule routes for delivery vehicles. Some expert systems are designed to take the place of human experts, while others are designed to aid them. […]
- exploded view
A picture or diagram that shows the components of an object slightly separated, as if there had been a neat explosion in the middle of the object. Many spreadsheet applications can automatically create exploded diagrams such as exploded pie charts.
A tool developed by hackers that is used to perform malicious attacks on computer systems. They are usually scripts that are designed to exploit weaknessness in software over a network, most commonly the Internet. Zero-Day is a common type of exploit.