(v.) To cut off the end of something. Usually, the term is used to describe a type of rounding of floating-point numbers. For example, if there are too few spaces for a long floating-point number, a program may truncate the number by lopping off the decimal digits that do not fit: 3.14126 might be truncated to 3.14. Note that truncation always rounds the number down. If the number 1.19999 is truncated to one decimal digit, it becomes 1.1, not 1.2.
The term also is used to describe the process of shortening data that is gathered in a dynamic field. For example, an electronic form that asks for a person��s name and only allows for 10 characters will cut off any characters after the 10th even though a person��s name may be more than 10 characters.
The term also is used to describe the process of removing bits when data is moved to a storage medium. For example, an MP3 file might be truncated, or made smaller by removing bits of data, when stored on a compact disc.
Other forms: truncately (adv.) and truncation (n.)
A communications channel between two points. It usually refers to large-bandwidth telephone channels between switching centers that handle many simultaneous voice and data signals. A circuit from a user’s terminal or PC to a network is more accurately called a line (i.e. T1 line or ISDN line) rather than a trunk, although the terms line, […]
In telecommunications it refers to the grouping of connection switches and circuits within a telephone exchange. Trunking is a process that enables the service provider to use fewer circuits because users are sharing connections.
Tuenti is a social networking platform that is designed to improve communication and information sharing between people who know each other. It is a private platform so you can only register if you’ve received an invitation from another user. Headquartered in Madrid, Tuenti has grown to become the most trafficked Web site in Spain and […]
(tun´&l-ing) (n.) A technology that enables one network to send its data via another network’s connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. For example, Microsoft’s PPTP technology enables organizations to use the Internet to transmit data across a VPN. It does this by embedding its own network […]
In relational database systems, a record. See under record.