• Internet Jargon

Internet Jargon

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #

Tab | Tablet | TACACS | Tag | TAN | TAR | TBT | TCB | TCG | TCL | TCO | TCP/IP | TCPA | TCSEC | TDM | TDMA | TDR | Terabyte | TeX | TFT | TFTP | ThinBasic | Thread | Thumbnail | Thunderbolt| TIFF | TLC | TLD | TL;DR | TLP | TLS | TMDS | TNIEG | Token Bus | Token Ring | Topology | TPEP | TPS | Traffic | Tree Structure | Trojan Horse | TTBOMK | TTFB | TTL | TTS | TTYL | Tweening


Tab is the term used for aligning text in a word processor by moving the cursor to a predefined position. It is part of the paragraph formatting feature and usually accomplished with help of the tab key or options provided in the word processor.


A tablet computer, is a mobile device, typically with a mobile operating system and touchscreen display processing circuitry, and a rechargeable battery in a single, thin and flat package. Tablets, being computers, do what other personal computers do, but lack some input/output (I/O) abilities that others have. Modern tablets largely resemble modern smartphones, the only differences being that tablets are relatively larger than smartphones and may not support access to the mobile phone network. An example of a tablet is an Apple iPad.


Terminal Access Controller Access Control System, an authentication protocol that was commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network. TACACS is now somewhat dated and is not used as frequently as it once was.

(n) A command inserted in a document that specifies how the document, or a portion of the document, should be formatted. Tags are used by all format specifications that store documents as text files. This includes SGML and HTML.

(v) To mark a section of a document with a formatting command.


Tiny Area Network, a LAN with only a few nodes. TANs are typically installed in homes or small office environments so that the devices can share resources, such as modems, files or printers.


(1) Short for tape archive, a UNIX utility that combines a group of files into a single file. The resulting file has a .tar extension. The tar command does not compress files. Frequently, therefore, a tar file is compressed with the compress or gzip commands to create a file with a .tar.gz or .tar.Z extension. These are comparable to files that have been compressed with PKZIP on a PC platform. Most PC compression utilities, including PKZIP, can open (untar) a tar file.

(2)(v) To combine files with the tar command.


(1) ThrowBack Thursday.
(2) Turbo Boost Technology, is a microprocessor technology developed by Intel that attempts to enable temporary higher performance by opportunistically and automatically increasing the processor's clock frequency.


Trusted Computing Base, refers to the totality of protection mechanisms (hardware, firmware and software) that provide a secure computing environment.


Trusted Computing Group, is a not-for-profit organisation formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices.


Tool Command Language. A powerful interpreter programming language. One of the main strengths of TCL is that it can be easily extended through the addition of custom TCL libraries. It is used for prototyping application as well as for developing CGI scripts, though it is not as popular as PERL for the latter.


Total Cost of Ownership. Term used to describe the total cost associated with the purchase, administration, and maintenance of a computer and /or network.


The software used on the internet  to pass information from machine to machine and from network to network. It contains 2 components, Internet Protocol (IP) IP and Transmission Control Protocol (TCP).  It is a routable, flexable, robust, and fault-tolerant protocol that is used by the Internet and most company' internal computer networks.


Trusted Computing Platform Alliance.


Trusted Computer System Evaluation Criteria.


(1) Target Disk Mode, is a special boot utility available only for Macintosh computers. Any Macintosh computer booted in Target Disk Mode can be connected to the port of any other computer (Mac or PC), with the Macintosh computer acting as an external device.
(2) Text Data Mining, involves combing through a text document or resource to get valuable structured information. This requires sophisticated analytical tools that process text in order to glean specific keywords or key data points from what are considered relatively raw or unstructured formats.
(3) Time Division Multiplexing, is a communications process that transmits two or more streaming digital signals over a common channel.


Time Division Multiple Access is a technology for delivering digital wireless service. It is used by the GSM digital mobile phone system.


(1) Time-Domain Reflectometer. A tool that sends out a signal and measures how long it takes to return. It is used to find out short and open circuits.
(2) Time-domain reflectometry, identifies and measures errors related to aerial and underground cable and fiber optic wiring through the analysis of pulse reflection polarity.


A collection of data totalling 1,024 Gigabytes.


TeX is a macro processor that provides complete control over typographical formatting.


Thin Film Transistor. A type of LCD flat-panel display screen, in which each pixel is controlled by from one to four transistor. The TFT technology provides the best resolution of all the flat-panel techniques, but it is also the most expensive. TFT screens are sometimes called active-matrix LCDs.


Trivial File Transfer Protocol, a simple form of the File Transfer Protocol (FTP). TFTP uses the User Datagram Protocol (UDP)and provides no security features. It is often used by servers to boot diskless workstations, X-terminals, and routers.


thinBasic is a BASIC-like computer programming language interpreter with a central core engine architecture surrounded by many specialized modules.


(1) In online discussions, a series of messages that have been posted as replies to each other. A single forum or conference typically contains many threads covering different subjects. By reading each message in a thread, one after the other, you can see how the discussion has evolved.

(2) In programming, a part of a program that can execute independently of other parts. Operating systems that support multithreading enable programmers to design programs whose threaded parts can execute concurrently.


Thumbnails are reduced-size versions of pictures or videos, used to help in recognising and organising them, serving the same role for images as a normal text index does.


Thunderbolt is the brand name of a hardware interface for the connection of external peripherals to a computer. It was been developed by Intel and Apple.


Tagged Image File Format, commonly used graphical format.


Triple Level Cells


Top-Level Domain, and refers to the suffix attached to Internet domain names. There are a limited number of predefined suffixes, and each one represent a top-level domain. For example .org of www.bcs.org
Current top-level domains include:

  • com - commercial businesses; this is the most common TLD
  • gov - U.S. government agencies
  • edu - Educational institutions such as universities
  • org - Organisations (mostly nonprofit)
  • mil - Military
  • net - Network organisations
  • ca - Canada
  • cn - China
  • th - Thailand
  • uk - United Kingdom


Too Long; Didn't Read.


Thread Level Parallelism.


Transport Layer Security, is an IETF standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.


(1) Transition Minimised Differential Signalling. A technology used in flat panel, CRTs and projectors, that is a trademark of Silicon Image, Inc.

(2) Trade Marks Directory Service. The leading specialists in trade mark, domain name and company name watching.


Trusted Network Interpretation Environmental Guideline.

Token Bus

Token bus is a network implementing the token ring protocol over a virtual ring on a coaxial cable. It was standardised with protocol IEEE 802.4

Token Ring

Token Ring is a data link technology for local area networks where devices are connected in a star or ring topology. It operates at layer 2 of the OSI model. It was standardised with protocol IEEE 802.5


The shape of a LAN or other communications system. Topologies are either physical or logica.
There are four principal topologies used in LANs.
bus topology: All devices are connected to a central cable, called the bus or backbone. Bus networks are relatively inexpensive and easy to install for small networks. Ethernet systems use a bus topology.
ring topology: All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Ring topologies are relatively expensive and difficult to install, but they offer high bandwidth and can span large distances.
star topology: All devices are connected to a central hub. Star networks are relatively easy to install and manage, but bottlenecks can occur because all data must pass through the hub.
tree topology: A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable.
These topologies can also be mixed. For example, a bus-star network consists of a high-bandwidth bus, called the backbone, which connects a collections of slower-bandwidth star segments.


Trusted Product Evaluation Program.


Transactions Per Second, a measurement used to determine how many transactions have been processed in one second in transaction-oriented systems.


The load on a communications device or system. One of the principal jobs of a system administrator is to monitor traffic levels and take appropriate actions when traffic becomes heavy.

Tree Structure

A type of data structure in which each element is attached to one or more elements directly beneath it. The connections between elements are called branches. Trees are often called inverted trees because they are normally drawn with the root at the top. The elements at the very bottom of an inverted tree (that is, those that have no elements below them) are called leaves. Inverted trees are the data structures used to represent hierarchical file structures. In this case, the leaves are files and the other elements above the leaves are directories. A binary tree is a special type of inverted tree in which each element has only two branches below it.

Trojan Horse

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.


To The Best Of My Knowledge.


Time To First Byte, is the total time taken by the remote server to send in the first byte of data after a user requests the data or page. TTFB is mainly used for defining or measuring the responsiveness or speed of a website or remote Web server.


(1) Time To Live. A field in an IP header, indicating the length of time a packet is valid.
(2) Transistor-Transistor Logic, is a class of integrated circuits which maintain logic states and achieve switching with the help of bipolar transistors.


Text-To-Speech, a form of speech synthesis that converts text into spoken voice output. TTS systems were first developed to aid the visually impaired by offering a computer-generated spoken voice that would "read" text to the user. TTS should not be confused with voice response systems.


Talk To You Later.


Short for in-betweening, the process of generating intermediate frames between two images to give the appearance that the first image evolves smoothly into the second image. Tweening is a key process in all types of animation, including computer animation. Sophisticated animation software enables you to identify specific objects in an image and define how they should move and change during the tweening process.