- Internet Jargon
North London Branch
TabTab is the term used for aligning text in a word processor by moving the cursor to a predefined position. It is part of the paragraph formatting feature and usually accomplished with help of the tab key or options provided in the word processor. TabletA tablet computer, is a mobile device, typically with a mobile operating system and touchscreen display processing circuitry, and a rechargeable battery in a single, thin and flat package. Tablets, being computers, do what other personal computers do, but lack some input/output (I/O) abilities that others have. Modern tablets largely resemble modern smartphones, the only differences being that tablets are relatively larger than smartphones and may not support access to the mobile phone network. An example of a tablet is an Apple iPad. TACACSTerminal Access Controller Access Control System, an authentication protocol that was commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network. TACACS is now somewhat dated and is not used as frequently as it once was. Tag TANTiny Area Network, a LAN with only a few nodes. TANs are typically installed in homes or small office environments so that the devices can share resources, such as modems, files or printers. TAR(1) Short for tape archive, a UNIX utility that combines a group of files into a single
file. The resulting file has a .tar extension. The tar command does not compress files.
Frequently, therefore, a tar file is compressed with the compress or gzip commands to
create a file with a .tar.gz or .tar.Z extension. These are comparable to files that have
been compressed with PKZIP on a PC platform. Most PC compression utilities, including
PKZIP, can open (untar) a tar file. TBT(1) ThrowBack Thursday. TCBTrusted Computing Base, refers to the totality of protection mechanisms (hardware, firmware and software) that provide a secure computing environment. TCGTrusted Computing Group, is a not-for-profit organisation formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCLTool Command Language. A powerful interpreter programming language. One of the main strengths of TCL is that it can be easily extended through the addition of custom TCL libraries. It is used for prototyping application as well as for developing CGI scripts, though it is not as popular as PERL for the latter. TCOTotal Cost of Ownership. Term used to describe the total cost associated with the purchase, administration, and maintenance of a computer and /or network. TCP/IPThe software used on the internet to pass information from machine to machine and from network to network. It contains 2 components, Internet Protocol (IP) IP and Transmission Control Protocol (TCP). It is a routable, flexable, robust, and fault-tolerant protocol that is used by the Internet and most company' internal computer networks. TCPATrusted Computing Platform Alliance. TCSECTrusted Computer System Evaluation Criteria. TDM(1) Target Disk Mode, is a special boot utility available only for Macintosh computers. Any Macintosh computer booted in Target Disk Mode can be connected to the port of any other computer (Mac or PC), with the Macintosh computer acting as an external device. TDMATime Division Multiple Access is a technology for delivering digital wireless service. It is used by the GSM digital mobile phone system. TDR(1) Time-Domain Reflectometer. A tool that sends out a signal and measures how long it
takes to return. It is used to find out short and open circuits. TerabyteA collection of data totalling 1,024 Gigabytes. TeXTeX is a macro processor that provides complete control over typographical formatting. TFTThin Film Transistor. A type of LCD flat-panel display screen, in which each pixel is controlled by from one to four transistor. The TFT technology provides the best resolution of all the flat-panel techniques, but it is also the most expensive. TFT screens are sometimes called active-matrix LCDs. TFTPTrivial File Transfer Protocol, a simple form of the File Transfer Protocol (FTP). TFTP uses the User Datagram Protocol (UDP)and provides no security features. It is often used by servers to boot diskless workstations, X-terminals, and routers. ThinBasicthinBasic is a BASIC-like computer programming language interpreter with a central core engine architecture surrounded by many specialized modules. Thread(1) In online discussions, a series of messages that have been posted as replies to
each other. A single forum or conference typically contains many threads covering
different subjects. By reading each message in a thread, one after the other, you can see
how the discussion has evolved. ThumbnailThumbnails are reduced-size versions of pictures or videos, used to help in recognising and organising them, serving the same role for images as a normal text index does. ThunderboltThunderbolt is the brand name of a hardware interface for the connection of external peripherals to a computer. It was been developed by Intel and Apple. TIFFTagged Image File Format, commonly used graphical format. TLCTriple Level Cells TLDTop-Level Domain, and refers to the suffix attached to Internet domain names. There are
a limited number of predefined suffixes, and each one represent a top-level domain. For
example .org of www.bcs.org
TL;DRToo Long; Didn't Read. TLPThread Level Parallelism. TLSTransport Layer Security, is an IETF standard protocol that provides authentication, privacy and data integrity between two communicating computer applications. TMDS(1) Transition Minimised Differential Signalling. A technology used in flat panel, CRTs
and projectors, that is a trademark of Silicon Image, Inc. TNIEGTrusted Network Interpretation Environmental Guideline. Token BusToken bus is a network implementing the token ring protocol over a virtual ring on a coaxial cable. It was standardised with protocol IEEE 802.4 Token RingToken Ring is a data link technology for local area networks where devices are connected in a star or ring topology. It operates at layer 2 of the OSI model. It was standardised with protocol IEEE 802.5 TopologyThe shape of a LAN or other communications system. Topologies are either physical or
logica. TPEPTrusted Product Evaluation Program. TPSTransactions Per Second, a measurement used to determine how many transactions have been processed in one second in transaction-oriented systems. TrafficThe load on a communications device or system. One of the principal jobs of a system administrator is to monitor traffic levels and take appropriate actions when traffic becomes heavy. Tree StructureA type of data structure in which each element is attached to one or more elements directly beneath it. The connections between elements are called branches. Trees are often called inverted trees because they are normally drawn with the root at the top. The elements at the very bottom of an inverted tree (that is, those that have no elements below them) are called leaves. Inverted trees are the data structures used to represent hierarchical file structures. In this case, the leaves are files and the other elements above the leaves are directories. A binary tree is a special type of inverted tree in which each element has only two branches below it. Trojan HorseA destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. TTBOMKTo The Best Of My Knowledge. TTFBTime To First Byte, is the total time taken by the remote server to send in the first byte of data after a user requests the data or page. TTFB is mainly used for defining or measuring the responsiveness or speed of a website or remote Web server. TTL(1) Time To Live. A field in an IP header, indicating the length of time a packet is valid. TTSText-To-Speech, a form of speech synthesis that converts text into spoken voice output. TTS systems were first developed to aid the visually impaired by offering a computer-generated spoken voice that would "read" text to the user. TTS should not be confused with voice response systems. TTYLTalk To You Later. TweeningShort for in-betweening, the process of generating intermediate frames between two images to give the appearance that the first image evolves smoothly into the second image. Tweening is a key process in all types of animation, including computer animation. Sophisticated animation software enables you to identify specific objects in an image and define how they should move and change during the tweening process. |