The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
| This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
WildBot has found potential problems with this book. Please check the talk page for a detailed explanation of what these might be and how to fix them. When these are resolved, you can remove |wildbot=yes from this template. |
Computer Terminology
edit- 1-Click
- Ad filtering
- Ad serving
- Afrosphere
- Ajax (programming)
- AJAX.OOP
- Anchor text
- Asahiru problem
- Automated information system
- Avatar (computing)
- B1ff
- Backlink
- Bacn (electronic)
- Bandwidth hogging
- Banhammer
- Bastard Operator From Hell
- Bear Surprise
- Behavioral targeting
- Benevolent Dictator For Life
- Berkeley RISC
- Beta reader
- Big ball of mud
- Big iron
- Bit bucket
- Bit level device
- Bit rot
- Blacklist (computing)
- Blinkenlights
- Blog carnival
- Blogosphere
- Bogon filtering
- Boilerplate (text)
- BOSH
- Bounce rate
- Brain dump
- Brass Crescent
- Breidbart Index
- Brick (electronics)
- BSD
- BSOD
- Bucket (computing)
- Bug bash
- Bump (Internet)
- Buzzword compliant
- Byte orientation
- Canonical order
- Canonicalization
- CAPTCHA
- Chat room
- Checkbox compliance
- Christmas tree packet
- CIDR
- Clickjacking
- Client-to-client protocol
- Clobbering
- Clone (computing)
- Co-shoring
- Cobrowsing
- Code monkey
- Collaborative blog
- Comet (programming)
- Command (computing)
- Commercial off-the-shelf
- Common layers in an information system logical architecture
- Communication engine
- Composability
- Computer lab
- Computer program
- Computon
- Concern (computer science)
- Concurrent user
- Consulting software engineer
- Consumerization
- Contextual advertising
- Control logic
- Control unit
- Conversion (marketing)
- Conversion optimization
- Conversion rate
- Corporate blog
- Cost per impression
- Cost per mille
- Cost per time
- CPAN
- CPU time
- Crash (computing)
- Crash to desktop
- Critical mass (software)
- Crossposting
- Crowdsourcing
- CSAR
- Custom software
- Cyber Monday
- DAMP (software bundle)
- Dashboard (business)
- Data stream
- Ddos
- Dead code
- Default (computer science)
- Definitive Software Library
- Dependability
- DEPOT
- Device independent
- Digital Novel Markup Language
- Direct Client-to-Client
- Direct mode
- Disemvoweling
- Distributed moderation
- DLL hell
- Domain layer
- Domain-driven design
- DOS (disambiguation)
- Dot-com bubble
- DRDOS
- E-mail drip marketing
- E-mail spoofing
- E-mail storm
- Eating one's own dog food
- EDay (online retail)
- Editorial Related Advertising
- Effective cost per mille
- Egoboo
- Email bankruptcy
- Embedded software
- Emoji
- Emoticon
- End of Message
- End system
- End-user (computer science)
- Enterprise Search Marketing
- Execution (computing)
- Eyeball search
- Fail-fast
- Fear, uncertainty and doubt
- Feature complete
- Federated search
- File sharing
- File transfer
- Fileset
- Flaming (Internet)
- Flood control (communications)
- Folksonomy
- Forcing Data Delivery
- Forum game
- Forum spam
- Frankenmachine
- Freeze (software engineering)
- Frequency capping
- Frob
- Front-end and back-end
- FTBFS
- Future proof
- FYP
- GAPP
- Geekism
- Gender-bait
- Generalized TTL security mechanism
- Geostamp
- Geoweb
- Glossary of blogging
- GNU
- Goal seeking
- Google (verb)
- Google bomb
- Granule (Oracle DBMS)
- Greeklish
- Green Lightning (computing)
- GSAR
- GXA
- Hackathon
- Hacker (computing)
- Hardware compatibility list
- Hardware-dependent Software
- Hatley-Pirbhai modeling
- Heterogenous computing
- Hex dump
- Hidden text
- High Performance Computing and Communication Act of 1991
- History of blogging timeline
- Hit-and-run posting
- HLT
- Horizontal application
- Host Signal Processing
- How does one patch KDE2 under FreeBSD?
- HTML
- HTML e-mail
- HTTP 404
- Hybrid computer
- Hybrid computing
- IANAL
- ICBM address
- ID-Ten-T Error
- Ideagoras
- Identicon
- Identity 2.0
- Image macro
- Image search optimization
- Imageboard
- Implementation
- Implicit Web
- In-text advertising
- Indirection
- Industry Information Infrastructure
- Information superhighway
- Inline linking
- Input queue
- Intelligent Device Management
- Internet bookmark
- Internet capitalization conventions
- Internet leak
- Internet real estate
- Internet Relay Chat
- Internet Resource Management
- Internet slang
- Internets
- Interoperability
- Interweb
- Invitation system
- IPF
- Issue (computers)
- J. Random Hacker
- Jargon File
- Jesus spring
- Jiong
- Job control
- Job processing cycle
- Keyword research
- Killer application
- Killer poke
- LAMP (software bundle)
- Landing page
- Leech (computing)
- Leet
- Lightweight design
- Link bait
- Link doping
- Link exchange
- Link love
- Link popularity
- Linklog
- List of computer technology code names
- List of computer term etymologies
- List of computer-related jargon
- List of computing and IT abbreviations
- List of emoticons
- List of Intel codenames
- List of Internet-related terminology
- List of object-oriented programming terms
- List of system quality attributes
- List of terms relating to algorithms and data structures
- Liveware
- LOL
- Lolcat
- Lookup
- Luser
- Machine-readable medium
- Maintenance OS
- Managed code
- Mashup (web application hybrid)
- Me too
- Media hacker
- Meta-moderation system
- Meta-tools
- Microcontent
- Micropatronage
- Microsoft XNA
- MIMD
- Misbug
- Miswart
- Mobile blogging
- Moderation system
- MoSCoW Method
- Mousetrapping
- Multilayered architecture
- Multitier architecture
- Mung
- Munge
- Namespace
- NaN
- National Information Infrastructure
- National research and education network
- NEA (internet)
- Neogeography
- Netizen
- Network telescope
- Newbie
- Nibble
- NOP
- Not safe for work
- Nuke and pave
- Null (computer programming)
- Null string
- O RLY?
- Object-code compatible
- Octet (computing)
- ODD (One Document Does it all)
- Oekaki
- Off Topic
- Off-web factors
- OFML
- On the fly
- On-the-fly encryption
- One-off code
- Online and offline
- Online identity management
- Online payroll
- Online reputation management
- Operating context
- Operating system service management
- Orchestration (computers)
- Organic search
- OTFE
- Out of the box
- Owned
- P convention
- Padonki
- Page hijacking
- Paid-for listings
- Paper prototyping
- Path length
- Pay wall
- PEBKAC
- Pen OS
- Performance Supervision System
- Persistence (computer science)
- Personoid
- Photoblog
- Play-by-post role-playing game
- PLOKTA
- Plonk (usenet)
- Plugpoint
- Point release
- Pointy-Haired Boss
- Pose to pose
- Power Good Signal
- Power users of ICT
- PRAM consistency
- Pre channel
- Presentation logic
- Preved
- Processing modes
- Program (machine)
- Program Chrestomathy
- Programming in the large and programming in the small
- Pull technology
- Push technology
- Pwn
- Quiesce
- Quote/commentary
- Rain dancing
- Real life (reality)
- Real Programmer
- Reboot, Reinstall, Reformat
- Redundant code
- Remote Service Software
- Resident module
- Resource (computer science)
- RISC
- Round robin DNS
- RTFM
- Run-time system
- Runtime
- S-LINK
- Sandbox Effect
- Scaling transparency
- Schlemiel the painter's Algorithm
- Scholarly Skywriting
- Scratch monkey
- Scratch space
- Scratch tape
- Screenshot
- SCSI
- Search engine marketing
- Search engine optimization
- Search engine results page
- Search engine submission
- Security kernel
- Semantic interoperability
- Semantic targeting
- Series of tubes
- Server hog
- Server sprawl
- Service bureau
- Serving channel
- SEX (computing)
- Shock site
- Shotgun e-mail
- Sidegrade
- SIGCAT
- Signature block
- Silicon compiler
- Silver bullet
- SIMD
- Sitelet
- Sitemap index
- Slashdot effect
- Small matter of programming
- Smart Catalog
- Smart host
- SMBIOS
- SMS language
- Snivitz
- Social Data Analysis
- Social media optimization
- Sockpuppet (Internet)
- Soft goal
- Software blacklist
- Software brittleness
- Software engine
- Software package (programming)
- Software rot
- Software suite
- Sovereign application
- Spam Lit
- Spelling of disc
- Spindle (computer)
- Spindling
- Standalone software
- Standardista
- STFU
- Sticky post
- Straight-Through Provisioning
- Structured wiki
- Supernet
- Supranet
- Syntactic sugar
- Sysop
- System identifier
- System integration
- System integration testing
- System integrity
- System migration
- System under test
- Systems Development Life Cycle
- Tag (metadata)
- Tagspace
- Task (computers)
- Teh
- Temporal isolation
- That Guy with the Glasses
- The Computer Contradictionary
- The Hacker Purity Test
- Threaded discussion
- Throttling process (computing)
- Thunk
- Trampoline (computers)
- Transformation of text
- Transient application
- Trap (computing)
- Trash traffic
- Trillium Report
- Tripcode
- Troll (Internet)
- Tumblelog
- TWAIN
- Tweeter (Internet)
- Typecasting (blogging)
- Typographical personification
- Udaff
- ULD
- Uncapping
- Undecimber
- Unreachable code
- Upgrade
- Upstream (software development)
- Uptime as a service
- Urban Dictionary
- URL redirection
- User (computing)
- Vanilla software
- Vdiff
- Vertical application
- Vgrep
- Video blogging
- Virtual avatar
- VLSI Project
- Warez
- Web brigades
- Web button
- Web Callback
- Web harvesting
- Web search engine
- Website leasing
- Website spoofing
- White box (computer hardware)
- White box (software engineering)
- Wiki application
- Windows box
- Wordfilter
- Wordmark (computer hardware)
- Write-only documentation
- Write-only language
- WYCIWYG
- WYGIWYS
- WYSIWYG
- WYSIWYM
- XDCC
- Yet another
- Zombietime