Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | सभी

T

TB

Terabyte or 1024 gigabytes.

Teleworking

Working from home but staying in touch with others with the help of technology.

Test buddy

Someone who provides feedback on the digital products that are being developed. They tell the developer what is good about the product and what should be improved.

Third generation (3G)

Third-generation wireless communication allows high-speed wireless data transfer.

Third-party payment processor

A business that offers customers an alternative fast, safe method to pay for online goods and services.

Timeline storyboard

A series of screens shown in sequence used for planning a movie or an animated sequence.

Trojan

A program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk drive. A trojan is similar to a virus except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game.