tablet
(1) A special flat surface with a
mechanism for indicating positions thereon, normally used as a locator.
(I). (2) See also puck.
tap
To
briefly touch a touch-sensitive surface with a pointing device and then
quickly remove it.
target
The
location to which the information is destined.
target
directory
The directory to which information
is written. Contrast with source directory.
TCB
TCP/IP
Transmission Control Protocol/Internet Protocol
template
A pattern
to help the user identify the location of keys on a keyboard, functions
assigned to keys on a keyboard, or switches and lights on a control panel.
Test Server
A replacement
for the existing "hooking" mechanism for record and playback. A message-passing
architecture between the event/window services and another trusted server.
toggle
To switch
between two modes; for example, to switch between selected and deselected
mode.
tool bar
A
bar containing choices that represent tools. When you select a choice from
the bar, the defined action for the choice occurs.
touch
area
touch-down
point
Location plotted by a digitizer where
contact is made with a touch-sensitive device.
touch-sensitive
Pertaining to a device such as a keypad or screen
that generates coordinate data when a pointing device approaches or contacts
the surface, thereby allowing a user to interact directly with a computer
without entering commands from a keyboard.
track
ball
Synonym for control ball.
Transmission
Control Protocol/Internet Protocol (TCP/IP)
A
set of communication protocols that supports peer-to-peer connectivity functions
for both local and wide-area networks.
trigger
An attribute value in a private object that
tells the Registry Manager which interface (such as a shared library entry-point
name) to call to get the value to be returned to the client in a public
object. Used by the registry to get current state information dynamically
from the service provider objects, rather than storing this data in the
registry itself. When a framework is activated by a client, it searches
the registry locating all instances of service providers for the particular
framework. The framework then verifies the state of the service providers,
one at a time, and, if required, requests that the state be brought online.
trusted computing base (TCB)
In
computer security, all of the protection mechanisms within a computer system,
including hardware, software, and firmware, the combination of which enforces
a security policy. It creates a basic protection environment and provides
additional user services required for a trusted computer system.
[Back: Glossary - S]
[Next: Glossary - U]