tablet

      (1) A special flat surface with a mechanism for indicating positions thereon, normally used as a locator. (I). (2) See also puck.
    tap
      To briefly touch a touch-sensitive surface with a pointing device and then quickly remove it.
    target
      The location to which the information is destined.
    target directory
      The directory to which information is written. Contrast with source directory.
    TCB
      Trusted computing base.
    TCP/IP
      Transmission Control Protocol/Internet Protocol
    template
      A pattern to help the user identify the location of keys on a keyboard, functions assigned to keys on a keyboard, or switches and lights on a control panel.
    Test Server
      A replacement for the existing "hooking" mechanism for record and playback. A message-passing architecture between the event/window services and another trusted server.
    toggle
      To switch between two modes; for example, to switch between selected and deselected mode.
    tool bar
      A bar containing choices that represent tools. When you select a choice from the bar, the defined action for the choice occurs.
    touch area
      Synonym for hot spot.
    touch-down point
      Location plotted by a digitizer where contact is made with a touch-sensitive device.
    touch-sensitive
      Pertaining to a device such as a keypad or screen that generates coordinate data when a pointing device approaches or contacts the surface, thereby allowing a user to interact directly with a computer without entering commands from a keyboard.
    track ball
      Synonym for control ball.
    Transmission Control Protocol/Internet Protocol (TCP/IP)
      A set of communication protocols that supports peer-to-peer connectivity functions for both local and wide-area networks.
    trigger
      An attribute value in a private object that tells the Registry Manager which interface (such as a shared library entry-point name) to call to get the value to be returned to the client in a public object. Used by the registry to get current state information dynamically from the service provider objects, rather than storing this data in the registry itself. When a framework is activated by a client, it searches the registry locating all instances of service providers for the particular framework. The framework then verifies the state of the service providers, one at a time, and, if required, requests that the state be brought online.
    trusted computing base (TCB)
      In computer security, all of the protection mechanisms within a computer system, including hardware, software, and firmware, the combination of which enforces a security policy. It creates a basic protection environment and provides additional user services required for a trusted computer system.


    [Back: Glossary - S]
    [Next: Glossary - U]