Phrases.com »

Phrases related to: Computer security

Yee yee! We've found 50 phrases and idioms matching Computer security.

Sort:RelevancyA - Z
computer says noA popular phrase for an attitude in customer service in which the default response is to check with information stored or generated electronically and then make decisions based on that, apparently without using common sense, and showing a level of unhelpfulness whereby more could be done to reach a mutually satisfactory outcome, but is not.Rate it:

(0.00 / 0 votes)
Security BlanketAn insecure person holding something for emotional and psychological support and comfortRate it:

(0.00 / 0 votes)
boot upTo start a computer using its bootstrap procedure.Rate it:

(5.00 / 7 votes)
HALa homicidal computer, an artificial intelligence that acts similarly to the HAL 9000 featured in 2001: A Space Odyssey.Rate it:

(5.00 / 1 vote)
in silicoalluding to the mass use of silicon for semiconductor computer chips, is an expression used to mean "performed on computer or via computer simulation."Rate it:

(5.00 / 1 vote)
back upAs a security measure.Rate it:

(4.33 / 3 votes)
mouse potatoA person who spends excessive amounts of time using a computer.Rate it:

(4.33 / 3 votes)
check outTo obtain computer source code from a repository.Rate it:

(4.00 / 2 votes)
log outTo exit an account in a computer system so that it doesn't recognize you until you log in again.Rate it:

(4.00 / 4 votes)
zip upTo convert a computer file into a smaller package.Rate it:

(4.00 / 2 votes)
a man's home is his castle(US) a proverbial expression of personal privacy and securityRate it:

(3.00 / 4 votes)
fall overOf a computer program, to crash.Rate it:

(3.00 / 1 vote)
go along to get alongTo conform in order to have acceptance and security.Rate it:

(3.00 / 2 votes)
garbage in, garbage out(computing, information technology) If input data is not complete, accurate, and timely, then the resulting output is unreliable and of no useful value.1963, Raymond Crowley, "Robot Tax Collector Seeks Indications of 'Fudging'," Times Daily (Alabama, USA), 1 April (retrieved 26 July 2010):Officials explained that the quality of the computer's work depends on the quality of the data fed into it. Neil Hoke, administrative assistant to Stewart, quoted an adage of computer men: "Garbage in, garbage out."2008, Roger K. Lewis, "'In Architectural Design, Brains and Talent Trump the Best Software," Washington Post, 19 July (retrieved 26 July 2010):The old caveat "GIGO"Rate it:

(2.33 / 3 votes)
MINASWANInitialism of Matz is nice and so we are nice : a motto of the Ruby programming language community, in reference to the demeanor of Yukihiro Matsumoto, the Japanese computer scientist who designed the language.Rate it:

(1.00 / 1 vote)
sign inIn order to get into the office after hours, you'll have to sign in at the security desk.Rate it:

(1.00 / 1 vote)
an englishman's home is his castle(UK) a proverbial expression of personal privacy and securityRate it:

(0.00 / 0 votes)
bridgeA device which connects two or more computer buses, typically in a transparent manner.Rate it:

(0.00 / 0 votes)
check throughTo permit someone to continue onward, e.g. through a security checkpoint, after verifying their identity, tickets, etc.Rate it:

(0.00 / 0 votes)
close outTo terminate a computer program.Rate it:

(0.00 / 0 votes)
come into one's ownTo reach a stage of development or maturity where one has achieved strength and confidence, economic security, or respect and social acceptance.Rate it:

(0.00 / 0 votes)
dial intoTo join a computer network.Rate it:

(0.00 / 0 votes)
dial upto connect a computer to a modemRate it:

(0.00 / 0 votes)
fencepost problemIn computer programming, a problem dealing with how to treat the initial or boundary values of a discrete problem.Rate it:

(0.00 / 0 votes)
game overA message usually signaling that the player failed a computer or video game, for example by losing all of their lives, although the phrase sometimes follows the score after successful completion of a game.Rate it:

(0.00 / 0 votes)
holeA security vulnerability in software which can be taken advantage of by an exploit.Rate it:

(0.00 / 0 votes)
holeSolitary confinement, a high-security prison cell often used as punishment.Rate it:

(0.00 / 0 votes)
kitchen table softwareEspecially in the early years of personal computers, a set of computer programs developed by an entrepreneurial advanced amateur or self-employed professional computer programmer in his or her own home; software developed by a small business using the services of such programmers.Rate it:

(0.00 / 0 votes)
log inTo gain access to a computer system, usually by providing a previously agreed upon username and password.Rate it:

(0.00 / 0 votes)
mark upTo add coding to text so that it will display properly on a computer.Rate it:

(0.00 / 0 votes)
melt upOf the price of a security, to increase to an unexpected degree.Rate it:

(0.00 / 0 votes)
mind the storeTo remain present in a retail business, in order to maintain the security of the premises and to serve customers.Rate it:

(0.00 / 0 votes)
mouse overTo move a computer mouse pointer over.Rate it:

(0.00 / 0 votes)
national insurancestate social-security schemeRate it:

(0.00 / 0 votes)
PEBCACProblem Exists Between Chair And Computer. Used by technical support helpdesk staff to indicate that the problem with a user’s computer or experience is due to user error.Rate it:

(0.00 / 0 votes)
PICNICAcronym of problem in chair, not in computer; states that the problem was not in the computer but was instead caused by the user operating it.Rate it:

(0.00 / 0 votes)
punch outTo extract data from a computer by the use of a keyboard.Rate it:

(0.00 / 0 votes)
quiche-eaterIn computer programming circles, a person far removed from practice and concerned only with academic matters, unwilling to "get their hands dirty".Rate it:

(0.00 / 0 votes)
real timeThe time duration required by a computer system to complete a particular taskRate it:

(0.00 / 0 votes)
right to workThe prohibition of union security agreements or closed shops; the prohibition of the requirement that those who take on work in a unionised shop join the union or pay it for representing them.Rate it:

(0.00 / 0 votes)
roll overTo reinvest funds from a maturing financial security in the same or similar investment.Rate it:

(0.00 / 0 votes)
save downTo write a computer file to disk.Rate it:

(0.00 / 0 votes)
seal offto physically isolate an area or building for security reasons preventing human passageRate it:

(0.00 / 0 votes)
shoot 'em upA short story, novel, television show, film, computer game, or other narrative which depicts considerable gunplay.Rate it:

(0.00 / 0 votes)
sign inTo take some action to access a secured program or web page on a computer; to log in.Rate it:

(0.00 / 0 votes)
sign outTo sign one's name as an indication that one is leaving some location; to take some action to indicate one is leaving a secured program or web page on a computer.Rate it:

(0.00 / 0 votes)
sponsionem facere, sponsorem esse pro aliquoto be security for some one.Rate it:

(0.00 / 0 votes)
sword and sorceryOf or pertaining to a genre of narratives—including short stories, novels, television shows, films, and computer games—which combines wizardry and other fantastical supernatural elements with violent combat using medieval weaponry..Rate it:

(0.00 / 0 votes)
tiger teamA specialized group tasked with testing the effectiveness of an organization's ability to protect assets by attempting to circumvent, defeat or otherwise thwart that organization's internal and external security.Rate it:

(0.00 / 0 votes)
type outTo write out on a computer keyboard.Rate it:

(0.00 / 0 votes)

We need you!

Help us build the largest human-edited phrases collection on the web!

Alternative searches for Computer security:

Quiz

Are you a phrases master?

»
What's that got to do with the _________ of tea in China?
A quantity
B amount
C price
D consumption