Radio Frequency Identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.
Range (Excel) This is a group of cells that are located adjacent to each other. After you define Excel names, you can use the names in a formula, instead of using a constant value or cell references.
Real-time processing A real-time processing system processes data without delay. Examples would be anti-missile defence systems and aeroplane landing control systems.
Relationship A relationship, in the context of databases, is a situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table. Relationships allow relational databases to split and store data in different tables, while linking disparate data items.
Register A permanent location in the internal memory of a processor used for the temporary storage of data during processing operations.
Record A collection of fields on data related to one entity.
Remote control This is a component of an electronic device used to operate the device wirelessly from a distance.
Resolution A characteristic of a monitor’s screen, determined by the number of pixels that can be displayed by it.
Restore is a term used to describe the process of recovering lost or old data from a backup.
Revenge Porn is the revealing or sexually explicit images or videos of a person posted on the Internet, typically by a former sexual partner, without the consent of the subject and in order to cause them distress or embarrassment.
RFID See Radio Frequency Identification
Ring network A network where the last computer is connected to the first, forming a loop.
ROM (read-only memory) Memory chips which hold the basic operating instructions for the computer.
Row(Excel) In Spreadsheet a row is identified by row number, which runs horizontally at the left side of the sheet
Rootkit: According to TechTarget, a rootkit is a collection of tools that are used to obtain administrator-level access to a computer or a network of computers. A rootkit could be installed on your computer by a cybercriminal exploiting a vulnerability or security hole in a legitimate application on your PC and may contain spyware that monitors and records keystrokes.
RTF (Rich Text Format)RTF enables a computer file to be opened by other programs on other computers, while preserving all formatting.
Run-time errors Run-time errors occur as the program compiles or ‘runs’.