ctor} material. In the

electron model, a hole can be thought of as an incomplete outer electron shell in a doping substance. Considering holes as positive charge carriers is a useful abstraction.


2. A security vulnerability, particularly one which allows an attacker to gain unauthorised access to a system (by analogy with a hole in a wall).

Last updated: 2014-10-25

Nearby terms:

port 68, Comp Lab U Cambridge (1985)].ctor} material. In theSD}, so there!"

Try this search on Wikipedia, OneLook, Google