It Jargons

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Jargon is a term used while talking about computers by other computer users who are

knowledgeable in the field. By enabling experts to communicate highly specialized information


to one another in a language that both parties can comprehend, jargon serves an essential
purpose. As a result of being so technically focused, IT utilizes more jargon than most other
industries.

SOME OF THE IT JARGONS AND THEIR MEANINGS

1. COOKIES
- An HTTP cookie is a little file that websites send to your browser and store there
to assist them in remembering important information about website visitors.
Usernames and passwords, contact information, and browser history are
examples of this data. Cookies provide a variety of important and helpful services
for a website, but they have also given rise to privacy issues and the potential for
security flaws. The username that was most recently used to log into a website,
for instance, might be sent as a cookie by a web server so that it will be pre-filled
the next time the user checks in.

2. CACHE
- Frequently accessed data can be stored in a data cache so that it can be more
quickly retrieved when needed. For instance, web browsers typically use caches
to speed up the loading of previously visited web sites. Temporary files are also
kept in caches utilizing both hardware and software components. A CPU cache is
an illustration of hardware cache. This is a small portion of memory on the
computer's processor used to store common or recently used fundamental
computer instructions.

3. LATENCY
- The time between stimulation and reaction is referred to as latency. There is
often a lag between what you hear over your microphone and what you see on
your video during a video conversation with a poor connection. It can also relate
to a computer's "slowness," such as when you move your mouse over a screen
yet it takes a while for it to react. One approach to quantify latency is the time it
takes to send a request for resources or the time it takes for a resource to travel
from the time the browser requests it to the time it is received by the browser.

4. RMM (Remote Monitoring and Maintenance)


- Network management and remote IT management are two more names for RMM.
Managed IT service providers (MSPs) can monitor client endpoints, networks,
and PCs remotely and proactively using the remote monitoring and management
(RMM) method. RMM is also a wide range of IT jobs that a provider may
complete remotely, without having to visit your offices or physically access your
computer systems, is referred to as.
- This immediate access to important data is made possible through a remote
monitoring system. For instance, a field technician doing a maintenance work
order in a remote area can check the asset's repair and maintenance history to
examine how it operates, fix issues, or identify any potential future problems.
Facilities managers, on the other hand, may more efficiently prioritize
maintenance requests by evaluating the condition of all important systems and
assets in one place.

5. VPN (Virtual Private Network)


- It helps us to stay private online. Allows people to safely access a network, like a
workplace intranet, from a public network. Remote employees can safely access
company information with the aid of VPNs, and remote offices can share files as
if they were housed together. A VPN creates a private tunnel for your data and
conversations while you utilize public networks, establishing a secure, encrypted
connection between your computer and the internet.

6. BACKWARD COMPATIBILITY
- Refers to a technology's ability to support both earlier and newer versions. In
simpler terms, backwards compatibility means being compatible with older
models of the same product.For instance, PlayStation 3 (PS3) is backward
compatible with PlayStation 1 (PS1) and most PlayStation 2 (PS2) systems.
Hardware that is backward compatible can vary with the model and version.

7. FRAGMENTATION AND DEFRAGMENTATION


- When a process is loaded and unloaded from memory repeatedly, the free
memory space becomes fragmented, which is an undesirable OS issue known
as fragmentation. The act of restructuring the data stored on the hard drive such
that related pieces of data are put back together and all lined up in a continuous
pattern is known as defragmentation, sometimes known as "defrag" or
"defragging."
- As files are saved to or removed from a disk and new files are saved to take up
the space of the old, fragmentation occurs. The act of defragmenting involves
rearranging the files on the disk such that similar files are kept together and in
the right sequence.

8. LICENSING
- A software license is a legal contract that stipulates rules for the distribution and
usage of software. In most cases, software licenses grant end users the freedom
to make one or more copies of the software without infringing on copyrights.
Means for software makers to avoid copyright violations. A license to use the
software on a specific number of devices, with a specific number of users, or for
a specific amount of time is typically granted when you buy a software program.

9. LOG FILE AND LOG FILE MANAGEMENT


- Computers maintain a log file that records actions, including when a file was
opened, changed, renamed, deleted, etc. These files are kept for a variety of
reasons, mostly ones related to security, system performance, and compliance.
A log file will show you what happened—and when—if your system experiences
a problem or if someone tries to break in. A log file is a computer-generated data
file that contains information about usage patterns, activities, and operations
within an operating system, application, server or another device. Log files show
whether resources are performing properly and optimally.

10. SCALABILITY
- Scalability is the capacity of IT systems, including networking, storage,
databases, and applications, to continue performing effectively when their
volume or size changes. It frequently refers to adjusting resources in order to
satisfy either higher or reduced commercial demands. It also refers to a system's
capacity to expand in order to meet the needs of growing workloads. One
frequent advantage of a cloud server, for instance, is its capacity to scale as
needed, saving the customer from having to purchase a new server rack each
time their previous one ran out of room.

11. SCRIPTING AND MAINTENANCE SCRIPTING


- In computer programming, a script is a program or sequence of instructions that
is interpreted or carried out by another program rather than by the computer
processor (as a compiled program is).A script is a specialized software
application used to automate processes that a human operator would typically
have to carry out one at a time. The creation and deployment of maintenance
scripts allows for the execution of common administrative, maintenance, and
reporting tasks. In general, script languages are easier and faster to code in than
the more structured and compiled languages such as C and C++. However, a
script takes longer to run than a compiled program since each instruction is being
handled by another program first (requiring additional instructions) rather than
directly by the basic instruction processor.

12. SYSTEM OPTIMIZATION


- This refers to numerous techniques used to improve the functionality of systems
or programs. Systems optimization techniques include defragmentation,
maintenance scripting, caching, and log file management. The activity of
enhancing system capabilities and integration of subsystem elements to the
extent that all components operate at or above user expectations.

You might also like