Download as pdf or txt
Download as pdf or txt
You are on page 1of 55

JARGONS IN IT

1.Application Programming Interface (API)

An application programming interface (API) is a jargon closely related to applications,

which refers to a set of functions that enables two apps to talk to each other. In simpler

terms, an API establishes a connection between a platform and an end user. API

providers such as Facebook allow companies to access their technology without having

to invest or move into their ecosystem.

2.Bring Your Own Device (BYOD)

Simply put, BYOD is a type of workplace policy that allows an employee to use their

own private technologies, such as a phone or computer, for commercial use. It is

important to have regular updates applied to your company’s BYOD as virus and

hacking threats evolve over time.

3.Business Intelligence (BI)

Business intelligence is probably a word that gets thrown around a lot in recent years.

The jargon refers to the practice where companies leverage data to make informed

decisions. BI also refers to the technical infrastructure and processes applied to analyze
data derived from a company’s activities. The insights gleaned from this data is often

used to streamline operations, reduce costs, increase productivity and develop new

processes.

4.Carrier

The IT jargon “carrier” is short for “wireless carrier.” It refers to a company that provides

telecommunication services to the public, such as a mobile operator, cellular company,

and wireless provider.

5.Cascading Style Sheets (CSS)

This is a jargon used in website design and development. In simpler terms, it refers to a

style language that is used to format the layout of website pages. Basically, it describes

the presentation of a page that was created using a markup language like HTML or

XML. CSS enables site developers to create a cohesive appearance for a website.

6.Cloud Hosting

The ability to store data and applications on virtual servers outside the physical office

locations. This is typically done through third-party companies.

7.Content Management System (CMS)


Cloud and web-based technologies that make it easy for users to store, share and

manage digital information within an organization.

8.Customer Relationship Management (CRM)

An application that allows businesses to manage relationships and the data and

information associated with them. Used to store customer and prospect contact

information, accounts, leads, and sales opportunities in one central location usually in

the cloud for immediate accessibility.

9.Computer Network

A computer network is an IT jargon that refers to a group of interconnected devices that

has the ability to communicate and share resources with each other. It has two

components: the nodes and links. Communication protocols provide the instructions on

how these links carry information between nodes. The network endpoints, also known

as the origin and destination devices, are called ports.

Devices in this network can be connected over a public network or private one.

Residences and office-based businesses commonly use a private network, which has

an assigned private address space of IP addresses.

10.Cookies
A small piece of information you may be asked to accept when connecting to certain

servers via a web browser. It is used throughout your session as a means of identifying

you. A cookie is specific to and sent only to the server that generated it.

11.Data Breach

This is a security incident where a company’s private information (or their customer

information) is stolen. Usually done through hacking or phishing scams. Common data

breach exposures include personal information, such as credit card numbers, Social

Security numbers and healthcare histories, as well as corporate information, such as

customer lists, manufacturing processes and software source code.

12.Digital Marketing

Also known as online marketing, digital marketing is the strategic use of digital channels

to promote a product or service to a predefined target audience. Content marketing,

search engine optimization, pay-per-click advertising and social media marketing are all

forms of digital marketing. The best way to reap the benefits of online marketing is to

make use of a combination of digital marketing channels.

13.Domain Name System (DNS)


DNS is a jargon that you’d often encounter in the field of cybersecurity. It basically

means the phonebook of the internet. DNS is a decentralized system for accessing a

networked computer by name rather than by numerical (IP) address.

14.Encryption

The coding and scrambling of data to prevent it from being viewed by anyone who is not

the intended recipient. Any website that has an HTTPS certificate uses encrypted data.

15.Front End / Back End

The two different “sides” of a website. The front-end is also known as the client-side and

is usually considered the web design. The back-end of the website is also known as the

server-side.

16.Firewall

A firewall is a type of security device that prevents unauthorized access to or from a

particular network. It inspects the contents of incoming and outgoing traffic for any

irregularities, and blocks it accordingly, based on a predefined set of rules.

17.Hyper Text Markup Language (HTML)


HTML is a markup language that defines the structure or skeleton of a website. It

dictates how website pages should display on a browser. Other languages, such as

CSS and Javascript, are used with HTML to customize a page’s appearance. A piece of

HTML code is also called an element or a tag.

18.Host

A host is any type of device that can enable access to a network through a software, a

user interface, a protocol, a network address or any other way. Examples include a

desktop personal computer (PC) or a personal electronic equipment.

19.IP Address

An Internet Protocol (IP) address is a unique identifying number for a website, device or

a specific user on a network. Computers use IP addresses to talk to each other over the

web and on other networks.

20.Local Area Network (LAN)

LAN is a jargon that refers to a network that extends over a small area (usually within a

square mile or less). It connects a set of devices for the purpose of sharing resources

such as programs, documents, or printers. Shared files often are stored on a central file

server.
21.Managed Services

Managed services is an IT jargon that refers to the subscription model for providing

third-party business information-technology services, as well as the outsourced tasks

handled by the third-party. Organizations that provide managed services typically

handle technical support, infrastructure maintenance, network administration,

cybersecurity, and more for their clients. Managed service companies and their clients

are bound by a service level agreement (SLA).

22.Malware

Software programs designed to damage or do other unwanted actions on a computer;

common examples of malware include viruses, worms, trojan horses, and spyware.

23.Network

An assembly of interconnected computers capable of exchanging information. A

network can consist of as few as several personal computers on a LAN, or as large as

the internet, a worldwide network of devices.

24.Network Monitoring
A network monitoring tool is what administrators use to ensure that critical network

elements and systems are working in a correct manner. Network monitoring tools look

into the availability, performance and configuration of services, and send out alerts to

administrators whenever there are detected issues or anomalies. They allow analysts to

identify the underlying causes of issues and resolve them promptly.

25.Operating System (OS)

An operating system is a tech term that refers to an interface or piece of software where

a user interacts or controls a hardware, usually a computer. Several programs that

perform a specific function or task, and are written in different programmable languages,

run on it.

26.Packet

A unit of transmission in data communications. The TCP/IP protocol breaks large data

files into smaller chunks for sending over a network so that less data will have to be re-

transmitted if errors occur.

27.Phishing
A con that scammers use to electronically collect personal information from

unsuspecting users. Phishers send emails that appear to come from legitimate websites

such as eBay, PayPal, or other banking institutions asking you to click on a link included

in the email and then update or validate your information by entering your username

and password and often even more information, such as your full name, address, phone

number, social security number, and credit card number.

28.Remote Backup

Data loss can result from accidental deletion or corruption, network slowdown, hacking

incidents and viruses, and natural disasters like floods or fires. This is why it’s important

to have a robust backup strategy in place to ensure business continuity and keep data

safe.

One of the most popular solutions to prevent data loss is a remote backup service.

What this means is that, instead of storing data on-site or on a local storage device,

data is stored on off-site or cloud servers which can be accessed through the internet.

With remote backup, data is stored and replicated in multiple servers in different

locations. Encryption is often employed in remote backups to protect data from risks

while in transit or at rest.

29.SaaS (Software As A Service)


Software as a Service is a software delivery model in which software and associated

data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin

client via web browsers.

30. Server

A computer that is responsible for responding to requests made by a client program

(e.g., a web browser or an e-mail program) or device. Also referred to as a “file server.”

31.Service Provider

This jargon refers to entities that offer their expertise to another party. In the context of

information technology, examples of these organizations include internet service

providers (ISPs), web development services, cloud hosting services and managed

service providers (MSPs).

32.Search Engine Optimization

Search Engine Optimization is an IT jargon that refers to the practice of improving a

website’s visibility in the search engines’ results pages so that customers who are

searching for a company’s products and service can easily find it. To accomplish this, a

website should have the recommended structure and should be optimized for search

terms that match audience intent. There are around 40 or so search engines, but

Google is the most significant one that sites need to optimize for.
33.Social Network

A social network is a site or online platform where users who have similar interests can

communicate and connect with each other. The platform could come in the form of an

application that users can download to their mobile devices. As you may already know,

Facebook is a leading example of a social networking site, with over 2.9 billion monthly

users. Because of their reach, social networks are a free and effective tool in marketing

to an audience.

34.Software Development

Software development denotes the process of creating and deploying software using a

technical language to address a specific need. For the uninformed, the jargon software

refers to applications or a set of instructions or commands that allow hardware to

perform certain tasks. A related terminology in software development is build, which

refers to a pre-release version of a software.

34.Transmission Control Protocol/Internet Protocol (TCP/IP)

TCP/IP is a protocol that permits applications and computing devices to communicate to

each other over a network. It relates to an agreed upon set of rules that tells devices

how to exchange information online.TCP/IP is one of the most routinely used protocols
to send data packets across the net and ensure their successful delivery. Other similar

protocols like FTP, Gopher, and HTTP sit on top of TCP/IP.

35.User Interface (UI)

User interface is a technical term that refers to the point where human and machine

interactions take place. It is a piece of software designed to enable a user to operate

and control a device, website or application. There are different types of user interfaces,

such as a form-based UI (such as a settings menu on a mobile device), a graphical UI

(e.g., keyboard and monitor) and menu-driven UI (e.g., ATM machines).

36.Virtual Private Networking (VPN)

Using a VPN is a means of securely accessing resources on a network by connecting to

a remote access server through the Internet or other network.

37.Web Browsers

Web browsers are a type of application that enables users to access the World Wide

Web. The most popular browser is Google Chrome at 66% penetration rate, followed by

Microsoft Internet Explorer at 11% and Mozilla Firefox at 10%.

38.Web Servers
A web server is a piece of software that runs on a computer and serves users raw

elements comprising a website page when they make a query. Basically, when a

browser sends a request out across the net to another machine, that particular machine

has a piece of software called a server. It then renders the website page in the users’

browser.

39.Web Page

A web page is an electronic document that is composed of images, text, files and other

database content. A cluster of pages make up a website and are delivered by a server

to website visitors through a browser. Web pages are identified by a unique uniform

resource locator (URL) or domain name.

40.Wide Area Network (WAN)

WAN is a term that refers to a group of networked endpoints covering a large

geographical area. WANs enable information sharing and communication between

computing devices worldwide through a WAN provider. Because they are not linked with

a specific location, WANs enable distant localized networks to connect with each other.

41.antivirus
Software that is designed to detect, stop and remove viruses and other kinds of

malicious software.

42.app

Short for Application, typically refers to a software program for a smartphone or tablet.

43.attacker

Malicious actor who seeks to exploit computer systems with the intent to change,

destroy, steal or disable their information, and then exploit the outcome.

44. botnet

A network of infected devices, connected to the Internet, used to commit coordinated

cyber attacks without their owner’s knowledge.

45.breach

An incident in which data, computer systems or networks are accessed or affected in a

non-authorised way.

46.browser

A software application which presents information and services from the web.

47.brute force attack


Using a computational power to automatically enter a huge number of combination of

values, usually in order to discover passwords and gain access.

48.bring your own device (BYOD)

An organisation’s strategy or policy that allows employees to use their own personal

devices for work purposes.

49.certificate

A form of digital identity for a computer, user or organisation to allow the authentication

and secure exchange of information.

50.cloud (Arc Cloud)

Where shared compute and storage resources are accessed as a service (usually

online), instead of hosted locally on physical services. Resources can include

infrastructure, platform or software services.

51.credentials

A user’s authentication information used to verify identity – typically one, or more, of

password, token, certificate.

52.cyber attack

Malicious attempts to damage, disrupt or gain unauthorised access to computer

systems, networks or devices, via cyber means.

53.cyber incident

A breach of the security rules for a system or service – most commonly;


Attempts to gain un authorised access to a system and/or to data.

Unauthorised use of systems for the processing or storing of data.

Changes to a systems firmware, software or hardware without the system owners

consent.

Malicious disruption and/or denial of service.

54. cybersecurity(Arc Secure)

The protection of devices, services and networks — and the information on them —

from theft or damage.

55.data at rest

Describes data in persistent storage such as hard disks, removable media or backups.

56.dictionary attack

A type of brute force attack in which the attacker uses known dictionary words, phrases

or common passwords as their guesses.

57.digital footprint

A ‘footprint’ of digital information that a user’s online activity leaves behind.

58.denial of service (DoS)

When legitimate users are denied access to computer services (or resources), usually

by overloading the service with requests.

59.download attack
The unintentional installation of malicious software or virus onto a device without the

users knowledge or consent. May also be known as a drive-by download.

60.encryption

A mathematical function that protects information by making it unreadable by everyone

except those with the key to decode it.

61.end user device (EUD)

Collective term to describe modern smartphones, laptops and tablets that connect to an

organisation’s network.

62.exploit

May refer to software or data that takes advantage of a vulnerability in a system to

cause unintended consequences.

63.firewall (Arc Secure)

Hardware or software which uses a defined rule set to constrain network traffic to

prevent unauthorised access to or from a network.

64.hacker

In mainstream use as being someone with some computer skills who uses them to

break into computers, systems and networks.

65.honeypot (honeynet)
Decoy system or network to attract potential attackers that helps limit access to actual

systems by detecting and deflecting or learning from an attack. Multiple honeypots form

a honeynet.

66.incident

A breach of the security rules for a system or service, such as:

attempts to gain unauthorised access to a system and/or data

unauthorised use of systems for the processing or storing of data

changes to a systems firmware, software or hardware without the system owners

consent

malicious disruption and/or denial of service

67.insider risks

The potential for damage to be done maliciously or inadvertently by a legitimate user

with privilleged access to systems, networks or data.

68.Internet of things (IoT)

Refers to the ability of everyday objects (rather than computers and devices) to connect

to the Internet. Examples include kettles, fridges and televisions.

69.macro
A small program that can automate tasks in applications (such as Microsoft Office)

which attackers can use to gain access to (or harm) a system.

70.malvertising

Using online advertising as a delivery method for malware.

71.malware

Malicious software – a term that includes viruses, trojans, worms or any code or content

that could have an adverse impact on organisations or individuals.

72.mitigation

Steps that organisations and individuals can take to minimise and address risks.

73.network

Two or more computers linked in order to share resources.

74.patching

Applying updates to firmware or software to improve security and/or enhance

functionality.

75.pentest

Short for penetration test. An authorised test of a computer network or system designed

to look for security weaknesses so that they can be fixed.

76.pharming
An attack on network infrastructure that results in a user being redirected to an

illegitimate website despite the user having entered the correct address.

77.phishing (Don’t be a victim)

Untargeted, mass emails sent to many people asking for sensitive information (such as

bank details) or encouraging them to visit a fake website.

78.platform

The basic hardware (device) and software (operating system) on which applications can

be run.Cybersecurity in Essex.

79.ransomware

Malicious software that makes data or systems unusable until the victim makes a

payment.

80.router

A network device which sends data packets from one network to another based on the

destination address. May also be called a gateway.

81.software as a service (SaaS)

Describes a business model where consumers access centrally-hosted software

applications over the Internet.

82.sanitisation
Using electronic or physical destruction methods to securely erase or remove data from

memory.

83.smishing

Phishing via SMS: mass text messages sent to users asking for sensitive information

(eg bank details) or encouraging them to visit a fake website.

84.social engineering

Manipulating people into carrying out specific actions, or divulging information, that’s of

use to an attacker.

85.spear-phishing

A more targeted form of phishing, where the email is designed to look like it’s from a

person the recipient knows and/or trusts.

86.trojan

A type of malware or virus disguised as legitimate software, that is used to hack into the

victim’s computer.

87.two-factor authentication (2FA)

The use of two different components to verify a user’s claimed identity. Also known as

multi-factor authentication.

88.virus
Programs which can self-replicate and are designed to infect legitimate software

programs or systems. A form of malware.

89.Virtual Private Network (VPN)

An encrypted network often created to allow secure connections for remote users, for

example in an organisation with offices in multiple locations.

90.vulnerability

A weakness, or flaw, in software, a system or process. An attacker may seek to exploit

a vulnerability to gain unauthorised access to a system.

91.water-holing (watering hole attack)

Setting up a fake website (or compromising a real one) in order to exploit visiting users.

92.whaling

Highly targeted phishing attacks (masquerading as a legitimate emails) that are aimed

at senior executives.

93.whitelisting

Authorising approved applications for use within organisations in order to protect

systems from potentially harmful applications.

94.zero-day

Recently discovered vulnerabilities (or bugs), not yet known to vendors or antivirus

companies, that hackers can exploit.


95. Backward Compatibility

Most of us are familiar with the word “compatible,” meaning that two thing are able to

work together. Backwards compatibility refers to newer versions of a technology being

able to work with older versions.

For instance, when Windows updates its operating system, it usually retains backward

compatibility with older versions of Word or PowerPoint until a certain amount of time

has passed. After a few years, Windows expects most users to have updated to newer

versions of that software, and no longer supports the outdated versions.

96. Cache

A data cache is a way of storing frequently-accessed information in a way that it can be

retrieved more efficiently upon request. For instance, caches are frequently used by

web browsers to load previously-visited web pages more quickly.

However, to be efficient, caches must be relatively small. Overtime, a cache can grow

too large, take up unnecessary space, and cause your computer to slow down rather

than speed up. When this happens, the cache must sometimes be cleared to make

space for new files.

97. Cookies
An HTTP cookie is a small file sent by a website and stored in your browser to help the

website remember pertinent information about the website visitor. This information could

include usernames and passwords, address information, or browsing activity.

While cookies perform many essential and valuable functions for a website, they have

also raised privacy concerns and can be a security vulnerability.

98. Fragmentation and Defragmentation

Fragmentation happens as files are saved or deleted from a disk, and new files are

saved to occupy the space of the old. Defragmentation is the process of reordering the

files on the disk so that like files are stored together and in the proper order.

99. Latency

Latency refers to the delay between stimulation and response. You’ve probably noticed

it over a video call with a bad connection, where there’s a lag between what you’re

hearing over your microphone and what you see on your video. It can also refer to the

“slowness” of a computer, such as when you move your mouse across a screen but it

doesn’t respond right away.

Latency has a growing significance for businesses who rely on cloud-based applications.

To be usable, a service must provide low enough latency that the user doesn’t notice
any delay. This is hard to deliver on programs that run large amounts of data, but

improvements in technology are reducing latency in many places.

100.Licensing

Software licensing is a way for software providers to prevent copyright infringement.

Typically, when you purchase a software program, you are issued a license to use the

software on a certain number of devices, with a certain number of users, or for a certain

time period.Because the terms of various software licenses vary by manufacturer, it’s

sometimes difficult for large organizations to keep track of how many licenses they own,

and when they are set to expire. Software license management helps organizations

comply with their license agreements.

101. Log File and Log File Management

Computers keep a record of actions a log file which tracks when a file was opened,

edited, renamed, deleted, etc. These files are maintained for various purposes, mostly

those pertaining to security, systems operations, and compliance. If something goes

wrong with your system, or if someone tries to break in, a log file will show you what

took place and when. However, for these files to be of use, someone must monitor and

maintain them. Log file management is the process of reviewing, resolving, and saving

log files so that any bugs or security breaches are resolved in short order.
102.RMM

Remote Monitoring and Maintenance (RMM) refers to a broad range of IT tasks that a

provider can perform remotely, without having to come in to your offices or have

physical access to your computer systems.

103. Scalability

Scalability refers to the ability of hardware or software to grow to match the demands of

an increased workload. For instance, one of the common benefits of a cloud server is its

ability to scale at need, without the user having to buy a new server rack every time

their old one ran out of space.Similarly, business owners who anticipate hiring more

staff should consider the added demands these users will place on their network. Will

their network be able to handle the increased traffic, or will the owner need to invest in

extra infrastructure? Owners who expect to expand in the future but aren’t there yet can

still plan their networks so that they are more scalable for the future.

104.Scripting and Maintenance Scripting

A script is a special program used to automate tasks that a human operator would

otherwise have to execute one-by-one. Maintenance scripting creates and deploys

scripts to run routine administrative, maintenance, and reporting tasks.


105. Systems optimization

This refers to various ways in which systems or programs are modified to run more

smoothly. Defragmentation, maintenance scripting, and caching, and log file

maintenance are all forms of systems optimization.

106.VPN

A Virtual Private Network (VPN) allows users to use a public network to remotely

access a network, such as a company intranet, securely. VPNs help remote workers

access company files securely, and can also help separate offices share files as though

they were located in the same space.

107.Application programming interface (API)

API is software that allows computers or applications to communicate with each other.

108.Application

An application is software that completes a task, whether for a user or another

application.

109.Attribute

An attribute is a specification that provides extra information about an element.

110.Back end

The back end is the server side of an application that provides functionality and is

inaccessible to users.

111.Bug
A bug is a coding error that interferes with a website's normal operation.

112.DevOps

DevOps is a series of practices and tools that blends software development and IT

operations.

113.Framework

A framework is a program, code library or another component for developing software

applications.

114.Front end

The front end is the user side of an application that displays information and allows

users to interact with the program.

115.Library

A library is a collection of pre-written code that programmers often use to save time

when writing applications.

116.Object-oriented programming (OOP):

OOP is a programming model that categorizes software design by data (objects)

instead of logic and functions.

117.Software

Software is a computer's operating instructions that tell it how to function.

118.Text editor
A text editor is a program for writing plain text for coding.

119.Version control

Version control is a program that tracks code or file changes to a website or app,

allowing users to restore earlier versions.

120.At-rule

An at-rule is a statement that provides a programming language with instructions.

121.Coding

Coding refers to using a programming language for software development.

122.Comment

A comment adds explanatory notes to the code without affecting the document's layout.

123. Declaration

A declaration is a statement that introduces identifiers and specifies their properties.

124. Element

An element is a single component of a larger group, like a fragment of computer code.

125. Identifier

An identifier is a symbol that names language entities like types, variables and labels.

126. Meta elements

Meta elements are tags part of a website's head section that structure metadata.

127. Opening and closing tags


Opening and closing tags start and end a section of page content.

128. Padding

Padding is the space between an element's border and content.

129. Selector

A selector instructs the elements you want the programming language to target.

130. Self-closing tag

A self-closing tag is a code element that automatically ends.

131. Semantic element

A semantic element is a human language that describes the meaning of a piece of code.

132. Structural elements

Structural elements are pieces of code that organize a document.

133. Value

A value is a definite object that a program can manipulate.

134. Whiteboarding

Whiteboarding is the manual process of tracking work progress, typically using

whiteboards, charts or drawings.Web server: A web server is a computer that stores

and delivers web pages.


135. Algorithm

An algorithm is a set of instructions for a program.

136. Big data

Big data is a set of data that's too large for a traditional processing system to handle.

137. Data architecture

Data architecture is the structure that an organization has to collect, store and use its

information.

138. Database

A database is a collection of information that is easily accessible by computers.

139. Data modeling

Data modeling is analyzing a business's requirements for collecting and storing

information.

140. Data visualization

Data visualization is the use of charts, tables or graphics to analyze and communicate

information.

141. Load balancing

Load balancing distributes tasks across multiple resources.

142. Parallel processing


Parallel processing is a method of running two or more CPUs to complete separate

parts of a task.

143. Relational database management system (RDMS)

An RDMS organizes information into tables while maintaining data integrity.

144. Semi-structured data

Semi-structured data is information that contains some standard tags and structural

elements but varies from traditional organizational practices.

145. Volume

Volume is the total amount of data.

146. Color theory

Color theory is a set of guidelines designers use to create visually appealing color

combinations.

147. Color value

Color value is a color's shade or hue.

148. Grid system

The grid system contains a set of rows and columns for arranging content on a website.

Pixels per inch (PPI): PPI is a measurement that shows the clarity of a digital image.

149.Raster images
Raster images are computer graphics that designers can edit pixel by pixel.

150. Resolution

Resolution is how many pixels a device can display.

151. Retina display

Retina display is when a device has a PPI that's so high that users can't see the

individual pixels.

152. Vector images

Vector images are graphics that comprise mathematical lines instead of pixels.

A/B testing: A/B testing is an experiment that compares the performance of two versions

of a website or app.

153. Content marketing

Content marketing uses blog posts, videos and other materials to attract potential

customers.

154. Conversion

Conversion is when a potential customer becomes a paying customer.

155. Data mining

Data mining is the practice of analyzing consumer behaviors to optimize marketing

campaigns.
156. Email marketing

Email marketing is the practice of sending emails to potential and current customers.

157. Growth hacking

Growth hacking is using technology, analytics and product development to grow a

company's audience.

158.Website optimization

Website optimization is the practice of improving a site's ability to rank in search

engines and appeal to users.

159. Address

An address is a series of numbers that identifies a network adapter.

160. Bus

A bus is a data path that transfers information within a computer or between computers.

Cache: A cache is a storage location that gathers temporary data to help websites load

faster.

161. Core

The core is the part of the CPU that performs logical operations and arithmetic.

162. Flash memory

Flash memory is a computer storage chip that is easily re-programmable.

163. Hardware
Hardware refers to the physical parts of a computer.

164. Input device

An input device is a piece of equipment that controls or provides to a computer.

165. Mouse

A mouse is a device that users move to navigate a cursor on a screen.

166. Network

A network is a group of computers and other devices

167. Operating system

An operating system is software that manages computer hardware and provides

services for computer programs.

168. Output device

An output device is a piece of equipment that displays information from a computer.

169. Random-access memory (RAM)

RAM is a type of data storage that makes data items quickly accessible.

170. Volatile memory

Volatile memory is a type of data storage that requires power to store information.

171. Hybrid app

A hybrid app is a combination of a native app and a web app.


172. Integrated development environment (IDE)

IDE is a software application with source code editors, automation tools and debuggers.

173. Native app

A native app is a software program that works on a specific platform.

174. Near field communication (NFC)

NFC is a technology mobile devices use to communicate via radio waves.

175. Responsive web design

Responsive web design ensures websites can perform well on devices of various sizes

like computers, tablets and phones.

176. Software development kit (SDK)

An SDK is a collection of tools for creating software.

177. Web apps

Web apps are websites that look and function like apps.

178. Cloud computing

Cloud computing is a method of storing data across remote servers instead of on a local

computer.

179. Domain Name System (DNS)

A DNS is a service for accessing a networked computer by its name instead of its IP

address.
180. Downloading and uploading

Downloading and uploading transfers files from a remote computer to your computer.

181. Firewall

A firewall is a security device that monitors network traffic and prevents unauthorized

access.

182. Routers

A router is a device that connects two local area networks.

183. Uptime and downtime

Uptime and downtime describe how long a website or computer has been operating or

not operating.

184. Virtual machine (VM)

A virtual machine is software that allows you to use one computer operating system with

another.

185. Virtual private network (VPN)

A VPN is a network that allows you to use public Internet connections as private

networks.

186. Character

A character is any number, letter, punctuation mark or symbol within a font.


187. Font family

A font family is a collection of similar typefaces that share standard design traits.

188. Kerning

Kerning is a typeface's built-in spacing between individual characters.

189.Leading

Leading is the vertical space between lines of text.

190.Tracking

Tracking is the spacing between characters across a sequence of characters.

191. Typeface

Typeface is the style of a font.

192. Type hierarchy

A type hierarchy is a system for organizing type on a web page, usually designating

fonts for headings and subheadings.

193. Serif

Serif describes a font that has characters with small lines at the ends of the letters'

194.largBounce rate

Bounce rate is a measurement that describes how quickly users leave a page once

they click on it.


195. Breadcrumbs

Breadcrumbs are a series of hyperlinked text boxes that help users navigate back to

previous pages.

196. Clickstream

A clickstream is the pathway users take as they navigate a website.

197. Sitemap

A sitemap is a website's outline that shows the relationship between components like

pages, links and videos.

198. User interface (UI)

A UI includes display screens, website menus and other parts of a website that visitors

can view and manipulate.

199.User persona

A user persona is a theoretical profile that describes a website's ideal visitor.

200. User research

User research is analyzing visitor behavior to create an optimized website.

201. User experience (UX)


UX considers how easy a website is for someone to use and the visitor's emotions

while on the page.

202. Wireframe

A wireframe is a sketch that shows what's going to appear on a website.er strokes.

203. ISP

The ISP (Internet Service Provider) is the company who provides you with your

connection to the internet. Your ISP is responsible for ensuring you have a fully working

connection to the internet at all times. If there’s ever a disconnection or disruption of

service, you need to call them for help and advice.

204. IP Address

Your IP or internet protocol address is a string of numerical data that relates to your

computer on the network. If you want to connect to another computer, it connects to the

IP address. It’s also an excellent way to identify your computer over a network, unless

your IP changes regularly. You’re given an IP by the Dynamic Host Configuration

Protocol unless you’re configuring your network settings yourself.

205. Router

A router is a piece of hardware that sends traffic between your computer and the

internet. You’ve probably also got one at home. All traffic you send from your computer

to the internet, and vice versa go through the router. Without a working router, you won’t

have an internet connection.

206. Ethernet
If you’re using wired technology instead of wireless, you’re probably using an Ethernet

cable. The cable runs from your computer to the router, and a disconnection here will

cause a loss in internet connection.

207.Firewall

A firewall is a necessary piece of software or hardware to ensure blockage from

potentially damaging traffic. It’s possible to set the firewall to ensure only certain traffic

is blocked, but other traffic from specific IP addresses is allowed through. Without a

firewall in place, your network and data are left exposed and could be tampered with.

208. LAN

A LAN (local area network) is a small network that’s reserved for a local area. If you

have a LAN in your office or home, it means your computer and the others around you

are all connected to the same network. The connection makes it easy to share data and

files with the people who are connected to the LAN, saving time and resources.

209.Gateway

Gateway in a business environment is the central hub that routes the traffic from your

individual computer to the network outside of your organisation, which is serving the

web pages you’re trying to use. If at home, the gateway is your ISP and connects you to

the internet.

210. DNS

A domain name system is what your computer will recognise as the address of a

website. The domain name you type into the URL bar in English is translated into data
that the computer will understand. Your computer will then contact the server that the

web address is running from, and that’s how you connect to a web page.

211. WAN

Whereas a LAN is a local host, a WAN is a wide area network. It reaches a much

broader network than the one you use at home or with other computers in the office.

Your internet service provider will connect you to their WAN.

212. Port

You probably use quite a lot of applications throughout the day. The port is how your

computer and network know which application is being used and what data to send. The

port number can range between 1 and 65535, and a standard HTTP uses port 80. This

is how your computer differentiates between traffic to enable you to communicate with

the correct applications.

213. Packets

When you access a web page, your computer sends over a packet of data to the

servers that are hosting it. Once you have requested information from the web page, it

will send back a packet of data to your computer. The information within the packet is

how the web page is formed and then translates to what you see on your computer.

214. Antivirus
Software designed to detect and destroy computer viruses

215. AI (Artificial Intelligence)

Intelligence demonstrated by machines, primarily devices that perceives their

environment and takes actions

216. AMD (Advanced Micro Devices)

A manufacturer of CPUs, processors, flash memories and other computer hardware

217. Algorithm

A set of rules to be followed in calculations, especially by a computer

218. API (Application Programming Interface)

A set of rules that allow the creation of applications, which access the data of an

operating system, applications or service

219. App (Application)

A piece of software developed to be installed on mobile devices

220. Adware

Software that automatically displays or downloads advertising material when a user is

online.

221. BIOS (Basic Input / Output System)

A set of computer rules in firmware, that controls the input and output operations

222. Byte
A unit of data that contains eight binary bits. Or a series of eights zeros and ones.

223. Botnet

A network of private computers infected with malicious software, controlled as a group

224. Backdoor

The access of a computer system with encrypted data that bypasses the systems

security system

225. Bandwidth

The amount of data that is transferred or passed from one destination to another.

226. Cache

These are temporary files downloaded for web content. Your computer reloads these

files when you revisit a webpage

227. Cloud

The cloud is where data is stored, controlled from remote servers via an internet

connection. Find out more about Cloud service here

228. Corrupted

A data file that is no longer usable, usually from infection of a virus

229. Cybersecurity

A term created to describe all the security put in place to protect computers from

cyberattacks. Find out more about Cyber Security.


230.Cyberattacks

A group of hackers who aim to damage or destroy a computer network or system

231. Cryptocurrency

A digital currency in which encryption skills are used to regularly generate units of

currency, to verify the transfer of funds.

232. DDoS (Distributed Denial of Service)

The intention of harming and stopping a computer network, by flooding it with data sent

from many individual computers

233. Dark Web

A part of the World Wide Web that is only reachable via special software and

applications. The dark web allows users to operate whilst remaining untraceable

234. Downtime

A total outage of power, communication or business

235. Data Breach

A security incident where sensitive and personal information is copied, transmitted,

viewed or stolen

236. Decryption
The process of taking encoded of encrypted text and translating it into text the user

understands

237. DNS (Domain Name System)

The internet’s system for converting alphabetic names into numeric IP addresses e.g.

Submitting a URL and taking the user to the IP address associated with that name

238. Disaster Recovery

An IT service that provides a full backup of information, data and service so that a

business can quickly resume. Find out more about Disaster Recovery here.

239. Encryption

The process of changing information or data into a code, especially to prevent

unauthorized access

240. EXE

A file extension for an executable format. Used to unload software to be installed on a

computer

241. Edge Computing

Allows data to be processed closer to where it is created, rather than transmitting it

across long routes to data points or clouds.

242. Firewall
A network security system, that controls any incoming or outcoming network traffic

243. File sharing

A technique used to distribute access to digital media, documents or e-books

244. FTP (File Transfer Protocol)

A client protocol used for transferring files with a host computer. Usually authenticated

with usernames and passwords.

245. Gigabyte

A unit of data that contains data equal to one thousand million bytes

246. GIF (Graphic Interchange Format)

A file format that supports animated and static images

247. GUI (Graphical User Interface)

A user interface that includes graphical elements, like windows, icons and buttons.

248. Hacker

A person who uses a computer to gain unauthorized access to data

249. HTML (Hypertext Markup Language)

A universally known system for text tagging files. Meaning you can achieve font, colours,

graphics and hyperlinks, to be used on World Wide Web pages

250. Hotspot (WiFi)


A physical location where people may obtain internet access using WiFi technology.

This can be done via a router connected to a WLAN.

251. Infrastructure

The IT infrastructure refers to everything; the network, the servers etc. Find out more

about IT Infrastructure.

252. IT (Information Technology)

Anything related to computing technology

253. IMEI (International Mobile Equipment Identity)

A 15 or 17 digital code that uniquely identifies mobile phone devices

254. IP Address

A unique address that identifies a device on the internet or on a local network

255. ISP (Internet Service provider)

A company that provides customers with Internet access

256. IOS

An operating system used for mobile devices manufactured by Apple.

257. Java

A programming language that produces software for a host of platforms

258. JavaScript
An object-orientated computer programming language used to mainly created

interactive effects on web browsers

259. Key Logger

Software which records/logs the keys struck on a keyboard

260. Kilobyte

A unit of data that contains data equal to one thousand and twenty four bytes

261. LAN (Local Area Network)

A computer network that spans a relatively small area, usually based in a single room

or building

262. Linux

An open-source operating system modelled on UNIX

263. Malware

Software which specifically disrupts or damages a computer, or gains access to a users

system

264. Megabyte

A unit of data that contains data equal to one million, forty eight thousand, five hundred

and seventy six bytes

265. Motherboard
A printed circuit board containing the principal components of a computer or other

device.

266. NOS (Network Operating System)

A computer operating system that is designed primarily to support a personal computer

267. NTFS (New Technology File System)

A file system that Windows uses for storing and retrieving files on a hard disk.

268. Operating System

This is the software that supports a computers basic functions.

269. Phishing

A practice of sending fraudulent emails pretending to be from reputable companies, with

the aim to induce individuals to reveal personal information

270. PDF (Portable Document Format)

A file format for capturing and sending electronic information, so it can be viewed in

exactly the intended format

271. Peer to peer

Networks in which each computer can act as a server for the other, allowing file sharing

without a central server

272. POP (Post Office Protocol)


A type of computer networking that extracts and retrieves email from a remote mail

server

273. Protocol

The official procedure or system of rules for transmitting data between electronic

devices, such as computers

274. Proxy Server

A server that sits between a client application, like a web browser, and a real server

275. Ransomware

A type of malicious software designed to block access to computer system or network,

until a sum of money has been paid

276. RAM (Random Access Memory)

A type of computer memory that can be accessed randomly. This means any byte of

memory can be accessed without touching the preceding bytes

277. Router

A networking device that transfers data packets between computer networks

278. ROM (Read Only Memory)

A type of storage medium that permanently stores data, meaning it can only be read

and not written


279. Server

A computer or computer program that manages access to network resources

280. Software

A set of instructions or programs instructing a computer to do specific tasks. Software is

the universal term to describe computer programs

281. Spyware

Software that is installed on a computer device with the computer users knowing about

it.

282. SEO (Search Engine Optimization)

The practice of increasing the quantity and quality of traffic to a website.

283. Spam

Internet messages that are irrelevant and unsolicited, typically to many users. Usually

for the purposes of advertising, phishing or spreading viruses

284. Troubleshoot

The process of analysing and solving a serious problem

285. Trojan Horse

A computer program designed appear harmless, but is actually malicious and loaded

with a computer virus


286. UX (User Experience)

The concept of encompassing all aspects of the end-user’s interaction with a web site,

program or application

287. UNIX

A multi-user operating system designed for flexibility, UNIX was one of the first

operating systems to be written in C language

288. UAC (User Account Control)

A feature that is in place to stop unauthorized changes to your computer, by telling the

user that an action could potentially affect your computers safety

289. USB (Universal Serial Bus)

A common interface that enables communication between devices and a host controller,

such as a computer

290. VPN (Virtual Private Network)

A network that is constructed using public wires, to connect remote users or regional

office to a companies network

291. Virus

A piece of code which is capable of destroying itself and having a detrimental effect,

usually corrupting the system or destroying computer data

292. Virtual Memory


Computer memory that appears to exist as main storage although it is supported as

secondary storage.

293. Worm

A standalone malware computer program that replicates itself in order to spread to

other computers

294. WAN (Wide Area network)

A network that exists over a large scale area. The purpose is to connect different

smaller networks, such as LAN and metro area networks.

295. WEP (Wired Equivalent Privacy)

A security protocol that is designed to provide a wireless local area network (WLAN)

with a level of security and privacy

296. Wi-Fi

A wireless networking technology that allows computers and other devices to

communicate over a wireless signal

297. WLAN (Wireless Local Area Network)

A wireless distribution method for two or more devices that use high frequency radio

waves to include an access point to the internet

298. XML (Extensible Mark-up Language)


A metalanguage which allows users to define their own customized mark-up languages,

in order to display documents on the internet.

299. Zip file

A computer file whose contents are compressed for storage or transmission.

You might also like