Professional Documents
Culture Documents
Jargons in It
Jargons in It
which refers to a set of functions that enables two apps to talk to each other. In simpler
terms, an API establishes a connection between a platform and an end user. API
providers such as Facebook allow companies to access their technology without having
Simply put, BYOD is a type of workplace policy that allows an employee to use their
important to have regular updates applied to your company’s BYOD as virus and
Business intelligence is probably a word that gets thrown around a lot in recent years.
The jargon refers to the practice where companies leverage data to make informed
decisions. BI also refers to the technical infrastructure and processes applied to analyze
data derived from a company’s activities. The insights gleaned from this data is often
used to streamline operations, reduce costs, increase productivity and develop new
processes.
4.Carrier
The IT jargon “carrier” is short for “wireless carrier.” It refers to a company that provides
This is a jargon used in website design and development. In simpler terms, it refers to a
style language that is used to format the layout of website pages. Basically, it describes
the presentation of a page that was created using a markup language like HTML or
XML. CSS enables site developers to create a cohesive appearance for a website.
6.Cloud Hosting
The ability to store data and applications on virtual servers outside the physical office
An application that allows businesses to manage relationships and the data and
information associated with them. Used to store customer and prospect contact
information, accounts, leads, and sales opportunities in one central location usually in
9.Computer Network
has the ability to communicate and share resources with each other. It has two
components: the nodes and links. Communication protocols provide the instructions on
how these links carry information between nodes. The network endpoints, also known
Devices in this network can be connected over a public network or private one.
Residences and office-based businesses commonly use a private network, which has
10.Cookies
A small piece of information you may be asked to accept when connecting to certain
servers via a web browser. It is used throughout your session as a means of identifying
you. A cookie is specific to and sent only to the server that generated it.
11.Data Breach
This is a security incident where a company’s private information (or their customer
information) is stolen. Usually done through hacking or phishing scams. Common data
breach exposures include personal information, such as credit card numbers, Social
12.Digital Marketing
Also known as online marketing, digital marketing is the strategic use of digital channels
search engine optimization, pay-per-click advertising and social media marketing are all
forms of digital marketing. The best way to reap the benefits of online marketing is to
means the phonebook of the internet. DNS is a decentralized system for accessing a
14.Encryption
The coding and scrambling of data to prevent it from being viewed by anyone who is not
the intended recipient. Any website that has an HTTPS certificate uses encrypted data.
The two different “sides” of a website. The front-end is also known as the client-side and
is usually considered the web design. The back-end of the website is also known as the
server-side.
16.Firewall
particular network. It inspects the contents of incoming and outgoing traffic for any
dictates how website pages should display on a browser. Other languages, such as
CSS and Javascript, are used with HTML to customize a page’s appearance. A piece of
18.Host
A host is any type of device that can enable access to a network through a software, a
user interface, a protocol, a network address or any other way. Examples include a
19.IP Address
An Internet Protocol (IP) address is a unique identifying number for a website, device or
a specific user on a network. Computers use IP addresses to talk to each other over the
LAN is a jargon that refers to a network that extends over a small area (usually within a
square mile or less). It connects a set of devices for the purpose of sharing resources
such as programs, documents, or printers. Shared files often are stored on a central file
server.
21.Managed Services
Managed services is an IT jargon that refers to the subscription model for providing
cybersecurity, and more for their clients. Managed service companies and their clients
22.Malware
common examples of malware include viruses, worms, trojan horses, and spyware.
23.Network
24.Network Monitoring
A network monitoring tool is what administrators use to ensure that critical network
elements and systems are working in a correct manner. Network monitoring tools look
into the availability, performance and configuration of services, and send out alerts to
administrators whenever there are detected issues or anomalies. They allow analysts to
An operating system is a tech term that refers to an interface or piece of software where
perform a specific function or task, and are written in different programmable languages,
run on it.
26.Packet
A unit of transmission in data communications. The TCP/IP protocol breaks large data
files into smaller chunks for sending over a network so that less data will have to be re-
27.Phishing
A con that scammers use to electronically collect personal information from
unsuspecting users. Phishers send emails that appear to come from legitimate websites
such as eBay, PayPal, or other banking institutions asking you to click on a link included
in the email and then update or validate your information by entering your username
and password and often even more information, such as your full name, address, phone
28.Remote Backup
Data loss can result from accidental deletion or corruption, network slowdown, hacking
incidents and viruses, and natural disasters like floods or fires. This is why it’s important
to have a robust backup strategy in place to ensure business continuity and keep data
safe.
One of the most popular solutions to prevent data loss is a remote backup service.
What this means is that, instead of storing data on-site or on a local storage device,
data is stored on off-site or cloud servers which can be accessed through the internet.
With remote backup, data is stored and replicated in multiple servers in different
locations. Encryption is often employed in remote backups to protect data from risks
data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin
30. Server
(e.g., a web browser or an e-mail program) or device. Also referred to as a “file server.”
31.Service Provider
This jargon refers to entities that offer their expertise to another party. In the context of
providers (ISPs), web development services, cloud hosting services and managed
website’s visibility in the search engines’ results pages so that customers who are
searching for a company’s products and service can easily find it. To accomplish this, a
website should have the recommended structure and should be optimized for search
terms that match audience intent. There are around 40 or so search engines, but
Google is the most significant one that sites need to optimize for.
33.Social Network
A social network is a site or online platform where users who have similar interests can
communicate and connect with each other. The platform could come in the form of an
application that users can download to their mobile devices. As you may already know,
Facebook is a leading example of a social networking site, with over 2.9 billion monthly
users. Because of their reach, social networks are a free and effective tool in marketing
to an audience.
34.Software Development
Software development denotes the process of creating and deploying software using a
technical language to address a specific need. For the uninformed, the jargon software
each other over a network. It relates to an agreed upon set of rules that tells devices
how to exchange information online.TCP/IP is one of the most routinely used protocols
to send data packets across the net and ensure their successful delivery. Other similar
User interface is a technical term that refers to the point where human and machine
and control a device, website or application. There are different types of user interfaces,
37.Web Browsers
Web browsers are a type of application that enables users to access the World Wide
Web. The most popular browser is Google Chrome at 66% penetration rate, followed by
38.Web Servers
A web server is a piece of software that runs on a computer and serves users raw
elements comprising a website page when they make a query. Basically, when a
browser sends a request out across the net to another machine, that particular machine
has a piece of software called a server. It then renders the website page in the users’
browser.
39.Web Page
A web page is an electronic document that is composed of images, text, files and other
database content. A cluster of pages make up a website and are delivered by a server
to website visitors through a browser. Web pages are identified by a unique uniform
computing devices worldwide through a WAN provider. Because they are not linked with
a specific location, WANs enable distant localized networks to connect with each other.
41.antivirus
Software that is designed to detect, stop and remove viruses and other kinds of
malicious software.
42.app
Short for Application, typically refers to a software program for a smartphone or tablet.
43.attacker
Malicious actor who seeks to exploit computer systems with the intent to change,
destroy, steal or disable their information, and then exploit the outcome.
44. botnet
45.breach
non-authorised way.
46.browser
A software application which presents information and services from the web.
An organisation’s strategy or policy that allows employees to use their own personal
49.certificate
A form of digital identity for a computer, user or organisation to allow the authentication
Where shared compute and storage resources are accessed as a service (usually
51.credentials
52.cyber attack
53.cyber incident
consent.
The protection of devices, services and networks — and the information on them —
55.data at rest
Describes data in persistent storage such as hard disks, removable media or backups.
56.dictionary attack
A type of brute force attack in which the attacker uses known dictionary words, phrases
57.digital footprint
When legitimate users are denied access to computer services (or resources), usually
59.download attack
The unintentional installation of malicious software or virus onto a device without the
60.encryption
Collective term to describe modern smartphones, laptops and tablets that connect to an
organisation’s network.
62.exploit
Hardware or software which uses a defined rule set to constrain network traffic to
64.hacker
In mainstream use as being someone with some computer skills who uses them to
65.honeypot (honeynet)
Decoy system or network to attract potential attackers that helps limit access to actual
systems by detecting and deflecting or learning from an attack. Multiple honeypots form
a honeynet.
66.incident
consent
67.insider risks
Refers to the ability of everyday objects (rather than computers and devices) to connect
69.macro
A small program that can automate tasks in applications (such as Microsoft Office)
70.malvertising
71.malware
Malicious software – a term that includes viruses, trojans, worms or any code or content
72.mitigation
Steps that organisations and individuals can take to minimise and address risks.
73.network
74.patching
functionality.
75.pentest
Short for penetration test. An authorised test of a computer network or system designed
76.pharming
An attack on network infrastructure that results in a user being redirected to an
illegitimate website despite the user having entered the correct address.
Untargeted, mass emails sent to many people asking for sensitive information (such as
78.platform
The basic hardware (device) and software (operating system) on which applications can
be run.Cybersecurity in Essex.
79.ransomware
Malicious software that makes data or systems unusable until the victim makes a
payment.
80.router
A network device which sends data packets from one network to another based on the
82.sanitisation
Using electronic or physical destruction methods to securely erase or remove data from
memory.
83.smishing
Phishing via SMS: mass text messages sent to users asking for sensitive information
84.social engineering
Manipulating people into carrying out specific actions, or divulging information, that’s of
use to an attacker.
85.spear-phishing
A more targeted form of phishing, where the email is designed to look like it’s from a
86.trojan
A type of malware or virus disguised as legitimate software, that is used to hack into the
victim’s computer.
The use of two different components to verify a user’s claimed identity. Also known as
multi-factor authentication.
88.virus
Programs which can self-replicate and are designed to infect legitimate software
An encrypted network often created to allow secure connections for remote users, for
90.vulnerability
Setting up a fake website (or compromising a real one) in order to exploit visiting users.
92.whaling
Highly targeted phishing attacks (masquerading as a legitimate emails) that are aimed
at senior executives.
93.whitelisting
94.zero-day
Recently discovered vulnerabilities (or bugs), not yet known to vendors or antivirus
Most of us are familiar with the word “compatible,” meaning that two thing are able to
For instance, when Windows updates its operating system, it usually retains backward
compatibility with older versions of Word or PowerPoint until a certain amount of time
has passed. After a few years, Windows expects most users to have updated to newer
96. Cache
retrieved more efficiently upon request. For instance, caches are frequently used by
However, to be efficient, caches must be relatively small. Overtime, a cache can grow
too large, take up unnecessary space, and cause your computer to slow down rather
than speed up. When this happens, the cache must sometimes be cleared to make
97. Cookies
An HTTP cookie is a small file sent by a website and stored in your browser to help the
website remember pertinent information about the website visitor. This information could
While cookies perform many essential and valuable functions for a website, they have
Fragmentation happens as files are saved or deleted from a disk, and new files are
saved to occupy the space of the old. Defragmentation is the process of reordering the
files on the disk so that like files are stored together and in the proper order.
99. Latency
Latency refers to the delay between stimulation and response. You’ve probably noticed
it over a video call with a bad connection, where there’s a lag between what you’re
hearing over your microphone and what you see on your video. It can also refer to the
“slowness” of a computer, such as when you move your mouse across a screen but it
Latency has a growing significance for businesses who rely on cloud-based applications.
To be usable, a service must provide low enough latency that the user doesn’t notice
any delay. This is hard to deliver on programs that run large amounts of data, but
100.Licensing
Typically, when you purchase a software program, you are issued a license to use the
software on a certain number of devices, with a certain number of users, or for a certain
time period.Because the terms of various software licenses vary by manufacturer, it’s
sometimes difficult for large organizations to keep track of how many licenses they own,
and when they are set to expire. Software license management helps organizations
Computers keep a record of actions a log file which tracks when a file was opened,
edited, renamed, deleted, etc. These files are maintained for various purposes, mostly
wrong with your system, or if someone tries to break in, a log file will show you what
took place and when. However, for these files to be of use, someone must monitor and
maintain them. Log file management is the process of reviewing, resolving, and saving
log files so that any bugs or security breaches are resolved in short order.
102.RMM
Remote Monitoring and Maintenance (RMM) refers to a broad range of IT tasks that a
provider can perform remotely, without having to come in to your offices or have
103. Scalability
Scalability refers to the ability of hardware or software to grow to match the demands of
an increased workload. For instance, one of the common benefits of a cloud server is its
ability to scale at need, without the user having to buy a new server rack every time
their old one ran out of space.Similarly, business owners who anticipate hiring more
staff should consider the added demands these users will place on their network. Will
their network be able to handle the increased traffic, or will the owner need to invest in
extra infrastructure? Owners who expect to expand in the future but aren’t there yet can
still plan their networks so that they are more scalable for the future.
A script is a special program used to automate tasks that a human operator would
This refers to various ways in which systems or programs are modified to run more
106.VPN
A Virtual Private Network (VPN) allows users to use a public network to remotely
access a network, such as a company intranet, securely. VPNs help remote workers
access company files securely, and can also help separate offices share files as though
API is software that allows computers or applications to communicate with each other.
108.Application
application.
109.Attribute
110.Back end
The back end is the server side of an application that provides functionality and is
inaccessible to users.
111.Bug
A bug is a coding error that interferes with a website's normal operation.
112.DevOps
DevOps is a series of practices and tools that blends software development and IT
operations.
113.Framework
applications.
114.Front end
The front end is the user side of an application that displays information and allows
115.Library
A library is a collection of pre-written code that programmers often use to save time
117.Software
118.Text editor
A text editor is a program for writing plain text for coding.
119.Version control
Version control is a program that tracks code or file changes to a website or app,
120.At-rule
121.Coding
122.Comment
A comment adds explanatory notes to the code without affecting the document's layout.
123. Declaration
124. Element
125. Identifier
An identifier is a symbol that names language entities like types, variables and labels.
Meta elements are tags part of a website's head section that structure metadata.
128. Padding
129. Selector
A selector instructs the elements you want the programming language to target.
A semantic element is a human language that describes the meaning of a piece of code.
133. Value
134. Whiteboarding
Big data is a set of data that's too large for a traditional processing system to handle.
Data architecture is the structure that an organization has to collect, store and use its
information.
138. Database
information.
Data visualization is the use of charts, tables or graphics to analyze and communicate
information.
parts of a task.
Semi-structured data is information that contains some standard tags and structural
145. Volume
Color theory is a set of guidelines designers use to create visually appealing color
combinations.
The grid system contains a set of rows and columns for arranging content on a website.
Pixels per inch (PPI): PPI is a measurement that shows the clarity of a digital image.
149.Raster images
Raster images are computer graphics that designers can edit pixel by pixel.
150. Resolution
Retina display is when a device has a PPI that's so high that users can't see the
individual pixels.
Vector images are graphics that comprise mathematical lines instead of pixels.
A/B testing: A/B testing is an experiment that compares the performance of two versions
of a website or app.
Content marketing uses blog posts, videos and other materials to attract potential
customers.
154. Conversion
campaigns.
156. Email marketing
Email marketing is the practice of sending emails to potential and current customers.
company's audience.
158.Website optimization
159. Address
160. Bus
A bus is a data path that transfers information within a computer or between computers.
Cache: A cache is a storage location that gathers temporary data to help websites load
faster.
161. Core
The core is the part of the CPU that performs logical operations and arithmetic.
163. Hardware
Hardware refers to the physical parts of a computer.
165. Mouse
166. Network
RAM is a type of data storage that makes data items quickly accessible.
Volatile memory is a type of data storage that requires power to store information.
IDE is a software application with source code editors, automation tools and debuggers.
Responsive web design ensures websites can perform well on devices of various sizes
Web apps are websites that look and function like apps.
Cloud computing is a method of storing data across remote servers instead of on a local
computer.
A DNS is a service for accessing a networked computer by its name instead of its IP
address.
180. Downloading and uploading
Downloading and uploading transfers files from a remote computer to your computer.
181. Firewall
A firewall is a security device that monitors network traffic and prevents unauthorized
access.
182. Routers
Uptime and downtime describe how long a website or computer has been operating or
not operating.
A virtual machine is software that allows you to use one computer operating system with
another.
A VPN is a network that allows you to use public Internet connections as private
networks.
186. Character
A font family is a collection of similar typefaces that share standard design traits.
188. Kerning
189.Leading
190.Tracking
191. Typeface
A type hierarchy is a system for organizing type on a web page, usually designating
193. Serif
Serif describes a font that has characters with small lines at the ends of the letters'
194.largBounce rate
Bounce rate is a measurement that describes how quickly users leave a page once
Breadcrumbs are a series of hyperlinked text boxes that help users navigate back to
previous pages.
196. Clickstream
197. Sitemap
A sitemap is a website's outline that shows the relationship between components like
A UI includes display screens, website menus and other parts of a website that visitors
199.User persona
202. Wireframe
203. ISP
The ISP (Internet Service Provider) is the company who provides you with your
connection to the internet. Your ISP is responsible for ensuring you have a fully working
204. IP Address
Your IP or internet protocol address is a string of numerical data that relates to your
computer on the network. If you want to connect to another computer, it connects to the
IP address. It’s also an excellent way to identify your computer over a network, unless
205. Router
A router is a piece of hardware that sends traffic between your computer and the
internet. You’ve probably also got one at home. All traffic you send from your computer
to the internet, and vice versa go through the router. Without a working router, you won’t
206. Ethernet
If you’re using wired technology instead of wireless, you’re probably using an Ethernet
cable. The cable runs from your computer to the router, and a disconnection here will
207.Firewall
potentially damaging traffic. It’s possible to set the firewall to ensure only certain traffic
is blocked, but other traffic from specific IP addresses is allowed through. Without a
firewall in place, your network and data are left exposed and could be tampered with.
208. LAN
A LAN (local area network) is a small network that’s reserved for a local area. If you
have a LAN in your office or home, it means your computer and the others around you
are all connected to the same network. The connection makes it easy to share data and
files with the people who are connected to the LAN, saving time and resources.
209.Gateway
Gateway in a business environment is the central hub that routes the traffic from your
individual computer to the network outside of your organisation, which is serving the
web pages you’re trying to use. If at home, the gateway is your ISP and connects you to
the internet.
210. DNS
A domain name system is what your computer will recognise as the address of a
website. The domain name you type into the URL bar in English is translated into data
that the computer will understand. Your computer will then contact the server that the
web address is running from, and that’s how you connect to a web page.
211. WAN
Whereas a LAN is a local host, a WAN is a wide area network. It reaches a much
broader network than the one you use at home or with other computers in the office.
212. Port
You probably use quite a lot of applications throughout the day. The port is how your
computer and network know which application is being used and what data to send. The
port number can range between 1 and 65535, and a standard HTTP uses port 80. This
is how your computer differentiates between traffic to enable you to communicate with
213. Packets
When you access a web page, your computer sends over a packet of data to the
servers that are hosting it. Once you have requested information from the web page, it
will send back a packet of data to your computer. The information within the packet is
how the web page is formed and then translates to what you see on your computer.
214. Antivirus
Software designed to detect and destroy computer viruses
217. Algorithm
A set of rules that allow the creation of applications, which access the data of an
220. Adware
online.
A set of computer rules in firmware, that controls the input and output operations
222. Byte
A unit of data that contains eight binary bits. Or a series of eights zeros and ones.
223. Botnet
224. Backdoor
The access of a computer system with encrypted data that bypasses the systems
security system
225. Bandwidth
The amount of data that is transferred or passed from one destination to another.
226. Cache
These are temporary files downloaded for web content. Your computer reloads these
227. Cloud
The cloud is where data is stored, controlled from remote servers via an internet
228. Corrupted
229. Cybersecurity
A term created to describe all the security put in place to protect computers from
231. Cryptocurrency
A digital currency in which encryption skills are used to regularly generate units of
The intention of harming and stopping a computer network, by flooding it with data sent
A part of the World Wide Web that is only reachable via special software and
applications. The dark web allows users to operate whilst remaining untraceable
234. Downtime
viewed or stolen
236. Decryption
The process of taking encoded of encrypted text and translating it into text the user
understands
The internet’s system for converting alphabetic names into numeric IP addresses e.g.
Submitting a URL and taking the user to the IP address associated with that name
An IT service that provides a full backup of information, data and service so that a
business can quickly resume. Find out more about Disaster Recovery here.
239. Encryption
unauthorized access
240. EXE
computer
242. Firewall
A network security system, that controls any incoming or outcoming network traffic
A client protocol used for transferring files with a host computer. Usually authenticated
245. Gigabyte
A unit of data that contains data equal to one thousand million bytes
A user interface that includes graphical elements, like windows, icons and buttons.
248. Hacker
A universally known system for text tagging files. Meaning you can achieve font, colours,
251. Infrastructure
The IT infrastructure refers to everything; the network, the servers etc. Find out more
about IT Infrastructure.
254. IP Address
256. IOS
257. Java
258. JavaScript
An object-orientated computer programming language used to mainly created
260. Kilobyte
A unit of data that contains data equal to one thousand and twenty four bytes
A computer network that spans a relatively small area, usually based in a single room
or building
262. Linux
263. Malware
system
264. Megabyte
A unit of data that contains data equal to one million, forty eight thousand, five hundred
265. Motherboard
A printed circuit board containing the principal components of a computer or other
device.
A file system that Windows uses for storing and retrieving files on a hard disk.
269. Phishing
A file format for capturing and sending electronic information, so it can be viewed in
Networks in which each computer can act as a server for the other, allowing file sharing
server
273. Protocol
The official procedure or system of rules for transmitting data between electronic
A server that sits between a client application, like a web browser, and a real server
275. Ransomware
A type of computer memory that can be accessed randomly. This means any byte of
277. Router
A type of storage medium that permanently stores data, meaning it can only be read
280. Software
281. Spyware
Software that is installed on a computer device with the computer users knowing about
it.
283. Spam
Internet messages that are irrelevant and unsolicited, typically to many users. Usually
284. Troubleshoot
A computer program designed appear harmless, but is actually malicious and loaded
The concept of encompassing all aspects of the end-user’s interaction with a web site,
program or application
287. UNIX
A multi-user operating system designed for flexibility, UNIX was one of the first
A feature that is in place to stop unauthorized changes to your computer, by telling the
A common interface that enables communication between devices and a host controller,
such as a computer
A network that is constructed using public wires, to connect remote users or regional
291. Virus
A piece of code which is capable of destroying itself and having a detrimental effect,
secondary storage.
293. Worm
other computers
A network that exists over a large scale area. The purpose is to connect different
A security protocol that is designed to provide a wireless local area network (WLAN)
296. Wi-Fi
A wireless distribution method for two or more devices that use high frequency radio