A
- API (Application Programming Interface)
- An API is a set of protocols, routines, and tools for building software applications. It specifies how software components should interact and allows different software systems to communicate with each other.
- Algorithm
- An algorithm is a step-by-step procedure or formula for solving a problem. It is a set of rules that precisely define a sequence of operations.
- Antivirus
- Antivirus software is a program designed to detect, prevent, and remove malware, including viruses, worms, and trojan horses. It helps protect computers from malicious attacks.
- Authentication
- Authentication is the process of verifying the identity of a user, device, or entity in a computer system. It ensures that the entity requesting access is who or what it claims to be.
B
- Backup
- A backup is a copy of data taken and stored elsewhere so it can be used to restore the original after a data loss event. It is an essential part of data management and recovery strategies.
- Bandwidth
- Bandwidth is the maximum rate of data transfer across a given path. It is typically measured in bits per second (bps) and determines how much data can be sent or received at any given time.
- Blockchain
- Blockchain is a distributed ledger technology that records transactions across multiple computers. It ensures the integrity and security of data by making it tamper-proof and transparent.
- Botnet
- A botnet is a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge. Botnets are often used to perform distributed denial-of-service (DDoS) attacks.
C
- Cache
- A cache is a hardware or software component that stores data so future requests for that data can be served faster. It helps speed up the performance of a computer or a network.
- Cloud Computing
- Cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, and more—over the internet (the cloud) to offer faster innovation, flexible resources, and economies of scale.
- Cryptography
- Cryptography is the practice and study of techniques for securing communication and data. It involves methods for transforming information to prevent unauthorised access.
- Cybersecurity
- Cybersecurity involves protecting computer systems, networks, and data from digital attacks, theft, and damage. It includes measures such as firewalls, encryption, and intrusion detection systems.
D
- DNS (Domain Name System)
- DNS is the system that translates human-readable domain names (like www.example.com) into IP addresses that computers use to identify each other on the network.
- Data Encryption
- Data encryption is the process of converting data into a coded form to prevent unauthorised access. It ensures that only authorised parties can read the information.
- Database
- A database is an organised collection of data, generally stored and accessed electronically from a computer system. It allows for the efficient retrieval, insertion, and deletion of data.
- DevOps
- DevOps is a set of practices that combine software development (Dev) and IT operations (Ops). It aims to shorten the development lifecycle and deliver high-quality software continuously.
E
- Email Filtering
- Email filtering is the process of organising email according to specified criteria. Most commonly, it is used to filter out spam and malicious emails to protect users.
- Encryption
- Encryption is the process of encoding data so that only authorised parties can access it. It transforms readable data into an unreadable format to protect it from unauthorised access.
- Endpoint
- An endpoint is a remote computing device that communicates back and forth with a network to which it is connected. Examples include laptops, smartphones, and tablets.
- Ethernet
- Ethernet is a system for connecting computers within a local area network (LAN). It defines wiring and signalling standards for the physical layer of the network.
F
- FTP (File Transfer Protocol)
- FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet.
- Firewall
- A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It establishes a barrier between a trusted internal network and untrusted external networks.
- Firmware
- Firmware is a type of software that provides low-level control for a device’s specific hardware. It is typically stored in the device’s read-only memory and is essential for its basic operation.
- Framework
- A framework is a platform for developing software applications. It provides a foundation on which software developers can build programs for a specific platform.
G
- GUI (Graphical User Interface)
- A GUI is a type of user interface that allows users to interact with electronic devices using graphical icons and visual indicators rather than text-based interfaces.
- Gateway
- A gateway is a network node that serves as an access point to another network. It is often used to connect different networks, for instance, a local network to the internet.
- Gigabyte
- A gigabyte (GB) is a unit of digital information storage equal to approximately one billion bytes. It is commonly used to measure the size of data files and storage capacity.
- Grid Computing
- Grid computing involves using a network of computers to work together to perform large tasks, such as analysing massive datasets or simulating complex models. It leverages the combined power of multiple machines to achieve high performance.
H
- HTTP (HyperText Transfer Protocol)
- HTTP is a protocol used for transmitting hypertext requests and information on the internet. It forms the foundation of data communication for the World Wide Web.
- Hardware
- Hardware refers to the physical components of a computer system, such as the central processing unit (CPU), memory devices, monitors, keyboards, and other peripheral devices.
- Honeypot
- A honeypot is a security mechanism set up to detect, deflect, or counteract attempts at unauthorised use of information systems. It appears as a legitimate part of the network but is isolated and monitored.
- Hypervisor
- A hypervisor, also known as a virtual machine monitor (VMM), is software that creates and runs virtual machines (VMs). It allows multiple operating systems to share a single hardware host.
I
- IP Address
- An IP address is a unique string of numbers separated by periods or colons that identifies each computer using the Internet Protocol to communicate over a network.
- Infrastructure
- Infrastructure in IT refers to the composite hardware, software, network resources, and services required for the operation, management, and existence of an enterprise IT environment.
- Intrusion Detection System
- An Intrusion Detection System (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. It reports any detected intrusion to a management station.
- IoT (Internet of Things)
- IoT refers to the network of physical objects—devices, vehicles, buildings, and other items—that are embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the internet.
J
- JSON (JavaScript Object Notation)
- JSON is a lightweight data interchange format that is easy for humans to read and write and easy for machines to parse and generate. It is used primarily to transmit data between a server and web application.
- JVM (Java Virtual Machine)
- The Java Virtual Machine (JVM) is a virtual machine that enables computers to run Java programs as well as programs written in other languages that are also compiled to Java bytecode.
- Java
- Java is a high-level, class-based, object-oriented programming language designed to have as few implementation dependencies as possible. It is widely used for building enterprise-scale applications.
- JavaScript
- JavaScript is a lightweight, interpreted programming language that is widely used to create dynamic and interactive effects within web browsers.
K
- Kbps (Kilobits per second)
- Kbps is a unit of data transfer rate equal to 1,000 bits per second. It is commonly used to measure the speed of data transmission in a network.
- Kernel
- The kernel is the core component of an operating system. It manages system resources and allows other software to run and use these resources.
- Keylogger
- A keylogger is a type of surveillance software that records every keystroke made on a computer’s keyboard. It is often used to capture sensitive information such as usernames and passwords.
- Kubernetes
- Kubernetes is an open-source container-orchestration system for automating the deployment, scaling, and management of containerised applications.
L
- LAN (Local Area Network)
- A LAN is a network that connects computers within a limited area such as a residence, school, or office building. It allows devices to share resources and information.
- Latency
- Latency is the delay before a transfer of data begins following an instruction for its transfer. It is a critical factor in network performance.
- Linux
- Linux is an open-source operating system based on Unix. It is widely used for servers, desktops, and embedded systems.
- Load Balancer
- A load balancer is a device that distributes network or application traffic across multiple servers. It ensures no single server becomes overwhelmed, thereby improving performance and reliability.
M
- MAC Address
- A Media Access Control (MAC) address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment.
- Machine Learning
- Machine learning is a subset of artificial intelligence that involves the development of algorithms that allow computers to learn from and make decisions based on data.
- Malware
- Malware, short for malicious software, is any software intentionally designed to cause damage to a computer, server, client, or computer network. Examples include viruses, worms, and trojan horses.
- Middleware
- Middleware is software that provides common services and capabilities to applications outside of what’s offered by the operating system. It enables communication and data management for distributed applications.
N
- NAT (Network Address Translation)
- NAT is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
- NFC (Near Field Communication)
- NFC is a set of communication protocols that enable two electronic devices to communicate with each other by bringing them within close proximity, typically within a few centimetres.
- Network
- A network is a group of interconnected devices that can communicate with each other and share resources and information. Networks can be classified by their scope, such as LANs, WANs, and MANs.
- Node
- In networking, a node is a connection point, either a redistribution point or a communication endpoint. It can be a device such as a computer or a router that is connected to a network.
O
- OAuth (Open Authorisation)
- OAuth is an open standard for access delegation. It is commonly used as a way to grant websites or applications limited access to a user’s information without exposing passwords.
- Object-Oriented Programming
- Object-Oriented Programming (OOP) is a programming paradigm based on the concept of “objects,” which can contain data and code: data in the form of fields, and code in the form of procedures or methods.
- Open Source
- Open source refers to software with source code that anyone can inspect, modify, and enhance. It promotes collaborative development and sharing of software solutions.
- Operating System
- An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Examples include Windows, macOS, and Linux.
P
- Patch
- A patch is a piece of software designed to update or fix problems with a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs.
- Phishing
- Phishing is a type of cyber attack that involves tricking users into revealing personal information, such as passwords and credit card numbers, by pretending to be a trustworthy entity in electronic communications.
- Protocol
- A protocol is a set of rules and conventions for sending information over a network. It ensures that data is sent, received, and understood correctly between devices.
- Proxy Server
- A proxy server acts as an intermediary between a client and a server. It is used to filter requests, improve performance, and share connections.
Q
- QoS (Quality of Service)
- QoS refers to any technology that manages data traffic to reduce packet loss, latency, and jitter on a network. It prioritises certain types of data to ensure the performance of critical applications.
- Quantum Computing
- Quantum computing is a type of computing that leverages the principles of quantum mechanics to process information. It uses quantum bits or qubits, which can represent and store data in multiple states simultaneously, offering the potential for significantly faster computation for certain problems.
- Query
- A query is a request for data or information from a database. It allows users to retrieve specific data by specifying criteria.
- Queue
- A queue is a data structure or a list where elements are added at one end and removed from the other, following the First-In-First-Out (FIFO) principle. It is used in various computing scenarios to manage tasks and data.
R
- RAID (Redundant Array of Independent Disks)
- RAID is a data storage virtualisation technology that combines multiple physical disk drive components into one or more logical units for data redundancy, performance improvement, or both.
- RAM (Random Access Memory)
- RAM is a type of computer memory that can be accessed randomly; any byte of memory can be accessed without touching the preceding bytes. It is used for storing the data and machine code currently being used.
- Repository
- A repository in software development is a central location where data is stored and managed. It is commonly used for storing and managing code, documentation, and other project-related files, often in conjunction with version control systems.
- Router
- A router is a networking device that forwards data packets between computer networks. It routes traffic based on the destination IP address in each packet.
S
- SSL (Secure Sockets Layer)
- SSL is a standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser, or a mail server and a mail client. SSL ensures that all data passed between the web server and browsers remain private and integral.
- SaaS (Software as a Service)
- SaaS is a software distribution model in which applications are hosted by a service provider and made available to customers over the internet. It eliminates the need for organisations to install and run applications on their own computers or in their own data centres.
- Server
- A server is a computer program or a device that provides functionality for other programs or devices, called “clients.” This architecture is called the client-server model, and it is widely used for networked applications.
- Spam
- Spam refers to unsolicited, often irrelevant, or inappropriate messages sent over the internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
T
- TCP/IP (Transmission Control Protocol/Internet Protocol)
- TCP/IP is a set of communication protocols used to interconnect network devices on the internet. TCP handles the assembly of a message or file into smaller packets that are transmitted over the internet and received by a TCP layer that reassembles them into the original message.
- Token
- In computing, a token is a piece of data that represents an entity’s right to access resources. It is used in various authentication and authorisation protocols to grant and verify access.
- Trojan
- A Trojan, or Trojan horse, is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users’ systems.
- Troubleshooting
- Troubleshooting is the process of diagnosing the source of a problem. It is used to identify and resolve issues in computers, electronics, and systems.
U
- URL (Uniform Resource Locator)
- A URL is the address of a resource on the internet. It specifies the location of a resource as well as the protocol used to access it, such as HTTP or HTTPS.
- USB (Universal Serial Bus)
- USB is an industry standard for short-distance digital data communications. USB interfaces are used in consumer electronics, computer peripherals, and portable storage devices.
- Uptime
- Uptime refers to the amount of time a system, typically a computer or server, has been running and available. It is a measure of system reliability and performance.
- User Interface
- A user interface (UI) is the space where interactions between humans and machines occur. It includes graphical elements like buttons, icons, and menus that allow users to interact with electronic devices.
V
- VPN (Virtual Private Network)
- A VPN extends a private network across a public network, allowing users to send and receive data as if their computing devices were directly connected to the private network. It provides security and privacy over the internet.
- Virtualisation
- Virtualisation is the creation of a virtual version of something, such as an operating system, a server, a storage device, or network resources. It allows multiple virtual instances to run on a single physical device.
- Virus
- A virus is a type of malicious software program that, when executed, replicates itself by modifying other computer programs and inserting its own code. It can spread from one computer to another, causing harm to systems and data.
- VoIP (Voice over Internet Protocol)
- VoIP is a technology that allows users to make voice calls using a broadband internet connection instead of a regular (or analog) phone line.
W
- WAN (Wide Area Network)
- A WAN is a telecommunications network that extends over a large geographic area for the purpose of computer networking. It connects multiple smaller networks, such as local area networks (LANs) or metro area networks (MANs).
- Web Application
- A web application is an application software that runs on a web server, as opposed to being installed on the local computer. Web applications are accessed by users through a web browser with an active network connection.
- Wi-Fi
- Wi-Fi is a wireless networking technology that allows devices such as computers, mobile devices, and other equipment to connect to the internet or communicate wirelessly within a particular area.
- Worm
- A worm is a type of malware that replicates itself in order to spread to other computers. It uses a computer network to spread itself, relying on security failures on the target computer to access it.
X
- X.509 Certificate
- An X.509 certificate is a digital certificate that uses the X.509 public key infrastructure standard to verify that a public key belongs to the user, computer, or service identity contained within the certificate.
- XAML (eXtensible Application Markup Language)
- XAML is a declarative XML-based language developed by Microsoft that is used to initialise structured values and objects. It is primarily used for designing user interfaces in applications developed with technologies like WPF and UWP.
- XML (eXtensible Markup Language)
- XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. It is used to store and transport data.
- XSS (Cross-Site Scripting)
- XSS is a security vulnerability typically found in web applications. It allows attackers to inject malicious scripts into content from otherwise trusted websites, potentially affecting the site’s users.
Y
- YAML (YAML Ain’t Markup Language)
- YAML is a human-readable data serialisation standard that can be used in conjunction with all programming languages and is often used to write configuration files.
- Yarn (Yet Another Resource Negotiator)
- Yarn is a package manager for code, managing project dependencies. It was developed by Facebook and is used to speed up the code-building process with better performance, consistency, and security compared to other package managers.
- Yield
- In programming, the yield statement is used in conjunction with generators. It allows a function to return a value and later resume to return subsequent values, enabling the creation of iterators in a more memory-efficient way.
- Yottabyte
- A yottabyte is a unit of digital information storage used to denote an extremely large amount of data. It is equal to 1,000 zettabytes or 10^24 bytes.
Z
- ZFS (Zettabyte File System)
- ZFS is a combined file system and logical volume manager designed by Sun Microsystems. It provides high storage capacities, integrates file systems and volume management into one, and offers protection against data corruption, support for high storage capacities, and efficient data compression.
- ZIP (Zone Improvement Plan)
- A ZIP file is an archive file format that supports lossless data compression. A ZIP file may contain one or more files or directories that may have been compressed.
- Zero-Day
- A zero-day vulnerability is a software security flaw that is known to the software vendor but does not yet have a patch in place to fix it. The term “zero-day” refers to the fact that the developers have zero days to fix the problem once it becomes known.
- Zettabyte
- A zettabyte is a unit of digital information storage equal to one sextillion (10^21) bytes. It is commonly used to measure large-scale data storage.