MK Computer
MK Computer
72. MAC Address unique physical address assigned to identifies the network
each network device card (NIC)
73. DNS a system that converts website translates domain
Domain Name names into machine-readable IP names to IP Addresses
System addresses
74. HTTPS HTTP with ssl/tls encryption for a secure version of
secure web communication HTTP
75. HTTP a standardized protocol for facilitates web
hypertext transfer transferring data between a browser communication
protocol and a web server
76. VPN virtual private network that secures the user's
virtual private encrypts data for security and internet connection
network privacy
77. PSU a device that converts electricity supplies data to
Power Supply from AC to DC computer components
Unit
78. Ethernet a wired network technology that connects computers in
enables communication between a local network
devices
79. SQL a language used to access and database programming
structured query manage databases language
language
80. Baud Rate Number of signal changes per Determines data
second in a communication channel transmission speed in
modems and networks
81. CISC CPU architecture with complex Reduces the number
Complex instructions of instructions needed
Instruction Set for operation
Computing
82. RISC CPU architecture with simplified Increases processing
Reduced instructions efficiency and speed
Instruction Set
Computing
83. Endianness The order in which bytes are stored Affects how systems
in memory (Big-Endian or Little- read and process data
Endian)
84. Jitter Variation in signal timing during Impacts network
data transmission performance and
voice/video quality
85. NAT Converts private IP addresses to a Allows multiple
Network Address public IP devices to share a
Translation single public IP
address
86. Tunneling Encapsulating one network Enables secure data
protocol within another transmission over
untrusted networks
87. Bitmask A sequence of bits used for data Performs bitwise
manipulation at the bit level operations for data
filtering
88. Race Condition A programming flaw where Can cause software
multiple processes access shared bugs and security
data unpredictably vulnerabilities
89. Garbage Automatic memory management in Frees unused memory
Collection programming languages to optimize
performance
90. Hash Collision When two different inputs produce A security risk in
the same hash value cryptographic hashing
91. Heisenbug A bug that changes behavior when Makes debugging
being observed difficult and
unpredictable
92. Zombie Process A process that has completed Can waste system
execution but still exists in the resources if not
process table handled properly
93. Soft Link A file reference pointing to another Provides shortcuts to
Symbolic Link file files in different
locations
94. Hard Link A direct reference to a file’s data on Allows multiple
disk filenames to point to
the same data
95. Honeypot A security system designed to Helps detect and
attract hackers analyze security
threats
96. Salting Adding random data to passwords Strengthens password
in Cryptography before hashing security against brute-
force attacks
97. Obfuscation Intentionally making code difficult Protects code from
to read reverse engineering
98. Virtual Memory Uses disk space as an extension of Prevents system
RAM crashes when physical
RAM is full
99. Zero-Day A software flaw unknown to Can be exploited by
Vulnerability developers hackers before it is
patched
100. Daisy Chain Connecting multiple devices in Commonly used in
sequence hardware like USB
and power systems
101. Race Attack Exploiting race conditions in Can be used to gain
software unauthorized access
102. Pipelining A CPU technique that processes Increases processing
multiple instructions speed in modern
simultaneously processors
103. Quine A program that outputs its own Used in programming
source code challenges and self-
replicating code
104. Fork Bomb A type of DoS attack that Crashes systems by
continuously replicates itself exhausting resources
105. Utility software Utility software refers to a type of Software used to
software that is designed to optimize computers
perform specific task
106. Optical drive A device that reads and writes data Used to read data to
to optical disc optical disc
107. Virus A type of malware that replicates Software that can
itself and spreads to other computer damage your
computer
108. WAN Wide area network that spans a A computer network
Wide area large geographical area connected a wide area
network
109. Authentication The process of verifying the Identification process
identity of a user for users
110. HTML HyperText markup language a Used to create web
Hypertext markup standard markup language to create pages
language web
111. Java A programming language for Programing language
depeloving applications for creating
applications
112. DRAM Dynamic random access memory,a A type of computer
Dynamic random type of computer memory that memory that stores
access memory stores data each bit of data
113. Gygabyte A unit of measurement for digital A unit of measure
strorage capacity equal to 100 bytes
114. Kylobyte A unit measurement for digital A unit of measure
information strorage capacity equal to 1,024 bytes
115. Megabyte Strorage capacity equivalent to 1 A unit of measure
million bytes equal to 1,048,576
bytes
116. Peripheral A device that connects to a A hardware device
computer to enhance its used to put
functionallity information
117. Icon A small picture or symbol A small picture or
symbol representing a
computer hardware
function or component
118. Printer A device that prints digital data The hardware that
onto paper or other media provides printed
output from the
computer
119. Floppy disk A type of removable strorage A portable magnetic
device that uses a flexible magnetic strorage medium for
disk computer data that
allow users to
randomly access
information
120. Password A set secret characters or words to protect sensitive
authenticate access to and secure a information from
digital system unauthorized access,
providing privacy and
security for personal,
work, or financial data
stored on the
computer or online
services.
121. Pixel the smallest unit of a digital image to form part of the
or display on a computer screen. It overall image or
is essentially a tiny point of color graphical display
or light that, when combined with
many other pixels, creates a
complete image.
122. Byte a unit of digital information storage represent data being
in a computer, typically consisting transmitted over
of 8 bits. A bit (short for "binary networks or between
digit") is the smallest unit of data in different devices.
computing, and a byte groups 8 of
these bits together.
123. Resolution the clarity or sharpness of an image Makes material appear
or display, determined by the crisp and detailed on
number of pixels used to create it. screens of all sizes,
facilitating clearer
word reading, picture
viewing, and video
watching
124. Switch a hardware device that manages to receive data from
data traffic between multiple connected sources and
devices in a network by directing transmit it to the
data only to the device it’s intended appropriate
for, rather than broadcasting it to destination.
all devices
125. Firmware essential software embedded in grant the system the
hardware devices fundamental operating
and response routines
for the frequent
requests it receives
and must satisfy the
user.