[go: up one dir, main page]

0% found this document useful (0 votes)
17 views20 pages

MK Computer

The document provides a comprehensive list of computer terminologies along with their definitions and functions. It covers various aspects of computer hardware, software, networking, security, and programming concepts. Each term is clearly defined to facilitate understanding of fundamental computer science concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views20 pages

MK Computer

The document provides a comprehensive list of computer terminologies along with their definitions and functions. It covers various aspects of computer hardware, software, networking, security, and programming concepts. Each term is clearly defined to facilitate understanding of fundamental computer science concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Terminologies of Computers

No Term Definition Function


1. Hardware The physical components of Allow the computer to
computer such as: CPU, RAM, perform tasks like
hardware, monitor, keyboard, and imput, output, storage,
mouse and processing.
2. Software Programs and applications that run Provides a set of
on a computer. Such as: Operating instructions that allow
system word processors, and games the computer
hardware to perform
specific task.
3. CPU Brain of Computer Performs arithmetic,
Central Processing logic, and other
Unit operations to
transform data input
into more useable
information input
4. RAM Temporary storage for data that Store data that helps
CPU is actively using the computer performs
its most important
tasks, such as loading
apps, browsing
websites, and editing
documents
5. Hard Drive Storage used to permanently store Storing all digital
data informations like
operating system,
software applications,
files
6. SSD Type of storage that uses flash Stores data
Solid-State-Drive memory to store data permanently inside an
integrated circuit
7. GPU A specialized processor Accelerates the
Graphics rendering of graphics,
Processing Unit including visuals in
the games videos, and
other visual content by
performing complex
mathematical
calculations in parallel
8. OS Software program Manages computer’s
Operating System hardware and software
and provides a user
interface. Controls
how the computer are
allocated
9. Input devices A piece of quipment Send information to a
computer, allowing
users to interact with
the computer. They
convert user actions
into electronic signals
that the computer can
process
10. Output devices A piece of computer hardware Convert data into a
form that humans can
understand, such as
text, audio, or video
11. Malware Any intrusive software Harming a computer
Malicious system by stealing
Software sensitive data,
disrupting operations,
gaining unauthorized
acces, and causing
damage to the device
or network
12. Motherboad The main circuit board of a Connects and
computer facilitates
communication
between all the crucial
components like the
CPU, RAM, and other
peripherals
13. Desktop Computer display are Represents the kinds
of object found on top
of a physical desk.
Including documents,
phone book,
references sources and
project folders
14. Taskbar Graphical user interface element Allows users to
quickly access and
switch between
currently running
programs on their
desktop
15. USB Standard external bus Allows data transfer
Universal Serial and power supply
Bus between a computer
and other devices
16. Cursor A moveable indicator on a To enable host
computer application
development
environments to
process one result
from a multi-result
data set at a time
17. Firewall Network security device Monitoring incoming
and outgoing network
traffic and deciding
whether to allow or
block specific data
packets based on
predefined rules
18. IP Address Unique numerical identifier Identifies every
devices connected to
the internet, allows
them to communicate
with one another by
specificying the
device’s location
19. Bandwidth Maximum amounted data that can Allows for a faster
be transmitted over a network data transfer speeds,
connection loading to a quicker
downloads, smoother
streaming and better
performances when
multiple devices
20. Cache Temporary storage space for data Allows the processor
that’s frequently accessed to retrieve information
much faster than
accessing the main
memory which is
RAM
21. Kernel The core of an operating system Manages essential
functions like memory
allocation, process
scheduling, device
control, and file
system
22. ROM Computer memory that stores Store firmware, such
Read Only permanent data as the BIOS or UEFI
Memory which is essential for
boating up the
computer

23. UEFI Software program More advanced


version of BIOS that
manages the initial
startup process when a
computer is turned on
24. URL The address of a unique resource Identifies a specific
Uniform Resource on the internet resource on the
Locator internet
25. Server Computer Program Receives requests
from other computer
(clients), stores data,
manages data traffic
and provides access to
information by
sending requested
back to the clients
26. Chipset A group of chips controlling Manage data flow on
interactins between components the motherboard
27. Bus A communication point for external Allow communication
devices with peripherals.
Example:
USB<HDMI
28. Port A connections point for external Allow communication
devices. with periphrals.
29. HDD A mechanical storage devices using Stores data
Hard Disk Drive spinning platters. persistently.
30. NVMe A communication protocol for high Maximizes SSD
Non-Volatile performance SSDs speed.
Memory Express
31. Cloud Storage Data storage on remote serves. Provide off-site data
back-up and
accessibility.
32. Driver Software that enables Translate commands
communication with hardware. between the OS and
specific device.
33. File System How the OS organizes and stores Provides a structure
files. for data management.
34. UI How users interact with the Provides away to give
User Interface computer. commands and receive
feedback
35. WWW A system of interconnected web Provides access to
World Wide Web pages. information and
resources online.
36. Protocol A set of rules for communication Ensures that devices
can understand each
other. Example;
TCP/IP, HTTP.
37. Router A device that connects network. Directs network
traffic.
38. Modem A device that modulates and Connects to the
demodulates signals. internet.
39. Encryption The process of converting data into Ensures that only
a coded form. authorized users
access resources.
40. Data Information processe by a The raw material for
computer. computation.
41. Database An organized collection of data Stores and manages
information
42. Cloud Computing On-demand access to computing Provides scalable and
resources over the internet Flexible computing
power.
43. Algorithm A series of steps definetd by good Provides guidance for
delay incompleting certsin problem completing taks or
problem in
programing
44. User interface The part of the system that enrights Make it easy for users
the interaction between the user and to interact systems
the machine with
45. API A collection of protocols that Allow integration
application topped the application to between various
programming communicate applications
interface
46. Architectural Design template used for building helps in designing
pattern systems. complex system
structures
47. Back-end server part of the web application. Data processes and
receives requests
from-end
48. Big data Data collection that is very large Data Analysis in large
and complex. quantities to get
business insights
49. Bug Program for Familiarity or Operation program
Defective in the Code. stops and needs to be
improved
50. Compiler a program that translates the source Program Changing the
code into machine code code written by the
user into a language
that can be understood
by the computer
51. Debugging Program for searching and Program ensures that
repairing bugs in the code functioning is correct.
52. Deployment The process of installing and Moving applications
running the application system . from the development
environment to the
production
environment.
53. Devops practice that combines IT Increasing
Development development and operations collaboration between
Operation the development team
and the operating team
54. Distributed A computer system consisting of Spread computing
System several processor that work tasks in various
together processors tug
performance
55. E-Commerce Purchasing and Exception of Goods Facilitating business
Electronic Trading and Services Online. transactions via the
internet.

56. Front-end the user section of the web Providing interactive


application. interface
57. Dependency Relationship in which one Identifying how
component depends on other changes in one part
components to function. can affect the whole
system.
58. Resilience The ability of the system to recover Ensuring that the
from disturbance or failure. system still functions
even though there is
damage or component
failure.
59. Power constraints Limits on the amount of power that Optimizing energy use
can be used by the system to prevent overheating
and extend the life of
the device.
60. Information The quality of information Improve the ability of
Richness available to support decaking. the system to make the
right and fast
decisions.
61. Measurability The ability to measure performance Provides metrics and
and effectiveness. indicators to assess
system performance
and make the required
adjustments.
62. Asynchronous Operations that do not occur at the Allows task
same time as other operations. processing
simultaneously
without waiting for
each other to be
completed.
63. Decomposition The process of breaking up helps in designing
complex problems into smaller and solutions that are more
easier to manage sub-problems. efficient and easy to
understand
64. Cyber Security Practice of protecting network protection of computer
systems and data from digital systems from attacks
threats
65. Backup The process of storing copies of backup of data to
data for recovery in the event of prevent loss
damage
66. Spam Unwanted messages messages sent in bulk
without the recipient's
permission
67. Phishing attempts to deceive users to obtain online data theft
sensitive information techniques
68. PnP technology that allows devices to connect devices
Plug and Play be recognized automatically without additional
installation
69. Open Source software whose source code is free and modifiable
publicly available software
70. BIOS system firmware that manages the initializes the
basic input/output communication between the OS hardware when
system and the hardware booting
71. Booting the initial process when a computer the process of starting
is turned on until it is ready for use up a computer

72. MAC Address unique physical address assigned to identifies the network
each network device card (NIC)
73. DNS a system that converts website translates domain
Domain Name names into machine-readable IP names to IP Addresses
System addresses
74. HTTPS HTTP with ssl/tls encryption for a secure version of
secure web communication HTTP
75. HTTP a standardized protocol for facilitates web
hypertext transfer transferring data between a browser communication
protocol and a web server
76. VPN virtual private network that secures the user's
virtual private encrypts data for security and internet connection
network privacy
77. PSU a device that converts electricity supplies data to
Power Supply from AC to DC computer components
Unit
78. Ethernet a wired network technology that connects computers in
enables communication between a local network
devices
79. SQL a language used to access and database programming
structured query manage databases language
language
80. Baud Rate Number of signal changes per Determines data
second in a communication channel transmission speed in
modems and networks
81. CISC CPU architecture with complex Reduces the number
Complex instructions of instructions needed
Instruction Set for operation
Computing
82. RISC CPU architecture with simplified Increases processing
Reduced instructions efficiency and speed
Instruction Set
Computing
83. Endianness The order in which bytes are stored Affects how systems
in memory (Big-Endian or Little- read and process data
Endian)
84. Jitter Variation in signal timing during Impacts network
data transmission performance and
voice/video quality
85. NAT Converts private IP addresses to a Allows multiple
Network Address public IP devices to share a
Translation single public IP
address
86. Tunneling Encapsulating one network Enables secure data
protocol within another transmission over
untrusted networks
87. Bitmask A sequence of bits used for data Performs bitwise
manipulation at the bit level operations for data
filtering
88. Race Condition A programming flaw where Can cause software
multiple processes access shared bugs and security
data unpredictably vulnerabilities
89. Garbage Automatic memory management in Frees unused memory
Collection programming languages to optimize
performance
90. Hash Collision When two different inputs produce A security risk in
the same hash value cryptographic hashing
91. Heisenbug A bug that changes behavior when Makes debugging
being observed difficult and
unpredictable
92. Zombie Process A process that has completed Can waste system
execution but still exists in the resources if not
process table handled properly
93. Soft Link A file reference pointing to another Provides shortcuts to
Symbolic Link file files in different
locations
94. Hard Link A direct reference to a file’s data on Allows multiple
disk filenames to point to
the same data
95. Honeypot A security system designed to Helps detect and
attract hackers analyze security
threats
96. Salting Adding random data to passwords Strengthens password
in Cryptography before hashing security against brute-
force attacks
97. Obfuscation Intentionally making code difficult Protects code from
to read reverse engineering
98. Virtual Memory Uses disk space as an extension of Prevents system
RAM crashes when physical
RAM is full
99. Zero-Day A software flaw unknown to Can be exploited by
Vulnerability developers hackers before it is
patched
100. Daisy Chain Connecting multiple devices in Commonly used in
sequence hardware like USB
and power systems
101. Race Attack Exploiting race conditions in Can be used to gain
software unauthorized access
102. Pipelining A CPU technique that processes Increases processing
multiple instructions speed in modern
simultaneously processors
103. Quine A program that outputs its own Used in programming
source code challenges and self-
replicating code
104. Fork Bomb A type of DoS attack that Crashes systems by
continuously replicates itself exhausting resources
105. Utility software Utility software refers to a type of Software used to
software that is designed to optimize computers
perform specific task
106. Optical drive A device that reads and writes data Used to read data to
to optical disc optical disc
107. Virus A type of malware that replicates Software that can
itself and spreads to other computer damage your
computer
108. WAN Wide area network that spans a A computer network
Wide area large geographical area connected a wide area
network
109. Authentication The process of verifying the Identification process
identity of a user for users
110. HTML HyperText markup language a Used to create web
Hypertext markup standard markup language to create pages
language web
111. Java A programming language for Programing language
depeloving applications for creating
applications
112. DRAM Dynamic random access memory,a A type of computer
Dynamic random type of computer memory that memory that stores
access memory stores data each bit of data
113. Gygabyte A unit of measurement for digital A unit of measure
strorage capacity equal to 100 bytes
114. Kylobyte A unit measurement for digital A unit of measure
information strorage capacity equal to 1,024 bytes
115. Megabyte Strorage capacity equivalent to 1 A unit of measure
million bytes equal to 1,048,576
bytes
116. Peripheral A device that connects to a A hardware device
computer to enhance its used to put
functionallity information
117. Icon A small picture or symbol A small picture or
symbol representing a
computer hardware
function or component
118. Printer A device that prints digital data The hardware that
onto paper or other media provides printed
output from the
computer
119. Floppy disk A type of removable strorage A portable magnetic
device that uses a flexible magnetic strorage medium for
disk computer data that
allow users to
randomly access
information
120. Password A set secret characters or words to protect sensitive
authenticate access to and secure a information from
digital system unauthorized access,
providing privacy and
security for personal,
work, or financial data
stored on the
computer or online
services.
121. Pixel the smallest unit of a digital image to form part of the
or display on a computer screen. It overall image or
is essentially a tiny point of color graphical display
or light that, when combined with
many other pixels, creates a
complete image.
122. Byte a unit of digital information storage represent data being
in a computer, typically consisting transmitted over
of 8 bits. A bit (short for "binary networks or between
digit") is the smallest unit of data in different devices.
computing, and a byte groups 8 of
these bits together.
123. Resolution the clarity or sharpness of an image Makes material appear
or display, determined by the crisp and detailed on
number of pixels used to create it. screens of all sizes,
facilitating clearer
word reading, picture
viewing, and video
watching
124. Switch a hardware device that manages to receive data from
data traffic between multiple connected sources and
devices in a network by directing transmit it to the
data only to the device it’s intended appropriate
for, rather than broadcasting it to destination.
all devices
125. Firmware essential software embedded in grant the system the
hardware devices fundamental operating
and response routines
for the frequent
requests it receives
and must satisfy the
user.

126. Application software designed to perform to carry out a


specific tasks for users, whether forparticular function or
work, communication, set of tasks. to provide
entertainment, or specializeda user-friendly
functions interface so that users
can interact with the
program and complete
tasks efficiently.
127. Connection the establishment of a link or facilitate
relationship between two or more communication
entities between devices,
enabling them to
interact.
128. Anti-virus software tool designed to detect scans files, programs,
and neutralize malicious software and applications to
detect malicious code
or suspicious behavior
that may indicate the
presence of malware
129. Zettabyte is a unit of digital information to measure extremely
storage that equals 1 sextillion large amounts of data
(1,000,000,000,000,000,000,000) in computing
bytes or 1,000 exabytes.
130. Latency refers to the time delay between the to describe delays in
initiation of a process communication,
whether between a
user and a server,
between devices on a
network, or in data
processing. It affects
how quickly actions
and requests are
processed.
131. Domain Suffix the final part of a domain name in ahelps users quickly
URL, such as .com, .org, or .net understand what kind
of website they are
visiting, such as
whether it’s a
business, educational
institution, or
government site.
132. Eula a legal contract that specifies the grants the user a
End User License rights and restrictions for using a license to use the
Agreement software product software under
specific conditions,
which may include
limitations on the
number of devices it
can be installed on or
how it can be used.
133. Fifo a method of managing and ensures that the data is
processing data where the first processed in the same
piece of data order it was received.
134. Compile the process of converting a to translate human-
program written in a high-level readable source code
programming language into machine-readable
code, specifically into
object code or
executable code.
135. Wiki a collaborative platform that allows multiple users
enables users to create, edit, and to add and edit content
organize content quickly and easily in a collaborative
manner.
136. Baud rate The number of signal changes per Measures the speed of
second in a communication channel data trasnmission
137. Daemon A background process that runs Manages system tasks
without user intervention like printing and
network
138. DPI a method to analyze network traffic Used for security
Deep packet beyond basic packet headers monitoring and traffic
inspection filtering
139. EMI Disruptions caused by Can degrade wireless
Electromagnetic electromagnetic fields affecting communication and
interference electronic devices device performance
140. Fuzzy hashing A technique for detecting similar Used in cybersecurity
files using hash comparison for malware detection
141. Bit A basic unit of information in a Forms more complex
computer that can have a value of 0 data in a computer.
or 1.
142. Byte A collection of 8 bits used to store Helps the computer
characters or other data. process data more
efficiently.
143. Cookie A small file stored on a user’s Helps a website
computer by a website to store user remember user
preference data. preferences and
provide a more
personalized
experience
144. Email A system for sending electronic Helps users
messages over the internet. communicate with
others over the
internet.
145. JavaScript A programming language used to Helps create web
create interactive web pages. pages that can interact
with users.
146. Network A collection of computers and Allows computers and
other devices connected to share other devices to share
resources and communicate. resources and
communicate.

147. Scanner A device that function to convert Scan physical


physical documents into digital documents into digital
format format
148. Monitor Computer hardware Display visual
information in the
form of text, images
and videos
149. Folder A file storage place on a computer To group files based
on their type
150. Browser The web browser Acces the internet and
display the
information contained
in it
151. DVD Digital versatile disc Digital data storage
format that can be
used in computers
152. CAPTCHA Completely automated public Method to find out if
turing test to tell computers and the fields in creating a
human apart. social media account
or orther account were
filled in by a human
and not a computer
program
153. VGA Video graphics array Translate the display
to the monitor screen
154. LCD Liquid crystal display Displays information
dan graphics
155. GPS Global positioning system Determining location,
setting time, and
navigation
156. SIM Card Subscriber identity module Acces the internet via
a to cellular telephone
network
157. QR Code Quick response code Stores information
such as text, urls,
contacts,geographic
locations and more.
158. Framework Framework used to develop Helps developers
aplications or websites build aplications
quickly and efficiently
159. Restore Restore data, files, or systems to Restore the condition
their original state of the computer
system to its previous
state
160. LAN A network within a small Connects devices to
Local Area geographical area, like an office share resources like
Network printers and files
locally.
161. GUI A user-friendly interface with icons Simplifies interaction
Graphical User and visuals. with software and
Interface systems.
162. VM A software-based simulation of a Runs multiple
Virtual Machine physical computer. operating systems on
one machine.
163. Bytecode The code generated by the compiler Allows code to run on
can be run by the virtual machine. multiple platforms
164. Data Mining The process of finding patterns and Finding patterns and
relationships in big data relationships in big
data.
165. Data Warehouse Systems that store and manage big Store and manage big
data. data.
166. Digital Signature An electronic signature is used to Verify the sender's
verify the sender's identity. identity.
167. GIS Systems used to collect, process Collect, process and
Geographic and analyze geographic data analyze geographic
Information data
System
168. Hypervisor A software used to run the virtual
machine
169. IDE A software Developing
Integrated applications.
Development
Environment
170. IoT A network of devices connected to Connect the device to
Internet of Things the internet. the internet
171. JPEG Image file format used to compress Compressing images.
Joint Photographic images
Experts Group
172. LDAP The protocol used to access the Access the directory.
Lightweight directory.
Directory Access
Protocol
173. Machine Learning Techniques used to enable Allows computers to
computers to learn from data. learn from data.
174, NAS A device used to store data on a Storing data on the
Network-Attached network. network.
Storage
175. OAuth The protocol used to allow Allows applications to
applications to access user data. access user data.
176. SDK A collection of software Used to develop
Software applications
Development Kit
177. AI The ability of a computer or Al is used in various
Artificial machine to mimic human applications, including
Intelligence intelligence virtual assistants,
recommendation
systems, and self-
driving cars.
178. Binary Code A system of representing text or Binary code is the
computer processor instructions fundamental language
using the binary digits O and 1. of computers,
enabling them to
process and store
information.
179. Internet A global network of interconnected The Internet enables
computer networks that use the users to access
Internet protocol suite (TCP/IP) to information,
communicate and exchange data. communicate, and
share resources
globally.
180. Programming A formal language used to write Programming
Language instructions for a computer to languages allow
perform specific tasks. developers to create
software applications,
operating systems, and
other computer
programs.
181. Storage The process of retaining data on a Storage allows users
computer or other storage device. to save and retrieve
data for future use.
182. Wi-Fi A wireless networking technology Wi-Fi enables users to
Wireless Fidelity connect to the internet
and network resources
wirelessly, providing
mobility and
convenience
183. ACID A concept in databases that ensures maintaining data
Atomicity, data integrity and consistency. integrity and
Consistency, consistency in
Isolation, database systems,
Durability especially in
applications that
require reliable
transaction processing,
such as financial
systems, e-commerce
platforms, and
inventory
management systems.
184 ARP A protocol used to connect IP allows devices on a
Address addresses with MAC addresses. local network to find
Resolution each other and
Protocol communicate
effectively.
185. CLI A user interface that uses text allows users to
Command-Line commands to interact with a interact with a
Interface computer system computer using
commands. It's a
powerful tool for
efficiency,
automation, and
accessing advanced
features.
186. DFS A file system It is distributed across
Distributed File multiple computers to
System improve security and
performance.
187. FQDN A complete and unique domain Used to identify a host
Fully Qualified name on the internet.
Domain Name
188. CMP A protocol To send error
Internet Control messages and
Message Protocol diagnostic information
on the internet.
189. Internet Protocol A numerical label Assigned to each
Address device connected to a
network that uses the
Internet Protocol for
communication
190. Trojan Horse A malicious program that is Serious threat that
disguised as a legitimate program make the computer
infection
191. Driver Software A computer program Controls a particular
type of device that is
connected to your
computer
192. Communication A point of interaction between a allows devices to
Interface computer and a peripheral device. exchange data with
each other. It's like a
bridge that connects
different devices
193. Branch prediction A technique used in CPUs to guess Improves processing
the direction of conditional speed by preloading
branches instructions
194. Big-O Notation A mathematical notation that Helps developers
describes the performance or analyze and compare
complexity of an algorithm algorithm efficiency
195. ACPI (Advanced A power management standard for Manages power
Configuration and operating systems consumption
Power Interface) efficiently in hardware
components
196. Coding The process of writing Writing instruction
that computer can
understand
197. Encoding The process of converting data or Converting data into a
information coded form
198. PAN Personal area network,A computer Personal network that
network that connects personal connects personal
devices devices within ashort
range
199. MAN A computer network connects to High speed data
othe device within a metropolitan transfer and
area communication
200. Bookmark A maker or indicator that identifies A marker that
a specific page or location in a identifies a specific
book page for quick access
201. Decode The software decodes the encrypted Converting encoded
message data into its original
form
202. Power Button A physical button on a computer Turns the device on
device. and off.
203. CDMA A cellular communication Allows multiple
Code Division technology. devices to access the
Multiple Access same channel
simultaneously.
204. Gateway A device that connects networks. Connects a local
network (LAN) to a
wide-area network
(WAN).
205. Connects a local A TCP-based communication Establishes a real-
network (LAN) to protocol. time, two-way
a wide-area connection between a
network (WAN). client and a server
206. Reverse Proxy An intermediary server in a Acts as a bridge
computer network between users and the
backend server.
207. VoIP A technology for making voice Enables high-quality
Voice over IP calls over the internet by voice communication.
converting voice into digital
packets.
208. SSID A feature that identifies Wi-Fi Helps users select
Service Set networks. available Wi-Fi netwo
Identifier rks.
209. Linux Operating system (OS),the same as As a forum for
windows OS,Macos, Ios,Android, bridging
and so on. communication or
user commands on
the relationship
between software and
hardware in a device.

210. Adaptor A device that connects a computer As an external battery


to other devices or a network for your computer so
the computer doesn,t
need to be too big
211. crash Pre-exisiting standard settings or Close or exit after
configurations encountering an error
212. Fan Fan or cooling fan, is one of the removing heat and
quipment on a computer replacing it with fresh
air into the system
213. interpreter Programs that directly execute Translating a
instructions in a high level programming
languange without coverting them languange into
to machine code machine code that a
computer can execute
215. 2FA (Two-Factor An extra layer of security used to Adds a layer of
Authentication) ensure the security of online security, making
accounts beyond just a username unauthorized access
and password more difficult.
216. Z-Wave A wireless communications Wireless
protocol used primarily for home communication
automation. protocols for IoT
devices, enabling
home automation and
more.
217. Zigbee A high-level communication Wireless
protocol used to create personal communication
area networks with small, low- protocols for IoT
power digital radios. devices, enabling
home automation and
more.
218. Robotics The branch of technology that deals Automates physical
with the design, construction, tasks, increasing
operation, and application of efficiency and
robots. reducing risks in
various industries
(manufacturing,
healthcare,
exploration).
219. SaaS (Software as A software distribution model in Easy access to
a Service) which a third-party provider hosts applications without
applications and makes them the need for
available to customers over the installation and
internet. maintenance, reducing
IT costs and
increasing flexibility.
220. Smart Contract A self-executing contract with the Automates and
terms of the agreement between secures agreements,
buyer and seller being directly reducing the need for
written into lines of code. third parties and
increasing
transparency.
221. TensorFlow An open-source software library for Builds and trains
dataflow and differentiable machine learning
programming across a range of models, enabling the
tasks. development of
sophisticated AI
applications.
222. Server A computer or system that provides Provides resources
resources, data, services, or and services to other
programs to other computers, computers, enabling
known as clients, over a network. centralized access and
data management.
223. Virtual Machine An emulation of a computer Runs an operating
system. system or application
in an isolated
environment, allowing
for flexibility and
resource efficiency.
224. Virtual Reality A simulated experience that can be Creates an immersive
similar to or completely different experience that
from the real world. simulates the real
world or fantasy, used
in entertainment,
training, and more.
225. SEO (Search The practice of increasing the Improves website
Engine quantity and quality of traffic to visibility in search
Optimization) your website through organic engine results,
search engine results. attracting more
potential visitors.
226. UX (User The overall experience of a person Ensures a pleasant and
Experience) using a product such as a website satisfying experience
or computer application. for users when
interacting with a
product or service.
227. UI (User The means by which the user and a Facilitates interaction
Interface) computer system interact. between users and
systems, ensuring an
intuitive and efficient
experience.
228. URL (Uniform The address of a World Wide Web Identifies and locates
Resource Locator) page. resources on the web,
enabling easy
navigation.
229. Web Hosting A service that allows organizations Stores and provides
and individuals to post a website or access to websites on
web page onto the Internet. the internet, allowing
businesses and
individuals to have an
online presence.
230. Webinar A presentation, lecture, workshop, Online seminar,
or seminar that is transmitted over enabling remote
the Web. interaction and
information delivery.
231. Widget A small application with limited Small components that
functionality that can be installed can be added to
and executed within a web page. websites or
applications,
enhancing
functionality.
232. TCP/IP A set of communication protocols The basic protocol of
(Transmission used to interconnect network the internet, enabling
Control devices on the internet. communication
Protocol/Internet between devices.
Protocol)
233. SSL (Secure A standard security technology for Encrypts
Sockets Layer) establishing an encrypted link communication
between a server and a client. between servers and
clients, protecting data
from eavesdropping.
234. XML (eXtensible A markup language that defines a Formats and stores
Markup set of rules for encoding documents data in a structured
Language) in a format that is both human- format, facilitating
readable and machine-readable. information exchange
between systems.
235. YAML (YAML A human-readable data A human-readable
Ain't Markup serialization language. data serialization
Language) language, used in
configuration and data
exchange.
Security
237. IaaS A cloud computing service model Allows users to rent
(Infrastructure as a that provides basic computing and manage IT
Service) resources such as servers, storage, infrastructure without
and networks over the internet. having to own and
maintain physical
hardware. Examples
include Amazon Web
Services (AWS),
Microsoft Azure, and
Google Cloud
Platform.
237. NAT (Network The process of translating public IP Allows multiple
Address addresses to private IP addresses, devices on a local
Translation) or vice versa. network (using private
IP addresses) to
connect to the internet
through a single
public IP address.
238. DDoS (Distributed A cyberattack that aims to cripple a Disables the target so
Denial of Service) target (usually a server or website) that it cannot be
by flooding it with massive accessed by legitimate
amounts of data traffic from users. DDoS is often
various sources. used in cyberattacks to
disrupt services or
steal information.
239. RNG (Random A device or algorithm that Used in various
Number generates a sequence of random applications such as
Generator) numbers. cryptography,
gambling, simulations,
and software testing.
RNG is important for
security and
randomness in various
systems.

You might also like