Analaiza
Analaiza
CA B R A L, A NA LA IZA R .
B S IT 1- A
A Applet: A small application or program
that is designed to be embedded within a
Access Control List (ACL): A list of larger application or web page.
permissions that specifies which users or
groups are allowed to access a particular Application Software: Software designed
resource, such as a file, folder, or network to perform specific tasks or applications
device. for users, such as word processors,
spreadsheets, and web browsers.
Active Directory: A directory service
developed by Microsoft that is used to Archive: A collection of files and folders
manage and organize users, computers, that are stored in a compressed or
and other resources in a Windows domain uncompressed format for backup, storage,
network. or distribution purposes.
Adware: Software that displays unwanted Arithmetic Logic Unit (ALU): A component
advertisements on a computer system, of the central processing unit (CPU) that
often without the user's consent. performs arithmetic and logical
operations.
Algorithm: A set of instructions or a step-
by-step procedure for solving a problem or ARP (Address Resolution Protocol): A
performing a specific task. protocol used to map an IP address to a
physical (MAC) address on a local area
API (Application Programming Interface): A network (LAN).
set of rules and protocols that allows
different software applications to ASCII (American Standard Code for
communicate and interact with each Information Interchange): A character
other. encoding standard that represents text in
2
computers and other devices using a set of Authorization: The process of granting or
128 characters. denying access to a particular resource or
functionality based on the user's identity
Assembly Language: A low-level and permissions.
programming language that uses
mnemonic codes to represent machine B
instructions.
Backdoor: A hidden or unauthorized
Assembly: The process of converting method of accessing a computer system or
source code written in an assembly network, often used by hackers or
language into machine code that can be malicious software.
executed by a computer.
Backup: A copy of data or files made to
Asynchronous: Referring to a prevent loss in case of hardware failure,
communication or operation that does not software corruption, or other disasters.
occur at the same time or in a
synchronized manner. Bandwidth Throttling: The intentional
limitation of the amount of data that can
Attachment: A file or document that is be transmitted over a network connection,
attached to an email message or other typically to manage network congestion or
electronic communication. to enforce usage policies.
Authentication: The process of verifying Bandwidth: The amount of data that can
the identity of a user or device to ensure be transmitted over a network connection
that they are who they claim to be. in a given amount of time, usually
measured in bits per second (bps).
3
Baseband: The frequency range of a signal Bit Depth: The number of bits used to
that contains the original information, represent the color of each pixel in a
before it is modulated onto a higher digital image, determining the number of
frequency carrier wave for transmission. colors that can be displayed.
Batch File: A text file that contains a series Bit Torrent: A peer-to-peer file sharing
of commands or instructions that are protocol that allows users to download
executed in sequence by a computer and upload files simultaneously from
system. multiple sources.
Binary Tree: A data structure in which Bitrate: The number of bits transmitted
each node has at most two children, per second in a digital communication
typically used for efficient searching, system.
sorting, and data storage.
Bluetooth Low Energy (BLE): A wireless
Binary: A numbering system that uses only technology standard that is designed for
two digits, 0 and 1, to represent data. low-power, short-range communication
8. Bit: The smallest unit of data in a between devices, such as fitness trackers,
computer, representing a binary digit (0 or smartwatches, and other wearable
1). devices.
5
Bug: An error or defect in a computer Cache: A small, high-speed memory that
program or system that causes it to stores frequently accessed data to
malfunction or produce incorrect results. improve the performance of a computer
system.
Byte: A unit of data consisting of 8 bits.
Call Stack: A data structure that is used by
Bytecode: An intermediate representation a computer program or application to keep
of a computer program or application that track of the function calls and their return
is generated by a compiler or interpreter addresses, allowing the program to return
and can be executed by a virtual machine to the correct location after a function call
or runtime environment. has completed.
6
multiple times, typically used for storing Centralized System: A computer system or
data, music, or video. network in which all the processing and
data storage is performed on a central
CD-ROM: A compact disc read-only
server or mainframe computer, and the
memory, a type of optical disc used to
clients or user devices access the system
store and read data.
over a network.
7
Chip: A small piece of semiconductor Client: A computer or device that requests
material, typically silicon, that contains services or resources from a server in a
electronic components such as transistors, network.
resistors, and capacitors.
Client-Server Architecture: A computing
Chipset: A group of integrated circuits or model or architecture in which the
chips that are designed to work together processing and data storage is divided
to provide specific functionality or features between a client or user device and a
in a computer system or device, such as server or central computer, with the client
the motherboard chipset, the graphics requesting services or resources from the
chipset, or the network chipset. server over a network.
9
Compiler: A software program that common communication protocol or
translates source code written in a high- technology.
level programming language into machine
code that can be executed by a computer. Computer Virus: A malicious software
program that can replicate itself and
Compiler: A software program that spread from one computer to another,
translates source code written in a high- often causing damage or disruption to the
level programming language into machine infected system.
code that can be executed by a computer.
Computer Vision: The field of computer
Compression: The process of reducing the science and artificial intelligence that
size of a file or data by encoding it in a focuses on enabling computers to
more efficient format, using a compression interpret and understand visual
algorithm or method. information from the world, such as
images and videos.
Computer Architecture: The design and
organization of the components and Concurrent: Referring to the ability of a
subsystems of a computer system, computer system or program to perform
including the central processing unit (CPU), multiple tasks or operations
memory, storage devices, input/output simultaneously, or in parallel.
interfaces, and other hardware
components. Configuration: The settings, options, and
parameters that define the behavior and
Computer Network: A group of functionality of a computer system,
interconnected computers and other software application, or hardware device.
devices that are able to communicate and
share resources with each other, using a
10
Connectionless: Referring to a Cookie: A small text file that is stored on a
communication or networking protocol user's computer or device by a website or
that does not establish a dedicated web application, and is used to store
connection or session between the sender information about the user's preferences,
and the receiver before transmitting data, settings, or browsing history.
such as the User Datagram Protocol (UDP).
CPU Cache: A small, high-speed memory
Connection-Oriented: Referring to a that is located on or close to the central
communication or networking protocol processing unit (CPU) of a computer
that establishes a dedicated connection or system and is used to store frequently
session between the sender and the accessed data and instructions, to improve
receiver before transmitting data, such as the performance of the system.
the Transmission Control Protocol (TCP).
CPU Clock Speed: The rate at which the
Console: A text-based interface or central processing unit (CPU) executes
command-line interpreter that is used to instructions, measured in hertz (Hz).
interact with a computer system or
application, typically in a Unix or Linux CPU Core: A processing unit or execution
operating system. unit within a central processing unit (CPU)
that is capable of executing instructions
Control Panel: A graphical user interface and performing arithmetic and logical
(GUI) tool or utility that is used to operations independently.
configure and manage the settings,
options, and parameters of a computer CPU Frequency: The speed or clock rate at
system or operating system, such as the which the central processing unit (CPU)
Windows Control Panel. executes instructions, typically measured
in gigahertz (GHz).
11
CPU Socket: A physical connector or CSS (Cascading Style Sheets): A style sheet
interface on a motherboard that is used to language that is used to describe the
connect a central processing unit (CPU) to presentation and layout of a document
the motherboard. written in HTML or XML, by defining the
styles, colors, fonts, and other formatting
CPU Utilization: The percentage of time properties of the elements in the
that the central processing unit (CPU) is document.
busy or in use, typically measured over a
period of time. Cursor: A graphical symbol or indicator
that is used to show the current position
Cracker: A person who uses hacking or location of the mouse pointer or input
techniques or tools to gain unauthorized device on a computer screen.
access to computer systems or networks,
often for malicious or illegal purposes. Cybersecurity: The practice and measures
taken to protect computer systems,
Crawling: The process of automatically networks, and data from unauthorized
visiting and indexing web pages on the access, use, disclosure, disruption,
internet by a search engine or web modification, or destruction, by hackers,
crawler, to build a search index or cybercriminals, or other malicious actors.
database of web pages.
D
Cryptography: The science and study of
techniques and methods for secure Data Center: A facility or building that is
communication and data protection, using used to house and operate computer
encryption, decryption, digital signatures, systems, servers, storage devices,
and other cryptographic algorithms and networking equipment, and other IT
protocols. infrastructure, to provide data processing,
12
storage, and networking services to Data Structure: A way of organizing and
organizations and businesses. storing data in a computer system or
program, to facilitate efficient access,
Data Compression: The process of manipulation, and processing of the data.
reducing the size of a file or data by
encoding it in a more efficient format, Data Transfer Rate: The speed or rate at
using a compression algorithm or method. which data is transferred or transmitted
between two devices or systems, typically
Data Encryption: The process of measured in bits per second (bps), kilobits
converting plaintext or readable data into per second (Kbps), megabits per second
ciphertext or encrypted data, using a (Mbps), or gigabits per second (Gbps).
cryptographic algorithm or method, to
protect the data from unauthorized Database Management System (DBMS): A
access, use, disclosure, or modification. software application or system that is used
to manage and organize databases, by
Data Mining: The process of extracting providing tools and functions for creating,
useful information and knowledge from modifying, querying, and maintaining
large amounts of data, using statistical databases.
analysis, machine learning, and other data
analysis techniques and methods. Database: A structured collection of data
that is organized and stored in a computer
Data Recovery: The process of restoring or system for easy access, management, and
retrieving lost, deleted, corrupted, or retrieval.
inaccessible data from a storage device,
such as a hard disk drive (HDD), a solid- Debugger: A software tool or program that
state drive (SSD), or a memory card. is used to identify and fix errors or bugs in
a computer program or application, by
13
allowing the developer to step through the the internal network from the external
code, set breakpoints, and inspect the network.
values of variables and other program
state. Denial-of-Service (DoS) Attack: A type of
cyberattack that is designed to disrupt or
Debugging: The process of identifying and disable the normal operation of a
fixing errors or bugs in a computer computer system, network, or website, by
program or system. overwhelming it with a large volume of
traffic or requests, or by exploiting
Default Gateway: The IP address of a vulnerabilities in the system or network.
router or gateway device that is used by a
computer or device to access other Desktop Environment: A graphical user
networks or the internet, typically interface (GUI) that is used to provide a
configured as the default route in the desktop-like experience on a computer
computer's network settings. system or device, typically including a
desktop background, icons, windows,
Default: A preselected option or setting menus, and other graphical elements.
that is automatically used by a computer
program or system if no other option is Desktop: The main screen or workspace of
specified. a computer operating system, where
icons, files, and folders are displayed.
Demilitarized Zone (DMZ): A network
segment or subnet that is located between Device Driver: A software program or
an internal network and an external component that is used to enable a
network, such as the internet, and is used computer system or operating system to
to provide a layer of security by isolating communicate and interact with a specific
hardware device, such as a printer,
14
scanner, mouse, keyboard, or graphics the authenticity and integrity of a digital
card. document or message, by attaching a
digital signature to the document or
Device Driver: A software program that message, using the sender's private key.
allows a computer to communicate with
and control a specific hardware device, Digital Signature: A cryptographic
such as a printer, scanner, or mouse. technique used to verify the authenticity
and integrity of digital documents or
Digital Camera: A camera that captures messages.
and stores images in digital format.
Digital: Relating to or using digital
Digital Certificate: A digital document or technology, which represents data using
file that is used to verify the identity of an discrete values (such as 0s and 1s) rather
individual, organization, or website, and to than continuous analog signals.
encrypt and decrypt data transmitted over
the internet, using public key Directory Service: A software application
cryptography. or system that is used to manage and
organize users, computers, and other
Digital Rights Management (DRM): A resources in a network, by providing a
technology or system that is used to centralized database or directory of
protect the intellectual property rights of information about the resources.
digital content, such as music, movies, e-
books, and software, by controlling access, Directory: A container or folder used to
copying, and distribution of the content. organize and store files and other
directories on a computer system.
Digital Signature: A cryptographic
technique or method that is used to verify
15
Disk Defragmentation: The process of Disk: A storage device that uses magnetic
reorganizing the files and data on a hard or optical technology to store data, such as
disk drive (HDD) or other storage device, a hard disk drive (HDD) or a solid-state
to improve the performance and efficiency drive (SSD).
of the device, by reducing file
fragmentation and optimizing the disk Display: A device used to show visual
space usage. information, such as a monitor or a screen.
20
and provides low-level control and Frame Rate: The number of frames or
functionality. images displayed per second in a video or
animation.
Flash Drive: A small, portable storage
device that uses flash memory to store Freeware: Software that is available for
data, also known as a USB drive or a free and can be used, copied, and
thumb drive. distributed without any restrictions or
limitations.
Folder: See "Directory".
Function Key: A key on a computer
Font: A set of characters with a specific keyboard that performs a specific function
style, size, and design, used to display text or command when pressed, such as F1 for
on a computer screen or in a printed help or F5 for refresh.
document.
G
Format: The process of preparing a
storage device, such as a hard disk drive or Gigabyte (GB): A unit of data storage equal
a flash drive, for use by creating a file to 1,024 megabytes (MB) or 1,073,741,824
system and partitioning the disk. bytes.
21
store data, typically used as the primary HTML: Hypertext Markup Language, the
storage device in a computer system. standard markup language used to create
web pages and web applications.
Graphics Card: A hardware component
that is responsible for generating and HTTP: Hypertext Transfer Protocol, the
rendering images, videos, and graphics on protocol used for communication between
a computer screen. web browsers and web servers on the
Internet.
H
HTTPS: Hypertext Transfer Protocol
Hardware: The physical components of a Secure, a secure version of HTTP that uses
computer system, including the central encryption to protect the privacy and
processing unit (CPU), memory, storage integrity of data transmitted between web
devices, input devices, output devices, and browsers and web servers.
other peripherals.
I
Hash Function: A mathematical function
that takes an input (such as a message or a Icon: A small graphical image or symbol
file) and produces a fixed-size output (a used to represent a file, folder, program,
hash value or a digest) that is unique to or other object on a computer screen.
the input.
Input Device: A device used to enter data
Homepage: The main page or starting or commands into a computer system,
point of a website, typically displayed such as a keyboard, mouse, touchpad,
when a user visits the website's domain scanner, or microphone.
name.
22
Install: The process of copying and setting Internet: A global network of computers
up software or hardware on a computer and other devices that are connected
system so that it can be used. together using the Internet Protocol (IP) to
share information and resources.
Instruction Set Architecture (ISA): The set
of instructions that a central processing IP Address: A unique numerical identifier
unit (CPU) can execute, defining the assigned to each device connected to the
functionality and capabilities of the CPU. Internet, used to identify and locate the
device on the network.
Integrated Circuit (IC): A small electronic
circuit that is fabricated on a single J
semiconductor chip, containing multiple
electronic components such as transistors, Java: A high-level programming language
resistors, and capacitors. that is widely used for developing web
applications, mobile applications, and
Interface: A point of interaction or enterprise software.
connection between two or more
components or systems, such as a user JavaScript: A scripting language that is
interface, a hardware interface, or a commonly used to add interactivity and
software interface. dynamic functionality to web pages.
Internet Protocol (IP): The protocol used JPEG: Joint Photographic Experts Group, a
for communication between devices on standard image compression format used
the Internet, defining the format and for storing and transmitting digital images.
addressing of data packets.
23
K Link: A connection or reference between
two or more web pages or resources on
Keyboard: A input device used to enter the Internet, typically represented by a
text, numbers, and commands into a hyperlink.
computer system by pressing keys.
Linux: A free and open-source operating
Kilobyte (KB): A unit of data storage equal system kernel that is widely used in
to 1,024 bytes. servers, supercomputers, and embedded
systems, as well as in desktop and mobile
L devices.
24
Magnetic Disk: A storage device that uses MIDI: Musical Instrument Digital Interface,
magnetic fields to store data on a rotating a standard protocol used for
disk, such as a hard disk drive (HDD) or a communication between musical
floppy disk. instruments, computers, and other
electronic devices.
Mainframe: A large, powerful computer
system that is typically used by businesses Monitor: A display device used to show
and organizations for processing large visual information from a computer
amounts of data and running critical system, such as a computer monitor or a
applications. television.
Operating System (OS): The software that Peripheral: A device that is connected to a
manages and controls the hardware and computer system but is not an essential
software resources of a computer system, part of the system, such as a printer,
providing a platform for running scanner, mouse, keyboard, or external
applications and interacting with the user. hard drive.
26
Pixel: The smallest unit of a digital image Programming Language: A formal
or display, representing a single point of language used to write computer
color. programs, consisting of a set of syntax
rules and semantics that define how
Plug-in: A software component that can be programs should be written and
added to a web browser or other interpreted.
application to extend its functionality, such
as a media player plug-in or a security Protocol: A set of rules and standards that
plug-in. govern the communication between
devices or systems on a network, ensuring
Port: A physical or logical connection point that data is transmitted and received
on a computer system or network device correctly and reliably.
that is used to connect external devices or
communicate with other devices. R
Printer: A output device used to print text, RAM: Random Access Memory, a type of
graphics, and other documents on paper computer memory that is used to store
or other media. data and programs temporarily while they
are being processed by the central
Processor: See "Central Processing Unit processing unit (CPU).
(CPU)".
Read-Only Memory (ROM): A type of
Program: A set of instructions or code that computer memory that is used to store
is written in a programming language and permanent or semi-permanent data and
can be executed by a computer to perform instructions, such as the firmware of a
a specific task or function. computer system or the bootloader of an
operating system.
27
Reboot: The process of restarting a format by scanning them with a light
computer system, typically by turning it off source and a sensor.
and then back on again.
Script: A small program or sequence of
Record: To store data or information in a instructions that is written in a scripting
database, file, or other storage medium. language and can be executed by a
scripting engine or interpreter.
Registry: A database used by the Windows
operating system to store configuration Search Engine: A web-based tool or
settings and options for the system and service that allows users to search for
installed applications. information on the Internet by entering
keywords or phrases.
Resolution: The number of pixels or dots
per inch (dpi) in a digital image or display, Server: A computer or device that provides
determining the clarity and sharpness of services or resources to other computers
the image or text. or devices on a network, such as a web
server, email server, file server, or
Router: A networking device that forwards database server.
data packets between different networks,
such as between a local area network Shareware: Software that is available for
(LAN) and the Internet. free or at a reduced cost for a limited
period of time, after which the user is
S required to pay a license fee to continue
using the software.
Scanner: A input device used to convert
physical documents or images into digital Shell: A command-line interface or user
interface that provides access to the
28
operating system and its commands and in a tabular format, typically using rows
utilities. and columns.
Shortcut: A link or icon that provides quick SQL: Structured Query Language, a
and easy access to a file, folder, program, standard programming language used to
or other object on a computer system. manage and manipulate relational
databases.
Software: The programs, applications, and
operating systems that run on a computer SSD: Solid-State Drive, a storage device
system, as opposed to the hardware that uses flash memory to store data,
components of the system. offering faster access times and higher
reliability than traditional hard disk drives
Sound Card: A hardware component that (HDDs).
is responsible for generating and playing
audio on a computer system, typically by Standard: A set of rules, guidelines, or
converting digital audio signals into analog specifications that define how something
audio signals that can be output through should be done or what characteristics it
speakers or headphones. should have.
33
X
34