0% found this document useful (0 votes)
15 views34 pages

Analaiza

The document is a computer terminologies dictionary compiled by Ana Laiza R. Cabral for Bulacan Agricultural State College. It provides definitions for various computer-related terms, including software, hardware, networking, and security concepts. The content is structured in a dictionary format, making it a useful reference for understanding key computer terminology.

Uploaded by

blasphoemela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views34 pages

Analaiza

The document is a computer terminologies dictionary compiled by Ana Laiza R. Cabral for Bulacan Agricultural State College. It provides definitions for various computer-related terms, including software, hardware, networking, and security concepts. The content is structured in a dictionary format, making it a useful reference for understanding key computer terminology.

Uploaded by

blasphoemela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

BULACAN AGRICULTURAL STATE COLLEGE

300 WORDS COMPUTER


TERMINOLOGIES
DICTIONARY

CA B R A L, A NA LA IZA R .

B S IT 1- A
A Applet: A small application or program
that is designed to be embedded within a
Access Control List (ACL): A list of larger application or web page.
permissions that specifies which users or
groups are allowed to access a particular Application Software: Software designed
resource, such as a file, folder, or network to perform specific tasks or applications
device. for users, such as word processors,
spreadsheets, and web browsers.
Active Directory: A directory service
developed by Microsoft that is used to Archive: A collection of files and folders
manage and organize users, computers, that are stored in a compressed or
and other resources in a Windows domain uncompressed format for backup, storage,
network. or distribution purposes.

Adware: Software that displays unwanted Arithmetic Logic Unit (ALU): A component
advertisements on a computer system, of the central processing unit (CPU) that
often without the user's consent. performs arithmetic and logical
operations.
Algorithm: A set of instructions or a step-
by-step procedure for solving a problem or ARP (Address Resolution Protocol): A
performing a specific task. protocol used to map an IP address to a
physical (MAC) address on a local area
API (Application Programming Interface): A network (LAN).
set of rules and protocols that allows
different software applications to ASCII (American Standard Code for
communicate and interact with each Information Interchange): A character
other. encoding standard that represents text in
2
computers and other devices using a set of Authorization: The process of granting or
128 characters. denying access to a particular resource or
functionality based on the user's identity
Assembly Language: A low-level and permissions.
programming language that uses
mnemonic codes to represent machine B
instructions.
Backdoor: A hidden or unauthorized
Assembly: The process of converting method of accessing a computer system or
source code written in an assembly network, often used by hackers or
language into machine code that can be malicious software.
executed by a computer.
Backup: A copy of data or files made to
Asynchronous: Referring to a prevent loss in case of hardware failure,
communication or operation that does not software corruption, or other disasters.
occur at the same time or in a
synchronized manner. Bandwidth Throttling: The intentional
limitation of the amount of data that can
Attachment: A file or document that is be transmitted over a network connection,
attached to an email message or other typically to manage network congestion or
electronic communication. to enforce usage policies.

Authentication: The process of verifying Bandwidth: The amount of data that can
the identity of a user or device to ensure be transmitted over a network connection
that they are who they claim to be. in a given amount of time, usually
measured in bits per second (bps).

3
Baseband: The frequency range of a signal Bit Depth: The number of bits used to
that contains the original information, represent the color of each pixel in a
before it is modulated onto a higher digital image, determining the number of
frequency carrier wave for transmission. colors that can be displayed.

Batch File: A text file that contains a series Bit Torrent: A peer-to-peer file sharing
of commands or instructions that are protocol that allows users to download
executed in sequence by a computer and upload files simultaneously from
system. multiple sources.

Binary Tree: A data structure in which Bitrate: The number of bits transmitted
each node has at most two children, per second in a digital communication
typically used for efficient searching, system.
sorting, and data storage.
Bluetooth Low Energy (BLE): A wireless
Binary: A numbering system that uses only technology standard that is designed for
two digits, 0 and 1, to represent data. low-power, short-range communication
8. Bit: The smallest unit of data in a between devices, such as fitness trackers,
computer, representing a binary digit (0 or smartwatches, and other wearable
1). devices.

BIOS (Basic Input/Output System): A Bluetooth: A wireless technology standard


firmware that is stored on a computer's for exchanging data over short distances
motherboard and is responsible for (typically up to 10 meters) using short-
initializing and testing the hardware wavelength UHF radio waves.
components of the system during the boot
process.
4
Bookmark: A saved link or shortcut to a Bridge: A networking device that connects
web page or other resource that can be two or more network segments together
accessed quickly and easily from a web and forwards data packets between them
browser or other application. based on their MAC addresses.

Boot Sector: A sector on a storage device, Broadband: A high-speed data


such as a hard disk drive (HDD) or a floppy transmission technology that provides
disk, that contains the boot loader or faster internet access and greater
startup code for the operating system. bandwidth than traditional dial-up or
narrowband connections.
Boot: The process of starting up a
computer and loading the operating Browser Cache: A temporary storage area
system into memory. on a computer system or device that is
used by a web browser to store frequently
Bootstrap: A framework or library of pre- accessed web pages, images, and other
written code and styles that is used to resources, to improve the performance
develop responsive and mobile-first and loading speed of web pages.
websites and web applications.
Browser: A software application used to
Botnet: A network of compromised access and view websites on the Internet.
computers or devices that are controlled
by a hacker or malicious software, often Bug Fix: A software update or patch that is
used for distributed denial-of-service released by a software vendor to address a
(DDoS) attacks, spam sending, or other specific bug or issue in a software program
malicious activities. or application.

5
Bug: An error or defect in a computer Cache: A small, high-speed memory that
program or system that causes it to stores frequently accessed data to
malfunction or produce incorrect results. improve the performance of a computer
system.
Byte: A unit of data consisting of 8 bits.
Call Stack: A data structure that is used by
Bytecode: An intermediate representation a computer program or application to keep
of a computer program or application that track of the function calls and their return
is generated by a compiler or interpreter addresses, allowing the program to return
and can be executed by a virtual machine to the correct location after a function call
or runtime environment. has completed.

C Captcha: A type of challenge-response test


that is used to verify that the user is a
Cable Modem: A device that is used to human and not a computer program or
connect a computer or network to a cable bot, typically by presenting the user with a
television network and provides high- distorted image or text that they must
speed internet access over the cable enter correctly.
infrastructure.
Case Sensitive: Referring to a computer
Cache Memory: A small, high-speed system or programming language that
memory that is located on or close to the distinguishes between uppercase and
central processing unit (CPU) of a lowercase letters, treating them as
computer system and is used to store different characters. 215. CD-R (Compact
frequently accessed data and instructions, Disc Recordable): A type of optical disc
to improve the performance of the system. that can be written to once and read

6
multiple times, typically used for storing Centralized System: A computer system or
data, music, or video. network in which all the processing and
data storage is performed on a central
CD-ROM: A compact disc read-only
server or mainframe computer, and the
memory, a type of optical disc used to
clients or user devices access the system
store and read data.
over a network.

CD-RW (Compact Disc Rewritable): A type


Certificate Authority (CA): An organization
of optical disc that can be written to,
or entity that issues digital certificates to
erased, and rewritten multiple times,
verify the identity of individuals,
typically used for storing data, music, or
organizations, or websites, and to encrypt
video.
and decrypt data transmitted over the
internet.
Cellular Network : A wireless
communication network that uses cellular
Channel: A communication path or
technology to provide mobile phone and
medium that is used to transmit data or
data services to users over a wide area.
information between two or more devices
or systems, such as a wired or wireless
Central Processing Unit (CPU): The main
network connection, a satellite link, or a
component of a computer that performs
fiber optic cable.
most of the processing tasks, including
executing instructions and performing
Checksum: A value that is calculated from
arithmetic and logical operations.
a block of data and is used to verify the
18. Character: A single letter, number,
integrity of the data, by detecting errors or
symbol, or punctuation mark.
changes that may have occurred during
transmission or storage.

7
Chip: A small piece of semiconductor Client: A computer or device that requests
material, typically silicon, that contains services or resources from a server in a
electronic components such as transistors, network.
resistors, and capacitors.
Client-Server Architecture: A computing
Chipset: A group of integrated circuits or model or architecture in which the
chips that are designed to work together processing and data storage is divided
to provide specific functionality or features between a client or user device and a
in a computer system or device, such as server or central computer, with the client
the motherboard chipset, the graphics requesting services or resources from the
chipset, or the network chipset. server over a network.

Cipher: A cryptographic algorithm or Clipboard: A temporary storage area or


method that is used to encrypt and buffer that is used by a computer system
decrypt data, by transforming the plaintext or application to store data or information
into ciphertext and vice versa. that has been copied or cut, and can be
pasted or inserted into another location or
Ciphertext: The encrypted form of data or application.
information, which is unreadable and
unintelligible without the correct Clock Cycle: The basic unit of time in a
decryption key. computer system, which is the time it
takes for the central processing unit (CPU)
Classless Inter-Domain Routing (CIDR): A to execute one instruction or perform one
method of IP address allocation and operation.
routing that allows for more efficient use
of IP addresses and greater flexibility in Cloud Computing: The delivery of
network design. computing services, including servers,
8
storage, databases, networking, software, Cold Boot: The process of starting a
analytics, and intelligence, over the computer system from a powered-off
Internet ("the cloud") to offer faster state, by turning on the power and loading
innovation, flexible resources, and the operating system from the hard disk
economies of scale. drive (HDD) or other storage device.

Cluster: A group of interconnected Command Prompt: A text-based interface


computers or servers that work together or command-line interpreter that is used
as a single system to provide high- to execute commands and run programs
performance computing, data storage, or on a computer system, typically in a
other services. Windows operating system.

CMOS (Complementary Metal-Oxide- Command-Line Interface (CLI): A user


Semiconductor): A type of semiconductor interface that allows users to interact with
technology that is used to manufacture a computer system or application by
integrated circuits and other electronic typing commands and receiving text-based
components, such as microprocessors, output, typically in a terminal or command
memory chips, and transistors. prompt window.

Codec (Coder-Decoder): A software or Compatibility: The ability of a computer


hardware component that is used to system, software application, or hardware
encode and decode digital audio or video device to work together or interoperate
signals, by compressing the data to reduce with other systems, applications, or
the file size and decompressing the data to devices, without errors or compatibility
play the audio or video. issues.

9
Compiler: A software program that common communication protocol or
translates source code written in a high- technology.
level programming language into machine
code that can be executed by a computer. Computer Virus: A malicious software
program that can replicate itself and
Compiler: A software program that spread from one computer to another,
translates source code written in a high- often causing damage or disruption to the
level programming language into machine infected system.
code that can be executed by a computer.
Computer Vision: The field of computer
Compression: The process of reducing the science and artificial intelligence that
size of a file or data by encoding it in a focuses on enabling computers to
more efficient format, using a compression interpret and understand visual
algorithm or method. information from the world, such as
images and videos.
Computer Architecture: The design and
organization of the components and Concurrent: Referring to the ability of a
subsystems of a computer system, computer system or program to perform
including the central processing unit (CPU), multiple tasks or operations
memory, storage devices, input/output simultaneously, or in parallel.
interfaces, and other hardware
components. Configuration: The settings, options, and
parameters that define the behavior and
Computer Network: A group of functionality of a computer system,
interconnected computers and other software application, or hardware device.
devices that are able to communicate and
share resources with each other, using a
10
Connectionless: Referring to a Cookie: A small text file that is stored on a
communication or networking protocol user's computer or device by a website or
that does not establish a dedicated web application, and is used to store
connection or session between the sender information about the user's preferences,
and the receiver before transmitting data, settings, or browsing history.
such as the User Datagram Protocol (UDP).
CPU Cache: A small, high-speed memory
Connection-Oriented: Referring to a that is located on or close to the central
communication or networking protocol processing unit (CPU) of a computer
that establishes a dedicated connection or system and is used to store frequently
session between the sender and the accessed data and instructions, to improve
receiver before transmitting data, such as the performance of the system.
the Transmission Control Protocol (TCP).
CPU Clock Speed: The rate at which the
Console: A text-based interface or central processing unit (CPU) executes
command-line interpreter that is used to instructions, measured in hertz (Hz).
interact with a computer system or
application, typically in a Unix or Linux CPU Core: A processing unit or execution
operating system. unit within a central processing unit (CPU)
that is capable of executing instructions
Control Panel: A graphical user interface and performing arithmetic and logical
(GUI) tool or utility that is used to operations independently.
configure and manage the settings,
options, and parameters of a computer CPU Frequency: The speed or clock rate at
system or operating system, such as the which the central processing unit (CPU)
Windows Control Panel. executes instructions, typically measured
in gigahertz (GHz).
11
CPU Socket: A physical connector or CSS (Cascading Style Sheets): A style sheet
interface on a motherboard that is used to language that is used to describe the
connect a central processing unit (CPU) to presentation and layout of a document
the motherboard. written in HTML or XML, by defining the
styles, colors, fonts, and other formatting
CPU Utilization: The percentage of time properties of the elements in the
that the central processing unit (CPU) is document.
busy or in use, typically measured over a
period of time. Cursor: A graphical symbol or indicator
that is used to show the current position
Cracker: A person who uses hacking or location of the mouse pointer or input
techniques or tools to gain unauthorized device on a computer screen.
access to computer systems or networks,
often for malicious or illegal purposes. Cybersecurity: The practice and measures
taken to protect computer systems,
Crawling: The process of automatically networks, and data from unauthorized
visiting and indexing web pages on the access, use, disclosure, disruption,
internet by a search engine or web modification, or destruction, by hackers,
crawler, to build a search index or cybercriminals, or other malicious actors.
database of web pages.
D
Cryptography: The science and study of
techniques and methods for secure Data Center: A facility or building that is
communication and data protection, using used to house and operate computer
encryption, decryption, digital signatures, systems, servers, storage devices,
and other cryptographic algorithms and networking equipment, and other IT
protocols. infrastructure, to provide data processing,
12
storage, and networking services to Data Structure: A way of organizing and
organizations and businesses. storing data in a computer system or
program, to facilitate efficient access,
Data Compression: The process of manipulation, and processing of the data.
reducing the size of a file or data by
encoding it in a more efficient format, Data Transfer Rate: The speed or rate at
using a compression algorithm or method. which data is transferred or transmitted
between two devices or systems, typically
Data Encryption: The process of measured in bits per second (bps), kilobits
converting plaintext or readable data into per second (Kbps), megabits per second
ciphertext or encrypted data, using a (Mbps), or gigabits per second (Gbps).
cryptographic algorithm or method, to
protect the data from unauthorized Database Management System (DBMS): A
access, use, disclosure, or modification. software application or system that is used
to manage and organize databases, by
Data Mining: The process of extracting providing tools and functions for creating,
useful information and knowledge from modifying, querying, and maintaining
large amounts of data, using statistical databases.
analysis, machine learning, and other data
analysis techniques and methods. Database: A structured collection of data
that is organized and stored in a computer
Data Recovery: The process of restoring or system for easy access, management, and
retrieving lost, deleted, corrupted, or retrieval.
inaccessible data from a storage device,
such as a hard disk drive (HDD), a solid- Debugger: A software tool or program that
state drive (SSD), or a memory card. is used to identify and fix errors or bugs in
a computer program or application, by
13
allowing the developer to step through the the internal network from the external
code, set breakpoints, and inspect the network.
values of variables and other program
state. Denial-of-Service (DoS) Attack: A type of
cyberattack that is designed to disrupt or
Debugging: The process of identifying and disable the normal operation of a
fixing errors or bugs in a computer computer system, network, or website, by
program or system. overwhelming it with a large volume of
traffic or requests, or by exploiting
Default Gateway: The IP address of a vulnerabilities in the system or network.
router or gateway device that is used by a
computer or device to access other Desktop Environment: A graphical user
networks or the internet, typically interface (GUI) that is used to provide a
configured as the default route in the desktop-like experience on a computer
computer's network settings. system or device, typically including a
desktop background, icons, windows,
Default: A preselected option or setting menus, and other graphical elements.
that is automatically used by a computer
program or system if no other option is Desktop: The main screen or workspace of
specified. a computer operating system, where
icons, files, and folders are displayed.
Demilitarized Zone (DMZ): A network
segment or subnet that is located between Device Driver: A software program or
an internal network and an external component that is used to enable a
network, such as the internet, and is used computer system or operating system to
to provide a layer of security by isolating communicate and interact with a specific
hardware device, such as a printer,
14
scanner, mouse, keyboard, or graphics the authenticity and integrity of a digital
card. document or message, by attaching a
digital signature to the document or
Device Driver: A software program that message, using the sender's private key.
allows a computer to communicate with
and control a specific hardware device, Digital Signature: A cryptographic
such as a printer, scanner, or mouse. technique used to verify the authenticity
and integrity of digital documents or
Digital Camera: A camera that captures messages.
and stores images in digital format.
Digital: Relating to or using digital
Digital Certificate: A digital document or technology, which represents data using
file that is used to verify the identity of an discrete values (such as 0s and 1s) rather
individual, organization, or website, and to than continuous analog signals.
encrypt and decrypt data transmitted over
the internet, using public key Directory Service: A software application
cryptography. or system that is used to manage and
organize users, computers, and other
Digital Rights Management (DRM): A resources in a network, by providing a
technology or system that is used to centralized database or directory of
protect the intellectual property rights of information about the resources.
digital content, such as music, movies, e-
books, and software, by controlling access, Directory: A container or folder used to
copying, and distribution of the content. organize and store files and other
directories on a computer system.
Digital Signature: A cryptographic
technique or method that is used to verify
15
Disk Defragmentation: The process of Disk: A storage device that uses magnetic
reorganizing the files and data on a hard or optical technology to store data, such as
disk drive (HDD) or other storage device, a hard disk drive (HDD) or a solid-state
to improve the performance and efficiency drive (SSD).
of the device, by reducing file
fragmentation and optimizing the disk Display: A device used to show visual
space usage. information, such as a monitor or a screen.

Disk Encryption: The process of encrypting Distributed Computing: A computing


the entire contents of a hard disk drive model or architecture in which the
(HDD) or other storage device, to protect processing and data storage is distributed
the data from unauthorized access, use, across multiple computers or devices,
disclosure, or modification, in case the connected over a network, to work
device is lost, stolen, or compromised. together as a single system, to solve a
problem or perform a task.
Disk Image: A file or archive that contains
an exact copy or snapshot of the contents Distributed Denial-of-Service (DDoS)
of a hard disk drive (HDD) or other storage Attack: A type of cyberattack that is similar
device, including the operating system, to a Denial-of-Service (DoS) attack, but
applications, files, and data. involves multiple computers or devices,
often compromised or controlled by a
Disk Partition: A logical division or section hacker or cybercriminal, to launch a
of a hard disk drive (HDD) or other storage coordinated attack on a target system or
device, that is treated as a separate drive network.
or volume by the operating system, and
can be formatted and used to store data DNS (Domain Name System): A
independently. hierarchical and distributed naming system
16
that is used to translate domain names, Download Manager: A software
such as "google.com" or "example.com", application or tool that is used to manage
into IP addresses, which are used to and accelerate the download of files from
identify and locate computers and other the internet, by splitting the file into
devices on the internet. multiple parts and downloading them
simultaneously, and by resuming
Domain Controller: A server or computer interrupted downloads.
that is used to manage and control the
security and access rights of users and Download: The process of transferring
computers in a Windows domain network, data or files from a remote computer or
by authenticating users and computers, server to a local computer or device over a
and enforcing security policies and access network.
controls.
Driver Update: A software update or patch
Domain Name: A unique name or that is released by a hardware
identifier that is used to identify and locate manufacturer or device driver vendor, to
a website or other resource on the fix bugs, improve performance, or add new
internet, typically consisting of a top-level features or functionality to a device driver.
domain (TLD), such as ".com", ".org", or
".net", and a second-level domain (SLD), Driver: See "Device Driver".
such as "google" or "example".
Dual Boot: The ability to install and run
Domain Name: A unique name that two or more operating systems on a single
identifies a website or a network resource computer system, by partitioning the hard
on the Internet, such as "google.com" or disk drive (HDD) or other storage device,
"example.com". and installing each operating system on a
separate partition.
17
DVD: A digital versatile disc, a type of processing, order management, and
optical disc used to store and read large customer relationship management.
amounts of data, including movies, music,
and software. E-commerce: Electronic commerce, the
buying and selling of goods and services
Dynamic Host Configuration Protocol over the Internet.
(DHCP): A network protocol that is used to
automatically assign IP addresses and E-mail Client: A software application or
other network configuration settings to program that is used to send, receive, and
computers and other devices on a manage email messages, by connecting to
network, by a DHCP server. an email server or service, such as Gmail,
Outlook, or Yahoo Mail.
Dynamic Link Library (DLL): A library or
collection of reusable code and data that is E-mail Server: A server or computer that is
used by multiple programs or applications, used to send, receive, and store email
to provide common functionality or messages, by using the Simple Mail
services, such as file I/O, networking, or Transfer Protocol (SMTP) to send
graphics rendering. messages, and the Post Office Protocol
(POP3) or Internet Message Access
E Protocol (IMAP) to receive messages.

E-commerce Platform: A software Email: Electronic mail, a method of


application or system that is used to build sending and receiving messages and files
and manage online stores or e-commerce over the Internet using email addresses.
websites, by providing tools and functions
for product catalog management, Embedded System: A computer system or
shopping cart functionality, payment device that is designed to perform a
18
specific function or task, and is embedded that is used to manage and integrate the
or integrated into a larger system or core business processes and functions of
product, such as a smartphone, a tablet, a an organization, such as finance,
smartwatch, a car, or a home appliance. accounting, human resources,
manufacturing, supply chain management,
Encryption Key: A secret or private key and customer relationship management.
that is used to encrypt and decrypt data,
using a cryptographic algorithm or Error Message: A message displayed by a
method, to protect the data from computer program or system to indicate
unauthorized access, use, disclosure, or that an error has occurred or that a
modification. problem needs to be addressed.

Encryption: The process of converting Ethernet Cable: A type of network cable


plaintext (readable data) into ciphertext that is used to connect computers and
(encrypted data) to protect it from other devices to a local area network
unauthorized access or interception. (LAN), by using the Ethernet protocol,
which is a standard networking technology
End-to-End Encryption: A security feature that is widely used in homes, offices, and
or protocol that encrypts data at the data centers.
source or sender's end, and decrypts it at
the destination or receiver's end, without Ethernet Port: A physical connector or
the data being decrypted or accessible at interface on a computer, network device,
any intermediate points or nodes in the or other electronic device, that is used to
communication path. connect an Ethernet cable, to enable
network connectivity and communication.
Enterprise Resource Planning (ERP)
System: A software application or system
19
Ethernet Switch: A networking device that F
is used to connect multiple computers and
other devices to a local area network File Extension: A suffix added to the end of
(LAN), by using the Ethernet protocol, and a file name to indicate the file type or
to forward data packets between the format, such as ".txt" for text files or ".jpg"
devices, based on their MAC addresses. for JPEG image files.
Ethernet: A family of computer networking
File System: A method or structure used
technologies commonly used in local area
by an operating system to organize and
networks (LANs) and wide area networks
manage files and directories on a storage
(WANs).
device.
Executable File: A file that contains
File: A collection of data or information
machine code that can be executed by a
that is stored on a computer system under
computer to perform a specific task or
a specific name and location.
function.
Firewall: A security system that monitors
Expansion Card: A printed circuit board
and controls incoming and outgoing
that can be inserted into an expansion slot
network traffic based on predetermined
on a computer motherboard to add
security rules to protect a computer or
additional functionality or capabilities,
network from unauthorized access,
such as a graphics card, sound card, or
attacks, and other threats.
network card.
Firmware: Software that is embedded in a
hardware device, such as a computer
motherboard, hard disk drive, or router,

20
and provides low-level control and Frame Rate: The number of frames or
functionality. images displayed per second in a video or
animation.
Flash Drive: A small, portable storage
device that uses flash memory to store Freeware: Software that is available for
data, also known as a USB drive or a free and can be used, copied, and
thumb drive. distributed without any restrictions or
limitations.
Folder: See "Directory".
Function Key: A key on a computer
Font: A set of characters with a specific keyboard that performs a specific function
style, size, and design, used to display text or command when pressed, such as F1 for
on a computer screen or in a printed help or F5 for refresh.
document.
G
Format: The process of preparing a
storage device, such as a hard disk drive or Gigabyte (GB): A unit of data storage equal
a flash drive, for use by creating a file to 1,024 megabytes (MB) or 1,073,741,824
system and partitioning the disk. bytes.

Fragmentation: The process of dividing a Graphical User Interface (GUI): A user


file into smaller pieces and storing them in interface that uses graphical elements,
non-contiguous locations on a storage such as icons, windows, menus, and
device, which can reduce the performance buttons, to interact with a computer
of the device. system. 63. Hard Disk Drive (HDD): A
storage device that uses magnetic disks to

21
store data, typically used as the primary HTML: Hypertext Markup Language, the
storage device in a computer system. standard markup language used to create
web pages and web applications.
Graphics Card: A hardware component
that is responsible for generating and HTTP: Hypertext Transfer Protocol, the
rendering images, videos, and graphics on protocol used for communication between
a computer screen. web browsers and web servers on the
Internet.
H
HTTPS: Hypertext Transfer Protocol
Hardware: The physical components of a Secure, a secure version of HTTP that uses
computer system, including the central encryption to protect the privacy and
processing unit (CPU), memory, storage integrity of data transmitted between web
devices, input devices, output devices, and browsers and web servers.
other peripherals.
I
Hash Function: A mathematical function
that takes an input (such as a message or a Icon: A small graphical image or symbol
file) and produces a fixed-size output (a used to represent a file, folder, program,
hash value or a digest) that is unique to or other object on a computer screen.
the input.
Input Device: A device used to enter data
Homepage: The main page or starting or commands into a computer system,
point of a website, typically displayed such as a keyboard, mouse, touchpad,
when a user visits the website's domain scanner, or microphone.
name.

22
Install: The process of copying and setting Internet: A global network of computers
up software or hardware on a computer and other devices that are connected
system so that it can be used. together using the Internet Protocol (IP) to
share information and resources.
Instruction Set Architecture (ISA): The set
of instructions that a central processing IP Address: A unique numerical identifier
unit (CPU) can execute, defining the assigned to each device connected to the
functionality and capabilities of the CPU. Internet, used to identify and locate the
device on the network.
Integrated Circuit (IC): A small electronic
circuit that is fabricated on a single J
semiconductor chip, containing multiple
electronic components such as transistors, Java: A high-level programming language
resistors, and capacitors. that is widely used for developing web
applications, mobile applications, and
Interface: A point of interaction or enterprise software.
connection between two or more
components or systems, such as a user JavaScript: A scripting language that is
interface, a hardware interface, or a commonly used to add interactivity and
software interface. dynamic functionality to web pages.

Internet Protocol (IP): The protocol used JPEG: Joint Photographic Experts Group, a
for communication between devices on standard image compression format used
the Internet, defining the format and for storing and transmitting digital images.
addressing of data packets.

23
K Link: A connection or reference between
two or more web pages or resources on
Keyboard: A input device used to enter the Internet, typically represented by a
text, numbers, and commands into a hyperlink.
computer system by pressing keys.
Linux: A free and open-source operating
Kilobyte (KB): A unit of data storage equal system kernel that is widely used in
to 1,024 bytes. servers, supercomputers, and embedded
systems, as well as in desktop and mobile
L devices.

LAN: Local Area Network, a computer M


network that covers a small geographical
area, such as a home, office, or building, Mac OS: The operating system developed
and is used to connect devices and share by Apple Inc. for its Macintosh computers.
resources within the network
Machine Code: The low-level instructions
LCD: Liquid Crystal Display, a type of flat- that a computer's central processing unit
panel display technology commonly used (CPU) can execute directly, represented in
in computer monitors, televisions, and binary format.
other electronic devices.
Macro: A sequence of instructions or
LED: Light Emitting Diode, a semiconductor commands that can be recorded and
device that emits light when an electric played back to automate repetitive tasks in
current is passed through it, commonly a computer program or application.
used in lighting, displays, and indicators.

24
Magnetic Disk: A storage device that uses MIDI: Musical Instrument Digital Interface,
magnetic fields to store data on a rotating a standard protocol used for
disk, such as a hard disk drive (HDD) or a communication between musical
floppy disk. instruments, computers, and other
electronic devices.
Mainframe: A large, powerful computer
system that is typically used by businesses Monitor: A display device used to show
and organizations for processing large visual information from a computer
amounts of data and running critical system, such as a computer monitor or a
applications. television.

Memory: The component of a computer Motherboard: The main circuit board of a


system that is used to store data and computer system, which connects and
programs temporarily while they are being integrates all the other components of the
processed by the central processing unit system, including the central processing
(CPU). unit (CPU), memory, storage devices,
input/output interfaces, and expansion
Menu: A list of options or commands that slots.
are displayed on a computer screen and
can be selected by the user to perform a Mouse: A pointing device used to control
specific task or function. the cursor and interact with graphical user
interfaces (GUIs) on a computer screen by
Microprocessor: A single integrated circuit moving the mouse and clicking its buttons.
that contains the central processing unit
(CPU) of a computer system, along with Multimedia: The use of multiple forms of
other components such as memory and media, such as text, graphics, audio, video,
input/output interfaces.
25
and animation, to convey information and Output Device: A device used to display or
create interactive experiences. output data or information from a
computer system, such as a monitor,
N printer, speaker, or projector.

Network Adapter: A hardware component P


that allows a computer to connect to a
network, such as a network interface card Packet: A unit of data that is transmitted
(NIC) or a wireless network adapter. over a network, typically consisting of a
header and a payload.
Network Interface Card (NIC): A hardware
component that is installed in a computer Password: A secret word or phrase that is
to connect it to a network, typically using used to authenticate a user's identity and
an Ethernet cable. grant access to a computer system,
network, or application.
Network: A group of computers and other
devices that are connected together to Patch: A software update or fix that is
share resources and communicate with released by a software vendor to address
each other. security vulnerabilities, bugs, or other
issues in a software program or
O application.

Operating System (OS): The software that Peripheral: A device that is connected to a
manages and controls the hardware and computer system but is not an essential
software resources of a computer system, part of the system, such as a printer,
providing a platform for running scanner, mouse, keyboard, or external
applications and interacting with the user. hard drive.
26
Pixel: The smallest unit of a digital image Programming Language: A formal
or display, representing a single point of language used to write computer
color. programs, consisting of a set of syntax
rules and semantics that define how
Plug-in: A software component that can be programs should be written and
added to a web browser or other interpreted.
application to extend its functionality, such
as a media player plug-in or a security Protocol: A set of rules and standards that
plug-in. govern the communication between
devices or systems on a network, ensuring
Port: A physical or logical connection point that data is transmitted and received
on a computer system or network device correctly and reliably.
that is used to connect external devices or
communicate with other devices. R

Printer: A output device used to print text, RAM: Random Access Memory, a type of
graphics, and other documents on paper computer memory that is used to store
or other media. data and programs temporarily while they
are being processed by the central
Processor: See "Central Processing Unit processing unit (CPU).
(CPU)".
Read-Only Memory (ROM): A type of
Program: A set of instructions or code that computer memory that is used to store
is written in a programming language and permanent or semi-permanent data and
can be executed by a computer to perform instructions, such as the firmware of a
a specific task or function. computer system or the bootloader of an
operating system.
27
Reboot: The process of restarting a format by scanning them with a light
computer system, typically by turning it off source and a sensor.
and then back on again.
Script: A small program or sequence of
Record: To store data or information in a instructions that is written in a scripting
database, file, or other storage medium. language and can be executed by a
scripting engine or interpreter.
Registry: A database used by the Windows
operating system to store configuration Search Engine: A web-based tool or
settings and options for the system and service that allows users to search for
installed applications. information on the Internet by entering
keywords or phrases.
Resolution: The number of pixels or dots
per inch (dpi) in a digital image or display, Server: A computer or device that provides
determining the clarity and sharpness of services or resources to other computers
the image or text. or devices on a network, such as a web
server, email server, file server, or
Router: A networking device that forwards database server.
data packets between different networks,
such as between a local area network Shareware: Software that is available for
(LAN) and the Internet. free or at a reduced cost for a limited
period of time, after which the user is
S required to pay a license fee to continue
using the software.
Scanner: A input device used to convert
physical documents or images into digital Shell: A command-line interface or user
interface that provides access to the
28
operating system and its commands and in a tabular format, typically using rows
utilities. and columns.

Shortcut: A link or icon that provides quick SQL: Structured Query Language, a
and easy access to a file, folder, program, standard programming language used to
or other object on a computer system. manage and manipulate relational
databases.
Software: The programs, applications, and
operating systems that run on a computer SSD: Solid-State Drive, a storage device
system, as opposed to the hardware that uses flash memory to store data,
components of the system. offering faster access times and higher
reliability than traditional hard disk drives
Sound Card: A hardware component that (HDDs).
is responsible for generating and playing
audio on a computer system, typically by Standard: A set of rules, guidelines, or
converting digital audio signals into analog specifications that define how something
audio signals that can be output through should be done or what characteristics it
speakers or headphones. should have.

Source Code: The human-readable version Startup: The process of starting a


of a computer program or application that computer system or a software
is written in a programming language, application.
before it is compiled or interpreted into
machine code. String: A sequence of characters, such as a
word, a sentence, or a line of text.
Spreadsheet: A software application used 142. Subdirectory: A directory that is con
to organize, analyze, and manipulate data
29
Subdirectory: A directory that is con. T

Supercomputer: A very powerful Tablet: A portable computing device that


computer system that is capable of typically has a touchscreen display and is
performing extremely complex designed for use with a stylus or finger,
calculations and processing large amounts offering a more intuitive and interactive
of data at very high speeds. user experience than traditional laptops or
desktops.
Surfing: The act of browsing the Internet,
typically by visiting websites and following Taskbar: A bar or panel that is typically
links. located at the bottom of the screen in a
graphical user interface (GUI) and provides
Switch: A networking device that connects quick access to frequently used
multiple devices together on a local area applications, programs, and system
network (LAN) and forwards data packets functions.
between them based on their MAC
addresses. Terminal: A text-based interface or
command-line interface that allows users
System: A collection of hardware and to interact with a computer system or a
software components that work together network device by typing commands and
to perform a specific function or task, such receiving text-based output.
as a computer system, a operating system,
or a network system.
30
Text Editor: A software application used to graphical user interfaces (GUIs) by moving
create, edit, and view text files, such as their fingers on the pad.
source code files, configuration files, or
documentation files. Trojan Horse: A type of malicious software
that appears to be legitimate or useful but
Thumbnail: A small preview image or icon actually contains hidden malware or other
that represents a larger image or harmful code that can damage or
document, typically used to provide a compromise a computer system or steal
quick visual overview of the contents of a sensitive information.
folder or a website.
Troubleshooting: The process of
Toolbar: A bar or panel that is typically identifying and resolving problems or
located at the top or bottom of a window issues with a computer system, software
in a graphical user interface (GUI) and application, or network device.
provides quick access to frequently used
commands, tools, or functions. U

Touchscreen: A display screen that is URL: Uniform Resource Locator, a unique


sensitive to touch and allows users to address that identifies a resource on the
interact with a computer system or a Internet, such as a web page, a file, or an
device by touching the screen with their image.
fingers or a stylus.
USB: Universal Serial Bus, a standard
Trackpad: A touch-sensitive pad that is interface used to connect external devices
typically located below the keyboard on a to a computer system, such as USB flash
laptop computer and allows users to drives, external hard drives, printers,
control the cursor and interact with scanners, and keyboards.
31
User Account: A unique identity or profile the hard disk drive (HDD) or a solid-state
that is created for a user on a computer drive (SSD) as additional memory.
system or a network, allowing the user to
access and use the system's resources and Virtual Private Network (VPN): A secure
services. and encrypted connection that allows
users to access a private network or the
User Interface (UI): The part of a computer Internet over a public network, such as the
system or a software application that Internet, while maintaining their privacy
allows users to interact with the system or and security.
the application, typically through a
graphical user interface (GUI) or a Virus Scanner: A software program or
command-line interface (CLI). application that is used to detect and
remove viruses, malware, and other
User Profile: A collection of settings, harmful software from a computer system
preferences, and data that is associated or a network.
with a user account on a computer system
or a network, including the user's desktop Voice Recognition: The technology that
background, screen saver, browser allows a computer system or a device to
bookmarks, and other personalization recognize and understand human speech,
options. typically by converting spoken words into
text or by executing commands based on
V spoken instructions.

Virtual Memory: A technique used by W


operating systems to extend the amount
of available memory by using a portion of Web Browser: A software application used
to access and view websites on the
32
Internet, such as Google Chrome, Mozilla Windows: The operating system
Firefox, Microsoft Edge, or Safari. developed by Microsoft Corporation for
personal computers and other devices.
Webcam: A video camera that is
connected to a computer system or a Word Processor: A software application
device and allows users to capture and used to create, edit, format, and print text
transmit video and audio over the documents, such as letters, reports,
Internet, typically for video conferencing, essays, and memos.
live streaming, or online chatting.
Workstation: A powerful computer system
Website: A collection of web pages and that is designed for use by professionals,
other resources that are hosted on a web such as engineers, designers, scientists,
server and can be accessed over the and artists, who require high-performance
Internet using a web browser. computing and graphics capabilities.

Wi-Fi: Wireless Fidelity, a wireless Worm: A type of malicious software that


networking technology that allows devices can replicate itself and spread from one
to connect to a local area network (LAN) or computer to another over a network,
the Internet without the need for cables or typically without the need for human
wires. interaction.

Window: A rectangular area or frame on a Write: To store data or information in a


computer screen that is used to display the storage medium, such as a hard disk drive
contents of a program, application, or (HDD), a solid-state drive (SSD), or a
document. memory card.

33
X

XML: Extensible Markup Language, a


standard markup language used to store
and transport data in a structured and
human-readable format.

Zip File: A compressed file format that is


used to reduce the size of files and folders
by compressing them into a single archive
file, typically with the ".zip" file extension.

Zoom: To increase or decrease the size of


an image, a document, or a window on a
computer screen, typically by using a zoom
function or a zoom control.

34

You might also like