Glossary
There are currently 135 glossary in this directory
Access
means entering and using a computer, website or application or It refers to the act of accessing a computer. It is commonly used to mean “give permission to use.”
Algorithms
An algorithm is simply a set of steps used to complete a specific task. They're the building blocks for programming, and they allow things like computers, smartphones, and websites to function and make decisions.
ALU
An arithmetic-logic unit is the part of a central processing unit that carries out arithmetic and logic operations on the operands in computer instruction words. In some processors, the ALU is divided into two units: an arithmetic unit (AU) and a logic unit (LU).
Analyze
Analyze is used quite often in IT when there’s a need to closely study data, information or even a technical problem. For instance, you might analyze product trends or a problem with your communications network. This is not a problem with a simple solution. We need time to analyze why your laptop won’t boot up.
Application:
A software program that performs a specific task, such as word processing or spreadsheeting.
Backdoor
A hidden way to access a computer system or network that is not authorized by the system administrator.
Black hat hacking
refers to the practice of hacking, breaking into computer systems, networks, or applications with malicious intent and without authorization from the system owner.
Bluetooth
is a way of communicating wirelessly over short distances between electronic devices (for example computer and mobile telephone)
Booting
is the process of starting a computer as initiated via hardware such as a button or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so some process must load software into memory before it can be executed. This may be done by hardware or firmware in the CPU, or by a separate processor in the computer system.
Botnet
A network of computers that have been infected with malware and are controlled by a remote attacker.
Byte
A group of 8 bits is called byte. A byte is the smallest unit which can represent a data item or a character.
Card reader
A card reader is a device used to transferring media data and files from a memory card to a computer. While many computers have SD card readers built in, there are other common types of cards that will require a USB card reader to transfer files, such as CF cards.
Clickjacking
A type of attack that tricks users into clicking on something they did not intend to click on.
Cloud computing
A model of computing where data and applications are hosted on remote servers and accessed over the internet.
CMD
Command-line interpreter application available in Windows operating systems. It allows users to interact with the system using text-based commands.
Code editor
is a software application used by programmers and developers to write, edit, and manage source code for various programming languages. It provides a user-friendly interface and features tailored to enhance the coding experience, such as syntax highlighting, code completion, indentation, and more.
Coding
Also known as programming, is the process of writing instructions for a computer or software system to follow. These instructions are typically written in programming languages, which are sets of syntax and rules that computers can understand and execute.
Connect:
is used to describe the action of establishing (making) communication with the Internet or with another device (computer equipment) such as a monitor, modem, etc.
Control Unit
A control unit, or CU, is circuitry within a computer's processor that directs operations. It instructs the memory, logic unit, and both output and input devices of the computer on how to respond to the program's instructions. CPUs and GPUs are examples of devices that use control units.
CPU
The central processing unit is the portion of a computer that retrieves and executes instructions. The CPU is essentially the brain of a CAD system. It consists of an arithmetic and logic unit (ALU), a control unit, and various registers.
CSS (Cascading Style Sheets)
is a style sheet language used to control the presentation and layout of HTML (or XML) documents. It is an essential component of web development and works alongside HTML to define the visual appearance of web pages.
Cybersecurity
The practice of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction.
Data
refers to the information (text, pictures, audio etc) that you create or share on a computer, as opposed to the programs that manipulate the data.
DDoS attack
A distributed denial-of-service attack that floods a server or network with so much traffic that it becomes unavailable to legitimate users.
Debugging
is the process of identifying and fixing errors or defects in a computer program or software system. When a program doesn't work as intended, debugging is used to diagnose and correct the issues that cause the program to behave incorrectly or unexpectedly.
Deployment
Refers to the process of making a software application or system available for use in a specific environment. It involves taking the code that has been developed, tested, and optimized, and installing or running it on the target platform or server where end-users can access and utilize the software.
Device
A physical object that is used to interact with a computer system, such as a keyboard, mouse, or printer.
Domain
refers to a human-readable address that serves as a unique identifier for a specific location on the internet. It is used to access websites and other resources hosted on the World Wide Web.
DOS
Disk Operating System. The original system used for PCs, where you typed in commands instead of pointing and clicking.
DoS attack
A denial-of-service attack that floods a server or network with so much traffic that it becomes unavailable to legitimate users.
Electronic mail (email, e-mail)
- messages sent from one computer to another. You can see email on the screen or print it out.
Encryption
The process of converting data into a form that cannot be read by unauthorized individuals.
End-user
Also known as a user or consumer, is the ultimate individual or entity that uses a software application, system, or product to perform specific tasks or achieve certain goals. End-users are the individuals for whom the software is designed and intended to serve.
Evil twin
A malicious Wi-Fi network that is set up to resemble a legitimate network in order to trick users into connecting to it.
File
refers to a collection of data or information organized under a specific name and stored in a computer’s folder. File is also commonly used to talk about things related to a file, such as file name, file size, etc.
File Explorer
Is a graphical user interface (GUI) application in Microsoft Windows operating systems that allows users to browse and manage files and folders on their computer. It provides an easy-to-use interface to navigate through the file system, view files, copy, move, delete, and perform various file-related tasks.
File extension
is a suffix attached to the end of a filename to indicate the type or format of the file. It is typically separated from the rest of the filename by a dot (period). File extensions are used by the operating system and applications to determine how to handle and open a file.
Flash memory
is a non-volatile memory chip used for storage and for transfering data between a personal computer (PC) and digital devices. It has the ability to be electronically reprogrammed and erased. It is often found in USB flash drives, MP3 players, digital cameras and solid-state drives.
Floppy disk
A floppy disk or floppy diskette is a type of disk storage composed of a thin and flexible disk of a magnetic storage medium in a square or nearly square plastic enclosure lined with a fabric that removes dust particles from the spinning disk.
Format
All hard disks and floppy disks have to be electronically prepared for use by a process called formatting. Hard disks are pre-formatted by the computer manufacturer. If you buy a floppy disk that is not pre-formatted, you format it yourself, using a program that comes with your PC.
Graphics card
(also called a video card, display card, graphics adapter, VGA card/VGA, video adapter, display adapter, or colloquially GPU) is a computer expansion card that generates a feed of graphics output to a display device such as a monitor.
Hard drive
A computer hard drive (or a hard disk or HDD) is one kind of technology that stores the operating system, applications, and data files such a documents, pictures and music that your computer uses. The rest of the components in your computer work together to show you the applications and files stored on your hard drive.
Hardware
The physical components of a computer system, such as the central processing unit (CPU), memory, and storage devices.
HTML (Hypertext Markup Language)
is the standard markup language used to create and structure the content of web pages. It provides a set of elements or tags that define the structure, layout, and semantic meaning of the content displayed in a web browser.
HTTP (Hypertext Transfer Protocol)
is an application-layer protocol used for transmitting data over the internet. It forms the foundation of data communication on the World Wide Web and is responsible for the transfer of web pages, images, videos, and other resources between web servers and web browsers.
HTTPS
HTTPS (Hypertext Transfer Protocol Secure) is an extension of HTTP that adds a layer of encryption and security to the data transmission. It uses SSL/TLS protocols to secure communication between the client and the server, protecting sensitive information from eavesdropping and tampering.
IP Address
IP (Internet Protocol) address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It serves as an identifier for the device, allowing it to send and receive data over the network.
JavaScript
is a versatile and widely-used programming language, primarily known for its role in web development. It is a high-level, interpreted language that allows developers to create dynamic and interactive content on web pages. JavaScript is one of the core technologies used in web development, along with HTML and CSS.
Joystick
A joystick is an input device that is commonly used to control gaming applications and, sometimes, used in graphics applications. It was first invented by C. B. Mirick at the U.S. Naval Research Laboratory, and patented in 1926. Generally, the use of a joystick is to manage a machine or character in a computer program.
Keyboard
The Keyboard is the most common and very popular input device which helps in inputting data into the computer. The layout of the computer keyboard is similar to the layout of a traditional typewriter.
Laptop
A laptop is a personal computer that can be easily moved and used in a variety of locations. Most laptops are designed to have all of the functionality of a desktop computer, which means they can generally run the same software and open the same types of files.
Light pen
A light pen is a light-sensitive computer input device, basically a stylus, that is used to select text, draw pictures and interact with user interface elements on a computer screen or monitor
Log in
refers to the process where you enter certain information before you are allowed to access a website or application.
MAC Address
A MAC (Media Access Control) address, also known as a physical address or hardware address, is a unique identifier assigned to a network interface card (NIC) of a device connected to a computer network. Unlike an IP address that can change, the MAC address is hardcoded into the network interface hardware during manufacturing and remains constant throughout the device's lifetime.
Maintenance
Refers to the ongoing process of managing and updating software after it has been deployed and is in use by end-users. It involves various activities aimed at ensuring the continued functionality, security, and performance of the software over time.
Man-in-the-middle (MITM) attack
An attack in which an attacker intercepts and relays communication between two parties.
Mister
Mister is a name which can only be assigned to a typical English Budgie. Big, strong and stringent.
Monitor
a monitor is an electronic output device used to display information being entered and processed on a computer. The primary use of a monitor is to display images, text, video, and graphics information generated by the computer via a computer's video card.
Mouse
The mouse is a small hand held pointed device. This is another input device. The mouse is used to select and move items on the screen. The mouse is very important input device when using windows. In fact, application packages like desktop publishing (DTP) cannot be operated without the use of a mouse because DTP is window - based.
Network administrator
A person who is responsible for the day-to-day operation of a computer network.
Operating system (OS)
the basic software that manages a computer (for example, Windows 10, OS X, Unix, iOS).
Palmtop
A Palmtop Computer is a horizontal clamshell-shaped, battery-powered computer that is compatible with the IBM PC and is about the size of a pocket calculator. It included both a keyboard and a monitor. PDAs, hand-held computers, and pocket computers are other names for palmtops.
peripheral
any equipment that is connected externally to a computer. For example, printers, scanners and modems are peripherals.
Phishing
A type of social engineering attack that involves sending fraudulent emails that appear to be from a legitimate source in order to trick the recipient into revealing personal information.
PHP (Hypertext Preprocessor)
is a popular server-side scripting language designed primarily for web development but can also be used as a general-purpose programming language. It is widely used to create dynamic and interactive websites, web applications, and server-side scripting tasks.
Postman
is a popular and powerful API development tool used by developers to interact with APIs (Application Programming Interfaces) and test web services. It provides a user-friendly interface for creating, sending, and receiving HTTP requests to APIs, making it easier to develop, test, and troubleshoot APIs and web services.
Printer
A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.5" by 11" sheets of paper. Printers vary in size, speed, sophistication and cost.
program software
refers to operates a PC and does various things, such as writing text (word-processing program), keeping accounts (accounts program) and drawing pictures (graphics program)
QWERTY
The first 6 letters on English-language keyboards are Q-W-E-R-T-Y. The first 6 letters on French-language keyboards are A-Z-E-R-T-Y.
RAM
Random-access memory, or RAM, is one of the most important parts of your computer. It provides high-speed, short-term memory for your computer's CPU. The amount of computer memory you need depends on what you use your computer for.
Ransomware
Malware that encrypts a victim's files and demands a ransom payment in order to decrypt them.
Resolution
The number of dots or pixels per inch (sometimes per centimetre) used to create the screen image
ROM (read-only memory)
is a non-volatile memory type. This means it receives data and permanently writes it on a chip, and it lasts even after you turn off your computer. The data is coded to not be overwritten, so it's used for things like your printer software or your startup programs.
Router
A router is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions: managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
Scanner
A scanner is an input device which works more like a photocophy machine that captures images from photographic prints, posters, magazine pages and similar sources for computer editing and display. Scanners work by converting the image on the document into digital information that can be stored on a computer through optical character recognition (OCR).
Serial port
Serial ports are used to physically connect asynchronous devices to a computer. They are located on the back of the system unit, either integrated or using a multiport adapter, such as the 2-port, 8-port, 16-port, and 128-port asynchronous adapters.
Shell
Refers to the command-line interface that allows users to interact with an operating system by entering commands.
Smartphone
A smartphone is a cellular telephone with an integrated computer and other features not originally associated with telephones, such as an operating system (OS), web browsing and the ability to run software applications. Smartphones are used by consumers and as part of a person's business or work.
Social engineering
The use of psychological manipulation to trick people into revealing personal information or taking actions that are not in their best interests.
SQL injection
A type of attack that exploits vulnerabilities in SQL databases to gain unauthorized access to a computer system.
Storage
The physical devices that are used to store data, such as hard drives, flash drives, and optical discs.
Syntax
refers to the rules and structure that define the correct combinations of symbols, keywords, and statements used to create valid and well-formed code in a specific programming language. It dictates how programs should be written to be understood and executed by the computer or programming environment.
Troubleshooting
is the process of identifying and resolving issues or problems in a system or process. It is a crucial skill used in various fields, including technology, electronics, software, and more.
Upgrade
refers to bring your computer (or other device) up to date with the latest hardware or software.
UPS
Universal Serial Bus (USB) is a common interface that enables communication between devices and a host controller such as a personal computer (PC) or smartphone. It connects peripheral devices such as digital cameras, mice, keyboards, printers, scanners, media devices, external hard drives and flash drives.
URI (Uniform Resource Identifier)
It is a string of characters used to uniquely identify and locate a resource, such as a web page, image, file, or any other resource, on the internet or within a specific system.
URL (Uniform Resource Locator)
It is a web address used to specify the location of a resource (such as a web page, image, video, file, etc.) on the internet. URLs are essential for users to access websites and resources using web browsers and other internet-enabled applications.
White hat hacking
also known as ethical hacking, is a legal and legitimate practice of testing and assessing computer systems, networks, applications, and devices for security vulnerabilities. White hat hackers, often referred to as ethical hackers, use their skills and knowledge to find weaknesses in a system with the permission of the system's owner or authorized party. Their primary goal is to identify and fix potential security issues before malicious hackers can exploit them.
Word
A computer word, like a byte, is a group of fixed number of bits processed as a unit which varies from computer to computer but is fixed for each computer. The length of a computer word is called word-size or word length and it may be as small as 8 bits or may be as long as 96 bits. A computer stores the information in the form of computer words.
WWW
The World Wide Web usually called the web is global collection of multimedia document and files, which are stored on computers connected to the internet. The World Wide Web is a package designed to present detailed information about an organization, products, services etc. It`s an avenue on the internet whereby an individual or organization presents its products and services to the world. In the world of education, the website of an institution includes all necessary information about the institution such as the history, the brochure, the admission requirements, etc. This is made available on the internet as a website for assesment by interested students. Typical examples of websites are http://www.atafom.university. The first http://www is referred to as protocol (http - hyper text transfer protocol) while the domain name is atafom, and university is the domain type.