A
Algorithm:A set of rules or steps used to solve a problem.
Artificial Intelligence:Machines that can mimic human intelligence.
API (Application Programming Interface): A set of rules that allows different software applications to communicate with each other.
Augmented Reality (AR): Technology that overlays digital elements onto the real world through a device’s camera or glasses.
Anti-virus: Software that detects, blocks, and removes malicious programs from a computer or device.
Automation: The use of technology to perform tasks automatically without human intervention.
Analog Signal: A continuous signal that represents data using varying waves or electrical frequencies.
Access Point: A device that extends a Wi-Fi network and allows wireless devices to connect.
Authentication: The process of verifying a user’s identity before granting access to a system.
ASCII: A character encoding standard used to represent text in computers and devices.
Analytics: The process of examining data to discover patterns, insights, and trends.
Asynchronous Communication: Communication where data is sent and received at different times without requiring instant response.
B
Big Data:Extremely large sets of data analyzed for insights.
Blockchain:A secure digital ledger technology.
Bot: A software application that performs automated tasks on the internet.
BIOS (Basic Input/Output System): Software that starts and manages hardware when a computer is turned on.
Backend: The server side part of an application that processes data and logic.
Bandwidth: The maximum amount of data a network can transfer per second.
Bug: An error or flaw in software that causes incorrect behavior.
Bluetooth: Short-range wireless technology used to connect devices.
Biometrics: Technology that verifies identity using physical or behavioral traits.
Byte: A basic unit of digital information equal to eight bits.
Botnet: A network of infected computers controlled remotely by a malicious actor.
C
Cloud Computing:A system to store and access data online.
Cybersecurity:Protecting systems from digital attacks.
Cache: A temporary storage area that speeds up data access.
Captcha: A security test used to verify that a user is human.
Compiler: A program that converts source code into executable machine code.
Cryptocurrency: Digital currency secured by cryptography and often managed on decentralized networks.
CPU: The main processor that executes instructions and manages system operations.
Cyberattack: A malicious attempt to damage or gain unauthorized access to digital systems.
Cloud Storage: Online space used to save files and access them from any device.
CLI: A text based interface used to control a computer by typing commands.
Connectivity: The ability of devices or systems to communicate and share information.
CMOS: A low power technology used to build integrated circuits and computer chips.
D
Data Science:Extracting knowledge from large amounts of data.
Deep Learning:Teaching machines to think like humans.
Drone: An unmanned aerial vehicle controlled remotely or autonomously.
Database: An organized collection of data stored and accessed electronically.
Debugging: The process of identifying and fixing errors in software.
DNS: A system that converts domain names into IP addresses.
Docker: A platform that packages software into containers for easy deployment.
Digital Signature: A cryptographic method that verifies the authenticity of digital documents.
Display Resolution: The number of pixels a screen can show, affecting image clarity.
Distributed System: A network of computers working together as a unified system.
Data Mining: The process of discovering patterns and insights from large datasets.
E
Encryption: Protecting data through secret codes.
Edge Computing: Processing data closer to where it’s created.
E-commerce: The buying and selling of goods and services online.
Email (Electronic Mail): A system for sending digital messages between users over the internet.
Emulator: Software that imitates another device or system to run its programs.
Ethernet: A wired networking technology used for fast and stable data communication.
Enterprise Software: Large scale software designed to support business operations and workflows.
Encryption Key: A string of characters used to lock or unlock encrypted data.
Endpoint: Any device connected to a network, such as phones, laptops, or servers.
Embedded System: A specialized computer built into a device to perform dedicated functions.
Exporting: The process of saving or transferring data into another format or system.
Ethernet Switch: A device that connects multiple network devices and manages data traffic.
Event Log: A record of system activities used for monitoring and troubleshooting.
F
Firewall: A digital barrier against cyber threats.
Firmware: The hidden software that powers devices.
Facial Recognition: Technology that identifies or verifies a person using facial features.
Frequency: The number of times a signal or wave repeats in one second, measured in hertz (Hz).
File System: A method an operating system uses to organize and store files.
Frontend: The visible part of a website or app that users interact with.
Framework: A structured platform that helps developers build software more efficiently.
Fault Tolerance: A system’s ability to continue working even when parts fail.
File Compression: Reducing file size to save space or speed up transfers.
Federated Learning: A machine learning method that trains models across multiple devices without sharing data.
G
GPU (Graphics Processing Unit): The engine behind visual computing.
Gigabyte: A unit for measuring digital storage.
Gigahertz (GHz): A unit that measures the speed of a processor or signal frequency.
H
Hardware: The physical components of a electronic device.
Hologram: 3D images projected with light.
HTML (HyperText Markup Language): The standard language for creating web pages.
Hybrid Cloud: A computing model that combines private and public cloud environments.
I
Internet of Things (IoT): Connects all devices to the web.
Interface: The point of interaction between a user and a system
IP Address (Internet Protocol Address): A unique identifier for devices on a network.
Inkjet Printer: A printer that sprays tiny droplets of ink to create images or text.
J
JavaScript: Programming language for websites
JPEG: A popular format for digital images.
Joystick: A control device used for gaming and simulations.
K
Keyboard: A device for computers that allows users to type text.
Kernel: The core that manages the software and hardware of an electronic device.
Kilobyte (KB): A unit of digital information equal to 1,024 bytes.
Keystroke: The act of pressing a key on a keyboard.
L
Latency: The delay between action and response.
Linux: An open-source operating system.
Laser: A device that emits a focused beam of light through optical amplification.
Local Area Network (LAN): A network that connects devices within a limited area.
M
Machine Learning: Teaching computers to learn from data.
Motherboard: The main circuit board of a computer.
Modem: A device that connects a computer or network to the internet.
Metadata: Data that provides information about other data.
N
Nanotechnology: Manipulation of matter at the atomic scale.
Network: A system of connected computers.
Node: A connection point within a computer network.
Neural Network: A system of algorithms modeled after the human brain.
O
Operating System (OS): The software that runs an electronic device.
Optical Fiber: A thin sthrand of plastic that transmites data as light pulses
Overclocking: Increasing a computer’s processor speed beyond factory limits for better performance.
OLED (Organic Light Emitting Diode): A display technology that produces light through organic compounds.
P
Processor: A proccesor that executes instructions and performs calculations from software
Phishing: A cyber trick through emails or messages to steal information.
Pixel: The smallest unit of a digital image or display.
Proxy Server: A system that acts as an intermediary between a user and the internet.
Q
Quantum Computing: Using the principles of quantum mechanic to process information.
QR Code: A barcode that can store information to scan from a device
Quantum Encryption: A secure communication method using quantum mechanics principles.
Quad-Core Processor: A CPU with four independent cores that handle tasks simultaneously.
R
Router: The device that connects other electronic devices to the internet.
Robotics: The science of intelligent machines.
RAM (Random Access Memory): Temporary storage for data currently in use.
RAID (Redundant Array of Independent Disks): A data storage method that improves speed or reliability.
S
Software: The digital instructions that make hardware work.
Server: A computer or system that provides data to others.
Smartwatch: A wearable device that offers features beyond timekeeping.
SSD (Solid-State Drive): A data storage device that uses flash memory instead of moving parts.
T
Transistor: A semiconductor device used to amplify or switch electronic signals and power
Touchscreen: Technology that allows the interactions with a device trough touch.
Tokenization: A data security process that replaces sensitive information with unique identifiers.
Terabyte (TB): A unit of digital information equal to 1,024 gigabytes.
U
URL (Uniform Resource Locator): The web address of online content.
USB (Universal Serial Bus): The universal connector for devices.
User Interface (UI): The visual layout through which users interact with a system.
Uptime: The amount of time a system or server remains operational without interruption.
V
Virtual Reality (VR): A technology that creates a computer generated enviroment trought headsets.
Virus: A malicious program that harms computers.
VPN (Virtual Private Network): A secure connection that protects online privacy.
Voice Assistant: An AI-based tool that responds to voice commands.
W
Wi-Fi: Wireless internet connectivity.
Wearable Technology: Smart devices you can wear.
Webhook: A method that automatically sends data between web applications in real time.
Web Browser: A program used to access and navigate the internet.
X
XML (eXtensible Markup Language): A flexible format for data exchange.
XR (Extended Reality): Merging real and virtual worlds.
X-Ray Imaging: A technology that uses radiation to visualize internal structures.
Xbox: A gaming console developed by Microsoft.
Y
YouTube: The world’s largest video-sharing platform.
Yottabyte: A massive unit of digital data.
Yield Rate: The percentage of successful products made during manufacturing.
YAML (YAML Ain’t Markup Language): A human-readable data format for configuration files.
Z
Zero-Day: A hidden software vulnerability.
Zettabyte: A measurement of global data.
Zoom: A video conferencing platform for communication and collaboration.
Zip File: A compressed file format that reduces storage size.