This glossary compiles a list of technical computer terms , acronyms, and other terms that frequently appear on the internet. Primarily aimed at laypeople , the entries are highly succinct and simplified, aiming only to provide a basic understanding of each technical term's meaning.
Algorithm
A set of well-defined instructions or rules for solving problems or performing specific tasks.
API
It stands for Application Programming Interface , which allows communication between different software.
Cloud Storage
Service that allows users to store and access data over the Internet , rather than just locally.
ARP
It is the Address Resolution Protocol , used to associate an IP address with a physical (MAC) address.
Backdoor
It is a hidden access port into a system, often used for malicious purposes .
Backup
It is a backup of important data , to avoid loss in case of failure or damage.
Database
A structured collection of data that can be accessed, managed, and updated electronically.
Bash
It is a shell (command interpreter) used in Unix and Linux systems.
Big Data
Very large and complex data sets used in analysis and pattern discovery.
Blockchain
A decentralized digital ledger that records transactions across multiple computers in a secure, transparent, and tamper-resistant manner.
Blog
Website or platform where people share life experiences, recipes, opinions with other users, etc.
Bridge
It is a network device that connects two local area network (LAN) segments to enable communication between them.
Broadcast
It is the transmission of a message to all devices on a network.
Buffer
It is a temporary data storage area
Cache
Temporary storage area used by browsers and applications to speed up web page loading and improve performance.
Carder
is a term widely used by people who act in groups or alone on the internet with the aim of obtaining credit card data for online fraud.
Encryption key
A secret code used to encrypt and decrypt data.
Clickbait
It is a term that refers to internet content that is intended to generate revenue from online advertising.
Client
It is a device or software that connects to a server to access services or resources.
Cloud computing
The delivery of computing services over the Internet , including storage, servers, databases, software, and more.
Serverless computing
Cloud computing execution model in which the cloud provider dynamically manages the allocation of machine resources.
Version control
Managing changes to documents, computer programs, and other collections of information.
Cryptocurrency
A cryptocurrency, also known as cybercurrency, is a generally decentralized payment system that uses blockchain technology and cryptography to ensure the authenticity of transactions and the issuance of new monetary units.
Cookies
Small text files that websites store in your browser. They contain information about your online activity, such as preferences and browsing history. Cookies are used to improve user experience, deliver targeted advertising, and allow websites to remember you on future visits.
Cracker
Or cyber pirate, is the term used to designate an individual who breaks into a security system illegally or unethically.
Cryptography
The process of transforming plain text into code , making it unreadable to anyone without the key to decrypt it. Typically used to store sensitive data and passwords.
CrowdFunding
Obtaining capital for initiatives of collective interest through the aggregation of multiple sources of financing, generally individuals interested in the initiative.
DDoS
It is a distributed denial of service attack , in which multiple devices are used to overload a server or network.
Responsive design
The practice of creating web pages that adjust their layout and content to adapt to different screen sizes and devices.
DevOps
Integrating development (Dev) and operations (Ops) to improve collaboration, automation, and continuous software delivery.
DMZ
A demilitarized zone (DMZ) is a perimeter network that protects an organization's internal local area network (LAN) from untrusted traffic.
DNS ( Domain Name System )
It's a system used to translate human-readable domain names into numeric Internet Protocol (IP) addresses. It's essential for internet communication, as computers and devices use IP addresses to connect to each other, while humans prefer to use more memorable domain names, such as "www.example.com."
Domain
A domain is a unique name assigned to a website, service, or online resource. It's used to identify and locate these entities on the web. In other words, a domain is a website's digital address on the internet.
Of the
It is the denial of service attack , in which a device or network is overloaded to make it inaccessible.
Download
A download is the process of transferring data or files from a remote server to a local device, such as a computer, smartphone, or tablet. During a download, data is copied from the source (server) to the destination (user's device).
E - commerce
Refers to the buying and selling of products and services over the Internet . It is a business model in which commercial transactions are conducted online.
Way of sending and receiving messages online.
Edge Computing
Computing close to the data source to reduce latency and dependence on centralized data centers.
Media Access Control ) Address
It is a unique identifier associated with a network device , used to identify devices on a local network. It consists of six pairs of hexadecimal characters and is assigned by the device manufacturer. It is used in conjunction with the ARP protocol to associate an IP address with a physical address.
Social Engineering
It's a technique used by online scammers to manipulate and deceive people, exploiting their trust and lack of knowledge. This can occur through fake emails, fraudulent phone calls, or misleading messages on social media.
Ethernet
It is a wired network technology with high transfer rate.
Extranet
It is a private network that allows access by external users , such as customers or suppliers.
FAQ
It is a list of frequently asked questions and their answers.
firewall
Internet traffic security and monitoring system
FTP
It is the File Transfer Protocol , used for transferring files between computers.
Gateway
It is a device that connects different networks , allowing data traffic between them.
HTML
Hypertext Markup Language is the standard language used to create and design websites and web pages. It forms the backbone of most web content and is an essential skill for anyone interested in web development or design. HTML is not a programming language, but rather a markup language that structures web content.
HTTP
It is the Hypertext Transfer Protocol , used for communication between servers and clients on the web.
Hub
It works like a switch, but it doesn't intelligently distribute data. It sends the same data to all connected devices , which reduces efficiency and bandwidth sharing.
AI (Artificial Intelligence)
Branch of computer science that deals with the development of intelligent machines that can perform tasks that normally require human intervention.
Internet
The Internet is a global network of connected computers that allows information sharing, instant communication, and access to online services and resources, such as accessing your bank account.
Intranet
A private network used by a company or organization to share information and resources internally.
IoT (Internet of Things)
A network of physical devices, vehicles, appliances, and other items that are embedded with electronics, software, sensors, and network connectivity, which allows them to collect and share data.
IP ( Internet Protocol )
It is a sequence of numbers assigned to each device connected to the internet, it works as an identifier to allow communication between devices.
ISDN ( Integrated Services Digital Network)
It is a digital data communication network technology
ISP ( Internet Server Provider )
Internet Server Provider , this is your internet provider, the company you hired to have internet access.
Keylogger
It is a malicious system that records everything typed on the keyboard and forwards it to criminals.
Lammer
It is a term used for people who have no or little knowledge about hacking and use tools developed by others to carry out their attacks.
LAN
It is a local area network , which connects devices within a limited geographic area.
Bandwidth
It is the measure of the amount of data that can be transmitted over a network connection.
LGPD ( General Data Protection Law )
Its main objective is to protect the fundamental rights of freedom and privacy and the free development of the natural person's personality.
Link
It is a clickable element that redirects the user to another website, to a part of the same page or resource.
Machine Learning
A subfield of AI that allows systems to automatically learn from data, without explicit programming.
Malware
A term referring to malicious software designed to damage, infect, or gain unauthorized access to a computer system. This includes viruses, worms, Trojan horses, ransomware, and spyware.
Man-in-the-middle
It is a scam strategy used on the internet where the malicious individual infiltrates between your router and the internet , analyzing all your data traffic and being able to access important information, such as personal data or even bank accounts.
Microservices
Architecture that divides applications into small, independent services that can be developed and scaled separately.
Modem
Device that converts analog signals into digital and vice versa, thus allowing internet connection via optical fiber, for example.
Multicast
It is the transmission of a message to a selected group of devices on a network.
NAT
Network Address Translation , used to map public IP addresses to private IP addresses.
Browser
Software used to browse the internet , Google, Firefox, Microsoft Edge…
Package
It is a unit of data transmitted over a network.
Web page
It is a document that can be accessed through the browser and displayed on the device.
Phishing
It's a fairly common online data theft strategy, typically carried out through replica websites of trusted institutions.
| Read more at: What is Phishing?
Phygital
Combining the physical and digital worlds to create integrated and immersive experiences.
Phreacker
Mobile and landline phone hackers. Phreakers use techniques to bypass telephone company security systems, typically to make free calls or obtain credit.
Access Point
It is a device that provides access to a wireless network, usually via Wi-Fi.
Door
It is a communication interface on a network device, which allows connection with other devices.
Ransomware
It is a type of data-kidnapping malware, carried out through encryption, which uses the victim's personal files as hostages and demands a ransom to restore access to these files.
| Learn more about Ransomware .
P2P network ( torrent )
It is a technique for downloading very large files, this technique consists of dividing this large file into smaller ones and making several downloads at the same time.
Computer networks
A computer network is when two or more devices are connected to each other within the same network.
Social media
Online platforms that allow people to connect and share content. Ex: Instagram, Twitter, Facebook…
Repeater
It is a device that amplifies and retransmits a signal over a network.
Router
It's a network device that directs data traffic between different networks. It acts as a connection point between devices on a local area network (LAN) and the internet.
SEO ( Search Engine Optimization )
It is the process of optimizing a website or online content to improve its visibility and ranking in search engine results, such as Google.
Server
It is a device or software that provides services or resources to other devices on a network.
SaaS ( System as a Service )
This is a software distribution model in which the service is delivered over the Internet. The software vendor hosts and maintains the servers, databases, and code that make up the application. This frees companies to focus solely on using the software, without having to worry about maintenance and infrastructure.
Operating System (OS)
A software program that manages the hardware and software resources of a computer and provides common services for computer programs.
Sniffer
It is a protocol analyzer , that is, a system for monitoring the traffic of a local network.
Spam
A large number of unwanted messages , usually of a commercial nature, occur via email or other electronic means of communication.
SSL ( Secure Sockets Layer ) / TLS ( Transport Layer Security )
These are security protocols that encrypt communication between a client (e.g., a web browser) and a server. They ensure the integrity, authenticity, and confidentiality of data transmitted over the Internet.
Streaming
It is the reproduction of audio or video over the internet , without having to download the file.
Spyware
It is malicious software that collects information from a device without the user's knowledge.
Switch
It is a central device that allows devices to connect and communicate with each other efficiently and directly, ensuring that data is sent only to the correct recipients.
TCP (Transmission Control Protocol)
Used for reliable data transfer between devices on a network.
Telnet
It is a network protocol for connecting to a remote device.
Tokenization
Process of replacing confidential data with unique identifiers (tokens) to protect sensitive information.
Trojan
Or Trojan horse is any malware that deceives users about its true intention.
UDP
It is the User Datagram Protocol , used for real-time data transmission over a network.
Upload
Process of transferring files from a local device to the internet.
URL ( Uniform Resource Locator )
Uniform Resource Locator, means web address , whatever you type in the search bar will be found from it.
Virus
Malicious program , infects a computer with the intention of damaging devices and stealing data
Vishing
It uses voice resources , such as calls from supposed internet telephony services (VoIP) to deceive victims and extract personal and confidential information, such as bank passwords, credit cards and CPF numbers.
VoIP
Or voice over internet protocol, is a technology that allows voice transmission over IP (Internet Protocols).
VPN ( Virtual Private Network )
It is a technology that creates a secure, encrypted connection between a device and the Internet, allowing you to browse anonymously and access geographically restricted content.
VPS ( Virtual Private Server )
A web hosting service that allows users to access a virtual dedicated server. This gives users greater control over the server environment, allowing them to install and configure the software of their choice.
WAN
It is a wide area network , which connects devices in different geographic locations.
Website
They are a set of related web pages that you access through an internet address.
Worm
A type of malware that spreads automatically across a network, without user interaction.
WWW ( World Wide Web )
It is a part of the internet made up of a set of interconnected documents and resources , accessible through web browsers.
Zero Trust
Security model that requires rigorous verification of users and devices to access network resources.
3G, 4G and 5G
These are generations of mobile network technology. The acronym “G” stands for “GSM” or Global System for Mobile Communications, in Portuguese, and refers to a type of mobile network , which allows for making phone calls and accessing the Internet.








