Glossary of technical terms in Information Technology

This glossary compiles a list of technical computer terms , acronyms, and other terms that frequently appear on the internet. Primarily aimed at laypeople , the entries are highly succinct and simplified, aiming only to provide a basic understanding of each technical term's meaning.

Algorithm

A set of well-defined instructions or rules for solving problems or performing specific tasks.

API

It stands for Application Programming Interface , which allows communication between different software.

Cloud Storage

Service that allows users to store and access data over the Internet , rather than just locally.

ARP

It is the Address Resolution Protocol , used to associate an IP address with a physical (MAC) address.

Backdoor

It is a hidden access port into a system, often used for malicious purposes .

Backup

It is a backup of important data , to avoid loss in case of failure or damage.

Database

A structured collection of data that can be accessed, managed, and updated electronically.

Bash

It is a shell (command interpreter) used in Unix and Linux systems.

Big Data

Very large and complex data sets used in analysis and pattern discovery.

Blockchain

A decentralized digital ledger that records transactions across multiple computers in a secure, transparent, and tamper-resistant manner.

Blog

Website or platform where people share life experiences, recipes, opinions with other users, etc.

Bridge

It is a network device that connects two local area network (LAN) segments to enable communication between them.

Broadcast

It is the transmission of a message to all devices on a network.

Buffer

It is a temporary data storage area

Cache

Temporary storage area used by browsers and applications to speed up web page loading and improve performance.

Carder

is a term widely used by people who act in groups or alone on the internet with the aim of obtaining credit card data for online fraud.

Encryption key

A secret code used to encrypt and decrypt data.

Clickbait

It is a term that refers to internet content that is intended to generate revenue from online advertising.

Client

It is a device or software that connects to a server to access services or resources.

Cloud computing

The delivery of computing services over the Internet , including storage, servers, databases, software, and more.

Serverless computing

Cloud computing execution model in which the cloud provider dynamically manages the allocation of machine resources.

Version control

Managing changes to documents, computer programs, and other collections of information.

Cryptocurrency

A cryptocurrency, also known as cybercurrency, is a generally decentralized payment system that uses blockchain technology and cryptography to ensure the authenticity of transactions and the issuance of new monetary units.

Cookies

Small text files that websites store in your browser. They contain information about your online activity, such as preferences and browsing history. Cookies are used to improve user experience, deliver targeted advertising, and allow websites to remember you on future visits.

Cracker

Or cyber pirate, is the term used to designate an individual who breaks into a security system illegally or unethically.

Cryptography

The process of transforming plain text into code , making it unreadable to anyone without the key to decrypt it. Typically used to store sensitive data and passwords.

CrowdFunding

Obtaining capital for initiatives of collective interest through the aggregation of multiple sources of financing, generally individuals interested in the initiative.

DDoS

It is a distributed denial of service attack , in which multiple devices are used to overload a server or network.

Responsive design

The practice of creating web pages that adjust their layout and content to adapt to different screen sizes and devices.

DevOps

Integrating development (Dev) and operations (Ops) to improve collaboration, automation, and continuous software delivery.

DMZ

A demilitarized zone (DMZ) is a perimeter network that protects an organization's internal local area network (LAN) from untrusted traffic.

DNS ( Domain Name System )

It's a system used to translate human-readable domain names into numeric Internet Protocol (IP) addresses. It's essential for internet communication, as computers and devices use IP addresses to connect to each other, while humans prefer to use more memorable domain names, such as "www.example.com."

Domain

A domain is a unique name assigned to a website, service, or online resource. It's used to identify and locate these entities on the web. In other words, a domain is a website's digital address on the internet.

Of the

It is the denial of service attack , in which a device or network is overloaded to make it inaccessible.

Download

A download is the process of transferring data or files from a remote server to a local device, such as a computer, smartphone, or tablet. During a download, data is copied from the source (server) to the destination (user's device).

E - commerce

Refers to the buying and selling of products and services over the Internet . It is a business model in which commercial transactions are conducted online.

E-mail

Way of sending and receiving messages online.

Edge Computing

Computing close to the data source to reduce latency and dependence on centralized data centers.

Media Access Control ) Address

It is a unique identifier associated with a network device , used to identify devices on a local network. It consists of six pairs of hexadecimal characters and is assigned by the device manufacturer. It is used in conjunction with the ARP protocol to associate an IP address with a physical address.

Social Engineering

It's a technique used by online scammers to manipulate and deceive people, exploiting their trust and lack of knowledge. This can occur through fake emails, fraudulent phone calls, or misleading messages on social media.

Ethernet

It is a wired network technology with high transfer rate.

Extranet

It is a private network that allows access by external users , such as customers or suppliers.

FAQ

It is a list of frequently asked questions and their answers.

firewall

Internet traffic security and monitoring system

FTP

It is the File Transfer Protocol , used for transferring files between computers.

Gateway

It is a device that connects different networks , allowing data traffic between them.

HTML

Hypertext Markup Language is the standard language used to create and design websites and web pages. It forms the backbone of most web content and is an essential skill for anyone interested in web development or design. HTML is not a programming language, but rather a markup language that structures web content.

HTTP

It is the Hypertext Transfer Protocol , used for communication between servers and clients on the web.

Hub

It works like a switch, but it doesn't intelligently distribute data. It sends the same data to all connected devices , which reduces efficiency and bandwidth sharing.

AI (Artificial Intelligence)

Branch of computer science that deals with the development of intelligent machines that can perform tasks that normally require human intervention.

Internet

The Internet is a global network of connected computers that allows information sharing, instant communication, and access to online services and resources, such as accessing your bank account.

Intranet

A private network used by a company or organization to share information and resources internally.

IoT (Internet of Things)

A network of physical devices, vehicles, appliances, and other items that are embedded with electronics, software, sensors, and network connectivity, which allows them to collect and share data.

IP ( Internet Protocol )

It is a sequence of numbers assigned to each device connected to the internet, it works as an identifier to allow communication between devices.

ISDN ( Integrated Services Digital Network)

It is a digital data communication network technology

ISP ( Internet Server Provider )

Internet Server Provider , this is your internet provider, the company you hired to have internet access.

Keylogger

It is a malicious system that records everything typed on the keyboard and forwards it to criminals.

Lammer

It is a term used for people who have no or little knowledge about hacking and use tools developed by others to carry out their attacks.

LAN

It is a local area network , which connects devices within a limited geographic area.

Bandwidth

It is the measure of the amount of data that can be transmitted over a network connection.

LGPD ( General Data Protection Law )

Its main objective is to protect the fundamental rights of freedom and privacy and the free development of the natural person's personality.

It is a clickable element that redirects the user to another website, to a part of the same page or resource.

Machine Learning

A subfield of AI that allows systems to automatically learn from data, without explicit programming.

Malware

A term referring to malicious software designed to damage, infect, or gain unauthorized access to a computer system. This includes viruses, worms, Trojan horses, ransomware, and spyware.

Man-in-the-middle

It is a scam strategy used on the internet where the malicious individual infiltrates between your router and the internet , analyzing all your data traffic and being able to access important information, such as personal data or even bank accounts.

Microservices

Architecture that divides applications into small, independent services that can be developed and scaled separately.

Modem

Device that converts analog signals into digital and vice versa, thus allowing internet connection via optical fiber, for example.

Multicast

It is the transmission of a message to a selected group of devices on a network.

NAT

Network Address Translation , used to map public IP addresses to private IP addresses.

Software used to browse the internet , Google, Firefox, Microsoft Edge…

Package

It is a unit of data transmitted over a network.

Web page

It is a document that can be accessed through the browser and displayed on the device.

Phishing

It's a fairly common online data theft strategy, typically carried out through replica websites of trusted institutions.
| Read more at: What is Phishing?

Phygital

Combining the physical and digital worlds to create integrated and immersive experiences.

Phreacker

Mobile and landline phone hackers. Phreakers use techniques to bypass telephone company security systems, typically to make free calls or obtain credit.

Access Point

It is a device that provides access to a wireless network, usually via Wi-Fi.

Door

It is a communication interface on a network device, which allows connection with other devices.

Ransomware

It is a type of data-kidnapping malware, carried out through encryption, which uses the victim's personal files as hostages and demands a ransom to restore access to these files.

| Learn more about Ransomware .

P2P network ( torrent )

It is a technique for downloading very large files, this technique consists of dividing this large file into smaller ones and making several downloads at the same time.

Computer networks

A computer network is when two or more devices are connected to each other within the same network.

Social media

Online platforms that allow people to connect and share content. Ex: Instagram, Twitter, Facebook…

Repeater

It is a device that amplifies and retransmits a signal over a network.

Router

It's a network device that directs data traffic between different networks. It acts as a connection point between devices on a local area network (LAN) and the internet.

SEO ( Search Engine Optimization )

It is the process of optimizing a website or online content to improve its visibility and ranking in search engine results, such as Google.

Server

It is a device or software that provides services or resources to other devices on a network.

SaaS ( System as a Service )

This is a software distribution model in which the service is delivered over the Internet. The software vendor hosts and maintains the servers, databases, and code that make up the application. This frees companies to focus solely on using the software, without having to worry about maintenance and infrastructure.

Operating System (OS)

A software program that manages the hardware and software resources of a computer and provides common services for computer programs.

Sniffer

It is a protocol analyzer , that is, a system for monitoring the traffic of a local network.

Spam

A large number of unwanted messages , usually of a commercial nature, occur via email or other electronic means of communication.

SSL ( Secure Sockets Layer ) / TLS ( Transport Layer Security )

These are security protocols that encrypt communication between a client (e.g., a web browser) and a server. They ensure the integrity, authenticity, and confidentiality of data transmitted over the Internet.

Streaming

It is the reproduction of audio or video over the internet , without having to download the file.

Spyware

It is malicious software that collects information from a device without the user's knowledge.

Switch

It is a central device that allows devices to connect and communicate with each other efficiently and directly, ensuring that data is sent only to the correct recipients.

TCP (Transmission Control Protocol)

Used for reliable data transfer between devices on a network.

Telnet

It is a network protocol for connecting to a remote device.

Tokenization

Process of replacing confidential data with unique identifiers (tokens) to protect sensitive information.

Trojan

Or Trojan horse is any malware that deceives users about its true intention.

UDP

It is the User Datagram Protocol , used for real-time data transmission over a network.

Upload

Process of transferring files from a local device to the internet.

URL ( Uniform Resource Locator )

Uniform Resource Locator, means web address , whatever you type in the search bar will be found from it.

Virus

Malicious program , infects a computer with the intention of damaging devices and stealing data

Vishing

It uses voice resources , such as calls from supposed internet telephony services (VoIP) to deceive victims and extract personal and confidential information, such as bank passwords, credit cards and CPF numbers.

VoIP

Or voice over internet protocol, is a technology that allows voice transmission over IP (Internet Protocols).

VPN ( Virtual Private Network )

It is a technology that creates a secure, encrypted connection between a device and the Internet, allowing you to browse anonymously and access geographically restricted content.

VPS ( Virtual Private Server )

A web hosting service that allows users to access a virtual dedicated server. This gives users greater control over the server environment, allowing them to install and configure the software of their choice.

WAN

It is a wide area network , which connects devices in different geographic locations.

Website

They are a set of related web pages that you access through an internet address.

Worm

A type of malware that spreads automatically across a network, without user interaction.

WWW ( World Wide Web )

It is a part of the internet made up of a set of interconnected documents and resources , accessible through web browsers.

Zero Trust

Security model that requires rigorous verification of users and devices to access network resources.

3G, 4G and 5G

These are generations of mobile network technology. The acronym “G” stands for “GSM” or Global System for Mobile Communications, in Portuguese, and refers to a type of mobile network , which allows for making phone calls and accessing the Internet.

Lumiun DNS Free Trial
Related Posts