Glossary of technical IT terms

This glossary compiles a relationship of technical terms of computer science , acronyms, etc. that often appear in the internet world. Being primarily directed to the lay public , entries are highly succinct and simplified, not aiming more than giving a first notion about the meaning of each technical term.

Algorithm

Set of well -defined instruction or rules to solve problems or perform specific tasks.

API

It means application programming interface , which allows communication between different software.

Cloud storage

Service that allows users to store and access data over the internet instead of just location.

ARP

It is the address resolution protocol , used to associate an IP address with a physical address (MAC).

Backdoor

It is a hidden access door in a system, often used for malicious purposes .

Backup

It is a copy of important data security to avoid loss in case of failures or damage.

Database

A structured data collection that can be accessed, managed and electronically updated.

Bash

It is a shell (command interpreter) used in Unix and Linux systems.

Big Data

Very large and complex data set used in pattern analysis and discoveries.

Blockchain

A decentralized digital book that records transactions on various computers safely, transparently and resistantly.

Blog

Site or platform where people share life experiences, recipes, share opinions with other users and so on.

Bridge

It is a network device that connects two local network segments (LANs) to allow communication between them.

Broadcast

It is the transmission of a message to all devices in a network.

Buffer

It is a temporary data storage area

Cache

Temporary storage area used by browsers and applications to speed up web pages loading and improve performance.

Card

It is a term widely used by people who work in groups or alone on the internet to get credit card data for online fraud.

Encryption key

A secret code used to encrypt and decrypt data.

Clickbait

It is a term that refers to internet content that is intended to generate online advertising revenue

Client

It is a device or software that connects to a server to access services or features.

Cloud computing

The delivery of computer services over the internet , including storage, servers, databases, software and more.

Server computing

Cloud computing execution model where the cloud provider dynamically manages the allocation of machine resources.

Version Control

Management of changes in documents, computer programs and other information collections.

Cryptocurrency ( cryptocurrency )

A cryptocurrency, also known as cybermoeda, is a generally decentralized payment system that employs blockchain technology and encryption to ensure the authenticity of transactions and the issuance of new monetary units.

Cookies

Small text files that websites store in your browser. They contain information about your online activity, such as preferences and navigation history. Cookies are used to improve the user experience, provide targeted ads, and allow sites to remember you on future visits .

Cracker

Or cyberpirata, it is the term used to designate the individual who practices a security system illegally or without ethics.

Encryption

simple code transformation process to make it unreadable to anyone who does not have the key to decoding it. Used generally for storing sensitive data and passwords.

Crowdfunding ( crowdfunding )

Obtaining capital for initiatives of collective interest through the aggregation of multiple sources of financing, generally individuals interested in the initiative.

DDOS

It is a distributed denial of service attack , where several devices are used to overload a server or network.

Responsive design

The practice of creating web pages that adjust your layout and content to adapt to different screen sizes and devices.

Devops

Development Integration (DEV) and Operations (OPS) to improve collaboration, automation and continuous software delivery.

DMZ

Demilitarized Zone (DMZ) is a perimeter network that protects the internal local network (LAN) of an unconvicable traffic organization.

DNS ( Domain Name System )

It is a system used to translate domain names by human addresses into Numerical IP (Internet Protocol) addresses. It is critical to internet communication as computers and devices use IP addresses to connect with each other, while humans prefer to use domain names easier, such as “www.exemplo.com”.

Domain

A domain is a unique and exclusive name that is assigned to a website, service, or online feature. It is used to identify and locate these entities in the network. In other words, the domain is the digital address of a website.

Of the

It is the denial of service attack , where a device or network is overloaded to make it inaccessible.

Download

A download is the data transfer process or files from a remote server to a local device, such as a computer, smartphone or tablet. During a download, the data is copied from the source (server) to the destination (user device).

E-commerce ( e-commerce )

It refers to the purchase and sale of products and services over the internet . It is a business model where business transactions are performed online.

E-mail

Shipping and receiving messages online.

Edge Computing

Computing close to the origin of data to reduce latency and dependence on centralized date centers.

MAC Address ( Media Access Control )

It is a unique identifier associated with a network device used to identify devices on a local network. It consists of six pairs of hexadecimal characters and is attributed by the device manufacturer. It is used in conjunction with the ARP protocol to associate an IP address with a physical address.

Social engineering

It is a technique used by online scammers to manipulate and deceive people, exploring their trust and lack of knowledge. This can occur through fake emails, fraudulent phone calls or misleading messages on social networks.

Ethernet

It is a wire network technology with a high transfer rate.

Extranet

It is a private network that allows access to external users , such as customers or suppliers.

FAQ

It is a list of frequently asked questions and their answers.

firewall

Internet traffic security and monitoring system

FTP

It is the file transfer protocol , used for file transfer between computers.

Gateway

It is a device that connects different networks , allowing data traffic between them.

Html

Hypertext marking language is the standard language used to create and design websites and web pages. It forms the backbone of most web content and is an essential skill for those interested in development or web design. HTML is not a programming language, but a marking language that structures content on the web.

Http

It is the hypertext transfer protocol , used for communication between servers and clients on the web.

Hub

It works just like a switch, but does not make intelligent data distribution. It sends the same data to all connected devices , this decreases bandwidth efficiency and sharing.

IA (Artificial Intelligence)

Computer science branch that deals with the development of intelligent machines that can perform tasks that normally require human intervention.

Internet

The internet is a global network of connected computers that allows information sharing, instant communication, access to online services and features, such as accessing your bank account.

Intranet

A private network used by a company or organization to share information and resources internally.

IoT (Internet of Things)

A network of physical devices, vehicles, appliances and other items that are incorporated with electronics, software, sensors and network connectivity, which allows them to collect and share data.

IP ( Internet Protocol )

It is a sequence of numbers assigned to each device connected to the internet, works as an identifier to allow communication between devices.

ISDN ( Integrated Services Digital Network)

It is a digital data communication network technology

ISP ( Internet Server Provider )

Internet server provider , this is your internet provider, the company you have hired to have internet access.

Keylogger

It is a malicious system that records everything that is typed on the keyboard and drives to criminals.

Lammer

It is a term used for people who have no or little knowledge about hack and use tools developed by others to perform their attacks.

Lan

It is a local network that connects devices in a limited geographical area.

Bandwidth width

It is the measure of the amount of data that can be transmitted in a network connection.

LGPD ( General Data Protection Law )

Its main objective is to protect the fundamental rights of freedom and privacy and the free development of the personality of the natural person.

It is a clickable element that redirects the user to another site, part of the same page or feature.

Machine Learning

AI sub -field that allows systems to automatically learn from data without explicit programming.

Malware

Term that refers to malicious software designed to damage, infect or obtain unauthorized access to a computer system. This includes viruses, worms, trojan horses, ransomware and spyware.

Man-in-the-middle

It is a scam strategy used on the Internet where the misplaced individual infiltrates between his router and the internet , analyzing all his data traffic and can access important information such as people or even bank accounts.

Microservice

Architecture that divides applications into small independent services that can be developed and scaled separately.

Modem

Device that converts analog signals into digital and vice versa, thus allows connection to the internet through an optical fiber for example.

Multicast

It is the transmission of a message to a selected group of devices on a network.

NAT

It is the translation of network addresses , used to map public IP addresses to private IP addresses.

Software used to surf the internet , Google, Firefox, Microsoft Edge…

Package

It is a data unit transmitted through a network.

Web page

It is a document that can be accessed through the browser and displayed on the device.

Phishing

It is a very common strategy on the Internet for data theft, usually occurs through replica websites of reliable institutions.
| Read more at: What is phishing?

Phygital

Combination of physical and digital worlds to create integrated and immersive experiences.

Phreacker

Mobile and fixed telephony hacker. Phreakers use techniques to circumvent the security systems of telephone companies, usually to make calls for free or get credits.

Access point

It is a device that provides access to the wireless network, usually through Wi-Fi.

Door

It is a communication interface on a network device that allows connection with other devices.

Ransomware

It is a type of data hijacking malware, made by encryption, which hostages the victim's own personal archives and snake redemption to restore access to these files.

| Learn more about ransomware .

P2P network ( torrent )

It is a technique for downloading many large files, this technique consists of dividing this large file into small and making several downloads at the same time.

Computer networks

A computer network is when two or more devices are connected to each other.

Social media

Online platforms that allow people to connect and share content. Ex: Instagram, Twitter, Facebook…

Repeater

It is a device that amplifies and relay a signal on a network.

Router

It is a network device that directs data traffic between different networks. It acts as a connection point between devices of a local network (LAN) and the internet.

SEO ( Search Engine Optimization )

It's the process of optimizing an online site or content to improve your visibility and classification in search engines, such as Google.

Server

It is a device or software that provides services or resources to other devices on a network.

SaaS ( System as Service (from English, System as a Service)) )

This is a software distribution model in which the service is provided over the internet. The software supplier hosts and maintains the servers, databases and the code that make up the application. This releases companies to focus only on using software without having to worry about maintenance and infrastructure.

Operating System (SO)

A software program that manages a computer hardware and software features and provides common services to computer programs.

Sniffer

It is a protocol analyzer , ie a system to monitor the traffic of a local network.

Spam

Large amount of unwanted messages normally of commercial nature, occurs by email or other electronic media.

SSL ( Secure Sockets Layer ) / TLS ( Transport Layer Security )

They are security protocols that encrypt communication between a client (browser, for example) and a server. They guarantee the integrity, authenticity and confidentiality of data transmitted over the internet

Streaming

It is audio or video playback over the internet without downloading the file.

Spyware

It is malicious software that collects information from a device without user knowledge.

Switch

It is a central device that allows devices to connect and communicate with each other efficiently and directly, ensuring that the data is sent only to the correct recipients.

TCP (Transmission Control Protocol)

Used for reliable data transfer between devices in a network.

Telnet

It is a network protocol for connecting to a remote device.

Tokenization

Confidential data replacement process with unique identifiers (tokens) to protect sensitive information.

Trojan

Or Trojan horse is any malware that deceives users about their true intention.

UDP

It is the user datagram protocol , used for real -time data transmission on a network.

Upload

File transfer process from a local device to the internet.

URL ( Uniform Resource Locator )

Uniform resource locator means web address , everything you type in the search bar will be found from it.

Virus

Malicious program , infects a computer with damage to devices and data theft

Vishing

It uses voice resources , such as calls from alleged internet telephone services (VOIP) to deceive victims and extract personal and confidential information such as bank passwords, credit card and CPF.

Voip

Or voice about Internet protocol, it is a technology that allows Voice Transmission by IP (Internet Protocols).

VPN ( Private Virtual Network )

It is a technology that creates a safe and encrypted connection between a device and the internet, allowing you to browse anonymously and access restricted content geographically.

VPS ( Private Virtual Server (English, Virtual Private Server) )

A web hosting service that allows users to access a dedicated virtual server. This offers users greater control over the server environment, allowing them to install and configure the software of their choice.

Wan

It is a long distance network that connects devices in different geographical locations.

Website

These are a set of related internet pages that you access through an internet address.

Worm

A type of malware that automatically propagates on a network without user interaction.

Www ( world wide web )

It is a part of the internet composed of a set of interconnected documents and resources , accessible through web browsers.

ZERO TRUST

Safety model that requires rigorous verification of users and devices to access network resources.

3g, 4g and 5g

These are generations of mobile network technology, the acronym “G” means “GSM” or global system for mobile communications in Portuguese, and refers to a mobile network modality , which allows telephone calls and internet access.

Lumiun DNS Free Trial
Related Posts