IT Terms #1
198 Questions
4 Views

IT Terms #1

Created by
@EnglischtrainerOnline

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main function of a Proxy Server?

  • To serve as an intermediary for requests from clients seeking resources from other servers (correct)
  • To manage database transactions
  • To host a website on the internet
  • To provide hardware support for devices
  • What is the purpose of a Certificate in online communications?

  • To enhance the physical security of servers
  • To optimize a web page's loading speed
  • To identify an email account
  • To confirm the authenticity of a website or server (correct)
  • Which of the following best describes a Denial of Service attack?

  • An attack intended to make a service unavailable by overwhelming it with traffic (correct)
  • An attack that takes control of a user's device
  • An attack that steals personal information from users
  • An attack that redirects users to malicious websites
  • What is a key feature of Cloud Computing?

    <p>Accessibility over the internet without physical hardware</p> Signup and view all the answers

    What is the primary role of an Email Autoresponder?

    <p>To send automated responses to incoming emails</p> Signup and view all the answers

    Which term refers to an online community where users can share and discuss content?

    <p>Web Forum</p> Signup and view all the answers

    What does SEO primarily aim to improve?

    <p>The website's visibility in search engine results</p> Signup and view all the answers

    What is the primary function of a Content Delivery Network (CDN)?

    <p>To distribute content to users from locations closer to them to improve loading times</p> Signup and view all the answers

    What does the term 'Digital Footprint' refer to?

    <p>The data trace left by individuals as they use the internet</p> Signup and view all the answers

    What is HTTP primarily used for?

    <p>Transmitting hypertext via the web</p> Signup and view all the answers

    Which programming language is primarily used for web development and is known for server-side scripting?

    <p>PHP</p> Signup and view all the answers

    What does the acronym RAID stand for in data storage systems?

    <p>Redundant Array of Independent Disks</p> Signup and view all the answers

    Which type of software license allows users to run, modify, and share the software freely?

    <p>Open Source</p> Signup and view all the answers

    In the context of networking, what does DHCP stand for?

    <p>Dynamic Host Configuration Protocol</p> Signup and view all the answers

    What is the primary function of an API?

    <p>Allow communication between software applications</p> Signup and view all the answers

    Which of the following describes a format for vector graphics?

    <p>SVG</p> Signup and view all the answers

    What is the purpose of a firewall in computer networks?

    <p>To control incoming and outgoing network traffic</p> Signup and view all the answers

    Which protocol is primarily used for secure internet communication?

    <p>HTTPS</p> Signup and view all the answers

    What component of a computer is responsible for executing instructions and performing calculations?

    <p>Central Processing Unit (CPU)</p> Signup and view all the answers

    What does SQL primarily stand for, and what is its main use?

    <p>Structured Query Language; used for managing and manipulating databases</p> Signup and view all the answers

    Which of the following best describes the function of an API in software development?

    <p>It facilitates communication between different software applications.</p> Signup and view all the answers

    What is the primary application of the Object-Oriented Programming (OOP) methodology?

    <p>To model real-world entities through objects and classes.</p> Signup and view all the answers

    Which of the following accurately describes Big Data?

    <p>Data sets that are too large or complex to be processed by traditional data processing applications.</p> Signup and view all the answers

    Which of the following best defines a 'backdoor' in software?

    <p>A security vulnerability exploited by malware.</p> Signup and view all the answers

    In the context of database systems, what does RDBMS stand for?

    <p>Relational Database Management System</p> Signup and view all the answers

    What is the primary purpose of a Blog?

    <p>To share personal opinions, news, or updates in a frequently updated format.</p> Signup and view all the answers

    Which of the following techniques is commonly used to improve the performance of a website through optimization?

    <p>Minification</p> Signup and view all the answers

    Which of the following best defines the term 'Avatar' in online contexts?

    <p>An electronic representation or icon that represents an individual in virtual environments.</p> Signup and view all the answers

    What is the main function of an Attachment in emails?

    <p>To enable the sending of multimedia files along with text messages.</p> Signup and view all the answers

    What is a key characteristic of Agile methodology in software development?

    <p>Flexibility and adaptability to changing requirements.</p> Signup and view all the answers

    Which of the following best describes a 'virus' in computer terminology?

    <p>A self-replicating program that harms systems and data.</p> Signup and view all the answers

    Which of the following terms refers to a tool for remapping internet addresses?

    <p>DNS</p> Signup and view all the answers

    What is the primary function of a Virtual Private Network (VPN)?

    <p>To secure and encrypt internet connections.</p> Signup and view all the answers

    What does the concept of Cyberbullying involve?

    <p>Using electronic communication to harass, threaten, or intimidate others.</p> Signup and view all the answers

    Which of the following best characterizes Cross-Browser compatibility?

    <p>A design approach ensuring that websites function well across different web browsers.</p> Signup and view all the answers

    What does the term 'sandboxing' refer to in cybersecurity?

    <p>Isolating untested or untrusted code to prevent system compromise.</p> Signup and view all the answers

    Which protocol is commonly used for ensuring secure internet communications?

    <p>HTTPS</p> Signup and view all the answers

    What is the primary function of a Cookie in web browsing?

    <p>To track user preferences and session data on a website.</p> Signup and view all the answers

    Which protocol is used for secure communication over the internet?

    <p>HTTPS</p> Signup and view all the answers

    What does the acronym ISP stand for?

    <p>Internet Service Provider</p> Signup and view all the answers

    Which of the following statements correctly describes the purpose of a Botnet?

    <p>A network of computers controlled by one or more central servers to perform automated tasks.</p> Signup and view all the answers

    Which of the following accurately describes the concept of Edge Caching?

    <p>A method of optimizing bandwidth by storing data closer to clients.</p> Signup and view all the answers

    In the context of web development, what is the main function of a Progressive Web App?

    <p>To provide native app-like experiences on the web.</p> Signup and view all the answers

    Which of the following best defines 'Pharming' in cybersecurity?

    <p>A deceptive method to redirect users from legitimate websites to fraudulent ones.</p> Signup and view all the answers

    What is the primary purpose of an HTTP status code 404?

    <p>To signify that the requested resource could not be found on the server.</p> Signup and view all the answers

    Which protocol is primarily responsible for email transmission?

    <p>SMTP</p> Signup and view all the answers

    What is a primary characteristic of a Static Website?

    <p>Content remains the same until manually updated by developers.</p> Signup and view all the answers

    Which of the following best describes the role of a Sitemap in web development?

    <p>It serves as a blueprint for how a website is structured and organized.</p> Signup and view all the answers

    What is the primary function of a Content Management System (CMS)?

    <p>To allow users to create, manage, and modify digital content easily.</p> Signup and view all the answers

    Which file format is specifically designed for storing images with small file sizes using lossy compression?

    <p>JPEG</p> Signup and view all the answers

    What does a hypervisor primarily do in a virtualized environment?

    <p>Emulates hardware for multiple operating systems</p> Signup and view all the answers

    What operating system uses the UEFI firmware interface instead of the traditional BIOS?

    <p>Windows 10</p> Signup and view all the answers

    Which of the following databases is specifically designed to handle unstructured data and is often managed by non-relational database management systems?

    <p>NoSQL</p> Signup and view all the answers

    In programming, what does the term 'garbage collection' refer to?

    <p>Auto-removing unused memory</p> Signup and view all the answers

    Which programming paradigm focuses on the concept of 'objects' that combine data and behavior?

    <p>Object-Oriented Programming</p> Signup and view all the answers

    Which extension indicates a file that is used for type definitions in HTML5?

    <p>.json</p> Signup and view all the answers

    What technique is typically employed to prevent a buffer overflow attack?

    <p>Input Validation</p> Signup and view all the answers

    What does the acronym ACL stand for in the context of network security?

    <p>Access Control List</p> Signup and view all the answers

    Which protocol allows for the secure transmission of messages over the internet using encryption?

    <p>SSL</p> Signup and view all the answers

    Which of the following programming languages is known for its simplicity and is often used for teaching programming fundamentals?

    <p>Python</p> Signup and view all the answers

    What is the main advantage of using Lossless compression over Lossy compression?

    <p>No loss of data</p> Signup and view all the answers

    In the context of network protocols, what does NAT stand for?

    <p>Network Address Translation</p> Signup and view all the answers

    Which of the following describes the primary purpose of a Data Management System?

    <p>Store and retrieve data efficiently</p> Signup and view all the answers

    Which file format supports both vector and raster graphics, allowing for scalable image rendering?

    <p>SVG</p> Signup and view all the answers

    Which of the following best defines a Zero-Day Exploit?

    <p>A security flaw that is exploited before a fix is available</p> Signup and view all the answers

    Which term describes software that remains functional but is no longer actively maintained or updated?

    <p>Deprecated Software</p> Signup and view all the answers

    Which of the following protocols is fundamentally involved in secure data transfer on the internet?

    <p>SSL</p> Signup and view all the answers

    What does the acronym GUI stand for in computing?

    <p>Graphical User Interface</p> Signup and view all the answers

    Which of the following best describes what a Kernel is in operating systems?

    <p>The core component that manages system resources</p> Signup and view all the answers

    Which protocol is associated with sending and receiving email messages over the internet?

    <p>SMTP</p> Signup and view all the answers

    What term describes the strategy that involves combining content from multiple sources into one cohesive element online?

    <p>Mashup</p> Signup and view all the answers

    Which type of tool or service is typically used to track and analyze website traffic and user behavior?

    <p>Web Beacon</p> Signup and view all the answers

    Which networking protocol is designed to provide a mechanism for secure key management and exchange?

    <p>IPsec</p> Signup and view all the answers

    What form of online advertising pays based on the number of times an ad is displayed, regardless of clicks?

    <p>CPM</p> Signup and view all the answers

    Which of the following describes the use of artificial intelligence to simulate human conversation in customer service?

    <p>Chatbot</p> Signup and view all the answers

    What technology facilitates the prioritization of internet traffic, ensuring smooth transmission of data?

    <p>Quality of Service (QoS)</p> Signup and view all the answers

    Which term is used to describe the practice of redirecting users from one URL to another without their consent?

    <p>Pharming</p> Signup and view all the answers

    In the context of search engines, what does the acronym SERP stand for?

    <p>Search Engine Results Page</p> Signup and view all the answers

    Which term refers to a method of connecting multiple network devices, such as computers and routers, in a logical group?

    <p>VLAN</p> Signup and view all the answers

    Which of the following best defines Adware?

    <p>A form of malware that automatically displays or downloads advertisements.</p> Signup and view all the answers

    What is a common feature of interactive content such as a Blog?

    <p>It is typically updated frequently and encourages user engagement.</p> Signup and view all the answers

    Which term refers to a method of delivering content through multiple channels and devices?

    <p>Omni-Channel Distribution</p> Signup and view all the answers

    What does the acronym CAPTCHA stand for?

    <p>Completely Automated Public Turing test to tell Computers and Humans Apart</p> Signup and view all the answers

    Which type of attack attempts to disrupt service by overwhelming a network with traffic?

    <p>SYN Flood</p> Signup and view all the answers

    Which protocol is primarily responsible for obtaining IP addresses automatically for devices on a network?

    <p>DHCP</p> Signup and view all the answers

    What does the term 'Dead Link' refer to in web browsing?

    <p>A hyperlink that leads to a page that no longer exists.</p> Signup and view all the answers

    Which technology allows secure communication over an unsecured network by creating a private tunnel?

    <p>VPN</p> Signup and view all the answers

    Which type of website primarily acts as an online storefront, allowing transactions and product sales?

    <p>E-commerce Site</p> Signup and view all the answers

    Which of the following best describes Cross-Browser compatibility?

    <p>Ensuring a website works well across multiple web browsers.</p> Signup and view all the answers

    What is the purpose of a daemon in computing?

    <p>To run background processes</p> Signup and view all the answers

    Which of the following best describes a Trojan Horse in the context of cybersecurity?

    <p>Malicious software disguised as legitimate software</p> Signup and view all the answers

    What functionality does a VPN provide?

    <p>Encrypted internet connection</p> Signup and view all the answers

    Which term refers to a type of memory that retains data even when the power is off?

    <p>Non-volatile Memory</p> Signup and view all the answers

    What does the acronym SQL stand for in database management?

    <p>Structured Query Language</p> Signup and view all the answers

    Which of the following describes the purpose of an API in software development?

    <p>To facilitate communication between software applications</p> Signup and view all the answers

    In the context of software licenses, what does 'proprietary software' refer to?

    <p>Software with restricted access and usage rights</p> Signup and view all the answers

    What is a common characteristic of lossless compression?

    <p>Retains original data quality</p> Signup and view all the answers

    Which of the following best defines a 'bug' in software development?

    <p>An error or flaw in the software</p> Signup and view all the answers

    Which technology is primarily used to create interactive experiences in web applications?

    <p>JavaScript</p> Signup and view all the answers

    Which of the following best describes the role of 'Digital Footprint'?

    <p>The digital representation of an individual's online activities</p> Signup and view all the answers

    What is the primary function of 'Edge Server' in web architecture?

    <p>To process requests and deliver content closer to users</p> Signup and view all the answers

    Which term refers to a strategy for optimizing loading times and reducing bandwidth usage?

    <p>Lazy Loading</p> Signup and view all the answers

    What does 'Botnet' typically refer to in the context of cybersecurity?

    <p>A network of compromised computers controlled for malicious purposes</p> Signup and view all the answers

    Which of the following describes the purpose of 'Ransomware'?

    <p>To encrypt files and demand payment for decryption</p> Signup and view all the answers

    In networking, what does 'BGP' stand for and what is its function?

    <p>Border Gateway Protocol, used for routing between networks</p> Signup and view all the answers

    What is the main characteristic of 'Cloud Waste'?

    <p>Unused or underutilized cloud resources leading to wasted expenses</p> Signup and view all the answers

    Which of the following best defines 'Phishing'?

    <p>An attempt to obtain sensitive information by disguising as a trustworthy entity</p> Signup and view all the answers

    What is the purpose of 'CORS' in web development?

    <p>To enable secure communication between different domains</p> Signup and view all the answers

    Which of the following best characterizes 'Web Beacon'?

    <p>A method for tracking online user behavior</p> Signup and view all the answers

    What does the acronym ACL stand for in the context of computer systems?

    <p>Access Control List</p> Signup and view all the answers

    Which of the following best describes the term 'Garbage In, Garbage Out' (GIGO)?

    <p>It indicates that poor input results in poor output.</p> Signup and view all the answers

    What is the significance of a UUID in computer systems?

    <p>It is a unique identifier used to track processes.</p> Signup and view all the answers

    Which term refers to the practice of ensuring that a computer program or system behaves as intended under various conditions?

    <p>Black Box Testing</p> Signup and view all the answers

    What does the acronym SDK stand for in software development?

    <p>Software Development Kit</p> Signup and view all the answers

    In software engineering, what is the purpose of a microkernel architecture?

    <p>To reduce the size of the operating system by moving common services into user space.</p> Signup and view all the answers

    Which of the following file systems is specifically designed for managing large files in a Microsoft environment?

    <p>NTFS</p> Signup and view all the answers

    Which concept describes the process of converting high-level programming language code into machine code?

    <p>Compiling</p> Signup and view all the answers

    What is the primary purpose of using a daemon in a computer system?

    <p>To perform routine tasks without user intervention.</p> Signup and view all the answers

    What benefit does using a virtual machine provide in computing environments?

    <p>It allows multiple operating systems to run simultaneously on a single physical machine.</p> Signup and view all the answers

    Which term refers to a programming environment that allows software applications to be developed and run in a containerized manner?

    <p>Container</p> Signup and view all the answers

    What is the main purpose of a Lightweight Directory Access Protocol (LDAP)?

    <p>To facilitate directory services over a network</p> Signup and view all the answers

    Which protocol is associated primarily with transferring files over the Internet securely?

    <p>SFTP</p> Signup and view all the answers

    What does the acronym SDK stand for in software development?

    <p>Software Development Kit</p> Signup and view all the answers

    In the context of software engineering, what does the term 'Technical Debt' refer to?

    <p>Deferring software development to address future improvements</p> Signup and view all the answers

    What is a common use case for Compression algorithms?

    <p>To conserve disk space and optimize file transfer</p> Signup and view all the answers

    Which of the following best describes 'Version Control' in software development?

    <p>Tracking changes to documents and code</p> Signup and view all the answers

    What does the term 'Malware' encompass?

    <p>Any malicious software designed to harm, exploit, or otherwise compromise systems</p> Signup and view all the answers

    Which of the following best describes the function of a Bot in networking?

    <p>To automate repetitive tasks on the internet</p> Signup and view all the answers

    Which component of a computer is crucial for managing memory and storage devices?

    <p>Chipset</p> Signup and view all the answers

    What does the acronym BGP stand for in networking?

    <p>Border Gateway Protocol</p> Signup and view all the answers

    Which of the following best explains the concept of Lazy Loading in web development?

    <p>Loading resources only when they become visible on the viewport</p> Signup and view all the answers

    Which of the following describes a primary characteristic of a Dynamic Website?

    <p>Content is generated in real-time based on user interaction</p> Signup and view all the answers

    What type of attack does a SYN Flood represent in network security?

    <p>Excessive traffic overwhelming a network resource</p> Signup and view all the answers

    Which of the following concepts best describes a Web Beacon?

    <p>A method for tracking user behavior on websites</p> Signup and view all the answers

    What does the term 'Phishing' primarily refer to in cybersecurity?

    <p>A method of gathering user credentials through deceptive emails</p> Signup and view all the answers

    Which of the following best defines an E-commerce platform?

    <p>A platform for buying and selling goods online</p> Signup and view all the answers

    Which term refers to the practice of intentionally sending emails that are perceived as unsolicited and often contain commercial messages?

    <p>Graymail</p> Signup and view all the answers

    What does the acronym RSS stand for in web technology?

    <p>Really Simple Syndication</p> Signup and view all the answers

    What does the acronym 'BGP' stand for in networking?

    <p>Border Gateway Protocol</p> Signup and view all the answers

    Which term describes a technique used to manipulate search engine rankings through unethical practices?

    <p>Black Hat SEO</p> Signup and view all the answers

    Which of the following best defines 'Ransomware' in cybersecurity?

    <p>Software that locks files until a ransom is paid</p> Signup and view all the answers

    What is the primary purpose of a 'Honeypot' in cybersecurity?

    <p>To trap and analyze malicious activity</p> Signup and view all the answers

    Which term describes a network attack that floods a server with traffic to overload it?

    <p>SYN Flood</p> Signup and view all the answers

    What does 'Cloud Waste' refer to in the context of cloud computing?

    <p>Unused or idle cloud resources leading to excess costs</p> Signup and view all the answers

    Which of the following protocols is used to ensure email integrity and authenticity?

    <p>SPF</p> Signup and view all the answers

    Which programming language is primarily used for client-side web development?

    <p>JavaScript</p> Signup and view all the answers

    What does the 'TTL' setting in DNS typically control?

    <p>How long a DNS record is cached</p> Signup and view all the answers

    What characteristic defines a 'Dynamic Website'?

    <p>Content is generated in real-time based on user interaction</p> Signup and view all the answers

    Which of the following terms refers to an interface allowing different applications to communicate over the internet?

    <p>API</p> Signup and view all the answers

    What does the acronym BIOS stand for in computer systems?

    <p>Basic Input/Output System</p> Signup and view all the answers

    Which concept refers to the organization of code and function within a software program to promote reusability?

    <p>Object-Oriented Programming</p> Signup and view all the answers

    Which of the following is a technique for reducing the size of files without losing any data?

    <p>Lossless Compression</p> Signup and view all the answers

    Which of the following data structures uses key-value pairs to enable fast retrieval?

    <p>Hash Table</p> Signup and view all the answers

    What functionality does a Hypervisor provide in virtualization technology?

    <p>Hardware Abstraction</p> Signup and view all the answers

    In the context of databases, what does SQL primarily focus on?

    <p>Data Querying</p> Signup and view all the answers

    Which programming paradigm is characterized by the use of functions and avoiding state and mutable data?

    <p>Functional Programming</p> Signup and view all the answers

    Which of the following communication protocols is used for transferring files over the internet?

    <p>FTP</p> Signup and view all the answers

    What does 'Garbage Collection' refer to in programming?

    <p>Memory Management</p> Signup and view all the answers

    What does an Active Directory primarily manage?

    <p>User accounts and permissions</p> Signup and view all the answers

    Which programming language is known for its use in web development but is not primarily client-side?

    <p>PHP</p> Signup and view all the answers

    What is the main function of a 'Daemon' in computing?

    <p>To perform background tasks continuously</p> Signup and view all the answers

    Which acronym describes a model for evaluating software systems through different phases?

    <p>SDLC</p> Signup and view all the answers

    In networking, what does NAT stand for?

    <p>Network Address Translation</p> Signup and view all the answers

    What is the purpose of using 'Garbage Collection' in programming?

    <p>To reclaim memory taken by objects no longer in use</p> Signup and view all the answers

    Which type of database is characterized by the use of tables to represent data relationships?

    <p>Relational Database</p> Signup and view all the answers

    What technology does 'Virtualization' refer to?

    <p>Running multiple OS on one hardware platform</p> Signup and view all the answers

    Which of the following best describes the concept of 'Middleware'?

    <p>Software that connects different applications or services</p> Signup and view all the answers

    What is the primary role of a 'Load Balancer' in network architecture?

    <p>To efficiently distribute incoming network traffic across multiple servers</p> Signup and view all the answers

    What feature does AJAX provide in web development?

    <p>Asynchronous data loading</p> Signup and view all the answers

    What is a common use for BitTorrent technology?

    <p>File sharing among peers</p> Signup and view all the answers

    Which of the following best describes the function of a Bot?

    <p>A program that automates tasks on the internet</p> Signup and view all the answers

    What is the primary purpose of an Extranet?

    <p>To share part of a company's information with external parties</p> Signup and view all the answers

    What does the term 'Spam' refer to in online communication?

    <p>Unwanted or unsolicited messages</p> Signup and view all the answers

    Which technology primarily allows for secure communication in VoIP?

    <p>SIP</p> Signup and view all the answers

    Which of the following best describes 'Social Engineering' in cybersecurity?

    <p>Manipulating people into divulging confidential information</p> Signup and view all the answers

    What is the primary function of a 'Landing Page' in digital marketing?

    <p>To convert visitors into leads or customers</p> Signup and view all the answers

    Which of the following best describes 'Phishing'?

    <p>Creating fake websites to collect user data</p> Signup and view all the answers

    What does the term 'Backlink' refer to in SEO?

    <p>A link from one website to another</p> Signup and view all the answers

    Which of the following terms refers to a technique used for optimizing website performance by storing content closer to users?

    <p>Edge Caching</p> Signup and view all the answers

    What is the primary goal of Digital Marketing?

    <p>To drive traffic and conversions through online channels</p> Signup and view all the answers

    Which protocol facilitates the transfer of files over the internet with a focus on efficiency?

    <p>FTP</p> Signup and view all the answers

    Which type of attack involves overwhelming a service with traffic to render it unavailable?

    <p>Denial of Service</p> Signup and view all the answers

    What is the primary function of a Landing Page in online marketing?

    <p>To collect user information and encourage conversions</p> Signup and view all the answers

    Which of the following best describes a Recursive DNS Server?

    <p>A server that forwards requests to other DNS servers until it finds the answer</p> Signup and view all the answers

    Which term refers to the practice of acquiring domain names with the intent of reselling them for a profit?

    <p>Cybersquatting</p> Signup and view all the answers

    What is the main characteristic of a Progressive Web App?

    <p>It provides a native app-like experience without installation</p> Signup and view all the answers

    Which of the following concepts is used to track and analyze user behavior on a website?

    <p>Clickstream Analysis</p> Signup and view all the answers

    What is the purpose of using HTTPS instead of HTTP?

    <p>To secure the transmission of data over the internet</p> Signup and view all the answers

    What does the term 'automation' in software development commonly refer to?

    <p>The use of software to complete tasks without human intervention</p> Signup and view all the answers

    Which of the following best defines 'malware'?

    <p>Programs intended to disrupt, damage, or gain unauthorized access to computer systems</p> Signup and view all the answers

    What is the primary goal of using a version control system in software development?

    <p>To track and manage changes to software code over time</p> Signup and view all the answers

    Which of the following describes a 'kernel' in operating systems?

    <p>The core component that manages system resources and communication between hardware and software</p> Signup and view all the answers

    What does the acronym 'API' stand for and what is its main function?

    <p>Application Programming Interface; it enables communication between different software applications</p> Signup and view all the answers

    Which of the following is the primary purpose of a 'sandbox' in cybersecurity?

    <p>To isolate and test programs in a secure environment</p> Signup and view all the answers

    In data management, what does 'normalization' refer to?

    <p>The organization of a database to reduce redundancy and improve integrity</p> Signup and view all the answers

    Which type of software is characterized as 'open source'?

    <p>Software whose source code is available for modification and redistribution</p> Signup and view all the answers

    What is 'encryption' primarily used for in data security?

    <p>To obscure data making it unreadable to unauthorized users</p> Signup and view all the answers

    What does 'cloud computing' primarily offer to users?

    <p>Data storage and processing power over the internet</p> Signup and view all the answers

    Study Notes

    3G, 4G, 5G

    • 3G, 4G, and 5G refer to generations of wireless cellular network technologies.
    • 3G introduced mobile broadband internet and mobile phone services.
    • 4G brought faster speeds and improved data transfer rates.
    • 5G offers significantly faster speeds, lower latency, and greater capacity, supporting new applications like autonomous vehicles and virtual reality.

    Errors

    • 403 Forbidden Error: Indicates the server understands the request but refuses to fulfill it.
    • 404 Not Found Error: Occurs when the server cannot find the requested resource.

    Internet Technologies

    • ActiveX: Microsoft's proprietary technology allowing websites to interact directly with users' computers.
    • Ajax: Asynchronous JavaScript and XML - a technique used to create interactive web applications by exchanging data with a server without reloading the entire page.
    • Apache: A free and open-source web server software widely used for hosting websites.
    • ASP: Active Server Pages - Microsoft's server-side scripting technology used for dynamic website development.
    • ASP.NET: A framework for building web applications and websites using Microsoft's .NET platform.
    • BitTorrent: A protocol and software for sharing files across a network of users.
    • CDN (Content Delivery Network): A system of distributed servers that deliver web content to users based on their geographic location, improving website performance.
    • CORS (Cross-Origin Resource Sharing): Allows websites to request resources from different domains, enhancing web application functionality.
    • CSS (Cascading Style Sheets): Used for controlling the visual appearance of web pages, including fonts, colors, and layout.
    • DHCP (Dynamic Host Configuration Protocol): Automatically assigns IP addresses to devices on a network.
    • DNS (Domain Name System): Translates human-readable domain names into IP addresses.
    • DOM (Document Object Model): Represents a web page as a tree-like structure, allowing developers to access and manipulate its content.
    • EDI (Electronic Data Interchange): A standardized format for exchanging business documents electronically.
    • Email: Electronic mail used for communication between individuals or groups.
    • FTP (File Transfer Protocol): Used to transfer files between computers over a network.
    • HTML (HyperText Markup Language): The standard markup language for creating web pages.
    • HTTP (HyperText Transfer Protocol): The protocol used for transferring files on the World Wide Web.
    • HTTPS (HyperText Transfer Protocol Secure): An encrypted version of HTTP, ensuring secure communication between a web server and a browser.
    • IMAP (Internet Message Access Protocol): A protocol for accessing emails stored on a server.
    • JavaScript: A client-side scripting language used to enhance website interactivity.
    • jQuery: A JavaScript library that simplifies JavaScript programming by providing a concise and powerful way to manipulate web pages.
    • LAMP: A popular open-source software stack used for web development, consisting of Linux, Apache, MySQL, and PHP.
    • LDAP (Lightweight Directory Access Protocol): A protocol for accessing and maintaining directory information, used for user authentication and authorization.
    • MIME Type: Identifies the type of content in an email or file.
    • PHP: A server-side scripting language used for dynamic website development.
    • POP3 (Post Office Protocol 3): A protocol used to retrieve emails from a server.
    • REST (REpresentational State Transfer): An architectural style for designing web services.
    • RSS (Really Simple Syndication): A format for distributing web content, allowing users to subscribe to updates from websites.
    • SMTP (Simple Mail Transfer Protocol): Used for sending emails between email servers.
    • SOAP (Simple Object Access Protocol): A messaging protocol for exchanging structured information.
    • SSH (Secure Shell): A secure protocol for accessing and managing remote computers.
    • SSL (Secure Sockets Layer): A security protocol used for encrypting communication between a web server and a browser.
    • TCP/IP (Transmission Control Protocol/Internet Protocol): The foundation for communication over the internet.
    • TLS (Transport Layer Security): An updated version of SSL, providing more secure communication.
    • UDP (User Datagram Protocol): A lightweight, connectionless protocol for sending datagrams.
    • URI (Uniform Resource Identifier): A unique string used to identify a resource on the internet.
    • URL (Uniform Resource Locator): A specific type of URI that identifies the location of a resource on the internet.
    • Web Services: Software applications that communicate with each other using standard internet protocols.
    • XHTML (Extensible HyperText Markup Language): A stricter version of HTML, using XML syntax.

    Web Concepts

    • Backlink: A link from another website to yours, improving your website's search engine ranking.
    • Bookmark: A saved link to a website, allowing users to easily return to it.
    • Cookie: Small pieces of data stored on a user's computer by a website, used to remember user preferences and track browsing activity.
    • Domain Name: A human-readable name that identifies a website on the internet.
    • Favicon: A small icon associated with a website, displayed in the browser tab and bookmarks.
    • Friendly URL: A URL that is easy for humans to read and understand.
    • Homepage: The main page of a website.
    • Landing Page: A specific page on a website designed to capture leads or promote a particular product or service.
    • Link: A clickable element on a web page that directs users to another page or resource.
    • Meta Tag: A hidden tag on a webpage that provides information about the content, used by search engines and browsers.
    • Mirror: A copy of a website hosted on a different server for redundancy or regional accessibility.
    • Navigation Bar: A set of links on a website that allows users to move between different pages.
    • Permalink: A permanent link to a specific web page or blog post.
    • Search Engine: A program that helps users find information on the internet by indexing and searching websites.
    • SEO (Search Engine Optimization): The process of optimizing websites for search engines to improve their visibility and ranking.
    • Sitemap: A file containing a list of a website's pages, used by search engines to crawl and index the site.
    • Static Website: A website with fixed content that doesn't change dynamically.
    • Streaming: Delivering media content continuously over a network, allowing users to access and view it without downloading the entire file.
    • Tag: A keyword or label used to categorize content, making it easier to search and retrieve.
    • Web 2.0: The second generation of the World Wide Web, characterized by user-generated content, social media, and interactivity.
    • Website: A collection of web pages hosted on a web server, accessible through a domain name.

    Digital Marketing Concepts

    • Affiliate: A marketing program where individuals or businesses promote products or services in exchange for a commission.
    • Banner Ad: A rectangular advertisement displayed on a website.
    • CPA (Cost Per Action): A pricing model where advertisers pay for specific actions taken by users.
    • CPC (Cost Per Click): A pricing model where advertisers pay for each click on their ads.
    • CPM (Cost Per Mille): A pricing model where advertisers pay for every 1,000 times their ad is displayed.
    • Digital Footprint: The trail of information left behind by individuals online, including their activity on social media, search history, and online purchases.
    • Email Marketing: Sending commercial messages to individuals via email.
    • Influencer: An individual with a significant following on social media who can influence consumer behavior.
    • Lead: A potential customer who has shown interest in a product or service.
    • PPC (Pay Per Click): A type of advertising where advertisers pay for every click on their ads.
    • Social Media: Online platforms where users can create profiles, share content, and interact with each other.
    • Social Media Marketing (SMM): Using social media platforms to promote products or services.
    • Spam: Unsolicited, unwanted electronic messages.

    Cybersecurity Concepts

    • Botnet: A network of infected computers controlled by a hacker.
    • Brute Force Attack: A method of guessing passwords by systematically trying all possible combinations.
    • Captcha: A test used to distinguish between human users and automated bots.
    • Cyberbullying: Using electronic communication to harass or intimidate others.
    • Denial of Service (DoS) Attack: An attempt to make a server or network unavailable to legitimate users.
    • Firewall: A security system that prevents unauthorized access to a network.
    • Phishing: A form of online fraud where individuals are tricked into revealing sensitive information.
    • Ransomware: A type of malware that encrypts a victim's files and demands a ransom for their decryption.
    • Social Engineering: Manipulating people into revealing confidential information or performing actions that benefit the attacker.
    • Spoofing: Disguising an identity or communication to deceive the recipient.
    • Troll: A person who posts inflammatory messages online to provoke reactions.

    Other

    • ATM (Automated Teller Machine): A machine that allows users to access their bank accounts.
    • Azure: Microsoft's cloud computing platform.
    • Facebook: A popular social networking website.
    • Google: A leading search engine and technology company.
    • Google Drive: A cloud storage service for storing and sharing files.
    • Hashtag: A word or phrase preceded by a '#' symbol used to categorize content on social media.
    • Internet: A global network of interconnected computers.
    • Internet of Things (IoT): A network of physical devices that can communicate with each other and with the internet.
    • Instagram: A photo and video sharing platform.
    • LinkedIn: A professional networking website.
    • MySpace: A social networking website popular in the 2000s.
    • Twitter: A microblogging platform where users can post short messages called tweets.
    • Wiki: A collaborative website where users can create and edit content.
    • WordPress: A popular content management system for creating websites and blogs.
    • WWW (World Wide Web): A system of interconnected documents and other resources accessible via the internet.

    Computer Science & Software Basics

    • Abstraction: Simplifying complex systems by hiding irrelevant details.
    • Accessibility: Designing technology for everyone, including those with disabilities.
    • Algorithm: A set of instructions to solve a problem or complete a task.
    • Analog: Continuous data representation (like a dial).
    • Artificial Intelligence (AI): Machines performing tasks typically requiring human intelligence.
    • ASCII: A standard character encoding system for computers.
    • Authentication: Verifying a user's identity for access.
    • Binary: A base-2 number system (0 and 1), the foundation of digital computing.
    • Bit: The smallest unit of data in a computer, representing a 0 or 1.
    • Boolean: A data type with only two possible values: TRUE or FALSE.
    • Bug: An error in a software program that causes it to malfunction.
    • Byte: A unit of data consisting of 8 bits.
    • Cache: A temporary storage area for frequently accessed data for faster retrieval.
    • Character: A symbol used in writing, like letters, numbers, and punctuation.
    • Client-Server Model: A network architecture where clients request services from servers.
    • Clock Cycle: The basic time unit of a processor.
    • Clock Speed: The rate at which a processor performs operations, measured in Hertz (Hz).
    • Code: Text-based instructions written in a programming language.
    • Compatibility Layer: Software that allows older programs to run on newer systems.
    • Computer Science: The study of computers and computational systems.
    • Copyright: A legal right protecting original works of authorship.
    • Cross-Platform: Software or apps that work on multiple operating systems.
    • Cryptocurrency: Digital currencies that use cryptography for security and transaction validation.
    • Cryptography: The practice and study of secure communications (encryption and decryption).
    • Data: Raw facts and figures that can be processed and interpreted.
    • Data Type: A classification of the type of data (string, number, boolean).
    • Decryption: Translating encrypted data back into its original form.
    • Digital: Discrete data representation (like a light switch).
    • Digitize: Converting analog data into a digital format.
    • Domain: A named section of the internet (e.g., example.com).
    • Encryption: Converting data into an unreadable format to protect its confidentiality.
    • Ergonomics: Designing systems to optimize user comfort and efficiency.
    • File System: Provides a hierarchical structure for organizing files on a storage device.
    • Filter: A tool to select or modify data based on specific criteria.
    • Floating Point: A data type representing non-integer numbers (decimals).
    • Font: A set of characters with specific design characteristics.
    • Frame: A single image or still in a sequence of images, used in video and animation.
    • Frequency: The rate of signal repetition, measured in Hertz (Hz).
    • Function: A block of code that performs a specific task.
    • GUI: A graphical user interface that interacts with users visually through icons and menus.
    • Hertz (Hz): A unit of frequency (cycles per second).
    • HTML: Hypertext Markup Language, used for creating web pages.
    • HTTP: Hypertext Transfer Protocol, used for transmitting web pages.
    • Input: Data or instructions provided to a system.
    • Integer: A data type representing whole numbers.
    • Interface: A way for different components or systems to interact.
    • IP Address: A unique number assigned to each device on a network.
    • ISO: International Organization for Standardization, sets technical standards for various industries.
    • Kernel: The core of an operating system.
    • Language: A set of symbols and rules used for communication (like a programming language).
    • Markup Language: A system for adding annotations to text or data to define structure and formatting.
    • Matrix: A rectangular arrangement of numbers, symbols, or expressions.
    • Memory: Temporary storage for data that can be accessed quickly by the CPU.
    • Metadata: Data about data, providing descriptive information.
    • Network: A group of interconnected devices that can share resources.
    • Output: Data produced by a system or process.
    • Page Fault: An error arising when a program attempts to access a page of memory that is not currently loaded.
    • Parallel Port: An interface that allows data to be transferred simultaneously over multiple lines.
    • Parity Bit: An extra bit attached to a data stream used for error detection.
    • Pixel: The smallest unit of a digital image, representing a single point of color.
    • Platform: A hardware or software environment where applications run.
    • Port: A virtual connection point on a network device used for communication.
    • Process: An instance of a program being executed by a computer.
    • Programming Language: A set of rules and syntax used for writing instructions for computers.
    • Protocol: A set of rules governing communication between devices.
    • RAM: Random Access Memory, temporary data storage that is volatile (lost when the computer is turned off).
    • Recursion: A technique where a function calls itself repeatedly until a specific condition is met.
    • Resolution: The number of pixels in an image or display, determining its sharpness.
    • RGB: Red Green Blue, a color model representing colors using these three primary colors.
    • ROM: Read-Only Memory, permanent data storage that is non-volatile (data persists even when the computer is turned off).
    • Root Directory: The top-level directory in a file system.
    • Serial Port: An interface that transfers data one bit at a time over a single line.
    • Software: A set of programs that perform specific tasks on a computer.
    • Source Code: The human-readable instructions written in a programming language.
    • Stack: A datastructure that follows the Last-In, First-Out (LIFO) principle.
    • String: A sequence of characters.
    • Subscript: A character placed below the baseline of a line of text.
    • Superscript: A character placed above the baseline of a line of text.
    • Syntax: The rules that govern the structure and grammar of a language (like a programming language).
    • Table: An arrangement of data in rows and columns.
    • Thread: A lightweight process that allows a program to execute multiple tasks concurrently.
    • Unicode: A system for encoding characters from many different languages.
    • User Interface (UI): The part of a software program that allows users to interact with the system.
    • Variable: A named storage location that holds changing values.
    • Vector: A quantity that has both magnitude and direction.
    • Virtual Machine (VM): A software program that emulates a physical computer system.
    • VLAN: Virtual Local Area Network, a logical grouping of network devices that can communicate as if they were on the same physical network.
    • Volatile: Data is lost when the power is off.
    • Web Browser: A software program for accessing and viewing web pages.
    • Wi-Fi: A wireless networking technology.
    • Word Wrap: Automatically breaking a line of text when it reaches the end of a line.
    • XAML: Extensible Application Markup Language, used for defining user interfaces in Microsoft Windows applications.
    • XML: Extensible Markup Language, a markup language used for storing and exchanging structured data.

    Operating Systems

    • macOS: A graphical operating system developed by Apple Inc.
    • Windows: A popular family of operating systems developed by Microsoft.
    • Linux: A popular open-source operating system known for its flexibility and stability.
    • Android: A mobile operating system developed by Google.
    • iOS: A mobile operating system developed by Apple Inc.
    • Operating System: The core software that manages a computer's resources and provides a user interface.

    Hardware

    • CPU: Central Processing Unit, the "brain" of the computer that executes instructions.
    • GPU: Graphics Processing Unit, specialized for handling visual processing.
    • RAM: Random Access Memory, temporary data storage that is volatile.
    • HDD: Hard Disk Drive, a mechanical storage device that uses rotating platters to store data.
    • SSD: Solid State Drive, a storage device that uses flash memory to store data.
    • Motherboard: The main circuit board in a computer that connects all the components.
    • Monitor: A visual display used to interact with a computer.
    • Keyboard: A device used for inputting text data.
    • Mouse: A device used for navigating and interacting with a computer.
    • Chipset: A set of integrated circuits on a motherboard that control communication between the CPU, memory, and other components.

    Common Web Technologies and Protocols

    • HTTP (Hypertext Transfer Protocol): The foundation of the World Wide Web, responsible for transferring files, like web pages, between servers and browsers.

    • HTTPS (Hypertext Transfer Protocol Secure): A secure version of HTTP that uses encryption to protect data transmitted between server and browser.

    • HTML (Hypertext Markup Language): The language used to create web pages, defining content structure and formatting for display.

    • CSS (Cascading Style Sheets): Controls the visual presentation of web pages, defining layouts, fonts, colors, and other presentation elements.

    • JavaScript: Programming language used to make web pages dynamic and interactive.

    • DNS (Domain Name System): Translates human-readable domain names (like "google.com") into IP addresses, enabling computers to find and connect to websites.

    • TCP/IP (Transmission Control Protocol/Internet Protocol): A suite of protocols that defines the communication rules for networks, enabling computers to send and receive data over the internet.

    • SQL (Structured Query Language): A standard language used to manage and interact with relational databases.

    • XML (Extensible Markup Language): A markup language used to store and transport data, focusing on structure and information rather than presentation.

    • JSON (JavaScript Object Notation): A lightweight data exchange format used for transmitting data between applications and servers, favored for its simplicity and readability.

    Networking Concepts and Technologies

    • IP Address (Internet Protocol Address): A unique identifier assigned to each device on a network, enabling communication between them.

    • Subnet Mask: A network mask used to identify the network portion of an IP address.

    • NAT (Network Address Translation): Allows multiple devices on a local network to share a single public IP address, improving security and network efficiency.

    • DHCP (Dynamic Host Configuration Protocol): Automatically assigns IP addresses to devices connected to a network, simplifying network management.

    • VPN (Virtual Private Network): Encrypts internet traffic and routes it through a secure tunnel, providing privacy and security, often used for remote access to private networks.

    Web Development and Design

    • Website: A collection of web pages that are interconnected and accessible over the internet.

    • URL (Uniform Resource Locator): The address of a web page or resource on the internet.

    • Web Server: A computer that stores and delivers web pages and other content to browsers.

    • Database: A structured collection of information stored and managed on a computer.

    • Web Development: The process of creating and maintaining websites, including planning, designing, coding, and testing.

    • Web Design: The process of planning and creating visual design elements for websites, including layout, color schemes, typography, and graphics.

    • Front-End: The user-facing portion of a website, including the design and interaction elements.

    • Back-End: The server-side portion of a website, responsible for processing data, logic, and database interactions.

    • Responsive Web Design: Creating websites that adapt to different screen sizes and devices, providing optimized experiences for users.

    • SEO (Search Engine Optimization): Optimizing websites to improve their visibility and ranking in search engine results pages.

    • Spam: Unwanted or unsolicited electronic messages, typically commercial in nature.

    • Phishing: A type of online scam that aims to trick users into revealing personal information, often using fake websites or emails.

    • Social Media: Online platforms that allow users to create profiles, share content, and interact with others.

    • Cloud Computing: Delivering computing services, including servers, storage, databases, and networking, over the internet.

    • E-commerce: The buying and selling of goods and services over the internet.

    • Blog: A website or web application that allows users to post content, typically in chronological order.

    • Podcast: A series of digital audio files that users subscribe to and listen to.

    • Web 2.0: A term used to describe the evolution of the world wide web, emphasizing user-generated content, social interaction, and increased interactivity.

    • Web 3.0: A proposed future version of the web characterized by decentralized applications, semantic web, and artificial intelligence integration.

    Hardware

    • Computer: An electronic device used for processing, storing, and retrieving data.
    • CPU: The brain of the computer, responsible for executing instructions.
    • RAM: Short-term memory for active programs and data— volatile memory.
    • Storage: Long-term memory for data and programs.
    • Input Devices: Mechanisms for transferring data to the computer (e.g., keyboard, mouse).
    • Output Devices: Mechanisms for transferring data from the computer (e.g., monitor, printer).

    Software

    • Operating System: Software that manages hardware and provides a platform for applications.
    • Application Software: Programs designed for specific user tasks (e.g., word processors, web browsers).
    • System Software: Software that controls and supports the computer system (e.g., drivers, utilities).

    Networking

    • LAN: A network that connects devices in a limited geographical area (e.g., office building).
    • WAN: A network that connects computers over a large geographical area (e.g., internet).
    • Internet: A global network of interconnected computer networks.
    • Protocol: A set of rules that govern communication between devices.

    Data

    • Data Type: A classification of data (e.g., integer, text, boolean).
    • Database: A structured collection of data.

    Programming

    • Programming Language: A language used to instruct computers to perform tasks.
    • Algorithm: A set of instructions for solving a problem.
    • Compiler: A program that translates high-level code into low-level code (e.g., machine language).
    • Interpreter: A program that executes code line by line without compiling.

    Cybersecurity

    • Malware: Software designed to harm computers or steal data.
    • Virus: A type of malware that replicates itself.
    • Firewall: A security system that blocks unauthorized access to a network.
    • Encryption: Converting data into a secret code for secure transmission.
    • Data Security: Measures taken to protect sensitive information from unauthorized access.

    Emerging Technologies

    • Artificial Intelligence (AI): Machines capable of performing tasks that typically require human intelligence.
    • Machine Learning (ML): A type of AI that allows systems to learn from data without explicit programming.
    • Virtual Reality (VR): A computer-generated 3D environment that immerses the user.
    • Augmented Reality (AR): A technology that overlays digital information onto the real world.
    • Blockchain: A distributed ledger technology that records transactions securely.

    Internet and Web Technologies

    • 3G, 4G, and 5G: Mobile network technologies that offer increasing data transfer speeds and network capacity.
    • ActiveX: Microsoft technology that allows programs to interact with web pages, but also used for malicious purposes.
    • Address Bar: The location at the top of a web browser where URLs are entered.
    • Adware: Software that displays ads on your computer without your consent.
    • Affiliate: A person or company that promotes another company's products or services in exchange for a commission.
    • Ajax: Technology that allows dynamic webpage updates without refreshing the entire page.
    • Apache: A popular open-source web server software.
    • Applet: A small program that runs within a web browser, used for interactive content.
    • Application Server: A server that hosts and manages web applications.
    • Archie: An early internet search engine used to locate files on FTP servers.
    • ASP (Active Server Pages): Microsoft server-side scripting technology used to build dynamic web pages.
    • ASP.NET: Microsoft's framework for building web applications, extending ASP functionality.
    • ATM (Asynchronous Transfer Mode): A high-speed networking technology, used to transfer data in short-burst packets.
    • Attachment: A file sent along with an email.
    • AUP (Acceptable Use Policy): A set of rules for using a network or service.
    • Autoresponder: A software that automatically sends pre-written emails in response to incoming emails.
    • Avatar: A digital representation of a user in online environments.
    • Azure: Microsoft's cloud computing service.
    • Backbone: The high-speed network connections that form the core of the internet infrastructure.
    • Backlink: A link from another website to your website.
    • Banner Ad: A rectangular advertisement displayed on websites, often at the top or bottom of the page.
    • Bcc (Blind Carbon Copy): A hidden email recipient.
    • BGP (Border Gateway Protocol): A routing protocol used to exchange information between networks.
    • Big Data: Extremely large datasets that can be analyzed to find patterns and insights.
    • Bing: Microsoft's search engine.
    • BitTorrent: A protocol used to share files over the internet peer-to-peer.
    • Blog: A website where users can post articles, news, and personal thoughts.
    • Bookmark: A saved link to a webpage for easy access later.
    • Bot: A software program that automates tasks online, often used for scraping data or spamming.
    • Botnet: A network of computers infected with malware that can be controlled remotely.
    • Bounce: An email that is returned to the sender, usually because the recipient email address does not exist.
    • Broadband: High-speed internet access, typically faster than dial-up connections.
    • Brute Force Attack: A hacking technique that involves trying multiple passwords or combinations until the correct one is found.
    • Captcha: A test used to distinguish between human users and computer programs.
    • Cc (Carbon Copy): A visible email recipient.
    • CDN (Content Delivery Network): A distributed network of servers that deliver content to users based on their location.
    • Certificate: A digital document that verifies the identity of a website.
    • CIFS (Common Internet File System): A network protocol for sharing files between computers on a network.
    • Client: A computer or device that requests information from a server.
    • Cloud: A network of data centers and servers that provide various computing services over the internet.
    • Cloud Computing: The delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”).
    • Cloud Waste: The excessive use of cloud computing resources, leading to inefficient resource allocation and higher costs.
    • CMP (Consent Management Platform): A platform that helps websites manage user consent for data collection and processing.
    • CMS (Content Management System): Software that allows users to create, manage, and publish content on a website.
    • Cookie: A small text file stored on a user's computer by a website.
    • CORS (Cross-Origin Resource Sharing): A mechanism that allows web pages from different origins to communicate with each other.
    • CPA (Cost Per Acquisition): An advertising model where advertisers pay for each customer acquisition.
    • CPC (Cost Per Click): An advertising model where advertisers pay for each click on their ads.
    • CPL (Cost Per Lead): An advertising model where advertisers pay for each lead generated.
    • CPM (Cost Per Mille): An advertising model where advertisers pay for every 1,000 impressions of their ads.
    • Cross-Browser: Web pages that are designed to work correctly in different web browsers.
    • CSS (Cascading Style Sheets): A language that defines the style, layout, and presentation of web pages.
    • CTR (Click-Through Rate): The percentage of users that click on an ad.
    • Cyberbullying: The use of electronic communication to bully or harass someone.
    • Cyberspace: The online world, including the internet and all its related networks.
    • Cybersquatter: A person who registers domain names that are similar to or identical to well-known brands or trademarks with the intent to sell them for profit.
    • Datagram: A unit of data transmitted across a network, often using UDP.
    • Denial of Service: An attack that aims to prevent legitimate users from accessing a website or service.
    • DHCP (Dynamic Host Configuration Protocol): A protocol that automatically assigns IP addresses to devices on a network.
    • Dial-up: A type of internet access using a phone line.
    • Digital Footprint: The information that a user leaves behind online, including their activity on websites and social media.
    • Direct Digital Marketing: Marketing efforts that directly engage customers online through email, social media, and other channels.
    • DKIM (DomainKeys Identified Mail): A method used to verify the authenticity of emails.
    • DNS (Domain Name System): A hierarchical system that translates domain names into IP addresses.
    • DNS Record: An entry in the DNS database that maps a domain name to an IP address.
    • DNSSEC (Domain Name System Security Extensions): A security mechanism that protects DNS from being spoofed.
    • DOM (Document Object Model): A programming interface for HTML and XML documents, allowing JavaScript to manipulate elements of a webpage.
    • Domain Name: A unique name for a website on the internet.
    • Domain Suffix: The part of a domain name that comes after the dot, such as ".com" or ".org".
    • Download: The process of transferring a file from a remote server to your computer.
    • Drive-By Download: When malware is downloaded without the user's knowledge.
    • Dynamic Website: A website that can change its content based on user input or other external factors.
    • E-commerce: The buying and selling of goods and services online.
    • E-mail Bankruptcy: A situation where an email address has accumulated a large volume of unread emails.
    • Edge Caching: A technique used by CDNs to store frequently requested content closer to users to improve performance
    • Edge Server: A server located closer to users in a CDN.
    • EDI (Electronic Data Interchange): a system that allows businesses to exchange data electronically.
    • Email Address: A unique address used to send and receive emails.
    • Email Bomb: An attack that floods an email account with a large volume of emails.
    • Emoticon: A symbol used to express emotion in electronic communication, typically formed using punctuation marks.
    • Extranet: A private network that allows external users access to company resources.
    • Facebook: A popular social networking website.
    • Favicon: A small icon displayed in the browser tab or bookmark bar.
    • Fios: A fiber-optic internet service offered by Verizon.
    • Firewall: A security system designed to protect a network from unauthorized access.
    • Flaming: Online arguments with hostile language and aggressive behavior.
    • Flash: Multimedia software that uses Adobe Flash Player to play videos and animations, gradually replaced by HTML5.
    • Fluid Layout: Website design that adapts to different screen sizes.
    • Friend: A person who you are connected with on a social networking site.
    • Friendly URL: An easy-to-understand URL, often containing keywords related to the content of the page.
    • FTP (File Transfer Protocol): A protocol used to transfer files between a computer and a server.
    • Google: A popular search engine and technology company.
    • Google Drive: A cloud storage service offered by Google.
    • Gopher: An early internet protocol used to access information on university servers.
    • Graymail: Emails that are not considered spam but are not particularly important, often promotional and unwanted.
    • Grid Computing: A distributed computing model that uses a network of computers to solve complex problems.
    • Handle: A username used to identify a user on a website or online service.
    • Hashtag: A word or phrase preceded by a hash symbol (#) that can be used to categorize content on social media.
    • Heartbleed: A serious security vulnerability that affected the OpenSSL software used to encrypt communications.
    • Hit: A request for a webpage from a user or search engine.
    • Home Page: The main page of a website.
    • Honeypot: A trap designed to attract and capture malicious attackers.
    • HTML (HyperText Markup Language): The language used to create web pages.
    • HTML5: The latest version of HTML, which adds features like video and audio support, better graphics, and improved accessibility.
    • HTTP (HyperText Transfer Protocol): The protocol used to transfer files on the World Wide Web.
    • HTTPS (HyperText Transfer Protocol Secure): A secure version of HTTP that uses encryption to protect communication between a user and a website.
    • Hyperlink: A link on a webpage that allows a user to jump to another page.
    • Hypermedia: A system of interconnected media objects, such as text, images, audio, and video.
    • Hypertext: A system of linked text documents, where clicking on a word or phrase takes you to another document.
    • IANA (Internet Assigned Numbers Authority): An organization that manages IP addresses and other internet resources.
    • ICANN (Internet Corporation for Assigned Names and Numbers): A non-profit organization that coordinates domain names and IP addresses.
    • ICF (Internet Control Message Protocol): A protocol used to send control and error messages over the internet.
    • iCloud: Apple's cloud storage and syncing service.
    • ICMP (Internet Control Message Protocol): A protocol used by devices on a network to communicate status information, such as error messages and network reachability.
    • ICQ: An early instant messaging client.
    • ICS (Internet Connection Sharing): A feature that allows a computer to share its internet connection with other devices on the network.
    • ICT (Information and Communications Technology): The use of technology to create, store, process, and share information.
    • Iframe: An HTML element that allows you to embed a webpage within another webpage.
    • IIS (Internet Information Services): Microsoft's web server software.
    • IM (Instant Messaging): A form of real-time communication using text-based messages, often used for chat.
    • IMAP (Internet Message Access Protocol): A protocol used to access and manage email messages on a mail server.
    • Impression: A view of an ad on a website.
    • Inbox: The folder in an email client where new emails are stored.
    • Influencer: A person who has a large following on social media and can influence purchasing decisions.
    • Instagram: A photo and video sharing social media platform.
    • Internet: A global network of computers that allows users to connect and share information.
    • Internet of Things (IoT): A network of physical objects that are connected to the internet.
    • InterNIC: An organization that previously managed internet addresses and domain names, now managed by ICANN.
    • IP (Internet Protocol): A set of rules governing how data is transmitted across the internet.
    • IP Address: A unique numerical address assigned to each device connected to the internet.
    • IPsec (Internet Protocol Security): A protocol used to secure communication between devices on a network.
    • IPv4 (Internet Protocol Version 4): The older version of IP address, using 32-bit addresses.
    • IPv6 (Internet Protocol Version 6): The newer version of IP addresses, using 128-bit addresses.
    • IRC (Internet Relay Chat): A protocol for real-time chat on the internet.
    • iSCSI (Internet Small Computer System Interface): A protocol used to connect storage devices over a network.
    • ISDN (Integrated Services Digital Network): A digital network technology that can support both voice and data connections.
    • ISP (Internet Service Provider): A company that provides access to the internet.
    • JavaScript: A programming language used to add interactivity to web pages.
    • Jitter: Variations in network latency, which can cause delays or interruptions in data transmission.
    • jQuery: A popular JavaScript library that simplifies web development.
    • JSF (JavaServer Faces): A Java framework for building web applications.
    • JSP (JavaServer Pages): A technology for building dynamic web pages using Java code.
    • JWT (JSON Web Token): A standard for securely transmitting information between parties as JSON objects.
    • Keep-Alive: A technique used to keep an HTTP connection open between a client and server, reducing latency for subsequent requests.
    • Lag: A delay in communication between devices on a network.
    • LAMP (Linux, Apache, MySQL, PHP): An open-source web development stack used to build dynamic websites and web applications.
    • Landing Page: A webpage that users are directed to after clicking on an ad or link.
    • Lazy Loading: A technique where images or other content are loaded only when they are visible to the user, improving webpage performance.
    • LDAP (Lightweight Directory Access Protocol): A protocol for accessing and maintaining directory information on a network.
    • Lead: A potential customer who has expressed interest in a product or service.
    • Leaderboard: A type of banner ad displayed at the top of a webpage, often above the content.
    • Leet: A form of online slang that uses letter combinations to represent other letters, often used for anonymity.
    • Link: A clickable text or image that takes you to another webpage.
    • LinkedIn: A social networking site for professionals.
    • LISTSERV: A software program used to manage email lists and send mass emails.
    • Live Streaming: The real-time broadcasting of video or audio over the internet.
    • Mail Server: A server that handles incoming and outgoing email messages.
    • Martech: The use of technology in marketing, including tools for automation, analytics, and personalization.
    • Mashup: A website that combines content from multiple sources.
    • Media Queries: CSS features that allow styles to be applied based on the screen size, orientation, and other conditions.
    • Meme: An image, video, or phrase that is shared widely online, often with humorous or satirical intent.
    • Meta Search Engine: A search engine that aggregates results from multiple other search engines.
    • Meta Tag: HTML code that provides information about a webpage, used by search engines for indexing and ranking.
    • Metaverse: A collective term for immersive digital environments that integrate virtual reality, augmented reality, and the internet.
    • Microblogging: A type of online blogging that focuses on short messages and updates.
    • MIME Type: An identifier that defines the type of file, such as text, image, or video.
    • Minisite: A small, focused website, often used for specific products or services.
    • Mirror: A copy of a website stored on a different server.
    • Moodle: An open-source learning management system used for online courses and training programs.
    • Multicast: A type of network communication where a single message is sent to multiple recipients simultaneously.
    • MySpace: An early social networking site.
    • Name Server: A server that stores domain names and their corresponding IP addresses.
    • NAT (Network Address Translation): A technique that allows multiple devices on a private network to share a single IP address on the internet.
    • Navigation Bar: A menu on a website that allows users to navigate to different pages.
    • Net Neutrality: The principle that internet service providers should treat all data traffic equally, without favoring certain websites or services.
    • Netiquette: Rules and etiquette for online behavior.
    • Netmask: A value used to determine the network address from a given IP address.
    • Newsgroup: An online discussion forum where users can post messages on various topics.
    • Nextdoor: A social networking site for neighborhoods.
    • NNTP (Network News Transfer Protocol): A protocol used to access and transfer newsgroup articles.
    • NOC (Network Operations Center): A facility that monitors and manages a network infrastructure.
    • Node.js: A JavaScript runtime environment that allows developers to build server-side web applications.
    • NoSQL: A type of database that is not based on the traditional relational database model.
    • NSP (Network Service Provider): A company that provides internet access and network services.
    • NTP (Network Time Protocol): A protocol that allows computers on a network to synchronize their clocks.
    • Optical Carrier: A high-speed fiber-optic network that carries large volumes of data.
    • Origin Server: The primary server where the original content for a website is stored.
    • OSPF (Open Shortest Path First): A routing protocol used to exchange routing information within a network.
    • OTT (Over-the-Top): Content that is streamed directly to consumers over the internet, bypassing traditional cable or satellite providers.
    • Outbox: A folder in an email client where emails are temporarily stored before sending.
    • P2P (Peer-to-Peer): A network model where all computers can act as both client and server, allowing users to share files and resources directly.
    • Packet: A small unit of data transmitted over a network.
    • Page View: A single instance of a webpage being loaded and displayed in a web browser.
    • Parked Domain: A domain name that is registered but does not have a website associated with it.
    • Payload: The harmful code or data that is delivered by malware.
    • Permalink: A permanent link to a specific webpage or blog post.
    • Personal URL: A personalized URL that redirects to a user's website, blog, or social media profile.
    • Pharming: A form of cyberattack where users are redirected to fake websites.
    • Phishing: A type of cyberattack that attempts to trick users into revealing sensitive information, such as passwords or credit card details.
    • PHP (Hypertext Preprocessor): A popular server-side scripting language used for web development.
    • PIM (Product Information Management): A system for managing product data, often used for e-commerce websites.
    • Ping: A network tool used to test the connectivity between two devices.
    • Pinterest: A social media platform where users can share and discover images and ideas.
    • PON (Passive Optical Network): A fiber-optic network technology where multiple users share a single line to a central point.
    • POP3 (Post Office Protocol version 3): A protocol used to retrieve emails from a mail server.
    • Portal: A website that provides access to various services and content.
    • PPC (Pay Per Click): An advertising model where advertisers pay for each click on their ads.
    • PPL (Pay Per Lead): An advertising model where advertisers pay for each lead generated.
    • PPP (Point-to-Point Protocol): A protocol used to establish a network connection between two devices.
    • PPPoE (Point-to-Point Protocol over Ethernet): A protocol used to connect to the internet over an Ethernet network.
    • PPS (Pay Per Sale): An advertising model where advertisers pay for each sale generated.
    • PPTP (Point-to-Point Tunneling Protocol): A protocol used to create a secure VPN connection.
    • Primitive: The earliest form of the internet, using simple text-based interfaces.
    • Progressive Web App: A web application that offers native-like features and functionality, such as offline access and push notifications.
    • Protocol: A set of rules governing the format and transmission of data between computers.
    • Proxy Server: A server that acts as an intermediary between a client and a server, often used to improve security or performance.
    • RADCAB (Really Awesome Digital Content Access Book): A list of websites that are recommended for their high-quality digital content.
    • Ransomware: Malware that encrypts a victim's files and demands payment for their decryption.
    • Reciprocal Link: When two websites link to each other, often used to improve SEO.
    • Responsive Web Design: A web design approach that ensures websites adapt to different screen sizes and devices.
    • REST (REpresentational State Transfer): An architectural style for designing web services.
    • RPM (Revolutions Per Minute): A measurement of the speed of a hard drive.
    • RSS (Really Simple Syndication): An XML-based format for publishing and distributing content, such as news headlines or blog posts.
    • RTMP (Real-Time Messaging Protocol): A protocol used for streaming audio and video over the internet.
    • Sass (Syntactically Awesome Style Sheets): A CSS preprocessor that allows developers to write more efficient and maintainable CSS code.
    • Scraping: The process of extracting data from websites, often using bots.
    • SDSL (Symmetric Digital Subscriber Line): A type of digital subscriber line technology that offers equal upload and download speeds, often used for businesses.
    • Search Engine: A website that allows users to find information on the internet by entering keywords or phrases.
    • SEO (Search Engine Optimization): The process of improving the ranking of a website in search engine results pages.
    • SERP (Search Engine Results Page): The page that displays search results from a search engine.
    • Servlet: A Java program that runs on a web server and handles requests from web clients, often used to build dynamic web pages and applications.
    • Session: A temporary connection between a user and a server, often used to store user information during a website visit.
    • SIP (Session Initiation Protocol): A protocol used for initiating and maintaining communication sessions, often used for VoIP services.
    • Sitemap: An XML file that lists all the pages on a website, used by search engines to understand the site's structure.
    • Skyscraper: A type of large banner ad displayed on the side of a webpage.
    • Slashdot: A popular news website for technology and science news.
    • Smishing: A type of phishing scam that uses SMS messages to trick users into revealing sensitive information.
    • SMM (Social Media Marketing): The use of social media platforms to promote products or services.
    • SMTP (Simple Mail Transfer Protocol): A protocol used to send emails between mail servers.
    • SOAP (Simple Object Access Protocol): A protocol for exchanging structured information between applications, often used in web services.
    • Social Engineering: The use of psychological persuasion to trick people into giving up sensitive information or performing actions that compromise security.
    • Social Media: A collection of online platforms where users can share content, communicate with each other, and build relationships.
    • Social Networking: The process of building and maintaining relationships with other people online.
    • Socket: A communication endpoint used for exchanging data between two applications on a network.
    • Spam: Unwanted or unsolicited email messages, often promotional or commercial in nature.
    • SPF (Sender Policy Framework): A system for verifying the authenticity of emails by checking the sender's IP address against a list of authorized servers.
    • Spider: A software program used by search engines to crawl websites and gather information for indexing.
    • Spoofing: A type of cyberattack where an attacker disguises themselves as a trusted entity, such as a bank or a website administrator.
    • SSH (Secure Shell): A secure protocol used to connect to remote computers over a network.
    • SSL (Secure Sockets Layer): A protocol used for encrypting communications between a web browser and a web server.
    • SSO (Single Sign-On): A system that allows users to log in to multiple websites or applications with a single set of credentials.
    • Static Website: A website that has fixed content that does not change dynamically.
    • Streaming: The delivery of media content, such as video or audio, continuously over the internet, allowing playback without downloading the entire file first.
    • SYN Flood: A type of denial-of-service attack that floods a server with connection requests.
    • T1: A type of high-speed digital leased line used for internet access.
    • T3: A type of very high-speed digital leased line used for internet access.
    • Tag: A keyword or label used to categorize content online, often used with hashtags on social media.
    • TCP (Transmission Control Protocol): A protocol that provides reliable and ordered delivery of data over the internet.
    • TCP/IP (Transmission Control Protocol/Internet Protocol): A suite of communication protocols that form the foundation of the internet.
    • Telnet: A protocol used to connect to remote computers and manage them from a remote location, often used for network administration.
    • TLS (Transport Layer Security): A successor to SSL that provides more modern security protections for internet communications.
    • Traceroute: A network tool that shows the path taken by data packets between two devices, allowing users to identify network bottlenecks or problems.
    • Trackback: A way for websites to notify each other when a link to their content is posted elsewhere.
    • Troll: A person who intentionally provokes arguments or disrupts online conversations.
    • TTL (Time To Live): A value used to determine how long a DNS record should be cached by a system.
    • Tumblr: A microblogging platform where users can post text, images, videos, and audio.
    • Tunneling: A technique that allows data to be transmitted over a network securely, often using a VPN.
    • Tweet: A short message posted on Twitter.
    • Twitch: A live streaming platform for video games and other content.
    • Twitter: A microblogging platform where users post short messages called tweets.
    • UDP (User Datagram Protocol): A protocol that provides fast and efficient delivery of data over the internet, without the guarantees of reliability and order provided by TCP.
    • UGC (User-Generated Content): Content that is created by users, such as blog posts, videos, or social media updates.
    • Unfriend: To remove a person from your friend list on a social networking site.
    • Unicast: A type of network communication where a single message is sent to a single recipient.
    • Upload: The process of transferring a file from your computer to a remote server.
    • URI (Uniform Resource Identifier): A general term for a location or resource on the internet.
    • URL (Uniform Resource Locator): A specific type of URI that identifies the location of a webpage or file on the internet.
    • Usenet: A distributed network of newsgroups where users can post and read messages.
    • VCI (Virtual Channel Identifier): A number used to identify a specific virtual channel on a network, often used in ATM and Frame Relay networks.
    • VDSL (Very-high-bit-rate Digital Subscriber Line): A type of DSL technology offering very high speeds, often used for long distances.
    • VIP (Very Important Person): A term used to describe a user with special privileges on a website or network.
    • Vlog (Video Blog): A blog that features video content.
    • VoIP (Voice over Internet Protocol): A technology that allows voice calls to be made over the internet.
    • VPI (Virtual Path Identifier): A number used to identify a specific virtual path on a network, often used in ATM and Frame Relay networks.
    • VPN (Virtual Private Network): A secure connection between a user and a server, often used to protect privacy and access blocked websites.
    • VPS (Virtual Private Server): A virtualized server that provides resources and functionality similar to a dedicated server, but at a lower cost.
    • W3C (World Wide Web Consortium): An international standards organization that develops web technologies, such as HTML, CSS, and XML.
    • WAIS (Wide Area Information Server): An early search engine that allowed users to search for information on a network of servers.
    • WAN (Wide Area Network): A network that spans a wide geographic area, often connecting multiple networks together.
    • Web 2.0: A term that describes the evolution of the World Wide Web from static websites to dynamic and interactive applications.
    • Web Application: A software program that is accessed through a web browser.
    • Web Beacon: A small graphic file that is embedded on a webpage and used to track user activity.
    • Web Design: The process of creating and maintaining websites.
    • Web Development: The process of building, deploying, and maintaining websites and web applications.
    • Web Forum: An online discussion forum where users can post messages on specific topics.
    • Web Host: A company that provides space on a server to store and host websites.
    • Web Publishing: The process of making a website accessible to users on the internet.
    • Web Server: A computer or server that hosts websites and serves web pages to users.
    • Web Service: A software program that provides specific functionalities online, often accessed through web APIs.
    • Webhook: An automated callback that is triggered when a specific event occurs, providing real-time updates between applications.
    • Webmail: A web-based email service that allows users to access their emails through a web browser.
    • Webmaster: A person who manages and maintains a website.
    • Webpage: A single page on a website, containing content such as text, images, and videos.
    • Webring: A collection of websites that are linked together, often based on a common theme or interest.
    • Website: A collection of related web pages that are stored on a web server.
    • WHOIS: A database that stores information about domain names, including the registrant's contact information.
    • Wiki: A website that allows users to collaboratively create, edit, and share content.
    • WINS (Windows Internet Naming Service): A network location service used in Windows networks.
    • WordPress: A popular open-source content management system used to build websites and blogs.
    • WWW (World Wide Web): A system of interconnected documents and resources accessible through the internet, using HTTP.
    • XaaS (Anything as a Service): A term that refers to the delivery of various services over the internet, including software, hardware, infrastructure, and data.
    • XHTML (Extensible HyperText Markup Language): A stricter version of HTML that is compatible with XML., used to build websites with fewer errors.
    • Yahoo!: A popular search engine, email service, and technology company.### Hardware
    • Computer - An electronic device that processes and stores data
    • Chipset - A group of integrated circuits that control the communication between the computer's components
    • CPU - The brain of the computer that performs calculations and instructions
    • GPU - A specialized electronic circuit designed to accelerate the creation of images, videos, and other visual content
    • RAM - A type of computer memory that can be accessed randomly; temporary storage for data being used by the computer
    • HDD - A type of data storage where data is stored magnetically on a spinning disk
    • SSD - A type of data storage where data is stored electronically on flash memory chips
    • Motherboard - The main printed circuit board in a computer that connects all the components
    • Input Devices - Devices that allow users to enter data or instructions into a computer
    • Output Devices - Devices that display or transmit data from the computer
    • DisplayPort - A digital video interface for connecting a computer to a display device
    • HDMI - A digital video interface for connecting a computer to a display device
    • USB - A connector standard for connecting devices to a computer
    • Bluetooth - A wireless communications technology that allows devices to connect over short distances
    • Wi-Fi - A wireless networking technology that allows devices to connect to the internet
    • LAN - A local area network that connects devices within a limited geographic area
    • WAN - A wide area network that connects devices over a large geographic area
    • Router - A device that connects multiple networks together
    • Modem - A device that allows communication between a computer and a remote computer network (usually internet)
    • Server - A computer that provides services to other computers on a network
    • Network Interface Card (NIC) - A device that allows a computer to connect to a network
    • MAC Address - A unique identifier assigned to network interfaces for identification on a network

    Software

    • Operating System - Software that manages the computer's hardware and provides services to other software, such as applications
    • Application - A software program designed to perform specific tasks for users, such as word processing, web browsing, or gaming
    • Windows - A popular operating system for personal computers developed by Microsoft
    • macOS - An operating system developed by Apple for Macintosh computers
    • Linux - A family of open-source operating systems for various devices
    • Android - A mobile operating system developed by Google
    • iOS - A mobile operating system developed by Apple for its iPhones and iPads
    • Driver - Software that allows an operating system to communicate with a specific hardware device
    • Firmware - A type of software embedded into hardware devices to control their operation
    • Compiler - A program that translates computer code written in a high-level programming language into a low-level language (machine code) that the computer can understand
    • Interpreter - A program that executes computer code written in a high-level programming language line by line
    • API - A set of rules and specifications that allows different software applications to communicate and interact with each other
    • Database - An organized collection of structured information, or data, typically stored electronically in a computer system
    • DBMS - An application software that provides an interface to the database and allows users to interact with it

    Networking

    • IP Address - A numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication
    • DNS - A hierarchical and decentralized naming system that translates domain names into IP addresses
    • TCP/IP - A suite of communication protocols that allow devices on a network to communicate with each other
    • HTTP - A protocol for transferring files, such as web pages, over the internet
    • HTTPS - A secure version of HTTP that encrypts data exchanged between a web browser and a website
    • FTP - A protocol for transferring files between computers
    • Email - A method of electronic communication that allows users to exchange messages
    • SMTP - The protocol used to send email messages
    • POP3 - A protocol used to retrieve email messages from a server
    • IMAP - A protocol used to synchronize emails between a server and a user's email client
    • VPN - A technology that allows a user to connect to a private network over a public network, such as the internet, securely
    • Cloud Computing - The delivery of computing services — including servers, storage, databases, networking, software, analytics, and intelligence — over the Internet (“the cloud”)
    • SaaS - Software as a Service, a software licensing and delivery model in which software is licensed on a subscription basis and centrally hosted
    • IaaS - Infrastructure as a Service, a type of cloud computing that provides access to computing resources (servers, virtualization, storage, and networking)
    • PaaS - Platform as a Service, a type of cloud computing that provides a platform for developing, running, and managing applications

    Other

    • Internet - A global computer network that connects billions of devices and networks worldwide
    • World Wide Web (WWW) - A collection of documents and other resources that are linked together and accessed through the internet
    • Web browser - A software application that allows users to access and browse the World Wide Web
    • URL - Uniform Resource Locator, an address that identifies a particular resource on the World Wide Web
    • HTML - Hyper-Text Markup Language, a markup language used to create web pages
    • CSS - Cascading Style Sheet, a language used to style and format webpages
    • JavaScript - A scripting language used to create interactive web applications
    • Search engine - A software system designed to search for information on the internet
    • Social media - Online platforms that enable users to create and share content and interact with each other
    • E-commerce - The buying and selling of goods and services online
    • Cybersecurity - The practice of protecting information systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction
    • Artificial Intelligence (AI) - The ability of a computer or machine to mimic human intelligence
    • Machine Learning (ML) - A type of AI that allows computers to learn from data without being explicitly programmed
    • Data Science - The practice of using scientific methods, algorithms, processes, and systems to extract knowledge and insights from data

    Computer Hardware

    • Central Processing Unit (CPU): the brain of a computer
    • Motherboard: the main circuit board that connects all the computer's components
    • Random Access Memory (RAM): temporary storage for data that the CPU is currently using
    • Hard Disk Drive (HDD): permanent storage for data, files, and applications
    • Solid-State Drive (SSD): faster and more durable than HDDs, also permanent storage
    • Graphics Processing Unit (GPU): dedicated hardware for processing graphics and video
    • Input Devices: devices that allow users to interact with a computer (e.g. keyboard, mouse, touchscreen)
    • Output Devices: devices that display or present information from the computer (e.g. monitor, printer)
    • Network Interface Card (NIC): allows computers to connect to a network
    • Expansion Cards: add additional functionality to a computer (e.g. sound cards, video cards)
    • System Unit: the main case that houses most of the computer's components
    • Power Supply: converts AC (household) power to DC power for use by computer components
    • Optical Drive: reads and writes data on optical media (e.g. CDs, DVDs)
    • Bus: a set of electronic pathways on the motherboard that allow data to travel between components
    • BIOS: a software program stored in the motherboard's ROM that controls the computer's startup process
    • CMOS: a small memory chip that stores the computer's configuration settings

    Computer Software

    • Operating System (OS): the foundation software that manages the computer's resources and allows applications to run
    • Applications: programs that perform specific tasks (e.g. word processors, web browsers, games)
    • System Software: software that manages the computer's hardware and provides essential services to applications
    • Programming Languages: languages used to write software and instructions for computers
    • Compiler: translates high-level code (in a human-readable language) into machine code (understood by the CPU)
    • Interpreter: executes code line by line, without compiling it
    • Executable File: a file containing instructions that can be executed by the computer
    • Source Code: the text-based instructions written by programmers
    • Firmware: software embedded in hardware devices, giving them basic functionality (e.g. BIOS)

    Computer Networks

    • Network: a group of interconnected devices that can share data and resources
    • Local Area Network (LAN): a network that covers a small area, like a home or office
    • Wide Area Network (WAN): a network that covers a large geographical area (e.g. the internet)
    • Internet: a global network of interconnected computers that allows communication and data exchange
    • Protocol: a set of rules that govern how devices communicate and share data
    • IP Address: a unique numerical identifier for each device on a network
    • Domain Name: a human-readable name for a website or server, translated to an IP address
    • Router: a device that directs traffic between networks
    • Switch: a device that connects devices on a network and manages data flow
    • Wi-Fi: a wireless networking standard that allows devices to connect to the internet without cables

    Computer Security

    • Virus: a type of malware that can infect computers and spread to other systems
    • Malware: malicious software designed to harm computers
    • Firewall: a software or hardware component that acts as a barrier between a computer and the outside world, blocking unauthorized access
    • Antivirus Software: software that detects and eliminates viruses and other malware
    • Encryption: the process of converting data into an unreadable format, protecting it from unauthorized access
    • Password Manager: a software application that helps you store and manage your passwords securely
    • Two-Factor Authentication: a security measure that requires two different authentication factors (e.g. password and a verification code)
    • Cryptography: the mathematical study and application of secure communication techniques

    Computer Data Management and Storage

    • Database: an organized collection of data
    • Database Management System (DBMS): software used to manage and access databases
    • File System: a hierarchical structure for organizing files and folders on a storage device
    • File Compression: reducing the size of files to save space or speed up transmission
    • Data Backup: creating copies of data to protect it from loss
    • Data Recovery: the process of recovering lost or corrupted data

    Computer Graphics and Multimedia

    • Raster Graphic: a type of image created using pixels (e.g. JPEG, PNG)
    • Vector Graphic: a type of image created using mathematical equations to define lines and curves (e.g. SVG, PDF)
    • Pixel: a single point of color in a raster graphic image
    • Resolution: the number of pixels in an image, determining its sharpness and clarity
    • Color Depth: the number of bits used to represent each pixel, determining the number of available colors
    • Lossy Compression: a technique that compresses data by discarding some information, reducing file size but potentially losing quality
    • Lossless Compression: a technique that compresses data without discarding information, preserving the original quality
    • Multimedia: the integration of various media formats, including text, images, audio, and video
    • Cloud Computing: storing and accessing data and applications over the internet, rather than on a local device
    • Artificial Intelligence (AI): computer systems that can mimic human intelligence
    • Machine Learning: a subset of AI that allows computers to learn from data without explicit programming
    • Internet of Things (IoT): a network of physical objects that are connected to the internet
    • Virtual Reality (VR): technology that creates immersive experiences, using computer-generated environments
    • Augmented Reality (AR): technology that overlays digital information onto the real world
    • Blockchain: a decentralized and secure record-keeping technology, often associated with cryptocurrencies
    • Big Data: extremely large datasets that require specialized tools for analysis and processing

    Internet Basics

    • 3G, 4G, 5G: Cellular network technologies for mobile internet access. Each generation offers faster speeds and improved capabilities.
    • Internet Protocol (IP): A set of rules that govern how devices communicate over a network.
    • IP Address: A unique numerical label assigned to each device on a network.
    • Domain Name: A human-readable name for a website or server (e.g., google.com)
    • Domain Suffix: The last part of a domain name, which indicates its type (e.g., .com, .org, .net)
    • URL (Uniform Resource Locator): A web address that identifies a specific resource on the internet (eg. https://www.example.com/page)
    • URI (Uniform Resource Identifier): A more general term that encompasses URLs and other identifiers.
    • HTTP (Hypertext Transfer Protocol): The protocol used for transferring files on the web.
    • HTTPS (Hypertext Transfer Protocol Secure): A secure version of HTTP that uses encryption to protect data.
    • TCP/IP (Transmission Control Protocol/Internet Protocol): A suite of protocols that define the internet's architecture.
    • DNS (Domain Name System): A hierarchical system that translates domain names into IP addresses.
    • DNS Record: A database entry that maps a domain name to an IP address.
    • DNSSEC (Domain Name System Security Extensions): A security mechanism for DNS that protects against spoofing and other attacks.

    Web Technologies

    • HTML (HyperText Markup Language): The foundation of web pages. Defines the structure and content of a webpage.
    • HTML5: The latest version of HTML that incorporates multimedia features, improved performance, and better accessibility.
    • CSS (Cascading Style Sheets): Used to define the presentation of web pages (e.g., colors, fonts, layout).
    • JavaScript: A scripting language that adds interactivity and dynamic behavior to web pages.
    • jQuery: A popular JavaScript library that simplifies web development by providing a concise and cross-browser compatible API.
    • AJAX (Asynchronous JavaScript and XML): A technique for creating interactive web pages that can update content without reloading the entire page.
    • API (Application Programming Interface): A set of rules and specifications that allow different software applications to communicate with each other.
    • Web Server: A software program that serves web pages to users.
    • Web Application: A software program that runs on a web server and is accessed through a web browser.
    • Web Service: A software system that provides a specific functionality over the web and can be accessed by other applications.
    • Web Development: The process of designing, building, and maintaining websites.
    • Web Design: The visual and structural aspects of web pages, including layout, color scheme, and typography.
    • Website: A collection of interconnected web pages maintained by an individual or organization.
    • Static Website: A website with content that remains unchanged except by manual update.
    • Dynamic Website: A website with content that changes dynamically based on user input or other factors.
    • Responsive Web Design: Web design that adapts to different screen sizes and devices (e.g., desktops, tablets, smartphones).
    • Fluid Layout: A web design technique that allows content to adjust its size based on the screen width.
    • Progressive Web App: A type of web application that offers a native-app like experience.

    Internet Security

    • Firewall: A security system that blocks unauthorized access to a network.
    • Antivirus: Software that protects against malware, such as viruses and Trojans.
    • Spam: Unsolicited bulk email messages.
    • Phishing: A type of online fraud that attempts to trick users into revealing personal information.
    • Malware: Malicious software designed to harm or steal data.
    • Virus: A type of malware that replicates itself and spreads to other computers.
    • Trojan Horse: A type of malware that disguises itself as legitimate software but contains malicious code.
    • Worm: A type of malware that spreads through networks without user interaction.
    • Ransomware: Malware that encrypts data and demands payment to decrypt it.
    • Social Engineering: A type of attack that manipulates people into revealing personal information or granting access to systems.
    • Denial of Service (DoS) Attack: An attack that attempts to overload a server or network with requests, preventing legitimate users from accessing it.
    • Brute Force Attack: An attack that tries every possible combination of passwords or data until it finds a match.
    • Captcha: A security measure that tests whether a user is human.
    • SSL/TLS (Secure Sockets Layer/Transport Layer Security): A protocol that encrypts communication between a web browser and a server.
    • VPN (Virtual Private Network): A network technology that encrypts internet traffic and routes it through an encrypted tunnel, providing privacy and security.
    • Security Audit: A systematic examination of an organization's security practices to identify vulnerabilities.

    Internet Applications

    • Email: Electronic mail is the transfer of messages over the internet.
    • Social Media: Platforms like Facebook, Twitter, Instagram, and TikTok, that allow users to connect and share content.
    • Social Networking: Websites and platforms that facilitate social interactions.
    • E-commerce: Buying and selling goods and services over the internet.
    • Search Engine: A program that finds websites and other resources based on keywords.
    • Google: A major web search engine and technology company.
    • Bing: A web search engine developed by Microsoft.
    • Wiki: A collaborative website where users contribute and edit content.
    • Blog: An online journal or diary that is updated regularly.
    • Forum: An online discussion board where users can post messages and interact with each other.
    • Chat: Online communication in real-time.
    • Messaging: Sending messages between two or more people.
    • Multimedia: Content that combines text, images, audio, and video.

    Cloud Computing

    • Cloud Computing: The delivery of computing services - such as servers, storage, databases, networking, software, analytics, and intelligence - over the Internet (“the cloud”).
    • Cloud Service Provider: A company that provides cloud computing services.
    • Cloud Storage: A service that allows users to store data on remote servers.
    • Cloud Server: A server that is managed and maintained by a cloud service provider.
    • Cloud Computing Models:
      • SaaS (Software as a Service): Software applications delivered over the cloud.
      • PaaS (Platform as a Service): Infrastructure and tools for developing and deploying applications.
      • IaaS (Infrastructure as a Service): Virtualized computing resources (servers, storage, networking).
    • Cloud Waste: Unused cloud resources that result in unnecessary cost.

    Miscellaneous

    • Internet of Things (IoT): A network of physical devices that connect and communicate with each other and the internet.

    • Big Data: Large volumes of data that are complex and require specialized tools to process.

    • Artificial Intelligence (AI): Simulation of human intelligence processes by computer systems.

    • Machine Learning (ML): A type of AI that allows computers to learn from data without being explicitly programmed.

    • Deep Learning (DL): A subset of ML that uses artificial neural networks to learn from data.

    • Cybersecurity: The practice of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction.

    • Cybercrime: Criminal activity that involves computers and networks.

    • Cyberbullying: The use of electronic communication to bully or harass others.

    • Digital Footprint: The data trail that a person leaves behind in digital spaces.

    • Netiquette: The set of rules and guidelines for good online behavior.

    • Martech: Marketing technology, which refers to the software, tools, and platforms used in marketing.

    • Avatar: A digital representation of a person, often used in online games and virtual worlds.

    • Hashtag: A keyword or phrase preceded by a hash symbol (#) used to categorize content on social media.

    • Meme: A piece of content, typically an image or video, that is widely shared online.

    • Bot: An automated program that interacts with computer systems.

    • Botnet: A network of infected computers controlled by a single entity.

    • Streaming: The delivery of digital media, such as video or audio, over the internet in real-time.

    • Live Streaming: The live broadcast of events or content over the internet.

    • Vlog: A video blog.

    • Podcast: An audio blog.

    • Internet Archive: A non-profit digital library that collects and archives web pages and other digital content.

    • Deep Web: The part of the internet that is not indexed by standard search engines.

    • Dark Web: A hidden part of the deep web that is not accessible through standard means and often used for illegal activities.### File Types and Formats

    • AIFF is a file format for uncompressed audio, known for its high quality and often used in professional audio production.

    • Animated GIF is a file format for displaying simple animations consisting of a series of still image frames.

    • Batch File is a text file containing a series of commands for the Windows operating system, often used to automate tasks.

    • Bitmap is a type of image file where each individual pixel is represented by its own color, resulting in high file sizes but allowing for precise detail.

    • BMP is a common file extension for bitmap images, often used for web graphics and digital painting.

    • CDFS is a file system for Compact Discs, designed to store and retrieve data from CD-ROMs.

    • CSV is a plain text file format where data is separated by commas, often used for spreadsheets and data analysis.

    • DLL is a file containing reusable code modules that can be accessed by different programs on a Windows system, allowing these programs to share functionality.

    • Document Grinding is a technique for reducing the size of document files by removing unnecessary formatting and data.

    • eBook is a digital book file format that can be read on dedicated e-readers or computers, often using formats like EPUB or MOBI.

    • EXIF is a standard for storing metadata, such as camera settings and date taken, within image files.

    • GIF is a common file format for graphic images, particularly useful for displaying animations and web graphics.

    • H.264 is a video codec known for its efficiency, offering excellent quality at relatively low bitrates.

    • H.265 is a newer video codec that further improves compression efficiency compared to H.264, delivering better quality at similar bitrates.

    • HEIF is a newer image file format that provides higher compression efficiency than JPEG, resulting in smaller file sizes while retaining quality.

    • JPEG is one of the most widely used file formats for photographic images, known for its good compression rate and quality.

    • JSON is a lightweight data interchange format that uses human-readable text, commonly used in web applications and APIs.

    • MP3 is a widely used compressed audio format for digital music files, known for its balance between file size and sound quality.

    • MPEG is a standard for compressing video and audio data, including formats like MP3, MP4, and MPEG-2.

    • Open Format is a file format that is publicly available and generally supported by different software applications, promoting interoperability.

    • Page Layout is a file format specifically designed for creating and editing documents with complex layouts and multiple columns, like those used for magazines or books.

    • PDF is a versatile file format for documents that retains formatting and allows for easy sharing, often used for presentations and official documents.

    • PNG is a widely used lossless image format, known for its support for transparency, making it suitable for web graphics and logos.

    • PostScript is a page description language used for creating and printing complex vector graphics, often associated with desktop publishing.

    • ProRAW is a high-quality image format designed for professional photographers, combining RAW image data with JPEG compression for better editing capabilities.

    • Raster Graphic is a type of image where an image is composed of a grid of individual pixels, meaning the image detail is dependent on the pixel density.

    • Raw File is an image file that contains unprocessed sensor data from a digital camera, offering maximum flexibility for editing but requiring dedicated software.

    • RTF is a text file format designed for storing and transferring formatted text, allowing for basic styling and layout elements.

    • Swap File is a hidden file created by the operating system to temporarily store data from RAM when it is full, improving system performance.

    • TIFF is an image file format known for its high quality and support for various color depths and compression methods, often used in professional photography and printing.

    • Torrent is a file format used for sharing files over a peer-to-peer network, with the .torrent file containing information about the files to be shared.

    • Vector Graphic is a type of image where elements are defined by mathematical formulas instead of pixels, resulting in scalable graphics and smaller file sizes.

    • WAVE is a file format for storing uncompressed audio, widely used in professional audio production and often associated with high-quality sound reproduction.

    • XMP is a metadata format used to store information about digital assets like photographs, often used for organizing and cataloging media files.

    • Zip is a widely used file compression format for archiving and reducing the size of multiple files into a single file.

    Network Technologies and Protocols

    • 3G, 4G, 5G: Generations of cellular network technology; each generation offers faster speeds and greater bandwidth for mobile devices.
    • Internet Protocol (IP): A set of rules for communication over the internet.
    • TCP/IP: A standard suite of communication protocols used on the internet.
    • DNS: Domain name system; translates human-readable domain names into IP addresses.
    • HTTP: Hypertext Transfer Protocol; used for transferring files, primarily web pages, on the World Wide Web.
    • HTTPS: Secure HTTP; a secure version of HTTP that encrypts communication between a client and server.
    • DHCP: Dynamic Host Configuration Protocol; assigns IP addresses automatically to devices on a network.
    • NAT: Network Address Translation; allows multiple devices on a private network to share a single public IP address.
    • IPv4: Fourth version of the Internet Protocol.
    • IPv6: Sixth version of the Internet Protocol; designed to address the depletion of IPv4 addresses.
    • SMTP: Simple Mail Transfer Protocol; used for sending email messages.
    • POP3: Post Office Protocol version 3; used for retrieving email messages from a server.
    • IMAP: Internet Message Access Protocol; allows users to access their emails from multiple devices.
    • FTP: File Transfer Protocol; used for transferring files between computers.
    • SSH: Secure Shell; provides a secure way to access and manage remote computers.
    • Telnet: A protocol allowing a user to access and manage remote computers over a network.
    • UDP: User Datagram Protocol; a protocol for sending data over a network.
    • IRC: Internet Relay Chat; a communication protocol for real-time chat.
    • BitTorrent: A peer-to-peer file sharing protocol.
    • Wi-Fi: A wireless networking technology.
    • Bluetooth: A short-range wireless communication technology.
    • T1, T3: Digital telecommunication lines of different speeds and capacity for broadband internet access.

    Web Technologies and Concepts

    • HTML: Hypertext Markup Language; a language used to create web pages.
    • CSS: Cascading Style Sheets; used to style the presentation of web pages.
    • JavaScript: A programming language used to add interactive elements to web pages.
    • Web Server: A computer that stores and delivers web pages to users.
    • Domain Name: A human-readable address for a website.
    • Website: A collection of web pages that are linked together.
    • URL: Uniform Resource Locator; a web address that identifies a specific resource on the internet.
    • Hyperlink: A link that connects one web page to another.
    • Web 2.0: A term referring to the second generation of the World Wide Web, characterized by user-generated content and social media.
    • Web Application: A software application that runs on a web server and can be accessed by users over the internet.
    • AJAX: Asynchronous JavaScript and XML; used to create dynamic web pages.
    • CMS: Content Management System; software used for managing and publishing web content.
    • SEO: Search engine optimization; optimizing a website to rank higher in search engine results pages.
    • SEM: Search engine marketing; using paid advertising to promote a website in search engine results pages.
    • Social Media: A platform for online communication and networking.
    • Social Networking: The process of connecting and interacting with other users online.
    • Blog: An online journal or diary.
    • Podcast: A digital audio file, typically a series of episodes.
    • Streaming: Delivering media content over the internet so it can be consumed in real-time.
    • RSS: Really Simple Syndication; a format for delivering updates to subscribers.

    Security and Privacy

    • Firewall: A software or hardware security system that prevents unauthorized access to a network.
    • Antivirus: Software used to detect and remove malicious software.
    • Spam: Unsolicited bulk email.
    • Phishing: An attempt to obtain sensitive information through fraudulent emails or websites.
    • Ransomware: Malicious software that holds data hostage and demands payment for its release.
    • Cyberbullying: Harassing or bullying someone online.
    • Digital Footprint: The trail of data that a person leaves online.
    • Privacy: The right to control one's personal information.
    • Cookie: Small text files that websites store on a user's computer to track their activity.
    • Encryption: Transforming data into an unreadable format to protect its confidentiality.

    Other Concepts

    • Cloud Computing: Using computing resources over the internet.
    • Cloud Waste: Unused or underutilized computing resources in the cloud.
    • Big Data: Large and complex data sets that cannot be processed by traditional methods.
    • Internet of Things (IoT): A network of interconnected devices that collect and exchange data.
    • Bitcoin: A cryptocurrency that uses blockchain technology.
    • Artificial Intelligence (AI): Simulating human intelligence in machines.
    • Machine Learning (ML): A type of AI that allows computers to learn from data.
    • Deep Learning: A type of machine learning that uses artificial neural networks.
    • Metaverse: A network of interconnected virtual worlds.
    • Virtual Reality (VR): An immersive experience that simulates a real or imaginary environment.
    • Augmented Reality (AR): A technology that superimposes computer-generated images onto the real world.

    Computer Hardware

    • Central Processing Unit (CPU): The brain of a computer, responsible for processing instructions and performing calculations.
    • Graphics Processing Unit (GPU): A specialized electronic circuit designed to accelerate the creation of images, videos, and other visual content.
    • RAM (Random Access Memory): Short-term memory used by the CPU to store data and instructions that are being actively used.
    • Hard Disk Drive (HDD): A storage device that uses magnetic disks to store data.
    • Solid State Drive (SSD): A storage device that uses flash memory to store data, offering faster access times compared to traditional hard drives.
    • Motherboard: The main circuit board that connects all the components of a computer.
    • Input Devices: Devices used to enter data and instructions into a computer e.g. Keyboard, mouse, touchscreen.
    • Output Devices: Devices used to display or output the processed information from a computer e.g. Monitor, speakers, printers.

    Software

    • Software: A set of instructions that tells a computer what to do.
    • Operating System (OS): The core software that manages the computer's resources and provides a platform for other applications to run. Examples include Windows, macOS, Linux.
    • Application Software: Programs designed for specific tasks, such as word processing, web browsing, or gaming,
    • System Software: Programs that manage the computer's hardware and software resources e.g. Operating systems, drivers, utilities.
    • Programming Language: A language used to write computer programs. Examples include Python, Java, C++, JavaScript.

    Networking Concepts

    • Network: A group of interconnected devices that can communicate with each other.
    • LAN (Local Area Network): A network that connects devices within a limited geographical area, such as a home or office.
    • WAN (Wide Area Network): A network that connects devices over a large geographical area, such as a country or the world.
    • Internet: A global network of interconnected computers.
    • IP Address: A unique numerical address assigned to each device on a network.
    • TCP/IP: A set of communication protocols used for data transmission over the internet.
    • Router: A device that forwards data packets between networks.

    Data and Storage Concepts

    • Data: Raw facts and figures that can be processed by a computer.
    • File: A collection of data stored on a computer.
    • Folder: A container used to organize files on a computer.
    • File System: A method of organizing and managing files on a storage device.
    • Bit: The smallest unit of data in a computer.
    • Byte: A group of 8 bits, used to represent characters, numbers, and other data.

    Data Storage Units

    • Kilobyte (KB): 1,024 bytes
    • Megabyte (MB): 1,024 kilobytes
    • Gigabyte (GB): 1,024 megabytes
    • Terabyte (TB): 1,024 gigabytes
    • Petabyte (PB): 1,024 terabytes

    Cybersecurity Concepts

    • Malware: Software designed to harm a computer or network.
    • Virus: A type of malware that can replicate itself and spread to other computers.
    • Trojan Horse: Malware disguised as legitimate software.
    • Firewall: A security system that protects a computer network from unauthorized access.
    • Antivirus Software: Software that detects and removes malware.
    • Security Patch: A software update that fixes security vulnerabilities.
    • Encryption: The process of converting data into an unreadable format, making it secure from unauthorized access.

    Digital Media

    • Digital Media: Data stored and transmitted electronically, such as images, videos, and music.
    • Codec: A software algorithm used to compress and decompress digital media files.
    • File Formats: Formats used to store digital media files. Examples include:
      • JPEG (JPG): A common image file format known for its compression capabilities.
      • PNG (Portable Network Graphics): An image file format known for its ability to store images without loss of quality.
      • MP3: A common audio file format known for its efficient compression.
      • MP4: A common video file format that can store both audio and video data.,
      • PDF (Portable Document Format): A file format used to create and distribute documents that can be viewed on various devices.

    Internet & Web Terminology

    • 3G, 4G, 5G: Generations of cellular network technology, offering increasing speeds & capabilities.
    • 403 Error, 404 Error: HTTP error codes indicating a webpage cannot be displayed. 403 - Forbidden (access denied) 404 - Not Found (page doesn't exist)
    • ActiveX: Microsoft technology for creating interactive web content, often used for multimedia and security functionalities.
    • Address Bar: The text box in a web browser displaying the current URL.
    • Adware: Software that displays unwanted advertisements often without user's consent.
    • Affiliate: A program where individuals/companies earn commissions by promoting another company's products/services.
    • Ajax: Asynchronous Javascript and XML: Client-side web development technique for dynamic webpage updates and data loads.
    • Apache: A popular open-source web server software used to host websites.
    • Applet: Small programs embedded in web pages, usually written in Java, to add interactive features.
    • Application Server: A server that runs web applications, handling request processing, data access, and user management.
    • Archie: One of the first internet search engines (pre-web), primarily used for finding files on FTP servers.
    • ASP, ASP.NET: Server-side scripting languages developed by Microsoft for creating dynamic web pages.
    • ATM (Asynchronous Transfer Mode): A high-speed network technology used for data, voice, and video transmission.
    • Attachment: Files sent alongside an email message.
    • AUP (Acceptable Use Policy): Defines rules for users accessing a network or service, outlining permissible actions.
    • Autoresponder: A program that automatically sends pre-written email replies to incoming messages.
    • Avatar: A digital representation of a user, often used in online communities and games.
    • Azure: Cloud computing platform offered by Microsoft, providing services like storage, databases, and computing power.
    • Backbone: Network infrastructure that connects multiple networks.
    • Backlink: A hyperlink from an external website pointing to a specific page.
    • Banner Ad: A rectangular advertisement displayed on websites, typically containing text, images, or animations, often linked to a page outside of the website.
    • Bcc (Blind Carbon Copy): An email address hidden from other recipients.
    • BGP (Border Gateway Protocol): Routing protocol used on the internet to exchange information between networks.
    • Big Data: Extremely large datasets that require specialized tools and techniques for analysis.
    • Bing: A search engine owned by Microsoft.
    • BitTorrent: Peer-to-peer file-sharing protocol allowing users to download large files directly from other users.
    • Blog: A web-based journal or diary typically updated frequently, often containing articles, images, and video.
    • Bookmark: A feature where users can save links to webpages for later access.
    • Bot: An automated program designed to perform specific tasks online, often used for crawling websites, collecting data, or interacting with chat platforms.
    • Botnet: A network of compromised computers controlled by a single attacker, often used to launch DDoS attacks.
    • Bounce: Emails that are undelivered, often due to an invalid email address or server problems.
    • Broadband: High-speed internet connection with a wide range of frequencies.
    • Brute Force Attack: Attempting to gain access to a system by trying multiple passwords.
    • Captcha (Completely Automated Public Turing test to tell Computers and Humans Apart): Security feature used to distinguish human users from bots, typically involving puzzles or tasks that are difficult for bots.
    • Cc (Carbon Copy): An email address that receives a copy of an email sent to other recipients.
    • CDN (Content Delivery Network): A distributed system of servers that deliver content to users based on their location, reducing load times and improving performance.
    • Certificate: A digital document used to verify the identity of a website or an individual, often used for secure web browsing and communication.
    • CIFS (Common Internet File System): A networking protocol that allows sharing files and printers over a network.
    • Client: A computer or program that requests data from a server.
    • Cloud: A network of servers that provide computing resources like storage, databases, and applications over the internet.
    • Cloud Computing: A computing model that allows access to shared computing resources via the internet.
    • Cloud Waste: Inefficient use of cloud computing resources leading to unnecessary costs.
    • CMP (Consent Management Platform): A system used to manage user’s consent for data collection and processing, particularly relevant in connection with privacy regulations like GDPR.
    • CMS (Content Management System): Software that simplifies website creation and management, allowing users to create, edit, and publish content without coding knowledge.
    • Cookie: A small text file stored on a user's computer by a website, used to track user activity and preferences.
    • CORS (Cross-Origin Resource Sharing): A mechanism that enables a web page hosted on one server to access resources hosted on a different server.
    • CPA (Cost Per Acquisition): A pricing model where advertisers pay for each customer acquired.
    • CPC (Cost Per Click): A pricing model where advertisers pay for each click on their advertisements.
    • CPL (Cost Per Lead): A pricing model where advertisers pay for each potential customer generated.
    • CPM (Cost Per Mille): A pricing model where advertisers pay for every 1000 impressions (views) of their advertisements.
    • Cross-Browser: Webpages that are designed to work consistently across various web browsers (e.g., Chrome, Firefox, Safari).
    • CSS (Cascading Style Sheets): A language used to style the presentation of webpages, controlling layout, colors, fonts, and more.
    • CTR (Click-Through Rate): The percentage of users who click on an advertisement after seeing it.
    • Cyberbullying: Harassing or bullying behavior that occurs online.
    • Cyberspace: The virtual environment created by computer networks, including the internet.
    • Cybersquatter: An individual or company that registers a domain name that is similar to a known brand, with the intention to sell it for profit or to use it for phishing or other malicious purposes.
    • Datagram: A unit of data transmitted over a network, often used in UDP (User Datagram Protocol).
    • Denial of Service (DoS): An attack that prevents users from accessing a website or service by overloading the server with traffic.
    • DHCP (Dynamic Host Configuration Protocol): A protocol used to automatically assign IP addresses to devices on a network.
    • Dial-up: A type of internet connection that uses the phone line for access, typically a slower connection.
    • Digital Footprint: The trail of data left behind online by a user's activities, including websites visited, content shared, and online interactions.
    • Direct Digital Marketing: Marketing activities that connect businesses directly with consumers, often through email, SMS, or online ads.
    • DKIM (DomainKeys Identified Mail): A method used to authenticate email messages, reducing the risk of spoofing.
    • DNS (Domain Name System): A hierarchical system used to map domain names to IP addresses, allowing users to access websites by using memorable names instead of numerical addresses.
    • DNS Record: Information stored within the DNS system about a domain name, including its IP address, other server settings.
    • DNSSEC (Domain Name System Security Extensions): A security protocol that aims to protect DNS from spoofing and other attacks.
    • DOM (Document Object Model): A programming interface for HTML documents, allowing scripts to access and manipulate the content and structure of webpages.
    • Domain Name: A unique name that identifies a website on the internet.
    • Domain Suffix: The part of the domain name that comes after the “.” (e.g., “.com”, “.org”, “.net”).
    • Download: Transferring data from a remote server to a local device.
    • Drive-by Download: Installing unwanted software on a user's computer without their knowledge, often through a website or a malicious advertisement.
    • Dynamic Website: A website whose content changes based on user interactions or external factors.
    • E-commerce: Buying and selling goods and services over the internet.
    • E-mail Bankruptcy: A situation where a user's email inbox becomes overwhelmed with spam and unwanted emails.
    • Edge Caching: Storing copies of website content on servers located close to users, improving content delivery speed.
    • Edge Server: A server located on the edge of a network, closer to users than the origin server, used for content caching and other services.
    • EDI (Electronic Data Interchange): A system that allows businesses to exchange documents and data electronically.
    • Email: A digital message sent electronically between users.
    • Email Address: A unique identifier used to send and receive email messages.
    • Email Bomb: Flooding a user or server with a high volume of emails, potentially causing disruption.
    • Emoticon: A stylized text representation of an emotion or expression, used in online communication.
    • Extranet: A private computer network that allows authorized external parties to access a company's intranet.
    • Facebook: A popular social networking platform that allows users to connect, share information, and interact with each other.
    • Favicon: A small icon associated with a website, displayed in a web browser's address bar or tab.
    • Fios: Fiber-optic broadband internet service provided by Verizon.
    • Firewall: A security system that prevents unauthorized access to a computer network or device.
    • Flaming: Aggressive and hostile online communication, often involving insults or personal attacks.
    • Flash: A multimedia and web application development platform developed by Adobe, often used for interactive content, animations, and video playback.
    • Fluid Layout: A web page design that adjusts its layout to fit different screen sizes and devices.
    • Friend: A connection on a social networking platform, indicating a level of familiarity and shared interests.
    • Friendly URL: A web address that is easily readable and understandable by human users, often using plain language instead of technical parameters.
    • FTP (File Transfer Protocol): A protocol used for transferring files between computers.
    • Google: A popular search engine that dominates the online search market.
    • Google Drive: Cloud storage service offered by Google, allowing users to store and access data online.
    • Gopher: An early information retrieval system that preceded the World Wide Web.
    • Graymail: Emails considered unwanted or less important, often from subscriptions or newsletters that the user may not actively engage with.
    • Grid Computing: A computing model that uses a network of geographically dispersed computers to solve complex problems.
    • Handle: A user name or identifier used in online communities or platforms.
    • Hashtag: A word or phrase preceded by a pound sign (#) used to categorize content on social media platforms.
    • Heartbleed: A critical vulnerability in the OpenSSL cryptographic library that allowed attackers to potentially steal sensitive information from websites and servers.
    • Hit: A request for a webpage or web resource.
    • Home Page: The main webpage of a website, typically serving as the entry point and often displaying information about the website's purpose and content.
    • Honeypot: A decoy system designed to attract and trap attackers, allowing security analysts to monitor their activities and collect information about potential threats.
    • HTML (HyperText Markup Language): The standard markup language used to create webpages.
    • HTML5: The latest version of HTML, incorporating new features and functionalities like video and audio support, better performance, and improved accessibility.
    • HTTP (HyperText Transfer Protocol): The protocol used to exchange data between web servers and web browsers.
    • HTTPS (HyperText Transfer Protocol Secure): A secure version of HTTP that uses encryption to protect data transmitted between web servers and web browsers.
    • Hyperlink: A link embedded in a webpage that allows users to navigate to another webpage or resource.
    • Hypermedia: A system that allows users to access and navigate information in a non-linear way, through multimedia connections.
    • Hypertext: A system that allows users to access and navigate information by following linked text.
    • IANA (Internet Assigned Numbers Authority): An organization that assigns and manages IP addresses, domain names, and other internet resources.
    • ICANN (Internet Corporation for Assigned Names and Numbers): A nonprofit organization responsible for coordinating and managing the internet's domain name system.
    • ICF (Internet Control File): A file that stores configuration information about a particular website.
    • iCloud: Cloud storage service offered by Apple, allowing users to sync data across their Apple devices.
    • ICMP (Internet Control Message Protocol): A network protocol used for error handling and debugging.
    • ICQ: An instant messaging service that was popular in the early days of the internet.
    • ICS (Industrial Control System): A computerized system used to monitor and control industrial operations.
    • ICT (Information and Communications Technology): A broad term encompassing various technologies related to information processing and communication, including computers, phones, internet, and software.
    • Iframe: An HTML element that allows a website to embed content from another website.
    • IIS (Internet Information Services): A web server software developed by Microsoft.
    • IM (Instant Messaging): A messaging service that allows users to communicate in real-time, often with features like text, audio, and video calls.
    • IMAP (Internet Message Access Protocol): A protocol used to access and manage email messages on a server.
    • Impression: A single view of an advertisement, webpage, or other online content.
    • Inbox: The folder in an email client where incoming email messages are stored.
    • Influencer: An individual with a significant following and influence over a particular community, often used by businesses to promote products or services.
    • Instagram: A popular social media platform for sharing photos and videos.
    • Internet: A global network of computer networks that enables information access, communication, and data sharing.
    • Internet of Things (IoT): The interconnected network of physical devices, vehicles, and household appliances with embedded sensors, software, and network connectivity.
    • InterNIC: A former organization that managed the early internet's domain name system and other infrastructure-related tasks.
    • IP (Internet Protocol): A protocol that defines the format and address of data packets sent over the internet.
    • IP Address: A unique numerical identifier assigned to every device connected to the internet that enables communication between devices.
    • IPsec (Internet Protocol Security): A suite of protocols that provide secure communication over IP networks.
    • IPv4 (Internet Protocol Version 4): The original version of the IP protocol, using 32-bit addresses.
    • IPv6 (Internet Protocol Version 6): The latest IP protocol version, using 128-bit addresses, allowing for a larger address space to accommodate the growing number of devices connected to the internet.
    • IRC (Internet Relay Chat): A protocol and network for real-time, text-based communication.
    • iSCSI (Internet Small Computer System Interface): A protocol that enables storage devices to be accessed over a network, often using Ethernet connections.
    • ISDN (Integrated Services Digital Network): A digital network technology that provides voice, data, and video services over a single line.
    • ISP (Internet Service Provider): A company that provides internet access to users.
    • JavaScript: A widely-used client-side scripting language for creating interactive webpages.
    • Jitter: Variations in network latency, causing delays and disruptions in real-time communication.
    • jQuery: A Javascript library that simplifies web development by providing a variety of tools and functionalities for DOM manipulation, event handling, and AJAX requests.
    • JSF (JavaServer Faces): A Java framework used for building user interfaces for web applications.
    • JSP (JavaServer Pages): A Java technology that allows developers to dynamically generate web content.
    • JWT (JSON Web Token): A standard for creating and verifying security tokens used to securely transmit information between parties.
    • Keep-Alive: A connection setting used to keep a connection open between a web browser and a server, reducing the time needed for subsequent requests.
    • Lag: A delay in network communication, often caused by network congestion, high latency, or processing delays.
    • LAMP: A common web development stack consisting of Linux, Apache, MySQL, and PHP.
    • Landing Page: A single-page website designed to capture user information or encourage a specific action.
    • Lazy Loading: A web development technique that delays loading of images or other content until they are needed, improving page load times.
    • LDAP (Lightweight Directory Access Protocol): A protocol used to access and query directory services, often used to manage user accounts and other network information.
    • Lead: A potential customer who has expressed interest in a product or service.
    • Leaderboard: A banner advertisement that typically displays at the top of a webpage.
    • Leet: A slang term for using alternative characters (e.g., "1337" for "leet") often used in online communities.
    • Link: A connection between different parts of a document, webpage, or network.
    • LinkedIn: A professional social networking platform for career development and business networking.
    • LISTSERV: An email list management software.
    • Live Streaming: Transmitting video or audio content in real-time over the internet, allowing users to watch events as they happen.
    • Mail Server: A server that handles email transmission and storage.
    • Martech: The combination of marketing and technology, encompassing various software and tools used for marketing automation, data analysis, and customer engagement.
    • Mashup: A website or web application that combines content and functionalities from multiple sources, often using APIs (Application Programming Interfaces).
    • Media Queries: A CSS feature that allows websites to dynamically adjust their layout based on screen size, device type, and other factors.
    • Meme: An idea, image, or piece of content that spreads rapidly online, often with humorous or satirical connotations.
    • Meta Search Engine: A search engine that queries multiple search engines simultaneously, providing a broader range of results.
    • Meta Tag: A hidden HTML tag used to provide information about a webpage, such as keywords, description, or author.
    • Metaverse: A concept of a persistent, immersive virtual world where users can interact with each other, create content, and participate in a variety of activities.
    • Microblogging: Short-form blogging, typically involving short messages and updates, popularized by platforms like Twitter and Tumblr.
    • MIME Type: A code that identifies the type of a file, such as a text document, image, or video.
    • Minisite: A small, focused website with a specific purpose or target audience.
    • Mirror: A copy of a website hosted on a different server, providing redundancy and improved content delivery.
    • Moodle: An open-source learning management system used for online education and training.
    • Multicast: A type of network communication where data is sent to multiple recipients simultaneously.
    • MySpace: A social networking platform that was popular in the early days of social media.
    • Name Server: A server that handles domain name resolution, converting domain names into IP addresses.
    • NAT (Network Address Translation): A process that allows multiple devices on a private network to share a single public IP address.
    • Navigation Bar: A set of links on a webpage that allows users to navigate to different sections of the website.
    • Net Neutrality: The principle that internet service providers should treat all internet traffic equally, without favoring certain websites or applications over others.
    • Netiquette: A set of rules and guidelines for polite online communication.
    • Netmask: A combination of IP addresses used to identify the network to which a specific device belongs.
    • Newsgroup: A discussion forum on the Usenet network where users can post messages and participate in online conversations.
    • Nextdoor: A social networking platform that connects people in local communities.
    • NNTP (Network News Transfer Protocol): A protocol used to access and transmit newsgroup content.
    • NOC (Network Operations Center): A facility that monitors and manages network infrastructure, often staffed with technical personnel to respond to network outages or security incidents.
    • Node.js: An open-source, server-side JavaScript runtime environment used for creating web applications and other network-based applications.
    • NoSQL: A category of database management systems that use flexible data models and do not follow the strict relational database schema.
    • NSP (Network Service Provider): A company that provides network services like internet access, data connectivity, and telecommunications.
    • NTP (Network Time Protocol): A protocol used to synchronize clocks across a network, ensuring accurate timekeeping.
    • Optical Carrier: A high-speed communication technology that uses light pulses to transmit data.
    • Origin Server: The primary server that hosts a website's content.
    • OSPF (Open Shortest Path First): A routing protocol used within a single autonomous system (a network organization) to determine the best path for data packets.
    • OTT (Over-the-Top): A method of delivering video and other content over the internet without requiring a traditional cable or satellite subscription.
    • Outbox: The folder in an email client where outgoing email messages are held temporarily before being sent.
    • P2P (Peer-to-Peer): A network architecture where devices communicate directly with each other without the need for a central server.
    • Packet: A unit of data transmitted over a network.
    • Page View: A single instance of a webpage being loaded, indicating a user visiting a specific page.
    • Parked Domain: A domain name that is registered but does not have any content associated with it yet.
    • Payload: The data or code contained within a data packet or a malware file.
    • Permalink: A permanent, unchanging URL for a specific web page that allows users to directly access it.
    • Personal URL: A unique URL associated with an individual, often used to share contact information or link to their profile on social media platforms.
    • Pharming: A type of cyberattack where users are redirected to a fake website, often designed to steal personal information or install malware.
    • Phishing: A type of cyberattack where users are tricked into revealing sensitive information, often through fraudulent emails or websites.
    • PHP: A popular server-side scripting language used for creating dynamic web pages.
    • PIM (Product Information Management): A system used to manage product data and information across multiple channels.
    • Ping: A network utility used to test connectivity between devices, determining if a specific IP address is reachable.
    • Pinterest: A social media platform for sharing and discovering images and ideas.
    • PON (Passive Optical Network): A technology that uses fiber-optic cables to deliver high-speed internet access.
    • POP3 (Post Office Protocol 3): A protocol used to receive email messages from a server.
    • Portal: A website that serves as a gateway to other websites, often providing a collection of content, services, and tools.
    • PPC (Pay-Per-Click): A pricing model where advertisers pay for each click on their advertisements.
    • PPL (Pay Per Lead): A pricing model where advertisers pay for each potential customer (lead) generated.
    • PPP (Point-to-Point Protocol): A protocol used to create dial-up connections between two computers.
    • PPPoE (Point-to-Point Protocol over Ethernet): A protocol that extends PPP to work over Ethernet networks.
    • PPS (Pay Per Sale): A pricing model where advertisers pay for each sale generated through their advertisements.
    • PPTP (Point-to-Point Tunneling Protocol): A protocol used to establish secure VPN (Virtual Private Network) connections.
    • Primitive: A basic technology or element that forms the foundation for more complex systems.
    • Progressive Web App: A type of web application designed to behave like a native mobile app with offline capabilities, push notifications, and other features.
    • Protocol: A set of rules that govern the format and transmission of data between devices.
    • Proxy Server: A server that acts as an intermediary between a user's computer and the internet, often used to enhance security, control access, and provide anonymity.
    • RADCAB (Remote Authenticated Dial-in User Service): A protocol used to authenticate users connecting to a network remotely, often used for VPN connections.
    • Ransomware: A type of malware that encrypts a victim's data and demands a ransom payment for its decryption.
    • Reciprocal Link: A hyperlink between two websites, where each website links to the other.
    • Responsive Web Design: A design approach that makes websites adapt to different screen sizes and devices, providing an optimal viewing experience for all users.
    • REST (Representational State Transfer): An architectural style for creating web services, emphasizing simplicity and use of standard HTTP methods.
    • RPM (Revolutions Per Minute): A unit of measurement for the rotational speed of a disk drive or other spinning devices.
    • RSS (Really Simple Syndication): A format for distributing web content updates, allowing users to subscribe to feeds and receive notifications of new content.
    • RTMP (Real-Time Messaging Protocol): A protocol used to stream live video and audio over the internet.
    • Sass: A CSS preprocessor that allows developers to write cleaner, more organized code.
    • Scraping: Extracting data from a website automatically, often using web bots or software tools.
    • SDSL (Symmetric Digital Subscriber Line): A type of digital subscriber line (DSL) that provides symmetrical upload and download speeds.
    • Search Engine: A software program that searches for information on the internet, indexing and organizing webpages to provide relevant search results.
    • SEO (Search Engine Optimization): The practice of optimizing websites and online content to improve their ranking in search engine results pages (SERPs).
    • SERP (Search Engine Results Page): The list of search results displayed by a search engine.
    • Servlet: A server-side Java program used to generate dynamic web content.
    • Session: A temporary connection between a user and a server, often used to store information about a user’s activity during a browsing session.
    • SIP (Session Initiation Protocol): A protocol used for initiating and managing multimedia communication sessions over IP networks, often used for VoIP (Voice over IP).
    • Sitemap: A file that lists all the pages of a website, often used to help search engines discover and index website content.
    • Skyscraper: A banner advertisement that displays on the side of a webpage, often stretching vertically to capture user attention.
    • Slashdot: A popular technology news website that aggregates and publishes news from various technology-related sources.
    • Smishing: A type of phishing scam that uses SMS messages to trick users into revealing personal information.
    • SMM (Social Media Marketing): The use of social media platforms to promote products, services, and brands.
    • SMTP (Simple Mail Transfer Protocol): A protocol used for sending email messages.
    • SOAP (Simple Object Access Protocol): A protocol used to exchange structured data over the internet, often used for web services.
    • Social Engineering: A type of cyberattack that relies on manipulation and deception to gain access to systems or information.
    • Social Media: Online platforms that allow users to connect, share content, and communicate with each other.
    • Social Networking: The practice of creating and maintaining online relationships with others.
    • Socket: A communication endpoint on a network between two devices.
    • Spam: Unsolicited bulk email messages, often sent to large numbers of people.
    • SPF (Sender Policy Framework): An email authentication mechanism that helps prevent email spoofing by verifying the sender's identity.
    • Spider: A software program used by search engines to crawl and index webpages, discovering new content and information.
    • Spoofing: Masquerading as a legitimate entity to gain unauthorized access to a system or to deceive users.
    • SSH (Secure Shell): A protocol used for secure remote access to computer systems, providing secure communication between servers and clients.
    • SSL (Secure Sockets Layer): A protocol that provides encryption and authentication for communication over the internet.
    • SSO (Single Sign-On): A system that allows users to authenticate once and access multiple applications or websites without re-entering their credentials.
    • Static Website: A website with fixed content that does not change dynamically based on user interactions or external factors.
    • Streaming: Transmitting audio or video data in real-time over the internet, allowing users to listen to or watch content as it is being played.
    • SYN Flood: A type of denial-of-service (DoS) attack that attempts to overwhelm a server with connection requests, preventing legitimate users from accessing the server.
    • T1, T3: Types of high-speed leased lines used for internet access, often used by businesses. T3 has a higher speed than T1.
    • Tag: A key word associated with a piece of web content, often used to categorize content and improve searchability.
    • TCP (Transmission Control Protocol): A protocol that provides reliable data transmission over the internet, ensuring data integrity and order.
    • TCP/IP (Transmission Control Protocol/Internet Protocol): The foundational suite of protocols used for communication over the internet.
    • Telnet: A protocol used for remote access to computer systems, often used to administer servers or devices.
    • TLS (Transport Layer Security): A more modern and secure version of SSL, providing encryption and authentication for communication over the internet.
    • Traceroute: A network utility that tracks the path data takes from a source device to a destination device.
    • Trackback: A technology used to notify a website when a blog post or article links to it, enabling a backlink to be established.
    • Troll: An individual who deliberately posts inflammatory or off-topic messages in online forums or communities to provoke reactions.
    • TTL (Time-to-Live): A setting that specifies how long a DNS record should be cached by intermediary servers, influencing the time it takes for updates to propagate.
    • Tumblr: A social media platform for microblogging, allowing users to share text, images, videos, and other content.
    • Tunneling: A technique that allows data to be transmitted securely over a network by encapsulating it within another protocol.
    • Tweet: A short message posted on Twitter.
    • Twitch: A live streaming platform focused on video gaming content.
    • Twitter: A microblogging platform where users can post short messages called tweets.
    • UDP (User Datagram Protocol): A protocol used to send and receive data packets, less reliable than TCP but offering faster transmission.
    • UGC (User-Generated Content): Content created by users and shared on online platforms, often including reviews, comments, photos, videos, and articles.
    • Unfriend: Removing a person from your friend list on a social networking platform.
    • Unicast: A type of network communication where data is sent to a single recipient address.
    • Upload: Transferring data from a local device to a remote server.
    • URI (Uniform Resource Identifier): A general term for a string of characters used to identify a resource on the internet.
    • URL (Uniform Resource Locator): A specific type of URI that specifies the address of a resource on the internet.
    • Usenet: A global network of discussion groups where users can post messages and engage in online conversations.
    • VCI (Virtual Channel Identifier): A unique identifier used to distinguish between multiple virtual circuits within a single physical connection.
    • VDSL (Very-high-speed Digital Subscriber Line): A high-speed DSL technology that offers speeds much faster than traditional DSL.
    • VIP (Virtual Internet Protocol): A technology that allows one physical network connection to be shared by multiple users on separate virtual private networks (VPNs).
    • Vlog (Video Blog): A blog that primarily uses video content.
    • VoIP (Voice over IP): A technology that allows voice calls to be made over the internet, using digital data instead of traditional telephone lines.
    • VPI (Virtual Path Identifier): A unique identifier used to distinguish between multiple virtual paths that share a single physical connection.
    • VPN (Virtual Private Network): A technology that creates a secure, encrypted connection over the internet, often used to protect online privacy, access geographically restricted content, or bypass network restrictions.
    • VPS (Virtual Private Server): A virtualized server hosted on a physical server, providing users with dedicated resources and greater control compared to shared hosting.
    • W3C (World Wide Web Consortium): An international consortium that develops standards for the World Wide Web.
    • WAIS (Wide Area Information Server): An early information retrieval system that allowed users to search for data in distributed databases.
    • WAN (Wide Area Network): A network that connects computers over a large geographical area, often using multiple technologies and protocols.
    • Web 2.0: A term that refers to the evolution of the World Wide Web, characterized by increased user interaction, social media, and web applications.
    • Web Application: A software application that is accessed and run over the internet, typically using a web browser.
    • Web Beacon: A type of tracking technology used to monitor user behavior on websites, often embedded in images or invisible tags.
    • Web Design: The process of creating and developing websites, including planning, layout, graphics, and usability.
    • Web Development: The process of building and maintaining websites, encompassing programming, database management, and content creation.
    • Web Forum: An online discussion platform where users can post messages, reply to others, and participate in conversations on specific topics.
    • Web Host: A company that provides server space and other resources to host websites online.
    • Web Publishing: The process of making content available online, often involving website creation, content uploading, and server administration.
    • Web Server: A server that hosts websites, handling requests from clients and delivering webpage content.
    • Web Service: A software application that exposes functionalities and data over the internet, often using APIs (Application Programming Interfaces) to allow other applications to access and interact with it.
    • Webhook: A method for automatically sending messages to a URL, often used to trigger actions or notifications in other applications.
    • Webmail: An email service accessed through a web browser.
    • Webmaster: An individual responsible for managing a website, including content updates, maintenance, and technical administration.
    • Webpage: A single document that makes up a website, displayed in a web browser.
    • Webring: A group of websites that have been linked together, often sharing a common theme or audience.
    • Website: A collection of web pages that are linked together and accessed through a domain name.
    • WHOIS: A database that stores information about domain names, including the registrant's details and contact information.
    • Wiki: A collaboratively edited website that allows users to contribute and modify content.
    • WINS (Windows Internet Name Service): A Microsoft-specific domain name service used within Windows networks.
    • WordPress: A popular content management system (CMS) used to create and manage websites.
    • WWW (World Wide Web): The collection of interconnected documents and resources accessed through the internet.
    • XaaS (Anything as a Service): A general term for delivering various resources and services over the internet, often referring to cloud computing models like SaaS (Software as a Service), PaaS (Platform as a Service), and IaaS (Infrastructure as a Service).
    • XHTML (Extensible HyperText Markup Language): A strict version of HTML that follows XML syntax rules.
    • Yahoo! A search engine and internet portal that was once a major competitor to Google.

    Hardware

    • CPU (Central Processing Unit): The brain of the computer, responsible for processing instructions and data.
    • GPU (Graphics Processing Unit): Specialized processor designed to enhance graphical performance, often used for gaming and video editing.
    • RAM (Random Access Memory): Short-term memory that stores currently used data and programs, allowing fast access.
    • HDD (Hard Disk Drive): A storage device that uses spinning platters to store data long-term.
    • SSD (Solid-State Drive): A storage device that uses flash memory for faster data access and increased durability compared to HDDs.
    • Motherboard: The main circuit board that connects all components of a computer.
    • BIOS (Basic Input/Output System): A program that initializes the computer and loads the operating system.
    • Input Devices: Devices that allow users to interact with the computer, such as keyboards, mice, and touchscreens.
    • Output Devices: Devices that display or output information from the computer, such as monitors, printers, and speakers.
    • Networking: The process of connecting multiple computers together to share resources and data.

    Software

    • Operating System: The software that controls the hardware and provides a user interface for accessing the computer's resources.
    • Application Software: Programs designed for specific tasks, such as word processing, spreadsheets, and web browsing.
    • System Software: Programs that provide low-level functionalities to the operating system, such as device drivers and utilities.
    • Programming Languages: Languages used to create software by writing instructions for the computer to follow.
    • Database: Structured collection of data organized to enable efficient storage and retrieval.
    • Web Browser: Software that allows users to access and view web pages.

    Technology Concepts

    • Cloud Computing: The delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”).
    • Virtualization: Technology that creates a virtual version of a physical computer, allowing multiple operating systems to run simultaneously on a single machine.
    • Artificial Intelligence (AI): The intelligence demonstrated by machines, as opposed to the natural intelligence displayed by humans.
    • Machine Learning (ML): A subset of AI that allows systems to learn from data and improve their performance over time without explicit programming.
    • Internet of Things (IoT): A network of interconnected devices, vehicles, appliances, and even people that collect and exchange data over the internet.

    Data and Storage

    • Data: Raw facts and figures that can be processed to extract information and knowledge.
    • File: Collection of data stored on a computer under a specific name.
    • File System: A hierarchical method of organizing files and folders on a storage device.
    • Bit: The smallest unit of data, representing a 0 or a 1.
    • Byte: A unit of data consisting of 8 bits.
    • Data Types: Categories of data, such as integers, strings, and booleans.
    • Data Compression: Techniques that reduce the size of data files while preserving content.

    Network Concepts

    • Network: A group of interconnected devices that communicate with each other.
    • IP Address: A unique numerical address assigned to each device on a network.
    • Domain Name: A user-friendly name, such as google.com, that corresponds to a numerical IP address.
    • Router: A device that forwards data packets between networks.
    • Protocols: Sets of rules that govern communication between devices on a network. Common protocols include TCP, UDP, and HTTP.

    Security

    • Firewall: A security system that monitors incoming and outgoing network traffic and blocks unauthorized access.
    • Antivirus Software: A program that detects and removes harmful software, including viruses and malware.
    • Encryption: The process of converting data into an unreadable format to protect it from unauthorized access.
    • Password: A secret string of characters used to authenticate users and protect data.
    • Cybersecurity: The practice of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction.

    Internet Technologies & Concepts

    • 3G, 4G, 5G: Cellular technology generations, each offering faster data speeds and improved connectivity.
    • ActiveX: Microsoft technology enabling interactive web content, often associated with vulnerabilities.
    • Address Bar: The field in a web browser displaying the current URL.
    • Adware: Software designed to display unwanted ads.
    • Affiliate: A program where websites earn commissions for promoting other websites.
    • Ajax: Technology allowing web pages to update asynchronously without full page reloads.
    • Apache: Popular web server software used for hosting websites.
    • Applet: A small, self-contained program designed to run within a web browser.
    • Application Server: Software handling requests from web applications and delivering responses.
    • ASP (Active Server Pages) & ASP.NET: Microsoft frameworks for building dynamic web pages.
    • Attachment: A file sent along with an email.
    • Avatar: A digital representation of a user, often used in online communities.
    • Azure: Microsoft's cloud computing platform.
    • Backbone: A high-speed network connecting major internet hubs.
    • Backlink: A link from one website to another.
    • Banner Ad: A rectangular advertisement displayed on a webpage.
    • BGP (Border Gateway Protocol): Routing protocol for internet traffic exchange.
    • Big Data: Large, complex datasets that require specialized tools for analysis.
    • BitTorrent: File-sharing protocol allowing users to download large files from multiple sources.
    • Blog: A website where content is presented in reverse chronological order.
    • Bookmark: A saved link for easy access to a web page.
    • Bot: An automated program that performs tasks online, often used for scraping or monitoring.
    • Botnet: A network of compromised computers controlled by a single entity.
    • Broadband: High-speed internet access.
    • Brute Force Attack: A cyberattack attempting to guess passwords by trying multiple combinations.
    • Captcha: Security measure requiring users to prove they are human.
    • CDN (Content Delivery Network): A network of servers delivering content closer to users, improving performance.
    • Certificate: Digital document verifying the authenticity of a website or individual.
    • Client: A computer or device accessing services from a server.
    • Cloud: A network of data centers offering computing services over the internet.
    • Cloud Computing: Accessing computing resources over the internet.
    • Cloud Waste: Inefficient use of cloud resources leading to increased costs.
    • CMS (Content Management System): Software facilitating website creation and management.
    • Cookie: Data stored on a user's computer by a website, used for personalization and tracking.
    • CORS (Cross-Origin Resource Sharing): Mechanism controlling how web pages interact with resources from different domains.
    • CPA (Cost Per Acquisition): Advertising model where advertisers only pay when a specific action is completed.
    • CPC (Cost Per Click): Advertising model where advertisers pay each time an ad is clicked.
    • CPL (Cost Per Lead): Advertising model where advertisers pay when a lead is generated.
    • CPM (Cost Per Mille): Advertising model where advertisers pay per 1000 impressions.
    • CSS (Cascading Style Sheets): Language defining the look and feel of a webpage.
    • CTR (Click-Through Rate): The percentage of users who click on an ad after seeing it.
    • Cyberbullying: Harassing or bullying someone online.
    • Cyberspace: The virtual world created by computer networks.
    • Cybersquatter: Someone who registers domain names with the intention of selling them for profit.
    • Denial of Service (DoS): Cyberattack attempting to make a server unavailable to legitimate users.
    • DHCP (Dynamic Host Configuration Protocol): Protocol assigning IP addresses to devices on a network.
    • Digital Footprint: All online information about a person.
    • Direct Digital Marketing: Marketing efforts reaching target audiences directly through digital channels.
    • DNS (Domain Name System): System translating human-readable domain names into IP addresses.
    • DNS Record: A database entry mapping a domain name to an IP address.
    • DNSSEC (Domain Name System Security Extension): Technology preventing DNS spoofing attacks.
    • Domain Name: A human-readable address for a website.
    • Domain Suffix: The part of a domain name after the dot (e.g., .com, .net).
    • Download: Transferring data from a server to a user's computer.
    • Dynamic Website: A website whose content changes based on user input or data.
    • E-commerce: Buying and selling goods online.
    • Edge Caching: Storing website data in edge servers closer to end users to improve performance.
    • EDI (Electronic Data Interchange): Exchanging data between businesses electronically.
    • Email: Electronic mail used for communication.
    • Email Bomb: Sending a large volume of emails to overwhelm an inbox.
    • Emoticon: A graphical representation of an emotion used in online communication.
    • Extranet: Private network accessible to authorized users outside an organization.
    • Favicon: A small icon displayed in a web browser's address bar.
    • Firewall: Software or hardware blocking unauthorized access to a network.
    • Flash: A technology for creating interactive multimedia content, now largely replaced by HTML5.
    • Fluid Layout: A website design that adapts to different screen sizes.
    • Friendly URL: A human-readable and easy-to-understand web page address.
    • FTP (File Transfer Protocol): Protocol for transferring files between computers.
    • Google Drive: Google's cloud storage service.
    • Gopher: Early internet protocol used for distributing files and information.
    • Grid Computing: Using multiple computers to solve complex problems.
    • Hashtag: A keyword or phrase prefixed with a "#" used to categorize online content.
    • Heartbleed: A security vulnerability affecting OpenSSL, allowing attackers to steal data.
    • Hit: A request made to a web server.
    • Home Page: The main page of a website.
    • Honeypot: A decoy system designed to attract attackers and collect information.
    • HTML (HyperText Markup Language): The foundation of web pages.
    • HTML5: The latest version of HTML, adding new features and capabilities.
    • HTTP (HyperText Transfer Protocol): Protocol for transferring data over the internet.
    • HTTPS (HyperText Transfer Protocol Secure): Secure version of HTTP using encryption.
    • Hyperlink: A link to another web page or resource.
    • Hypermedia: Multimedia content used to convey information.
    • Hypertext: Text with links to related content.
    • IANA (Internet Assigned Numbers Authority): Organization managing IP addresses and domain names.
    • ICANN (Internet Corporation for Assigned Names and Numbers): Non-profit organization responsible for coordinating the internet's naming system.
    • iCloud: Apple's cloud storage service.
    • ICMP (Internet Control Message Protocol): Protocol used for error messages and network diagnostics.
    • IM (Instant Messaging): Real-time text communication over the internet.
    • IMAP (Internet Message Access Protocol): Protocol for accessing emails on a server.
    • Impression: A single display of an ad to a user.
    • Influencer: A person with a large and engaged following who can influence opinions and behavior.
    • Internet: Global network of computers interconnected via various protocols.
    • Internet of Things (IoT): Network of devices connected to the internet, allowing them to communicate and collect data.
    • IP (Internet Protocol): A set of rules governing communication over the internet.
    • IP Address: A unique numerical address for a device on the internet.
    • IPv4: The original version of the internet protocol, using 32-bit addresses.
    • IPv6: The newer internet protocol, using 128-bit addresses to handle the growing number of devices.
    • IRC (Internet Relay Chat): Protocol for real-time online chat.
    • ISP (Internet Service Provider): A company offering internet access.
    • JavaScript: Programming language used for creating interactive web content.
    • JQuery: JavaScript library simplifying web development.
    • Keep-Alive: HTTP header indicating that a connection should remain open after a request.
    • Lag: Delay in network communication.
    • LAMP: Popular open-source web development stack consisting of Linux, Apache, MySQL, and PHP.
    • Landing Page: A webpage designed to capture leads or promote a specific product or service.
    • LDAP (Lightweight Directory Access Protocol): Protocol used to access directories containing user information.
    • Lead: A potential customer interested in a product or service.
    • Leet: A way of writing letters using similar-looking characters (e.g., 1337 for "leet").
    • LinkedIn: Professional social networking site.
    • Live Streaming: Broadcasting live video content over the internet.
    • Mail Server: A server handling emails.
    • Mashup: A website combining data and functionality from multiple sources.
    • Meme: An idea or image copied and spread online.
    • Meta Search Engine: A search engine that queries multiple search engines to provide results.
    • Meta Tag: HTML tags providing information about a web page for search engines.
    • Metaverse: A virtual world where users can interact with each other and digital objects.
    • Microblogging: Sharing short messages or updates, typically on social media platforms like Twitter.
    • MIME Type (Multipurpose Internet Mail Extensions): A code describing the format of a file.
    • Minisite: A small website focusing on a specific topic or product.
    • Mirror: A server containing a copy of a website or file.
    • Moodle: Learning management system used for online courses and education.
    • MySpace: Early social networking site.
    • Name Server: Server maintaining the DNS records for a domain.
    • NAT (Network Address Translation): Technique allowing multiple devices to share a single IP address.
    • Navigation Bar: A menu on a website allowing users to navigate between pages.
    • Net Neutrality: The principle that internet service providers should treat all data equally.
    • Netiquette: Rules of online etiquette.
    • Netmask: A mask used to identify the network portion of an IP address.
    • Newsgroup: Online forum for discussion of specific topics.
    • NNTP (Network News Transfer Protocol): Protocol used for accessing newsgroups.
    • Node.js: JavaScript runtime environment used for building web applications.
    • NoSQL: Data storage systems that don't rely on relational databases.
    • NTP (Network Time Protocol): Protocol for synchronizing clocks on computers.
    • Origin Server: The primary server hosting a website's content.
    • OSPF (Open Shortest Path First): Routing protocol used in internet networks.
    • OTT (Over-the-Top): Content distributed directly to consumers via the internet, bypassing traditional cable or satellite providers.
    • P2P (Peer-to-Peer): Network where computers communicate directly with each other without a central server.
    • Packet: A unit of data transmitted over a network.
    • Page View: A single instance of a user accessing a web page.
    • Parked Domain: A domain name registered but not yet associated with a website.
    • Payload: Harmful code delivered by malware.
    • Permalink: A permanent link to a specific web page.
    • Personal URL: A customized URL used to direct users to your online presence.
    • Pharming: Redirecting users to fraudulent websites by manipulating DNS settings.
    • Phishing: Attempting to trick users into revealing sensitive information.
    • PHP: Server-side scripting language often used for building web applications.
    • Ping: Network utility sending a request to a device to check connectivity.
    • Pinterest: Social media platform for sharing visual content.
    • POP3 (Post Office Protocol version 3): Protocol used for downloading emails from a server.
    • Portal: Website serving as a gateway to other websites and resources.
    • PPC (Pay Per Click): Advertising model where advertisers pay each time a user clicks on their ad.
    • PPL (Pay Per Lead): Advertising model where advertisers pay for each lead generated.
    • PPP (Point-to-Point Protocol): Protocol used for establishing direct connections between two devices.
    • PPS (Pay Per Sale): Advertising model where advertisers pay when a sale is made.
    • PPTP (Point-to-Point Tunneling Protocol): A protocol for establishing secure VPN connections.
    • Progressive Web App: A web application designed to function similarly to a native app.
    • Protocol: A set of rules defining communication between devices.
    • Proxy Server: A server acting as an intermediary between a client and the internet.
    • Ransomware: Malware encrypting a victim's files and demanding payment for decryption.
    • Reciprocal Link: A link between two websites where each website links to the other.
    • Responsive Web Design: A design approach making websites adaptable to different screen sizes.
    • REST (Representational State Transfer): A web architectural style for building web services.
    • RSS (Really Simple Syndication): A format for distributing web content updates.
    • Scraping: Extracting data from websites using automated tools.
    • Search Engine: A website or program used to find information on the internet.
    • SEO (Search Engine Optimization): The practice of optimizing websites to rank highly in search results.
    • SERP (Search Engine Results Page): The page displayed by a search engine after a query.
    • Servlet: Java program running on a web server to handle HTTP requests.
    • Session: A temporary interaction between a user and a website.
    • SIP (Session Initiation Protocol): Protocol used for setting up and managing VoIP calls.
    • Sitemap: A file listing all pages on a website, used by search engines to crawl them.
    • Slashdot: A popular technology news website.
    • SMM (Social Media Marketing): Marketing strategies using social media platforms.
    • SMTP (Simple Mail Transfer Protocol): Protocol used for sending emails.
    • SOAP (Simple Object Access Protocol): Protocol for exchanging messages between web services.
    • Social Engineering: Tricking people into divulging sensitive information.
    • Social Media: Online platforms where users can create and share content.
    • Social Networking: Communicating and interacting with others online.
    • Socket: A connection point used for communication between programs.
    • Spam: Unwanted or unsolicited electronic messages.
    • SPF (Sender Policy Framework): Standard used to prevent email spoofing by verifying the sender's address.
    • Spider: A program crawling the internet to index websites.
    • Spoofing: Disguising a message or communication to appear legitimate.
    • SSH (Secure Shell): Protocol for secure remote access to computers.
    • SSL (Secure Sockets Layer): A security protocol used to encrypt communications between a website and a user's browser.
    • SSO (Single Sign-On): A system allowing users to log in to multiple websites using a single set of credentials.
    • Static Website: A website with content that remains unchanged unless manually updated.
    • Streaming: Delivering data in a continuous stream, allowing playback as it's received.
    • SYN Flood: DoS attack flooding a server with SYN packets.
    • Tag: A keyword or label used to categorize information.
    • TCP (Transmission Control Protocol): Protocol providing reliable and ordered delivery of data over the internet.
    • TCP/IP: The combination of TCP and IP, forming the foundation of the internet.
    • Telnet: Protocol for connecting to remote computers, often used for administrative tasks.
    • TLS (Transport Layer Security): Security protocol replacing SSL, providing secure communication between servers and clients.
    • Traceroute: Network utility showing the path taken by data packets between two devices.
    • Trackback: Mechanism for notifying a website when another website links to it.
    • Troll: Someone who posts inflammatory or off-topic messages online to provoke a reaction.
    • TTL (Time to Live): A period of time after which a DNS record is considered invalid.
    • Tumblr: A social media platform for microblogging and sharing various content.
    • Tweet: A short message posted on Twitter.
    • Twitch: A live streaming platform primarily focused on gaming content.
    • Twitter: A social media platform for microblogging.
    • UDP (User Datagram Protocol): Protocol for fast and unreliable data transmission over the internet.
    • UGC (User-Generated Content): Content created by users on websites or online platforms.
    • Unicast: Sending data to a single recipient.
    • Upload: Transferring data from a user's computer to a server.
    • URI (Uniform Resource Identifier): A generic term for an address used to identify an internet resource.
    • URL (Uniform Resource Locator): The specific address used to identify a web page.
    • Usenet: A distributed network of newsgroups.
    • VDSL (Very-high-bit-rate Digital Subscriber Line): A type of high-speed internet access over telephone lines.
    • Vlog (Video Blog): A video-based blog.
    • VoIP (Voice over Internet Protocol): Making phone calls over the internet.
    • VPN (Virtual Private Network): A network providing secure communication over a public network.
    • VPS (Virtual Private Server): A virtualized server providing resources similar to a dedicated server.
    • W3C (World Wide Web Consortium): Organization setting web standards.
    • WAIS (Wide Area Information Server): Early internet protocol for searching and retrieving information.
    • WAN (Wide Area Network): A computer network spanning a large geographical area.
    • Web 2.0: The second generation of the web, characterized by user-generated content and social interaction.
    • Web Application: Software accessed and run over the internet.
    • Web Beacon: A small image used to track user behavior on a website.
    • Web Design: The process of creating the visual appearance and functionality of a website.
    • Web Development: The process of building and maintaining websites.
    • Web Forum: Online discussion platform organized by topics.
    • Web Host: A company providing space and resources for websites.
    • Web Publishing: The process of making website content available online.
    • Web Server: A program handling HTTP requests and delivering website content.
    • Web Service: A software system that exposes functionality over the internet.
    • Webhook: A mechanism for delivering notifications or data from one web application to another.
    • Webmail: Email accessed through a web browser.
    • Webmaster: The person responsible for maintaining and managing a website.
    • Webpage: A single document within a website.
    • Webring: A group of websites linked together in a circle.
    • Website: A collection of web pages accessible through a single domain name.
    • WHOIS: A database containing information about domain names.
    • Wiki: A collaborative website where users can create and edit content.
    • WordPress: Popular open-source content management system.
    • WWW (World Wide Web): A system for accessing information over the internet.
    • XaaS (X-as-a-Service): Generic term for services delivered over the internet, e.g., SaaS, IaaS, PaaS.
    • XHTML (Extensible HyperText Markup Language): A stricter version of HTML emphasizing XML syntax.
    • Yahoo! Popular internet portal and search engine.

    Data Storage

    • **Byte:**Smallest unit of data a computer can understand.
    • Bit: A binary digit, represented by 0 or 1. A byte contains 8 bits.
    • Kilobyte (KB): 1,024 bytes.
    • Megabyte (MB): 1,024 kilobytes.
    • Gigabyte (GB): 1,024 megabytes.
    • Terabyte (TB): 1,024 gigabytes.
    • Petabyte (PB): 1,024 terabytes.
    • Exabyte (EB): 1,024 petabytes.
    • Zettabyte (ZB): 1,024 exabytes.
    • Yottabyte (YB): 1,024 zettabytes.

    Network Speeds

    • bps: Bits per second, common unit to measure network speed.
    • Kbps: Kilobits per second, 1,000 bits per second.
    • Mbps: Megabits per second, 1,000 kilobits per second.
    • Gbps: Gigabits per second, 1,000 megabits per second.

    Data Types

    • String: A sequence of characters.
    • Integer: A whole number.
    • Floating Point Number: A number with a decimal point.
    • Boolean: A value that can be either True or False.
    • Enum: A set of named constants.
    • BLOB (Binary Large Object): Stores large binary data such as images, audio files, or videos.
    • CLOB (Character Large Object): Stores large amounts of text data.
    • Array: A collection of elements of the same data type.
    • Set: A collection of unique elements, no duplicates allowed.
    • Record: A collection of data fields related to a specific entity, similar to a row in a database table.

    File Systems

    • FAT32: A widely used file system, supports up to 4 GB file size.
    • NTFS: A more advanced file system used in Windows, supports larger files and better security.
    • HFS+: File system used in older macOS systems, supports Unicode character encoding.
    • APFS: Modern file system used in macOS, supports encryption, snapshots, and space sharing.
    • exFAT: A file system designed for external storage media like USB drives, supports large file sizes.
    • Root Directory: The top-level directory in a file system.

    Other Terms

    • Endianness: The order in which bytes are stored in memory.
    • Data Transfer Rate: The rate at which data can be transmitted between devices.
    • Goodput: The actual usable data transfer rate, taking into account overhead and errors.
    • Inode: A data structure in Unix-like file systems that stores information about files.
    • Heap: An area in memory used for dynamic memory allocation during program execution.
    • Null Character: A character with a value of 0, used to mark the end of a string.
    • Nybble: A unit of data consisting of 4 bits.
    • PDU (Protocol Data Unit): A unit of data exchanged between layers in a network protocol stack.
    • Unicode: A character encoding standard that supports a wider range of characters than ASCII.
    • UTF (Unicode Transformation Format): A set of encoding schemes for Unicode characters.

    Internet & Web Technologies

    • Web Development: Primarily focuses on creating, designing, and maintaining websites.
    • Web Design: Focuses on the aesthetic aspects of websites, including visual appeal, user experience, and usability.
    • Web 2.0: Represents the evolution of the web, emphasizing user-generated content, social interaction, and rich media.
    • Web 3.0: Conceptualized as the next stage of the web, characterized by decentralized technologies, artificial intelligence, and the Semantic Web.
    • Domain Name: A human-readable address for a website or server, making it easy to remember and access.
    • Domain Suffix: The ending of a domain name, indicating the domain's purpose (e.g., .com, .org, .net).
    • URL: Uniform Resource Locator, used to identify and locate resources on the internet.
    • URI: Uniform Resource Identifier, a unique string that identifies a specific web resource.
    • Web Server: Software that manages resources and responds to requests from web clients.
    • Application Server: Software that runs and serves web applications, handling requests and responses.
    • Web Service: A software system that uses standardized protocols to exchange data between applications over the internet.
    • Website: A collection of web pages connected and accessible through a single domain name.
    • Webpage: A single document on a website, containing text, images, and other web content.
    • Web Host: A company that provides storage space and resources to host websites.
    • Webmaster: An individual responsible for managing a website, including content, design, and technical aspects.
    • Web Forum: An online platform for discussion and community interaction.
    • Web Publishing: Process of making websites available to the public on the internet.
    • Search Engine: Software that searches the web for information and returns relevant results based on user queries.
    • SEO: Search Engine Optimization, a set of strategies used to improve the visibility and ranking of websites in search engine results.
    • SERP: Search Engine Results Page, the list of websites displayed by a search engine in response to a user query.
    • HTML: HyperText Markup Language, a markup language used to create web pages.
    • HTML5: The latest (fifth) version of HTML, introducing new features and capabilities for web development.
    • CSS: Cascading Style Sheets, a language for defining the style and presentation of HTML documents.
    • JavaScript: A scripting language that adds interactivity, functionality, and dynamic behavior to websites.
    • jQuery: A popular JavaScript library that simplifies and streamlines web development.

    Network & Communication

    • Internet: A global network of interconnected computer networks, facilitating communication and access to information.
    • IP: Internet Protocol, a set of rules that govern how data is transmitted over the internet.
    • IP Address: A unique numerical address assigned to each device connected to the internet.
    • IPv4: The fourth version of IP, utilizing 32-bit addresses.
    • IPv6: The sixth version of IP, utilizing 128-bit addresses to support a larger number of devices.
    • DNS: Domain Name System, a hierarchical system that translates domain names into IP addresses.
    • DNS Record: A database entry that associates a domain name with its corresponding IP address.
    • DHCP: Dynamic Host Configuration Protocol, a network protocol that automatically assigns IP addresses to devices.
    • TCP/IP: A suite of protocols that define the communication structure and data transmission rules on the internet.
    • TCP: Transmission Control Protocol, responsible for providing reliable and ordered data transmission.
    • UDP: User Datagram Protocol, a protocol for fast but less reliable data transmission, often used for streaming media.
    • HTTP: Hypertext Transfer Protocol, a protocol used for transferring webpages and other web resources.
    • HTTPS: Hypertext Transfer Protocol Secure, an encrypted version of HTTP, ensuring secure communication.
    • FTP: File Transfer Protocol, a protocol for transferring files between computers.
    • SMTP: Simple Mail Transfer Protocol, used for sending emails between email servers.
    • POP3 and IMAP: Protocols for receiving emails from an email server to clients like email clients.
    • Email Bomb: A type of attack involving sending a large volume of emails to overwhelm a recipient's mailbox.
    • Spam: Unsolicited or unwanted electronic messages, typically sent indiscriminately and often commercially oriented.

    Cybersecurity & Threats

    • Firewall: A network security system that acts as a barrier, blocking unauthorized access and malicious traffic.
    • Antivirus: Software designed to detect and remove malware, such as viruses, worms, and Trojans.
    • Phishing: A cyberattack that uses fraudulent emails or websites to impersonate legitimate entities, stealing personal information.
    • Ransomware: Malware that encrypts a victim's files and demands payment for decryption.
    • Social Engineering: A type of attack that exploits human psychology to gain access to information or systems.
    • Brute Force Attack: A technique that attempts to guess user credentials by trying multiple combinations.
    • Denial of Service Attack: An attack that aims to overwhelm a server or network with traffic, making it unavailable to legitimate users.
    • Spoofing: An attack that disguises malicious traffic as legitimate, attempting to bypass security measures.
    • CAPTCHA: A challenge-response test used to confirm that a user is human and not a bot.
    • Malware: Malicious software designed to harm computer systems or steal data.
    • Virus: Self-replicating malware that can spread to other files and cause damage.
    • Worm: Self-propagating malware that spreads between computers without human interaction.
    • Trojan Horse: Malware disguised as legitimate software, but with malicious intentions.
    • Spyware: Malware that monitors user activity and steals sensitive data.
    • Adware: Software that displays unwanted advertisements on a user's computer.
    • Botnet: A network of infected computers controlled by a malicious individual or organization.
    • Cyberbullying: The use of electronic communication to bully or harass others.
    • Cybersquatter: An individual who registers domain names that are similar to existing trademarks with the intent to sell them at a profit
    • Heartbleed: A major security vulnerability in OpenSSL, a widely used cryptographic library, that could allow attackers to steal sensitive data.

    Cloud Computing

    • Cloud: Refers to a network of remote servers and data storage facilities that provide computing resources and services on demand.
    • Cloud Computing: A model for delivering computing services over the internet, including storage, processing, and software.
    • Cloud Waste: The inefficient use of cloud resources, leading to unnecessary costs and environmental impact.
    • Cloud Storage: A service that provides remote data storage and retrieval through the cloud.
    • IaaS: Infrastructure as a Service, a cloud computing model where users provision and manage computing infrastructure, such as servers and networks.
    • PaaS: Platform as a Service, a cloud computing model that provides an environment for deploying and managing applications.
    • SaaS: Software as a Service, a cloud computing model where software applications are delivered over the internet.
    • Azure: Microsoft's cloud computing platform, offering a wide range of services, including storage, networking, and computing.

    Other Technologies & Concepts

    • Ajax: Asynchronous JavaScript and XML, a web development technique for creating dynamic and interactive web applications.
    • Apache: An open-source web server software frequently used to host websites.
    • Applet: A small program written in Java that runs within a web browser.
    • ASP: Active Server Pages, a server-side scripting engine used for web development.
    • ASP.NET: Microsoft's framework for building web applications and services.
    • Backbone: A JavaScript library that offers a framework for structuring and organizing single-page web applications.
    • Backlink: A hyperlink from one website to another, indicating a relationship or recommending content.
    • Banner Ad: A rectangular advertisement displayed on websites, typically placed at the top or bottom of web pages.
    • BitTorrent: A peer-to-peer (P2P) file sharing protocol used for distributing large files efficiently.
    • Blog: A website where individuals or organizations publish regular, chronological entries or posts.
    • Bookmark: A saved reference to a web page, allowing users to easily access it later.
    • Bot: An automated software program that performs tasks or interacts with online systems.
    • Broadband: High-speed internet access technology that provides significantly faster speeds compared to dial-up.
    • CDN: Content Delivery Network, a network of servers distributed globally to improve website performance by caching content closer to users.
    • Cookie: A small piece of data sent from a website and stored by a user's web browser, used for tracking user preferences and sessions.
    • CORS: Cross-Origin Resource Sharing, a mechanism that allows web pages to request resources from a different domain or origin.
    • Facebook: A popular social networking website that allows users to connect and share information.
    • Google: A multinational technology company providing search engine services, software, hardware, and cloud computing.
    • Google Drive: A cloud storage service offered by Google, allowing users to access and share files online.
    • Hashtag: A keyword or phrase preceded by a "#" symbol, used for categorizing and searching content on social media platforms.
    • Instagram: A social media platform focused on sharing photos and videos.
    • LinkedIn: A professional networking website that connects people with professionals in their field.
    • Media Queries: CSS features that allow web pages to adapt their layout and presentation based on the screen size or device capabilities.
    • Meme: An idea, behavior, or style that spreads through online communication, often humorous or satirical.
    • Meta Tag: HTML tags that provide information about a webpage for search engines and web browsers.
    • Microblogging: A type of social media where users post brief messages or updates.
    • Twitter: A social media platform known for its microblogging features, where users share short messages called "tweets."
    • Usenet: A distributed discussion forum system that predates the World Wide Web.
    • Vlog: A video blog, where individuals create and publish video content.
    • Wiki: A collaborative website where users can create, edit, or modify content.
    • WordPress: A popular open-source content management system used for creating websites and blogs.
    • WWW: World Wide Web, a collection of interlinked web pages accessible over the internet.
    • Yahoo!: A web portal, search engine, and online services provider.

    Computer Hardware

    • CPU (Central Processing Unit) is the brain of the computer, responsible for processing data.
    • GPU (Graphics Processing Unit) is a specialized processor designed for graphics and video processing.
    • RAM (Random Access Memory) is volatile, temporary memory used by the CPU during operation.
    • HDD (Hard Disk Drive) and SSD (Solid State Drive) provide non-volatile storage for data.
    • Motherboard connects all the components of the computer and contains the CPU socket, memory slots, and expansion slots.
    • Keyboard, Mouse, and Monitor are input and output devices.
    • Networking components:
      • Network Interface Card (NIC) connects a computer to a network.
      • Router directs data traffic between networks.
      • Switch connects devices within a local area network (LAN).
      • Modem translates digital data into analog signals for transmission over phone lines.
    • Optical drive reads and writes data to DVDs and CDs.

    Computer Software

    • Operating System (OS) manages the hardware and software resources of a computer. Examples: Windows, macOS, Linux.
    • Application Software provides specific functions for users, such as word processing, spreadsheets, and web browsing.
    • Programming Languages are used by developers to create software. Examples: C++, Java, Python.
    • Database stores and manages large amounts of structured data.
    • Cloud Computing provides access to computing resources like servers and storage over the internet.

    Computer Concepts

    • File Systems organize files on storage devices. Examples: NTFS (Windows), HFS+ (macOS), ext4 (Linux).
    • Bit is the smallest unit of data, represented by either a 0 or 1.
    • Byte is a group of 8 bits.
    • Digital Data is represented by a sequence of 0s and 1s.
    • Analog Data is continuous and represented by varying physical quantities.
    • Network Protocols define the rules for communication between different parts of a network. Examples: TCP/IP, HTTP.
    • Security measures protect computer systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
      • Firewalls act as barriers to prevent unauthorized access to a network.
      • Antivirus software detects and removes malicious software.
    • Virtualization allows running multiple operating systems or applications simultaneously on a single computer.
    • Data Compression reduces the size of data files without losing information (lossless) or with some information loss (lossy).

    Computer History

    • Early Computers relied on vacuum tubes and punched cards.
    • Transistors revolutionised computers, making them smaller, faster, and more energy-efficient.
    • Integrated circuits (ICs) combined transistors on a single chip, leading to further miniaturization and performance improvements.

    Additional Topics

    • Artificial Intelligence (AI) involves creating computer systems capable of human-like intelligence.
    • Internet of Things (IoT) refers to the interconnected network of devices and objects.
    • Cybersecurity focuses on protecting computer systems and networks from cyberattacks.
    • Web Development involves creating websites and web applications.

    Understanding these key facts, figures, and entities will provide you with a foundational knowledge of computers and their workings.

    Technology and the Internet

    • 3G, 4G, 5G: Cellular network generations, offering increasing speeds and data transfer capabilities.
    • ActiveX: Microsoft technology allowing web pages to interact with software on a user's device.
    • Adware: Software that displays unwanted advertisements.
    • Affiliate Marketing: A program where businesses pay commissions to individuals or other businesses for referring customers.
    • Ajax: Asynchronous Javascript and XML, a web development technique that enables dynamic web pages.
    • Apache: A popular open-source web server software.
    • Applet: A small Java program that runs within a web browser.
    • Application Server: Software that handles requests from web clients and provides data and services.
    • Archie: An early internet search engine for FTP files.
    • ASP (Active Server Pages): Microsoft technology for creating dynamic web pages.
    • ASP.NET: Microsoft's framework for developing web applications.
    • ATM (Automated Teller Machine): Electronic banking device for cash transactions.
    • Attachment: A file sent along with an email.
    • AUP (Acceptable Use Policy): Rules governing the use of a network or service.
    • Autoresponder: Automated system that sends a pre-written email response to inquiries.
    • Avatar: Digital representation of a user.
    • Azure: Microsoft's cloud computing platform.
    • Backbone: Core part of a network infrastructure.
    • Backlink: A link from one website to another.
    • Banner Ad: A rectangular advertisement displayed on a website.
    • Bcc (Blind Carbon Copy): Recipient(s) of an email hidden from other recipients.
    • BGP (Border Gateway Protocol): Used for routing traffic between different internet service providers.
    • Big Data: Large and complex datasets requiring special techniques for analysis.
    • Bing: Microsoft's search engine.
    • BitTorrent: Peer-to-peer file sharing protocol.
    • Blog: A website with regularly updated content.
    • Bookmark: A stored link to a website.
    • Bot: An automated program that interacts with websites or other systems.
    • Botnet: Network of infected computers controlled by a hacker.
    • Bounce: An email that is returned to the sender due to undeliverability.
    • Broadband: High-speed internet connection.
    • Brute Force Attack: Attempting to guess passwords by trying multiple combinations.
    • Captcha: Security measure requiring users to prove they're human.
    • Cc (Carbon Copy): Recipient(s) of an email visible to other recipients.
    • CDN (Content Delivery Network): Network of servers that deliver content closer to end-users.
    • Certificate: Digital document used to verify the identity of a website or user.
    • CIFS (Common Internet File System): Protocol used for sharing files over a network.
    • Client: A device or software that requests services from a server.
    • Cloud: Network of servers that provide computing services.
    • Cloud Computing: Using cloud services to deliver computing resources.
    • Cloud Waste: Unused or inefficiently used cloud resources.
    • CMP (Consent Management Platform): Software for managing user consent for data processing.
    • CMS (Content Management System): Software for creating and managing website content.
    • Cookie: Small data file stored on a user's device by a website.
    • CORS (Cross-Origin Resource Sharing): Security mechanism that allows websites to share resources with each other.
    • CPA (Cost Per Action): Advertising model where advertisers pay for specific actions taken by users, like making a purchase.
    • CPC (Cost Per Click): Advertising model where advertisers pay for each click on their advertisement.
    • CPL (Cost Per Lead): Advertising model where advertisers pay for each lead generated by their advertisement.
    • CPM (Cost Per Mille): Advertising model where advertisers pay for every 1,000 impressions of their advertisement.
    • Cross-Browser: Website or application that functions correctly in various web browsers.
    • CSS (Cascading Style Sheets): Language for styling web pages.
    • CTR (Click-Through Rate): The ratio of clicks to impressions for an advertisement.
    • Cyberbullying: Harassment or bullying through electronic communication.
    • Cyberspace: The virtual world where information is shared through computers.
    • Cybersquatter: A person who registers domain names with the intention of selling them for profit.
    • Datagram: A unit of data transmitted over a network.
    • Denial of Service (DoS): An attack designed to disrupt the availability of a service.
    • DHCP (Dynamic Host Configuration Protocol): Provides automatic IP address assignment to network devices.
    • Dial-Up: Internet access through a phone line.
    • Digital Footprint: All the information about a person available online.
    • Direct Digital Marketing: Marketing efforts that directly reach individual consumers.
    • DKIM (DomainKeys Identified Mail): Email authentication method used to verify the sender's domain name.
    • DNS (Domain Name System): System that translates domain names into IP addresses.
    • DNS Record: Information stored in the DNS system for a particular domain.
    • DNSSEC (Domain Name System Security Extensions): Adds security features to the DNS system.
    • DOM (Document Object Model): Representation of the structure of a web page as a hierarchy of nodes.
    • Domain Name: Unique name associated with a website.
    • Domain Suffix: The part of a domain name after the dot (e.g., .com, .org).
    • Download: Transferring a file from a server to a local device.
    • Drive-By Download: The download of malware without the user's knowledge.
    • Dynamic Website: Website content that changes based on factors like user input or time.
    • E-commerce: Buying and selling goods and services online.
    • E-mail Bankruptcy: A condition where a person has so many email subscriptions and notifications that they cannot manage their inbox.
    • Edge Caching: Storing copies of website content on servers closer to users to improve performance.
    • Edge Server: A server located at the edge of a network, closer to users.
    • EDI (Electronic Data Interchange): The exchange of business documents electronically.
    • Email: Electronic message.
    • Email Address: Unique identifier for an email account.
    • Email Bomb: Sending a large number of emails to overload a recipient's mailbox.
    • Emoticon: A graphical symbol used to express emotions in digital communications.
    • Extranet: Private network that allows limited access to external users.
    • Facebook: Popular social networking website.
    • Favicon: Small graphic that represents a website in a browser's tab or bookmark.
    • Fios: Verizon's fiber-optic internet service.
    • Firewall: Network security system that blocks unauthorized access.
    • Flaming: Online abuse or insults.
    • Flash: Multimedia platform for creating animated content and web applications.
    • Fluid Layout: Website design that adapts to different screen sizes.
    • Friend: A connection on a social networking site.
    • Friendly URL: Easy-to-remember and user-friendly web address.
    • FTP (File Transfer Protocol): Protocol for transferring files between computers.
    • Google: Popular search engine and technology company.
    • Google Drive: Cloud storage service.
    • Gopher: Early internet protocol for accessing information.
    • Graymail: Unwanted but not harmful email, such as newsletters or promotional emails.
    • Grid Computing: Using a network of computers to solve complex problems.
    • Handle: Nickname or username used on a website or social network.
    • Hashtag: Word or phrase preceded by a hash symbol (#) used to categorize content.
    • Heartbleed: Critical flaw in the OpenSSL encryption library discovered in 2014.
    • Hit: Request made from a web browser to a web server.
    • Home Page: The starting page of a website.
    • Honeypot: A computer system designed to attract and trap malicious attackers.
    • HTML (HyperText Markup Language): Language used to create web pages.
    • HTML5: Latest version of HTML, adding new features and capabilities.
    • HTTP (HyperText Transfer Protocol): Protocol used for transferring web pages.
    • HTTPS (HyperText Transfer Protocol Secure): Secure version of HTTP that encrypts communication.
    • Hyperlink: Text or image link that allows users to navigate to another web page.
    • Hypermedia: Multimedia content that is linked together.
    • Hypertext: Text with links to other related text.
    • IANA (Internet Assigned Numbers Authority): Organization responsible for managing global IP addresses and other internet resources.
    • ICANN (Internet Corporation for Assigned Names and Numbers): Organization that manages the DNS system.
    • ICF (Internet Communications Framework): A set of standards related to internet communications.
    • iCloud: Apple's cloud storage and computing service.
    • ICMP (Internet Control Message Protocol): Protocol used for error and diagnostic messages.
    • ICQ (I Seek You): Early instant messaging service.
    • ICS (Internet Control System): System for managing and controlling industrial processes.
    • ICT (Information and Communications Technology): Field encompassing technologies related to information processing, communication, and data storage.
    • Iframe: HTML element that allows a web page to embed another web page.
    • IIS (Internet Information Services): Microsoft's web server software.
    • IM (Instant Messaging): Real-time communication between two or more users.
    • IMAP (Internet Message Access Protocol): Protocol for accessing email messages on a mail server.
    • Impression: Each time an advertisement is displayed to a user.
    • Inbox: Folder in an email client that stores incoming messages.
    • Influencer: Person who has a significant influence on their audience.
    • Instagram: Photo and video-sharing social networking service.
    • Internet: Global network of interconnected computers.
    • Internet of Things (IoT): Network of physical devices connected to the internet.
    • InterNIC: Formerly known as Network Solutions, a company that was responsible for registering domain names.
    • IP (Internet Protocol): Protocol used for routing data packets over the internet.
    • IP Address: Unique numerical identifier assigned to each device on a network.
    • IPsec (Internet Protocol Security): Protocol suite for securing communication over IP networks.
    • IPv4 (Internet Protocol version 4): Older version of the IP protocol, using 32-bit addresses.
    • IPv6 (Internet Protocol version 6): Newer version of the IP protocol, using 128-bit addresses.
    • IRC (Internet Relay Chat): Protocol for real-time chat communication.
    • iSCSI (Internet Small Computer System Interface): Protocol for accessing storage devices over a network.
    • ISDN (Integrated Services Digital Network): Digital network technology for voice and data transmission.
    • ISP (Internet Service Provider): Company that provides internet access.
    • JavaScript: Programming language used for creating interactive web applications.
    • Jitter: Variation in network latency that can cause delays in communication.
    • jQuery: JavaScript library that simplifies web development tasks.
    • JSF (JavaServer Faces): Java framework for building web applications.
    • JSP (JavaServer Pages): Technology for creating dynamic web pages using Java.
    • JWT (JSON Web Token): Standard for securely transmitting information between parties.
    • Keep-Alive: HTTP header that indicates that a connection should remain open after a request.
    • Lag: Delay in communication caused by network issues.
    • LAMP: Open-source web application platform consisting of Linux, Apache, MySQL, and PHP.
    • Landing Page: A web page that users are directed to after clicking on a link.
    • Lazy Loading: Technique for deferring the loading of website content until it is needed.
    • LDAP (Lightweight Directory Access Protocol): Protocol for accessing directory services like Active Directory.
    • Lead: Potential customer.
    • Leaderboard: Type of banner ad that is displayed at the top or bottom of a web page.
    • Leet: Internet slang using letters and numbers to represent other letters.
    • Link: Connection to another web page or resource.
    • LinkedIn: Professional networking site.
    • LISTSERV: Software for managing email lists.
    • Live Streaming: Broadcasting content over the internet in real time.
    • Mail Server: Computer that handles sending and receiving email messages.
    • Martech: Marketing technology, encompassing software and tools for marketing.
    • Mashup: Website or application that combines data or functionalities from multiple sources.
    • Media Queries: CSS feature that allows you to apply different styles based on the user's screen size or device.
    • Meme: An idea, image, or piece of information that spreads rapidly through the internet.
    • Meta Search Engine: Search engine that combines results from multiple search engines.
    • Meta Tag: HTML element that provides information about a web page to search engines.
    • Metaverse: Collective virtual worlds that allow users to interact with each other and objects.
    • Microblogging: Short-form blogging, typically limited to text messages.
    • MIME type: Type of file associated with a particular internet media type.
    • Minisite: Small website focused on a specific topic or product.
    • Mirror: A copy of a website hosted on a different server.
    • Moodle: Open-source learning management system.
    • Multicast: Sending data to multiple recipients simultaneously.
    • MySpace: Early social networking website.
    • Name Server: Server that handles DNS lookups.
    • NAT (Network Address Translation): Technique for using a smaller number of public IP addresses to represent multiple devices on a private network.
    • Navigation Bar: Part of a website that provides links to other pages.
    • Net Neutrality: Principle that internet service providers should treat all internet traffic equally.
    • Netiquette: Etiquette for online communication.
    • Netmask: A mask used to identify the network portion of an IP address.
    • Newsgroup: Online forum or group discussion.
    • Nextdoor: Neighborhood-based social networking site.
    • NNTP (Network News Transfer Protocol): Protocol for accessing newsgroups.
    • NOC (Network Operations Center): Facility responsible for monitoring and managing a network.
    • Node.js: JavaScript runtime environment for building server-side applications.
    • NoSQL: Non-relational database management system.
    • NSP (Network Service Provider): Company that provides network services, including internet access.
    • NTP (Network Time Protocol): Protocol for synchronizing clocks on a network.
    • Optical Carrier: Network technology that uses fiber optic cables to transmit data at high speeds.
    • Origin Server: The server that hosts the original content for a website.
    • OSPF (Open Shortest Path First): Routing protocol used for routing traffic within a network.
    • OTT (Over-the-Top): Content delivered directly to users over the internet, bypassing traditional cable or satellite providers.
    • Outbox: Folder in an email client that stores messages waiting to be sent.
    • P2P (Peer-to-Peer): Network architecture where devices connect directly to each other without relying on a central server.
    • Packet: Unit of data transmitted over a network.
    • Page View: Each instance of a web page being loaded by a user.
    • Parked Domain: A domain name that is registered but not associated with a website.
    • Payload: The harmful part of a malware program.
    • Permalink: A permanent link to a specific webpage or blog post.
    • Personal URL: Website address associated with a specific person.
    • Pharming: Redirecting users to a fake website without their knowledge.
    • Phishing: Attempting to obtain sensitive information by impersonating a trusted entity.
    • PHP (Hypertext Preprocessor): Server-side scripting language commonly used for web development.
    • PIM (Product Information Management): Process of managing and distributing product information.
    • Ping: Network utility used to test connectivity and measure latency.
    • Pinterest: Photo and idea-sharing social networking site.
    • PON (Passive Optical Network): Fiber optic network access technology.
    • POP3 (Post Office Protocol version 3): Protocol for receiving email on a local computer.
    • Portal: Website that provides a gateway to other websites and services.
    • PPC (Pay-Per-Click): Advertising model where advertisers pay for each click on their advertisement.
    • PPL (Pay-Per-Lead): Advertising model where advertisers pay for each lead generated by their advertisement.
    • PPP (Point-to-Point Protocol): Protocol for establishing a point-to-point connection over a network.
    • PPPoE (Point-to-Point Protocol over Ethernet): Protocol for establishing an internet connection over an Ethernet network.
    • PPS (Pay-Per-Sale): Advertising model where advertisers pay for each sale generated by their advertisement.
    • PPTP (Point-to-Point Tunneling Protocol): Protocol for establishing secure connections over a network.
    • Primitive: Old or outdated technology.
    • Progressive Web App: Web application that provides a native-like experience.
    • Protocol: Set of rules governing communication between devices.
    • Proxy Server: Server that acts as an intermediary between clients and servers.
    • RADCAB (Rules As Defined by Client's Approval, or Better): A philosophy or method used for designing and developing web applications.
    • Ransomware: Malware that encrypts a user's files and demands a ransom to decrypt them.
    • Reciprocal Link: Two websites that link to each other.
    • Responsive Web Design: Website design that adapts to different screen sizes and devices.
    • REST (Representational State Transfer): Software architectural style for developing web services.
    • RPM (Revolutions Per Minute): Unit of measurement for the speed of a hard drive.
    • RSS (Really Simple Syndication): Format for distributing web content updates.
    • RTMP (Real-Time Messaging Protocol): Protocol for streaming audio and video over the internet.
    • Sass (Syntactically Awesome Style Sheets): CSS preprocessor that allows you to write more efficient and maintainable CSS code.
    • Scraping: Extracting data from websites.
    • SDSL (Symmetric Digital Subscriber Line): Digital subscriber line technology that provides equal upload and download speeds.
    • Search Engine: Software program that searches and indexes web pages.
    • SEO (Search Engine Optimization): The practice of optimizing a website to rank higher in search engine results.
    • SERP (Search Engine Results Page): The list of results displayed by a search engine.
    • Servlet: Java program that runs on a web server and handles web requests.
    • Session: A temporary connection between a user and a web server.
    • SIP (Session Initiation Protocol): Protocol used for initiating and managing multimedia communication sessions, like voice and video calls.
    • Sitemap: File that contains a list of URLs on a website, which helps search engines to index the website.
    • Skyscraper: Type of banner ad that is displayed in the vertical space on a web page.
    • Slashdot: News website that focuses on technology and science.
    • Smishing: Phishing attacks carried out using SMS text messages.
    • SMM (Social Media Marketing): The use of social media platforms for marketing.
    • SMTP (Simple Mail Transfer Protocol): Protocol for sending email messages.
    • SOAP (Simple Object Access Protocol): Protocol for exchanging structured information over the internet.
    • Social Engineering: Manipulating people to gain access to sensitive information or systems.
    • Social Media: Websites and applications that allow users to create and share content and connect with others.
    • Social Networking: The practice of building and maintaining relationships with people online.
    • Socket: Virtual endpoint used for communication between two applications over a network.
    • Spam: Unwanted or unsolicited bulk email.
    • SPF (Sender Policy Framework): Email authentication method used to prevent email spoofing.
    • Spider: Software program used by search engines to crawl and index web pages.
    • Spoofing: Masquerading as another person or device.
    • SSH (Secure Shell): Protocol for secure remote access to computers.
    • SSL (Secure Sockets Layer): Protocol for encrypting communication over the internet.
    • SSO (Single Sign-On): Authentication method that allows users to log in once to access multiple applications.
    • Static Website: Website content that remains unchanged unless manually updated.
    • Streaming: Delivering media content over the internet in real time.
    • SYN Flood: Denial of service attack that overwhelms a server with TCP connection requests.
    • T1: Digital telephone line offering high-speed bandwidth.
    • T3: High-speed digital telephone line with more bandwidth than T1.
    • Tag: Keyword or label associated with a piece of content.
    • TCP (Transmission Control Protocol): Protocol that provides reliable and ordered delivery of data packets.
    • TCP/IP (Transmission Control Protocol/Internet Protocol): Suite of protocols that forms the foundation of the internet.
    • Telnet: Protocol for remote access to computers.
    • TLS (Transport Layer Security): Protocol for encrypting network communication.
    • Traceroute: Network utility that traces the path a packet takes from one device to another.
    • Trackback: Link from a blog post to another blog post.
    • Troll: A person who posts disruptive or offensive messages online.
    • TTL (Time To Live): Value that specifies how long a DNS record should be cached.
    • Tumblr: Microblogging platform.
    • Tunneling: Encapsulating network traffic inside another protocol.
    • Tweet: Short message posted on Twitter.
    • Twitch: Live streaming platform focused on video games.
    • Twitter: Social networking platform for sharing short messages.
    • UDP (User Datagram Protocol): Protocol that provides a connectionless and unreliable delivery of data packets.
    • UGC (User Generated Content): Content created by users of a website or service.
    • Unfriend: To remove a person from your friend list on a social networking site.
    • Unicast: Sending data to a single recipient.
    • Upload: Transferring a file from a local device to a server.
    • URI (Uniform Resource Identifier): A unique identifier that locates a resource on the internet.
    • URL (Uniform Resource Locator): A specific type of URI that identifies a resource on the internet.
    • Usenet: Early online forum system.
    • VCI (Virtual Channel Identifier): Identifier used in Asynchronous Transfer Mode (ATM) networks.
    • VDSL (Very-high-bitrate Digital Subscriber Line): High-speed digital subscriber line technology offering higher bandwidth than ADSL.
    • VIP (Very Important Person): Person who has special privileges on a website or network.
    • Vlog (Video blog): Blog that features video content.
    • VoIP (Voice over IP): Technology for transmitting voice calls over the internet.
    • VPI (Virtual Path Identifier): Identifier used in Asynchronous Transfer Mode (ATM) networks.
    • VPN (Virtual Private Network): Encrypts internet traffic and routes it through a private network, providing privacy and security.
    • VPS (Virtual Private Server): A virtualized server running on a physical server.
    • W3C (World Wide Web Consortium): International organization that develops web standards.
    • WAIS (Wide Area Information Server): Early internet protocol for accessing information.
    • WAN (Wide Area Network): Network that spans a large geographical area.
    • Web 2.0: Second generation of the World Wide Web, emphasizing user-generated content, social interaction, and collaborative web applications.
    • Web Application: Software application that is accessed through a web browser.
    • Web Beacon: Tiny image file used to track user activity on a website.
    • Web Design: The art of creating and designing websites.
    • Web Development: The process of creating and maintaining websites.
    • Web Forum: Online forum or discussion board.
    • Web Host: Company that provides server space and related services for websites.
    • Web Publishing: The process of making a website accessible to the public.
    • Web Server: Computer that runs a website.
    • Web Service: Software application that provides services over the internet.
    • Webhook: An automated message sent from one application to another when a specific event occurs.
    • Webmail: Email service accessed through a web browser.
    • Webmaster: Person responsible for maintaining a website.
    • Webpage: A single document on a website.
    • Webring: Group of related websites that are linked together.
    • Website: A collection of web pages that are connected together.
    • WHOIS: Database that contains information about registered domain names.
    • Wiki: Website where users can collaboratively edit and create content.
    • WINS (Windows Internet Name Service): Microsoft's implementation of the DNS system for Windows networks.
    • WordPress: Popular open-source content management system for creating websites and blogs.
    • WWW (World Wide Web): System of interconnected websites and resources accessed using the internet.
    • XaaS (Anything as a Service): Cloud computing model where a service is delivered over the internet.
    • XHTML (Extensible HyperText Markup Language): Stricter version of HTML.
    • Yahoo! Internet company that provides search, email, and other services.

    Hardware Components

    • CPU (Central Processing Unit): The brain of the computer, responsible for processing instructions.
    • RAM (Random Access Memory): Temporary storage for data the CPU is actively using.
    • GPU (Graphics Processing Unit): A specialized processor for handling graphics and video.
    • Storage Devices: Where data is permanently stored, including HDDs (Hard Disk Drives) and SSDs (Solid State Drives).
    • Motherboard: The main circuit board that connects all the other components.
    • Input Devices: Allow users to interact with the computer, such as a keyboard, mouse, and touchscreen.
    • Output Devices: Display the results, including monitors, printers, and speakers.
    • Network Interface Card (NIC): Allows a computer to connect to a network.
    • Expansion Cards: Extend the functionality of a computer, featuring slots like PCI Express.

    Operating System

    • Operating System (OS): Software that manages the computer's hardware and resources.
    • Windows: A popular operating system for personal computers.
    • macOS: Apple's operating system for Macintosh computers.
    • Linux: An open-source operating system known for its flexibility and customization.

    Software Applications

    • Applications: Programs that perform specific tasks, such as word processors, web browsers, and games.
    • Software Development Kit (SDK): A set of tools and libraries that help developers build software.
    • System Software: Helps the OS manage the computer's resources, including the kernel.
    • Firmware: A specialized type of software embedded in hardware.

    Networking

    • Network: A group of interconnected devices that can communicate with each other.
    • LAN (Local Area Network): A network within a smaller geographic area.
    • WAN (Wide Area Network): Spans over a large geographic area, like the internet.
    • Internet Protocol (IP): A system used for addressing and routing data on the internet.
    • TCP/IP: A set of communication protocols for networking.
    • DNS (Domain Name System): Translates human-readable domain names into numerical IP addresses.

    Data and Storage

    • Data: Raw facts and figures that can be processed into information.
    • File System: Organizes files and directories on a storage device.
    • Data Types: Define the kind of data stored, such as integers, strings, and booleans.
    • Databases: Structured collections of data, managed by a DBMS (Database Management System).
    • File Extensions: Identify the type of data stored in a file, such as .txt or .jpg.
    • Compression: Reduces the file size without sacrificing quality.

    Programming

    • Programming Language: A set of instructions used to create software.
    • Compiler: A software program that translates code from a high-level language to a low-level language.
    • Interpreter: Executes code line by line without compiling it.
    • Source Code: Human-readable text that defines the software.
    • Algorithm: A set of steps for completing a specific task.
    • Function: A reusable block of code that performs a specific operation.
    • Variable: Holds a value that can change during program execution.

    Security

    • Antivirus: Software that protects against malicious software like viruses.
    • Firewall: A security system that protects a network from unauthorized access.
    • Encryption: Transforms data into unrecognizable code to protect it.
    • Security Vulnerability: A weakness in a system that can be exploited.
    • Password Manager: Stores and manages passwords securely.

    Other Relevant Terms

    • Ergonomics: The study of how people interact with their environment.
    • Accessibility: Designing technology to be usable by people with disabilities.
    • User Experience (UX): The overall experience a user has with a product or service.
    • Digital Asset: Any digital content that has value, like images, videos, or documents.
    • Cloud Computing: Storing and accessing data and applications over the internet.
    • Artificial Intelligence (AI): The ability of a computer to learn and perform tasks that typically require human intelligence.
    • Machine Learning: A subset of AI that allows computers to learn from data without explicit programming.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the evolution of wireless technologies from 3G to 5G, highlighting key features and advantages of each generation. Additionally, it addresses common internet errors such as 403 Forbidden and 404 Not Found, along with technologies like ActiveX and Ajax that enhance web interactivity.

    More Like This

    Discover the World of IoT
    5 questions

    Discover the World of IoT

    GladBlackTourmaline avatar
    GladBlackTourmaline
    Introduction to Wireless Technologies Quiz
    12 questions
    Internet Access Technologies Quiz
    12 questions
    Introduction to IoT Part I Quiz
    29 questions
    Use Quizgecko on...
    Browser
    Browser