A
Algorithm
An algorithm is a sequence of instructions used to perform a task in software.
Artificial Intelligence (AI)
Artificial Intelligence (AI) refers to the capability of computers to simulate human skills such as reasoning, knowledge representation, planning, learning, natural language processing, perception, robotics, social intelligence, and general intelligence.
B
Bluetooth
Bluetooth is a wireless technology that enables devices to communicate with each other over short distances without the need for cables.
C
Cloud computing
Cloud computing is a model for delivering virtual infrastructure or software over a network, enabling greater self-service and flexible resource allocation. This can be achieved through a public cloud provider or a private cloud deployment.
D
Data Center
A data center is a secure facility that houses physical servers, critical applications, data, and other digital assets.
E
Encryption
Encryption is the process of protecting sensitive information by converting digital data into an unreadable format, which can only be deciphered using a key specific to the encryption method.
F
Front-end developers
Front-end developers use programming languages like HTML, CSS, and JavaScript to create and enhance a website’s visual design and user experience.
G
Graphics Processing Unit (GPU)
A graphics processing unit (GPU) is a hardware component responsible for rendering graphics on a device.
H
Hardware
Hardware refers to the physical components of a computer system that enable it to function. This includes devices such as the central processing unit (CPU), memory (RAM), storage drives, motherboard, power supply, input devices (keyboard, mouse), output devices (monitor, printer), and networking components. Hardware works in conjunction with software to execute tasks and process data.
I
Internet of Things (IOT)
The Internet of Things (IoT) refers to networks of internet-connected devices that offer computing capabilities. Unlike traditional computers, these devices enhance everyday objects with intelligence and connectivity.
J
JavaScript
A widely used programming language that enables interactive and dynamic content on websites. It is commonly used for web development, front-end scripting, and server-side applications.
K
Kernel
The core component of an operating system that manages system resources, processes, and hardware communication. It acts as a bridge between software applications and the computer’s hardware.
L
Local Area Network (LAN)
A local area network (LAN) is a network of interconnected computers within a confined area, such as a home or office, allowing them to communicate and share resources.
M
Malware
Malware is any type of software designed to harm, disrupt, or compromise information and computer systems.
N
Network Segmentation
Network segmentation is the practice of dividing a computer network into distinct zones using devices such as bridges, switches, and routers to enhance security and performance.
O
Operating System
An operating system links computer hardware with applications while managing memory and processes. Examples include Linux, Apple macOS, and Microsoft Windows.
P
Phishing
Phishing attacks involve deceptive emails, calls, or texts designed to trick individuals into revealing sensitive information, such as passwords or credit card details.
Q
QA Analyst
A QA analyst is a professional who applies quality assurance methods to identify defects in software products or processes.
R
Ransomware
Ransomware is a type of malware that encrypts data, allowing attackers to demand a ransom in exchange for restoring access.
S
Security Architect
A security architect designs and oversees an organization’s network security, working with business leaders, engineers, and developers to protect against cyber threats.
T
Threat detection
Threat detection is the process of identifying malicious activity within a network.
U
User Interface (UI)
The visual and interactive elements of a software application or website that allow users to engage with a system, including menus, buttons, and layouts.
V
Virtual Private Network (VPN)
A virtual private network (VPN) extends a private network over public infrastructure, using specialised hardware or software to establish a secure and encrypted data transmission.
W
Wide Area Network (WAN)
A wide area network (WAN) is an extensive network that enables data transmission across multiple locations, rather than being confined to a single site.
X
XML (Extensible Markup Language)
A flexible text-based format used for storing, transmitting, and structuring data across different systems and applications.
Y
Yottabyte
A unit of digital storage equal to 1,000 zettabytes or 1 septillion (10²⁴) bytes, used to measure vast amounts of data in large-scale computing.
Z
Zero-Day Vulnerability
A security flaw in software or hardware that is unknown to the vendor and can be exploited by attackers before a fix is available.