A keyboard and mouse on a desk.

Computer Glossary – Page 2

Computer Glossary – Page 2


I

  1. Icon – A small image representing a program, file, or function.

  2. IDE (Integrated Development Environment) – A tool for coding and testing software.

  3. IMAP – An email protocol for accessing mail stored on a server.

  4. Import – Bringing data into a program from another source.

  5. Indexing – Organizing files for faster searching.

  6. Inkjet Printer – A printer that sprays ink directly onto paper.

  7. Input Device – Hardware used to enter data into a computer (e.g., keyboard).

  8. Installer – A program that sets up software on your computer.

  9. Interface – The way a user interacts with software or hardware.

  10. IP Address – A unique number identifying a device on a network.


J

  1. Java – A popular programming language for apps and web software.

  2. JavaScript – A scripting language for creating interactive web pages.

  3. JPEG (JPG) – A common image file format.

  4. Joystick – A control device often used in gaming.

  5. JSON – A lightweight data format for exchanging information.

  6. JVM (Java Virtual Machine) – Runs Java programs on different systems.

  7. JTAG – A standard for testing and debugging electronic circuits.

  8. Jitter – Variability in data transmission speed over a network.

  9. Job Queue – A list of tasks waiting to be processed.

  10. Jump Drive – Another name for a USB flash drive.


K

  1. Kernel – The core of an operating system controlling resources.

  2. Keylogger – Malicious software that records keystrokes.

  3. Keyword – A reserved word in programming or a search term.

  4. Kilobyte (KB) – About 1,000 bytes of digital data.

  5. KVM Switch – Lets one keyboard, video, and mouse control multiple computers.

  6. Knowledge Base – A collection of articles, FAQs, or documentation.

  7. Keystroke – One press of a key on a keyboard.

  8. Kickstart – A method for booting or installing Linux.

  9. Kernel Panic – A critical OS error that forces a restart.

  10. Key Pair – Two keys (public and private) used in encryption.


L

  1. LAN (Local Area Network) – A small network covering one location.

  2. Latency – Delay between sending and receiving data.

  3. LCD (Liquid Crystal Display) – A flat-panel screen technology.

  4. Linux – An open-source operating system.

  5. Load Balancing – Distributing tasks across multiple servers.

  6. Log File – A file that records system or program activity.

  7. Login – The process of entering a username and password.

  8. Loop – A repeated sequence of instructions in programming.

  9. Lossless Compression – File compression that doesn’t lose data.

  10. Low-Level Language – A programming language close to machine code.


M

  1. Machine Learning – AI that improves through data and experience.

  2. Macro – A shortcut that automates a series of commands.

  3. Malware – Software designed to harm or steal information.

  4. Mainframe – A large, powerful computer for bulk data processing.

  5. Mbps (Megabits per second) – A measure of internet speed.

  6. Memory Leak – When software fails to release unused memory.

  7. Metadata – Information describing other data.

  8. MFA (Multi-Factor Authentication) – Security using more than one verification method.

  9. Motherboard – The main circuit board connecting all components.

  10. Mounting – Making a drive or file system accessible.


N

  1. Nanotechnology – Technology at the scale of atoms and molecules.

  2. NAS (Network Attached Storage) – A storage device connected to a network.

  3. Native App – Software built for a specific operating system.

  4. Net Neutrality – The principle that all internet traffic is treated equally.

  5. Network – A group of connected computers sharing resources.

  6. NIC (Network Interface Card) – Hardware that connects a device to a network.

  7. Node – A device or point in a network.

  8. Notebook – Another term for a laptop computer.

  9. NTFS – A file system used by Windows.

  10. Null – A special value in programming meaning “no data.”


O

  1. OCR (Optical Character Recognition) – Converts scanned text into editable text.

  2. OEM (Original Equipment Manufacturer) – A company making parts for other brands.

  3. OLED – A display technology with vivid colors and thin screens.

  4. Open Source – Software with freely available source code.

  5. Operating System (OS) – Software that manages hardware and software.

  6. Overclocking – Running a CPU or GPU faster than factory speed.

  7. Object-Oriented Programming (OOP) – A coding method based on objects.

  8. Office Suite – A package of productivity apps like Word and Excel.

  9. On-Premises – Software or servers installed locally instead of in the cloud.

  10. Overflow – An error when data exceeds storage limits.


P

  1. Packet – A small unit of data sent over a network.

  2. Patch – An update to fix software bugs or add features.

  3. Password Manager – A tool for storing and generating secure passwords.

  4. PDF (Portable Document Format) – A file format for documents.

  5. Peripheral – External devices like printers, mice, and keyboards.

  6. Phishing – A scam tricking users into giving personal data.

  7. Pixel – The smallest element of an image on a screen.

  8. Plug-in – Software that adds features to another program.

  9. Port – A virtual or physical point for data entry/exit.

  10. Proxy Server – A server acting as an intermediary for requests.


Q

  1. QoS (Quality of Service) – Controls network traffic priority.

  2. Query – A request for data from a database.

  3. Queue – A list of tasks or processes waiting.

  4. Quick Access – A feature in Windows for easy access to files.

  5. Quick Format – A fast way to erase a drive without full cleanup.

  6. Quota – A storage or usage limit on a user’s account.

  7. Quantum Computing – Computing using quantum physics principles.

  8. Quick Response (QR) Code – A scannable code that links to digital info.

  9. QuickTime – Apple’s multimedia framework for video and audio.

  10. Quarantine – Isolating infected files detected by antivirus.


R

  1. RAID – A way of storing data across multiple drives for speed or safety.

  2. RAM (Random Access Memory) – Temporary memory for active programs.

  3. Raster Image – An image made of pixels, like a photo.

  4. Reboot – Restarting a computer system.

  5. Registry – A Windows database storing settings and configurations.

  6. Remote Desktop – Accessing a computer from another location.

  7. Resolution – The sharpness of an image, measured in pixels.

  8. Restore Point – A backup of system settings in Windows.

  9. ROM (Read-Only Memory) – Permanent memory storing essential data.

  10. Root User – The highest-level account with full permissions.


S

  1. SAN (Storage Area Network) – A high-speed network for storage devices.

  2. SaaS (Software as a Service) – Cloud-based software delivered online.

  3. Scanner – A device that digitizes documents or images.

  4. Screenshot – A captured image of the computer screen.

  5. Script – A file containing commands to be executed.

  6. Search Engine – A tool like Google that finds information online.

  7. Server – A computer that provides services to other devices.

  8. SMTP – The protocol used to send emails.

  9. Software – Programs that run on a computer.

  10. SQL – A language for managing databases.


T

  1. Tablet – A portable computer with a touchscreen.

  2. TCP/IP – The protocols that power the internet.

  3. Terabyte (TB) – About 1 trillion bytes of data.

  4. Thread – A unit of work handled by a CPU.

  5. Token – A digital key used in authentication.

  6. Trojan Horse – Malware disguised as legitimate software.

  7. Tunnel – A secure channel for transmitting data.

  8. Two-Factor Authentication (2FA) – A login process requiring two verifications.

  9. Typeahead – A feature that predicts what you’re typing.

  10. Typography – The style and appearance of text on screens.


Leave a Reply

Your email address will not be published. Required fields are marked *