Technology Terminology: Glossary of Tech Terms

The world is changing and technology are evolving. It’s never been so important to keep up with the latest and greatest in technology, as it is now. Understanding what technologies each language uses can help you better understand which type of work they’re best suited for.

There’s a lot of jargon in the world of technology. It can be difficult to know what it all means, but we’ve compiled a list of some basic terms that you will come across if you are new to this industry.

Glossary of Technology Terms

1

1Password - There are more and more reasons why you need to use a password manager these days. A recent survey found...

4

4k - 4k is a relatively new technology that has been around for just over 10 years. It is the latest in...

5

5G - 5G broadband is the next generation of high-speed internet. It will provide faster download speeds and help to create a...

8

802.11b - 802.11b is an old Wi-Fi standard that was released about 20 years ago, in 1999. It has since been replaced...
802.11n - 802.11n is a wireless networking standard published in 2009 that was created to offer higher speeds and greater ranges than...
802.11a - 802.11a is a wireless networking standard created by the Institute of Electrical and Electronics Engineers (IEEE). It was designed to...

A

Audio Driver - Have you ever wondered what an audio driver is and why it's so important? If not, this article will provide...
Android Game Console - If you’ve been thinking about diving headfirst into the world of video gaming but are ensure that you want to...
AIFF & AIFF-C - AIFF stands for Audio Interchange File Format, and is a file type used to store many different types of audio...
ACDSee - Have you ever taken a picture that was so good, it's worth sharing with the world? ACDSee is an app...
Android Names - Android is a mobile operating system. It's an open-source software built by Google and supported with the Android Open Source...
Artificial Intelligence - When you converse about AI or Artificial Intelligence, you are discussing the progress and capability of a smart machine system...
Altium Designer: Features, Hotkeys - Altium Designer is a PCB design software that has been in the industry for more than 30 years. The Altium...
Apple Filing Protocol - Apple Filing Protocol (AFP) is, as the name suggests, a protocol that was designed by Apple. It allows users to...
ALPHACAM - Manufacturing drawings and 3D models have never been so easy. Whether you are designing a part, redesigning an old one,...
Abiword - AbiWord is a free word processor available on Windows, Mac and Linux operating systems. It has a lot of features...
Action Camera - Action cameras are everywhere these days. They're being used to capture all sorts of extreme sports and other outdoor adventures,...
ATM - Asynchronous transfer mode, or ATM, is a type of transmission mode in which data packets are transmitted between nodes on...
Adware - Adware is a type of software that displays advertising when you use your computer. It can be difficult to remove,...
Animated GIF - Animated gifs are a type of animated image that can be uploaded to websites, blogs or social media platforms. They...
AVIF - AVIF is an image file format designed to reduce the size of our pictures when maintaining picture quality. It is...

B

Bluesnarfing - Bluesnarfing refers to the act of intercepting unencrypted wireless Bluetooth transmissions. The name gets the word "blues" from the original...
BIOS Jumper - A BIOS Jumper, also known as a CMOS jumper, is a small piece of metal with two pins on the...
Bluetooth Game Controller - You take your phone or tablet everywhere so you want the home gaming experience to come with you. For that,...
Bitmap (BMP) - The BMP file type is a bitmap graphic format, but what does that mean? A bitmap image can be defined...
Brute Force Attack - Brute force attacks are a type of attack that is used to break into an account. This kind of attack...
Banner Ads - Banner ads are a form of advertising that has been around for a long time. They typically take up the...
Backdoor - Computer backdoor is not something new; they have been around since the 1980s when early systems were susceptible to these...
Battle Pass - Battle passes have been around for a few years now. They are one of the most popular ways to get...
Bitclout - Bitclout is a popular network for those who are interested in cryptocurrencies. If you know Bitcoin, you must also have...

C

CPU Bound - When you buy a new computer, it’s like buying a car. You want to make sure that the performance is...
Cluster Network - A cluster network is a type of computer network in which all nodes communicate with each other through a central...
COM - In this article, we will be defining what the term COM means. This term has 3 meanings: a Domain Suffix,...
Config.sys - The config.sys file is a configuration file for MS-DOS, AO-DOS, DR-DOS, Windows 3.x, and all versions of Microsoft Windows operating...
Computer Glitch - In today's world, computers are not only a luxury; they're an imperative. Computers allow us to do things like control...
Cyber Security - In today's world, everything is connected to the internet. This includes your refrigerator and television. Your credit cards are online...
Computer Audit - Computer audits are not just for businesses. Home computer owners can use the same type of audit to identify potential...
Computer Tower - A computer tower is a box-shaped compartment that holds all the components of your computer. A power supply, motherboard, expansion...
CRT Monitor - CRTs are one of the oldest types of monitors still in use. CRT stands for cathode ray tube, which is...
Chiclet Keyboard - A chiclet keyboard is a type of keyboard that features individual, rectangular keys. Chiclet keyboards replaced the traditional typewriter-style design...
Computer Graphic - Computer graphics are images that are produced by a computer. This can be in the form of digital art, animations,...
Cooler Scooter - Choosing the best cooler scooter can be a difficult process. There are many different options to consider, and not all...
Caps Lock - Caps Lock is a key on your keyboard that you can use to capitalize all of the letters in whatever...
Camera - The people of the world are becoming more and more consumed by technology. As a result, film photography has been...
Console Tree - In an operating system, a console tree is a window that contains information in a tree-like structure. When clicked, it...
CDFS - CDFS stands for Compact Disc File System which has been around since 1987 when the first CDs were introduced. It...
Captcha - Captcha, or CAPTCHA, are those noisy letters and numbers that you have to type in when signing up for something...
CDN - A CDN is an acronym for Content Delivery Network. A content delivery network, or CDN, is a system of servers...
CIFS - CIFS stands for Common Internet File System, and is a way to store data in files on a server. CIFS...
CC, BCC and Forward - Email is a powerful tool in the modern workplace. It has many advantages that make it an indispensable part of...
Cinema 4D - Cinema 4D is a powerful animation and rendering software that is used by many studios around the world. It's a...
CPU - The CPU, or Central Processing Unit, is the brain of your computer. It's as important to your machine as a...
Control Panel - Windows Control Panel is a software program from Microsoft that allows you to change the settings on your computer. It...
Cloud Drive - Cloud drive or cloud storage is a type of system where data can be accessed from remote servers rather than...
CompactFlash - The CompactFlash (CF) card is a 50-pin connection storage device that can be found in many different devices. It's perfect...

D

Download - A computer download is when you transfer files from one device to another with the use of a connection or...
Direct Download Link - A direct download link is a link that takes a user directly to a file or content without having to...
DSL - DSL stands for Digital Subscriber Line, and it's a type of internet connection that runs over your phone line. DSL...
DDR RAM - DDR SDRAM, commonly known as DDR RAM or DDR RAM for short, is a type of computer memory that can...
Deskside Support - Deskside support is a customer service technique that has been implemented by many companies in the past few years. Deskside...
Data Network - Data networks are the backbone of modern technologies. The internet, electricity grids, cyber security measures-all of these rely on data...
Dongle - Dongles are small hardware devices that can be used to expand the capabilities of a computer. They're often utilized for...
Digital Privacy - The average person spends more than several hours a day on their phone or computer. That includes checking the time,...
Doxxing - Doxxing is a serious problem that can have devastating consequences. It's not just celebrities who are at risk of being...
Digital Footprint - Digital footprint is the digital trace that we leave behind when we go online. The internet never forgets, and what...
Document grinding - Document grinding is a term that describes the process of reading and summarizing documents. Sound boring? It doesn't have to...
Deployment - Every day, web developers are putting up new coding projects for people to use around the world. As these websites...
Digital Twin Technology - We live in a world where technology has changed the way we do everything. From using our phones for banking,...
Desktop Metal - 3D printing has a deeper and highly important implication these days. There are several companies that are engaged in the...

E

End System - An end system is a device that is connected directly to the internet. An end system can be any type...
Ethernet Drivers - Ethernet drivers are an essential component of your computer’s network connection. Ethernet drivers are one of the most important pieces...
EVDO - EVDO is a type of wireless broadband internet connection. It’s not as fast as fiber optic, but it offers more...
Expansion Card - An expansion card is a type of hardware that can be used to enhance the capabilities of a computer system....
E-Newspapers - E-Newspapers are a new and innovative way to read the news. With an E-Newspaper, you can read the latest news...
Electric Trike - Electric trikes are becoming more and more popular because of the convenience that they offer. Electric trikes allow people to...
eSATA - eSATA (External SATA) is a standard interface for connecting storage devices to your computer. eSATA uses the same connector as...
eSIM - An eSIM can be added to smartphones or tablets via an over-the-air software update without having to physically replace a...
eBook - Nowadays, most people read books on their smartphones or tablets because they are so convenient to carry around with you....
EXIF - EXIF stands for Exchangeable Image File Format and it's a standard supported by many different cameras, including smartphones. This type...
Email Bomb - An email bomb is a spamming campaign that sends large number of emails to one person in a short period...
Emoticon - If you are on a social media site, or have seen text messages before, you may have come across emoticons....
Edtech - Education used to be a rather simple process. Students went into the classroom, sat at their desk, listened to the...

F

Full-Size Keyboard - A full-size keyboard is one of the larger keyboards that comes with a computer. The full-size keyboard is the standard...
File Type - In this article, we will be discussing the different file types and their properties. We hope that this article has...
Floppy Disk - A floppy disk, also called a floppy for short, is a magnetic storage device that was originally designed to store...
Fios - Fios Fiber Optic Service is a network of fiber optic cables that provides internet and television service to homes and...
File Signature - In computer programming, a file signature is a distinctive identifying number that appears at the start of every file. This...
Front Side Bus - A front side bus, or FSB for short, is a computer component that transfers data between the CPU and RAM....
Firewall - If you're like most business owners, you don't spend much time thinking about firewalls. But do you know what a...
Fintech - Fintech is a very broad term that covers many different industries and topics. The definition of fintech varies depending on...

G

Graphics Chipset - A Graphics chipset is a computer graphics card component that controls the images on your monitor by accessing the frame...
Gadget - The world is continuously changing, like how a caterpillar morphs into a butterfly. And together with this development are the...
Game Server - A game server is a computer that runs the logic of a multiplayer video game. It is responsible for sending...
Graphics Drivers - Graphics drivers are the software that allow for communication between your computer's hardware and the operating system. Without them, your...
Gibibyte - Gibibyte is a measurement of data storage. It is used to measure how much memory or disk space a device...
Google Web Stories - We all know that Google is the best search engine in the world. What you may not know, is how...

H

Hotkey - A hotkey is a key on the computer keyboard that will activate a certain action or command on your screen....
Hybrid Car - You might have heard about hybrids before - electric vehicles like the Tesla Model S are popular these days because...
HiDPI - HiDPI, also known as High Dots Per Inch is a new standard for screens. HiDPI is a term for screens...
HD - HD graphics are a type of graphic that is designed to have more pixels than the standard definition. HD stands...
Honeypot - You're not alone if you don't know what a honeypot is. It's understandable that the term might be unfamiliar, but...

I

Image Acquisition - Image acquisition is the process of converting an analogue image into digital form. This usually happens in a camera or...
iCloud - People often ask what is iCloud because it’s not always easy to understand at first glance. The best way for...
Inbox - The Inbox is the default location for all incoming email messages. You can create rules to have new mail forwarded...
Input Device - Input devices are a major part of computer technology. They allow us to interact with our computers in ways that...
Internet of Behavior - What does the Internet of Behavior mean? It is a term that has been used to describe how our everyday...

J

JPEG - In recent years, JPEG format has become a popular choice for storing and sharing images because of its fast compression...

K

Kibibyte - A kibibyte is a unit of data storage (digital information), just like a byte. But what does the letter "K"...

L

Low Res - Modern video games are so visually polished that you can't even tell they're 2D. This is in contrast to older...
L3 Cache - The L3 cache, also known as the third level or third-level cache, is specialized memory that works in tandem with...
Laptop - Laptops are a great tool for anyone who wants to be able to work and play on the go. They're...
Laptop Inverter - In the modern world, it is hard to imagine life without laptops. They are not only a computer for work...
Laptop Motherboard - Laptops are becoming more and more popular. However, there is a lot of confusion on the subject of laptop motherboards....
Landing Page - Landing pages are one of the most important aspects of successful online marketing. Landing pages help generate leads and capture...

M

Micro USB - Micro USB is a type of connector that was created in order to replace the traditional USB connector. It's smaller...
Motherboard Heatsink - Motherboard heatsinks are crucial parts of any PC’s cooling system because they help to lower the temperature in the machine,...
Mouse Pad - A mouse pad is an essential accessory for any PC gamer or those who works in front of a PC...
Midrange Computer - A mid-range computer is a vague term that refers to a computer system that is more powerful than a common...
MIME type - When you are browsing the internet, you may have seen a file extension such as .pdf or .doc and wondered...
MP3 - MP3 is a type of digital audio file that can be played on devices such as MP3 players, PCs and...
MDB - You’ve been trying to open an MDB file for an hour without a successful result. What are you going to...
MPEG - MPEG is a popular video file type that is used to store high-quality videos. They can be played in any...
Multimedia Kiosk - A multimedia kiosk is a stand-alone electronic device that can play music, show photos, and videos, as well as provide...
Mini Heatsink - A mini heatsink is a device that is used to distribute heat from the power source. These devices are usually...
Multimedia Data Mining - Multimedia data mining is a process that helps marketers understand their audience and find out what they need to do...
Mechanical Computer - A mechanical computer is an analogue machine that uses gears, levers and pulleys to represent the process of computation. These...
Mainframe Operating System - All computers, no matter how simple or sophisticated they may be use some sort of basic operating system. This is...
Memory Controller - The memory controller is responsible for handling all of the information that flows between the CPU and main memory. It...
Metal Detector - Metal detector is an electronic device that can detect many different types of metals, including aluminum, gold and lead by...
Monitor Stand - Monitor stands are a great way to add some style and functionality to your desk. They can also be used...
Monitor - Computer monitors are used in many different settings, but can be broadly classified into 7 types. The type of monitor...
Monitor Ports - Monitors are a crucial part of any computer. They allow you to view all of your documents and connect to...
Meme - Memes are a key part of modern day culture. They can be funny, ironic, or even serious. However, most people...
MRP - MRP was first developed in the 1970s to help companies manage their inventory levels and make better decisions about what...
Motherboard - A motherboard is the main circuit board in a computer system. It connects the various components of the system and...

N

NordVPN - NordVPN is a personal VPN service provider offering different VPN packages with varying features and prices. It is claimed to...
Northbridge Chip - Chips are usually seen as a component that is at the very foundation of a computer system. They may not...
NIC Driver - NIC drivers are something you need to know about if you want your computer to work properly. NIC stands for...
Network Bridge - A network bridge is a device that connects two different networks using the Ethernet protocol. It receives packets of data...
Noise Cancellation - Have you ever been in a noisy environment, like the subway station or airport terminal? It can be hard to...
Network Topology - Network topology is a term that refers to the layout of an internet network. This includes both wired and wireless...

O

Online Grocery Shopping - Shopping online for groceries is a great way to save time and money. It's also environmentally friendly because it reduces...
Online Ethic - The internet is an ever-growing field of social interaction and expression, but it is not without its pitfalls. A website...
Online Analytical Processing - The trend of "Big Data" has been growing rapidly in recent years. Online analytical processing (OLAP) is a type of...
One Wheel Scooter - One wheel scooters are the latest trend in transportation. They have become so popular that they're even being used for...
OSPF - If you are looking for a routing protocol that provides dynamic network connectivity between two endpoints, then OSPF may be...
OTT - You may have heard about OTT or Over-the-top before and not even realized it. It is a term that describe...
OneNote - Microsoft OneNote is a note-taking application that has been around for about 15 years. It's one of the most popular...
Output Device - It's not every day that we hear someone say "I want to buy a new monitor." But it is important...
Online Password Manager - Online password managers are software that store your passwords in a secure online location. They can be accessed from any...

P

Pirated Software - Pirating software involves copying and distributing computer programs without paying for the right to do so. The practice of pirating...
Power Supply Unit - One of the most important and often overlooked components in a computer is the power supply unit. It's the component...
PNG - PNG image file is commonly used on the web, but it has also been around since 1995. PNG files use...
PDF - The Portable Document Format might sound like a strange name, but there’s nothing mysterious about it when you understand what...
Parallel Operating Systems - A parallel operating system is a computer operating system, typically an application of a type-2 hypervisor which allows multiple instances...
Pen Drive - A pen drive or flash drive is a small, usually flat and rectangular USB storage device that can be used...
Podcast - Podcasts are an audio file that can be downloaded to your computer or mobile device. Podcast gives people the opportunity...
Ping - Ping is a command that sends data to another computer, and then waits for an acknowledgement. Ping works by sending...
Power Monitor - Power monitors are typically devices that plug into standard wall outlets and connect with a special electric meter that measures...
Pebibyte - What is pebibyte? This question may be on the minds of many computer users who are not familiar with this...
PROM - PROM, stands for Programmable Read-Only Memory, is a type of memory chip that can be programmed with software to produce...
PRAM - The term stands for "Parameter Random-Access Memory," and it can be found in the boot process of a computer. When...
PPPoE - PPPoE stands for Point to Point Protocol over Ethernet. It is a networking protocol that has been around since 1999. It...
PPTP - PPTP is a VPN protocol that was created by Microsoft, Ascend, 3COM, and a few other vendors. It stands for...
PPP - PPP stands for "Point-to-Point Protocol", which is a data link protocol that links two computers together over a point-to-point connection....
PPS - PPS stands for "Pay Per Sale." This is a term used in the affiliate marketing industry. It means that you...
PPC - PPC is an acronym for "Pay-Per-Click." This advertising model, also called a cost per click (CPC) or pay to play...
Permalink - Permalink is a link used to access the web page or post that you are currently on. The term "permanent...
P2P - With the advent of peer-to-peer (P2P) networks, it is now possible to share information without any third party in between....
Printer - Do you have a business? No matter if it’s online-based or a brick and mortar, you will need to print...
Pass-the-Hash Attack - A lot of us have heard about the term "pass the hash" when we are talking about passwords, but what...

R

Ransomware - Ransomware is one of the latest security threats to take hold on PCs and Macs. What is Ransomware? Ransomware is...
RJ-45 Port - A RJ-45 port is a network connector which allows you to connect your computer to your modem or router, so...
Renewable Energy - Green energy or renewable energy that can be used to power homes, businesses, and whole communities. Recently the renewable energy...
Resolution - The resolution of a digital image is the number of pixels per unit length, usually in millimeters. You’ve seen it...
RAM - You probably take RAM for granted. You may not know that there is a lot to know about it, and...

S

SD Card Reader - We often take for granted the little things in life, like SD card readers. However, if you’ve never had one...
Screenshot - Ever had a problem with your computer and wished you could show someone what it looked like? A screenshot is...
System Maintenance - System maintenance is the act of ensuring that your computer continues to perform at its peak. You can do this...
Software Evaluation - Software evaluation is the process of determining if a piece of software meets the needs of its users and whether...
Shopify - Shopify is a robust ecommerce platform that simplifies the process of selling physical and digital products. It allows you to...
Switch Port - A switch port, or network ports are what you need to connect your computer to the internet. A switch port...
System Software - In order to understand the different types of system software, it is important to know what a computer system generally...
Shift - The Shift key is a modifier key on a computer keyboard. The Shift key is a key on your keyboard...
Smartphone - Smartphones have made everything reachable and accessible through a touch. These devices have become an important part of our lives...
SYN Flood - SYN Flood attacks are one of the oldest and simplest types of denial-of-service (DOS) attack. Originally used in 1983, SYN...
SSL - Since the internet is a public place, anyone can see what you are doing online if they want to. This...
Search Engine - A search engine is a website that allows people to enter in keywords and then shows them results for those...
Storage Device - Storage devices are a type of technology that you may have at home or work. They store data for you...

T

Touchpad Sensitivity - A touchpad functions by sensing the electrical resistance of the human body's skin when it touches the pad. This is...
Trash Can - It’s surprising how often people are unsure of what a computer’s trash can is, or even that they have one....
Third-Party Applications - Third-party applications, or apps for short, are pieces of software that can be downloaded from the Internet and installed on...
TFT Monitor - A monitor is a device that displays information in pictorial or other form. It could be data, text, graphics etc....
Tebibyte - It's hard to believe that there are people who have never heard of a tebibyte before. The truth is, it's...
Text-to-Speech - Have you ever wondered how your favorite podcast, audiobook or news show got its audio? It is most likely text-to-speech...
Torrent - Torrents have been around for a while now, but what are they exactly? Torrent is an online peer-to-peer file sharing...
Toaster - A toaster is able to handle a good deal of cooking jobs which you do every day.  If you don’t...

U

USB Adapter - Have you ever wanted to transfer files, pictures or music from your phone onto your computer? If so, then you’ve...
USB 2.0 - USB 2.0 is a general term that refers to the Universal Serial Bus (USB) standard. Almost all USB-enabled devices and...
USB-C - USB-C is a new type of connector that is gaining popularity in the tech industry. This article will explore what...
UHD - You may be wondering what exactly is a UHD display. UDH stands for Ultra High Definition. A UHD display is...

V

VGA Cable - If you want to connect your computer monitor to your computer, the best option is a VGA cable. VGA stands...
VPN - A VPN, or Virtual Private Network, is a way to connect securely to a network. The best part about using...
VGA Driver - A video graphics adapter (VGA) driver can do many things for your computer, depending on how it’s configured. There are...
Vaporware - Vaporware is a word that refers to a product or service that has been announced but not yet released. The...
Vlog - Do you know what a vlog is? If you are not sure, then this post will help to clear things...
Virtual Learning Environment - A virtual learning environment can be a great way to go above and beyond what the average classroom offers. Not...
Virtual DJ - DJs may be a dime-a-dozen in the real world, but virtual DJing is different. Virtual DJs are able to play...
Video Game Console - The gaming industry has had a long history of innovation. It's been shaped by technological breakthroughs and game designers' creativity,...

W

WPA Key? - A WPA key is a wireless network security protocol designed to protect your wireless signal against unauthorized access. It uses...
What is a T1 Line? - A T1 line is a type of leased phone line that can transmit approximately 1.5 Megabits per second (Mbps) over...
What is a Core Router? - A core router is a device that connects networks together and routes traffic to different parts of your building or...
Wireless Charger - People never thought that wireless charging would exist, but it is a thing these days. Since wireless chargers are the...
WAN Port - A WAN port, or Wide Area Network Port, is a physical connection that provides network access for devices outside of...
Webp - WebP is an image file format that supports both lossless image extractions of digital images. The format can shrink image...
WAV Editor - A WAV editor is a powerful tool that can edit and cut samples, adding effects, and even adding music. This...
What is CMOS? - The term is often used to refer to a battery-powered chip found in many personal computers that holds some basic...
WWAN - What is a WWAN? If you're not sure what a WWAN is, don't worry. You're not alone. A lot of...

X

XMP - Many file types include information about the contents inside the file, which is called meta data. For example, many photos...
x86-64 - x86-64, also known as x64, x86_64, Intel 64, or AMD64, is the 64-bit version of the x86 instruction set. It...
xCloud - A new cloud-based game streaming service is coming from Microsoft. The company announced Project xCloud, a platform that will connect...

Z

Zone File - The zone file is a text file that contains information for the DNS server. The Zone File allows you to...
Zebibyte - Zebibyte is a unit of measurement that has been used for data storage. The prefix "zebi" comes from the Greek...

30+ Common Tech Terms

If you’re looking for some basic information on learning about technology, then this article is for you! We will be covering fifty of the most common technology terms that everyone should understand when trying to learn more about computers and technology in general.

These definitions are not exhaustive by any means, but these are some of the basics that anyone should be able to pick up after reading through this article. If there’s something specific that you want defined further or if there’s a term that should be added to this list, feel free to contact us.

  • Artificial Intelligence – the branch of computer science that deals with giving machines the ability to seem like they are “thinking;” could possibly be used in home automation systems, automated factories, and self-driving cars.
  • Autonomous Vehicle – a self-controlled motor vehicle which is capable of fulfilling the human transportation capabilities of a traditional automobile but with greater fuel efficiency, reduced traffic congestion, safer driving conditions, etc.; also responsible for the means by which these vehicles maneuver themselves without external influence.
  • Biometrics – technologies that can identify individuals based on biological features or attributes; examples include scanning fingerprints or retina patterns.
  • Blockchain – an encrypted list of records stored under unique addresses which are regularly updated whenever new records are created/added; commonly known as “block chains” when discussing data management.
  • GPU – Graphics Processing Unit, which is the primary hardware used for mining cryptocurrency due to its ability to perform parallel calculations (simultaneously) at high speeds; often paired with an ASIC (application-specific integrated circuit) for maximum efficiency.
  • ASIC – stands for “application-specific integrated circuit”, which is hardware that has been engineered to perform specific tasks very well; in this case, it refers to hardware designed solely for efficient cryptocurrency mining.
  • Crytocurrency – a type of digital currency in which encryption techniques are used to regulate cryptocurrency generation as well as verify fund transfers; most famous examples include Bitcoin, Ethereum, and Litecoin.
  • Artificial Neural Network (ANN) – a computer system modeled after the human brain that is capable of processing information from external stimuli in order to reach a logical conclusion or make predictions; often used in advanced robotics and image classification.
  • Cloud Computing – a business/research model in which resources are shared between multiple organizations, with each organization being able to access the resources they need on demand; often used for simultaneous computer processing and data storage purposes.
  • Contactless – any device that works without physical contact; could be used for payment purposes (ex: credit cards) or to unlock doors (ex: key fobs).
  • Distributed Denial of Service (DDOS) – an attack which is initiated by flooding a website’s server with traffic from various compromised systems so that it can no longer handle legitimate user requests; usually performed as an act of cyberbullying.
  • Fintech – any technological innovation related to finances, such as online banking, credit cards, etc.; could also refer to software or apps that allow for convenient banking services.
  • Automated Teller Machine (ATM) – a device which can be seen as the intersection of fintech, artificial intelligence, and autonomous vehicles due to its capability to perform banking transactions on behalf of customers without human supervision; very common within financial institutions.
  • Hydroponics – a form of agriculture in which plants are grown without soil and instead use nutrient-enriched water as their source of nourishment; a notable example of fintech implementation considering the reduced need for expensive farming equipment, land rights, etc.
  • Internet of Things (IoT) – an ecosystem in which any device that can connect to the internet is granted access to communicate with other devices for various purposes; could be used by major companies such as Amazon and Google as a shopping hub where users can purchase items at their leisure simply by clicking on links embedded into emails.
  • Wearables – electronic gadgets worn on either one’s person or as an accessory which have the ability to gather, transmit, and display various data for the user’s convenience; examples include smart watches and Google Glass.
  • SSH – Secure Shell is a type of connection that allows users to access an operating system remotely via certain internet protocols; used by major companies such as Google to manage their data centers.
  • VPN – Virtual Private Network, which is another type of remote connection that assigns the user an IP address from the organization they are affiliated with so that they can have private network access instead of being seen through public servers. Mobile App – any computer program designed for use on a mobile device.
  • Net Neutrality – regulations imposed by the U.S. government requiring ISPs to grant equal internet access regardless of user location or subscription plan without favoring or blocking specific products/websites; repealed within the U.S. in 2017 but still enforced in other countries throughout the world (ex: China).
  • Computer – an electronic machine capable of accepting data, processing it according to specified rules, and producing results or other data as output.
  • Memory – a temporary store of information used by a computer during calculations or tasks; may also refer to the amount of memory that a computer has, which can be measured in gigabytes or megabytes.
  • Password – a code used to allow access to restricted system features; typically protected by an individual’s unique username and password.
  • Operating System (OS) – the software program that provides the core functionality for most computers; may also refer to the official OS of one brand or manufacturer, such as Apple’s iOS or Microsoft’s Windows 8.
  • Advertisement – information about something that is aimed at increasing its public visibility or likability; commonly known as “spam” when it is distributed without permission through bulk emailing lists.
  • Website – an online collection of web pages made up of text, images, videos, and other multimedia files that are stored in a directory structure on a specific server and can be accessed through URLs.
  • Computer Hardware – physical elements of computer systems, such as keyboards, mice, speakers, monitors, and hard drives.
  • Computer Monitor – the part of a computer system which displays information in visually-perceptible form; typically an LCD screen with a built-in screen saver.
  • Computer Mouse – an input device attached to a computer for translating directional movements into cursor movement across the display screen; used primarily for graphical user interfaces (GUIs).
  • CPU or Processor – the “brains” of a computer responsible for carrying out instructions in sequence and interpreting/decoding operations received from operators/users; may also refer to the CPU of a mobile device, such as a tablet.
  • Input Device – any physical means of providing data to a computer system, whether it be from input sent through keyboarding/typing or from input received by touching display screens with styluses and fingers.
  • Printer – an output device attached to a computer for printing text and images on sheets of paper; typically uses liquid ink in order to produce more vivid colors than monitors can allow.
  • Scanner – an input device capable of scanning printed materials and converting them into digital format so that they can be edited on a computer or digitally distributed.

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close