Glossary of technical IT terms

This glossary compiles a list of technical computer terms , acronyms, etc. that appear frequently in the world of the Internet. Being primarily aimed at the lay public , the entries are highly succinct and simplified, aiming no further than to give a first idea of ​​the meaning of each technical term.

API

It stands for Application Programming Interface , which allows communication between different software.

Cloud Storage

Service that allows users to store and access data over the Internet , rather than just locally.

ARP

It is the Address Resolution Protocol , used to associate an IP address with a physical address (MAC).

Backdoor

It is a hidden gateway into a system, often used for malicious purposes .

Backup

It is a backup copy of important data , to avoid loss in case of failure or damage.

Database

A structured collection of data that can be accessed, managed and updated electronically.

bash

It is a shell (command interpreter) used on Unix and Linux systems.

Blockchain

A decentralized digital ledger that records transactions across multiple computers in a secure, transparent and tamper-resistant manner.

Blog

Website or platform where people share life experiences, recipes, share opinions with other users, etc.

Bridge

It is a network device that connects two local area network segments (LANs) to allow communication between them.

Broadcast

It is the transmission of a message to all devices on a network.

Buffer

It is a temporary data storage area

Cache

Temporary storage area used by browsers and applications to speed up loading of web pages and improve performance.

Carder

It is a term widely used by people who work in groups or alone on the internet with the aim of obtaining credit card data for online fraud.

Encryption key

A secret code used to encrypt and decrypt data.

Clickbait

It is a term that refers to internet content that is intended to generate online advertising revenue

Client

It is a device or software that connects to a server to access services or resources.

Cloud computing

The delivery of computing services over the Internet , including storage, servers, databases, software, and more.

Serverless computing

Cloud computing execution model in which the cloud provider dynamically manages machine resource allocation.

Version control

Managing changes to documents, computer programs, and other collections of information.

Cryptocurrency

A cryptocurrency, also known as cybercurrency, is a generally decentralized payment system that employs blockchain technology and cryptography to ensure the authenticity of transactions and the issuance of new monetary units.

Cookies

Small text files that websites store in your browser. They contain information about your online activity, such as preferences and browsing history. Cookies are used to improve user experience, provide targeted advertising, and enable websites to remember you for future visits .

Cracker

Or cyberpirate, is the term used to designate an individual who breaks a security system illegally or unethically.

Cryptography

The process of transforming plain text into code to make it unreadable to anyone who does not have the key to decode it. Generally used for storing sensitive data and passwords.

CrowdFunding ( Collective Financing )

Obtaining capital for initiatives of collective interest through the aggregation of multiple sources of financing, generally individuals interested in the initiative.

DDoS

It is a distributed denial of service attack , in which multiple devices are used to overload a server or network.

Responsive design

The practice of creating web pages that adjust their layout and content to adapt to different screen sizes and devices.

DMZ

Demilitarized Zone (DMZ) is a perimeter network that protects an organization's internal local area network (LAN) from untrusted traffic.

DNS ( Domain Name System )

It is a system human- readable domain names It is fundamental for communication on the internet, as computers and devices use IP addresses to connect to each other, while humans prefer to use domain names that are easier to remember, such as “www.example.com”.

Domain

A domain is a unique and unique name that is assigned to a website, service or online resource. It is used to identify and locate these entities on the network. In other words, the domain is the digital address of a website on the internet.

Of the

It is the denial of service attack , where a device or network is overloaded to make it inaccessible.

Download

A download is the process of transferring data or files from a remote server to a local device such as a computer, smartphone or tablet. During a download, data is copied from the source (server) to the destination (user device).

E-commerce ( Electronic Commerce )

It refers to the buying and selling of products and services over the Internet . It is a business model in which commercial transactions are carried out online.

Email

Method of sending and receiving messages online.

MAC address ( Media Access Control )

It is a unique identifier associated with a network device , used to identify devices on a local network. It is made up of six pairs of hexadecimal characters and is assigned by the device manufacturer. It is used in conjunction with the ARP protocol to associate an IP address with a physical address.

Social engineering

It is a technique used by online scammers to manipulate and deceive people by exploiting their trust and lack of knowledge. This can occur through fake emails, fraudulent phone calls or misleading messages on social media.

Ethernet

It is a wired network technology , with high transfer rate.

Extranet

It is a private network that allows access to external users , such as customers or suppliers.

FAQ

It is a list of frequently asked questions and their answers.

firewall

Internet traffic security and monitoring system

FTP

It is the File Transfer Protocol , used to transfer files between computers.

Gateway

It is a device that connects different networks , allowing data traffic between them.

HTML

Hypertext Markup Language, is the standard language used to create and design websites and web pages. It forms the backbone of most web content and is an essential skill for anyone interested in web development or design. HTML is not a programming language, but rather a markup language that structures content on the web.

HTTP

It is the Hypertext Transfer Protocol , used for communication between servers and clients on the web.

Hub

It works like a switch, but it does not perform intelligent data distribution. It sends the same data to all connected devices , this decreases efficiency and bandwidth sharing.

AI (Artificial Intelligence)

Branch of computer science that deals with the development of intelligent machines that can perform tasks that normally require human intervention.

Internet

The internet is a global network of connected computers that allows information sharing, instant communication, access to online services and resources, such as accessing your bank account.

intranet

A private network used by a company or organization to share information and resources internally.

IoT (Internet of Things)

A network of physical devices, vehicles, appliances, and other items that are embedded with electronics, software, sensors, and network connectivity, which allows them to collect and share data.

IP ( Internet Protocol )

It is a sequence of numbers assigned to each device connected to the internet, it works as an identifier to allow communication between devices.

ISDN ( Integrated Services Digital Network)

It is a communication network technology , which allows simultaneous transmission of voice and data.

ISP ( Internet Server Provider )

Internet Server Provider , this is your internet provider, the company you hired to have internet access.

Keylogger

It is a malicious system that records everything typed on the keyboard and forwards it to criminals.

Lammer

It is a term used for people who have no or little knowledge about hacking and use tools developed by others to carry out their attacks.

LAN

It is a local network , which connects devices in a limited geographic area.

Bandwidth

It is a measure of the amount of data that can be transmitted over a network connection.

LGPD ( General Data Protection Law )

Its main objective is to protect the fundamental rights of freedom and privacy and the free development of the personality of the natural person.

It is a clickable element that redirects the user to another website, to a part of the same page or resource.

Malware

Term referring to malicious software designed to damage, infect, or gain unauthorized access to a computer system. This includes viruses, worms, Trojans, ransomware and spyware.

Man-in-the-middle

It is a scam strategy used on the internet where an individual with bad intentions infiltrates your router and the internet , analyzing all your data traffic and being able to access important information, such as personal data or even bank accounts.

Modem

Device that converts analog signals into digital signals and vice versa, thus allowing connection to the internet through optical fiber, for example.

Multicast

It is the transmission of a message to a selected group of devices on a network.

NAT

Network Address Translation , used to map public IP addresses to private IP addresses.

Software used to browse the internet , Google, Firefox, Microsoft Edge…

Package

It is a unit of data transmitted over a network.

Web page

It is a document that can be accessed through the browser and displayed on the device.

Phishing

It is a very common strategy on the internet for data theft, it usually occurs through replica websites of trusted institutions.
| Read more at: What is Phishing?

Phreacker

Mobile and landline hacker. Phreakers use techniques to bypass telephone company security systems, usually to make free calls or obtain credits.

Access point

It is a device that provides wireless network access, usually through Wi-Fi.

Door

It is a communication interface on a network device, which allows connection to other devices.

Ransomware

It is a type of data hijacking malware, carried out through encryption, which uses the victim's own personal files as a hostage and charges a ransom to reestablish access to these files.

| Learn more about Ransomware .

P2P Network ( torrent )

It is a technique for downloading very large files, this technique consists of dividing this large file into small ones and making several downloads at the same time.

Computer network

A computer network is when two or more devices are connected to each other within the same network.

Social media

Online platforms that allow people to connect and share content. Ex: Instagram, Twitter, Facebook…

Repeater

It is a device that amplifies and retransmits a signal over a network.

Router

It is a network device that directs data traffic between different networks. It acts as a connection point between devices on a local area network (LAN) and the internet.

SEO ( Search Engine Optimization )

It is the process of optimizing a website or online content to improve its visibility and ranking in search engine results, such as Google.

Server

It is a device or software that provides services or resources to other devices on a network.

SaaS ( System as a Service )

This is a software distribution model in which the service is provided over the Internet. The software vendor hosts and maintains the servers, databases, and code that make up the application. This frees up companies to focus solely on using the software, without having to worry about maintenance and infrastructure.

Operating System (OS)

A software program that manages a computer's hardware and software resources and provides common services for computer programs.

Sniffer

It is a protocol analyzer , that is, a system for monitoring traffic on a local network.

Spam

A large number of unwanted messages , usually of a commercial nature, occur via email or other means of electronic communication.

SSL ( Secure Sockets Layer ) / TLS ( Transport Layer Security )

These are security protocols that encrypt communication between a client (browser, for example) and a server. They guarantee the integrity, authenticity and confidentiality of data transmitted over the Internet

Streaming

It is the reproduction of audio or video over the internet , without having to download the file.

Spyware

It is malicious software that collects information from a device without the user's knowledge.

Switch

It is a central device that allows devices to connect and communicate with each other efficiently and directly, ensuring that data is only sent to the correct recipients.

Trojan

Or Trojan horse is any malware that misleads users about its true intention.

UDP

It is the User Datagram Protocol , used for transmitting real-time data over a network.

Upload

Process of transferring files from a local device to the internet.

URL ( Uniform Resource Locator )

Uniform Resource Locator means web address , whatever you type in the search bar will be found from it.

Virus

Malicious program , infects a computer with the intention of damaging devices and stealing data

Vishing

It uses voice resources , such as calls from supposed internet telephony services (VoIP) to deceive victims and extract personal and confidential information, such as bank passwords, credit cards and CPF.

VoIP

Or voice over internet protocol, is a technology that allows voice transmission over IP (Internet Protocols).

VPN ( Virtual Private Network )

It is a technology that creates a secure, encrypted connection between a device and the Internet, allowing you to browse anonymously and access geographically restricted content.

VPS ( Virtual Private Server )

A web hosting service that allows users to access a dedicated virtual server. This gives users greater control over their server environment, allowing them to install and configure the software of their choice.

WAN

It is a wide area network , which connects devices in different geographic locations.

Web site

They are a set of related internet pages that you access through an internet address.

Worm

A type of malware that automatically propagates across a network without user interaction.

WWW ( World Wide Web )

It is a part of the internet made up of a set of interconnected documents and resources , accessible through web browsers.

3G, 4G and 5G

These are generations of mobile network technology. The acronym “G” stands for “GSM” or Global System for Mobile Communications, in Portuguese, and refers to a type of mobile network , which allows telephone calls and access to Internet.

Related Posts