170+ Tech Terms
You Should Know
by
A comprehensive guide to essential technology terms for students, beginners, and tech enthusiasts
Welcome to Your Tech Journey
Technology is everywhere around us, but understanding its language can be challenging. This guide breaks down 170+ essential tech terms into simple, jargon-free explanations that anyone can understand.
For Students
Perfect for high school and college students learning tech basics
For Beginners
Start your tech career with confidence and clear understanding
For Creators
Enhance your digital literacy and creative projects
1. Web & Internet Basics
URL
Uniform Resource Locator - A web address
The specific address that tells your browser where to find a website or webpage. Like a street address for websites, it starts with "http://" or "https://" and includes the domain name.
Server
A computer that provides services to other computers
Think of it as a powerful computer that stores websites and files, then sends them to your device when you request them. Every website lives on a server somewhere in the world.
Domain Name
The human-readable address of a website
Instead of remembering complex numbers, we use domain names like "google.com" or "facebook.com". It's like giving a nickname to a long street address so it's easier to remember.
HTTPS
Secure version of HTTP protocol
The "S" stands for Secure. When you see HTTPS in a URL, it means your communication with that website is encrypted and protected from hackers trying to spy on your data.
Cookies
Small files websites store on your computer
These help websites remember you and your preferences. For example, cookies keep you logged into your favorite social media site so you don't have to enter your password every time.
Bandwidth
The maximum amount of data transmitted over internet
Think of it like the width of a highway - more bandwidth means more data can travel at once, resulting in faster internet speeds and smoother streaming.
Cache
Temporary storage for quick access to data
Your browser saves parts of websites you visit frequently so they load faster next time. It's like keeping your most-used apps on your phone's home screen for quick access.
Plugin
Software that adds features to another program
Like accessories for your browser or software. Ad blockers, password managers, and translation tools are popular browser plugins that extend functionality.
Refresh Rate
How often content updates per second
Measured in Hz (hertz), it determines how smooth motion appears on your screen. Higher refresh rates mean smoother scrolling and better gaming experiences.
Download
Copying files from internet to your device
When you save a photo, video, or document from the internet to your computer or phone, you're downloading it. The opposite is uploading - sending files from your device to the internet.
Streaming
Playing media content without downloading it first
Netflix, YouTube, and Spotify use streaming - you watch or listen in real-time without storing the entire file on your device. It saves storage space and allows instant access.
Protocol
Rules for how computers communicate
Like languages that computers use to talk to each other. HTTP is for websites, FTP for file transfers, and SMTP for emails. Each has specific rules for how data should be sent and received.
Browser
Software used to access and view websites
Programs like Chrome, Firefox, Safari, and Edge that translate website code into the visual pages you see. They're like translators that turn computer language into human-friendly displays.
Bookmark
Saved shortcuts to your favorite websites
Instead of typing long URLs repeatedly, you can bookmark websites for one-click access. It's like putting a sticky note on important pages in a physical book.
Browser History
Record of websites you've visited
Your browser keeps track of where you've been online, making it easy to revisit sites you can't quite remember. You can clear this history for privacy if needed.
Incognito Mode
Private browsing that doesn't save history
Also called Private Mode, it doesn't save your browsing history, cookies, or passwords. Useful for sensitive browsing or when using shared computers, though it doesn't make you invisible online.
IP Address
Unique number identifying devices on internet
Like a postal address for your device on the internet. Every computer, phone, and smart device has one so data knows where to go. It looks like four numbers separated by dots (like 192.168.1.1).
Router
Device that connects multiple devices to internet
The box in your home that creates Wi-Fi and connects all your devices to the internet. It directs data traffic between your devices and the broader internet, like a traffic controller.
Ethernet
Wired internet connection using cables
The cable connection that plugs directly into your computer or router for internet access. Usually faster and more stable than Wi-Fi, which is why gamers often prefer ethernet connections.
Firewall
Security system that monitors internet traffic
Like a security guard for your computer that blocks harmful data and allows safe connections. It can be software on your computer or hardware in your router protecting your entire network.
Search Engine
Tool that finds information on the internet
Google, Bing, and Yahoo are search engines that scan billions of web pages to find what you're looking for. They use complex algorithms to rank results by relevance and quality.
SEO
Search Engine Optimization - making content findable
Techniques used to make websites appear higher in search results. It involves using relevant keywords, creating quality content, and following best practices that search engines prefer.
Hyperlink
Clickable text or image that takes you to another page
Usually shown in blue and underlined, clicking a hyperlink navigates you to a different webpage or section. They're what make the web "web-like" by connecting different pages together.
HTML
HyperText Markup Language - the building blocks of websites
The basic code language used to create web pages. It uses tags to define elements like headings, paragraphs, and images. Think of it as the skeleton that gives websites their structure.
CSS
Cascading Style Sheets - controls website appearance
While HTML provides structure, CSS makes websites look pretty by controlling colors, fonts, layouts, and animations. It's like the decorator that makes a house beautiful after it's built.
Responsive Design
Websites that adapt to different screen sizes
A website with responsive design looks good whether you're viewing it on a phone, tablet, or computer. The layout automatically adjusts to fit your screen size perfectly.
RSS Feed
Really Simple Syndication - automatic content updates
A way to automatically get updates from your favorite websites without visiting them. RSS readers collect new articles from multiple sites in one place, like a personalized news aggregator.
VPN
Virtual Private Network - secure internet connection
Creates a private, encrypted tunnel for your internet traffic, hiding your activity from others and allowing access to region-blocked content. Like having a private highway for your data.
Ad Blocker
Software that prevents advertisements from displaying
Browser extensions or apps that remove ads from websites, making pages load faster and providing a cleaner browsing experience. Some websites ask you to disable them to support their content.
Pop-up
Small window that appears on top of main content
Often used for advertisements, notifications, or forms that require immediate attention. Most browsers can block unwanted pop-ups, but some legitimate sites use them for important information.
2. Hardware Components
CPU
Central Processing Unit - the brain of your computer
Executes all the instructions and calculations your computer needs to run. The faster your CPU, the quicker your computer can process tasks like opening applications, calculations, and multitasking.
RAM
Random Access Memory - temporary workspace for active tasks
Where your computer stores data it's currently using. More RAM means you can run more programs simultaneously without slowing down. It's cleared when you turn off your computer.
Hard Drive
Permanent storage device for your files and programs
Stores all your data, photos, videos, and software even when the computer is off. Traditional hard drives use spinning disks, while newer SSDs use flash memory for faster access.
SSD
Solid State Drive - faster storage with no moving parts
Modern replacement for traditional hard drives that's much faster, more reliable, and uses less power. Makes your computer boot up quicker and programs load faster.
GPU
Graphics Processing Unit - handles visual rendering
Specialized processor for creating images, videos, and animations. Essential for gaming, video editing, and increasingly important for AI tasks. Can be built into the CPU or as a separate card.
Motherboard
Main circuit board connecting all computer components
Like the nervous system of your computer, it connects the CPU, RAM, storage, and other parts together. All components plug into or connect through the motherboard.
Power Supply
Converts wall electricity to power computer components
Takes the AC power from your wall outlet and converts it to the specific DC voltages your computer parts need. A stable, sufficient power supply is crucial for system reliability.
Cooling System
Fans and heat sinks that prevent overheating
Computer components generate heat when working, so cooling systems use fans, heat sinks, and sometimes liquid cooling to keep temperatures safe and maintain performance.
Monitor
Display screen that shows computer output
The visual interface between you and your computer. Modern monitors can be LCD, LED, or OLED with different sizes, resolutions, and refresh rates for various needs and budgets.
Keyboard
Input device for typing and computer commands
Your primary tool for entering text and commands. Available in mechanical, membrane, and wireless varieties, each with different feel, durability, and features for different user preferences.
Mouse
Pointing device for navigating computer interfaces
Allows you to move a cursor on screen, click on items, and navigate through graphical interfaces. Modern mice can be wired, wireless, or use different sensor technologies for precision.
Webcam
Camera device for video calls and recording
Captures video for video conferencing, streaming, or content creation. Can be built into laptops and monitors or connected as external devices with varying quality and features.
Microphone
Audio input device for recording voice and sound
Captures audio for video calls, voice recordings, or streaming. Can be built-in, clip-on, or professional studio microphones depending on quality needs and use case.
Speakers
Audio output devices that produce sound
Convert electrical signals into audible sound waves. Range from basic computer speakers to high-quality audio systems, with options for stereo, surround sound, or headphone alternatives.
Headphones
Personal audio devices worn on or in ears
Provide private listening without disturbing others. Available as over-ear, on-ear, or in-ear styles with wired, wireless, or noise-canceling features for different preferences and budgets.
Printer
Device that creates physical copies of digital documents
Converts digital files into printed paper documents or photos. Common types include inkjet for photos and color, laser for text documents, and all-in-one units with scanning capability.
Scanner
Device that converts physical documents to digital files
Creates digital copies of photos, documents, or artwork by capturing their image. Useful for digitizing old photos, creating digital backups, or converting paper documents to editable text.
USB Port
Universal Serial Bus - standard connection for devices
Common rectangular port for connecting various devices like flash drives, keyboards, mice, and phones. Different versions (USB 2.0, 3.0, 3.1, USB-C) offer different speeds and capabilities.
Memory Card
Removable storage for cameras, phones, and devices
Small, portable storage devices like SD cards used in cameras, phones, and tablets. They come in various sizes and storage capacities for different device requirements.
Battery
Rechargeable power source for portable devices
Stores electrical energy to power laptops, phones, and other portable devices when not plugged in. Battery life and charging speed are important factors for mobile device usability.
Touchscreen
Display that responds to finger touches and gestures
Allows direct interaction with on-screen elements through touch, swipe, and gesture controls. Common on phones, tablets, and increasingly on laptops and all-in-one computers.
Network Card
Hardware that enables internet and network connections
Built-in component that allows your device to connect to Wi-Fi networks or wired ethernet connections. Modern devices typically have both wireless and wired networking capabilities.
Bluetooth
Short-range wireless technology for device connections
Allows devices to connect wirelessly over short distances for sharing files, connecting headphones, keyboards, mice, and other accessories without cables or internet required.
Optical Drive
Device for reading CDs, DVDs, and Blu-ray discs
Hardware that can read and often write to optical discs. Less common in modern computers as digital downloads and cloud storage have largely replaced physical media for software and content.
Heat Sink
Metal component that dissipates heat from processors
Usually made of aluminum or copper with fins to increase surface area, it draws heat away from hot components like CPUs and GPUs to prevent overheating and maintain performance.
Bus
Pathway for data transfer between computer components
Like highways inside your computer that carry data between the CPU, RAM, storage, and other components. Different buses handle different types of data and operate at various speeds.
Clock Speed
How fast a processor executes instructions per second
Measured in gigahertz (GHz), it indicates how many billions of operations a CPU can perform each second. Higher clock speeds generally mean faster processing, though architecture also matters.
Cache Memory
Small, very fast memory close to the processor
Stores frequently used data and instructions for immediate access by the CPU. Multiple levels (L1, L2, L3) provide different speeds and sizes to optimize performance for common tasks.
Cores
Independent processing units within a CPU
Modern processors have multiple cores (dual-core, quad-core, etc.) that can handle different tasks simultaneously. More cores generally mean better multitasking and performance for demanding applications.
3. Software & Operating Systems
Operating System
Software that manages computer hardware and other programs
The foundation software like Windows, macOS, or Linux that controls your computer's basic functions, manages files, runs applications, and provides the user interface you interact with daily.
Application
Software program designed for end-users
Programs you use to accomplish specific tasks like word processing, photo editing, gaming, or browsing the web. Also called "apps," they run on top of the operating system.
Installation
Process of setting up software on your computer
Copies program files to your system and configures them to work properly. Modern systems often use app stores or package managers to simplify installation and ensure security.
Update
New version of software with improvements or fixes
Patches that fix bugs, add features, or improve security. Regular updates keep your software secure and running smoothly. Many programs can update automatically.
Driver
Software that allows operating system to communicate with hardware
Bridge between your OS and hardware components like graphics cards, printers, or sound devices. Outdated drivers can cause hardware problems, so keeping them updated is important.
File System
Method of organizing and storing files on storage devices
Determines how data is stored, organized, and retrieved from hard drives or SSDs. Different operating systems use different file systems like NTFS, FAT32, or APFS.
GUI
Graphical User Interface - visual way to interact with computers
The windows, icons, menus, and buttons you click instead of typing text commands. Makes computers user-friendly by providing visual representations of functions and files.
Command Line
Text-based interface for controlling computer functions
Alternative to GUI where you type commands to perform tasks. More powerful for advanced users and automation, though less intuitive than clicking buttons and icons.
Process
Running instance of a program in computer memory
When you open an application, it becomes a process that uses CPU and memory resources. Task Manager shows active processes and their resource usage for troubleshooting.
Task Manager
System utility showing running programs and resource usage
Tool for monitoring system performance and managing running applications. Useful for closing unresponsive programs, checking resource usage, and troubleshooting performance issues.
Boot/Startup
Process of starting up a computer system
When you turn on your computer, it goes through boot sequence - loading the operating system, checking hardware, and starting essential programs. Startup programs launch automatically during this process.
Shutdown
Process of safely turning off a computer
Closes all programs, saves system state, and powers down hardware properly. Proper shutdown prevents data loss and system corruption that can occur from just cutting power.
Sleep Mode
Low-power state that preserves your work session
Saves current session to memory and reduces power consumption while keeping programs running. Wakes up quickly when you move the mouse or press a key, resuming exactly where you left off.
Compression
Reducing file sizes to save storage space
Algorithms that make files smaller for storage or transmission. Common formats include ZIP, RAR, and 7Z. Some compression is "lossy" (permanently removes data) while others are "lossless" (fully reversible).
Backup
Copy of important data stored separately for protection
Essential practice of duplicating important files to prevent loss from hardware failure, accidents, or malware. Can be stored on external drives, cloud services, or network locations.
System Restore
Feature that reverts system to previous working state
Creates snapshots of system settings and installed programs, allowing you to undo changes if something goes wrong. Useful for recovering from problematic software installations or system errors.
User Account
Individual profile with personalized settings and permissions
Separate workspace for each person using the computer, with their own files, preferences, and access rights. Administrators have more control than standard users for security.
Password
Secret code for accessing accounts and systems
Primary security measure protecting your accounts and data. Strong passwords use a mix of letters, numbers, and symbols. Password managers help create and store unique passwords for each account.
Encryption
Converting data into secret code to protect it
Scrambles information so only authorized parties with the key can read it. Used to protect sensitive data in storage, transmission, and communication from unauthorized access.
Bug
Error or flaw in software code
Unintended behavior that causes programs to malfunction, crash, or produce incorrect results. Software developers release patches and updates to fix bugs as they're discovered.
Patch
Small update that fixes specific problems
Targeted software update addressing particular bugs or security vulnerabilities without changing major functionality. Often released quickly to address urgent issues between major updates.
Version
Specific release of software with unique features
Software evolves through versions, typically numbered like 1.0, 2.1, etc. Major versions add significant features while minor versions fix bugs or add small improvements.
License
Legal agreement defining how software can be used
Terms that specify whether software is free, requires payment, can be modified, or shared. Common types include proprietary, open source, shareware, and freeware with different restrictions.
Open Source
Software with freely available source code
Programs where the underlying code is public, allowing anyone to study, modify, and distribute it. Examples include Linux, Firefox, and LibreOffice. Often free but not always.
Proprietary
Software owned and controlled by a company
Commercial software where the source code is secret and usage is restricted by license agreements. Examples include Windows, Adobe Photoshop, and most commercial games.
Freeware
Software available at no cost
Programs that are free to use but typically not open source - you can't modify the code. Examples include many antivirus programs, media players, and utility software.
Shareware
Software with free trial period before purchase required
Try-before-you-buy model where you can use full or limited functionality for a specified time, then must purchase a license to continue using it legally.
Beta Version
Pre-release version for testing purposes
Nearly complete software released to users for testing and feedback before final release. May contain bugs but allows early access to new features and helps developers improve quality.
Crash
Unexpected termination of a program or system
When software stops working suddenly, often due to bugs, resource exhaustion, or conflicts. May result in data loss if work wasn't saved, which is why regular saving is important.
Freeze/Hang
When software becomes unresponsive
Program stops responding to user input but continues running. Often caused by infinite loops, waiting for resources, or overwhelming the system. May require force-closing the application.
4. Cybersecurity Terms
Malware
Malicious software designed to harm or exploit systems
Umbrella term for harmful programs including viruses, trojans, ransomware, and spyware. Can steal data, damage files, or give criminals control of your device.
Virus
Self-replicating malicious code that spreads to other files
Like biological viruses, computer viruses attach to other programs and spread when those programs run. Can corrupt data, slow systems, or enable other attacks.
Trojan Horse
Malware disguised as legitimate software
Appears helpful but contains hidden malicious code. Named after Greek mythology, it tricks users into installing it, then performs harmful actions like stealing passwords or downloading more malware.
Ransomware
Malware that encrypts files and demands payment
Locks your files or entire computer and demands ransom payment for the key to unlock them. Even paying doesn't guarantee file recovery, making backups crucial for protection.
Spyware
Software that secretly monitors user activity
Runs hidden on your device, collecting information about browsing habits, passwords, or personal data. Often bundled with legitimate software or installed through deceptive ads.
Adware
Software that displays unwanted advertisements
Shows pop-up ads, changes browser settings, or redirects searches to generate revenue for creators. While not always malicious, it's often unwanted and can slow down devices.
Phishing
Fraudulent attempts to steal sensitive information
Fake emails, websites, or messages that impersonate legitimate organizations to trick you into revealing passwords, credit card numbers, or personal information. Always verify sender authenticity.
Social Engineering
Manipulating people to reveal confidential information
Psychological manipulation rather than technical hacking. Attackers may pretend to be IT support, friends, or authorities to trick you into giving passwords or access to systems.
Botnet
Network of infected computers controlled remotely
Criminals use malware to control many computers simultaneously for coordinated attacks like spam email, DDoS attacks, or cryptocurrency mining without owners' knowledge.
DDoS Attack
Distributed Denial of Service - overwhelming servers with traffic
Attack that floods websites or services with massive amounts of fake traffic to make them unavailable to legitimate users. Often uses botnets to generate the traffic.
Two-Factor Authentication
Security requiring two different verification methods
Adds extra security beyond passwords by requiring something you know (password) and something you have (phone, token) or are (fingerprint). Makes accounts much harder to hack.
Biometrics
Authentication using physical characteristics
Security systems that use fingerprints, face recognition, iris scans, or voice patterns for identification. Harder to steal or fake than passwords, but raises privacy concerns.
SSL Certificate
Digital certificate ensuring secure website connections
Enables HTTPS encryption between your browser and websites. Look for the padlock icon in your address bar - it means the site has a valid SSL certificate and communications are encrypted.
Antivirus
Software that detects and removes malware
Scans files and programs for malicious code, quarantines threats, and provides real-time protection. Needs regular updates to recognize new threats, but is essential for system security.
Firewall
Barrier that filters network traffic
Examines data coming to and from your computer, blocking potentially harmful connections while allowing legitimate traffic. Can be software on your computer or hardware in routers.
Anonymous Browsing
Web browsing that hides your identity and activity
Uses tools like VPNs, Tor browsers, or proxy servers to mask your IP address and browsing patterns. Provides privacy but may be slower than regular browsing.
Data Breach
Unauthorized access to sensitive information
When criminals gain access to databases containing personal information, passwords, or financial data. Major breaches often make news and require affected users to change passwords.
Identity Theft
Stealing personal information to impersonate someone
Criminals use stolen data like social security numbers, addresses, and financial information to open accounts or make purchases in your name. Can cause serious financial and legal problems.
Penetration Testing
Authorized testing of system security weaknesses
Ethical hackers attempt to break into systems with permission to find vulnerabilities before criminals do. Helps organizations improve security by discovering weak points.
Vulnerability
Security weakness that could be exploited
Flaws in software, hardware, or procedures that criminals could use to gain unauthorized access or cause damage. Regular updates and patches fix known vulnerabilities.
Exploit
Code or technique that takes advantage of vulnerabilities
Method used to attack security weaknesses. Zero-day exploits target unknown vulnerabilities, making them particularly dangerous because no patches exist yet.
Brute Force Attack
Trying many password combinations until finding the right one
Automated attack that systematically tries different passwords or encryption keys. Strong, long passwords and account lockouts after failed attempts help defend against these attacks.
Hacker
Person who gains unauthorized access to computer systems
Can be malicious (black hat), ethical (white hat), or somewhere between (gray hat). Ethical hackers help improve security, while malicious hackers commit crimes for profit or damage.
Sandbox
Isolated environment for safely testing suspicious files
Virtual container where potentially dangerous programs can run without affecting the main system. Security software uses sandboxes to analyze malware safely.
Security Audit
Comprehensive evaluation of system security measures
Systematic review of security policies, procedures, and technical controls to identify weaknesses and ensure compliance with standards. Usually performed by external security experts.
Security Policy
Rules and procedures for protecting information systems
Formal document outlining security requirements, acceptable use, incident response procedures, and responsibilities. Essential for organizations to maintain consistent security practices.
Incident Response
Organized approach to handling security breaches
Pre-planned procedures for detecting, containing, investigating, and recovering from security incidents. Quick response can minimize damage and help identify attack methods.
Cryptocurrency Mining Malware
Malware that uses your computer to mine digital currency
Secretly uses your device's processing power to generate cryptocurrency for criminals, slowing down performance and increasing electricity costs without your knowledge or consent.
Mobile Security
Protection measures for smartphones and tablets
Includes app permissions, device locks, secure app stores, and remote wipe capabilities. Mobile devices face unique risks from app malware, unsecured Wi-Fi, and physical theft.
WiFi Security
Protecting wireless network connections
Uses encryption protocols like WPA3 to secure wireless communications. Avoid public WiFi for sensitive activities, use VPNs when necessary, and secure your home network with strong passwords.
5. Programming & Dev Tools
Programming Language
Set of rules for writing instructions for computers
Human-readable language that gets translated into machine code. Examples include Python, JavaScript, Java, and C++. Each has different strengths for different types of projects.
Source Code
Human-readable instructions written by programmers
The actual text of a program before it's converted to machine code. Contains the logic, algorithms, and structure that define how software behaves and what it can do.
Compiler
Tool that converts source code into executable programs
Translates human-readable code into machine language that computers can directly execute. Creates standalone programs that can run without the original source code present.
Interpreter
Tool that executes code line by line without compiling
Reads and executes source code directly, translating it on-the-fly. Languages like Python and JavaScript use interpreters, allowing for interactive programming and easier debugging.
Debugging
Process of finding and fixing errors in code
Essential skill involving identifying why programs don't work as expected. Uses tools like debuggers, print statements, and systematic testing to locate and resolve issues.
Algorithm
Step-by-step procedure for solving a problem
Like a recipe for computers, algorithms define the exact steps needed to accomplish a task. Good algorithms are efficient, clear, and solve problems correctly every time.
Function
Reusable block of code that performs a specific task
Like a mini-program within a program that takes inputs, processes them, and returns outputs. Functions help organize code and avoid repeating the same instructions multiple times.
Variable
Named storage location for data in programs
Like labeled boxes that hold information your program needs to remember. Can store numbers, text, lists, or complex data structures and be changed throughout program execution.
Loop
Code structure that repeats instructions
Allows programs to perform repetitive tasks efficiently without writing the same code multiple times. Common types include for loops, while loops, and foreach loops.
Conditional Statement
Code that executes different actions based on conditions
If-then-else logic that makes programs intelligent by allowing different behavior based on circumstances. Enables programs to make decisions and respond to various situations.
Object-Oriented Programming
Programming approach using objects and classes
Organizes code into reusable objects that combine data and functions. Like creating blueprints (classes) that can generate multiple instances (objects) with similar characteristics.
Framework
Pre-built foundation for developing applications
Provides structure, common functions, and best practices to speed up development. Examples include React for web apps, Django for Python, and .NET for Microsoft applications.
Library
Collection of pre-written code for specific functions
Ready-made code modules that provide specific functionality like graphics, math operations, or network communication. Saves time by not reinventing common programming solutions.
API
Application Programming Interface - way programs communicate
Set of rules and protocols that allow different software applications to interact with each other. Like a waiter who takes your order and brings food from the kitchen.
Database
Organized collection of data stored electronically
Structured system for storing, retrieving, and managing information. Examples include customer records, product catalogs, or user accounts. Can be relational (SQL) or non-relational (NoSQL).
SQL
Structured Query Language for managing databases
Standard language for creating, reading, updating, and deleting data in relational databases. Uses commands like SELECT, INSERT, UPDATE, and DELETE to manipulate information.
Version Control
System for tracking changes to code over time
Keeps history of all code modifications, allows reverting to previous versions, and enables collaboration among multiple developers. Git is the most popular version control system.
Git
Distributed version control system for code management
Tracks changes, manages branches for different features, and facilitates collaboration. Platforms like GitHub and GitLab provide hosting and additional features for Git repositories.
Repository
Central location where code and project files are stored
Contains all project files, version history, and collaboration tools. Can be local (on your computer) or remote (on platforms like GitHub) for sharing and backup.
IDE
Integrated Development Environment - comprehensive coding tool
Software that combines code editor, compiler/interpreter, debugger, and other development tools in one interface. Examples include Visual Studio Code, IntelliJ IDEA, and Eclipse.
Testing
Process of verifying that code works correctly
Systematic checking of software functionality to find bugs and ensure requirements are met. Includes unit testing (individual components) and integration testing (how parts work together).
Deployment
Process of making software available for use
Moving code from development environment to production servers where users can access it. Includes steps like building, testing, and configuring the application for live use.
Backend
Server-side logic and infrastructure of applications
The behind-the-scenes functionality that handles data processing, storage, security, and business logic. Users don't see it directly, but it powers the features they interact with.
Frontend
User-facing interface and experience of applications
Everything users see and interact with directly - buttons, forms, layouts, and visual design. Uses technologies like HTML, CSS, and JavaScript for web applications.
Full Stack
Development involving both frontend and backend
Full stack developers work on all aspects of applications, from user interfaces to server logic and databases. Requires knowledge of multiple technologies and programming languages.
Mobile Development
Creating applications for smartphones and tablets
Can be native (platform-specific), hybrid (web technologies in app wrapper), or cross-platform (single codebase for multiple platforms). Each approach has different benefits and trade-offs.
Web Development
Creating websites and web applications
Involves frontend (what users see), backend (server logic), and often database integration. Modern web development includes responsive design, performance optimization, and security considerations.
DevOps
Practices combining development and operations
Approach that emphasizes collaboration, automation, and continuous delivery to deploy software faster and more reliably. Includes tools for automation, monitoring, and infrastructure management.
Agile
Iterative approach to software development
Methodology emphasizing collaboration, flexibility, and continuous improvement. Projects are broken into short cycles (sprints) with regular feedback and adaptation to change.
Sprint
Short development cycle in Agile methodology
Typically 1-4 weeks of focused work on specific features or goals. Teams plan, develop, test, and review progress in each sprint, allowing for quick adaptation and improvement.
Code Review
Process of examining code before it's merged
Team members review each other's code for bugs, security issues, and adherence to standards. Improves code quality, shares knowledge, and catches problems early.
Automation
Using scripts and tools to perform tasks automatically
Reduces manual work and human error by automating repetitive tasks like testing, deployment, and system maintenance. Essential for efficient modern software development.
6. Data & Storage
Big Data
Extremely large datasets that require special tools to process
Data so vast and complex that traditional software can't handle it effectively. Requires specialized technologies like Hadoop and Spark to store, process, and analyze for valuable insights.
Data Analytics
Process of examining data to discover useful information
Uses statistical methods and tools to find patterns, trends, and insights in data. Helps businesses make informed decisions by understanding customer behavior, market trends, and operational efficiency.
Data Warehouse
Central repository for storing large amounts of business data
Combines data from multiple sources into a single, organized system designed for analysis and reporting. Optimized for reading and analyzing historical data rather than daily transactions.
Data Lake
Storage system for raw data in its original format
Unlike data warehouses, data lakes store unprocessed data from various sources without predefined structure. Offers flexibility but requires more work to extract meaningful insights.
ETL
Extract, Transform, Load - process for moving data
Extract data from sources, Transform it into proper format, and Load it into destination systems. Essential for data integration, ensuring information flows correctly between different systems.
Data Compression
Reducing file sizes to save storage space
Techniques that make files smaller for efficient storage and transmission. Lossless compression (like ZIP) preserves all data, while lossy compression (like JPEG) sacrifices some quality for smaller size.
Data Encryption
Converting data into secret code for security
Protects sensitive information by scrambling it so only authorized parties can read it. Essential for securing data both during transmission over networks and when stored on devices.
Data Backup
Creating copies of important data for protection
Regular copying of critical information to prevent loss from hardware failures, accidents, or cyber attacks. Best practices include multiple backups in different locations and regular testing of restore procedures.
Data Recovery
Process of restoring lost or corrupted data
Techniques and tools for retrieving data after system failures, accidental deletion, or damage. Success depends on the type of loss and whether proper backups were maintained.
Data Synchronization
Keeping data consistent across multiple systems
Ensures that changes to data in one location are reflected in all other locations. Common in cloud services where files need to stay updated across different devices.
File Format
Standard way of organizing data within files
Determines how information is structured and encoded in files. Examples include .txt for text, .jpg for images, .mp4 for videos, and .pdf for documents. Affects compatibility and functionality.
Metadata
Data that describes other data
Information about files like creation date, author, file size, or keywords. For photos, metadata includes camera settings and GPS location. Helps organize and search for information efficiently.
Database Schema
Structure defining how data is organized in databases
Blueprint that defines tables, columns, relationships, and constraints in a database. Like an architectural plan that determines how information is stored and connected.
Primary Key
Unique identifier for each record in a database table
Ensures each row in a table can be uniquely identified and referenced. Like a social security number or employee ID - no two records can have the same primary key value.
Foreign Key
Field that links to the primary key of another table
Creates relationships between database tables by referencing the primary key of another table. Ensures data integrity and enables complex queries across multiple related tables.
Database Index
Structure that improves database query performance
Like an index in a book, it creates shortcuts to find data quickly without scanning every record. Speeds up searches but requires additional storage space and maintenance.
Data Migration
Moving data from one system to another
Process of transferring data between different storage systems, formats, or applications. Common when upgrading systems or consolidating databases. Requires careful planning to avoid data loss.
Data Cleansing
Process of correcting or removing inaccurate data
Identifies and fixes errors, inconsistencies, and duplicates in datasets. Essential for reliable analysis, as poor data quality leads to incorrect conclusions and flawed decision-making.
Data Visualization
Representing data through charts, graphs, and visual elements
Makes complex data easier to understand by presenting it visually. Tools like Tableau, Power BI, and Excel create interactive dashboards that reveal patterns and trends at a glance.
RAID
Redundant Array of Independent Disks - storage protection
Technology that combines multiple hard drives for improved performance, reliability, or both. Different RAID levels offer various benefits like data backup, faster access, or fault tolerance.
NAS
Network Attached Storage - shared storage device
Dedicated file storage device connected to a network, allowing multiple users and devices to access stored data. Common for home and business backup, media sharing, and collaboration.
SAN
Storage Area Network - high-speed storage network
Dedicated network providing access to consolidated block-level storage. Used in enterprise environments for high-performance applications requiring fast, reliable access to large amounts of data.
Data Archiving
Long-term storage of infrequently accessed data
Moving old but potentially valuable data to cheaper, slower storage systems. Reduces costs while preserving information for compliance, historical reference, or future analysis needs.
Data Governance
Policies and procedures for managing data assets
Framework ensuring data quality, security, and compliance with regulations. Defines who can access what data, how it should be used, and standards for data management across organizations.
Data Privacy
Protection of personal information from unauthorized access
Ensures individual privacy rights are respected when collecting, storing, and using personal data. Includes regulations like GDPR and CCPA that define requirements for data handling.
Data Streaming
Real-time processing of continuously flowing data
Handles data as it arrives rather than storing it first. Essential for applications requiring immediate responses like fraud detection, live analytics, or real-time recommendations.
Data Partition
Dividing large datasets into smaller, manageable pieces
Improves performance by distributing data across multiple storage locations or processing units. Enables parallel processing and makes queries faster by reducing the amount of data to scan.
Data Replication
Creating and maintaining copies of data in multiple locations
Ensures availability and improves performance by having data accessible from multiple sources. Critical for disaster recovery and providing fast access to users in different geographic locations.
Data Integrity
Ensuring data remains accurate and consistent
Maintains data quality throughout its lifecycle by preventing corruption, unauthorized changes, or errors. Uses techniques like checksums, validation rules, and access controls to protect data reliability.
7. Cloud & Infrastructure
Cloud Computing
Using internet-based computing resources instead of local hardware
Access to servers, storage, databases, and software over the internet without owning physical hardware. Pay only for what you use and scale resources up or down as needed.
Comments
Post a Comment