Tech Glossary
Understand common technical terms with clear definitions.
The primary component of a computer that performs most of the processing inside the computer. It is often referred to as the "brain" of the computer.
A type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is volatile, meaning its contents are lost when the power is turned off.
A type of storage device that uses integrated circuit assemblies to store data persistently, typically using flash memory. SSDs are faster and more durable than traditional hard disk drives (HDDs).
Software that manages computer hardware and software resources and provides common services for computer programs. Examples include Windows, macOS, and Linux.
A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.
The delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet ("the cloud") to offer faster innovation, flexible resources, and economies of scale.
Short for "malicious software," it refers to any software intentionally designed to cause damage to a computer, server, client, or computer network. Types of malware include viruses, worms, Trojan horses, ransomware, and spyware.
A device that directs internet traffic between your home network (computers, phones, etc.) and the internet. It creates and manages your local Wi-Fi network.
A device that connects your home network to your Internet Service Provider (ISP). It translates the signals from your ISP into a format your router can use.
The application you use to access and view websites on the internet. Common examples are Google Chrome, Mozilla Firefox, and Microsoft Edge.
A temporary storage area that holds recently accessed data. This helps speed up your computer or browser by quickly retrieving data without needing to get it from the original source again.
A small file that websites store on your computer to remember information about you, such as your login status, site preferences, and items in a shopping cart.
A service that creates a secure, encrypted connection over a less secure network, such as the public internet. It enhances your privacy and security online.
A type of online scam where criminals send fraudulent emails or messages that appear to be from a legitimate company to trick you into revealing personal information, such as passwords or credit card numbers.
Specialized software that allows your computer's operating system to communicate with and control a piece of hardware, like a printer, graphics card, or webcam.
A standard for connecting peripherals like keyboards, mice, and printers to a computer.
A technology for connecting devices in a wired local area network (LAN). An Ethernet cable is often used for a stable, wired internet connection.
A wireless technology that allows devices like computers and smartphones to connect to the internet or communicate with one another without cables.
The maximum rate of data transfer across a given path. It is often mistaken for internet speed.
A traditional data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating platters coated with magnetic material. Slower than an SSD.
The main printed circuit board (PCB) in a computer. It holds and allows communication between many of the crucial electronic components of a system.
The process of converting information or data into a code, especially to prevent unauthorized access.
A security process where users provide two different authentication factors to verify themselves. It adds an extra layer of security beyond just a password.
A type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
The internet's equivalent of a phone book. It maintains a directory of domain names (like google.com) and translates them to IP addresses.
A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the internet.
Software designed to detect and destroy computer viruses and other malicious software.