Glossary
Glossary
There are currently 698 names in this directory
A
Agile
A software development approach that emphasizes iterative development and rapid delivery of working software
AI (Artificial Intelligence)
The ability of a machine or computer system to perform tasks that would normally require human intelligence, such as learning, problem-solving, and decision-making
API (Application Programming Interface)
A set of rules and protocols that defines how two or more software programs can interact with each other
API (Application Programming Interface)
A set of programming instructions that allows different software systems to communicate with each other
API (Application Programming Interface):
A set of rules and protocols that defines how two or more software programs can interact with each other
Application container
A lightweight, standalone, and executable package that includes everything an application needs to run, including code, libraries, and runtime
Application programming interface key (API key)
A unique identifier used to authenticate and authorize access to an API
Artificial intelligence as a service (AIaaS)
A cloud computing service model that provides artificial intelligence capabilities, such as machine learning and natural language processing, as a service over the internet
Artificial neural network
A type of machine learning algorithm that is inspired by the structure and function of the human brain
ASCII (American Standard Code for Information Interchange)
A character encoding standard for electronic communication
ASCII (American Standard Code for Information Interchange)
A character encoding standard for electronic communication
Aspect-oriented programming
A programming paradigm that focuses on the separation of cross-cutting concerns, such as logging and security, from the main functionality of a program
Atomicity
The property of a transaction in a database to either complete fully or have no effect at all
Attribute-based access control (ABAC)
A model for managing access to resources based on attributes, such as the identity of a user or the location of a device
Authorization
The process of granting or denying access to a resource or privilege based on the identity of a user, device, or system
AutoCAD
A computer-aided design and drafting software application used in the fields of architecture, engineering, and construction
AWS (Amazon Web Services)
A cloud computing platform provided by Amazon that offers a range of services, including compute, storage, and database
B
Back end
The part of a system or application that is not visible to the user and handles tasks such as data storage, processing, and communication with other systems
Backup
A copy of data that is stored separately from the original in case the original is lost or damaged
Big data
Large datasets that cannot be processed or analyzed using traditional methods due to their size, complexity, or variety
BIOS (Basic Input/Output System)
Firmware that controls the basic functions of a computer and allows it to boot up
BIOS (Basic Input/Output System)
The firmware that controls the basic hardware functions of a computer
Bluetooth
A wireless communication technology used to transfer data between devices over short distances
Boundary value analysis
A testing technique that involves testing values at the boundaries of an input domain
C
Cache
A temporary storage area for data that is accessed frequently, in order to improve performance
Callback
A function that is passed as an argument to another function and is executed after the first function completes
CAP theorem
A theorem in distributed systems that states that it is impossible for a distributed database to simultaneously provide more than two of the following three guarantees: consistency, availability, and partition tolerance
Capacity planning
The process of forecasting and managing the resources needed to meet the demand for a system or service
Certification
The process of verifying that an individual or organization meets certain standards or criteria
Cloud
A network of servers that are accessed over the internet and used to store, process, and manage data and applications
Cloud computing
The delivery of computing services, including storage, processing, networking, and software, over the Internet
Cloud computing
A model for delivering IT resources and services over the internet, including storage, computing, networking, and analytics
Cloud infrastructure
The hardware, software, and networking resources that support the delivery of cloud services
Cloud native
A design approach for building and running applications in the cloud that leverages the scale, elasticity
Cloud-based
A service or application that is delivered and accessed over the internet, rather than installed locally on a device
CMOS (Complementary Metal-Oxide Semiconductor)
A type of semiconductor technology used in computer processors and other digital circuits
CMS (Content Management System)
A system used to manage the creation, modification, and organization of digital content
Code review
The process of reviewing code to identify and fix errors, improve quality, and enforce coding standards
Command-line interface (CLI)
A type of user interface that allows users to interact with a computer by typing commands
Compiler
A program that translates source code written in a programming language into machine code that can be executed by a computer
Complex event processing (CEP)
A type of software that processes and analyzes high-speed streams of data in real time to identify patterns and trends
Configuration management
The process of managing and controlling changes to a system or its components
Container
A lightweight, standalone, and executable package that includes everything an application needs to run, including code, libraries, and runtime
Content delivery network (CDN)
A network of servers that are used to deliver web content to users based on their geographic location
Continuous integration (CI)
A software development practice in which code changes are automatically built, tested, and deployed to production
Cookie
A small piece of data that is stored on a user's computer and is used to track their activity on a website
CORS (Cross-Origin Resource Sharing)
A mechanism that allows a web page to make requests to a different domain than the one that served the page
CPU (Central Processing Unit)
The main processor in a computer, responsible for executing instructions and performing tasks
CRUD (Create, Read, Update, Delete)
The four basic operations that can be performed on data in a database
Cryptography
The practice of secure communication by encoding messages to prevent unauthorized access
CSS (Cascading Style Sheets)
A style sheet language used for describing the look and formatting of a document written in HTML
D
Data analytics
The process of analyzing and interpreting data in order to extract insights and inform decision-making
Data center: A facility that houses and supports the infrastructure for a network of computers and servers
Data governance: The policies, processes, and practices that are used to manage and protect data within an organization
Data science: A field that involves the use of statistical and computational techniques to extract insights and knowledge from data
Data type: A classification of data based on the type of values it can hold, such as integers, strings, or floating point numbers
Data: Raw facts and figures, often in the form of numbers, text, or images, that can be processed and analyzed
Database: A collection of data organized in a specific way, allowing for efficient storage and retrieval of information
Database: A structured collection of data that is stored electronically and is accessed by a computer
Deep learning: A subfield of machine learning that uses artificial neural networks to learn and make decisions
Deep learning: A type of machine learning that uses neural networks with multiple layers to learn from large and complex datasets
DevOps: A culture and set of practices that combines software development and IT operations to improve the speed, reliability, and security of software delivery
DevOps: A software development approach that emphasizes collaboration between development and operations teams
DHCP (Dynamic Host Configuration Protocol): A protocol used to assign IP addresses to devices on a network automatically
Digital certificate: A digital document that verifies the identity of a person, device, or organization
Digital signature: A cryptographic mechanism that is used to verify the authenticity of a digital document or message
Digital signature: An electronic signature used to verify the authenticity of a digital message or document
Directed acyclic graph (DAG): A type of graph in which the edges have a direction and there are no cycles
Disaster recovery: The processes and procedures that are used to recover from a catastrophic event, such as a natural disaster or cyber attack
Docker: A containerization platform that allows developers to package and deploy applications consistently across environments
E
Elasticsearch: An open-source search engine that is built on top of Apache Lucene and is used for real-time search and analytics
Encapsulation: The process of wrapping data and methods together in a single unit, such as an object or class
Encryption: The process of converting data into a secure, encoded form that can only be accessed or decrypted by authorized parties
End-to-end encryption: A type of encryption that protects data as it is transmitted between two points, such as a sender and a receiver
Endpoint security: The protection of devices, such as computers and mobile phones, that are connected to a network
Enterprise resource planning (ERP): A type of software that is used to manage and integrate the various functions of an organization, such as accounting, inventory management, and HR
Entity framework: An open-source object-relational mapping (ORM) framework that is used to access and manipulate data stored in a database
Entity-relationship model: A diagram or model that represents the relationships between entities in a database
ERP (Enterprise Resource Planning): A type of software that helps organizations manage and coordinate their business processes
Ethernet: A type of computer networking technology used to connect devices in a local area network (LAN)
ETL (Extract, Transform, Load): A process for extracting data from one or more sources, transforming it into a desired format, and loading it into a target system
Event loop: A loop that waits for and processes events, such as user input or network requests, in a program
Event-driven architecture: An architecture in which actions or events trigger the execution of specific tasks or processes
Exception hierarchy: A tree-like structure that represents the relationships between different types of exceptions in a program
Exploit: A piece of software, code, or technique that takes advantage of a vulnerability in a system or application
External library: A library or collection of code that is developed and maintained separately from a program or application, and is used to provide additional functionality
Extraction, transformation, and loading (ETL): A process for extracting data from one or more sources, transforming it into a desired format, and loading it into a target system
F
Fault injection: The process of intentionally introducing errors or failures into a system in order to test its resilience and fault tolerance
Fault tolerance: The ability of a system or component to continue functioning in the event of a failure or error
Feature branching: A software development practice in which a separate branch is created for each new feature or change
Feature flag: A technique for enabling or disabling features in a program or application without changing the code
Feature toggle: A technique for enabling or disabling features in a program or application by using a configuration file or other mechanism
File descriptor: A numerical identifier that is used to access a file or other resource in a computer system
Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
Flash memory: A type of non-volatile storage that is used in devices such as USB drives and solid-state drives
Flooding attack: A type of network attack in which a system is overwhelmed with traffic in an attempt to disrupt or disable it
Flooding: A type of cyber attack in which a network is overwhelmed with traffic, causing it to become unavailable
FPGA (Field-Programmable Gate Array): A type of digital integrated circuit that can be programmed to perform various functions
Framework: A set of tools, libraries, and conventions that are used to structure and support the development of a software
Front end: The part of a system or application that is visible to the user and handles tasks such as user input, output, and interface design
Full stack: A term used to describe a developer or engineer who is proficient in all layers of a technology stack, from the front end to the back end
Fusion Middleware: A collection of software products from Oracle that is used to build, deploy, and manage enterprise applications
FWaaS (Firewall as a Service): A cloud-based firewall service that is provided and managed by a third party
G
Geofencing: A technique that uses GPS or RFID to create a virtual boundary around a location, and triggers an action when a device or user enters or leaves the boundary
Geolocation: The process of identifying the geographic location of a device or user based on data such as GPS coordinates or IP address
Global Load Balancer: A load balancing service that routes traffic to the optimal locations based on factors such as geography, network performance, and capacity
GPS (Global Positioning System): A satellite-based navigation system used to determine the precise location of a device
GPT (Generative Pre-trained Transformer): A type of language model that is trained on a large dataset of text and is able to generate human-like text
GPU (Graphics Processing Unit): A specialized processor that is designed to accelerate graphics rendering and other parallel computations
Graph database: A type of database that stores data in the form of nodes and edges, and is optimized for querying and traversing relationships between data
GraphQL: A query language and runtime system for APIs that allows clients to request specific data and enables flexible and efficient data querying
Green computing: The practice of designing, manufacturing, and using computers and other electronic devices in an energy-efficient and environmentally responsible manner
Grid computing: A distributed computing model in which computing resources are shared and coordinated across a network
Groupware: Software that is used to support collaboration and communication among groups of people, such as email, calendars, and project management tools
GUI (Graphical User Interface): A type of user interface that allows users to interact with a computer through visual elements such as icons and menus
GUI (Graphical User Interface): A type of user interface that uses visual elements and icons to interact with a computer or device
H
Hackathon: A collaborative event in which participants work together to develop software or hardware projects within a short period of time
Hardware virtualization: The process of creating a virtual machine that is able to run on top of physical hardware
Hash function: A function that takes an input and produces a fixed-size output, called a hash, that is unique to the input
Hash function: A function that takes an input and produces a fixed-size output, known as a hash value or message digest
Hash: A value generated from a string of data, used for verifying the integrity of the data or for creating a unique identifier
Header: A part of a message or request that contains additional information, such as metadata or authentication credentials
Heuristic: A method or approach that uses practical experience or rule-of-thumb strategies to solve problems
High availability: The ability of a system or component to function continuously without interruption
HTTPS (HyperText Transfer Protocol Secure): A secure version of HTTP that encrypts data transmitted between a web server and a client
Hybrid cloud: A cloud computing environment that combines on-premises infrastructure with public cloud services
Hypertext: Text that is linked to other documents or resources, enabling users to navigate between them
Hypervisor: A software layer that enables multiple operating systems to run on a single physical machine
I
IaaS (Infrastructure as a Service): A cloud computing service model that provides infrastructure, including storage, networking, and computing resources, over the Internet
IDE (Integrated Development Environment): A software application that provides tools for developing and testing software
Identity and access management (IAM): The process of managing and controlling access to resources or services based on an individual's identity
IDS (Intrusion Detection System): A system that monitors a network for security threats and alerts administrators when it detects an attack
IMAP (Internet Message Access Protocol): A protocol used for accessing and managing email messages on a remote server
In-memory database: A database that stores data in memory rather than on a disk or other persistent storage
In-place upgrade: An upgrade process that does not require the installation of a new version of software or the migration of data to a new system
Incremental backup: A type of backup that captures only changes made to a system or data since the last backup
Information security: The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction
Infrared: A type of electromagnetic radiation that is outside the visible spectrum and has a longer wavelength than red light
Inheritance: The ability of a class or object to inherit properties and behaviors from a parent class or object
Instant messaging: A form of real-time communication that allows users to exchange messages and files over the internet
Integrated development environment (IDE): A software application that provides a set of tools for developing and testing software
Integration: The process of combining or connecting different systems or components to work together
Internet of Things (IoT): A network of connected devices that are able to collect and exchange data using sensors and communication technologies
Internet: A global network of interconnected computers and networks that allows devices to communicate and exchange data
Intranet: A private network that is used by an organization and is only accessible to its employees or members
IPv4 (Internet Protocol version 4): A version of the internet protocol that is used to identify devices on a network and route data between them
IPv6 (Internet Protocol version 6): A newer version of the internet protocol that is designed to address the growing number of devices that are connected to the internet
ISA (Instruction Set Architecture): The set of instructions and formats that define a computer's architecture and determine how it can execute programs
ISO (International Organization for Standardization): An international organization that develops and publishes standards for a wide range of industries, including information technology
Iterative development: A software development approach in which the development process is divided into smaller cycles or iterations, each of which involves the design, implementation, and testing of a specific feature or functionality
J
JAR (Java Archive): A file format used to package multiple files, including class files and resources, into a single file
Java: A programming language and platform that is widely used for building enterprise applications and web-based applications
JavaScript: A programming language that is used to create interactive and dynamic content on the web
JIT (Just-in-Time) compilation: A technique that compiles code at runtime, rather than beforehand, in order to improve performance
Join: A operation in a database that combines data from two or more tables based on a common key or attribute
Journaling: The process of recording changes made to a file or database in a separate log or journal
JSON (JavaScript Object Notation): A lightweight data interchange format that is based on a subset of JavaScript and is used to transmit data between systems
JSON (JavaScript Object Notation): A lightweight data interchange format used to exchange data between servers and web applications
Jupyter: An open-source web-based interactive computational environment that is used for data science and machine learning
JWT (JSON Web Token): A compact and self-contained way of transmitting information between parties as a JSON object
Jython: An implementation of the Python programming language that is designed to run on the Java platform
K
Kernel: The central part of an operating system that manages the system's resources and controls the communication between hardware and software
Kernel: The core part of an operating system that manages the resources and interactions between software and hardware
Key-value store: A type of database that stores data in the form of keys and values, and allows data to be retrieved using the key
Keychain: A password management utility that is used to store and manage passwords and other sensitive information
Keyword research: The process of identifying and analyzing relevant keywords for use in search engine optimization (SEO) or other purposes
Keyword stuffing: The practice of using an excessive number of keywords in an attempt to manipulate search engine rankings
Knowledge base: A collection of information that is organized and structured to be easily accessible and searchable
Knowledge graph: A structured data representation of relationships between entities and their attributes and connections
Kubernetes: An open-source container orchestration platform that is used to deploy and manage containerized applications at scale
KVM (Kernel-based Virtual Machine): A virtualization solution that enables multiple operating systems to run on a single physical machine
L
LAMP stack: A combination of software tools that is used to build and host web applications, consisting of Linux, Apache, MySQL, and PHP
LAN (Local Area Network): A network that connects devices in a small geographic area, such as a home or office
LAN (Local Area Network): A network that is confined to a small geographic area, such as a home, office, or building
Large-scale data: Data that is too large or complex to be processed or analyzed using traditional methods
Latency: The delay or lag time that is experienced when accessing or transmitting data over a network
LDAP (Lightweight Directory Access Protocol): A protocol that is used to access and manage directory services
LDAP (Lightweight Directory Access Protocol): A protocol used to access and manage directory information over a network
Library: A collection of resources, such as code or data, that is shared and reused by multiple programs or systems
Link: A connection between two resources, such as web pages or files, that allows users to navigate between them
Linked list: A data structure that consists of a sequence of nodes, each of which stores a value and a reference to the next node
Load balancer: A device or software that distributes network traffic among multiple servers or resources to improve performance and availability
Load balancer: A device that distributes network traffic across multiple servers to improve performance and reliability
Load testing: The process of testing a system or application under simulated heavy loads to evaluate its performance and stability
Log analysis: The process of examining and interpreting log data in order to identify patterns, troubleshoot problems, or gather insights
Logistic regression: A statistical model that is used to predict the probability of a binary outcome, such as success or failure
Long-term support (LTS): A version of software that is supported with updates and security fixes for a longer period of time than other versions
Lossless compression: A type of data compression that does not lose any information when compressing and decompressing data
Lossy compression: A type of data compression that discards some information in order to achieve a higher compression ratio
M
MAC (Media Access Control) address: A unique identifier that is assigned to a network device and is used to identify it on a network
Machine learning: A type of artificial intelligence that allows a system to learn and make decisions based on data without explicit programming
Machine learning: A type of artificial intelligence that is based on the idea of giving machines the ability to learn and adapt without being explicitly programmed
Mail merge: A process that is used to create and send personalized documents or emails to a large number of recipients
Mainframe: A large and powerful computer that is used for mission-critical applications and can support hundreds or thousands of users simultaneously
Makefile: A file that is used to build and manage software projects, specifying the dependencies and build rules for the project
Mapping: The process of creating a relationship or correspondence between two sets of data or elements
MapReduce: A programming model that is used to process large datasets in a distributed computing environment
Mass storage: A type of storage that is used to store large amounts of data and can be accessed quickly
Master-slave architecture: A system or network architecture in which a central master device controls one or more slave devices
Maximum transmission unit (MTU): The maximum size of a packet that can be transmitted over a network
MD5 (Message-Digest Algorithm 5): A cryptographic hash function that is used to produce a fixed-size hash value from an input
MDS (Multi-Dimensional Scaling): A statistical technique that is used to visualize the relationships between a set of items or objects based on their similarities or distances
Median: The value that is located at the midpoint of a set of values when they are ordered from smallest to largest
Memory leak: A problem in a program or system that causes it to consume an increasing amount of memory over time, leading to performance degradation or failure
Memory management: The process of allocating, deallocating, and managing the use of memory in a computer or device
Merkle tree: A data structure that is used to store hashes in a tree-like structure, allowing for efficient and secure data verification
Mesh network: A type of wireless network in which devices communicate directly with each other, rather than through a central hub
Metric: A measure or indicator that is used to assess the performance or quality of a system or process
Microservice: A software design approach in which a large application is built as a collection of small, independent services that can be developed and maintained separately
Microservices: A software architecture that is based on the idea of building applications as a collection of small, independent, and loosely coupled services that can be composed and deployed independently
Middleware: Software that acts as a bridge between different systems or components, enabling them to communicate and exchange data
Minification: The process of removing unnecessary characters from code in order to reduce its size and improve performance
Mirroring: The process of creating a copy of a data set, system, or network for backup or redundancy purposes
Mixed-reality: A term that refers to the combination of virtual reality (VR) and augmented reality (AR)
Mobile app: A software application designed to run on mobile devices such as smartphones and tablets
Model-view-controller (MVC): A software design pattern that separates the representation of data from the user's interaction with it
Model: A representation of a system, process, or concept that is used to simplify or analyze real-world situations
Modem: A device that enables a computer to transmit and receive data over a telephone or cable connection
Modem: A device that is used to modulate and demodulate signals for transmission over a communication channel
Modularization: The process of breaking down a system or program into smaller, independent modules or components that can be developed, tested, and maintained separately
Monitoring: The process of collecting and analyzing data from a system or network to identify and diagnose issues
Monolithic: A term used to describe a system or architecture that is large and complex, and integrates all its components into a single entity
Montioring: The process of collecting and analyzing data about a system or process in order to assess its performance, identify problems, or gather insights
Motherboard: The main circuit board in a computer, containing the connectors for attaching other hardware and the central processing unit (CPU)
N
Naive Bayes: A simple machine learning algorithm that is based on the principle of Bayes' theorem and is used for classification tasks
Named entity recognition (NER): A natural language processing (NLP) task that involves identifying and classifying named entities, such as people, organizations, and locations, in text
Named pipe: A type of interprocess communication (IPC) mechanism that allows data to be transferred between two or more processes using a special file or channel
Nano service: A small, independent service that performs a specific function or task and communicates with other services through APIs
NAT (Network Address Translation): A method of allowing multiple devices on a private network to access the internet using a single public IP address
NAT (Network Address Translation): A method that is used to allow multiple devices on a private network to share a single public IP address
Native app: A mobile app that is developed specifically for a particular platform or operating system
Natural language processing (NLP): A field of artificial intelligence that focuses on the interaction between computers and humans using natural language
Navigational structure: The way in which the pages or sections of a website or application are organized and linked together
Nearest neighbor: A method of classification or prediction that is based on finding the nearest data points in a dataset and using them to make a prediction
Neural network: A type of machine learning algorithm that is inspired by the structure and function of the human brain and is used for tasks such as classification and prediction
NLP (Natural Language Processing): A field of artificial intelligence that focuses on enabling computers to understand and process human language
Normalization: The process of organizing a database or data model in a way that minimizes redundancy and dependency
NoSQL: A database management system that is designed to handle large amounts of unstructured or semi-structured data and is used for tasks such as big data analysis and real-time processing
O
OAuth (Open Authentication): An open standard for authorization that allows users to grant third-party applications access to their resources without sharing their passwords
Object-oriented programming (OOP): A programming paradigm that is based on the concept of objects and the interaction between them
Object-oriented programming: A programming paradigm that focuses on organizing code into objects that represent real-world entities and their interactions
OCR (Optical Character Recognition): The process of extracting text from images or scanned documents
OData (Open Data Protocol): A standard protocol for creating and consuming RESTful APIs that expose data
One-hot encoding: A method of encoding categorical data in a numerical form, where each category is represented by a binary vector with a single 1 and all other elements as 0
Open source: A term that refers to software or other resources that are freely available and can be modified and distributed by anyone
OpenAPI: A specification for building APIs that is used to describe the capabilities, parameters, and operations of an API
OpenID: An open standard for decentralized authentication that allows users to use a single set of credentials to sign in to multiple websites and services
Operating system: The software that controls and manages the hardware and software resources of a computer
Optical character recognition (OCR): A technology that converts scanned or digital images of text into machine-readable text
Optimization: The process of improving the efficiency, performance, or effectiveness of a system or process
ORM (Object-Relational Mapping): A technique that is used to map data between a relational database and an object-oriented programming language
OTP (One-Time Password): A password that is valid for a single use and is typically used for enhanced security in two-factor authentication (2FA)
OTP (One-Time Password): A password that is valid for a single use, typically used for two-factor authentication
Out-of-bounds: A term that refers to an error or exception that occurs when a program or algorithm attempts to access an element outside the bounds of an array or other data structure
OVAL (Open Vulnerability and Assessment Language): A standardized language and schema that is used to describe and test for vulnerabilities in computer systems
Over-the-air (OTA) update: A software update that is delivered wirelessly to a device, without the need for a physical connection or transfer of files
Overflow: A condition that occurs when the result of a computation exceeds the capacity of the data type or storage location that is being used
Overhead: The additional resources or processing that is required by a system or program in order to perform a task or function
Overload: A condition that occurs when a system or component is asked to perform more tasks or handle more data than it is capable of
Overriding: The process of replacing or modifying the behavior of a method or function by defining a new version of it in a subclass or child class
P
Packet: A unit of data that is transmitted over a network and contains information such as the source and destination addresses, as well as the payload
Paging: A method of memory management that is used to allow a computer to access data that is stored in secondary storage, such as a hard drive or swap space
Pair programming: A software development technique in which two programmers work together on the same code, with one person writing the code and the other reviewing and suggesting improvements
Pairwise testing: A testing technique that involves testing all possible pairs of input values in a system or program
Parallel processing: The process of executing multiple tasks or processes concurrently, in order to improve performance or efficiency
Parent: A term that refers to an element in a hierarchy or tree structure that is the ancestor of another element
Password: A secret word or phrase that is used to authenticate a user's identity or access to a system or service
PDF (Portable Document Format): A file format used to represent documents in a platform-independent manner
Peer-to-peer (P2P): A type of network in which nodes communicate and share resources directly, without the need for a central server or authority
Performance testing: The process of evaluating the performance of a system or program under different workloads and conditions
Peripheral: A device that is connected to a computer but is not an essential part of its core functionality
Peripheral: A device that is connected to a computer or other device and is used to input, output, or communicate data
Personalization: The process of adapting or tailoring a system, service, or experience to the needs and preferences of an individual user
Phishing: A type of cyber attack in which a attacker sends fake emails or texts pretending to be from a legitimate organization in order to trick the victim into revealing sensitive information
Phishing: A type of cyber attack that involves sending fraudulent emails or messages that are designed to trick users into revealing sensitive information or clicking on malicious links
Physical database design: The process of creating a database structure that is optimized for performance and efficiency, taking into account the physical characteristics of the storage media and hardware
Pipelining: A technique that is used to improve the performance of a processor by allowing multiple instructions to be executed concurrently
PKI (Public Key Infrastructure): A system that is used to manage the secure exchange of digital certificates and keys
Plug-in: A piece of software that is used to extend the functionality of another application or system
Q
Quality assurance (QA): The process of verifying that a product or service meets a set of standards or requirements
Quality of service (QoS): A measure of the performance of a network or system in terms of its ability to deliver a specified level of service to users
Queries: Questions or requests that are made to a database or system in order to retrieve or manipulate data
Query language: A specialized programming language that is used to create and execute queries against a database
Queueing theory: The study of how to design systems that handle tasks or requests in an efficient manner
Quicksort: A divide-and-conquer sorting algorithm that is based on the idea of partitioning a list into smaller sublists and sorting them recursively
R
RAD (Rapid Application Development): A software development method that focuses on rapid prototyping and iterative development
RAID (Redundant Array of Independent Disks): A data storage technology that combines multiple disk drives into a single logical unit to improve performance and provide fault tolerance
RAM (Random Access Memory): A type of computer memory that is used to store data and instructions that are being actively used or processed by the CPU
Raster graphics: A type of digital image that is made up of pixels and is used to represent continuous-tone images, such as photographs
RBAC (Role-Based Access Control): A method of access control that is based on the roles and responsibilities of users within an organization
RDF (Resource Description Framework): A standard for representing and exchanging data on the Web in a machine-readable format
Real-time: A term that refers to a system or process that operates in real-time, meaning it responds to events or inputs as they occur
Recursion: A programming technique in which a function or algorithm calls itself repeatedly in order to solve a problem or achieve a result
Redundancy: The duplication of critical components or systems in order to improve reliability or fault tolerance
Refactoring: The process of improving the design or structure of a system or program without changing its functionality
Refactoring: The process of restructuring code to improve its quality or maintainability without changing its functionality
Regression: A statistical analysis technique that is used to model the relationship between a dependent variable and one or more independent variables
Regression: A statistical analysis technique used to predict the value of a dependent variable based on the value of one or more independent variables
Relational database: A type of database that is based on the relational model and stores data in tables that are related to each other through key values
Remote access: The ability to access a computer or network from a location that is physically separate from it
Remote desktop: A software application or service that allows users to access and control a computer or network remotely over the internet
Remote procedure call (RPC): A method of interprocess communication that allows a program to execute a function or procedure on another computer or server
REST (Representational State Transfer): An architectural style for designing distributed systems and APIs that is based on the principles of simplicity, statelessness, and the uniform interface
Reverse engineering: The process of analyzing and understanding the design and operation of a system or product in order to replicate or improve upon it
RGB (Red Green Blue): A color model that is used to represent colors in digital images and displays, using a combination of red, green, and blue light
RISC (Reduced Instruction Set Computing): A type of computer architecture that is characterized by a limited number of simple instructions and a large number of registers
RMI (Remote Method Invocation): A Java-based technology that allows a program running on one computer to invoke methods on an object that is running on another computer
Robustness: The ability of a system or program to continue functioning correctly even when subjected to adverse conditions or inputs
Router: A device that is used to connect networks or devices together and to forward data between them
S
SaaS (Software as a Service): A cloud computing service model in which a software application is provided as a service over the internet
SaaS (Software as a Service): A model of software delivery in which a software application is provided as a service over the internet, typically on a subscription basis
Scalability: The ability of a system or program to handle an increasing workload or data volume without a decrease in performance
Scaling: The process of increasing or decreasing the size or capacity of a system or component in order to meet changing demands or requirements
Scanner: A device that captures images of documents or photographs and converts them into digital form
Scrum: An agile software development method that is based on the principles of transparency, inspection, and adaptation
Search engine optimization (SEO): The practice of optimizing a website or web content in order to improve its visibility and ranking in search engine results
Search engine optimization (SEO): The practice of optimizing a website to improve its ranking in search engine results pages
Search engine: A software application or service that is used to search for and retrieve information from the internet or other sources
Search engine: A software program that searches a database of web pages, images, and other online content to find relevant results in response to a user's query
Security token: A physical or digital device that is used to authenticate a user's identity or access to a system or service
Security: Measures that are taken to protect a system or data from unauthorized access, use, or disclosure
SELinux (Security-Enhanced Linux): A set of security policies and tools that is used to enhance the security of the Linux operating system
Semantic Web: A vision of the Web in which data and information are represented in a machine-readable format and can be easily shared and reused across different systems and applications
Semaphore: A synchronization object that is used to control access to shared resources in a concurrent or multithreaded environment
Sensitive data: Data that is protected by law or policy and requires special handling or protection due to its confidentiality, integrity, or value
Server: A computer or device that is used to host or provide services or resources to other computers or devices
Service level agreement (SLA): A contract between a service provider and a customer that specifies the level of service and support that the provider will deliver
Service-oriented architecture (SOA): An architectural style for building distributed systems that enables loose coupling between services
Service-oriented architecture (SOA): An architectural style for designing distributed systems and services that is based on the principles of loose coupling and interoperability
SHA (Secure Hash Algorithm): A family of cryptographic hash functions that are used to create a digital fingerprint or message digest of a data set
Shell: A command-line interface or program that is used to interpret and execute commands from a user
SIM (Subscriber Identity Module): A removable smart card that is used to store and authenticate a user's identity and access rights to a mobile network
SIMD (Single Instruction Multiple Data): A type of computer architecture that is used to perform the same operation on multiple data elements concurrently
Simple Mail Transfer Protocol (SMTP): A standard protocol for sending email messages over the internet
Single sign-on (SSO): A method of authentication that allows a user to access multiple systems or services with a single set of credentials
Slackware: A distribution of the Linux operating system that is known for its simplicity and adherence to the Unix philosophy
Social engineering: A type of cyber attack that involves manipulating or tricking people into revealing sensitive information or taking actions that are not in their best interests
Social media: Online platforms that allow users to create and share content or participate in social networking
Software: A set of instructions or programs that are used to perform specific tasks on a computer or other device
SQL (Structured Query Language): A programming language used to manage and manipulate data stored in relational databases
SSL (Secure Sockets Layer): A security protocol that encrypts data transmitted between a web server and a client
Switch: A device that forwards data packets between networks based on the destination MAC address of the packets
T
TCP (Transmission Control Protocol): A protocol used to establish a reliable connection and transmit data between two devices over a network
TCP (Transmission Control Protocol): A standard protocol for reliable data transmission over a network
TCP/IP (Transmission Control Protocol/Internet Protocol): The communication protocol used on the internet
TDD (Test-Driven Development): A software development method that involves writing tests for a code base before writing the actual code
Template: A pre-designed layout or structure that can be used as the basis for creating new documents or websites
Testing: The process of evaluating the performance, functionality, or quality of a system or program
Time-sharing: A method of allowing multiple users to share a computer by dividing the system's resources among them
Top-down design: A design approach that starts with a high-level overview and then breaks down a problem or solution into smaller, more manageable components
Transaction: A unit of work that is performed by a database or system, typically involving one or more data operations that are either all committed or all rolled back in the event of an error or failure
Transmission Control Protocol/Internet Protocol (TCP/IP): A standard protocol stack for transmitting data over a network
Tree: A data structure that is used to represent a hierarchical or branching relationship between objects or data
Tunneling: A technique for encapsulating one protocol within another, allowing it to be transmitted over a network that does not support it natively
Tunneling: The process of encapsulating one protocol within another in order to transmit it over a network or other medium
Tweak: A small change or adjustment that is made to a system or program in order to improve its performance or behavior
Twitter: A social networking and microblogging platform that allows users to send and read short messages called tweets
Twofactor authentication: A security process that requires users to provide two forms of identification, such as a password and a security token, to access a system or service
Type inference: The process of automatically deducing the data type of a value or expression based on its context or usage
Typography: The art and technique of designing and arranging type in order to make text legible and aesthetically appealing
U
UAC (User Account Control): A security feature in the Windows operating system that is used to prompt users for permission when making changes to the system or installing new software
UDP (User Datagram Protocol): A standard protocol for transmitting data over a network using a connectionless approach
UI (User Interface): The part of a computer system or application that is responsible for presenting information to a user and accepting input from them
Uninterruptible power supply (UPS): A device that is used to provide a backup power supply to a computer or other device in the event of a power failure
Unix shell: A command-line interface or program that is used to interpret and execute commands on a Unix-based system
Unix: A family of multitasking, multiuser operating systems that are based on the principles of portability and simplicity
URL (Uniform Resource Locator): A string of characters that identifies the location of a resource on the internet
URL (Uniform Resource Locator): A string of characters that is used to identify a location or resource on the internet
USB (Universal Serial Bus): A standard interface that is used to connect devices to a computer or other device
User account: A set of permissions and settings that are associated with a user and are used to control their access to a system or service
User experience (UX): The overall experience of a person using a product or service, including usability, accessibility, and satisfaction
User experience (UX): The overall experience of a user when interacting with a product, system, or service
User interface (UI): The means by which a user interacts with a computer or device, such as through a keyboard, mouse, or touch screen
V
Validation: The process of verifying that a system or process is operating correctly or meets certain standards or requirements
Variable: A storage location in a program or system that is used to hold a value or reference to an object or data
Vector graphics: A type of digital image that is made up of geometric shapes and lines and is used to represent discrete or discretely changing data, such as charts or diagrams
Version control: The management of changes to a system or document over time, typically using a version control system
Virtual machine: A software-based emulation of a computer or device that is used to run multiple operating systems or applications on a single physical machine
Virtual memory: A type of computer memory that is used to extend the physical memory of a computer by temporarily transferring data to a hard drive or other storage device
Virtual private network (VPN): A private network that is created over a public network, such as the internet, and that is used to securely transmit data between two or more locations
Virus: A piece of code or software that is designed to replicate itself and spread to other computers or devices
Visualization: The process of representing data or information in a visual or graphical form, such as a chart or map
VPN (Virtual Private Network): A private network that uses a public network (such as the internet) to securely connect remote sites or users
W
Web 2.0: A term that is used to describe the second generation of the World Wide Web, which is characterized by the use of web-based technologies and services that enable users to interact and collaborate with each other online
Web analytics: The analysis and measurement of data and activity on a website or web application, typically for the purpose of improving its performance or user experience
Web application: A software application that is delivered over the internet and accessed through a web browser
Web application: A software application that runs on a web server and is accessed through a web browser
Web browser: A software application that is used to access and browse the internet or other web-based resources
Web scraping: The process of extracting data or information from a website or web page using automated tools or software
Web server log: A file that is created by a web server to record information about the requests and responses that it handles
Web server: A computer or device that is used to host and serve web content and applications to users over the internet
Web server: A computer or device that stores and delivers web pages and other content over the internet
Web service: A software system or application that is designed to support interoperable machine-to-machine communication over the internet
White box testing: A testing technique that is based on an understanding of the internal workings or structure of a system or component
WiFi (Wireless Fidelity): A wireless networking technology that is based on the IEEE 802.11 standard
WiFi: A wireless networking technology that allows devices to communicate with each other over a short distance
Windows: A family of operating systems that is developed by Microsoft and is designed for use on personal computers and servers
WLAN (Wireless Local Area Network): A network that connects devices wirelessly over a short distance
X
Xcode: An integrated development environment (IDE) that is used to develop software for the macOS, iOS, iPadOS, watchOS, and tvOS platforms
XML (Extensible Markup Language): A markup language that is used to define and structure data and information in a machine-readable format
XOR (Exclusive OR): A logical operator that returns true if one of its operands is true, but not both
XSS (Cross-Site Scripting): A type of cyber attack that involves injecting malicious code or script into a website or web application in order to steal sensitive information or execute malicious actions on behalf of the user
Y
Y-combinator: A function in the lambda calculus that is used to define recursive functions and is named after the shape of the symbol used to represent it
YAML (Yet Another Markup Language): A data serialization language that is designed to be human-readable and easy to parse
YAML Ain't Markup Language: A tongue-in-cheek acronym that is often used to refer to the YAML data serialization language
YOLO (You Only Live Once): A phrase that is often used as a motto or justification for taking risks or making impulsive decisions
YOLO neural network: A type of neural network that is designed for real-time object detection and is based on the YOLO (You Only Look Once) algorithm
YOLOv3 (You Only Look Once version 3): A real-time object detection system that is based on a single convolutional neural network
YOLOv4 (You Only Look Once version 4): A real-time object detection system that is based on a single convolutional neural network and is known for its high accuracy and speed
YOLOv5 (You Only Look Once version 5): A real-time object detection system that is based on a single convolutional neural network and is known for its improved accuracy and efficiency compared to earlier versions of YOLO
YOLT (You Only Live Twice): A phrase that is often used to refer to the idea that people have multiple chances or opportunities to achieve their goals or make a positive impact
YOLT-DNN (You Only Look Twice Deep Neural Network): A real-time object detection system that is based on the YOLO (You Only Look Once) algorithm and uses a combination of convolutional neural networks and a recurrent neural network
YouTube API (Application Programming Interface): A set of tools and protocols that are used to access and interact with the YouTube platform and its data
YouTube: A video-sharing website and platform that is owned by Google and allows users to upload, share, and view videos
Z
Z-order: The order in which objects or elements are layered or stacked in a graphical user interface or document
Z-score: A statistical measure that is used to determine how many standard deviations a data point is from the mean of a dataset
Z-transform: A mathematical operation that is used to analyze the frequency content of a discrete time series or signal
Zero-day vulnerability: A security vulnerability that is unknown to the vendor or developer and has not yet been patched
ZIP (Zipping): A file compression and archiving format that is used to reduce the size of a file or group of files and make them easier to transmit or store
ZIP archive: A file that is created using the ZIP file format and that contains one or more compressed files or directories
Zlib: A software library that is used to compress and decompress data and is based on the DEFLATE algorithm
Zsh (Z shell): A Unix shell and command-line interpreter that is designed to be more user-friendly and feature-rich than other shells