Glossary

Glossary

All | A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
There are currently 698 names in this directory
A

Agile
A software development approach that emphasizes iterative development and rapid delivery of working software

AI (Artificial Intelligence)
The ability of a machine or computer system to perform tasks that would normally require human intelligence, such as learning, problem-solving, and decision-making

Algorithm
A set of steps or instructions used to solve a problem or perform a task

Algorithm
A set of steps or instructions used to solve a problem or perform a task

Alias
An alternative name for a file, command, or other item

Anomaly detection
The process of identifying unusual or unexpected behavior in a system or data

Anti-virus
Software that detects and removes malware from a computer or device

API (Application Programming Interface)
A set of rules and protocols that defines how two or more software programs can interact with each other

API (Application Programming Interface)
A set of programming instructions that allows different software systems to communicate with each other

API (Application Programming Interface):
A set of rules and protocols that defines how two or more software programs can interact with each other

Application
A software program designed to perform a specific task or function

Application container
A lightweight, standalone, and executable package that includes everything an application needs to run, including code, libraries, and runtime

Application programming interface key (API key)
A unique identifier used to authenticate and authorize access to an API

Artificial intelligence as a service (AIaaS)
A cloud computing service model that provides artificial intelligence capabilities, such as machine learning and natural language processing, as a service over the internet

Artificial neural network
A type of machine learning algorithm that is inspired by the structure and function of the human brain

ASCII (American Standard Code for Information Interchange)
A character encoding standard for electronic communication

ASCII (American Standard Code for Information Interchange)
A character encoding standard for electronic communication

Aspect
A feature or characteristic of a system that cuts across multiple components or layers

Aspect-oriented programming
A programming paradigm that focuses on the separation of cross-cutting concerns, such as logging and security, from the main functionality of a program

Assembler
A program that converts assembly language into machine code

Assembler
A program that converts assembly language into machine code

Assembler language
A low-level programming language that is used to create machine code

Asynchronous
A type of communication or process that does not require a response before continuing

Atom
The smallest unit of a chemical element that retains its properties

Atomicity
The property of a transaction in a database to either complete fully or have no effect at all

Attribute
A piece of data associated with an object or entity

Attribute-based access control (ABAC)
A model for managing access to resources based on attributes, such as the identity of a user or the location of a device

Auditing
The process of reviewing and verifying the accuracy and completeness of a system or process

Authentication
The process of verifying the identity of a user, device, or system

Authorization
The process of granting or denying access to a resource or privilege based on the identity of a user, device, or system

AutoCAD
A computer-aided design and drafting software application used in the fields of architecture, engineering, and construction

Autoscaling
The process of automatically adjusting the capacity of a system based on demand

Availability
The measure of how reliable and accessible a system or service is

Avatar
A digital representation of a user or character in a virtual world or online game

AWS (Amazon Web Services)
A cloud computing platform provided by Amazon that offers a range of services, including compute, storage, and database

B

B

Back end
The part of a system or application that is not visible to the user and handles tasks such as data storage, processing, and communication with other systems

Backlink
A link from a website to another website

Backup
A copy of data that is stored separately from the original in case the original is lost or damaged

Bandwidth
The amount of data that can be transmitted over a network in a given period of time

Big data
Large datasets that cannot be processed or analyzed using traditional methods due to their size, complexity, or variety

Binary
A system of representing numbers using only two digits, 0 and 1

Binary
A number system that uses only two digits (0 and 1) to represent data

BIOS (Basic Input/Output System)
Firmware that controls the basic functions of a computer and allows it to boot up

BIOS (Basic Input/Output System)
The firmware that controls the basic hardware functions of a computer

Bit
The basic unit of information in computing, with a value of either 0 or 1

Blacklist
A list of items that are blocked or prohibited

Bluetooth
A wireless communication technology used to transfer data between devices over short distances

Boot
The process of starting a computer or device

Bootloader
A program that loads the operating system into memory during the boot process

Bot
A software program that performs automated tasks, such as web scraping or social media posting

Boundary value analysis
A testing technique that involves testing values at the boundaries of an input domain

Browser extension
A piece of software that extends the functionality of a web browser

Bug
An error or flaw in a program that causes it to behave unexpectedly

Byte
A unit of data that is typically made up of eight bits

C

C

Cache
A temporary storage area for data that is accessed frequently, in order to improve performance

Caching
The process of storing data in a cache

Callback
A function that is passed as an argument to another function and is executed after the first function completes

CAP theorem
A theorem in distributed systems that states that it is impossible for a distributed database to simultaneously provide more than two of the following three guarantees: consistency, availability, and partition tolerance

Capacity planning
The process of forecasting and managing the resources needed to meet the demand for a system or service

Certificate
A digital document that verifies the identity of a person, device, or organization

Certificate authority (CA)
An organization that issues and manages digital certificates

Certification
The process of verifying that an individual or organization meets certain standards or criteria

CGI (Common Gateway Interface)
A standard for running programs on a web server

Chatbot
A software program that simulates conversation with human users, typically over the internet

Cloud
A network of servers that are accessed over the internet and used to store, process, and manage data and applications

Cloud computing
The delivery of computing services, including storage, processing, networking, and software, over the Internet

Cloud computing
A model for delivering IT resources and services over the internet, including storage, computing, networking, and analytics

Cloud infrastructure
The hardware, software, and networking resources that support the delivery of cloud services

Cloud native
A design approach for building and running applications in the cloud that leverages the scale, elasticity

Cloud provider
A company that provides cloud computing services

Cloud-based
A service or application that is delivered and accessed over the internet, rather than installed locally on a device

CMOS (Complementary Metal-Oxide Semiconductor)
A type of semiconductor technology used in computer processors and other digital circuits

CMS (Content Management System)
A system used to manage the creation, modification, and organization of digital content

CNAME (Canonical Name):
An alias for a domain or subdomain

Code
A set of instructions written in a programming language that can be executed by a computer

Code review
The process of reviewing code to identify and fix errors, improve quality, and enforce coding standards

Codebase
The complete collection of code for a software project

Collaboration
The process of working with others to achieve a common goal

Command-line interface (CLI)
A type of user interface that allows users to interact with a computer by typing commands

Compiler
A program that translates source code written in a programming language into machine code that can be executed by a computer

Complex event processing (CEP)
A type of software that processes and analyzes high-speed streams of data in real time to identify patterns and trends

Compression
The process of reducing the size of a file or data stream

Computer
A device that processes data according to a set of instructions

Configuration management
The process of managing and controlling changes to a system or its components

Container
A lightweight, standalone, and executable package that includes everything an application needs to run, including code, libraries, and runtime

Content delivery network (CDN)
A network of servers that are used to deliver web content to users based on their geographic location

Context
The environment or circumstances in which something occurs or is being used

Continuous integration (CI)
A software development practice in which code changes are automatically built, tested, and deployed to production

Control flow
The order in which statements or instructions are executed in a program

Cookie
A small piece of data that is stored on a user's computer and is used to track their activity on a website

CORS (Cross-Origin Resource Sharing)
A mechanism that allows a web page to make requests to a different domain than the one that served the page

CPU (Central Processing Unit)
The main processor in a computer, responsible for executing instructions and performing tasks

CRUD (Create, Read, Update, Delete)
The four basic operations that can be performed on data in a database

Cryptography
The practice of secure communication by encoding messages to prevent unauthorized access

CSS (Cascading Style Sheets)
A style sheet language used for describing the look and formatting of a document written in HTML

CSV (Comma Separated Values)
A file format used to store tabular data in plain text

Cybersecurity
The practice of protecting computers, servers, and networks from digital attacks

D

D

Data analytics
The process of analyzing and interpreting data in order to extract insights and inform decision-making

Data center: A facility that houses and supports the infrastructure for a network of computers and servers

Data governance: The policies, processes, and practices that are used to manage and protect data within an organization

Data modeling: The process of creating a logical representation of a data structure

Data privacy: The protection of personal data from unauthorized access or use

Data science: A field that involves the use of statistical and computational techniques to extract insights and knowledge from data

Data structure: A way of organizing and storing data in a computer

Data type: A classification of data based on the type of values it can hold, such as integers, strings, or floating point numbers

Data: Raw facts and figures, often in the form of numbers, text, or images, that can be processed and analyzed

Database: A collection of data organized in a specific way, allowing for efficient storage and retrieval of information

Database: A structured collection of data that is stored electronically and is accessed by a computer

Debugging: The process of identifying and fixing errors in a computer program

Debugging: The process of identifying and fixing errors in a program

Dedicated hosting: A hosting service in which a server is dedicated to a single client

Deep learning: A subfield of machine learning that uses artificial neural networks to learn and make decisions

Deep learning: A type of machine learning that uses neural networks with multiple layers to learn from large and complex datasets

Defect: An error or flaw in a program that causes it to behave unexpectedly

Deployment: The process of making a software system or application available for use

DevOps: A culture and set of practices that combines software development and IT operations to improve the speed, reliability, and security of software delivery

DevOps: A software development approach that emphasizes collaboration between development and operations teams

DHCP (Dynamic Host Configuration Protocol): A protocol used to assign IP addresses to devices on a network automatically

Digital certificate: A digital document that verifies the identity of a person, device, or organization

Digital signature: A cryptographic mechanism that is used to verify the authenticity of a digital document or message

Digital signature: An electronic signature used to verify the authenticity of a digital message or document

Directed acyclic graph (DAG): A type of graph in which the edges have a direction and there are no cycles

Disaster recovery: The processes and procedures that are used to recover from a catastrophic event, such as a natural disaster or cyber attack

Distributed database: A database that is spread across multiple servers or locations

Docker: A containerization platform that allows developers to package and deploy applications consistently across environments

Domain name system (DNS): A network protocol that translates domain names into IP addresses

Domain name: A string of characters that identifies a website or other resource on the internet

Domain: A specific area of knowledge or expertise

E

E

E-commerce: The buying and selling of goods and services over the Internet

Elasticsearch: An open-source search engine that is built on top of Apache Lucene and is used for real-time search and analytics

Encapsulation: The process of wrapping data and methods together in a single unit, such as an object or class

Encryption: The process of converting data into a coded form to prevent unauthorized access

Encryption: The process of converting data into a secure, encoded form that can only be accessed or decrypted by authorized parties

End-to-end encryption: A type of encryption that protects data as it is transmitted between two points, such as a sender and a receiver

Endpoint security: The protection of devices, such as computers and mobile phones, that are connected to a network

Endpoint: A network connection point, such as a server or device, that can receive or send data

Enterprise resource planning (ERP): A type of software that is used to manage and integrate the various functions of an organization, such as accounting, inventory management, and HR

Entity framework: An open-source object-relational mapping (ORM) framework that is used to access and manipulate data stored in a database

Entity-relationship model: A diagram or model that represents the relationships between entities in a database

Entity: A person, place, thing, or concept that is represented in a database or system

Environment: The conditions or circumstances in which something exists or operates

ERP (Enterprise Resource Planning): A type of software that helps organizations manage and coordinate their business processes

Ethernet: A type of computer networking technology used to connect devices in a local area network (LAN)

ETL (Extract, Transform, Load): A process for extracting data from one or more sources, transforming it into a desired format, and loading it into a target system

Event loop: A loop that waits for and processes events, such as user input or network requests, in a program

Event-driven architecture: An architecture in which actions or events trigger the execution of specific tasks or processes

Exception handling: The process of identifying and responding to exceptions or errors in a program

Exception hierarchy: A tree-like structure that represents the relationships between different types of exceptions in a program

Exception: An error or unexpected event that occurs during the execution of a program

Execution: The process of executing or running a program

Exploit: A piece of software, code, or technique that takes advantage of a vulnerability in a system or application

Extensible: Capable of being extended or customized

Extension: A piece of software that adds additional functionality to a program or application

External library: A library or collection of code that is developed and maintained separately from a program or application, and is used to provide additional functionality

Extraction, transformation, and loading (ETL): A process for extracting data from one or more sources, transforming it into a desired format, and loading it into a target system

Extraction: The process of extracting data from one or more sources

Extranet: A private network that allows access to authorized users outside of an organization

Extranet: A private network that uses the internet to securely connect remote sites or users

F

F

Fault injection: The process of intentionally introducing errors or failures into a system in order to test its resilience and fault tolerance

Fault tolerance: The ability of a system or component to continue functioning in the event of a failure or error

Feature branching: A software development practice in which a separate branch is created for each new feature or change

Feature flag: A technique for enabling or disabling features in a program or application without changing the code

Feature toggle: A technique for enabling or disabling features in a program or application by using a configuration file or other mechanism

Feature: A characteristic or capability of a system or application

File descriptor: A numerical identifier that is used to access a file or other resource in a computer system

File system: A method of organizing and storing files on a computer or device

File transfer protocol (FTP): A standard protocol for transferring files over a network

File: A collection of data that is stored electronically and is accessed by a computer

Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules

Firewall: A security system that monitors and controls incoming and outgoing network traffic

Firmware: Software that is stored in a computer's hardware and controls its basic functions

Firmware: The software that is permanently stored on a device and controls its basic functions

Flash memory: A type of non-volatile storage that is used in devices such as USB drives and solid-state drives

Flooding attack: A type of network attack in which a system is overwhelmed with traffic in an attempt to disrupt or disable it

Flooding: A type of cyber attack in which a network is overwhelmed with traffic, causing it to become unavailable

Flow control: The process of regulating the rate at which data is transmitted in a network

FPGA (Field-Programmable Gate Array): A type of digital integrated circuit that can be programmed to perform various functions

Framework: A set of tools, libraries, and conventions that are used to structure and support the development of a software

Front end: The part of a system or application that is visible to the user and handles tasks such as user input, output, and interface design

FTP (File Transfer Protocol): A standard protocol for transferring files over a network

Full stack: A term used to describe a developer or engineer who is proficient in all layers of a technology stack, from the front end to the back end

Function: A block of code that performs a specific task

Function: A block of code that performs a specific task and may or may not return a value

Functional testing: Testing that focuses on the functionality of a system or component

Fusion Middleware: A collection of software products from Oracle that is used to build, deploy, and manage enterprise applications

FWaaS (Firewall as a Service): A cloud-based firewall service that is provided and managed by a third party

G

G

Geofencing: A technique that uses GPS or RFID to create a virtual boundary around a location, and triggers an action when a device or user enters or leaves the boundary

Geolocation: The process of identifying the geographic location of a device or user based on data such as GPS coordinates or IP address

Geospatial data: Data that is associated with a specific location on the earth's surface

Geospatial index: An index that is used to efficiently search and retrieve geospatial data

Gigabit: A unit of data transfer rate equal to 1 billion bits per second

Global Load Balancer: A load balancing service that routes traffic to the optimal locations based on factors such as geography, network performance, and capacity

GPS (Global Positioning System): A satellite-based navigation system used to determine the precise location of a device

GPT (Generative Pre-trained Transformer): A type of language model that is trained on a large dataset of text and is able to generate human-like text

GPU (Graphics Processing Unit): A specialized processor designed for rendering images and video

GPU (Graphics Processing Unit): A specialized processor that is designed to accelerate graphics rendering and other parallel computations

Graph database: A type of database that stores data in the form of nodes and edges, and is optimized for querying and traversing relationships between data

GraphQL: A query language and runtime system for APIs that allows clients to request specific data and enables flexible and efficient data querying

Green computing: The practice of designing, manufacturing, and using computers and other electronic devices in an energy-efficient and environmentally responsible manner

Grid computing: A distributed computing model in which computing resources are shared and coordinated across a network

Group policy: A set of rules that define the behavior of computers and users in an organization

Groupware: Software that is used to support collaboration and communication among groups of people, such as email, calendars, and project management tools

GUI (Graphical User Interface): A type of user interface that allows users to interact with a computer through visual elements such as icons and menus

GUI (Graphical User Interface): A type of user interface that uses visual elements and icons to interact with a computer or device

GUI builder: A tool that is used to design and create graphical user interfaces

H

H

Hackathon: A collaborative event in which participants work together to develop software or hardware projects within a short period of time

Hardware virtualization: The process of creating a virtual machine that is able to run on top of physical hardware

Hardware: Physical components of a computer or device, such as the processor, memory, and storage

Hash function: A function that takes an input and produces a fixed-size output, called a hash, that is unique to the input

Hash function: A function that takes an input and produces a fixed-size output, known as a hash value or message digest

Hash table: A data structure that is used to store and retrieve data using a hash function

Hash: A fixed-size output that is produced by a hash function and is unique to the input

Hash: A value generated from a string of data, used for verifying the integrity of the data or for creating a unique identifier

Header: A part of a message or request that contains additional information, such as metadata or authentication credentials

Health check: A process that is used to monitor the status and performance of a system or component

Heap: A region of memory that is used for dynamic memory allocation

Heuristic: A method or approach that uses practical experience or rule-of-thumb strategies to solve problems

High availability: The ability of a system or component to function continuously without interruption

Host: A device or server that provides resources or services to other devices or users

Hosting: The service of providing space and resources for websites or other online content

HTML (HyperText Markup Language): A markup language used to create and structure content on the web

HTML (Hypertext Markup Language): A markup language used to structure and format content on the web

HTTP (Hypertext Transfer Protocol): A protocol for transmitting data over the internet

HTTP (HyperText Transfer Protocol): A protocol used to transfer data over the web

HTTPS (HTTP Secure): A secure version of HTTP that uses encryption to protect data in transit

HTTPS (HyperText Transfer Protocol Secure): A secure version of HTTP that encrypts data transmitted between a web server and a client

Hybrid cloud: A cloud computing environment that combines on-premises infrastructure with public cloud services

Hybrid cloud: A cloud computing environment that combines public and private clouds

Hyperlink: A link that allows users to navigate between web pages or other resources

Hypertext markup language (HTML): A markup language used to structure and format content on the web

Hypertext transfer protocol (HTTP): A protocol for transmitting data over the internet

Hypertext: Text that is linked to other documents or resources, enabling users to navigate between them

Hypervisor: A software layer that enables multiple operating systems to run on a single physical machine

I

I

IaaS (Infrastructure as a Service): A cloud computing service model that provides infrastructure, including storage, networking, and computing resources, over the Internet

IDE (Integrated Development Environment): A software application that provides tools for developing and testing software

Identity and access management (IAM): The process of managing and controlling access to resources or services based on an individual's identity

Identity federation: The process of linking two or more identity systems together

IDS (Intrusion Detection System): A system that monitors a network for security threats and alerts administrators when it detects an attack

IETF (Internet Engineering Task Force): A group that develops and promotes internet standards

Image recognition: The process of identifying and classifying images or objects in images

Image resolution: The quality and detail of an image, measured in pixels

Image: A digital representation of a visual element, such as a photo or diagram

IMAP (Internet Message Access Protocol): A protocol used for accessing and managing email messages on a remote server

Immutable: Unable to be changed or modified

In-memory cache: A cache that stores data in memory for fast access

In-memory database: A database that stores data in memory rather than on a disk or other persistent storage

In-place upgrade: An upgrade process that does not require the installation of a new version of software or the migration of data to a new system

Incremental backup: A type of backup that captures only changes made to a system or data since the last backup

Index: A data structure that is used to improve the performance of searches and queries

Indexer: A program or process that creates and maintains an index

Information security: The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction

Infrared: A type of electromagnetic radiation that is outside the visible spectrum and has a longer wavelength than red light

Inheritance: The ability of a class or object to inherit properties and behaviors from a parent class or object

Input validation: The process of verifying that input meets specified criteria or constraints

Input: Data that is entered into a system or program

Installer: A program that is used to install software on a computer or device

Instant messaging: A form of real-time communication that allows users to exchange messages and files over the internet

Integrated development environment (IDE): A software application that provides a set of tools for developing and testing software

Integration: The process of combining or connecting different systems or components to work together

Interface: A boundary or connection point between two systems or components

Internet of Things (IoT): A network of connected devices that are able to collect and exchange data using sensors and communication technologies

Internet: A global network of interconnected computers and networks that allows devices to communicate and exchange data

Interoperability: The ability of different systems or components to work together and exchange data

Intranet: A private network that is used by an organization and is only accessible to its employees or members

IPv4 (Internet Protocol version 4): A version of the internet protocol that is used to identify devices on a network and route data between them

IPv6 (Internet Protocol version 6): A newer version of the internet protocol that is designed to address the growing number of devices that are connected to the internet

ISA (Instruction Set Architecture): The set of instructions and formats that define a computer's architecture and determine how it can execute programs

ISO (International Organization for Standardization): An international organization that develops and publishes standards for a wide range of industries, including information technology

Iteration: The process of repeating a sequence of instructions or operations

Iterative development: A software development approach in which the development process is divided into smaller cycles or iterations, each of which involves the design, implementation, and testing of a specific feature or functionality

J

J

JAR (Java Archive): A file format used to package multiple files, including class files and resources, into a single file

Java: A programming language and computing platform used for creating and running applications

Java: A programming language and platform that is widely used for building enterprise applications and web-based applications

JavaScript: A programming language that is used to create interactive and dynamic content on the web

JavaScript: A programming language used to create interactive elements on websites

Jenkins: An open-source automation server that is used to build, test, and deploy software projects

JIRA: A project management and issue tracking tool that is used by software development teams

JIT (Just-in-Time) compilation: A technique that compiles code at runtime, rather than beforehand, in order to improve performance

JIT (Just-In-Time) compiler: A compiler that converts bytecode into native machine code at runtime

Job scheduler: A program or service that is used to schedule and automate tasks or processes

Join: A operation in a database that combines data from two or more tables based on a common key or attribute

Joomla: An open-source content management system that is used to build and manage websites

Journaling: The process of recording changes made to a file or database in a separate log or journal

JRE (Java Runtime Environment): A software platform that allows Java programs to run on a computer

JSON (JavaScript Object Notation): A lightweight data interchange format that is based on a subset of JavaScript and is used to transmit data between systems

JSON (JavaScript Object Notation): A lightweight data interchange format used to exchange data between servers and web applications

JUnit: A unit testing framework for the Java programming language

Jupyter: An open-source web-based interactive computational environment that is used for data science and machine learning

JWT (JSON Web Token): A compact and self-contained way of transmitting information between parties as a JSON object

Jython: An implementation of the Python programming language that is designed to run on the Java platform

K

K

Kernel: The central part of an operating system that manages the system's resources and controls the communication between hardware and software

Kernel: The core part of an operating system that manages the resources and interactions between software and hardware

Key-value store: A type of database that stores data in the form of keys and values, and allows data to be retrieved using the key

Key: A piece of data used in cryptography to encrypt and decrypt messages

Key: A value that is used to identify or access data in a database or other data structure

Keyboard: An input device used for typing text and data into a computer

Keychain: A password management utility that is used to store and manage passwords and other sensitive information

Keyword research: The process of identifying and analyzing relevant keywords for use in search engine optimization (SEO) or other purposes

Keyword stuffing: The practice of using an excessive number of keywords in an attempt to manipulate search engine rankings

Keyword: A word or phrase that is used as a search term or to describe or classify content

Kibana: An open-source data visualization and exploration platform that is used with Elasticsearch

Kinematics: The study of motion and forces, without considering the forces that cause the motion

Knowledge base: A collection of information that is organized and structured to be easily accessible and searchable

Knowledge graph: A structured data representation of relationships between entities and their attributes and connections

Kubernetes: An open-source container orchestration platform that is used to deploy and manage containerized applications at scale

KVM (Kernel-based Virtual Machine): A virtualization solution that enables multiple operating systems to run on a single physical machine

L

L

LAMP stack: A combination of software tools that is used to build and host web applications, consisting of Linux, Apache, MySQL, and PHP

LAN (Local Area Network): A network that connects devices in a small geographic area, such as a home or office

LAN (Local Area Network): A network that is confined to a small geographic area, such as a home, office, or building

Large-scale data: Data that is too large or complex to be processed or analyzed using traditional methods

Latency: The delay or lag time that is experienced when accessing or transmitting data over a network

Layer: A logical or physical separation of components or functionality in a system

LDAP (Lightweight Directory Access Protocol): A protocol that is used to access and manage directory services

LDAP (Lightweight Directory Access Protocol): A protocol used to access and manage directory information over a network

Library: A collection of pre-written code that can be reused in a program

Library: A collection of resources, such as code or data, that is shared and reused by multiple programs or systems

Link: A connection between two or more devices or pieces of information

Link: A connection between two resources, such as web pages or files, that allows users to navigate between them

Linked list: A data structure that consists of a sequence of nodes, each of which stores a value and a reference to the next node

Linux: A free and open-source operating system based on the Linux kernel

Linux: A free and open-source operating system that is based on the Linux kernel

Load balancer: A device or software that distributes network traffic among multiple servers or resources to improve performance and availability

Load balancer: A device that distributes network traffic across multiple servers to improve performance and reliability

Load testing: The process of testing a system or application under simulated heavy loads to evaluate its performance and stability

Log analysis: The process of examining and interpreting log data in order to identify patterns, troubleshoot problems, or gather insights

Log file: A file that contains log data

Log management: The process of collecting, storing, and analyzing log data

Log: A record of events or transactions that is generated by a system or application

Logging: The process of capturing and recording log data

Login: The process of identifying oneself and gaining access to a system or service

Logistic regression: A statistical model that is used to predict the probability of a binary outcome, such as success or failure

Logout: The process of ending a session and revoking access to a system or service

Long-term support (LTS): A version of software that is supported with updates and security fixes for a longer period of time than other versions

Looping: The process of repeating a sequence of instructions or operations

Lossless compression: A type of data compression that does not lose any information when compressing and decompressing data

Lossy compression: A type of data compression that discards some information in order to achieve a higher compression ratio

M

M

MAC (Media Access Control) address: A unique identifier that is assigned to a network device and is used to identify it on a network

Machine learning: A type of artificial intelligence that allows a system to learn and make decisions based on data without explicit programming

Machine learning: A type of artificial intelligence that is based on the idea of giving machines the ability to learn and adapt without being explicitly programmed

Macro: A set of instructions or actions that are defined and executed as a single unit

Mail merge: A process that is used to create and send personalized documents or emails to a large number of recipients

Mainframe: A large and powerful computer that is used for mission-critical applications and can support hundreds or thousands of users simultaneously

Makefile: A file that is used to build and manage software projects, specifying the dependencies and build rules for the project

Malware: Software that is designed to harm or exploit a computer system

Mapping: The process of creating a relationship or correspondence between two sets of data or elements

MapReduce: A programming model that is used to process large datasets in a distributed computing environment

Markdown: A simple markup language that is used to format text and create rich content for the web

Masking: The process of hiding or obscuring data or information

Mass storage: A type of storage that is used to store large amounts of data and can be accessed quickly

Master-slave architecture: A system or network architecture in which a central master device controls one or more slave devices

Matrix: A collection of values or data that is organized in rows and columns

Maven: A build automation tool that is used to manage and build Java projects

Maximum transmission unit (MTU): The maximum size of a packet that can be transmitted over a network

MD5 (Message-Digest Algorithm 5): A cryptographic hash function that is used to produce a fixed-size hash value from an input

MDS (Multi-Dimensional Scaling): A statistical technique that is used to visualize the relationships between a set of items or objects based on their similarities or distances

Mean: The arithmetic average of a set of values

Median: The value that is located at the midpoint of a set of values when they are ordered from smallest to largest

Memory leak: A problem in a program or system that causes it to consume an increasing amount of memory over time, leading to performance degradation or failure

Memory management: The process of allocating, deallocating, and managing the use of memory in a computer or device

Memory: A storage area in a computer used to hold data and instructions

Memory: The storage area in a computer or device that is used to store data and instructions

Menu: A list of options or commands that is displayed to a user

Merge: The process of combining two or more data sets, files, or branches

Merkle tree: A data structure that is used to store hashes in a tree-like structure, allowing for efficient and secure data verification

Mesh network: A type of wireless network in which devices communicate directly with each other, rather than through a central hub

Meta data: Data that describes or contextualizes other data

Metric: A measure or indicator that is used to assess the performance or quality of a system or process

Microservice: A software design approach in which a large application is built as a collection of small, independent services that can be developed and maintained separately

Microservices: A software architecture that is based on the idea of building applications as a collection of small, independent, and loosely coupled services that can be composed and deployed independently

Middleware: Software that acts as a bridge between different systems or components, enabling them to communicate and exchange data

Middleware: Software that connects different systems and applications together

Minification: The process of removing unnecessary characters from code in order to reduce its size and improve performance

Mirroring: The process of creating a copy of a data set, system, or network for backup or redundancy purposes

Mixed-reality: A term that refers to the combination of virtual reality (VR) and augmented reality (AR)

Mobile app: A software application designed to run on mobile devices such as smartphones and tablets

Model-view-controller (MVC): A software design pattern that separates the representation of data from the user's interaction with it

Model: A representation of a system, process, or concept that is used to simplify or analyze real-world situations

Modem: A device that enables a computer to transmit and receive data over a telephone or cable connection

Modem: A device that is used to modulate and demodulate signals for transmission over a communication channel

Modularization: The process of breaking down a system or program into smaller, independent modules or components that can be developed, tested, and maintained separately

Modulo: An operation that returns the remainder of a division

Monitor: A device that displays output from a computer or other device

Monitoring: The process of collecting and analyzing data from a system or network to identify and diagnose issues

Monolithic: A term used to describe a system or architecture that is large and complex, and integrates all its components into a single entity

Montioring: The process of collecting and analyzing data about a system or process in order to assess its performance, identify problems, or gather insights

Motherboard: The main circuit board in a computer, containing the connectors for attaching other hardware and the central processing unit (CPU)

N

N

N-gram: A sequence of N items from a given sample of text or speech, where N is a positive integer

Naive Bayes: A simple machine learning algorithm that is based on the principle of Bayes' theorem and is used for classification tasks

Named entity recognition (NER): A natural language processing (NLP) task that involves identifying and classifying named entities, such as people, organizations, and locations, in text

Named pipe: A type of interprocess communication (IPC) mechanism that allows data to be transferred between two or more processes using a special file or channel

Nano service: A small, independent service that performs a specific function or task and communicates with other services through APIs

NAT (Network Address Translation): A method of allowing multiple devices on a private network to access the internet using a single public IP address

NAT (Network Address Translation): A method that is used to allow multiple devices on a private network to share a single public IP address

Native app: A mobile app that is developed specifically for a particular platform or operating system

Natural language processing (NLP): A field of artificial intelligence that focuses on the interaction between computers and humans using natural language

Navigational structure: The way in which the pages or sections of a website or application are organized and linked together

Nearest neighbor: A method of classification or prediction that is based on finding the nearest data points in a dataset and using them to make a prediction

Network: A group of interconnected devices that can communicate with each other

Neural network: A type of machine learning algorithm that is inspired by the structure and function of the human brain and is used for tasks such as classification and prediction

NLP (Natural Language Processing): A field of artificial intelligence that focuses on enabling computers to understand and process human language

Node: A device connected to a network

Node: A point or device in a network that is able to send and receive data

Normalization: The process of organizing a database or data model in a way that minimizes redundancy and dependency

NoSQL: A database management system that is designed to handle large amounts of unstructured or semi-structured data and is used for tasks such as big data analysis and real-time processing

NoSQL: A type of database that does not use a traditional SQL relational database model

Notification: A message or alert that is sent to a user to inform them of an event or update

Null: A value that indicates the absence of a valid or meaningful data

Null: A value that represents the absence of a value or a default value

O

O

OAuth (Open Authentication): An open standard for authorization that allows users to grant third-party applications access to their resources without sharing their passwords

Object-oriented programming (OOP): A programming paradigm that is based on the concept of objects and the interaction between them

Object-oriented programming: A programming paradigm that focuses on organizing code into objects that represent real-world entities and their interactions

Object: A data structure that represents a real-world entity or concept

Object: A data structure that represents a real-world entity or concept in a program

OCR (Optical Character Recognition): The process of extracting text from images or scanned documents

OData (Open Data Protocol): A standard protocol for creating and consuming RESTful APIs that expose data

Off-chain: A term that refers to transactions or activities that are not recorded on a blockchain

On-chain: A term that refers to transactions or activities that are recorded on a blockchain

One-hot encoding: A method of encoding categorical data in a numerical form, where each category is represented by a binary vector with a single 1 and all other elements as 0

Open source: A term that refers to software or other resources that are freely available and can be modified and distributed by anyone

Open source: Software that is freely available for use, modification, and distribution

OpenAPI: A specification for building APIs that is used to describe the capabilities, parameters, and operations of an API

OpenID: An open standard for decentralized authentication that allows users to use a single set of credentials to sign in to multiple websites and services

Operand: A value or variable that is operated on by an operator in an expression or statement

Operating system: The software that controls and manages the hardware and software resources of a computer

Operation: An action or process that is performed by a system or program

Operator: A symbol or function that performs an operation on one or more operands

Optical character recognition (OCR): A technology that converts scanned or digital images of text into machine-readable text

Optimization: The process of improving the efficiency, performance, or effectiveness of a system or process

Option: A choice or alternative that is presented to a user

ORM (Object-Relational Mapping): A technique that is used to map data between a relational database and an object-oriented programming language

OTP (One-Time Password): A password that is valid for a single use and is typically used for enhanced security in two-factor authentication (2FA)

OTP (One-Time Password): A password that is valid for a single use, typically used for two-factor authentication

Out-of-bounds: A term that refers to an error or exception that occurs when a program or algorithm attempts to access an element outside the bounds of an array or other data structure

Output: The result of a computation or process that is produced by a system or program

OVAL (Open Vulnerability and Assessment Language): A standardized language and schema that is used to describe and test for vulnerabilities in computer systems

Over-the-air (OTA) update: A software update that is delivered wirelessly to a device, without the need for a physical connection or transfer of files

Overflow: A condition that occurs when the result of a computation exceeds the capacity of the data type or storage location that is being used

Overhead: The additional resources or processing that is required by a system or program in order to perform a task or function

Overload: A condition that occurs when a system or component is asked to perform more tasks or handle more data than it is capable of

Overriding: The process of replacing or modifying the behavior of a method or function by defining a new version of it in a subclass or child class

P

P

Packet: A unit of data that is transmitted over a network and contains information such as the source and destination addresses, as well as the payload

Packet: A unit of data transmitted over a network

Paging: A method of memory management that is used to allow a computer to access data that is stored in secondary storage, such as a hard drive or swap space

Pair programming: A software development technique in which two programmers work together on the same code, with one person writing the code and the other reviewing and suggesting improvements

Pairwise testing: A testing technique that involves testing all possible pairs of input values in a system or program

Palindrome: A word, phrase, or number that is spelled the same backwards as forwards

Parallel processing: The process of executing multiple tasks or processes concurrently, in order to improve performance or efficiency

Parameter: A value or variable that is passed to a function, method, or program as input

Parent: A term that refers to an element in a hierarchy or tree structure that is the ancestor of another element

Parsing: The process of analyzing and interpreting structured data or text

Partition: A division or subset of a larger data set or system

Password: A secret word or phrase that is used to authenticate a user's identity or access to a system or service

Patch: A small piece of software that is used to fix a bug or vulnerability in a system or program

Patch: A small update to a software program that fixes a bug or adds a new feature

Payload: The data or content that is carried by a packet, message, or request

PDF (Portable Document Format): A file format used to represent documents in a platform-independent manner

Peer-to-peer (P2P): A type of network in which each device functions as both a client and a server

Peer-to-peer (P2P): A type of network in which nodes communicate and share resources directly, without the need for a central server or authority

Performance testing: The process of evaluating the performance of a system or program under different workloads and conditions

Performance: A measure of the effectiveness, efficiency, or speed of a system or process

Peripheral: A device that is connected to a computer but is not an essential part of its core functionality

Peripheral: A device that is connected to a computer or other device and is used to input, output, or communicate data

Persistence: The ability of data or a state to be retained or stored over time

Persistent data: Data that is retained or stored over a period of time

Personalization: The process of adapting or tailoring a system, service, or experience to the needs and preferences of an individual user

Phishing: A type of cyber attack in which a attacker sends fake emails or texts pretending to be from a legitimate organization in order to trick the victim into revealing sensitive information

Phishing: A type of cyber attack that involves sending fraudulent emails or messages that are designed to trick users into revealing sensitive information or clicking on malicious links

Physical database design: The process of creating a database structure that is optimized for performance and efficiency, taking into account the physical characteristics of the storage media and hardware

Pipelining: A technique that is used to improve the performance of a processor by allowing multiple instructions to be executed concurrently

Pixel: The smallest unit of a digital image that can be displayed on a screen

PKI (Public Key Infrastructure): A system that is used to manage the secure exchange of digital certificates and keys

Platform: A hardware or software environment that is used to run and host applications or services

Plug-in: A piece of software that is used to extend the functionality of another application or system

Pointer: A variable that stores the address of another variable or memory location

Q

Q

Quality assurance (QA): The process of verifying that a product or service meets a set of standards or requirements

Quality of service (QoS): A measure of the performance of a network or system in terms of its ability to deliver a specified level of service to users

Queries: Questions or requests that are made to a database or system in order to retrieve or manipulate data

Query language: A specialized programming language that is used to create and execute queries against a database

Query: A request for information from a database

Queue: A data structure that is used to store and manage data in a first-in, first-out (FIFO) order

Queue: A data structure that stores items in a first-in, first-out (FIFO) order

Queueing theory: The study of how to design systems that handle tasks or requests in an efficient manner

Queueing theory: The study of systems that involve the waiting of customers or tasks in a queue

Quicksort: A divide-and-conquer sorting algorithm that is based on the idea of partitioning a list into smaller sublists and sorting them recursively

R

R

RAD (Rapid Application Development): A software development method that focuses on rapid prototyping and iterative development

RAID (Redundant Array of Independent Disks): A data storage technology that combines multiple disk drives into a single logical unit to improve performance and provide fault tolerance

RAM (Random Access Memory): A type of computer memory that is used to store data and instructions that are being actively used or processed by the CPU

Raster graphics: A type of digital image that is made up of pixels and is used to represent continuous-tone images, such as photographs

Ratio: A comparison of two quantities that is expressed as a quotient

RBAC (Role-Based Access Control): A method of access control that is based on the roles and responsibilities of users within an organization

RDF (Resource Description Framework): A standard for representing and exchanging data on the Web in a machine-readable format

Real-time: A system or process that responds to input immediately or within a short period of time

Real-time: A term that refers to a system or process that operates in real-time, meaning it responds to events or inputs as they occur

Record: A set of related data that is stored in a database or file

Recursion: A programming technique in which a function or algorithm calls itself repeatedly in order to solve a problem or achieve a result

Redo: The action of repeating or restoring a previously undone operation

Redundancy: The duplication of critical components or systems in order to improve reliability or fault tolerance

Refactoring: The process of improving the design or structure of a system or program without changing its functionality

Refactoring: The process of restructuring code to improve its quality or maintainability without changing its functionality

Regression: A statistical analysis technique that is used to model the relationship between a dependent variable and one or more independent variables

Regression: A statistical analysis technique used to predict the value of a dependent variable based on the value of one or more independent variables

Relational database: A type of database that is based on the relational model and stores data in tables that are related to each other through key values

Remote access: The ability to access a computer or network from a location that is physically separate from it

Remote desktop: A software application or service that allows users to access and control a computer or network remotely over the internet

Remote procedure call (RPC): A method of interprocess communication that allows a program to execute a function or procedure on another computer or server

REST (Representational State Transfer): An architectural style for building web services

REST (Representational State Transfer): An architectural style for designing distributed systems and APIs that is based on the principles of simplicity, statelessness, and the uniform interface

Retweet: The action of reposting or sharing someone else's tweet on Twitter

Reverse engineering: The process of analyzing and understanding the design and operation of a system or product in order to replicate or improve upon it

RGB (Red Green Blue): A color model that is used to represent colors in digital images and displays, using a combination of red, green, and blue light

RISC (Reduced Instruction Set Computing): A type of computer architecture that is characterized by a limited number of simple instructions and a large number of registers

RMI (Remote Method Invocation): A Java-based technology that allows a program running on one computer to invoke methods on an object that is running on another computer

Robustness: The ability of a system or program to continue functioning correctly even when subjected to adverse conditions or inputs

Router: A device that forwards data packets between networks

Router: A device that is used to connect networks or devices together and to forward data between them

Row: A horizontal set of data in a table or matrix

S

S

SaaS (Software as a Service): A cloud computing service model in which a software application

SaaS (Software as a Service): A cloud computing service model in which a software application is provided as a service over the internet

SaaS (Software as a Service): A model of software delivery in which a software application is provided as a service over the internet, typically on a subscription basis

SAN (Storage Area Network): A high-speed network that is used to connect storage devices to servers

Scalability: The ability of a system or program to handle an increasing workload or data volume without a decrease in performance

Scaling: The process of increasing or decreasing the size or capacity of a system or component in order to meet changing demands or requirements

Scanner: A device that captures images of documents or photographs and converts them into digital form

Scrum: An agile software development method that is based on the principles of transparency, inspection, and adaptation

Search engine optimization (SEO): The practice of optimizing a website or web content in order to improve its visibility and ranking in search engine results

Search engine optimization (SEO): The practice of optimizing a website to improve its ranking in search engine results pages

Search engine: A software application or service that is used to search for and retrieve information from the internet or other sources

Search engine: A software program that searches a database of web pages, images, and other online content to find relevant results in response to a user's query

Security token: A physical or digital device that is used to authenticate a user's identity or access to a system or service

Security: Measures taken to protect a system or network from unauthorized access or attacks

Security: Measures that are taken to protect a system or data from unauthorized access, use, or disclosure

SELinux (Security-Enhanced Linux): A set of security policies and tools that is used to enhance the security of the Linux operating system

Semantic Web: A vision of the Web in which data and information are represented in a machine-readable format and can be easily shared and reused across different systems and applications

Semaphore: A synchronization object that is used to control access to shared resources in a concurrent or multithreaded environment

Sensitive data: Data that is protected by law or policy and requires special handling or protection due to its confidentiality, integrity, or value

Server: A computer or device that is used to host or provide services or resources to other computers or devices

Server: A computer or device that provides resources or services to other devices on a network

Service level agreement (SLA): A contract between a service provider and a customer that specifies the level of service and support that the provider will deliver

Service-oriented architecture (SOA): An architectural style for building distributed systems that enables loose coupling between services

Service-oriented architecture (SOA): An architectural style for designing distributed systems and services that is based on the principles of loose coupling and interoperability

Session: A period of time during which a user is logged in to a system or service

SHA (Secure Hash Algorithm): A family of cryptographic hash functions that are used to create a digital fingerprint or message digest of a data set

Shell: A command-line interface or program that is used to interpret and execute commands from a user

SIM (Subscriber Identity Module): A removable smart card that is used to store and authenticate a user's identity and access rights to a mobile network

SIMD (Single Instruction Multiple Data): A type of computer architecture that is used to perform the same operation on multiple data elements concurrently

Simple Mail Transfer Protocol (SMTP): A standard protocol for sending email messages over the internet

Single sign-on (SSO): A method of authentication that allows a user to access multiple systems or services with a single set of credentials

Slackware: A distribution of the Linux operating system that is known for its simplicity and adherence to the Unix philosophy

SMTP (Simple Mail Transfer Protocol): A protocol used for sending email messages between servers

Social engineering: A type of cyber attack that involves manipulating or tricking people into revealing sensitive information or taking actions that are not in their best interests

Social media: Online platforms that allow users to create and share content or participate in social networking

Socket: A endpoint for sending or receiving data over a network

Software: A set of instructions or programs that are used to perform specific tasks on a computer or other device

Software: A set of instructions or programs that tell a computer what to do

Spam: Unsolicited or unwanted emails or other electronic communications

SQL (Structured Query Language): A programming language used to manage and manipulate data stored in relational databases

SSL (Secure Sockets Layer): A security protocol that encrypts data transmitted between a web server and a client

Stack: A data structure that stores items in a last-in, first-out (LIFO) order

Storage: The process of saving data on a computer or other device

Structured data: Data that is organized in a specific format, such as a table or database

Switch: A device that forwards data packets between networks based on the destination MAC address of the packets

T

T

TCP (Transmission Control Protocol): A protocol used to establish a reliable connection and transmit data between two devices over a network

TCP (Transmission Control Protocol): A standard protocol for reliable data transmission over a network

TCP/IP (Transmission Control Protocol/Internet Protocol): The communication protocol used on the internet

TDD (Test-Driven Development): A software development method that involves writing tests for a code base before writing the actual code

Template: A pre-designed layout or structure that can be used as the basis for creating new documents or websites

TensorFlow: An open-source software library for machine learning and artificial intelligence

Testing: The process of evaluating the performance, functionality, or quality of a system or program

Text editor: A type of software application that is used to create, edit, and manipulate text files

Thread: A separate flow of execution within a program or process

Threat: A potential danger or risk to a system or network

Threshold: A limit or boundary that is used to trigger an action or event

Time series: A series of data points collected over a period of time

Time-sharing: A method of allowing multiple users to share a computer by dividing the system's resources among them

Token: A special symbol or piece of data that is used to represent or identify something else

Toolkit: A collection of tools or resources used to develop or maintain software

Top-down design: A design approach that starts with a high-level overview and then breaks down a problem or solution into smaller, more manageable components

Topology: The arrangement or structure of a network or system

Traffic: The amount of data transmitted over a network

Transaction: A unit of work that is performed by a database or system, typically involving one or more data operations that are either all committed or all rolled back in the event of an error or failure

Transmission Control Protocol/Internet Protocol (TCP/IP): A standard protocol stack for transmitting data over a network

Tree: A data structure that is used to represent a hierarchical or branching relationship between objects or data

Trojan: A type of malware that is designed to appear legitimate or benign but is actually malicious

Trojan: Malware that disguises itself as legitimate software

Truncation: The process of cutting off or abbreviating data or text

Tunneling: A technique for encapsulating one protocol within another, allowing it to be transmitted over a network that does not support it natively

Tunneling: The process of encapsulating one protocol within another in order to transmit it over a network or other medium

Tweak: A small change or adjustment that is made to a system or program in order to improve its performance or behavior

Twitter: A social networking and microblogging platform that allows users to send and read short messages called tweets

Twofactor authentication: A security process that requires users to provide two forms of identification, such as a password and a security token, to access a system or service

Type conversion: The process of converting a value or data type from one form to another

Type inference: The process of automatically deducing the data type of a value or expression based on its context or usage

Typography: The art and technique of designing and arranging type in order to make text legible and aesthetically appealing

U

U

UAC (User Account Control): A security feature in the Windows operating system that is used to prompt users for permission when making changes to the system or installing new software

UDP (User Datagram Protocol): A standard protocol for transmitting data over a network using a connectionless approach

UI (User Interface): The part of a computer system or application that is responsible for presenting information to a user and accepting input from them

UML (Unified Modeling Language): A standardized visual language used for modeling software systems

Unicode: A character encoding standard that represents most of the world's written languages

Unicode: A standardized character encoding that represents most of the world's written languages

Uninterruptible power supply (UPS): A device that is used to provide a backup power supply to a computer or other device in the event of a power failure

Unix shell: A command-line interface or program that is used to interpret and execute commands on a Unix-based system

Unix: A family of multitasking, multiuser operating systems that are based on the principles of portability and simplicity

Unstructured data: Data that is not organized in a specific format, such as free-form text

URL (Uniform Resource Locator): A string of characters that identifies the location of a resource on the internet

URL (Uniform Resource Locator): A string of characters that is used to identify a location or resource on the internet

USB (Universal Serial Bus): A standard for connecting devices to a computer

USB (Universal Serial Bus): A standard interface that is used to connect devices to a computer or other device

User account: A set of permissions and settings that are associated with a user and are used to control their access to a system or service

User experience (UX): The overall experience of a person using a product or service, including usability, accessibility, and satisfaction

User experience (UX): The overall experience of a user when interacting with a product, system, or service

User group: A group of users who share a common interest or purpose

User interface (UI): The means by which a user interacts with a computer or device, such as through a keyboard, mouse, or touch screen

User: A person who interacts with a computer or other device

Utility: A program that performs a specific task or function

V

V

Validation: The process of verifying that a system or process is operating correctly or meets certain standards or requirements

Variable: A storage location in a program or system that is used to hold a value or reference to an object or data

Vector graphics: A type of digital image that is made up of geometric shapes and lines and is used to represent discrete or discretely changing data, such as charts or diagrams

Version control: The management of changes to a system or document over time, typically using a version control system

Virtual machine: A software-based emulation of a computer or device that is used to run multiple operating systems or applications on a single physical machine

Virtual memory: A type of computer memory that is used to extend the physical memory of a computer by temporarily transferring data to a hard drive or other storage device

Virtual private network (VPN): A private network that is created over a public network, such as the internet, and that is used to securely transmit data between two or more locations

Virus: A piece of code or software that is designed to replicate itself and spread to other computers or devices

Virus: Malware that replicates itself and spreads to other computers or devices

Visualization: The process of representing data or information in a visual or graphical form, such as a chart or map

VPN (Virtual Private Network): A private network that uses a public network (such as the internet) to securely connect remote sites or users

W

W

Web 2.0: A term that is used to describe the second generation of the World Wide Web, which is characterized by the use of web-based technologies and services that enable users to interact and collaborate with each other online

Web analytics: The analysis and measurement of data and activity on a website or web application, typically for the purpose of improving its performance or user experience

Web application: A software application that is delivered over the internet and accessed through a web browser

Web application: A software application that runs on a web server and is accessed through a web browser

Web browser: A software application that allows users to access and view web pages

Web browser: A software application that is used to access and browse the internet or other web-based resources

Web development: The process of designing and building websites or web applications

Web scraping: The process of extracting data or information from a website or web page using automated tools or software

Web server log: A file that is created by a web server to record information about the requests and responses that it handles

Web server: A computer or device that is used to host and serve web content and applications to users over the internet

Web server: A computer or device that stores and delivers web pages and other content over the internet

Web service: A software system or application that is designed to support interoperable machine-to-machine communication over the internet

Website: A collection of interconnected web pages that can be accessed through a web browser

Weighting: The process of assigning relative importance or value to a data element or factor

White box testing: A testing technique that is based on an understanding of the internal workings or structure of a system or component

WiFi (Wireless Fidelity): A wireless networking technology that is based on the IEEE 802.11 standard

WiFi: A wireless networking technology that allows devices to communicate with each other over a short distance

Windows: A family of operating systems that is developed by Microsoft and is designed for use on personal computers and servers

WLAN (Wireless Local Area Network): A network that connects devices wirelessly over a short distance

Worm: Malware that replicates itself and spreads over a network

X

X

Xcode: An integrated development environment (IDE) that is used to develop software for the macOS, iOS, iPadOS, watchOS, and tvOS platforms

Xdebug: A PHP extension that is used for debugging and profiling PHP scripts

XML (Extensible Markup Language): A markup language that is used to define and structure data and information in a machine-readable format

XML (Extensible Markup Language): A markup language used to store and transport data

XOR (Exclusive OR): A logical operator that returns true if one of its operands is true, but not both

XSS (Cross-Site Scripting): A type of cyber attack that involves injecting malicious code or script into a website or web application in order to steal sensitive information or execute malicious actions on behalf of the user

Y

Y

Y-combinator: A function in the lambda calculus that is used to define recursive functions and is named after the shape of the symbol used to represent it

YAML (Yet Another Markup Language): A data serialization language that is designed to be human-readable and easy to parse

YAML (Yet Another Markup Language): A human-readable data serialization language

YAML Ain't Markup Language: A tongue-in-cheek acronym that is often used to refer to the YAML data serialization language

YOLO (You Only Live Once): A phrase that is often used as a motto or justification for taking risks or making impulsive decisions

YOLO neural network: A type of neural network that is designed for real-time object detection and is based on the YOLO (You Only Look Once) algorithm

YOLOv3 (You Only Look Once version 3): A real-time object detection system that is based on a single convolutional neural network

YOLOv4 (You Only Look Once version 4): A real-time object detection system that is based on a single convolutional neural network and is known for its high accuracy and speed

YOLOv5 (You Only Look Once version 5): A real-time object detection system that is based on a single convolutional neural network and is known for its improved accuracy and efficiency compared to earlier versions of YOLO

YOLT (You Only Live Twice): A phrase that is often used to refer to the idea that people have multiple chances or opportunities to achieve their goals or make a positive impact

YOLT-DNN (You Only Look Twice Deep Neural Network): A real-time object detection system that is based on the YOLO (You Only Look Once) algorithm and uses a combination of convolutional neural networks and a recurrent neural network

YouTube API (Application Programming Interface): A set of tools and protocols that are used to access and interact with the YouTube platform and its data

YouTube: A video-sharing website and platform that is owned by Google and allows users to upload, share, and view videos

Z

Z

Z-order: The order in which objects or elements are layered or stacked in a graphical user interface or document

Z-score: A statistical measure that is used to determine how many standard deviations a data point is from the mean of a dataset

Z-transform: A mathematical operation that is used to analyze the frequency content of a discrete time series or signal

Zero-day vulnerability: A security vulnerability that is unknown to the vendor or developer and has not yet been patched

ZIP (Zipping): A file compression and archiving format that is used to reduce the size of a file or group of files and make them easier to transmit or store

ZIP archive: A file that is created using the ZIP file format and that contains one or more compressed files or directories

Zlib: A software library that is used to compress and decompress data and is based on the DEFLATE algorithm

Zsh (Z shell): A Unix shell and command-line interpreter that is designed to be more user-friendly and feature-rich than other shells

Zwave: A wireless communication protocol that is used for home automation and other applications and operates in the sub-gigahertz frequency band
error: Content is protected !!
Scroll to Top