A computer is an electronic device that processes data according to a set of instructions, called a program. It performs various tasks by following programmed instructions. Computers can handle different types of data, such as text, numbers, images and sounds, and perform complex calculations at high speed. At its core, a computer takes input, processes it, stores it, and then produces output. Input can come from a variety of sources, such as keyboard, mouse, microphone, or other devices. Once input is received, the computer’s central processing unit (CPU) processes the information by performing calculations or logical operations. Processed data may be stored in the computer’s memory, including short-term memory (RAM) and long-term storage (hard drives or solid-state drives).
Computers run software applications to accomplish specific tasks. For example, a word processor helps you write documents, a web browser allows you to access the Internet, and a game can provide entertainment. Software can range from simple programs to complex systems, such as operating systems that manage all of a computer’s hardware and software resources. Modern computers come in a variety of forms, from large desktop machines to portable laptops, tablets, and even smartphones. They can be used for many purposes including personal, educational, business and scientific applications. Computers are connected to networks, such as the Internet, which enable them to communicate with other computers and share resources and information.
The history of computers begins with the earliest mechanical devices and has evolved through various stages, from large and room-sized machines to today’s compact and powerful devices. Advances in technology have made computers faster, more efficient, and more accessible to people around the world. A computer is a versatile, powerful device that can process and store data, run applications, and connect to networks, making it an essential part of modern life across a variety of activities and industries. In this article we tell us about computer vocabulary words.
- A/B Testing
- Abstraction
- Access
- Accumulator
- Active Directory
- Actuator
- Address
- Address Bus
- Admin (Administrator)
- Adware
- Ai (Artificial Intelligence)
- Algorithm
- Algorithmic Trading
- Amplifier
- Analog
- Ansi (American National Standards Institute)
- Anti-Virus
- Api (Application Programming Interface)
- Apl (A Programming Language)
- App
- Applet
- Application
- Architecture
- Arithmetic
- Arithmetic Logic Unit (Alu)
- Array
- Array Processor
- Ascii (American Standard Code For Information Interchange)
- Assembler
- Assembly Language
- Asymmetric Encryption
- Asynchronous
- Asynchronous Transfer Mode (Atm)
- Audio Interface
- Augmented Reality (Ar)
- Authentication
- Authorization
- Autocomplete
- Automation
- Auto-Scaling
- Availability
- Avatar
- Average
- Backbone
- Backbone Network
- Background Process
- Backup
- Backup Server
- Backup Software
- Bandwidth
- Bandwidth Throttling
- Bare Metal
- Base Station
- Baseband
- Batch File
- Batch Processing
- Baud
- Baud Rate
- Benchmark
- Beowulf Cluster
- Big Data
- Binary
- Binary File
- Binary Logic
- Binary Search
- Binary Tree
- Bios (Basic Input/Output System)
- Bios Chip
- Bios Settings
- Bit
- Bit Depth
- Bit Rate
- Bite
- Bitfield
- Bitmap
- Bitmask
- Bitrate
- Bitwise Operation
- Black Box Testing
- Block Cipher
- Block Storage
- Blockchain
- Blog
- Blogger
- Bluetooth
- Bluetooth Adapter
- Bookmark
- Boolean Logic
- Boot
- Boot Loader
- Bootstrap
- Bot (Internet Robot)
- Botnet
- Boundary Scan
- Bridge (Networking)
- Broadband
- Broadcast
- Browser
- Browser Cache
- Browser Extension
- Browser Plugin
- Brute Force Attack
- Buffer
- Buffer Overflow
- Bug
- Bug Tracking
- Build Automation
- Burn-In Test
- Bus Interface
- Bus Topology
- Byte
- Byte Addressing
- Byte Order Mark
- Bytecode
- Bytecode Interpreter
- Cable
- Cache
- Cache Memory
- Caching
- Caching Algorithm
- CAD (Computer-Aided Design)
- CAMEO (Computer-Aided Management Of Emergency Operations)
- Camera
- Caps Lock
- Captcha
- Case (Computer Case)
- Cathode Ray Tube (CRT)
- CD
- CD-ROM
- Cellular Network
- Certificate (Digital Certificate)
- Channel
- Chip
- Circuit
- Click
- Client
- Client-Server Model
- Clip Art
- Clip Board
- Cloud Computing
- Cluster
- Coaxial Cable
- Codec
- Collaboration Software
- Collision Domain
- Command
- Command Interpreter
- Command Line Interface (CLI)
- Command Module
- Communication Protocol
- Compact Disc (CD)
- Compile
- Compiler Directive
- Composite Video
- Compress
- Computer
- Computer Architecture
- Computer Ethics
- Computer Graphics
- Computer Language
- Computer Literacy
- Computer Network
- Computer Program
- Computer Science
- Computer Simulation
- Computer Vision
- Configure
- Connectivity
- Control Panel
- Control Unit
- Controller
- Convergence
- Cookie
- Copy
- Core (Processor Core)
- Corporate Network
- CPU (Central Processing Unit)
- Cracker (Hacker)
- Crash
- Critical Section
- Cross-Platform
- Cryptography
- Cursor
- Customization
- Cyber Hygiene
- Cyberattack
- Cybercrime
- Cybersecurity
- Cybersecurity Framework
- Cyberspace
- Cybersquatting
- Cyberthreat
- Cyberwarfare
- Cyborg
- Cylinder (Disk Storage)
- Dashboard
- Data
- Data Mining
- Database
- Dataflow
- Datapath
- Datasheet
- Datastore
- Datatype
- Dataverse
- Ddos (Distributed Denial Of Service)
- Debug
- Debugger
- Decipher
- Decode
- Decompress
- Decrypt
- Deduplicate
- Default
- Defragment
- Deinitialize
- Delete
- Delimiter
- Deliverable
- Dependency
- Deployment
- Descriptor
- Design Pattern
- Desktop
- Desktop Environment
- Destination
- Development
- Device Driver
- Devops
- Dial-Up
- Dictionary
- Differential Backup
- Digital
- Digital Certificate
- Digital Rights Management (DRM)
- Digitize
- DIMM (Dual Inline Memory Module)
- Direct Access
- Directory
- Directory Service
- Disk
- Disk Array
- Disk Controller
- Disk Image
- Disk Partition
- Disk Quota
- Disk Space
- Diskette
- Distributed Computing
- Distributed System
- DLL (Dynamic Link Library)
- DMA (Direct Memory Access)
- DNS (Domain Name System)
- DNS Server
- Docking Station
- Document
- Domain
- Domain Controller
- Domain Name
- Domain-Specific Language (DSL)
- Dot
- Dot Matrix
- Dot Pitch
- Dotnet (.NET)
- Double Buffer
- Downlink
- Download
- Downsample
- Downstream
- Drag
- Drag-And-Drop
- Drive Letter
- Dual Boot
- Dual-Core Processor
- Duplex
- DVD (Digital Versatile Disc)
- DVI (Digital Visual Interface)
- Dynamic
- Dynamic Host Configuration Protocol (DHCP)
- Dynamic Link
- Dynamic Page
- Dynamic Random-Access Memory (DRAM)
- Dynamic URL
- Dynamic Web Page
- Dynode
- Dysprosium (Used In Computer Hardware Manufacturing)
- E-Book
- E-Commerce
- E-Commerce Platform
- E-Commerce Solution
- E-Commerce Website
- Edge Computing
- Edge Device
- Edit
- EEPROM
- E-Learning
- Electronic Commerce
- Electronic Signature
- Email Attachment
- Email Client
- Email Protocol
- Email Server
- Email Spam
- Embedded System
- Emoticon
- Emoticon Keyboard
- Emulator
- Encapsulation
- Encoding
- Encoding Format
- Encrypt
- Encryption
- Encryption Algorithm
- Encryption Key
- Encryption Key Management
- Encryption Protocol
- Encryption Software
- Encryption Standard
- Encryption Strength
- Encryption Technology
- Endianness
- Endpoint
- Endpoint Device
- Endpoint Protection
- Endpoint Security
- Enter
- Enterprise Resource Planning (ERP)
- Entry Barrier
- Entry Point
- Entry-Level
- Environment Variable
- E-Paper
- Ergonomics
- Error
- Error Code
- Error Handling
- Error Message
- Escalation
- Ethernet
- Ethernet Cable
- EULA (End User License Agreement)
- Event
- Event Handler
- Event Listener
- Event-Driven Programming
- Evolutionary Algorithm
- E-Wallet
- E-Waste
- Exabyte
- Exabyte
- Exception
- Executable
- Execution
- Expansion
- Expansion Slot
- Expert System
- Exponential Growth
- External Hard Drive
- Extraction
- Extranet
- Failover
- Fan Speed
- FAQ (Frequently Asked Questions)
- FAT (File Allocation Table)
- Fault Diagnosis
- Fault Isolation
- Fault Tolerance
- Favicon
- Fiber Channel
- Fiber Channel Switch
- Fiber Optics
- Field-Programmable Gate Array (FPGA)
- FIFO (First In, First Out)
- File
- File Association
- File Compression
- File Encryption
- File Extension
- File Hashing
- File Hosting
- File Integrity
- File Locking
- File Management
- File Permission
- File Recovery
- File Server
- File Sharing
- File Synchronization
- File System
- File Transfer
- Finder
- Fingerprint Reader
- Firewall
- Firewall Appliance
- Firewall Configuration
- Firewall Rules
- Firewall Software
- Firmware
- Firmware Compatibility
- Firmware Configuration
- Firmware Development
- Firmware Update
- Firmware Upgrade
- Flaming
- Flash
- Flash Animation
- Flash Drive
- Flash Memory
- Flash Memory Card
- Flash Memory Controller
- Flash Plugin
- Flash Storage
- Flash Vulnerability
- Flashing BIOS
- Flashing Lights
- Floating-Point Operation
- Floppy Disk
- Floppy Disk Drive
- Floppy Drive
- Flowchart
- Folder
- Folder Hierarchy
- Font
- Font Rendering
- Form Factor
- Form Validation
- Format
- Format Conversion
- Forward Error Correction
- Forwarding Table
- Fragmentation
- Frame
- Frame Rate
- Freeware
- Frequency Modulation
- Frequency Spectrum
- FTP (File Transfer Protocol)
- Full Duplex
- Function
- Function Key
- Gain (In Networking)
- Gamepad
- Gamification
- Gaming
- Gamma Correction
- Gateway
- Generator
- Genetic Algorithms
- Geolocation
- Geotagging
- Gerrit (Code Review)
- Gestures (In User Interfaces)
- Ghosting (In Displays)
- Gigabit
- Gigabyte
- Gigahertz
- Git
- Github
- Gitlab
- Glare (In Displays)
- Glassware (Software For Google Glass)
- Glitch
- Global Area Network (GAN)
- GNOME (GNU Network Object Model Environment)
- GNOME Shell
- GNU (GNU’s Not Unix)
- Google Analytics
- Google Assistant
- Google Calendar
- Google Cardboard
- Google Chrome
- Google Chromebook
- Google Cloud Platform
- Google Docs
- Google Drive
- Google Earth
- Google Fiber
- Google Glass
- Google Hangouts
- Google Home
- Google Maps
- Google Meet
- Google Pay
- Google Photos
- Google Pixel
- Google Play
- Google Scholar
- Google Search
- Google Translate
- Google Voice
- Google Wallet
- Google Workspace
- Gopher (Protocol)
- GPU (Graphics Processing Unit)
- GPU Acceleration
- GPU Rendering
- Gradient (In Graphics)
- Graph Database
- Graph Theory
- Graphene
- Graphic Design
- Graphical Password
- Graphics
- Gray Scale
- Green Computing
- Grid Computing
- Grounding
- Groupware
- Guard Interval
- GUI (Graphical User Interface)
- Hack
- Hacker
- Hacking
- Hacktivist
- Hadoop
- Handler
- Handshake
- Haptic
- Hard Copy
- Hard Drive
- Hardware
- Hardware Abstraction Layer (HAL)
- Hardware Acceleration
- Hardware Encryption
- Hardware Firewall
- Hardware RAID
- Hardware Virtualization
- Hash
- Hashing
- HDD (Hard Disk Drive)
- HDMI (High Definition Multimedia Interface)
- Header
- Header File
- Header Tag
- Heap
- Heat Sink
- Hex Editor
- Hexadecimal
- Hibernate
- Hibernate
- Hierarchical
- High Availability
- High-Level Language
- High-Level Language
- High-Speed Internet
- Hijack
- Hit
- Home Page
- Honeypot
- Horizontal
- Host
- Host
- Hostname
- Hosts File
- Hotfix
- Hover
- Hovering
- HTML (Hypertext Markup Language)
- HTML5
- HTTP (Hypertext Transfer Protocol)
- Http/2
- Https
- Hub
- Hybrid
- Hybrid App
- Hybrid Cloud
- Hybrid Drive
- Hybrid It
- Hyperlink
- Hypertext
- Hyper-V
- Hypervisor
- Iaas (Infrastructure As A Service)
- Icon
- Ide (Integrated Development Environment)
- Ide (Integrated Drive Electronics)
- Identifier
- Identity
- Image Processing
- Imaging
- Imap (Internet Message Access Protocol)
- Impact
- Implementation
- Inbox
- Incident
- Increment
- Index
- Indexing
- Inference
- Information
- Infrared
- Infrastructure
- Inheritance
- Initialization
- Injection
- Inode
- Input
- Input Device
- Insert
- Inspect
- Installer
- Instruction
- Instruction Set
- Integer
- Integrity
- Intelligent
- Interactive
- Interactive
- Interface
- Interface Card
- Interference
- Internal
- Internet
- Internet Protocol (Ip)
- Interpreter
- Interrupt
- Intranet
- Intrusion
- Intrusion Detection System (Ids)
- Intrusion Prevention System (Ips)
- Inventory
- Inverter
- Iot (Internet Of Things)
- Ip Address
- Ipsec (Internet Protocol Security)
- Irc (Internet Relay Chat)
- Iso (International Organization For Standardization)
- Iso Image
- Isp (Internet Service Provider)
- It (Information Technology)
- It Security
- Iteration
- Iterator
- Itil (Information Technology Infrastructure Library)
- Itsm (Information Technology Service Management)
- Itu (International Telecommunication Union)
- Ivr (Interactive Voice Response)
- Jam (Java Application Manager)
- Jar (Java Archive)
- Jar File
- Jar Hell
- Jas (Java Authentication And Authorization Service)
- Java
- Java Application Server
- Java Ee (Java Platform, Enterprise Edition)
- Javabeans
- Javadoc
- Javascript
- Jce (Java Cryptography Extension)
- Jcl (Job Control Language)
- Jcl Statement
- Jdbc (Java Database Connectivity)
- Jffs (Journaling Flash File System)
- Jffs2 (Journaling Flash File System 2)
- Jfs (Journaled File System)
- Jini
- Jini Network Technology
- Jit (Just-In-Time Compilation)
- Jit Compiler
- Jit Debugging
- Jit Watch
- Jitter
- Jitter Buffer
- Jitter Test
- Jitter Tolerance
- Jms (Java Message Service)
- Jndi (Java Naming And Directory Interface)
- Job Control Language
- Job Control System
- Job Object
- Job Pool
- Job Queue
- Job Queue Scheduling
- Job Scheduler
- Job Security
- Job Sharing
- Job Shop Scheduling
- Job Ticket
- Job Tracking
- Jobber
- Join (In Sql)
- Join Table
- Joins (In Database)
- Joliet File System
- Journaling File System
- Joystick
- Jpeg (Joint Photographic Experts Group)
- Jquery
- Jre (Java Runtime Environment)
- Jscript
- Json (Javascript Object Notation)
- Jsp (Javaserver Pages)
- Jsp Tag
- Jtag (Joint Test Action Group)
- Jukebox (Data Storage)
- Jumbo Frame
- Jump Drive
- Jump Instruction
- Jump List
- Jump Server
- Junk Character
- Junk File
- Junk Mail
- Junkware
- Jupyter
- Jvm (Java Virtual Machine)
- Kali Linux
- Kanban
- Kanji
- K-Anonymity
- Karnaugh Map
- Karnaugh Map Minimization
- Karnaugh-Veitch Map
- Kbps (Kilobits Per Second)
- K-Complex
- Kerberos
- Kernel
- Kernel Architecture
- Kernel Debugger
- Kernel Density Estimation
- Kernel Density Function
- Kernel Development
- Kernel Exploit
- Kernel Initialization
- Kernel Mode
- Kernel Module
- Kernel Object
- Kernel Panic
- Kernel Panic Error
- Kernel Panic Message
- Kernel Patch
- Kernel Recompilation
- Kernel Regression
- Kernel Space
- Kernel Space Attack
- Kernel Threading
- Kernel Trick
- Kernel-Based Methods
- Kernel-Level Thread
- Key
- Key Derivation Function
- Key Encryption Key
- Key Escrow
- Key Exchange
- Key Length
- Key Pair
- Key Signature
- Key Verification
- Keyboard
- Keyboard Layout
- Keychain
- Keyframe
- Keylogger
- Keystroke
- Keystroke Dynamics
- Keystroke Logger
- Keyword
- K-Factor
- Kibibit
- Kibibyte
- Kilobyte
- Kiosk
- Kiosk Mode
- Kit
- K-Means Clustering
- Kml (Keyhole Markup Language)
- Knapsack Problem
- Knockout.Js
- Knowledge Base
- Knowledge Engineering
- Knowledge Representation
- Kpi (Key Performance Indicator)
- Kriging
- Kryder’s Law
- Kubernetes
- Kvl (Kirchhoff’s Voltage Law)
- Kvm (Kernel-Based Virtual Machine)
- Kvm Switch
- Lag
- Lamp (Linux, Apache, Mysql, Php)
- Lan (Local Area Network)
- Lan Adapter
- Laptop
- Laser Printer
- Latency
- Latency Period
- Latency Reduction
- Latency Sensitivity
- Launchpad
- Layout
- Lcd (Liquid Crystal Display)
- Ldap (Lightweight Directory Access Protocol)
- Least Privilege Principle
- Led (Light Emitting Diode)
- Lexeme
- Lexical Analysis
- Library
- License
- Life Cycle
- Lightpen
- Lightweight
- Line Printer
- Link
- Linker
- Linter
- Linux
- Linux Kernel
- Lisp (Programming Language)
- Load Average
- Load Balancer
- Load Sharing
- Load Shedding
- Load Time
- Loader
- Local Storage
- Localhost
- Log
- Log File
- Log Out
- Logarithm
- Logarithmic Scale
- Logic
- Logic Gate
- Logical Address
- Logical Drive
- Logical Operation
- Logical Record
- Logical Volume
- Login
- Login Credentials
- Login Screen
- Logout
- Long Polling
- Lookup
- Lookup Table
- Loop
- Loop Control
- Loopback Address
- Lossless Compression
- Lossy Compression
- Low Power Mode
- Low-Level Format
- Low-Level Language
- Ls (List Directory Contents)
- Lts (Long Term Support)
- Lua (Programming Language)
- Lubuntu
- Lun (Logical Unit Number)
- Lurking
- Lvm (Logical Volume Manager)
- Lxc (Linux Containers)
- Lz77 (Lempel-Ziv 1977)
- Lz78 (Lempel-Ziv 1978)
- Lzma (Lempel-Ziv-Markov Chain Algorithm)
- Machine Code
- Machine Learning
- Macintosh
- Macro
- Macro Virus
- Magnetic Disk
- Magnetic Tape
- Mail Server
- Main Memory
- Mainboard
- Mainframe
- Malware
- Malwarebytes
- Management Software
- Manual Input
- Mapping
- Markup Language
- Mashup
- Master Boot Record
- Master File
- Mathematical Software
- Media
- Media Player
- Media Server
- Media Streaming
- Megabyte
- Megahertz
- Memory
- Memory Address
- Memory Allocation
- Memory Bank
- Memory Card
- Memory Chip
- Memory Leak
- Memory Management
- Memory Module
- Memory Stick
- Meta Tag
- Metadata
- Methodology
- Microarchitecture
- Microcode
- Microcontroller
- Microkernel
- Micromanagement
- Microphone
- Microprocessor
- Microsystem
- Middleware
- Millisecond
- Miniaturization
- Minicomputer
- Minimize
- Mirror
- Mobile App
- Mobile Computing
- Mobile Hotspot
- Mobile Network
- Mobile Operating System
- Mobile Processor
- Model
- Modem
- Modular Programming
- Module
- Molex Connector
- Monitor
- Monitor Resolution
- Monochrome
- Monte Carlo Simulation
- Moore’s Law
- Mosfet
- Motherboard
- Motion Capture
- Mouse
- Mouse Pad
- Multicast
- Multichannel
- Multi-Core Processor
- Multimedia
- Multiprocessing
- Multitasking
- Multithreading
- Nagle’s Algorithm
- Name Server
- Named Pipe
- Namespace
- Namespace Collision
- Namespace Identifier
- Namespace Pollution
- Nand (Not And)
- Nand Gate
- Nano (Text Editor)
- Nanoampere
- Nanotechnology
- NAS (Network Attached Storage)
- NASDAQ (National Association Of Securities Dealers Automated Quotations)
- Native Application
- Native Code
- Navigation
- NBT (Netbios Over TCP/IP)
- NDIS (Network Driver Interface Specification)
- Nested Function
- Nested Loop
- Nested Virtualization
- Net
- Netbook
- Netflow
- Netizen
- Netmask
- Network
- Network Adapter
- Network Layer
- Network Topology
- Neumann Architecture
- Neural Network
- Newbie
- Newton (Apple Device)
- Next (Next Computer)
- Nextstep
- NFS (Network File System)
- NFS (Network File System)
- Nibble (4 Bits)
- Nibbler
- NIC (Network Interface Card)
- NIMBY (Not In My Backyard)
- NIS (Network Information Service)
- NOC (Network Operations Center)
- Node
- Node Pool
- Node.Js
- Noise (In Data)
- Non-Blocking I/O
- Non-Dedicated Server
- Nonlinear Editing
- Non-Maskable Interrupt (NMI)
- Non-Relational Database
- Non-Volatile Memory
- Normalization
- Nosql
- Notebook Computer
- NT (New Technology)
- NTFS (New Technology File System)
- N-Tier Architecture
- NTP (Network Time Protocol)
- NUI (Natural User Interface)
- Null
- Null Character
- Null Device
- Null Hypothesis (In Computing Context)
- Null Modem
- Null Pointer
- Null Terminator
- Numerical Analysis
- Nvme (Non-Volatile Memory Express)
- NVRAM (Non-Volatile Random Access Memory)
- N-Way Set Associative
- Oauth
- Obfuscation
- Object
- Object Code
- Object Model
- Object Repository
- Object Storage
- Object-Oriented Database
- Obsolete (Hardware/Software)
- OCR (Optical Character Recognition)
- Octet
- Odata (Open Data Protocol)
- OEM (Original Equipment Manufacturer)
- Offline
- Offset
- OLE (Object Linking And Embedding)
- Onboard Graphics
- Onboard Sound
- Online
- Online Compiler
- Online Help
- Online Storage
- On-Premises Software
- Ontology (In AI)
- OOP (Object-Oriented Programming)
- Opcode
- Open API
- Open Database
- Open Firmware
- Open Source
- Open Source Software
- Open Standard
- Openbsd
- Opencl
- Opendocument
- Opengl
- Openid
- Openjdk
- Openmp
- Opennic (Open Network Information Center)
- Openpgp (Pretty Good Privacy)
- Openrefine (Data Cleanup)
- Openssh
- Openstack
- Opentype (Font)
- Openvg (Open Vector Graphics)
- Openvpn
- Openwms (Warehouse Management System)
- Openwrt
- Operand
- Operating System
- Operator
- Optical Drive
- Optical Fiber
- Optimization
- Option
- OR Gate
- Oracle (Database)
- Orchestration (In Cloud Computing)
- ORDBMS (Object-Relational Database Management System)
- Orphan Process
- OS (Operating System)
- OSD (On-Screen Display)
- OSDP (Open Supervised Device Protocol)
- Osgi (Open Service Gateway Initiative)
- OSI Model
- OSS (Operational Support System)
- Out-Of-Band Management
- Output
- Output Buffer
- Output Device
- Output Port
- Output Stream
- Overclocking
- Overhead (In Computing)
- Overlay
- Packet
- Packet Analyzer
- Packet Filtering
- Packet Switching
- Page
- Paging
- Paging File
- Parallel Processing
- Partition
- Password
- Paste
- Patch
- Patch Cable
- Path
- Path Variable
- Pathfinding
- Pattern Recognition
- Payload
- Peer Review
- Peer-To-Peer (P2P)
- Performance
- Peripheral
- Permissions
- Permissions Management
- Persistence
- Persistent Storage
- Personalization
- Phishing
- Ping
- Ping Of Death
- Pipeline
- Pipelining
- Piracy
- Pirate
- Pixel
- Pixel Density
- Pixelation
- Platform
- Platform-Independent
- Plug-And-Play
- Plug-In
- Plugin Architecture
- Podcast
- Pointer
- Pointer Arithmetic
- Polyfill
- Pop-Up
- Port
- Port Mirroring
- Portability
- Portal
- Post-Processing
- Power Cycling
- Power Supply
- Predictive Analysis
- Preprocessor
- Presentation
- Primary Key
- Print Queue
- Printer
- Privacy
- Privileged Mode
- Procedural Programming
- Process
- Process Control
- Process Scheduling
- Processor
- Profiler
- Program
- Program Counter
- Programmer
- Project Management
- Promiscuous Mode
- Propagation
- Protocol
- Protocol Stack
- Prototyping
- Proxy
- Pseudocode
- Pseudorandom
- Public Key
- Public Key Infrastructure (PKI)
- Publish
- Publish-Subscribe
- Pull Request
- Push Notification
- Push-To-Talk (PTT)
- Python
- Qbasic
- QEMU (Emulator)
- Qik (Video Sharing App)
- Qmail
- QML (Qt Modeling Language)
- QNX (Real-Time Operating System)
- QPSK (Quadrature Phase Shift Keying)
- Quad HD
- Quad-Buffered Stereo (Graphics)
- Quad-Core
- Quadro (Graphics Cards)
- Quadtree
- Quagga (Network Routing Software)
- Qualcomm
- Qualitative Analysis
- Quality Assurance (QA)
- Quality Control
- Quality Management System
- Quality Of Service (Qos)
- Quantitative Analysis
- Quantize
- Quantum Algorithm
- Quantum Computing
- Quantum Cryptography
- Quantum Dot Display
- Quantum Encryption
- Quantum Key Distribution
- Quantum Processor
- Quarantine (In Cybersecurity)
- Quarter Pixel Motion Estimation
- Quartz (Graphics Rendering Engine)
- Quasi-Random Number Generator
- Qubit
- Qubit (In Quantum Computing)
- Query
- Query Language
- Queue
- Queue Depth
- Queueing Theory
- Quick Access Popup
- Quick Access Toolbar
- Quick Charge
- Quick Draft (In Applications)
- Quick Format
- Quick Heal (Antivirus)
- Quick Launch (Toolbar)
- Quick Look (Macos)
- Quick Report
- Quick Response Code (Qr Code)
- Quick Start Guide
- Quick Time
- Quickbooks
- Quickbooks Online
- Quickbooks Pro
- Quickboot
- Quicklaunch
- Quickpath Interconnect (Qpi)
- Quickshare (File Sharing)
- Quicksilver (Software)
- Quicksort
- Quickswap (Memory Management)
- Quicksync (Intel Technology)
- Quicktime Player
- Quiesce (In Systems)
- Quiet Hours (In Operating Systems)
- Quirk Mode (In Web Browsers)
- Quorum (In Database Systems)
- Quota
- Qwertz (Keyboard Layout)
- Qxl (Graphics Driver)
- Rack Server
- Rack Space
- Raid (Redundant Array Of Independent Disks)
- Raid Controller
- Raid Level
- Ram (Random Access Memory)
- Ram Disk
- Ransomware
- Raspberry Pi
- Raster Graphics
- Rasterization
- Rate Limiting
- Raw Data
- Ray Tracing
- React Native
- Reactjs
- Readability
- Real-Time
- Real-Time Analytics
- Real-Time Rendering
- Real-Time Strategy (Rts)
- Reboot
- Reboot Loop
- Recovery Point Objective (Rpo)
- Recursion
- Redirect
- Redundancy
- Refactoring
- Refresh Rate
- Regex (Regular Expression)
- Registry
- Regression Analysis
- Regression Model
- Regression Testing
- Reimaging
- Relational Database
- Release Candidate
- Remote Access
- Remote Desktop
- Remote Execution
- Render Farm
- Rendering
- Rendering Engine
- Replicant
- Replication
- Replication Lag
- Repository
- Resilience
- Resolution
- Resource Allocation
- Resource Monitor
- Response Time
- Responsive Design
- Rest Api (Representational State Transfer Api)
- Restful Api (Representational State Transfer)
- Restore
- Reverse Engineering
- Rfid (Radio-Frequency Identification)
- Risk Assessment
- Robocopy
- Robot
- Rom (Read Only Memory)
- Root
- Rootkit
- Round-Robin Scheduling
- Router
- Router Configuration
- Router Table
- Routing
- Row-Level Security
- Rpa (Robotic Process Automation)
- Rpc (Remote Procedure Call)
- Rsa Encryption (Rivest-Shamir-Adleman)
- Rtos (Real-Time Operating System)
- Ruby On Rails
- Runtime
- Runtime Environment
- Runtime Error
- Runtime Library
- Sandbox
- Sandbox Environment
- Sandbox Mode
- Save
- Scalability
- Scan
- Scanner
- Screen
- Screen Capture
- Screen Reader
- Screen Resolution
- Screenshot
- Script
- Scripting
- Scroll
- Scroll Bar
- Scsi (Small Computer System Interface)
- Search Engine
- Secure Boot
- Secure Erase
- Secure Shell (Ssh)
- Secure Sockets Layer (Ssl)
- Security
- Semaphore
- Serial Port
- Serialization
- Server
- Serverless
- Server-Side
- Service Pack
- Service-Oriented Architecture (Soa)
- Session
- Shared Hosting
- Shareware
- Shell
- Shell Scripting
- Shift
- Shift Key
- Single Sign-On (Sso)
- Smart Card
- Snapshot
- Social Networking
- Socket
- Software
- Software Architecture
- Software As A Service (Saas)
- Software Bug
- Software Development Kit (Sdk)
- Software Development Life Cycle (Sdlc)
- Software Engineering
- Software License
- Software Patch
- Software Piracy
- Software Stack
- Software Suite
- Software Update
- Software-Defined Networking (Sdn)
- Solid State Drive (Ssd)
- Source Code
- Source Control
- Spam
- Spam Filter
- Spammer
- Speech Recognition
- Speech Synthesis
- Spoofing
- Spreadsheet
- Spyware
- Spyware Protection
- Sql (Structured Query Language)
- Sql Injection
- Stack
- Static
- Status Bar
- Storage
- Storage Area Network (San)
- Streaming
- Streaming Media
- Structured Data
- Structured Programming
- Subnet
- Subroutine
- Subscriber Identity Module (Sim)
- Supercomputer
- Surf
- Svg (Scalable Vector Graphics)
- Switch
- Symmetric Encryption
- Syntax
- Syntax Highlighting
- System Administrator
- System Call
- System Clock
- System Integration
- System Requirements
- System Restore
- System Tray
- Tab
- Table
- Tableau
- Tablet
- Tabular
- Tag
- Tcp/Ip (Transmission Control Protocol/Internet Protocol)
- Telecommunications
- Telemetry
- Teminal
- Template
- Terabyte
- Terminal
- Termination
- Text
- Text Editor
- Textual
- Texture
- Theory
- Thermodynamics
- Thread
- Threading
- Thread-Safe
- Thumbnail
- Tick
- Tiff (Tagged Image File Format)
- Tiling
- Timecode
- Time-Sharing
- Toggle
- Token
- Toolbar
- Topology
- Torrent
- Touchpad
- Touchscreen
- Trackball
- Tracker
- Traditional
- Traffic
- Trail
- Transaction
- Transfer
- Transformer
- Transition
- Translation
- Transparent
- Transport
- Trash
- Tray
- Tree
- Trigger
- Trojan Horse
- Trojan Horse
- Truncate
- Trust
- Ttl (Time To Live)
- Tty (Teletypewriter)
- Turing Test
- Tutorial
- Twain
- Tweak
- Twinax
- Two-Factor
- Twofactor Authentication
- Tx/Rx (Transmit/Receive)
- Txt (Text)
- Type
- Typecast
- Typeface
- Typical
- Typing
- Typography
- Typology
- Typosquatting
- Tyranny Of The Urgent
- Uart (Universal Asynchronous Receiver-Transmitter)
- Ubuntu
- Udp (User Datagram Protocol)
- Udp Flood
- Uefi (Unified Extensible Firmware Interface)
- Uefi Firmware
- Ui Design
- Ui Element
- Ui Kit
- Ultrabook
- Uml (Unified Modeling Language)
- Uml Diagram
- Uml Tool
- Umts (Universal Mobile Telecommunications System)
- Undo
- Unicode
- Unicode Character
- Unicode Consortium
- Unicode Transformation Format (Utf)
- Unified Communications
- Uninstall
- Universal Plug And Play (Upnp)
- UNIX
- UNIX Shell
- UNIX Timestamp
- Uplink
- Uplink Port
- Upload
- Upload Speed
- UPS (Uninterruptible Power Supply)
- UPSERT
- Uptime
- Uptime Percentage
- URI (Uniform Resource Identifier)
- URL
- URL (Uniform Resource Locator)
- URL Encoding
- URL Filtering
- URL Redirection
- URL Rewriting
- URL Scheme
- URL Shortening
- Usability
- Usability Testing
- USB (Universal Serial Bus)
- USB Driver
- USB Flash Drive
- USB Hub
- USB-C
- Usenet
- Usenet Newsgroup
- User
- User Acceptance Testing (UAT)
- User Account Control (UAC)
- User Agent
- User Authentication
- User Data Management
- User Experience (UX)
- User Feedback
- User Flow
- User Group
- User Input
- User Interface
- User Interface
- User Interface Design
- User Manual
- User Permission
- User Session
- User Story
- User Story Mapping
- User-Centered Design (UCD)
- Username
- Username
- Utility
- Utility Program
- Utility Software
- Validation
- Variable
- VBA (Visual Basic For Applications)
- VDU (Visual Display Unit)
- Vector
- Vendor
- Verification
- Version
- Version Control
- Version Upgrade
- Versioning
- Vertical Market
- Vertical Scaling
- VGA (Video Graphics Array)
- Video Card
- Video Codec
- Video Conferencing
- Video Editing Software
- Video Streaming
- Viewfinder
- Viewport
- Virtual
- Virtual Assistant
- Virtual Disk
- Virtual Environment
- Virtual Host
- Virtual Keyboard
- Virtual Machine
- Virtual Machine Monitor
- Virtual Memory
- Virtual Memory Management
- Virtual Private Network (VPN)
- Virtual Reality
- Virtualization
- Virtualization Software
- Virus
- Virus Alert
- Virus Database
- Virus Definition
- Virus Definition Update
- Virus Protection
- Virus Removal
- Virus Scan
- Virus Scanner
- Virus Signature
- Visual Basic
- Visual Studio
- VLAN (Virtual Local Area Network)
- VLAN Trunking
- Vlog (Video Blog)
- VNC (Virtual Network Computing)
- Voice Chat
- Voice Command
- Voice Mail
- Voice Modem
- Voice Over
- Voice Recognition
- Voice Recognition Software
- Voip (Voice Over Internet Protocol)
- Volatile Memory
- Voltage
- Voltage Regulator
- Volume
- Volume Control
- Volume Label
- VPN Client
- VPN Concentrator
- VPN Gateway
- VPN Server
- VPN Tunneling
- VPS (Virtual Private Server)
- VRAM (Video RAM)
- Vulnerability
- Vulnerability Assessment
- Wallpaper
- WAN (Wide Area Network)
- Warez
- Water Cooling
- Watermark
- Wearable Technology
- Web
- Web Analytics
- Web Browser
- Web Design
- Web Design Software
- Web Development
- Web Development Framework
- Web Development Tools
- Web Feed
- Web Form
- Web Host
- Web Host
- Web Hosting
- Web Scraping
- Web Server
- Web Service
- Web Standards
- Web Storage
- Web Tracking
- Web Traffic
- Web-Based Application
- Web-Based Software
- Web-Based Training
- Webcam
- Webcast
- Webdav (Web-Based Distributed Authoring And Versioning)
- Webinar
- Webmail
- Webmail Client
- Webmaster
- Webpage
- Webroot
- Webrtc (Web Real-Time Communication)
- Website
- Webzine
- WEP (Wired Equivalent Privacy)
- White Hat Hacker
- Widget
- Wifi (Wireless Fidelity)
- Wifi Hotspot
- Wifi Router
- Wimax (Worldwide Interoperability For Microwave Access)
- Windows
- Windows Registry
- Windows Update
- Windows Vista
- Windows XP
- Wireless
- Wireless Access Point
- Wireless LAN (Local Area Network)
- Wireless Router
- Word Processing
- Word Processor
- Workflow
- Workgroup
- Workstation
- World Wide Web
- Worm
- Wormhole
- WPA (Wi-Fi Protected Access)
- WPA2 (Wi-Fi Protected Access 2)
- Wrapper
- WWW
- WWW (World Wide Web)
- WYSIWYG (What You See Is What You Get)
- X86 (Intel Processor Family)
- XAML (Extensible Application Markup Language)
- Xbox (Gaming Console)
- Xbox Live
- Xbox Series X
- Xcode (Integrated Development Environment For Macos)
- Xen (Hypervisor)
- Xenapp
- Xendesktop
- Xenocode (Application Virtualization)
- Xenon
- Xenon Flash
- Xenon Lamp
- Xenserver
- Xeon (Intel Processor)
- Xerces (XML Parser)
- Xerographic Printer
- Xerography
- Xeromorphic
- Xforms (XML Forms)
- XFS (X Font Server)
- XHR (Xmlhttprequest)
- XHTML (Extensible Hypertext Markup Language)
- Xilinx (Semiconductor Company)
- XML
- XML (Extensible Markup Language)
- Xorg (X Window System Server)
- Xpath (XML Path Language)
- Xpointer (XML Pointer Language)
- X-Powered-By
- Xquery (XML Query Language)
- X-Ray Analysis
- X-Ray Crystallography
- X-Ray Detector
- X-Ray Diffraction
- X-Ray Diffractometer
- X-Ray Film
- X-Ray Fluorescence (XRF)
- X-Ray Generator
- X-Ray Imaging
- X-Ray Inspection
- X-Ray Inspection Equipment
- X-Ray Inspection Machine
- X-Ray Inspection System
- X-Ray Lithography
- X-Ray Machine
- X-Ray Microscope
- X-Ray Microscopy
- X-Ray Photoelectron Spectroscopy (XPS)
- X-Ray Photoelectron Spectroscopy (XPS)
- X-Ray Scanner
- X-Ray Spectroscopy
- X-Ray Tomography
- X-Ray Tube
- X-Ray Vision
- XSD (XML Schema Definition)
- XSL (Extensible Stylesheet Language)
- XSL-FO (Extensible Stylesheet Language Formatting Objects)
- XSLT (XSL Transformations)
- XSS (Cross-Site Scripting)
- Xterm (Terminal Emulator)
- Xubuntu (Linux Distribution)
- XUL (XML User Interface Language)
- Xvfb (X Virtual Framebuffer)
- XWD (X Window Dump)
- YACC (Yet Another Compiler Compiler)
- Y-Adapter
- Yagi Antenna
- YAML (YAML Ain’t Markup Language)
- Yank (Vim Command)
- Yanking
- Yarn (Package Manager)
- Yarn Bombing (Cybersecurity Term)
- Y-Axis
- Y-Combinator
- Y-Component
- Y-Connector
- Yelping
- Yield
- Yield Point
- Y-Intercept
- Y-Maximum
- Yoctoliter
- Yoctometer
- Yoctosecond
- Yoke
- Yottaampere
- Yottabyte
- Yottaflops
- Yottaohm
- Y-Parameter
- YUI (Yahoo! User Interface)
- Yum (Yellowdog Updater Modified)
- YUV (Y′UV)
- YUV Color Space
- Z/OS
- Z-Buffer
- Z-Buffering
- ZCS (Zero Code Security)
- Zero Client
- Zero Configuration
- Zero Touch Provisioning
- Zero-Day
- Zero-Day Attack
- Zero-Day Vulnerability
- Zero-Fill
- Zero-Fill Erase
- Zero-Knowledge Proof
- Zettabyte
- Zettajoule
- ZIF Socket
- Zigbee
- Zim (Zim Desktop Wiki)
- Zip File
- Zipping
- Zombie Computer
- Zombie Process
- Zone File
- Zone-Based Firewall
- Zooming User Interface
- Z-Order
- Z-Wave
- Z-Wave Alliance
Leave a Reply