Tech Glossary– A to Z Terms
GotItFix makes tech talk easy by turning confusing industry lingo into simple, everyday English. From A to Z, our guide gives you clear definitions for the must-know terms you need to master the digital world.This tech glossary helps beginners understand complex IT terms with real-life examples.
A
Agentic AI
- Identity: Autonomous Systems
- The Concept: Advanced AI systems designed to act independently and execute multi-step tasks without continuous human input.
- In Real Life: When an AI researches, summarizes, and creates a report on its own. It is an Agentic AI in action.
AI (Artificial Intelligence)
- Identity: Computer Science / Machine Learning
- The Concept: The simulation of human intelligence by machines, enabling them to learn, reason, and make decisions automatically.
- In Real Life: Netflix recommendations, Spotify playlists, and Gmail auto-suggestions are all powered by AI.
Amplifier
- Identity: Hardware / Electronics
- The Concept: A device that increases the strength of a signal without altering its original content.
- In Real Life: A Wi-Fi extender boosting signal strength in weak areas of your home.
Antivirus
- Identity: Cybersecurity Software
- The Concept: Software that detects, blocks, and removes malicious programs from a system.
- In Real Life: Getting a warning before opening a harmful app or files.
APIPA (Automatic Private IP Addressing)
- Identity: Networking Protocol
- The Concept: A system that assigns a fallback IP address when a device cannot connect to a DHCP server.
- In Real Life: When your PC shows “connected” but has no internet and ipconfig returns 169.254.x.x, that’s APIPA telling you the DHCP server never responded.
Azure
- Identity: Cloud Platform
- The Concept: Microsoft’s cloud computing service providing storage, computing power, and AI tools.
- In Real Life: Microsoft Teams and Office 365 run on Azure infrastructure.
B
Bandwidth
- Identity: Networking / Performance
- The Concept: The maximum data transfer capacity of a network over a given time.
- In Real Life: Video calls lag when too many users share the same connection.
Batch File
- Identity: Windows Scripting
- The Concept: A file containing commands that execute automatically in sequence.
- In Real Life:: Automating software installation across multiple computers.
BIOS
- Identity: Firmware
- The Concept: The system firmware that initializes hardware before the operating system loads.
- In Real Life: Accessed by pressing F2 or DEL during startup.
Bitcoin
- Identity: Cryptocurrency
- The Concept: A decentralized digital currency secured by blockchain technology.
- In Real Life: When ransomware hits a company and hackers demand payment that can’t be traced or reversed. They always ask for Bitcoin.
Bluetooth
- Identity: Wireless Technology
- The Concept: Short-range wireless communication used to connect devices.
- In Real Life: Wireless headphones connecting to your phone.
Broadband
- Identity: Internet Connectivity
- The Concept: High-speed internet access that is always on and faster than traditional dial-up delivered via cable, fiber, DSL, or satellite connections.
C
CPU (Central Processing Unit)
- Identity: Hardware
- The Concept: The main processor that executes instructions and runs programs.
- In Real Life: Slow performance when too many apps are open.
Cache
- Identity: Memory
- The Concept: Temporary storage that speeds up access to frequently used data.
- In Real Life: Websites loading faster on second visit.
CCNA (Cisco Certified Network Associate)
- Identity: IT Certification
- The Concept: Cisco’s entry-to-mid level networking certification validating knowledge of IP routing, switching, security fundamentals, and network troubleshooting.
Chkdsk
- Identity: Windows Utility
- The Concept: A tool that scans and repairs disk errors.
- In Real Life: Automatic scan after improper shutdown.
Chkntfs
- Identity: Windows Utility
- The Concept: A Windows command that checks or modifies whether Chkdsk runs automatically at startup, useful for controlling disk check behavior on scheduled boots.
CMOS
- Identity: Hardware
- The Concept: A chip that stores BIOS settings and system time.
- In Real Life: Incorrect date/time when the battery is dead.
D
DDR (Double Data Rate)
- Identity: Memory Technology
- The Concept: A type of RAM that transfers data twice per clock cycle, increasing performance without increasing clock speed.
- In Real Life: When you upgrade RAM and the shopkeeper asks if your motherboard supports DDR3 or DDR4, that’s the DDR generation determining what you can actually install.
DDoS (Distributed Denial of Service)
- Identity: Memory
- The Concept: An attack where multiple systems flood a server with traffic, making it unavailable.
- In Real Life: A website crashing due to massive fake traffic during peak time.
DevOps
- Identity: Software Development
- The Concept: A methodology that combines development and IT operations to automate and improve software delivery.
- In Real Life: Apps updating automatically without manual deployment.
Device Manager
- Identity: Windows Tool
- The Concept: A control panel utility that shows all hardware devices and their driver status.
- In Real Life: Fixing a missing driver issue with a yellow warning icon.
DHCP (Dynamic Host Configuration Protocol)
- Identity: Networking Protocol
- The Concept: Automatically assigns IP addresses to devices on a network.
- In Real Life: Connecting to Wi-Fi without manually entering IP settings.
DNS (Domain Name System)
- Identity: Internet Infrastructure
- The Concept: Converts domain names into IP addresses so browsers can locate websites.
- In Real Life: When a website is down for you but works fine on your phone’s data, your DNS server is likely the problem, not the website itself
E
Echo
- Identity: Command Line Tool
- The Concept: A simple command used in terminals and batch scripts to display text output or test whether a command is being processed.
- In Real Life: When a batch script prints “Installation complete” on screen after running, that message was triggered by an Echo command inside the script.
EIGRP (Enhanced Interior Gateway Routing Protocol)
- Identity: Networking Protocol
- The Concept: A Cisco-developed advanced routing protocol that determines the most efficient path for data across a network, faster to converge and more scalable than older protocols like IGRP.
- Identity: Communication Technology
- The Concept: A system for sending digital messages over the internet.
- In Real Life: Sending work documents via Gmail or Outlook.
Emulator
- Identity: Software / Virtualization
- The Concept: Software that replicates the hardware and software environment of one system on another, allowing programs designed for one platform to run on a completely different one.
- In Real Life: When developers test their Android app on a Mac without owning an Android device, they’re running it inside an emulator that mimics the real hardware.
Ethernet
- Identity: Wired Networking Technology
- The Concept: A wired network connection that provides stable and high-speed internet.
- In Real Life: Using a LAN cable for faster internet than Wi-Fi.
Elgato
- Identity: Hardware / Content Creation Brand
- The Concept: A brand that manufactures tools and accessories for content creators, including capture cards, streaming controllers, microphones, and lighting equipment.
- In Real Life: A gamer using an Elgato capture card to record gameplay
F
FAT (File Allocation Table)
- Identity: File System
- The Concept: A file system used for organizing and storing files on storage devices.
- In Real Life: Formatting USB drives for compatibility.
FIFO (First In First Out)
- Identity: Data Structure / Operating System Concept
- The Concept: A queuing method where the first data entered is the first to be processed
- In Real Life: Every time your print job waits behind someone else’s in the office queue, FIFO determines who goes first based on who clicked print earlier.
Firewall
- Identity: Cybersecurity
- The Concept: A system that monitors and controls incoming and outgoing network traffic.
- In Real Life: Blocking unsafe websites on a company network.
Floppy Disk
- Identity: Legacy Storage Media
- The Concept: Floppies were the removable storage media of choice for quite a while until the USB stick took over.
FNODE (File Node)
- Identity: File System Structure
- The Concept: The FNode contains the file’s file system attributes, pointers to the data blocks (or to a B-tree structure if the file is large/fragmented)
FSB (Front Side Bus)
- Identity: Hardware / CPU Architecture
- The Concept: In older systems, the FSB speed limited how quickly data could be transferred between the processor and memory.
G
GHz (Gigahertz)
- Identity: Processing Speed Unit
- The Concept: A unit of measurement representing one billion cycles per second, used to describe how quickly a CPU or other processor executes instructions.
- In Real Life: When comparing two laptops, one with a 2.4GHz processor and another with a 3.8GHz processor, the frequency indicates how many instructions it can process each second.
Gigabyte (GB)
- Identity: Data Storage Unit
- The Concept: A unit of digital storage equal to about one billion bytes.
- In Real Life: When your phone displays “storage almost full” after downloading a few apps and videos, each of those can consume gigabytes without you realizing it.
GIS (Geographic Information System)
- Identity: Data / Mapping Technology
- The Concept: A system for capturing, storing, analyzing, and visualizing geographic data, transforming raw location information into interactive maps and spatial insights.
- In Real Life: When Google Maps displays real-time traffic, flood zones, or delivery routes on a map, that is GIS technology working behind the scenes.
GNOME
- Identity: Linux Desktop Environment
- The Concept: A free and open-source graphical desktop environment for Linux that provides the visual interface, windows, and application launcher for users, instead of just a raw command line.
Group Policy
- Identity: Windows Administration Tool
- The Concept: A Windows feature that allows IT administrators to manage and enforce settings centrally across all machines in a network, controlling everything from password policies to software restrictions without needing to access each PC individually.
- In Real Life: When you attempt to install software on your work laptop and receive the message “your organization has blocked this,” Group Policy is the reason you cannot override it.
GUI (Graphical User Interface)
- Identity: Interface Design
- The Concept: A visual interface that allows users to interact using icons and menus.
- In Real Life: Clicking icons instead of typing commands.
H
HTML (HyperText Markup Language)
- Identity: Web Development
- The Concept: The standard language used to create web pages.
- In Real Life: Structuring content on websites.
Hard Drive
- Identity: Storage Hardware
- The Concept: A device used to store data permanently.
- In Real Life: Saving files, apps, and OS.
HDMI (High-Definition Multimedia Interface)
- Identity: Audio / Video Interface
- The Concept: A single cable standard that transmits both high-definition video and audio signals simultaneously between devices, eliminating the need for multiple cables.
- In Real Life: When you connect your laptop to a projector or TV for a presentation using a single cable, HDMI manages both the video and audio through one connection.
Hibernate
- Identity: Windows Power Management
- The Concept: A power-saving state saves the RAM contents to the hard drive and shuts down, allowing the PC to resume where it left off without using any power.
- In Real Life: When you close your laptop lid and walk into a meeting an hour later, opening it reveals everything exactly as you left it — that’s the hibernate function working silently.
HKEY (Registry Hive Key)
- Identity: Windows Registry
- The Concept: A Windows feature that allows IT administrators to manage and enforce settings centrally across all machines in a network, controlling everything from password policies to software restrictions without needing to access each PC individually.
- In Real Life: When a technician opens Regedit and navigates to HKEY_LOCAL_MACHINE to resolve a broken software installation, they’re modifying the core configuration that Windows reads at every boot.
HWMonitor
- Identity: System Monitoring Software
- The Concept: A hardware monitoring tool that provides real-time data from system sensors, displaying CPU temperatures, fan speeds, voltages, and power consumption in a single location.
- In Real Life: When your PC shuts down unexpectedly and you suspect overheating, HWMonitor reveals which component is reaching dangerous temperatures before damage occurs.
I
IDE (Integrated Drive Electronics)
- Identity: Storage Interface / Hardware
- The Concept: An older hard drive interface standard connects storage devices to the motherboard using wide ribbon cables. This standard has largely been replaced by SATA in modern systems but can still be found in legacy hardware.
- In Real Life: When you open an old desktop from the early 2000s, you’ll find wide, flat IDE cables connecting the hard drive, which were eventually replaced by SATA.
IGRP (Interior Gateway Routing Protocol)
- Identity: Networking Protocol
- The Concept: A Cisco-developed distance vector routing protocol designed to manage data routing within large networks. It is the predecessor to EIGRP and is now considered obsolete in modern network environments.
INF File
- Identity: Windows Driver / Configuration File
- The Concept: A configuration file in plain text format used by Windows to install drivers and software, containing instructions that guide the operating system on how to set up a device or application.
Internal IP Address
- Identity: Networking / IP Addressing
- The Concept: A private IP address is designated to a device within a local network. It is not visible on the public internet and is used solely for communication among devices on the same network.
- In Real Life: When you enter 192.168.1.1 into your browser to access your router settings, it points to an internal IP address that is only reachable from within your own network.
IO Device (Input/Output Device)
- Identity: Hardware / Computer Peripherals
- The Concept: Any hardware component that sends or receives data from a computer, including keyboards, mice, printers, monitors, and storage drives.
- In Real Life: When Device Manager marks an unknown I/O device with a yellow exclamation mark, it means that Windows has detected hardware it cannot properly communicate with.
Ipconfig Command
- Identity: Windows Network Command
- The Concept: A built-in Windows command displays the current network configuration of a machine, including the IP address, subnet mask, default gateway, and DNS server details.
- In Real Life: When your internet stops working and IT asks you to open Command Prompt and type “ipconfig,” they are checking your network assignment to diagnose exactly where the connection broke.
J
Jailbreaking
- Identity: Mobile / Device Security
- The Concept: The act of removing manufacturer-imposed software restrictions on a device, granting users root access to install unauthorized apps, themes, or modifications.
- In Real Life: Installing apps on an iPhone that aren’t in the App Store by bypassing Apple’s restrictions means the device is jailbroken, voiding its warranty.
Java
- Identity: Programming Language
- The Concept: A widely used object-oriented programming language designed to run on any platform without modification, based on the principle of “write once, run anywhere” through the Java Virtual Machine (JVM).
- In Real Life: Enterprise software, Android apps, and banking systems run seamlessly across different operating systems because of Java’s cross-platform capability.
JPEG (Joint Photographic Experts Group)
- Identity: Image File Format
- The Concept: A widely used compressed image format that reduces file size by discarding some visual data while maintaining acceptable quality.
- In Real Life: Photos taken on smartphones are usually saved as JPEG to balance quality and storage.
jQuery
- Identity: JavaScript Library
- The Concept: A fast and lightweight JavaScript library that simplifies HTML manipulation, event handling, and animations, allowing developers to write less code.
- In Real Life: Smooth dropdown menus, instant form validation, and dynamic page updates without refreshing.
JScript
- Identity: Scripting Language
- The Concept: Microsoft’s implementation of JavaScript used in Internet Explorer and Windows Script Host for automation and early web functionality.
- In Real Life: Older Windows scripts and legacy web applications using JScript for automation tasks.
JSON (JavaScript Object Notation)
- Identity: Data Format / Web Development
- The Concept: A lightweight, human-readable format used for structuring and exchanging data between servers and applications.
- In Real Life: Weather apps receiving live data from servers in JSON format.
K
Kali Linux
- Identity: Security / Operating System
- The Concept: A Debian-based Linux distribution designed for penetration testing and ethical hacking, equipped with advanced security tools.
- In Real Life: Cybersecurity professionals use Kali Linux to test system vulnerabilities.
Kbps (Kilobits per second)
- Identity: Network Speed Unit
- The Concept: A unit measuring data transfer speed equal to one thousand bits per second.
- In Real Life: Slow internet connections showing speeds like 512 Kbps.
Kernel
- Identity: Operating System Core
- The Concept: The core component of an operating system that manages hardware, memory, and processes.
- In Real Life: System updates that require a restart usually involve kernel-level changes.
Keyboard
- Identity: Input Hardware
- The Concept: A device used to input data into a computer through key presses.
Kerberos
- Identity: Network Authentication Protocol
- The Concept: A secure authentication protocol that uses encrypted tickets to verify identities over a network.
- In Real Life: Logging in once and accessing multiple company services without repeated authentication.
Keygen
- Identity: Software / Cybersecurity
- The Concept: A program that generates software license keys, often associated with piracy and malware risks.
- In Real Life: Downloading a “free keygen” that gets flagged by antivirus software.
L
L2TP (Layer 2 Tunneling Protocol)
- Identity: Networking / VPN Protocol
- The Concept: A tunneling protocol used in VPNs to securely transmit data over public networks, often combined with IPsec.
- In Real Life: Securely connecting to a company network using a VPN.
LAN (Local Area Network)
- Identity: Network Infrastructure
- The Concept: A network connecting devices within a limited area such as a home, office, or school.
- In Real Life: Office computers sharing files and printers.
LDAP (Lightweight Directory Access Protocol)
- Identity: Networking / Directory Services
- The Concept: A protocol used to access and manage directory information for authentication and user data.
- In Real Life: Logging into multiple systems using a single corporate account.
Linux
- Identity: Operating System
- The Concept: An open-source operating system kernel known for stability, security, and flexibility.
- In Real Life: Android devices and web servers running on Linux.
LogMeIn
- Identity: Remote Access Software
- The Concept: A platform that allows users to remotely access and control computers over the internet.
- In Real Life: IT support fixing issues remotely without physical access.
LPT (Line Print Terminal)
- Identity: Legacy Hardware Interface
- The Concept: An older parallel port interface used for connecting printers and peripherals.
- In Real Life: Legacy printers requiring LPT connections.
M
M.2
- Identity: Storage Interface
- The Concept: A compact interface for SSDs that provides faster data transfer compared to traditional SATA drives.
- In Real Life: Faster boot times when upgrading to an M.2 SSD.
MAC Address
- Identity: Networking
- The Concept: A unique identifier assigned to a network device for communication within a local network.
- In Real Life: Restricting Wi-Fi access to specific devices.
Malicious
- Identity: Cybersecurity Term
- The Concept: Refers to software or actions intended to harm, disrupt, or gain unauthorized access to systems.
- In Real Life: Antivirus detecting harmful files.
MBR (Master Boot Record)
- Identity: System Boot
- The Concept: A section of a storage device that contains boot information required to start the operating system.
- In Real Life: Boot errors caused by corrupted MBR.
Mbps (Megabits per second)
- Identity: Network Speed
- The Concept: A unit measuring data transfer speed equal to one million bits per second.
- In Real Life: Internet plans advertised as 100 Mbps.
Motherboard
- Identity: Hardware
- The Concept: The main circuit board that connects and allows communication between all components.
- In Real Life: CPU, RAM, and storage connect to the motherboard.
N
Namecheap
- Identity: Domain Registrar / Hosting Platform
- The Concept: A well-known domain registrar and web hosting provider, offering domain registration, SSL certificates, and hosting services. They are recognized for their competitive pricing and user-friendly domain management tools.
- In Real Life: When a developer registers a new domain for a side project, Namecheap is often one of the first places to look for affordable domain and DNS management.
Nbtstat
- Identity: Windows Network Command
- The Concept: A Windows command-line tool that displays NetBIOS over TCP/IP statistics and connections, useful for diagnosing name resolution issues and active sessions on a network.
Netstat
- Identity: Network Command
- The Concept: A tool that displays active connections and network activity.
- In Real Life: Detecting suspicious connections on a system.
NIC (Network Interface Card)
- Identity: Networking Hardware
- The Concept: A component that enables a device to connect to a network.
- In Real Life: Ethernet or Wi-Fi adapters.
Nslookup
- Identity: Network Diagnostic Tool
- The Concept: A command used to query DNS records.
- In Real Life: Checking if a domain resolves correctly.
NTLDR
- Identity: Boot Loader
- The Concept: A boot loader used in older Windows systems.
- In Real Life: “NTLDR is missing” error during startup.
O
Office 365
- Identity: Cloud Productivity Suite
- The Concept: Microsoft’s subscription-based cloud platform offers Word, Excel, PowerPoint, Teams, Outlook, and cloud storage, all accessible from any device without the need for local installation.
- In Real Life: Office 365’s cloud collaboration allows entire companies to work on the same document simultaneously from different cities without the hassle of emailing attachments back and forth.
OEM (Original Equipment Manufacturer)
- Identity: Industry / Manufacturing Term
- The Concept: A company that manufactures hardware or software for rebranding and resale by another company, acting as the hidden creator behind many branded products.
- In Real Life: When you purchase a Dell laptop, you may notice it runs a limited version of Windows labeled “OEM.” Microsoft specifically licensed this operating system for Dell to pre-install, rather than for retail sale.
Operating System
- Identity: System Software
- The Concept: Software that manages hardware and runs applications.
- In Real Life: Microsoft Windows, Apple macOS, Linux, Android, and iOS.
Optical Disc
- Identity: Legacy Storage Media
- The Concept: A flat, circular storage medium uses laser technology to read and write data, including CDs, DVDs, and Blu-ray discs, which were once the dominant formats for software distribution and media playback.
OLED (Organic Light Emitting Diode)
- Identity: Display Technology
- The Concept: A display technology in which each pixel independently generates its own light, allowing for perfect blacks, infinite contrast ratios, and faster response times compared to traditional LCD screens.
- In Real Life: Unlike LCD or QLED TVs, OLEDs do not use a backlight to shine through pixels
OSI Model
- Identity: Networking Framework
- The Concept: A 7-layer model that explains how data travels through a network.
- In Real Life: Troubleshooting network issues step-by-step
P
Parental Controls
- Identity: Security / Access Management
- The Concept: Features in software or hardware that enable parents or administrators to limit content, screen time, and app access on a device, thereby protecting younger users from inappropriate material or excessive usage.
- In Real Life: When a child’s tablet blocks a website automatically without manual intervention, parental controls at the router or device level made that filtering decision quietly.
Phishing
- Identity: Cybersecurity Threat
- The Concept: A scam that tricks users into revealing sensitive information.
- In Real Life: Fake bank emails asking for login details.
Paywall
- Identity: Web / Business Model
- The Concept: A digital access restriction that requires a payment or subscription before users can view premium content. This model is utilized by news outlets, streaming platforms, and software providers to monetize their services.
- In Real Life: When you click on a news article and can only read the first two paragraphs before being asked to subscribe, that’s a paywall cutting off access exactly when you’re most interested.
Ping
- Identity: Network Tool
- The Concept: A command used to test connectivity between devices.
- In Real Life: Checking if a server is reachable.
PNG
- Identity: Image Format
- The Concept: A lossless image format that supports transparency.
- In Real Life: Logos with transparent backgrounds.
POP (Post Office Protocol)
- Identity: Email Protocol
- The Concept: It is one of the earliest and simplest email retrieval protocols, designed to allow offline access to messages once they have been downloaded.
- In Real Life: When someone checks their email on one computer and the messages disappear from all other devices, it means that their email client is using POP instead of IMAP, which pulls everything locally and clears the server.
Q
QBasic
- Identity: Programming Language
- The Concept: A beginner-friendly, interpreted programming language developed by Microsoft for DOS systems, used to teach basic coding concepts.
- In Real Life: Many people in the 1990s learned programming by writing simple games and calculations in QBasic on a DOS screen.
R
RAM
- Identity: Memory Hardware
- The Concept: Temporary memory used for running applications.
- In Real Life: When your computer slows down with too many apps open, RAM is being fully used.
RAID
- Identity: Storage Technology
- The Concept: Data storage method using multiple drives for performance or backup.
- In Real Life: When a server continues working even after one hard drive fails, RAID is protecting the data.
Recycle Bin
- Identity: Windows OS Feature
- The Concept: A temporary holding area in Windows for deleted files, allowing users to recover mistakenly deleted items before they are permanently removed.
Registry
- Identity: Windows System Database
- The Concept: It is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems.
- In Real Life: Malware can persist after a reboot if it adds a startup entry in the registry. Simply removing it from Task Manager isn’t sufficient, as the registry entry will keep restoring it.
Remote Desktop
- Identity: Remote Access Technology
- The Concept: It enables connectivity over a network, providing a virtual desktop experience as if the user were sitting in front of the remote machine.
Reverse DNS Lookup
- Identity: Networking / DNS
- The Concept: The process of resolving an IP address back to its associated domain name is the reverse of a standard DNS query, which is used to verify the identity behind a numeric address.
- In Real Life: When email servers verify if an incoming message’s IP address matches the claimed domain, a reverse DNS lookup is the verification step that identifies many spam sources.
S
SaaS
- Identity: Cloud Computing Model
- The Concept: Software delivered via the internet (e.g., Google Docs).
- In Real Life: Using apps directly in a browser without installing anything.
Save As
- Identity: OS Feature
- The Concept: A file operation that creates a new copy of an existing document under a different name, format, or location while preserving the original and saving a modified version separately.
SCSI (Small Computer System Interface)
- Identity: Legacy Storage Interface
- The Concept: It is a high-performance, scalable standard for connecting servers to storage devices.
Server
- Identity: Networking / Infrastructure
- The Concept: A system that provides data or services to other devices.
- In Real Life: Websites load because servers send data to your browser.
SMTP (Simple Mail Transfer Protocol)
- Identity: Identity: Email Protocol
- The Concept: A standard protocol used to send emails between servers and from email clients to mail servers.
System32
- Identity: Windows System Directory
- The Concept: A critical folder in Microsoft Windows that contains essential system files, libraries (DLLs), and executables required for the operating system to function properly.
- In Real Life:If System32 files are deleted or corrupted, Windows may fail to boot or important system features may stop working.
T
TFT (Thin Film Transistor)
- Identity: Display Technology
- The Concept: A type of LCD display technology that uses thin-film transistors to control each individual pixel, improving image quality, response time, and color accuracy compared to older passive matrix screens.
TCP/IP (Transmission Control Protocol / Internet Protocol)
- Identity: Networking Protocol Suite
- The Concept: It is the fundamental protocol suite that enables data transfer and communication across the internet and other networks.
TP-Link
- Identity: Networking Hardware Brand
- The Concept: A leading manufacturer of consumer and small business networking equipment, producing routers, switches, range extenders, and access points known for reliable performance at affordable prices
Traceroute
- Identity: Network Diagnostic Command
- The Concept: A command that traces the path data takes from your machine to its destination, showing every hop between routers and measuring the time taken for each leg of the journey.
- In Real Life: When a website is slow and the ping shows the connection is alive, a traceroute reveals which router hop along the path is causing the delay.
Trojan Horse
- Identity: Cybersecurity Threat / Malware
- The Concept: Malicious software that pretends to be legitimate or useful programs tricks users into installing it willingly. Once installed, it executes harmful actions in the background without obvious signs.
- In Real Life: When someone downloads a free video converter that works well but silently installs a keylogger in the background, that’s a Trojan operating exactly as intended.
TXT Record
- Identity: DNS / Domain Configuration
- The Concept: A type of DNS record that stores text-based information associated with a domain, commonly used for verification, security, and policy settings.
- In Real Life: When you verify your domain for services like Google or set up email security (SPF, DKIM), you add a TXT record in your domain’s DNS settings.
U
USB
- Identity: Hardware Interface
- The Concept: Standard interface for connecting devices.
- In Real Life: Plugging in a pen drive or charging cable.
UAC (User Account Control)
- Identity: Windows Security Feature
- The Concept: A Windows security feature that requests confirmation or administrator credentials before allowing changes to system settings, preventing unauthorized software from silently modifying the operating system.
- In Real Life: When you attempt to install software on Windows, a dialog box appears asking, “Do you want to allow this app to make changes to your device?” This is UAC functioning as intended.
Ubuntu
- Identity: Linux Distribution
- The Concept: One of the most popular and beginner-friendly Linux distributions, it offers a polished desktop environment, strong community support, and wide software compatibility, all built on a Debian foundation.
UDP (User Datagram Protocol)
- Identity: Networking Protocol
- The Concept: A lightweight communication protocol sends data packets without establishing a connection or confirming delivery. This approach trades reliability for speed, making it ideal for scenarios where real-time performance is prioritized over perfection.
- In Real Life: In online games or video calls, occasional lag or packet loss is acceptable, but delay is not. UDP is the protocol that prioritizes speed over guaranteed delivery.
UEFI (Unified Extensible Firmware Interface)
- Identity: Firmware / System Boot
- The Concept: The modern substitute for BIOS is a sophisticated firmware interface that initializes hardware during boot, supports larger drives, enables faster startup, and provides a graphical pre-OS environment with mouse support.
- In Real Life: When you access your PC’s setup screen and it features a graphical interface with mouse support instead of the old blue text menu, you are using UEFI, not legacy BIOS.
UFS (Unix File System)
- Identity: File System
- The Concept: The file system utilized by Unix and various BSD-based operating systems features a hierarchical structure for organizing and storing data, with built-in support for permissions and multi-user environments.
V
VGA (Video Graphics Array)
- Identity: Legacy Display Interface
- The Concept: An analog video connector standard introduced by IBM in 1987, which was once the universal display output on desktops and laptops before HDMI and DisplayPort rendered it obsolete.
- In Real Life: When an old projector in a conference room only has a VGA port and the new laptop does not, IT scrambles to find an HDMI-to-VGA adapter just to run the presentation.
Virtualization
- Identity: Computing / Infrastructure Technology
- The Concept: The creation of virtual versions of physical hardware enables multiple operating systems or environments to run simultaneously on a single physical machine through software abstraction.
- In Real Life: When a powerful server in a data center runs multiple isolated virtual machines at the same time, virtualization eliminates the need for separate physical servers for each application.
VLAN (Virtual Local Area Network)
- Identity: Network Infrastructure
- The Concept: A logical subdivision of a physical network that combines devices, regardless of their physical location, and isolates traffic between departments or functions without the need for separate physical infrastructure.
- In Real Life: When finance and HR departments share the same physical network switches, they cannot access each other’s systems because VLANs enforce that separation entirely in software.
VMware
- Identity: Networking Protocol
- The Concept: A leading enterprise virtualization platform enables multiple virtual machines to operate on a single physical server, forming the backbone of modern data center infrastructure and cloud computing environments.
- In Real Life: IT teams use VMware to run multiple servers on one physical machine or to test new software in an isolated virtual environment without affecting the main system.
VoIP (Voice over Internet Protocol)
- Identity: Communication Technology
- The Concept: A technology that transmits voice calls over internet connections rather than traditional phone lines, by converting audio into digital packets and routing them through IP networks.
- In Real Life: When your office phone system runs through the internet and works from anywhere with a laptop and headset, that’s VoIP replacing an entire traditional phone infrastructure.
VPN (Virtual Private Network)
- Identity: Network Security / Privacy
- The Concept: A technology encrypting internet traffic and routing it through a secure server masking the user’s real IP address and protecting data from interception on public or untrusted networks.
- In Real Life: When you connect to company systems from a coffee shop without worrying about someone intercepting your data interception; the VPN is encrypting everything between your device and the office network.
W
WAN
- Identity: Network Infrastructure
- The Concept: Network covering large geographic areas.
- In Real Life: The internet itself is the largest WAN.
Web3
- Identity: Internet Evolution
- The Concept: A proposed next phase of the internet built on blockchain technology, emphasizing decentralization so that no single company controls platforms or data.
- In Real Life: Crypto apps, NFT platforms, and decentralized applications (dApps) are early examples attempting to build this model of the internet.
White Hat
- Identity: Cybersecurity Role
- The Concept: An ethical hacker who is authorized to test systems legally, identifying vulnerabilities before malicious attackers can exploit them.
- In Real Life: When a company hires a security team to simulate attacks on its own systems and report weaknesses, those professionals are acting as white hat hackers.
Wi-Fi
- Identity: Wireless Connectivity
- The Concept: A wireless technology that connects devices to a local network using radio signals
- In Real Life: When your laptop, phone, smart TV, and thermostat all connect to the internet without a single cable, Wi-Fi manages all of those simultaneous connections through one router.
Winsock (Windows Socket API)
- Identity: Windows System Component
- The Concept: A core networking component in Microsoft Windows that enables applications to communicate over a network, acting as the interface between software and network protocols.
- In Real Life:When your internet stops working on Windows and all fixes fail until IT runs netsh winsock reset, a corrupted Winsock configuration was likely the underlying issue.
WLAN (Wireless Local Area Network)
- Identity: Network Infrastructure
- The Concept: These networks utilize a wireless router to connect devices to each other and to the internet.
- In Real Life: When IT deploys multiple access points across office floors to provide seamless wireless coverage, they are building and managing a WLAN.
X
x86-64
- Identity: CPU Architecture
- The Concept: The 64-bit extension of the original x86 processor architecture, enabling CPUs to address significantly more memory and process larger data sets compared to 32-bit systems.
- In Real Life: When downloading software and choosing between 32-bit and 64-bit versions, x86-64 is the architecture behind modern 64-bit systems on Windows and Linux.
Xcopy Command
- Identity: Windows Command / File Management
- The Concept: An advanced command-line tool in Microsoft Windows used to copy files and directory structures, supporting recursive copying, filtering, and attribute preservation.
- In Real Life: When IT needs to migrate large folders with thousands of files between systems without using a graphical interface, Xcopy performs the task efficiently in a single command.
Y
Y2K (Year 2000 Problem)
- Identity: Historical Computing Event
- The Concept: A widespread software issue where systems stored years using only two digits, raising concerns that the year 2000 would be interpreted as 1900, potentially causing failures in critical systems.
- In Real Life: Governments and companies spent billions fixing legacy systems before January 1, 2000, and the smooth transition showed how effective those preparations were.
Z
ZIP
- Identity: File Compression Format
- The Concept: A widely supported archive format that compresses one or more files into a single smaller package, reducing storage size and making file transfer easier without requiring additional software on modern systems.
- In Real Life: When someone sends multiple documents as a single email attachment, they are often compressed into a ZIP file, which the recipient can extract easily on Windows or macOS.
