,

Important Computer Terms and Abbreviations

Admin Avatar

by

12 minutes

Read Time

Serial NumberTermDefinition
1AlgorithmA step-by-step procedure or formula for solving a problem.
2APIApplication Programming Interface; a set of rules that allows different software entities to communicate.
3BandwidthThe maximum rate of data transfer across a network path.
4BitThe smallest unit of data in a computer, representing a binary value (0 or 1).
5ByteA unit of digital information that consists of 8 bits.
6CacheA hardware or software component that stores data so future requests for that data can be served faster.
7Cloud ComputingThe delivery of computing services over the internet, including storage, processing, and networking.
8CompilerA program that translates code written in a high-level programming language into machine language.
9DatabaseAn organized collection of data that can be easily accessed, managed, and updated.
10DebuggingThe process of identifying and removing errors or bugs from software code.
11EncryptionThe process of converting data into a coded format to prevent unauthorized access.
12FirewallA security system that monitors and controls incoming and outgoing network traffic.
13FrontendThe part of a software application or website that interacts with users.
14BackendThe server-side of a software application that handles business logic and database interactions.
15GPUGraphics Processing Unit; a hardware component that accelerates the rendering of images and videos.
16HTMLHypertext Markup Language; the standard language for creating web pages.
17HTTPHypertext Transfer Protocol; the foundation of data communication on the web.
18IP AddressA unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate.
19JavaScriptA programming language commonly used to create interactive effects within web browsers.
20KernelThe core component of an operating system, managing system resources and communication between hardware and software.
21MalwareSoftware designed to harm or exploit any programmable device or network.
22Open SourceSoftware with source code that anyone can inspect, modify, and enhance.
23PatchA software update designed to fix bugs or vulnerabilities in a program.
24PhishingA method of trying to gather personal information using deceptive emails or websites.
25PluginA piece of software that adds specific features to an existing computer program.
26ROMRead-Only Memory; a type of non-volatile storage that is used to store firmware.
27SaaSSoftware as a Service; software that is hosted in the cloud and accessed via the internet.
28ServerA computer or system that provides data, resources, or services to other computers over a network.
29SQLStructured Query Language; a standard language for managing and manipulating databases.
30SSLSecure Sockets Layer; a protocol for establishing a secure connection over a computer network.
31URLUniform Resource Locator; the address used to access resources on the internet.
32Virtual MachineA software-based simulation of a physical computer, allowing multiple operating systems to run on a single hardware platform.
33Web BrowserA software application for accessing information on the World Wide Web.
34Word ProcessingThe act of creating, editing, and formatting text documents using software.
35XMLeXtensible Markup Language; a markup language that defines rules for encoding documents in a format that is both human-readable and machine-readable.
36DNSDomain Name System; the system that translates human-friendly domain names into IP addresses.
37FTPFile Transfer Protocol; a standard network protocol used to transfer files from one host to another.
38HackerA person who uses technical knowledge to break into computers or networks, often to exploit them.
39IoTInternet of Things; the network of physical devices connected to the internet, collecting and sharing data.
40JSONJavaScript Object Notation; a lightweight data interchange format that is easy for humans to read and write, and easy for machines to parse and generate.
41MalwareSoftware specifically designed to disrupt, damage, or gain unauthorized access to computer systems.
42NetworkA group of interconnected computers that can communicate with each other and share resources.
43Open SourceSoftware with source code that anyone can inspect, modify, and enhance.
44ProtocolA set of rules governing the exchange of data between devices in a network.
45CacheA hardware or software component that stores data so that future requests for that data can be served faster.
46RootThe highest level of access within a computer system, granting unrestricted access to all files and commands.
47ScriptA set of instructions written in a scripting language that is executed by an interpreter.
48SDKSoftware Development Kit; a collection of software tools and libraries for developing applications.
49GUIGraphical User Interface; a visual way for users to interact with a computer using images and icons.
50SSLSecure Sockets Layer; a standard protocol for securing internet communications.
51Turing MachineAn abstract computational model that defines an algorithm’s computational power.
52VLANVirtual Local Area Network; a subnetwork that can group together devices on separate physical LANs.
53CacheA hardware or software component that stores data so that future requests for that data can be served faster.
54CredentialInformation that verifies user identity, usually a combination of usernames and passwords.
55DDoSDistributed Denial of Service; a malicious attempt to disrupt the normal functioning of a targeted server or network.
56EndpointA device or node that is connected to a network and communicates with it.
57FrameworkA platform or structure used to develop and support applications and programs.
58GUIGraphical User Interface; a system that allows users to interact with electronic devices through graphical icons.
59Hash FunctionA function that converts input data into a fixed-size string of characters, which is typically a hash code.
60IDEIntegrated Development Environment; a software application providing comprehensive facilities to computer programmers for software development.
61JSONJavaScript Object Notation; a lightweight data interchange format.
62KeyloggerA type of surveillance software that records keystrokes made by a user on a computer.
63Load BalancerA device that distributes network or application traffic across multiple servers to ensure high availability and reliability.
64MalwareMalicious software intended to harm or exploit any programmable device or network.
65NodeAn active electronic device that is part of a larger network, often acting as a connection point.
66Open SourceSoftware for which the original source code is made freely available and may be redistributed and modified.
67Proxy ServerAn intermediary server that separates end users from the websites they browse, providing anonymity and security.
68QR CodeQuick Response Code; a two-dimensional barcode that can be scanned using a smartphone to quickly access information.
69RebootThe process of restarting a computer or device, clearing memory and reinitializing the operating system.
70Search EngineA software system designed to carry out web searches, indexing data to provide relevant results.
71TokenA digital representation of an asset or utility, often used in authentication processes.
72User InterfaceThe means by which a user interacts with a computer or software application.
73VerificationThe process of confirming the accuracy and validity of information or data.
74Web ServerA server responsible for storing, processing, and delivering web pages to clients.
75ZIPA common file format used for data compression and archiving.
76CLICommand Line Interface; a means of interacting with a computer program by typing text commands.
77DHCPDynamic Host Configuration Protocol; a protocol used to assign IP addresses to devices on a network.
78FDDIFiber Distributed Data Interface; a standard for data transmission in a local area network.
79GraphQLA query language for APIs, allowing clients to request only the data they need.
80HypervisorSoftware that creates and runs virtual machines, providing resources to each VM.
81Inline StyleA method of applying CSS styles directly within an HTML element.
82KubernetesAn open-source platform for automating deployment, scaling, and management of containerized applications.
83Load TestingA type of testing focused on understanding the behavior of a system under a specific expected load.
84ModemA device that modulates and demodulates signals for data transmission over telephone lines.
85NGINXAn open-source web server known for its high performance and scalability.
86OpenIDAn open standard for decentralized authentication.
87QueryA request for information from a database.
88RuntimeThe period during which a computer program is executing.
89ScalabilityThe capability of a system to handle a growing amount of work or its potential to be enlarged.
90TokenA small hardware device or software code used to authorize access to a system or service.
91UI/UXUser Interface/User Experience; the design and user experience of an application or website.
92Version ControlThe management of changes to documents, computer programs, and other collections of information.
93VPNVirtual Private Network; a service that creates a secure connection over a less secure network.
94WebSocketA communication protocol that provides full-duplex communication channels over a single TCP connection.
95XSSCross-Site Scripting; a vulnerability that allows attackers to inject scripts into content from otherwise trusted websites.
96YAMLYAML Ain’t Markup Language; a human-readable data serialization standard often used for configuration files.
97Data MiningThe practice of examining large databases to generate new information and insights.
98Serverless ComputingA cloud computing model that allows developers to build and run applications without managing servers.
99CI/CDContinuous Integration/Continuous Deployment; a methodology for software development that emphasizes frequent code changes.
100MicroservicesAn architectural style that structures an application as a collection of loosely coupled services.

Abbreviations

Serial No.AbbreviationMeaning
1AIArtificial Intelligence
2APIApplication Programming Interface
3BIOSBasic Input/Output System
4CADComputer-Aided Design
5CGICommon Gateway Interface
6CPUCentral Processing Unit
7CSSCascading Style Sheets
8DBMSDatabase Management System
9DNSDomain Name System
10DOSDisk Operating System
11DHCPDynamic Host Configuration Protocol
12GPUGraphics Processing Unit
13HTMLHypertext Markup Language
14HTTPHypertext Transfer Protocol
15HTTPSHypertext Transfer Protocol Secure
16IoTInternet of Things
17IPInternet Protocol
18ISPInternet Service Provider
19JavaScriptJS
20LANLocal Area Network
21MLMachine Learning
22OSOperating System
23PDFPortable Document Format
24RAMRandom Access Memory
25ROMRead-Only Memory
26SaaSSoftware as a Service
27SDKSoftware Development Kit
28SQLStructured Query Language
29SSHSecure Shell
30SSLSecure Sockets Layer
31UIUser Interface
32UXUser Experience
33VPNVirtual Private Network
34XMLeXtensible Markup Language
35CSVComma-Separated Values
36MQTTMessage Queuing Telemetry Transport
37BCIBrain-Computer Interface
38PaaSPlatform as a Service
39QAQuality Assurance
40RDBMSRelational Database Management System
41SQLStructured Query Language
42TuringTuring Machine
43VRVirtual Reality
44ARAugmented Reality
45CDNContent Delivery Network
46DDoSDistributed Denial of Service
47BYODBring Your Own Device
48FOSSFree and Open Source Software
49IoTInternet of Things
50JDKJava Development Kit
51JREJava Runtime Environment
52MVCModel-View-Controller
53NLPNatural Language Processing
54SaaSSoftware as a Service
55WPSWi-Fi Protected Setup
56XSSCross-Site Scripting
57FQDNFully Qualified Domain Name
58GITGlobal Information Tracker
59NPMNode Package Manager
60P2PPeer-to-Peer
61CRTCathode Ray Tube
62OCROptical Character Recognition
63COTSCommercial Off-The-Shelf
64EDIElectronic Data Interchange
65GUIGraphical User Interface
66SaaSSoftware as a Service
67SIEMSecurity Information and Event Management
68TCPTransmission Control Protocol
69UDPUser Datagram Protocol
70VMVirtual Machine
71SSOSingle Sign-On
72CISSPCertified Information Systems Security Professional
73MCSEMicrosoft Certified Systems Engineer
74CCNACisco Certified Network Associate
75CORSCross-Origin Resource Sharing
76JITJust-In-Time
77XAMLeXtensible Application Markup Language
78APMApplication Performance Management
79B2BBusiness to Business
80B2CBusiness to Consumer
81DSAData Structures and Algorithms
82IIDIdentifier Issue Date
83JSONJavaScript Object Notation
84JWTJSON Web Token
85MLMachine Learning
86NLUNatural Language Understanding
87RPARobotic Process Automation
88SDLCSoftware Development Life Cycle
89SOPStandard Operating Procedure
90AWSAmazon Web Services
91GCPGoogle Cloud Platform
92S3Simple Storage Service
93BLOBBinary Large Object
94CLICommand Line Interface
95RWDResponsive Web Design
96IaaSInfrastructure as a Service
97NVRNetwork Video Recorder
98QRQuick Response
99SIDSecurity Identifier
100ISOInternational Organization for Standardization
101MIMEMultipurpose Internet Mail Extensions
102MEANMongoDB, Express, Angular, Node.js
103MERNMongoDB, Express, React, Node.js
104SAMLSecurity Assertion Markup Language
105KVMKernel-based Virtual Machine
106CDNContent Delivery Network
107OAuthOpen Authorization
108PWAProgressive Web App
109RWDResponsive Web Design
110SQRStandard Query Report
111LAMPLinux, Apache, MySQL, PHP
112WAFWeb Application Firewall
113JSONJavaScript Object Notation
114RCSRevision Control System
115IDEIntegrated Development Environment
116ASCIIAmerican Standard Code for Information Interchange
117UnicodeUniversal Character Set
118DHCPDynamic Host Configuration Protocol
119OTAOver-The-Air
120PGPPretty Good Privacy
121RSARivest-Shamir-Adleman
122SSOSingle Sign-On
123TPMTrusted Platform Module
124AESAdvanced Encryption Standard
125EFSElastic File System
126ERMEnterprise Risk Management
127FIMFile Integrity Monitoring
128HCIHuman-Computer Interaction
129KMSKey Management Service
130PDSProduct Data Management
131SLAsService Level Agreements
132TCOTotal Cost of Ownership
133VCSVersion Control System
134WIKIWiki Interface
135XSDXML Schema Definition
136YMLYAML Ain’t Markup Language
137ZFSZettabyte File System
138BINDBerkeley Internet Name Domain
139CIFSCommon Internet File System
140DORMData Object Relationship Model
141EHRElectronic Health Record
142FHIRFast Healthcare Interoperability Resources
143GPOGroup Policy Object
144HQLHibernate Query Language
145I/OInput/Output
146JPAJava Persistence API
147KPIKey Performance Indicator
148LDAPLightweight Directory Access Protocol
149MDMMaster Data Management
150NICNetwork Interface Card
151OOPObject-Oriented Programming
152PIDProcess Identifier
153QRQuick Response
154SaaSSoftware as a Service
155TCP/IPTransmission Control Protocol/Internet Protocol
156UATUser Acceptance Testing
157VPCVirtual Private Cloud
158WYSIWYGWhat You See Is What You Get
159XMLeXtensible Markup Language
160YAMLYAML Ain’t Markup Language
161ZBXZabbix Monitoring System
162ACIDAtomicity, Consistency, Isolation, Durability
163BEMBlock Element Modifier
164CIContinuous Integration
165CDContinuous Deployment
166DDLData Definition Language
167DMLData Manipulation Language
168E2EEnd-to-End
169FKForeign Key
170GCPGoogle Cloud Platform
171HCIHuman-Computer Interaction
172IPSECInternet Protocol Security
173JSJavaScript
174LTSLong-Term Support
175M2MMachine to Machine
176NTPNetwork Time Protocol
177ORMObject-Relational Mapping
178PCIPayment Card Industry
179QRQuick Response
180RHELRed Hat Enterprise Linux
181SFTPSecure File Transfer Protocol
182TLDTop-Level Domain
183UUIDUniversally Unique Identifier
184WMIWindows Management Instrumentation
185XMLeXtensible Markup Language
186YARNYet Another Resource Negotiator
187ZPLZ-level Programming Language
188A/B TestingA/B Testing
189CaaSContainer as a Service
190DNNDotNetNuke
191ESPEmail Service Provider
192FQDNFully Qualified Domain Name
193GPOGroup Policy Object
194HDFSHadoop Distributed File System
195IaaSInfrastructure as a Service
196JPAJava Persistence API
197K8sKubernetes
198LLMLarge Language Model
199MLOpsMachine Learning Operations
200NFSNetwork File System

    Discover more from

    Subscribe now to keep reading and get access to the full archive.

    Continue reading