| 1 | Algorithm | A step-by-step procedure or formula for solving a problem. |
| 2 | API | Application Programming Interface; a set of rules that allows different software entities to communicate. |
| 3 | Bandwidth | The maximum rate of data transfer across a network path. |
| 4 | Bit | The smallest unit of data in a computer, representing a binary value (0 or 1). |
| 5 | Byte | A unit of digital information that consists of 8 bits. |
| 6 | Cache | A hardware or software component that stores data so future requests for that data can be served faster. |
| 7 | Cloud Computing | The delivery of computing services over the internet, including storage, processing, and networking. |
| 8 | Compiler | A program that translates code written in a high-level programming language into machine language. |
| 9 | Database | An organized collection of data that can be easily accessed, managed, and updated. |
| 10 | Debugging | The process of identifying and removing errors or bugs from software code. |
| 11 | Encryption | The process of converting data into a coded format to prevent unauthorized access. |
| 12 | Firewall | A security system that monitors and controls incoming and outgoing network traffic. |
| 13 | Frontend | The part of a software application or website that interacts with users. |
| 14 | Backend | The server-side of a software application that handles business logic and database interactions. |
| 15 | GPU | Graphics Processing Unit; a hardware component that accelerates the rendering of images and videos. |
| 16 | HTML | Hypertext Markup Language; the standard language for creating web pages. |
| 17 | HTTP | Hypertext Transfer Protocol; the foundation of data communication on the web. |
| 18 | IP Address | A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate. |
| 19 | JavaScript | A programming language commonly used to create interactive effects within web browsers. |
| 20 | Kernel | The core component of an operating system, managing system resources and communication between hardware and software. |
| 21 | Malware | Software designed to harm or exploit any programmable device or network. |
| 22 | Open Source | Software with source code that anyone can inspect, modify, and enhance. |
| 23 | Patch | A software update designed to fix bugs or vulnerabilities in a program. |
| 24 | Phishing | A method of trying to gather personal information using deceptive emails or websites. |
| 25 | Plugin | A piece of software that adds specific features to an existing computer program. |
| 26 | ROM | Read-Only Memory; a type of non-volatile storage that is used to store firmware. |
| 27 | SaaS | Software as a Service; software that is hosted in the cloud and accessed via the internet. |
| 28 | Server | A computer or system that provides data, resources, or services to other computers over a network. |
| 29 | SQL | Structured Query Language; a standard language for managing and manipulating databases. |
| 30 | SSL | Secure Sockets Layer; a protocol for establishing a secure connection over a computer network. |
| 31 | URL | Uniform Resource Locator; the address used to access resources on the internet. |
| 32 | Virtual Machine | A software-based simulation of a physical computer, allowing multiple operating systems to run on a single hardware platform. |
| 33 | Web Browser | A software application for accessing information on the World Wide Web. |
| 34 | Word Processing | The act of creating, editing, and formatting text documents using software. |
| 35 | XML | eXtensible Markup Language; a markup language that defines rules for encoding documents in a format that is both human-readable and machine-readable. |
| 36 | DNS | Domain Name System; the system that translates human-friendly domain names into IP addresses. |
| 37 | FTP | File Transfer Protocol; a standard network protocol used to transfer files from one host to another. |
| 38 | Hacker | A person who uses technical knowledge to break into computers or networks, often to exploit them. |
| 39 | IoT | Internet of Things; the network of physical devices connected to the internet, collecting and sharing data. |
| 40 | JSON | JavaScript Object Notation; a lightweight data interchange format that is easy for humans to read and write, and easy for machines to parse and generate. |
| 41 | Malware | Software specifically designed to disrupt, damage, or gain unauthorized access to computer systems. |
| 42 | Network | A group of interconnected computers that can communicate with each other and share resources. |
| 43 | Open Source | Software with source code that anyone can inspect, modify, and enhance. |
| 44 | Protocol | A set of rules governing the exchange of data between devices in a network. |
| 45 | Cache | A hardware or software component that stores data so that future requests for that data can be served faster. |
| 46 | Root | The highest level of access within a computer system, granting unrestricted access to all files and commands. |
| 47 | Script | A set of instructions written in a scripting language that is executed by an interpreter. |
| 48 | SDK | Software Development Kit; a collection of software tools and libraries for developing applications. |
| 49 | GUI | Graphical User Interface; a visual way for users to interact with a computer using images and icons. |
| 50 | SSL | Secure Sockets Layer; a standard protocol for securing internet communications. |
| 51 | Turing Machine | An abstract computational model that defines an algorithm’s computational power. |
| 52 | VLAN | Virtual Local Area Network; a subnetwork that can group together devices on separate physical LANs. |
| 53 | Cache | A hardware or software component that stores data so that future requests for that data can be served faster. |
| 54 | Credential | Information that verifies user identity, usually a combination of usernames and passwords. |
| 55 | DDoS | Distributed Denial of Service; a malicious attempt to disrupt the normal functioning of a targeted server or network. |
| 56 | Endpoint | A device or node that is connected to a network and communicates with it. |
| 57 | Framework | A platform or structure used to develop and support applications and programs. |
| 58 | GUI | Graphical User Interface; a system that allows users to interact with electronic devices through graphical icons. |
| 59 | Hash Function | A function that converts input data into a fixed-size string of characters, which is typically a hash code. |
| 60 | IDE | Integrated Development Environment; a software application providing comprehensive facilities to computer programmers for software development. |
| 61 | JSON | JavaScript Object Notation; a lightweight data interchange format. |
| 62 | Keylogger | A type of surveillance software that records keystrokes made by a user on a computer. |
| 63 | Load Balancer | A device that distributes network or application traffic across multiple servers to ensure high availability and reliability. |
| 64 | Malware | Malicious software intended to harm or exploit any programmable device or network. |
| 65 | Node | An active electronic device that is part of a larger network, often acting as a connection point. |
| 66 | Open Source | Software for which the original source code is made freely available and may be redistributed and modified. |
| 67 | Proxy Server | An intermediary server that separates end users from the websites they browse, providing anonymity and security. |
| 68 | QR Code | Quick Response Code; a two-dimensional barcode that can be scanned using a smartphone to quickly access information. |
| 69 | Reboot | The process of restarting a computer or device, clearing memory and reinitializing the operating system. |
| 70 | Search Engine | A software system designed to carry out web searches, indexing data to provide relevant results. |
| 71 | Token | A digital representation of an asset or utility, often used in authentication processes. |
| 72 | User Interface | The means by which a user interacts with a computer or software application. |
| 73 | Verification | The process of confirming the accuracy and validity of information or data. |
| 74 | Web Server | A server responsible for storing, processing, and delivering web pages to clients. |
| 75 | ZIP | A common file format used for data compression and archiving. |
| 76 | CLI | Command Line Interface; a means of interacting with a computer program by typing text commands. |
| 77 | DHCP | Dynamic Host Configuration Protocol; a protocol used to assign IP addresses to devices on a network. |
| 78 | FDDI | Fiber Distributed Data Interface; a standard for data transmission in a local area network. |
| 79 | GraphQL | A query language for APIs, allowing clients to request only the data they need. |
| 80 | Hypervisor | Software that creates and runs virtual machines, providing resources to each VM. |
| 81 | Inline Style | A method of applying CSS styles directly within an HTML element. |
| 82 | Kubernetes | An open-source platform for automating deployment, scaling, and management of containerized applications. |
| 83 | Load Testing | A type of testing focused on understanding the behavior of a system under a specific expected load. |
| 84 | Modem | A device that modulates and demodulates signals for data transmission over telephone lines. |
| 85 | NGINX | An open-source web server known for its high performance and scalability. |
| 86 | OpenID | An open standard for decentralized authentication. |
| 87 | Query | A request for information from a database. |
| 88 | Runtime | The period during which a computer program is executing. |
| 89 | Scalability | The capability of a system to handle a growing amount of work or its potential to be enlarged. |
| 90 | Token | A small hardware device or software code used to authorize access to a system or service. |
| 91 | UI/UX | User Interface/User Experience; the design and user experience of an application or website. |
| 92 | Version Control | The management of changes to documents, computer programs, and other collections of information. |
| 93 | VPN | Virtual Private Network; a service that creates a secure connection over a less secure network. |
| 94 | WebSocket | A communication protocol that provides full-duplex communication channels over a single TCP connection. |
| 95 | XSS | Cross-Site Scripting; a vulnerability that allows attackers to inject scripts into content from otherwise trusted websites. |
| 96 | YAML | YAML Ain’t Markup Language; a human-readable data serialization standard often used for configuration files. |
| 97 | Data Mining | The practice of examining large databases to generate new information and insights. |
| 98 | Serverless Computing | A cloud computing model that allows developers to build and run applications without managing servers. |
| 99 | CI/CD | Continuous Integration/Continuous Deployment; a methodology for software development that emphasizes frequent code changes. |
| 100 | Microservices | An architectural style that structures an application as a collection of loosely coupled services. |