Paillor Terms Glossary: Terms To Know In 2024 | Paillor | Paillor AI
top of page
dot-bg-blaclk2.png

Paillor Glossary

Terms and Explanations

Dive into the deep world of Paillor, which makes your work life easier and facilitates communication with AI chatbots! Here you can find the most important terms of the Paillor platform and what they mean.

A

Algorithm

A set of rules or a step-by-step process designed to perform a specific task or solve a particular problem.

Architecture

The conceptual structure and logical organization of a computer or computer-based system.

​

Authentication

The process of verifying the identity of a user or process.

​

Agile

A methodology used in software development that emphasizes flexibility, collaboration, customer feedback, and rapid response to changes.

Asynchronous

Operations that occur without a predetermined or fixed time frame, allowing processes to run independently of one another.

Affiliate Marketing

- A marketing arrangement by which an online retailer pays commission to an external website for traffic or sales generated from its referrals

 

Applet

A small application designed to run within another application or on a web page.

​

 

Analytics

The systematic computational analysis of data or statistics, often used for discovering, interpreting, and communicating meaningful patterns in data.

API (Application Programming Interface)

A set of protocols, routines, and tools for building software and applications, allowing different software entities to communicate with each other.

Authorization

The process of determining if a particular user, process, or device has the rights to perform a specific action or access specific resources

Asset

Any valuable item, digital or physical, that is owned by an individual or organization

Automation

The use of technology to perform tasks with reduced human intervention.

Analytics

The discovery, interpretation, and communication of meaningful patterns in data.

 

Augmented Reality (AR)

An interactive experience of a real-world environment where objects residing in the real world are enhanced by computer-generated perceptual information.

 

Application

A computer software designed to help the user to perform singular or multiple related specific tasks.

Artifact

Any byproduct produced during the software development process, such as documentation, diagrams, or code

Availability

The degree to which a system or component is operational and accessible when required for use

Assessment

The evaluation or estimation of the nature, quality, or ability of someone or something

 

Adware

Any software application that displays advertising banners while the program is running.

Anomaly Detection

The identification of items, events, or observations which do not conform to an expected pattern in a dataset.

​

​

 

B

Bandwidth

The maximum rate of data transfer across a given path, often measured in bits per second (bps).

Benchmark

- A standard or point of reference against which things may be compared or assessed, often used in performance evaluations of software or hardware.

Bot

A software application that runs automated tasks (scripts) over the Internet, performing tasks much faster than a human could.

Binary

A base-2 numeral system or binary number system, using only two symbols: typically 0 (zero) and 1 (one).

 

Backup

A copy of data made to prevent loss of information, allowing recovery in the event of data loss.

​

Blockchain

A system in which a record of transactions made in bitcoin or another cryptocurrency is maintained across several computers that are linked in a peer-to-peer network.

 

Buffer

A region of memory used to temporarily hold data while it is being moved from one place to another.

 

Blockchain

A distributed database or ledger technology that maintains a continuously growing list of records, called blocks, secured from tampering andrevision.

Browser

A software application used to access and navigate the internet.

Back-end

The part of a software system or website that is not directly accessed by the user, typically responsible for storing and managing data.

BIOS (Basic Input/Output System)

Firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs.

Bandwidth Throttling

The intentional slowing of internet service by an internet service provider. It can also refer to the management of data transfer rate in other network contexts.

BI (Business Intelligence)

Technologies, applications, strategies, and practices for the collection, integration, analysis, and presentation of business information.

Bytecode

A form of instruction set designed for efficient execution by a software interpreter or virtual machine, as opposed to direct execution by hardware.

Byte

A unit of digital information that most commonly consists of eight bits, representing a single character of data.

Bootstrap

- A process of starting up a computer system or a technique in statistics for estimating the distribution of a statistic.

 

Bug

An error, flaw or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.

Bit

The smallest unit of data in computing, represented by a 0 or 1 in binary notation.

 

Bloatware

Unwanted software included on a new computer or mobile device by the manufacturer, typically consuming system resources and reducing performance.

​

Breadcrumb

A navigation aid used in user interfaces, indicating the path from the home page to the current page.

 

c

Cache

A hardware or software component that stores data so future requests for that data can be served faster.

CSS (Cascading Style Sheets)

A style sheet language used for describing the presentation of a document written in HTML or XML.

Cryptography

The practice and study of techniques for secure communication in the presence of third parties called adversaries.

Concurrency

The ability of different parts or units of a program, algorithm, or problem to be executed out-of-order or in partial order, without affecting the final outcome.

Cookie

Data sent by an internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.

Cloud Storage

A model of computer data storage in which the digital data is stored in logical pools, said to be on "the cloud", the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company.

 

Cyberspace

The notional environment in which communication over computer networks occurs.

Cloud Computing

The delivery of computing services—servers, storage, databases, networking, software, analytics, intelligence, and more—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks.

Code

A system of signals, such as letters, words, sounds, or symbols, used to represent instructions or data.

Container

A lightweight, stand-alone, executable package of software that includes everything needed to run a piece of software, including the code, runtime, libraries, environment variables, and config files.

Crowdsourcing

The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet.

Concurrency Control

The management of simultaneous operations on data in a database system without having them interfere with each other.

Circuit Breaker

A design pattern used in software development that stops the application from trying to perform an operation that's likely to fail, often used when interacting with remote services or APIs.

CPU (Central Processing Unit)

The primary component of a computer that performs most of the processing inside a computer.

CRM (Customer Relationship Management)

Technology for managing all your company’s relationships and interactions with customers and potential customers.

Compiler

A special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.

Content Management System (CMS)

A software application or set of related programs that are used to create and manage digital content

 

Chatbot

A software application used to conduct an on-line chat conversation via text or text-to-speech, in lieu of providing direct contact with a live human agent.

Cyberspace

The notional environment in which communication over computer networks occurs.

D

​Data

Quantitative or qualitative values of a variable; often used to refer to information in various forms stored digitally.

Debugging

The process of identifying and removing errors from computer hardware or software.

 

Deployment

The process of making software application available for use.

DNS (Domain Name System)

The system by which internet domain names and addresses are tracked and regulated.

 

Domain

In networking, a domain is a set of network resources for a group of users that share a common data management and security environment.

​

Dynamic

In computing, dynamic usually refers to operations or objects that are changeable and can be modified after creation.

​

Data Type

An attribute of data which tells the compiler or interpreter how the programmer intends to use the data.

 

Database

A structured set of data held in a computer, especially one that is accessible in various ways

 

Decryption

A structured set of data held in a computer, especially one that is accessible in various ways

​

​

Design Pattern

A general repeatable solution to a commonly occurring problem in software design.

Docker

An open platform for developing, shipping, and running applications in containers, which allow a developer to package up an application with all of the parts it needs.

Download

The process of receiving data over a network from another source, often from the internet.

Data Integrity

The accuracy and consistency of data stored in a database, data warehouse, or other construct.

Denial of Service (DoS)

An attack on a computer or network that reduces, restricts or prevents accessibility of system resources to legitimate users.

Data Mining

The process of discovering patterns and knowledge from large amounts of data. The data sources can include databases, data warehouses, the web, etc.

Deep Learning

A subset of machine learning in artificial intelligence (AI) that has networks capable of learning unsupervised from data that is unstructured or unlabeled.

Digital

Involving or relating to the use of computer technology

Document Management System (DMS)

A system used to track, manage, and store documents to reduce paper and organize records.

Driver

Software that allows your computer to communicate with hardware or devices.

Data Structure

A particular way of organizing data in a computer so that it can be used effectively.

 

E

E-commerce

Buying and selling of goods and services over the internet.

Enterprise Resource Planning (ERP)

Business management software—usually a suite of integrated applications—that a company can use to collect, store, manage, and interpret data from many business activities

Emulator

Hardware or software that enables one computer system to behave like another computer system.

Exception

An event, which occurs during the execution of a program, that disrupts the normal flow of the program's instructions.

​

Encryption Key

A random string of bits created specifically for scrambling and unscrambling data.

​

Event

An action or occurrence recognized by software, often originating asynchronously from the external environment, that may be handled by the software.

 

Exabyte

A unit of information or computer storage equal to one quintillion bytes.

​

Encryption

The process of converting information or data into a code, especially to prevent unauthorized access.

Ethernet

A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

Entity

In computing, an entity can refer to any identifiable object with a well-defined role in the application or data model.

Executable

file that is capable of being executed or run as a program in the computer.

Elasticity

In cloud computing, the ability to scale computing resources up or down easily, with minimal friction.

E-Waste

Discarded electrical or electronic devices. Used electronics which are destined for reuse, resale, salvage, recycling, or disposal.

Expert System

A computer system that emulates the decision-making ability of a human expert, by following the rules a human would. It is a part of artificial intelligence.

Endpoint

A remote computing device that communicates back and forth with a network to which it is connected.

Email

Electronic mail, a method of exchanging messages between people using electronic devices.

Environment Variable

A dynamic-named value that can affect the way running processes will behave on a computer.

Extranet

A website that allows controlled access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet.

Embedding

In the context of machine learning, the representation of data in a form that's readable to the algorithm; in web development, inserting content or code from another source into a web page.

Extension

A piece of software that adds additional features to a more significant software application.

F

Framework

A basic structure underlying a system, concept, or text, often referring to software frameworks designed to support the development of applications, components, or systems.

Function

In computing, a named section of a code that performs a specific task.

 

Fiber Optics

technology that uses glass (or plastic) threads (fibers) to transmit data. A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves.

Failover

The automatic switching to a redundant or standby computer server, system, hardware component or network upon the failure or abnormal termination of the previously active application, server, system, hardware component, or network.

 

FPGA (Field-Programmable Gate Array)

An integrated circuit designed to be configured by a customer or a designer after manufacturing – hence "field-programmable".

Freeware

Software that is available free of charge.

Fault Tolerance

The ability of a system to continue operating without interruption when one or more of its components fail.

 

Firewall

A network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.

 

Front-end

The part of a software system or website that the user interacts with directly.

Fintech

A combination of the terms "financial" and "technology," it refers to the use of technology to deliver financial services and products to consumers.

FaaS (Function as a Service)

A cloud computing service that provides a platform allowing customers to develop, run, and manage application functionalities without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.

Flux

In programming, particularly in React applications, Flux is a pattern that helps in keeping the data unidirectional.

Fragmentation

The division of a database or computer storage into multiple, smaller parts, often to improve efficiency and speed.

Full-Stack Developer

A technology expert who can handle all the work of databases, servers, systems engineering, and clients. Depending on the project, what customers need may be a mobile stack, a Web stack, or a native application stack.

Firmware

A specific class of computer software that provides the low-level control for a device's specific hardware.

FTP (File Transfer Protocol)

A standard network protocol used for the transfer of computer files between a client and server on a computer network.

Fragmentation

In computing, the process or state of breaking or being broken into small or separate parts, particularly in reference to memory or disk storage.

Feature

In machine learning and pattern recognition, a feature is an individual measurable property or characteristic of a phenomenon being observed.

Fuzzy Logic

A form of many-valued logic in which the truth values of variables may be any real number between 0 and 1. It is employed to handle the concept of partial truth, where the truth value may range between completely true and completely false.

Forensics

In the context of computer and digital forensics, the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.

 

G

GUI (Graphical User Interface)

A user interface that allows users to interact with electronic devices through graphical icons and visual indicators, as opposed to text-based interfaces, typed command labels, or text navigation.

Git

A distributed version control system used for tracking changes in source code during software development.

Garbage Collection

​In computer science, garbage collection is a form of automatic memory management. The garbage collector, or just collector, attempts to reclaim garbage, or memory occupied by objects that are no longer in use by the program.

Geocoding

The process of converting addresses (like "1600 Amphitheatre Parkway, Mountain View, CA") into geographic coordinates (like latitude 37.423021 and longitude -122.083739), which you can use to place markers on a map, or position the map.

GPL (GNU General Public License)

A widely used free software license, which guarantees end users the freedom to run, study, share, and modify the software.

Gigabit

A unit of digital information or computer storage equal to one billion bits.

Gamification

The application of game-design elements and game principles in non-game contexts to improve user engagement, organizational productivity, learning, crowdsourcing, employee recruitment, and more.

Gigabyte

A unit of digital information that is equal to 1,024 megabytes or 1,073,741,824 bytes, commonly used to measure storage capacity.

​

GPU (Graphics Processing Unit)

A specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device.

Gateway

In telecommunications, a gateway is a network node equipped for interfacing with another network that uses different protocols.

Gesture Recognition

The ability of a device to identify and respond to the different gestures of an individual.

 

Graph Database

A database that uses graph structures for semantic queries with nodes, edges, and properties to represent and store data.

Growth Hacking

A process of rapid experimentation across marketing channels and product development to identify the most effective, efficient ways to grow a business.

​

GraphQL

A query language for APIs and a runtime for fulfilling those queries with your existing data. GraphQL provides a complete and understandable description of the data in your API, gives clients the power to ask for exactly what they need and nothing more.

Gateway

A network node that connects two networks using different protocols together. It acts as an entrance to another network.

Gantt Chart

A type of bar chart that illustrates a project schedule, named after its inventor, Henry Gantt, who designed such a chart around the years 1910–1915.

GDPR (General Data Protection Regulation)

A regulation in EU law on data protection and privacy in the European Union and the European Economic Area. It also addresses the transfer of personal data outside the EU and EEA areas.

Git

A free and open-source distributed version control system designed to handle everything from small to very large projects with speed and efficiency.

Grid Computing

A distributed architecture of large numbers of computers connected to solve a complex problem. In the grid computing model, servers or personal computers run independent tasks and are loosely linked by the Internet or low-speed networks.

GUI Testing

The process of testing a product's graphical user interface to ensure it meets its specifications. This is not just about the aesthetic aspect but also includes testing the functional parts of the application that are visible to a user.

H

HTML (HyperText Markup Language)

The standard markup language for documents designed to be displayed in a web browser.

Hash

A function that converts an input (or 'message') into a fixed-size string of bytes. The output, typically a 'digest', is designed to be unique to each unique input.

Hyperlink

A reference to data that a reader can directly follow either by clicking or by hovering. It points to a whole document or to a specific element within a document.

Hadoop

An open-source software framework used for distributed storage and processing of large sets of data using the MapReduce programming model.

HCI (Human-Computer Interaction)

The study of how people interact with computers and to design technologies that let humans interact with computers in novel ways.

HTTP/2

The second major version of the HTTP network protocol, used by the World Wide Web, which focuses on performance improvements.

Headless Browser

A web browser without a graphical user interface, controlled programmatically used for automation, testing web pages, and scraping web data.

HTTP (HyperText Transfer Protocol)

The foundation of data communication for the World Wide Web, defining how messages are formatted and transmitted.

 

Heap

A type of data structure that is used in computer science to represent a priority queue.

​

Hypervisor

Software that creates and runs virtual machines (VMs). A computer on which a hypervisor runs one or more virtual machines is called a host machine.

 

Hertz (Hz)

A unit of frequency in the International System of Units (SI) that measures the number of cycles per second of a periodic phenomenon.

Hybrid Cloud

A cloud computing environment that uses a mix of on-premises, private cloud, and third-party public cloud services with orchestration between the platforms.

High Availability

Refers to systems that are durable and likely to operate continuously without failure for a long time.

​

Heap Memory

An area of dynamically allocated memory that a program manages directly via calls to specialized functions or operators.

HTTPS (HyperText Transfer Protocol Secure)

An extension of HTTP used for secure communication over a computer network, widely used on the Internet.

Host

In network computing, a host is a computer that is accessible over a network.

Hardware

The collection of physical parts of a computer system, including the computer itself and related devices such as monitors, keyboards, and mice.

​

Hashing

The process of converting a given key into another value. A hash function is used to generate the new value according to a mathematical algorithm.

 

Hexadecimal

A base-16 number system that uses sixteen distinct symbols, typically the numbers 0 to 9 to represent values zero to nine, and A, B, C, D, E, F (or alternatively a-f) to represent values ten to fifteen.

​

Honeypot

A security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems.

I

Internet

A global network connecting millions of computers, allowing them to communicate.

Interface

The point of interaction or communication between a computer and any other entity, such as a printer or human user.

​

Infrastructure as a Service (IaaS)

A form of cloud computing that provides virtualized computing resources over the internet.

​

IPSec (Internet Protocol Security)

A framework of open standards for ensuring private communications over the Internet.

Impedance Matching

In electronics, a technique used to minimize reflections and maximize the power transfer of electrical signals.

ISO (International Organization for Standardization)

An independent, non-governmental international organization with a membership of 164 national standards bodies.

​

Interoperability

The ability of computer systems or software to exchange and make use of information.

 

IP Address (Internet Protocol Address)

A unique string of numbers separated by periods or colons that identifies each computer using the Internet Protocol to communicate over a network.

IDE (Integrated Development Environment)

A software application that provides comprehensive facilities to computer programmers for software development.

Inheritance

A principle of object-oriented programming in which a class can inherit properties and methods from another class.

Integration Testing

A level of software testing where individual units are combined and tested as a group to expose faults in the interaction between units.

 

Inference

In artificial intelligence, the process of using a trained model to make predictions.

ISP (Internet Service Provider)

A company that provides individuals and organizations access to the Internet and other related services.

IDE (Integrated Drive Electronics)

An interface standard for connecting storage devices like hard drives and optical drives to a computer's motherboard.

IoT (Internet of Things)

The network of physical objects—devices, vehicles, appliances—embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.

Iteration

The repetition of a process in a computer program, typically within a loop.

​Index

In databases, an index is a data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes and storage space to maintain the index data structure.

Immutable

An object whose state cannot be modified after it is created.

Injection Attack

A type of attack in which malicious code is inserted into a program or system to exploit vulnerabilities in order to gain control of a system or access sensitive information.

​ICMP (Internet Control Message Protocol)

A network layer protocol used by network devices to diagnose network communication issues.

J

JavaScript

A high-level, dynamic, untyped, and interpreted programming language, widely used for web development to create interactive effects within web browsers.

​

JQuery

A fast, small, and feature-rich JavaScript library designed to simplify the client-side scripting of HTML.

​

JIRA

A proprietary issue tracking product developed by Atlassian that allows bug tracking and agile project management.

​

JIT (Just-In-Time)

Compilation that translates code during runtime rather than prior to execution, often used in Java environments to improve performance.

​

​

JNI (Java Native Interface)

A framework that allows Java code running in a Java Virtual Machine (JVM) to call and be called by native applications (programs specific to a hardware and operating system platform) and libraries written in other languages such as C and C++.

​

​

JAR (Java Archive)

A package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file for distribution.

​

JSONP (JSON with Padding)

A method used to request data from a server residing in a different domain than the client.

​

JSON (JavaScript Object Notation)

A lightweight data-interchange format, easy for humans to read and write and easy for machines to parse and generate.

JDK (Java Development Kit)

A software development environment used for developing Java applications and applets. It includes the Java Runtime Environment (JRE), an interpreter/loader (Java), a compiler (javac), an archiver (jar), a documentation generator (Javadoc) and other tools needed in Java development.

JPEG (Joint Photographic Experts Group)

A commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.

JWT (JSON Web Token)

An open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.

JPA (Java Persistence API)

​A Java application programming interface specification that describes the management of relational data in applications using Java Platform, Standard Edition, and Java Platform, Enterprise Edition.

JMS (Java Message Service)

A Java Message Oriented Middleware (MOM) API for sending messages between two or more clients.

Jekyll

A simple, blog-aware, static site generator perfect for personal, project, or organization sites, often used with GitHub Pages for easy deployment.

Java

​A high-level programming language developed by Sun Microsystems, designed to run on a variety of platforms, including Windows, Mac OS, and the various versions of UNIX.

JVM (Java Virtual Machine)

​An abstract computing machine that enables a computer to run a Java program. There are JVMs for many hardware and software platforms.

JSP (JavaServer Pages)

A technology that helps software developers create dynamically generated web pages based on HTML, XML, or other document types.

J2EE (Java 2 Platform, Enterprise Edition)

A platform-independent, Java-centric environment from Sun for developing, building and deploying web-based enterprise applications online.

JDBC (Java Database Connectivity)

An API for the programming language Java, which defines how a client may access a database. It provides methods for querying and updating data in a database.

JUnit

A simple framework to write repeatable tests, with an emphasis on testing Java projects.

K

Kernel

The central part of an operating system, managing system resources and communication between hardware and software components.

Kubernetes

An open-source platform designed to automate deploying, scaling, and operating application containers.

Kerberos

A network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography.

Kafka

An open-source stream-processing software platform developed by LinkedIn and donated to the Apache Software Foundation, used for building real-time data pipelines and streaming apps.

K-nearest neighbors (KNN)

A simple, versatile, and widely used algorithm in machine learning for classification and regression.

Kickstarter

A crowdfunding platform focused on creativity and merchandising, which allows people to pledge money to support projects from the initial idea to the delivery of the project.

Kinematics

The branch of mechanics that describes the motion of points, bodies (objects), and systems of bodies (groups of objects) without considering the forces that cause them to move.

Key

In cryptography, a piece of information that controls the operation of a cryptography algorithm. In databases, a key is an attribute or set of attributes that uniquely identifies a record.

KPI (Key Performance Indicator)

A measurable value that demonstrates how effectively a company is achieving key business objectives.

Keyword

A word or phrase that is a topic of significance. In programming, a keyword is a word that is reserved by a program because the word has a special meaning.

Keystroke Logging

The act of tracking and recording every keystroke entry made on a computer, often covertly so that the person using the keyboard is unaware that their actions are being monitored.

 

Kerning

The process of adjusting the spacing between characters in a proportional font, usually to achieve a visually pleasing result.

Kiosk Mode

A setting for electronic devices that restricts user interaction and application execution to specific tasks.

Kybernetes

The Greek word from which "Kubernetes" derives, meaning "helmsman" or "pilot", reflecting the tool's role in guiding containerized applications.

Kilobyte (KB)

A unit of digital information equal to 1,024 bytes, used to quantify digital information and storage capacity.

KVM (Kernel-based Virtual Machine)

A virtualization module in the Linux kernel that allows the kernel to function as a hypervisor.

​

Knowledge Base

A centralized repository for information: a public library, a database of related information about a particular subject.

Knapsack Problem

A problem in combinatorial optimization: Given a set of items, each with a weight and a value, determine the number of each item to include in a collection so that the total weight is less than or equal to a given limit and the total value is as large as possible.

Kernel Density Estimation (KDE)

A non-parametric way to estimate the probability density function of a random variable.

 

Kibibyte (KiB)

A unit of data equal to 1,024 bytes, reflecting the binary multiplication system, as opposed to the decimal system used for kilobytes (KB).

 

L

LAN (Local Area Network)

A network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, or office building.

Linux

A family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.

Lambda Function

Also known as an anonymous function, a function defined, and possibly called, without being bound to an identifier. Lambda functions are widely used in programming languages like Python.

Linker

A computer utility program that takes one or more object files generated by a compiler and combines them into a single executable program.

LTE (Long Term Evolution)

A standard for wireless broadband communication for mobile devices and data terminals, based on the GSM/EDGE and UMTS/HSPA technologies.

Leverage

In business, the use of various financial instruments or borrowed capital to increase the potential return of an investment.

Logic Bomb

A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

Latency

The delay before a transfer of data begins following an instruction for its transfer. In networking, it's often referred to as the time taken for a packet to travel from source to destination.

Logic Gate

A device that performs a basic logical function; digital circuits are built from logic gates. The functions include AND, OR, NOT, NAND, NOR, XOR, and XNOR.

Leakage

In electronics, leakage refers to the gradual loss of stored charge from a capacitor. In software, it refers to unintended information disclosure or memory leaks.

LISP (List Processing)

A family of computer programming languages with a long history and a distinctive, fully parenthesized prefix notation.

Luminance

A measure of the intensity of light emitted from a surface per unit area in a given direction. It's used in various contexts including photography, videography, and lighting.

Licensing

The granting of permission to use intellectual property rights, such as trademarks, patents, or technology, under defined conditions.

Lookup Table

A data structure, often an array or associative array, used to replace a runtime computation with a simpler lookup operation.

 

Load Balancing

The process of distributing network or application traffic across multiple servers to ensure no single server becomes overwhelmed by demand, improving reliability and speed.

LDAP (Lightweight Directory Access Protocol)

​An open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.

LIFO (Last In, First Out)

A technology that helps software developers create dynamically generated web pages based on HTML, XML, or other document types.

Logical Operation

An operation corresponding to a logical function that operates according to Boolean algebra or binary logic.

​

LAMP (Linux, Apache, MySQL, PHP/Python/Perl)

A popular open-source web development platform that uses Linux as the operating system, Apache as the web server, MySQL as the relational database management system, and PHP, Python, or Perl as the object-oriented scripting language.

 

Lifecycle

In technology, refers to the stages through which a product or project goes from conception through retirement, encompassing stages such as planning, development, launch, maintenance, and phase-out.

​

​

M

Machine Learning

A subset of artificial intelligence (AI) that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.

Microprocessor

A computer processor on a microchip, the engine that goes into motion when you turn your computer on.

Moore's Law

The observation that the number of transistors on integrated circuits doubles approximately every two years, leading to the continuous increase in computing power.

MVC (Model-View-Controller)

A software architectural pattern for implementing user interfaces on computers. It divides a given software application into three interconnected parts to separate internal representations of information from the ways that information is presented to or accepted from the user.

Microservices

A style of software architecture that structures an application as a collection of loosely coupled services, which implement business capabilities.

Multiplexing

A method by which multiple analog or digital signals are combined into one signal over a shared medium.

Man-in-the-Middle Attack

A cyberattack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other.

Malware

Malicious software designed to harm, exploit, or otherwise compromise a computer, network, or server.

​

​Middleware

Software that lies between an operating system and the applications running on it, enabling communication and data management.

 

Multitasking

The ability of a computer to execute several tasks concurrently by switching among them to utilize the CPU efficiently.

​

Machine Code

A computer programming language consisting of binary or hexadecimal instructions that a computer can respond to directly.

​

 

Middleware

Software that provides common services and capabilities to applications outside of what's offered by the operating system.

 

Multithreading

Software that provides common services and capabilities to applications outside of what's offered by the operating system.

 

​

MPEG (Moving Picture Experts Group)

A working group of authorities that was formed by ISO and IEC to set standards for audio and video compression and transmission.

​

​

Metadata

Data that provides information about other data, such as the author, date of creation, and file size.

Modem

A device or program that enables a computer to transmit data over, for example, telephone or cable lines.

​

MySQL

An open-source relational database management system based on SQL (Structured Query Language).

​

​

Mesh Network

A network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network.

​Multicore Processor

A single computing component with two or more independent actual processing units (called "cores"), which read and execute program instructions.

 

 

Markup Language

A system for annotating a document in a way that is syntactically distinguishable from the text. The most commonly used markup languages are HTML and XML.

 

N

Network

A collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data.

Namespace

A container that allows identifiers (names) within it to be associated with a particular context or area of code, thus preventing naming conflicts.

​

Nonce

A number or bit string used only once, in security engineering, or in computer science, a number used to vary the output in cryptographic operations.

 

NIC (Network Interface Card)

A hardware component that connects a computer to a network.

​

Nginx

(pronounced as "engine-x") - An open-source web server that also serves as a reverse proxy, load balancer, mail proxy, and HTTP cache.

​

NVMe (Non-Volatile Memory Express)

An interface protocol built especially for Solid State Drives (SSDs). NVMe works with PCI Express (PCIe) to transfer data to and from SSDs.

​

Nyquist Rate

The minimum rate at which a signal can be sampled without introducing errors, which is twice the highest frequency present in the signal.

​

Neural Network

A series of algorithms that endeavors to recognize underlying relationships in a set of data through a process that mimics the way the human brain operates.

NAT (Network Address Translation)

A method of remapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.

Normalization

The process of organizing the fields and tables of a database to minimize redundancy and dependency by dividing large tables into smaller (and less redundant) tables and defining relationships between them.

NPM (Node Package Manager)

A package manager for the JavaScript programming language. It is the default package manager for the JavaScript runtime environment Node.js.

Namespace

In programming, a namespace is a container that allows developers to bundle all functionality under a unique, application-specific name.

NAT Traversal

​A computer networking technique that establishes and maintains Internet protocol connections across gateways that implement Network Address Translation (NAT).

Nanotechnology

The science, engineering, and technology conducted at the nanoscale, which is about 1 to 100 nanometers.

Node

In networking, a node is any active, physical, electronic device attached to a network. In data structures, it refers to an element in a linked list or tree structure.

NoSQL

A variety of technologies that are designed to accommodate a wide variety of data models, including key-value, document, columnar, and graph formats.

NFC (Near Field Communication)

A set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other.

NAND

A type of flash storage technology that stores data by using NAND logic gates, offering high capacity and endurance.

NLP (Natural Language Processing)

A field of computer science, artificial intelligence, and computational linguistics concerned with the interactions between computers and human (natural) languages.

 

Null

In computer programming, a special marker used in several languages to denote a reference that does not refer to any object or where no data is present.

O

Object-Oriented Programming (OOP)

A programming paradigm based on the concept of "objects", which can contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods.

OAuth

An open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.

Opcode

The portion of a machine language instruction that specifies the operation to be performed. An opcode is short for 'operation code'.

Outsource

The business practice of hiring a party outside a company to perform services and create goods that traditionally were performed in-house by the company's own employees and staff.

Omnichannel

​A multi-channel approach to sales that seeks to provide the customer with a seamless shopping experience whether the client is shopping online from a mobile device, a laptop, or in a brick-and-mortar store.

Online Analytical Processing (OLAP)

A category of software that allows users to analyze information from multiple database systems at the same time. It is a technology behind many Business Intelligence (BI) applications.

Outbound Marketing

A traditional form of marketing where a company initiates the conversation and sends its message out to an audience.

Operating System (OS)

System software that manages computer hardware, software resources, and provides common services for computer programs.

Overclocking

The action of increasing the operating speed of a computer component beyond its stock performance settings to improve performance.
6. Object - In programming, an object is a data structure that contains data, in the

 

Optimization

In computing, optimization is the process of modifying a system to make some aspects of it work more efficiently or use fewer resources.

Overflow

In computing, an overflow error occurs when a calculation exceeds the maximum limit of the variable used to store it.

 

OpenSSL

A robust, full-featured open-source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

 

Opcode Caching

In PHP, opcode caching is the process of storing precompiled script bytecode in shared memory, thereby removing the need for PHP to load and parse scripts on each request.

Overlay Network

A computer network that is built on top of another network. Nodes in the overlay network are connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network.

Open Source

A type of software in which the source code is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product.

Object

In programming, an object is a data structure that contains data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods

ORM (Object-Relational Mapping)

A programming technique for converting data between incompatible type systems in object-oriented programming languages.

Offshore Development

Refers to the practice of outsourcing tasks or projects to a third-party company or team located in a foreign country.
13. Omnichannel - A multi-channel approach to sales that seeks to

On-Premises

A type of software delivery model that is installed and operates on computers on the premises of the person or organization using the software, rather than at a remote facility such as a server farm or cloud.

​OSI Model (Open Systems Interconnection Model)

A conceptual framework used to understand network interactions in seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

P

Protocol

A set of rules or procedures for transmitting data between electronic devices, such as computers.

 

Proxy Server

A server that acts as an intermediary for requests from clients seeking resources from other servers, providing increased security and anonymity.

​

Public Key Infrastructure (PKI)

A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

 

Penetration Testing

The practice of testing a computer system, network, or web application to find security vulnerabilities that an attacker could exploit.

​

PostgreSQL

An advanced, open-source relational database management system that supports both SQL (relational) and JSON (non-relational) querying.

Predictive Analytics

The use of data, statistical algorithms, and machine learning techniques to identify the likelihood of future outcomes based on historical data.

Public Cloud

Cloud computing services offered by third-party providers over the public Internet, making them available to anyone who wants to use or purchase them.

​

Python

A high-level, interpreted, general-purpose programming language known for its readability and support for multiple programming paradigms.

Pixel

The smallest unit of a digital image or graphic that can be displayed and edited on a computer screen.

Packet

A formatted unit of data carried by a packet-switched network. In networking, a packet represents a piece of a message broken down into a smaller, manageable size.

Permalink

A permanent static hyperlink to a particular web page or entry in a blog.

Platform as a Service (PaaS)

A cloud computing model that provides customers a complete platform—hardware, software, and infrastructure—for
developing, running, and managing applications without the cost, complexity, and inflexibility of building and maintaining that platform on their own.

Proxy

In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.

PWA (Progressive Web App)

A type of application software delivered through the web, built using common web technologies including HTML, CSS, and JavaScript, intended to work on any platform that uses a standards-compliant browser.

Processor

The central unit within a computer that interprets and executes instructions from hardware and software.

​

​

PHP (Hypertext Preprocessor)

A popular general-purpose scripting language that is especially suited to web development, known for its ability to be embedded into HTML.

​

​

Parallel Processing

The method in computing of running two or more processors (cores, computers) in combination to handle separate parts of an overall task.

Polymorphism

In programming, the ability to present the same interface for differing underlying forms (data types).

Plug-in

A software component that adds a specific feature to an existing computer program, allowing customization.

Pseudocode

An informal high-level description of the operating principle of a computer program or other algorithm, using a mixture of natural language and programming language to convey the logic.

Q

Quantum Computing

A type of computing that takes advantage of quantum phenomena like superposition and quantum entanglement to perform operations on data.

​

QR Code (Quick Response Code)

A type of matrix barcode (or two-dimensional barcode) first designed in 1994 for the automotive industry in Japan. A barcode is a machine-readable optical label that contains information about the item to which it is attached.

​

Quad-Core

A chip with four independent units called cores that read and execute central processing unit (CPU) instructions such as add, move data, and branch.

Query Language

A computer programming language that allows retrieval and manipulation of data from a database and is used for querying the database information.

Quantum Supremacy

A term used to describe a point at which a quantum computer can perform a calculation that is impractical for a classical computer.

​Queueing Theory

A mathematical study of waiting lines, or queues. In queueing theory, a model is constructed so that queue lengths and waiting times can be predicted.

​

Quartz

In computer graphics, Quartz is a powerful 2D graphics engine and core technology that underlies both the advanced drawing capabilities of Quartz 2D and the animation capabilities of Quartz Composer.

​

Query

In computing, a query is a request for data or information from a database table or combination of tables. This data may be generated as results returned by Structured Query Language (SQL) or as pictorials, graphs, or complex results

Queue

In computer science, a queue is a collection in which the entities in the collection are kept in order and the principal (or only) operations on the collection are the addition of entities to the rear terminal position, known as
enqueue, and removal of entities from the front terminal position, known as dequeue.

Quota

In computing, a quota is the limit on the amount of disk space or memory allocated to a particular user, application, or service.

Qubit

The basic unit of quantum information—a quantum bit. Unlike a standard bit, which can be 0 or 1, a qubit can be in a state of 0, 1, or any quantum superposition of these states.

Quaternary

In data storage, a quaternary system is one that uses four distinct states or symbols to store data, as opposed to binary, which uses two.

Quorum

The minimum number of members of an assembly or society that must be present at any of its meetings to make the proceedings of that meeting valid.

QuickTime

An extensible multimedia framework developed by Apple Inc., capable of handling various formats of digital video, picture, sound, panoramic images, and interactivity.

QoS (Quality of Service)

The overall performance of a telephony or computer network, particularly the performance seen by the users of the network.

Quicksort

A highly efficient sorting algorithm, serving as a systematic method for placing the elements of an array in order.

​

Quantization

In digital signal processing, quantization is the process of mapping input values from a large set to output values in a (countable) smaller set, often with a finite number of elements.

Quantum Entanglement

A physical phenomenon that occurs when pairs or groups of particles are generated, interact, or share spatial proximity in ways such that the quantum state of each particle cannot be described independently of the state of the others, even when the particles are separated by a large distance.

Query Plan

In databases, a query plan is an ordered set of steps used to access or modify information in a SQL relational database management system.

 

Quantitative Analysis

The use of mathematical and statistical modeling, measurement, and research to understand behavior. Quantitative analysts aim to represent a given reality in terms of a numerical value.

R

RAM (Random Access Memory)

A type of computer memory that can be accessed randomly; any byte of memory can be accessed without touching the preceding bytes.

 

Router

A networking device that forwards data packets between computer networks, performing traffic directing functions on the Internet.

​

​

Ransomware

A type of malicious software designed to block access to a computer system until a sum of money is paid.

​

Responsive Design

An approach to web design that makes web pages render well on a variety of devices and window or screen sizes.

​

Rootkit

A collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.

 

ReCAPTCHA

A free service from Google that helps protect websites from spam and abuse by asking users to solve a simple test that proves they are not a robot.

​

Reinforcement Learning

An area of machine learning concerned with how software agents ought to take actions in an environment in order to maximize some notion of cumulative reward.

 

RDBMS (Relational Database Management System)

A database management system based on the relational model introduced by E.F. Codd.

Ruby on Rails

A server-side web application framework written in Ruby under the MIT License, which is a model-view-controller (MVC) framework, providing default structures for a database, a web service, and web pages.

RAID (Redundant Array of Independent Disks)

A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

RPC (Remote Procedure Call)

A protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details.

Robotic Process Automation (RPA)

The technology that allows anyone to configure computer software, or a “robot” to emulate and integrate the actions of a human interacting within digital systems to execute a business process.

Ruby

A dynamic, open-source programming language with a focus on simplicity and productivity, notable for its elegant syntax that is natural to read and easy to write.

Repository

In version control systems, a repository is a central file storage location. It is used by version control systems to store multiple versions of files.

REST (Representational State Transfer)

An architectural style for designing networked applications, relying on a stateless, client-server, cacheable communications protocol.

Runtime

The period during which a computer program is executing, or the environment in which a program runs.

 

Regression Testing

A type of software testing that ensures that previously developed and tested software still performs the same way after it is changed or interfaced with other software.

 

RSS (Really Simple Syndication)

A type of web feed that allows users and applications to access updates to online content in a standardized, computer-readable format.

​

Redux

A predictable state container for JavaScript apps, often used with React to manage state in a more efficient way.

​

Reverse Engineering

The process of taking apart a piece of software or hardware to see how it works in order to duplicate or enhance the object.

S

SQL (Structured Query Language)

A standardized programming language used for managing relational databases and performing various operations on the data in them.

​

SaaS (Software as a Service)

A software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.

Solid State Drive (SSD)

A type of mass storage device similar to a hard disk drive (HDD), but it stores data on solid-state flash memory instead of spinning disks.

Shell

In computing, a shell is a user interface for access to an operating system's services. In most cases, a shell is a command-line interface.

​

Serialization

The process of converting an object into a stream of bytes to store the object or transmit it to memory, a database, or a file. Its main purpose is to save the state of an object in order to be able to recreate it when needed.

Subnet

A logical subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting.

​

Source Code

The fundamental component of a computer program that is created by a programmer. It can be read and easily understood by a human being.

SSL (Secure Sockets Layer)

A standard security technology for establishing an encrypted link between a server and a client, typically a web server (website) and a browser, or a mail server and a mail client.

Scrum

An agile framework for managing knowledge work, with an emphasis on software development, characterized by a fixed-length iteration called a sprint, typically of two weeks.

Search Engine Optimization (SEO)

The process of increasing the quality and quantity of website traffic by increasing the visibility of a website or a web page to users of a web search engine.

Spam

Irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing, spreading malware, etc.

Scalability

The capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged to accommodate that growth.

SSH (Secure Shell)

A cryptographic network protocol for operating network services securely over an unsecured network.

Sandbox

In cybersecurity, a sandbox is an isolated environment on a network that mimics end-user operating environments. It is used to safely execute suspicious code without risking harm to the host device or network.

Software Development Kit (SDK)

A collection of software development tools in one installable package, often used to develop applications for a specific device or operating system.

Server

A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.

Semantic Web

An extension of the World Wide Web through standards set by the World Wide Web Consortium (W3C) that aims to make Internet data machine-readable.

Syntax

The set of rules that defines the combinations of symbols that are considered to be correctly structured programs or expressions in a programming language.

Symmetric Encryption

A type of encryption where the same key is used for both encrypting and decrypting the information.

Software Architecture

The fundamental structures of a software system and the discipline of creating such structures and systems. Each structure comprises software elements, relations among them, and properties of both elements and relations.

T

TCP/IP (Transmission Control Protocol/Internet Protocol)

A set of networking protocols that allows two or more computers to communicate. It is the foundation of the internet.

 

Terabyte (TB)

A unit of digital data storage equal to approximately one trillion bytes, or 1,024 gigabytes.

​

​

TDD (Test-Driven Development)

A software development process that relies on the repetition of a very short development cycle: requirements are turned into very specific test cases, then the software is improved to pass the new tests.

Transistor

A semiconductor device used to amplify or switch electronic signals and electrical power.

​

​

Typeface

The design of lettering that can include variations in size, weight (bold), slope (italic), width, and so on. Each of these variations of the typeface is a font.

Throttling

The intentional slowing or speeding of an internet service by an Internet service provider (ISP). It can also refer to the regulation of the processing speed of a microprocessor based on the current demand.

TDD (Time-Division Duplexing)

A method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line.

Token

In programming, a token is a string of characters that are used as a unit in the syntax of the code. In cybersecurity, it often refers to a hardware or software piece that generates a secure authentication code.

Thread

The smallest sequence of programmed instructions that can be managed independently by a scheduler, which is typically a part of the operating system.

Two-Factor Authentication (2FA)

An extra layer of security used to ensure the security of online accounts beyond just a username and password.

Tor (The Onion Router)

A free and open-source software for enabling anonymous communication by directing internet traffic through a free, worldwide, volunteer overlay network.

Tag

In web development, a tag can refer to HTML or XML code that delineates elements within a document. In software development and social media, tags are keywords or terms assigned to a piece of information.

Tokenization

The process of converting rights to an asset into a digital token on a blockchain. In data security, it refers to the process of substituting sensitive data elements with non-sensitive equivalents.

TTL (Time To Live)

A mechanism that limits the lifespan or lifetime of data in a computer or network. In networking, it specifies the number of hops that a packet can travel before being discarded or returned.

TLS (Transport Layer Security)

A protocol that ensures privacy between communicating applications and their users on the internet.

​

​

Telemetry

The automated process of collecting data from remote or inaccessible points and transmitting it to an IT system in a different location

 

Topology

The layout of a network. Includes how the devices are connected and how they communicate with each other.

 

Turing Test

A test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human.

​

Template

In software development, a template is a generic class or other unit of source code that can be used as the basis for unique units of code.

​

​

Tunneling

The practice of transporting a data packet over a network in a protocol envelope that is not supported by the network infrastructure.

U

URL (Uniform Resource Locator)

A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

UDP (User Datagram Protocol)

A communications protocol that facilitates the exchange of messages between computing devices in a network. It's known for its low latency and loss tolerating connections between applications.

UML (Unified Modeling Language)

A standardized modeling language enabling developers to specify, visualize, construct, and document artifacts of software systems.

Underflow

An error condition occurring when a computer arithmetic operation attempts to create a numeric value that is too small to be represented within the storage space allotted for that type of value.

Utility Computing

​The packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity.

Unicast

Communication between a single sender and a single receiver over a network.

URI (Uniform Resource Identifier)

A string of characters used to identify a name or a resource on the Internet.

UI (User Interface)

The means by which the user and a computer system interact, particularly the use of input devices and software.

Unicode

A computing industry standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems.

Ubuntu

A Debian-based Linux operating system and distribution for personal computers, smartphones, and network servers.

Upselling

A sales technique where a seller invites the customer to purchase more expensive items, upgrades, or other add-ons in an attempt to make a more profitable sale.

Upstream

In software development, upstream refers to the direction in which changes or patches are made by original authors or maintainers of software projects.

UX Design

The process of designing (digital or physical) products that are useful, easy to use, and delightful to interact with. It's about enhancing the experience that people have while interacting with your product and making sure they find value in what you're providing.

Unsupervised Learning

A type of algorithm that learns patterns from untagged data. The system tries to learn without a teacher.

UX (User Experience)

Encompasses all aspects of the end-user's interaction with the company, its services, and its products.

UUID (Universally Unique Identifier)

A 128-bit number used to identify information in computer systems.

​

Uptime

The time during which a computer or IT system is operational and functioning correctly.

​

USB (Universal Serial Bus)

An industry standard for cables, connectors, and protocols for connection, communication, and power supply between computers, peripherals, and other computers.

User Story

In agile software development, a user story is an informal, natural language description of one or more features of a software system.

​

UAT (User Acceptance Testing)

The final phase of software testing where the actual software users test the software to ensure it can handle required tasks in real-world scenarios, according to specifications.

V

Virtual Reality (VR)

A simulated experience that can be similar to or completely different from the real world, often used for entertainment and education.

 

​

Vector Graphics

The use of polygons to represent images in computer graphics, as opposed to raster graphics which are composed of pixels.

​

​

Version Control

A system that records changes to a file or set of files over time so that you can recall specific versions later.

​

​

Vulnerability

A weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system.

​

​

Virtualization

The process of creating a virtual version of something, including virtual computer hardware platforms, storage devices, and computer network resources.

​

​

VFX (Visual Effects)

The process by which imagery is created or manipulated outside the context of a live action shot in film making and video production.

​

​

Value Proposition

A promise of value to be delivered, communicated, and acknowledged. It is also a belief from the customer about how value will be delivered, experienced, and acquired.

​

Variable

In programming, a variable is a storage location paired with an associated symbolic name, which contains some known or unknown quantity of information referred to as a value.

VLAN (Virtual Local Area Network)

A group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location.

VoIP (Voice over Internet Protocol)

A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line.

Validation

The process of checking if something satisfies a certain criterion. In web development, it often refers to the process of checking if the data entered into a web application is correct.

VCS (Version Control System)

​A software tool that helps software teams manage changes to source code over time.

Virus

The process of converting rights to an asset into a digital token on a blockchain. In data security, it refers to the process of substituting sensitive data elements with non-sensitive equivalents.

​VBA (Visual Basic for Applications)

An implementation of Microsoft's event-driven programming language Visual Basic 6, which was declared legacy in 2008, and its associated integrated development environment (IDE), built into most Microsoft Office applications.

VPN (Virtual Private Network)

A service that encrypts your internet traffic and protects your online identity by hiding your IP address.

​

​

VM (Virtual Machine)

An emulation of a computer system that provides the functionality of a physical computer.

​

 

Volatile Memory

Computer memory that requires power to maintain the stored information, such as RAM.

 

Viewport

The visible area of a webpage on the user's screen, which changes size based on the device used to view the site.

​

​

VHDL (VHSIC Hardware Description Language)

A hardware description language used in electronic design automation to describe digital and mixed-signal systems such as field-programmable gate arrays and integrated circuits.

Virtual Host

A method of hosting multiple domain names (with separate handling of each name) on a single server (or pool of servers).

W

Web Application

A software application that runs on a web server, unlike computer-based software programs that are run locally on the operating system of the device.

​

​

Widget

A small gadget or control of your desktop or mobile application that serves a specific purpose, such as a calendar or a weather display.

WebSocket

A computer communications protocol, providing full-duplex communication channels over a single TCP connection.

​

​

Workflow

The sequence of industrial, administrative, or other processes through which a piece of work passes from initiation to completion.

 

Write-Protect

A physical or software mechanism that prevents modification or deletion of data on a device or within a file.

​

​

Web Crawling

The process by which a search engine sends out a team of robots (known as crawlers or spiders) to find new and updated content.

​

Windows Registry

A hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry.

​

Wi-Fi

A family of wireless network protocols, based on the IEEE 802.11 family of standards, that are commonly used for local area networking of devices and Internet access.

Web Server

A system that stores, processes, and delivers web pages to clients. The communication between client and server takes place using the Hypertext Transfer Protocol (HTTP).

WWW (World Wide Web)

An information system where documents and other web resources are identified by Uniform Resource Locators (URLs), which may be interlinked by hypertext, and are accessible over the Internet.

Wildcard Character

A character that may be used to substitute for any of a class of characters in a search or filtering operation, often used in file searches, regular expressions, and SQL queries.

WYSIWYG (What You See Is What You Get)

A system in which content (text and graphics) displayed onscreen during editing appears in a form closely corresponding to its appearance when printed or displayed as a finished product.

Watermark

A faint design made in some paper during manufacture that is visible when held against the light and typically identifies the maker.

Wrapper

In programming, a wrapper is any entity that encapsulates (wraps around) another item to make that item easier to use, understand, or manage.

WAN (Wide Area Network)

A telecommunications network that extends over a large geographical area for the primary purpose of computer networking.

Webhook

A method of augmenting or altering the behavior of a web page or web application with custom callbacks. These callbacks may be maintained, modified, and managed by third-party users and developers who do not necessarily have to be affiliated with the originating website or application.

WPA (Wi-Fi Protected Access)

A security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.

Worm

A malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it.

Wavelength-Division Multiplexing (WDM)

A technology which multiplexes multiple optical carrier signals onto a single optical fiber by using different wavelengths (i.e., colors) of laser light to carry different signals.

Web Services

Standardized ways of integrating web-based applications using the XML, SOAP, WSDL, and UDDI open standards over an Internet protocol backbone.

X

XML (eXtensible Markup Language)

A markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.

XPath

A query language that allows the selection of nodes from an XML document, navigating elements and attributes in an XML document.

​​XaaS (Everything as a Service)

A term referring to the growing diversity of services available over the Internet via cloud computing as opposed to being provided locally, or on-premises.

X-Frame-Options

An HTTP response header used to indicate whether or not a browser should be allowed to render a page in a <frame>, <iframe>, <embed>, or <object>.

XAML (eXtensible Application Markup Language)

A declarative XML-based language developed by Microsoft that is used for initializing structured values and objects.

X-Ray

In computing, particularly web development, refers to tools or applications that inspect the structure of a webpage to analyze its contents and structure.

X-Windows System

A windowing system for bitmap displays, common on UNIX-like operating systems.

XSS (Cross-Site Scripting)

A security vulnerability typically found in web applications, which allows attackers to inject client-side scripts into web pages viewed by other users.

X86

A family of instruction set architectures based on the Intel 8086 microprocessor and its 8088 variant.

​

​

XMP (Extensible Metadata Platform)

A standard created by Adobe Systems for processing and storing standardized and proprietary metadata, associated with digital documents, files, or assets.

Xen

An open-source hypervisor providing services that allow multiple computer operating systems to execute on the same computer hardware concurrently.

XSRF/CSRF (Cross-Site Request Forgery)

An attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.

X-Plan

A flight simulation engine that can model the flight patterns of different aircraft types.

 

Xmodem

A protocol for file transfer developed in the early 1980s, used primarily for modem-to-modem communication.

​

XSLT (eXtensible Stylesheet Language Transformations)

A language for transforming XML documents into other XML documents, or other formats such as HTML for web pages, plain text, or XSL Formatting Objects.

X509 Certificate

A standard defining the format of public key certificates, used in many Internet protocols as well as for the digital signature of documents.

 

X11

A windowing system for bitmap displays, common on UNIX-like operating systems.

 

XDCC (Xabi DCC)

A protocol that allows the transfer of files via IRC (Internet Relay Chat).

XR (Extended Reality)

A term referring to all real-and-virtual combined environments and human-machine interactions generated by computer technology and wearables, including augmented reality (AR), virtual reality (VR), and mixed reality (MR).

X-Path Injection

An attack technique used to exploit web sites that construct XPath (XML Path Language) queries from user-supplied input.

Y

YAML (YAML Ain't Markup Language)

A human-readable data serialization standard that can be used in conjunction with all programming languages and is often used for configuration files.

Yahoo

An American web services provider that was once one of the most prominent Internet portals and search engines in the early days of the World Wide Web.

YARN (Yet Another Resource Negotiator)

A cluster management technology used with Apache Hadoop for resource management in the Hadoop ecosystem.

Yield Management

A variable pricing strategy, based on understanding, anticipating, and influencing consumer behavior in order to maximize revenue or profits from a fixed, perishable resource.

Y Combinator

An American seed money startup accelerator launched in March 2005. It has been used to launch over 2,000 companies, including some very successful ones like Dropbox, Airbnb, and Reddit.

Yocto Project

An open-source collaboration project that provides templates, tools, and methods to help you create custom Linux-based systems for embedded products regardless of the hardware architecture.

YUV Color Space

Often used in video compression and broadcasting, it separates the luminance (Y) from the chrominance (U and V) components to optimize color representation.

Yottabyte

A unit of information or computer storage equal to one septillion bytes (or a trillion terabytes). It's one of the largest data measures.

Yield

In computer programming, particularly in concurrency, yield is a function that allows a thread to yield its current use of the processor to other threads. In some programming languages, yield is used to pause and resume a generator function.

Yagi Antenna

A directional antenna consisting of a driven element such as a dipole or folded dipole and additional parasitic elements (a reflector and one or more directors) used for radio communications.

​

YUV

A color encoding system typically used as part of a color image pipeline. It encodes a color image or video taking human perception into account, allowing reduced bandwidth for chrominance components.

YIQ

A color space used by the NTSC color TV system, employed mainly in North and Central America, and Japan. It is related to but different from the YUV color space.

Yottaflops

A unit of computing speed equal to one septillion (10^24) floating-point operations per second, used in the field of high-performance computing.

 

Yield Curve

In finance, a curve that shows the relationship between interest rates earned on bonds (typically government bonds) and the length of time until the bonds mature.

Y2K (Year 2000 Problem)

A class of computer bugs related to the formatting and storage of calendar data for dates beginning in the year 2000. It was a significant issue for computer systems and software as the 20th century transitioned into the 21st century.

Yoctosecond

A unit of time in the International System of Units (SI) representing 10^-24 of a second. It is one of the smallest measurable units of time.

YCbCr

A color space used as a part of the color image pipeline in video and digital photography systems. YCbCr is derived from the RGB color model.

​

​

Yottabit

A unit of digital information or computer storage, equivalent to one septillion bits. It is one of the largest standardized size prefixes for data and digital information.

​

​Young's Modulus

A mechanical property that measures the stiffness of a solid material. It defines the relationship between stress (force per unit area) and strain (proportional deformation) in a material.

 

YAML Front Matter

A section of YAML placed at the beginning of a file to define site variables or page-specific variables for static site generators.

Z

Zettabyte

A unit of digital information storage that represents one sextillion bytes or 10^21 bytes. It's one of the largest data measurement units.

Zigbee

A specification for a suite of high-level communication protocols using small, low-power digital radios for low-data-rate wireless networking, typically used in home automation, medical device data collection, and other low-power low-bandwidth needs.

Zero-Day Vulnerability

A term referring to the growing diversity of services available over the Internet via cloud computing as opposed to being provided locally, or on-premises.

Z-Buffering

A computer graphics technique used in 3D rendering to help determine which objects, or parts of objects, are visible and which are hidden behind other objects.

Zero Configuration Networking (Zeroconf)

A set of technologies that automatically creates a usable network based on the Internet Protocol Suite (TCP/IP) without manual operator intervention or special configuration servers.

Zipline

A Pythonic algorithmic trading library. It is an event-driven system for backtesting trading strategies on historical (backtest) and real-time data.

Zsh (Z Shell)

A Unix shell that can be used as an interactive login shell and as a powerful command interpreter for scripting. Zsh is an extended Bourne shell with a large number of improvements, including some features from bash, ksh, and tcsh.

Zero-Day Attack

A cyber-attack that occurs on the same day a weakness is discovered in software, before the software developers have an opportunity to create a patch to fix the vulnerability.

Z-Wave

A wireless communications protocol used primarily for home automation. It is a mesh network using low-energy radio waves to communicate from appliance to appliance.

​

z/OS

A 64-bit operating system for IBM mainframes, designed for secure, high-volume, high-performance computing.

​

​

Zabbix

An open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines, and cloud services.

​

​

ZetaScale

Software technology designed to enable scalable and super-fast data processing in next-generation data centers and cloud environments.

​

Zoho

A comprehensive suite of online productivity, collaboration, and business applications for businesses of all sizes.

 

​

Zuul

An edge service that provides dynamic routing, monitoring, resiliency, security, and more. It is part of the Netflix OSS suite of services and tools for building a distributed microservices architecture.

​

​ZFS (Zettabyte File System)

A high-capacity file system and logical volume manager designed by Sun Microsystems, known for its high storage capacity and data integrity verification.

Zombie Computer

A computer connected to the internet that has been compromised by a hacker, computer virus, or trojan horse and can be used to perform malicious tasks under remote direction.

ZIP

A file format used for data compression and archiving, which supports lossless data compression. A ZIP file may contain one or more files or directories that may have been compressed.

Zen Coding

A fast way to write HTML and CSS code using abbreviations that expand to valid HTML tags or CSS properties. It is now known as Emmet.

​ZIF Socket (Zero Insertion Force Socket)

A type of CPU socket on a motherboard that allows for the easy insertion of a CPU chip without the need for applying force.

Zone File

A text file that describes a DNS zone. A DNS zone is a subset of the global Domain Name System namespace. The zone file contains mappings between domain names and IP addresses and other resources, organized in the form of resource records (RR).

bottom of page