Glossary of Terms

Acceptable Use Policy (AUP)

A document that outlines the rules for the use of a company's computers and networks.

Accuracy

The ability of a computer to perform calculations with 100% accuracy, which is critical for financial tasks

Antivirus Programs

Software that detects and removes viruses and other malware.

Application (app)

A set of instructions that tells a computer how to perform a specific task. The word “app” is more common for software on smartphones and modern computers.

Application Aoftware

A program designed for a user to perform a specific task, like writing a document or browsing the internet.

Artificial Intelligence (AI)

A broad field of computer science focused on creating machines and software that can perform tasks requiring human intelligence, such as learning, problem-solving, and understanding language.

Authentication

The process of verifying a user's identity to ensure they are who they claim to be.

Automation

The use of technology to perform tasks with reduced human assistance.

Backup

A copy of files made for safety in case the originals are lost or damaged.

Bandwidth

The measure of how much data can be transferred over a connection in a specific amount of time, usually measured in Mbps.

Big Data

Extremely large and complex data sets that can be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions.

Biometrics

The use of a unique personal characteristic, like a fingerprint or facial scan, for identification.

Bit

The smallest unit of data in a computer, represented as either ON (1) or OFF (0).

Blockchain

A secure, decentralized, and distributed digital ledger technology that records transactions in a way that is highly resistant to modification.

Bluetooth

A short-range wireless technology for connecting personal devices together over a range of about 10 meters.

Browser

The software application used to access and view webpages on the World Wide Web (e.g., Google Chrome, Safari).

Byte

A unit of digital information that consists of 8 bits. A group of 8 bits is called a byte, which can represent a single character.

Central Processing Unit, or CPU

Figure 3.4: A Mobile User Interface. The screen of a smartphone provides a clear example of a modern Graphical User Interface (GUI). The grid of small pictures, or icons, allows the user to launch applications with a simple touch.
(Image generated with AI assistance.)

Client

A computer or device that requests information from a server.

Cloud Backup

An internet service for storing data on remote servers as backup.

Cloud Computing

The delivery of on-demand computing services—including servers, storage, databases, and software—over the internet from a cloud provider.

Cloud Storage

A service that stores your data on internet servers, allowing you to access it from any device with an internet connection.

Computer

An electronic device that operates under the control of instructions to process raw items and produce a useful result. It processes data based on a set of instructions.

Continuous Learning

The ongoing, voluntary, and self-motivated pursuit of knowledge for either personal or professional reasons.

Cryptocurrency

A digital or virtual currency that uses cryptography for security, with Bitcoin being the most well-known example.

Cybercrime

An illegal act involving a computer.

Cybersecurity

The practice of protecting computers, networks, and data from attack, damage, or unauthorized access.

Data

The raw details you provide to the computer. They are raw, unprocessed facts and figures.

Data Analytics

The process of examining large data sets to find trends, draw conclusions, and make informed decisions.

Decision-making

The process of using computer-analyzed information to make smarter business choices.

Desktop Computer

A computer designed to stay in one location, which is often more powerful and easier to upgrade than portable models.

Digital Divide

The gap between people who have ready access to computers and the internet, and those who do not.

Digital Security Risks

Any event or action that could cause loss or damage to a computer system or its data

Digital Skills Gap

The difference between the digital skills that employers need and the skills that the current workforce possesses.

Display

The most common output device, which visually presents text, graphics, and video on a screen.

Domain Name System (DNS)

The internet's phonebook, which translates human-readable domain names (like google.com) into computer-readable IP addresses.

E-waste

Discarded electronic equipment, such as old computers, smartphones, and printers.

Embedded Computer

A special-purpose computer that functions as one component within a larger product, such as a rice cooker or a car's braking system.

Encryption

The process of converting readable data (plaintext) into an unreadable, scrambled code (ciphertext) to protect it.

Enterprise user

An employee who works for a large organisation on a managed company network, often using specialized, custom-built software.

Ergonomics

The science of designing a workspace and its equipment to be safe, comfortable, and efficient for human use.

Executes

To carry out the instructions of a computer program.

File

A named collection of stored data, which can be thought of as a single digital item.

File Manager

A utility that helps users manage their files and folders.

Firewall

Hardware or software that acts as a security guard to protect a network from unauthorized access.

Folder

A digital container used to organise files.

fragmentation

The state of a file being stored in separate, non-contiguous parts on a disk.

Gigabyte

A unit of data measurement approximately equal to 1 billion bytes.

Green Computing

The practice of using computing resources in a more environmentally responsible and sustainable way.

Hard Disk Drive (HDD)

A traditional storage device that uses magnetism and spinning platters to store data permanently.

Hardware

The physical, touchable parts of a computer system.

Headset

A device that combines headphones (output) and a microphone (input) into a single unit, commonly used for online calls.

Home user

A person who uses a computer for personal activities at home, such as managing personal life, entertainment, and learning.

Hotspot

A physical location where you can get wireless internet access. A mobile hotspot uses a smartphone's data connection.

HTTPS

A protocol that indicates a secure and encrypted connection to a website, often shown by a padlock icon in the browser.

Information

The final, organized result that the computer shows you. It is processed data that is meaningful and useful.

Input

The act of providing data and instructions to the computer.

Input Device

Any piece of hardware used to enter data and instructions into a computer, such as a keyboard or mouse.

Instructions

A set of specific rules a computer follows to perform any task.

Internet

The massive, worldwide collection of interconnected computer networks that share information.

Internet of Things (IoT)

A vast network of physical devices (not just computers) that are embedded with sensors and connected to the internet, allowing them to collect and share data.

Internet Service Provider (ISP)

A business that provides access to the internet (e.g., TM Unifi, Maxis).

IP Address

A unique number that identifies each computer or device connected to the internet.

IPOS

The four-step cycle of Input, Process, Output, and Storage.

Keyboard

The most common input device, used for typing text, numbers, and symbols.

Kilobyte

A unit of data measurement approximately equal to 1,000 bytes.

Laptop

A portable, all-in-one computer that combines the screen, keyboard, and internal parts into a single unit for mobility.

Malware

Short for "malicious software," it is any software intentionally designed to cause damage to a computer or steal data.

Megabyte

A unit of data measurement approximately equal to 1 million bytes.

Memory Card

A small, flat storage card that uses flash memory, commonly used in portable devices like digital cameras and smartphones.

Microphone

An input device that captures sound waves and converts them into a digital format.

Mobile App

A native application designed specifically to be installed and run on a mobile device like a smartphone or tablet.

Mobile user

A professional who works while on the move, relying on portable devices like smartphones and tablets to stay connected and productive.

Mouse

The most common pointing device for desktop computers, used to control the cursor on the screen.

Multitasking

The ability of an operating system to run multiple applications at the same time, sharing the computer's resources among them.

Native App

A program that is installed directly onto a specific computer or mobile device.

Netiquette

The code of acceptable and polite behavior for online communication.

Network

A collection of computers and devices connected together, which allows them to share resources.

NFC (Near Field Communication)

A very short-range wireless technology (4 cm or less) that powers "tap-to-pay" systems.

Open-Source Software

Software where the source code is made available for free, allowing anyone to view, modify, and share it.

Operating System

The main system software that manages all the computer's hardware and software resources.

Operating System (OS)

The main system software that manages a computer's hardware and software resources.

Output

The result that a computer shows after processing data.

Output Device

Any hardware component that presents the processed information from a computer to a user, such as a monitor or printer.

Phishing

A common cyberattack where hackers send fake emails, pretending to be from a legitimate company, to trick people into revealing personal information or downloading malware.

Port

A connection point or interface on a computer where you can connect an external device.

Power user

A user who requires a high-performance computer for demanding and specialized tasks, such as 3D modelling or scientific calculations.

Printer

An output device that produces a physical copy ("hard copy") of text and graphics.

Process

The action of the computer taking raw data and following instructions to work on it.

Program

A set of instructions that tells the hardware what to do. It is also known as software.

Programming Language

A formal language used to write instructions for a computer.

Random Access Memory (RAM)

The computer's high-speed, temporary, and volatile workspace that holds data and instructions the CPU is actively using.

Random Access Memory, or RAM

Temporary storage for data and programs that are currently in use. It is volatile.

Ransomware

A type of malware that encrypts a user's files and demands a ransom payment to unlock them.

Reach

The ability of a business to connect with customers and partners globally through the internet.

Resolution

The number of individual dots, or pixels, used to create the image on a screen, which determines the sharpness and clarity.

Restore

The process of copying files from a backup back to their original location.

Retail Software

Mass-produced software that is available for purchase in a store or online.

Scanner

An input device that converts printed material, such as text and pictures, into a digital format.

Server

A powerful computer that provides services to other computers over a network.

Software

A set of instructions (a program) that tells the hardware what to do.

Software Developers

A group of people who write computer programs.

Software Development Life Cycle (SDLC)

A structured process that professionals follow for planning, creating, testing, and maintaining software.

Software License

A legal agreement that defines how a piece of software can be used and distributed.

Software Piracy

The illegal and unauthorized copying, distribution, or use of copyrighted software

Software Update

A new version of a program that can fix errors, improve security, and add new features.

SOHO User

An individual who runs a business from home or a small office, using a computer as their primary tool for earning an income.

Solid-State Drive (SSD)

A modern and fast storage device that stores data on flash memory chips and has no moving parts.

Speed

The ability of a computer to process millions of instructions every second, which translates into business efficiency and better customer service.

Spyware

Software that secretly collects information about a user's activities.

Storage

The act of saving data or information for future use.

Surge Protector

A device that protects computer equipment against electrical power spikes.

System Software

The set of programs that operates and controls the computer's hardware and provides a platform for applications to run.

Tablet

A highly portable mobile computer with a large touch screen as its main feature.

Terabyte

A unit of data measurement approximately equal to 1 trillion bytes.

Trojan Horse

Destructive software that is disguised as a legitimate, useful program.

Two-Step Verification

A security method that requires two different forms of identification to log in.

Uninterruptible Power Supply (UPS)

A device that contains a battery and provides temporary power during a blackout, allowing for a safe shutdown.

URL (Uniform Resource Locator)

A webpage's unique address.

USB Flash Drive

A small, ultra-portable storage device that plugs into a USB port, also known as a thumb drive or pendrive.

Use

Anyone who interacts with a computer or mobile device.

User Interface

The visual part of a program or device that a user interacts with.

User Interface (UI)

The visual part of an operating system or software that a user interacts with, including the desktop, icons, and menus.

Utility

A program that performs a specific task related to managing or maintaining a computer.

Utility Program

A type of system software that performs a specific maintenance task to help manage, protect, or improve the computer.

Virtual Private Network (VPN)

A service that provides a secure, encrypted connection over a public network like the internet.

Virus

A malicious program that attaches itself to a file to spread.

VoIP (Voice over IP)

A technology that allows you to make voice calls over the internet instead of a traditional phone line.

Web App

An application that runs on a remote server and is accessed through a web browser, so nothing needs to be installed on the user's computer.

Webcam

A small digital video camera used to capture video for online meetings, classes, or video calls.

Wi-Fi

A wireless technology that uses radio signals to provide high-speed internet and network connections over a large area.

World Wide Web

A system of public, interlinked documents and other web resources that are accessed via the internet.

Worm

A malicious program that can copy itself to spread across a network without human interaction.

License

Icon for the Creative Commons Attribution-ShareAlike 4.0 International License

Business & Bytes: Your Essential Computer Guide Copyright © by Md Hafizi Ahsan is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book